{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T06:33:48Z","timestamp":1764570828749,"version":"3.37.3"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2019,1,28]],"date-time":"2019-01-28T00:00:00Z","timestamp":1548633600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1007\/s00500-019-03790-1","type":"journal-article","created":{"date-parts":[[2019,1,28]],"date-time":"2019-01-28T13:05:54Z","timestamp":1548680754000},"page":"2561-2574","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["Attribute-based hierarchical file encryption for efficient retrieval of files by DV index tree from cloud using crossover genetic algorithm"],"prefix":"10.1007","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0579-4367","authenticated-orcid":false,"given":"R.","family":"Naresh","sequence":"first","affiliation":[]},{"given":"M.","family":"Sayeekumar","sequence":"additional","affiliation":[]},{"given":"G. M.","family":"Karthick","sequence":"additional","affiliation":[]},{"given":"P.","family":"Supraja","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,28]]},"reference":[{"key":"3790_CR1","doi-asserted-by":"crossref","unstructured":"Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute based encryption. In: IEEE symposium on security and privacy, pp 321\u2013334","DOI":"10.1109\/SP.2007.11"},{"key":"3790_CR2","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1109\/TPDS.2013.45","volume":"25","author":"N Cao","year":"2014","unstructured":"Cao N, Wang C, Li M, Ren K, Lou W (2014) Privacy-preserving multi keyword ranked search over encrypted cloud data. IEEE Trans Parallel Distrib Syst 25:222\u2013233","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"3790_CR3","doi-asserted-by":"publisher","first-page":"951","DOI":"10.1109\/TPDS.2015.2425407","volume":"27","author":"C Chen","year":"2016","unstructured":"Chen C, Zhu X, Shen P, Hu J, Guo S, Tari Z, Zomaya A (2016) An efficient privacy-preserving ranked keyword search method. IEEE Trans Parallel Distrib Syst 27:951\u2013963","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"3790_CR4","doi-asserted-by":"crossref","unstructured":"Curtmola R, Garay J, Kamara S, Ostrovsky R (2006) Searchable symmetric encryption: improved definitions and efficient constructions. In: ACM conference on computer and communications security, pp 79\u201388","DOI":"10.1145\/1180405.1180417"},{"key":"3790_CR5","unstructured":"Dan B, Waters B (2007) Conjunctive, subset, and range queries on encrypted data. In: Theory of cryptography conference, pp 535\u2013554"},{"key":"3790_CR6","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1016\/j.ins.2014.01.035","volume":"275","author":"H Deng","year":"2014","unstructured":"Deng H, Wu Q, Qin B, Domingo-Ferrer J, Zhang L, Liu J, Shi W (2014) Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts. Inf Sci 275:370\u2013384","journal-title":"Inf Sci"},{"key":"3790_CR7","doi-asserted-by":"publisher","first-page":"2546","DOI":"10.1109\/TPDS.2015.2506573","volume":"27","author":"Z Fu","year":"2016","unstructured":"Fu Z, Ren K, Shu J, Sun X, Huang F (2016) Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans Parallel Distrib Syst 27:2546\u20132559","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"3790_CR8","unstructured":"Goh EJ (2003) Secure indexes. Cryptology ePrint Archive. \n                    http:\/\/eprint.iacr.org\/2003\/216"},{"key":"3790_CR9","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/978-3-540-24852-1_3","volume":"3089","author":"P Golle","year":"2004","unstructured":"Golle P, Staddon J, Waters B (2004) Secure conjunctive keyword search over encrypted data. Lect Notes Comput Sci 3089:31\u201345","journal-title":"Lect Notes Comput Sci"},{"key":"3790_CR10","unstructured":"Goyal V, Jain A, Pandey O, Sahai A (2008) Bounded ciphertext policy attribute based encryption. DBLP"},{"key":"3790_CR11","doi-asserted-by":"publisher","first-page":"763","DOI":"10.1109\/TIFS.2014.2309858","volume":"9","author":"F Guo","year":"2014","unstructured":"Guo F, Mu Y, Susilo W, Wong DS (2014) CP-ABE with constant-size keys for