{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:50:36Z","timestamp":1742914236271,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":15,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789813349216"},{"type":"electronic","value":"9789813349223"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2021,1,19]],"date-time":"2021-01-19T00:00:00Z","timestamp":1611014400000},"content-version":"vor","delay-in-days":384,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>The security issue is becoming more and more prominent since user\u2019s private information being outsourced to the somewhat untrustworthy cloud. Encrypting the information before uploading them to the cloud is one of ultimate solutions. Secure searchable encryption schemes and secure ranking schemes have been proposed to help retrieving the most relevant documents over the cloud. However the present methods are encumbered by the huge computing and communicating occupation of the cipher text. In this paper, a fully homomorphic encryption based secure ranked search model over the hybrid cloud is proposed. By introducing hybrid cloud, which typically composed by private cloud and public cloud, the high cost of computing and communicating of the cipher text is transferred to the trustworthy private cloud, in which the decrypting are performed. The client does not need to perform any heavy computations, thence making the secure ranking practical from the client\u2019s point of view.\n<\/jats:p>","DOI":"10.1007\/978-981-33-4922-3_3","type":"book-chapter","created":{"date-parts":[[2021,1,18]],"date-time":"2021-01-18T11:21:04Z","timestamp":1610968864000},"page":"29-36","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Secure Ranked Search Model Over Encrypted Data in Hybrid Cloud Computing"],"prefix":"10.1007","author":[{"given":"Jiuling","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Shijun","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Daochao","family":"Huang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,19]]},"reference":[{"key":"3_CR1","unstructured":"Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceeding 2000 IEEE Symposium on Security and Privacy, pp. 44\u201355 (2000)"},{"key":"3_CR2","unstructured":"Goh, E.-J.: Secure indexes. IACR Cryptology ePrint Archive, p. 216 (2003)"},{"key":"3_CR3","doi-asserted-by":"publisher","first-page":"895","DOI":"10.3233\/JCS-2011-0426","volume":"19","author":"R Curtmola","year":"2011","unstructured":"Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. J. Comput. Secur. 19, 895\u2013934 (2011)","journal-title":"J. Comput. Secur."},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Li, J., Wang, Q., Wang, C., Cao, N., Ren, K., Lou, W.: Fuzzy keyword search over encrypted data in cloud computing. In: 2010 Proceedings IEEE INFOCOM, pp. 1\u20135 (2010)","DOI":"10.1109\/INFCOM.2010.5462196"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Gentry, C.: Fully homomorphic encryption using ideal lattices. In: STOC 2009","DOI":"10.1145\/1536414.1536440"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Golle, P., Staddon, J., Waters, B.: Secure conjunctive keyword search over encrypted data. In: ACNS (2004)","DOI":"10.1007\/978-3-540-24852-1_3"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Kuzu, M., Islam, M.S., Kantarcioglu, M.: Efficient similarity search over encrypted data. In: 2012 IEEE 28th International Conference on Data Engineering, pp. 1156\u20131167 (2012)","DOI":"10.1109\/ICDE.2012.23"},{"key":"3_CR8","doi-asserted-by":"publisher","first-page":"813","DOI":"10.1109\/TSC.2016.2622697","volume":"12","author":"Z Fu","year":"2019","unstructured":"Fu, Z., Huang, F., Sun, X., Vasilakos, A., Yang, C.: Enabling semantic search based on conceptual graphs over encrypted outsourced data. IEEE Trans. Serv. Comput. 12, 813\u2013823 (2019)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Manning, C.D., Raghavan, P., Sch\u00fctze, H.: Introduction to Information Retrieval, 1st edn. Cambridge University Press, Cambridge (2005)","DOI":"10.1017\/CBO9780511809071.002"},{"key":"3_CR10","unstructured":"Vishvapathi, P., Reddy, M.J.: Privacy-preserving multi-keyword ranked search over encrypted cloud data (2016)"},{"key":"3_CR11","first-page":"1","volume":"59","author":"H Wang","year":"2016","unstructured":"Wang, H., Ding, B.: Growing construction and adaptive evolution of complex software systems. Sci. China Inf. Sci. 59, 1\u20133 (2016)","journal-title":"Sci. China Inf. Sci."},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Wang, H., Shi, P., Zhang, Y.: JointCloud: a cross-cloud cooperation architecture for integrated internet service customization. In: IEEE 37th International Conference on Distributed Computing Systems, pp. 1846\u20131855 (2017)","DOI":"10.1109\/ICDCS.2017.237"},{"key":"3_CR13","unstructured":"Wang, C., Cao, N., Ren, K., Lou, W.: Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Trans. Parallel Distrib. Syst. 23, 1467\u20131479 (2012)"},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"Wang, C., Ren, K., Yu, S., Urs, K.M.: Achieving usable and privacy-assured similarity search over outsourced cloud data. In: Proceedings IEEE INFOCOM, pp. 451\u2013459 (2012)","DOI":"10.1109\/INFCOM.2012.6195784"},{"key":"3_CR15","doi-asserted-by":"publisher","first-page":"466","DOI":"10.1007\/s10791-011-9163-y","volume":"14","author":"JS Whissell","year":"2011","unstructured":"Whissell, J.S., Clarke, C.L.: Improving document clustering using Okapi BM25 feature weighting. Inf. Retr. 14, 466\u2013487 (2011)","journal-title":"Inf. Retr."}],"container-title":["Communications in Computer and Information Science","Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-33-4922-3_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,18]],"date-time":"2021-01-18T11:30:36Z","timestamp":1610969436000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-33-4922-3_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9789813349216","9789813349223"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-981-33-4922-3_3","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"19 January 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CNCERT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China Cyber Security Annual Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Beijing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 August 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 August 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cncert2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/conf.cert.org.cn","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}