{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T06:51:53Z","timestamp":1726037513467},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030242701"},{"type":"electronic","value":"9783030242718"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24271-8_7","type":"book-chapter","created":{"date-parts":[[2019,7,17]],"date-time":"2019-07-17T19:19:24Z","timestamp":1563391164000},"page":"68-80","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A Privacy-Preserving Multi-keyword Ranked Search over Encrypted Data in Hybrid Clouds"],"prefix":"10.1007","author":[{"given":"Hua","family":"Dai","sequence":"first","affiliation":[]},{"given":"Yan","family":"Ji","sequence":"additional","affiliation":[]},{"given":"Liang","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Geng","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Xun","family":"Yi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,11]]},"reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Grzonkowski, S., Corcoran, P.M., Coughlin, T.: Security analysis of authentication protocols for next-generation mobile and CE cloud services. In: Proceedings of the IEEE International Conference on Consumer Electronics, Berlin, Germany, pp. 83\u201387 (2011)","DOI":"10.1109\/ICCE-Berlin.2011.6031855"},{"key":"7_CR2","unstructured":"Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 44\u201355. IEEE, Oakland (2000)"},{"issue":"1","key":"7_CR3","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1109\/TPDS.2013.45","volume":"25","author":"N Cao","year":"2014","unstructured":"Cao, N., Wang, C., Li, M., Ren, K., Lou, J.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 25(1), 222\u2013223 (2014)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"6","key":"7_CR4","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1109\/TIT.1995.476344","volume":"41","author":"IH Witten","year":"1995","unstructured":"Witten, I.H., Moffat, A., Bell, T.C.: Managing gigabytes: compressing and indexing documents and images. IEEE Trans. Inf. Theory 41(6), 79\u201380 (1995)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Wong, W.K., Cheung, D.W., Kao, B., Mamoulis, N.: Secure kNN computation on encrypted databases. In: Proceedings of the 2009 ACM SIGMOD International (2009)","DOI":"10.1145\/1559845.1559862"},{"issue":"3","key":"7_CR6","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1109\/TDSC.2015.2406704","volume":"13","author":"H Li","year":"2016","unstructured":"Li, H., Yang, Y., Luan, T., et al.: Enabling fine-grained multi-keyword search supporting classified sub-dictionaries over encrypted cloud data. IEEE Trans. Dependable Secur. Comput. 13(3), 312\u2013325 (2016)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"issue":"2","key":"7_CR7","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1109\/TPDS.2015.2401003","volume":"27","author":"Z Xia","year":"2016","unstructured":"Xia, Z., Wang, X., Sun, X., et al.: A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 27(2), 340\u2013352 (2016)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"7_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2017\/1404279","volume":"2017","author":"X Zhu","year":"2017","unstructured":"Zhu, X., Dai, H., Yi, X., Yang, G., Li, X.: MUSE: an efficient and accurate verifiable privacy-preserving multikeyword text search over encrypted cloud data. Secur. Commun. Netw. 2017, 1\u201317 (2017)","journal-title":"Secur. Commun. Netw."},{"issue":"4","key":"7_CR9","doi-asserted-by":"publisher","first-page":"951","DOI":"10.1109\/TPDS.2015.2425407","volume":"27","author":"C Chen","year":"2016","unstructured":"Chen, C., et al.: An efficient privacy-preserving ranked keyword search method. IEEE Trans. Parallel Distrib. Syst. 27(4), 951\u2013963 (2016)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Wang, B., Yu, S., Lou, W., et al.: Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud. In: IEEE INFOCOM 2014 - IEEE Conference on Computer Communications, pp. 2112\u20132120. IEEE, Piscataway (2014)","DOI":"10.1109\/INFOCOM.2014.6848153"},{"issue":"12","key":"7_CR11","doi-asserted-by":"publisher","first-page":"2706","DOI":"10.1109\/TIFS.2016.2596138","volume":"11","author":"Z Fu","year":"2016","unstructured":"Fu, Z., Wu, X., Guan, C., et al.: Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Trans. Inf. Forensics Secur. 11(12), 2706\u20132716 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"7_CR12","first-page":"37","volume":"55","author":"Y Liu","year":"2018","unstructured":"Liu, Y., Peng, H., Wang, J.: Verifiable diversity ranking search over encrypted outsourced data. CMC: Comput. Mater. Continua 55(1), 37\u201357 (2018)","journal-title":"CMC: Comput. Mater. Continua"},{"issue":"2","key":"7_CR13","first-page":"273","volume":"56","author":"X Xie","year":"2018","unstructured":"Xie, X., Yuan, T., Zhou, X., Cheng, X.: Research on trust model in container-based cloud service. CMC: Comput. Mater. Continua 56(2), 273\u2013283 (2018)","journal-title":"CMC: Comput. Mater. Continua"},{"key":"7_CR14","unstructured":"Yu, Z.: Symmetric repositioning of bisecting K-means centers for increased reduction of distance calculations for big data clustering. In: 2016 IEEE International Conference on Big Data, Washington, DC, USA, pp. 2709\u20132715 (2016)"},{"key":"7_CR15","unstructured":"Yang , Y., Liu, J., Cai, S., Yang, S.: Fast multi-keyword semantic ranked search in cloud computing, vol. 40 (2017)"},{"issue":"3","key":"7_CR16","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1109\/TKDE.2007.48","volume":"19","author":"R Cilibrasi","year":"2007","unstructured":"Cilibrasi, R., Vitanyi, P.M.B.: The google similarity distance. IEEE Trans. Knowl. Data Eng. 19(3), 370\u2013383 (2007)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"7_CR17","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511809071","volume-title":"Introduction to Information Retrieval","author":"CD Manning","year":"2008","unstructured":"Manning, C.D., Raghavan, P., Schutze, H.: Introduction to Information Retrieval. Cambridge University Press, Cambridge (2008)"},{"key":"7_CR18","unstructured":"Lichman, M.: UCI Machine Learning Repository. University of California, School of Information and Computer Science, Irvine, Calif, USA (2013)"},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"Wang, Z., Meng, B.: A comparison of approaches to chinese word segmentation in hadoop. In: 2014 IEEE International Conference on Data Mining Workshop, Shenzhen, China, pp. 844\u2013850 (2014)","DOI":"10.1109\/ICDMW.2014.43"},{"issue":"4","key":"7_CR20","doi-asserted-by":"publisher","first-page":"951","DOI":"10.1109\/TPDS.2015.2425407","volume":"27","author":"C Chen","year":"2016","unstructured":"Chen, C., Zhu, X., Shen, P., et al.: An efficient privacy-preserving ranked keyword search method. IEEE Trans. Parallel Distrib. Syst. 27(4), 951\u2013963 (2016)","journal-title":"IEEE Trans. Parallel Distrib. Syst."}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24271-8_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,17]],"date-time":"2019-07-17T19:25:29Z","timestamp":1563391529000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24271-8_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030242701","9783030242718"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24271-8_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"11 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICAIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New York, NY","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icaisconf.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}