lightweight devices. IEEE Trans Inf Forensics Secur 9:763\u2013771","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"7","key":"3790_CR12","doi-asserted-by":"publisher","first-page":"1214","DOI":"10.1109\/TPDS.2010.203","volume":"22","author":"J Hur","year":"2010","unstructured":"Hur J, Dong KN (2010) Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Trans Parallel Distrib Syst 22(7):1214\u20131221","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"3790_CR13","doi-asserted-by":"crossref","unstructured":"Lewko A, Okamoto T, Sahai A, Takashima K, Waters B (2010) Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. In: International conference on theory and applications of cryptographic techniques, pp 62\u201391","DOI":"10.1007\/978-3-642-13190-5_4"},{"issue":"1","key":"3790_CR14","doi-asserted-by":"publisher","first-page":"e2942","DOI":"10.1002\/dac.2942","volume":"30","author":"J Li","year":"2017","unstructured":"Li J, Shi Y, Zhang Y (2017a) Searchable ciphertext-policy attribute-based encryption with revocation in cloud storage. Int J Commun Syst 30(1):e2942","journal-title":"Int J Commun Syst"},{"issue":"5","key":"3790_CR15","doi-asserted-by":"publisher","first-page":"785","DOI":"10.1109\/TSC.2016.2520932","volume":"10","author":"J Li","year":"2017","unstructured":"Li J, Yao W, Zhang Y, Qian H, Han J (2017b) Flexible and fine-grained attribute-based data storage in cloud computing. IEEE Trans Serv Comput 10(5):785\u2013796","journal-title":"IEEE Trans Serv Comput"},{"key":"3790_CR16","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2017.2710190","author":"J Li","year":"2017","unstructured":"Li J, Wang Y, Zhang Y, Han J (2017c) Full verifiability for outsourced decryption in attribute based encryption. IEEE Trans Serv Comput. \n                    https:\/\/doi.org\/10.1109\/TSC.2017.2710190","journal-title":"IEEE Trans Serv Comput"},{"issue":"5","key":"3790_CR18","doi-asserted-by":"publisher","first-page":"715","DOI":"10.1109\/TSC.2016.2542813","volume":"10","author":"J Li","year":"2017","unstructured":"Li J, Lin X, Zhang Y, Han J (2017d) KSF-OABE: outsourced attribute based encryption with keyword search function for cloud storage. IEEE Trans Serv Comput 10(5):715\u2013725","journal-title":"IEEE Trans Serv Comput"},{"issue":"2","key":"3790_CR17","doi-asserted-by":"publisher","first-page":"1767","DOI":"10.1109\/JSYST.2017.2667679","volume":"12","author":"J Li","year":"2018","unstructured":"Li J, Yao W, Han J, Zhang Y, Shen J (2018) User collusion avoidance CP-ABE with efficient attribute revocation for cloud storage. IEEE Systems J 12(2):1767\u20131777","journal-title":"IEEE Systems J"},{"key":"3790_CR19","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/j.future.2014.11.016","volume":"52","author":"K Liang","year":"2015","unstructured":"Liang K, Man HA, Liu JK, Susilo W, Wong DS, Yang G, Yu Y, Yang A (2015) A secure and efficient ciphertext-policy attribute based proxy re-encryption for cloud data sharing. Future Gener Comput Syst 52:95\u2013108","journal-title":"Future Gener Comput Syst"},{"key":"3790_CR20","doi-asserted-by":"publisher","first-page":"1772","DOI":"10.1109\/LCOMM.2016.2584614","volume":"20","author":"E Luo","year":"2016","unstructured":"Luo E, Liu Q, Wang G (2016) Hierarchical multi-authority and attribute based encryption friend discovery scheme in mobile social networks. IEEE Commun Lett 20:1772\u20131775","journal-title":"IEEE Commun Lett"},{"issue":"99","key":"3790_CR21","first-page":"1","volume":"PP","author":"Y Miao","year":"2017","unstructured":"Miao Y, Ma J, Liu X, Li X, Jiang Q, Zhang J (2017a) Attribute based keyword search over hierarchical data in cloud computing. IEEE Trans Serv Comput PP(99):1","journal-title":"IEEE Trans Serv Comput"},{"issue":"99","key":"3790_CR22","first-page":"1","volume":"PP","author":"Y Miao","year":"2017","unstructured":"Miao Y, Ma J, Liu X, Li X, Liu Z, Li H (2017b) Practical attribute based multi-keyword search scheme in mobile crowdsourcing. IEEE Internet Things J PP(99):1","journal-title":"IEEE Internet Things