{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:45:00Z","timestamp":1725489900582},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642330643"},{"type":"electronic","value":"9783642330650"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33065-0_17","type":"book-chapter","created":{"date-parts":[[2012,9,3]],"date-time":"2012-09-03T21:37:18Z","timestamp":1346708238000},"page":"156-165","source":"Crossref","is-referenced-by-count":3,"title":["Small Business-Oriented Index Construction of Cloud Data"],"prefix":"10.1007","author":[{"given":"Kai","family":"Peng","sequence":"first","affiliation":[]},{"given":"Hua","family":"Zou","sequence":"additional","affiliation":[]},{"given":"Rongheng","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Fangchun","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"17_CR1","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1007\/s13174-010-0007-6","volume":"1","author":"Q. Zhang","year":"2010","unstructured":"Zhang, Q., Cheng, L., Boutaba, R.: Cloud computing: state-of-the-art and research challenges. Proc. Journal of Internet Services and Applications\u00a01(1), 7\u201318 (2010)","journal-title":"Proc. Journal of Internet Services and Applications"},{"key":"17_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1007\/978-3-642-14992-4_13","volume-title":"Financial Cryptography and Data Security","author":"S. Kamara","year":"2010","unstructured":"Kamara, S., Lauter, K.: Cryptographic Cloud Storage. In: Sion, R., Curtmola, R., Dietrich, S., Kiayias, A., Miret, J.M., Sako, K., Seb\u00e9, F. (eds.) FC 2010 Workshops. LNCS, vol.\u00a06054, pp. 136\u2013149. Springer, Heidelberg (2010)"},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"Wang, C., Cao, N., Li, J., Ren, K., Lou, W.: Secure ranked keyword search over encrypted cloud data. In: Proc. ICDCS 2010, pp. 253\u2013262 (2010)","DOI":"10.1109\/ICDCS.2010.34"},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Li, J., Wang, Q., Wang, C., Cao, N., Ren, K., Lou, W.: Fuzzy keyword search over encrypted data in cloud computing. In: Proc. INFOCOM 2010 Mini-Conference, San Diego, pp. 1\u20135 (March 2010)","DOI":"10.1109\/INFCOM.2010.5462196"},{"key":"17_CR5","doi-asserted-by":"crossref","unstructured":"Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data. In: Proc. INFOCOM 2011, Shanghai, pp. 829\u2013837 (April 2011)","DOI":"10.1109\/INFCOM.2011.5935306"},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Chuah, M., Hu, W.: Privacy-Aware Bedtree Based Solution for Fuzzy Multi-Keyword Search over Encrypted Data. In: Proc. ICDCSW 2011, pp. 273\u2013281 (2011)","DOI":"10.1109\/ICDCSW.2011.11"},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Wang, C., Ren, K., Yu, S., Urs, K.M.R.: Achieving Usable and Privacy-Assured Similarity Search over Outsourced Cloud Data. In: Proc. INFOCOM 2012, Orlando (March 2012)","DOI":"10.1109\/INFCOM.2012.6195784"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Cao, N., Yang, Z., Wang, C., Ren, K., Lou, W.: Privacy-Preserving Query over Encrypted Graph-Structured Data in Cloud Computing. In: Proc. ICDCS 2011, pp. 393\u2013402 (2011)","DOI":"10.1109\/ICDCS.2011.84"},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"Yang, Y., Lu, H., Weng, J.: Multi-User Private Keyword Search for Cloud Computing. In: Proc. CLOUDCOM 2011, Athens, pp. 264\u2013271 (2011) ISBN:146730090X","DOI":"10.1109\/CloudCom.2011.43"},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-Based Encryption for Fine-Gained Access Control of Encrypted Data. In: Proc. ACM CCS 2006, pp. 89\u201398 (2006)","DOI":"10.1145\/1180405.1180418"},{"key":"17_CR11","unstructured":"Di Vimercati, S.D.C., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Over-Encryption: Management of Access Control Evolution on Outsourced Data. In: Proc. VLDB Endowment 2007, pp. 123\u2013134 (2007)"},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Yu, S., Wang, C., Ren, K., Lou, W.: Achieving Secure, Scalable, and Fine-Grained Data Access Control in Cloud Computing. In: Proc. INFOCOM 2010, pp. 1\u20139 (2010)","DOI":"10.1109\/INFCOM.2010.5462174"},{"key":"17_CR13","unstructured":"Chai, Q., Gong, G.: Verifiable Symmetric Searchable Encryption for Semi-Honest-but-Curious Cloud Servers"},{"key":"17_CR14","volume-title":"Managing gigabytes: Compressing and indexing documents and images","author":"I.H. Witten","year":"1999","unstructured":"Witten, I.H., Moffat, A., Bell, T.C.: Managing gigabytes: Compressing and indexing documents and images. Morgan Kaufmann Publishing, San Francisco (1999)"},{"key":"17_CR15","unstructured":"Inverted Index, http:\/\/en.wikipedia.org\/wiki\/Inverted_index"},{"key":"17_CR16","unstructured":"Cutting, D.: Lucene, http:\/\/lucene.apache.org\/"},{"key":"17_CR17","unstructured":"TF*IDF, http:\/\/en.wikipedia.org\/wiki\/Tfidf"},{"key":"17_CR18","unstructured":"Zhang, H.: NLPIR dataset, http:\/\/www.datatang.com\/datares\/go.aspx?dataid=605109"}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33065-0_17.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T03:11:13Z","timestamp":1606187473000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33065-0_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642330643","9783642330650"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33065-0_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}