J"},{"key":"3790_CR23","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1016\/j.pmcj.2017.06.016","volume":"40","author":"Y Miao","year":"2017","unstructured":"Miao Y, Ma J, Liu X, Jiang Q, Zhang J, Shen L, Liu Z (2017c) VCKSM: verifiable conjunctive keyword search over mobile e-health cloud in shared multi-owner settings. Pervasive Mob Comput 40:205\u2013219","journal-title":"Pervasive Mob Comput"},{"issue":"3","key":"3790_CR24","first-page":"695","volume":"33","author":"P Pandiaraja","year":"2017","unstructured":"Pandiaraja P, Vijayakumar P, Vijayakumar V, Seshadhri R (2017) Computation efficient attribute based broadcast group key management for secure document access in public cloud. J Inf Sci Eng 33(3):695\u2013712","journal-title":"J Inf Sci Eng"},{"issue":"6","key":"3790_CR25","doi-asserted-by":"publisher","first-page":"487","DOI":"10.1007\/s10207-014-0270-9","volume":"14","author":"H Qian","year":"2015","unstructured":"Qian H, Li J, Zhang Y, Han J (2015) Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation. Int J Inf Secur 14(6):487\u2013497","journal-title":"Int J Inf Secur"},{"key":"3790_CR26","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1016\/j.future.2016.07.019","volume":"67","author":"YS Rao","year":"2017","unstructured":"Rao YS (2017) A secure and efficient ciphertext-policy attribute-based signcryption for personal health records sharing in cloud computing. Future Gener Comput Syst 67:133\u2013151","journal-title":"Future Gener Comput Syst"},{"key":"3790_CR27","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1109\/MIC.2012.14","volume":"16","author":"K Ren","year":"2012","unstructured":"Ren K, Wang C, Wang Q (2012) Security challenges for the public cloud. IEEE Internet Comput 16:69\u201373","journal-title":"IEEE Internet Comput"},{"key":"3790_CR28","doi-asserted-by":"crossref","unstructured":"Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: International conference on theory and applications of cryptographic techniques, pp 457\u2013473","DOI":"10.1007\/11426639_27"},{"key":"3790_CR29","unstructured":"Song DX, Wagner D, Perrig A (2002) Practical techniques for searches on encrypted data. In: 2000 IEEE symposium on security and privacy, 2000. S&P 2000. Proceedings, pp 1\u201344"},{"issue":"4","key":"3790_CR30","doi-asserted-by":"publisher","first-page":"2597","DOI":"10.1007\/s11277-016-3818-3","volume":"94","author":"P Supraja","year":"2017","unstructured":"Supraja P, Jayashri S (2017) Optimized neural network for spectrum prediction scheme in cognitive radio. Wireless Pers Commun 94(4):2597\u20132611","journal-title":"Wireless Pers Commun"},{"key":"3790_CR31","doi-asserted-by":"crossref","unstructured":"Swaminathan A, Mao Y, Su GM, Gou H, Varna AL, He S, Wu M, Oard DW (2007) Confidentiality-preserving rank-ordered search. ACM workshop on storage security and survivability, storages 2007, Alexandria, VA, USA, October, pp 7\u201312","DOI":"10.1145\/1314313.1314316"},{"issue":"17","key":"3790_CR32","doi-asserted-by":"publisher","first-page":"3952","DOI":"10.1002\/sec.1578","volume":"9","author":"P Vijayakumar","year":"2016","unstructured":"Vijayakumar P, Naresh R, Deborah LJ, Islam SKH (2016a) An efficient group key agreement protocol for secure peer to peer communication. Secur Commun Netw 9(17):3952\u20133965","journal-title":"Secur Commun Netw"},{"issue":"18","key":"3790_CR33","doi-asserted-by":"publisher","first-page":"5085","DOI":"10.1002\/sec.1680","volume":"9","author":"P Vijayakumar","year":"2016","unstructured":"Vijayakumar P, Naresh R, Islam SKH, Deborah LJ (2016b) An effective key distribution for secure internet pay-TV using access key hierarchies. Secur Commun Netw 9(18):5085\u20135097","journal-title":"Secur Commun Netw"},{"key":"3790_CR34","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1016\/j.compeleceng.2017.04.014","volume":"63","author":"P Vijayakumar","year":"2017","unstructured":"Vijayakumar P, Pandiaraja P, Karuppiah M, Deborah LJ (2017) An efficient secure communication for healthcare system using wearable devices. Comput Electr Eng 63:232\u2013245","journal-title":"Comput Electr Eng"},{"key":"3790_CR35","doi-asserted-by":"publisher","first-page":"743","DOI":"10.1109\/TIFS.2011.2172209","volume":"7","author":"Z Wan","year":"2012","unstructured":"Wan Z, Liu J, Deng RH (2012) HASBE: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE Trans Inf Forensics Secur 7:743\u2013754","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"3790_CR36","doi-asserted-by":"crossref","unstructured":"Wang G, Liu Q, Wu J (2010) Hierarchical attribute-based encryption for fine-grained access control in cloud storage services. In: ACM conference on computer and communications security, pp 735\u2013737","DOI":"10.1145\/1866307.1866414"},{"key":"3790_CR37","doi-asserted-by":"publisher","first-page":"1467","DOI":"10.1109\/TPDS.2011.282","volume":"23","author":"C Wang","year":"2012","unstructured":"Wang C, Cao N, Ren K, Lou W (2012) Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Trans Parallel Distrib Syst 23:1467\u20131479","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"6","key":"3790_CR38","doi-asserted-by":"publisher","first-page":"1265","DOI":"10.1109\/TIFS.2016.2523941","volume":"11","author":"S Wang","year":"2016","unstructured":"Wang S, Zhou J, Liu JK, Yu J, Chen J, Xie W (2016) An efficient file hierarchy attribute-based encryption scheme in cloud computing. IEEE Trans Inf Forensics Secur 11(6):1265\u20131277","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"10","key":"3790_CR39","doi-asserted-by":"publisher","first-page":"2653","DOI":"10.1109\/TIFS.2018.2825952","volume":"13","author":"N Wang","year":"2018","unstructured":"Wang N, Fu J, Bhargava BK, Zeng J (2018) Efficient retrieval over documents encrypted by attributes in cloud computing. IEEE Trans Inf Forensics Secur 13(10):2653\u20132667","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"3790_CR40","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1109\/TPDS.2015.2401003","volume":"27","author":"Z Xia","year":"2016","unstructured":"Xia Z, Wang X, Sun X, Wang Q (2016) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distrib Syst 27:340\u2013352","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"3790_CR41","doi-asserted-by":"crossref","unstructured":"Yang Y, Liu JK, Liang K, Choo KKR, Zhou J (2015) Extended proxy-assisted approach: achieving revocable fine-grained encryption of cloud data, vol 9327. Springer International Publishing","DOI":"10.1007\/978-3-319-24177-7_8"},{"key":"3790_CR42","doi-asserted-by":"crossref","unstructured":"Zerr S, Olmedilla D, Nejdl W, Siberski W (2009) Zerber+r : topk retrieval from a confidential index. In International conference on extending database technology: advances in database technology, pp 439\u2013449","DOI":"10.1145\/1516360.1516412"},{"issue":"9","key":"3790_CR43","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/j.asoc.2017.11.045","volume":"64","author":"Y Zhong","year":"2018","unstructured":"Zhong Y, Ma A, Ong Z, Zhang L (2018) Computational intelligence in optical remote sensing image processing. Appl Soft Comput 64(9):75\u201393. \n                    https:\/\/doi.org\/10.1016\/j.asoc.2017.11.045","journal-title":"Appl Soft Comput"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00500-019-03790-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-019-03790-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-019-03790-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,27]],"date-time":"2020-01-27T19:04:36Z","timestamp":1580151876000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00500-019-03790-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,28]]},"references-count":43,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2019,4]]}},"alternative-id":["3790"],"URL":"https:\/\/doi.org\/10.1007\/s00500-019-03790-1","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"type":"print","value":"1432-7643"},{"type":"electronic","value":"1433-7479"}],"subject":[],"published":{"date-parts":[[2019,1,28]]},"assertion":[{"value":"28 January 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"All authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}