{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,5,9]],"date-time":"2024-05-09T05:50:36Z","timestamp":1715233836813},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2015,5,23]],"date-time":"2015-05-23T00:00:00Z","timestamp":1432339200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2016,6]]},"DOI":"10.1007\/s10207-015-0294-9","type":"journal-article","created":{"date-parts":[[2015,5,22]],"date-time":"2015-05-22T17:56:47Z","timestamp":1432317407000},"page":"251-269","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":26,"title":["Multi-Keyword search over encrypted data with scoring and search pattern obfuscation"],"prefix":"10.1007","volume":"15","author":[{"given":"Cengiz","family":"Orencik","sequence":"first","affiliation":[]},{"given":"Ayse","family":"Selcuk","sequence":"additional","affiliation":[]},{"given":"Erkay","family":"Savas","sequence":"additional","affiliation":[]},{"given":"Murat","family":"Kantarcioglu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,5,23]]},"reference":[{"key":"294_CR1","doi-asserted-by":"crossref","unstructured":"Orencik, C., Kantarcioglu, M., Savas, E.: A practical and secure multi-keyword search method over encrypted cloud data. In: CLOUD 2013, pp. 390\u2013398, IEEE (2013)","DOI":"10.1109\/CLOUD.2013.18"},{"key":"294_CR2","doi-asserted-by":"crossref","first-page":"356","DOI":"10.1016\/j.jco.2003.08.023","volume":"20","author":"W Ogata","year":"2004","unstructured":"Ogata, W., Kurosawa, K.: Oblivious keyword search. J. Complex. 20, 356\u2013371 (2004)","journal-title":"J. Complex."},{"key":"294_CR3","doi-asserted-by":"crossref","unstructured":"Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. In: IEEE INFOCOM (2011)","DOI":"10.1109\/INFCOM.2011.5935306"},{"key":"294_CR4","doi-asserted-by":"crossref","unstructured":"Kuzu, M., Islam, M.S., Kantarcioglu, M.: Efficient similarity search over encrypted data. In: Proceedings of the 2012 IEEE 28th International Conference on Data Engineering, ICDE \u201912, Washington, DC, USA, pp. 1156\u20131167, IEEE Computer Society (2012)","DOI":"10.1109\/ICDE.2012.23"},{"issue":"1\/2","key":"294_CR5","first-page":"72","volume":"3","author":"Y Zhao","year":"2012","unstructured":"Zhao, Y., Chen, X., Ma, H., Tang, Q., Zhu, H.: A new trapdoor-indistinguishable public key encryption with keyword search. J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl. 3(1\/2), 72\u201381 (2012)","journal-title":"J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl."},{"key":"294_CR6","doi-asserted-by":"crossref","unstructured":"Cachin, C., Micali, S., Stadler, M.: Computationally private information retrieval with polylogarithmic communication. In: Lecture notes in computer science, pp. 402\u2013414, Springer (1999)","DOI":"10.1007\/3-540-48910-X_28"},{"key":"294_CR7","doi-asserted-by":"crossref","first-page":"965","DOI":"10.1145\/293347.293350","volume":"45","author":"B Chor","year":"1998","unstructured":"Chor, B., Kushilevitz, E., Goldreich, O., Sudan, M.: Private information retrieval. J. ACM 45, 965\u2013981 (1998)","journal-title":"J. ACM"},{"key":"294_CR8","unstructured":"Chor, B., Gilboa, N., Naor, M.: Private information retrieval by keywords. Technical Report TR-CS0917 (1997)"},{"key":"294_CR9","doi-asserted-by":"crossref","unstructured":"Boneh, D., Kushilevitz, E., Ostrovsky, R., Skeith, W.: Public key encryption that allows PIR queries. In: Advances in cryptology\u2014CRYPTO 2007, vol. 4622 of lecture notes in computer science, pp. 50\u201367, Springer, Berlin (2007)","DOI":"10.1007\/978-3-540-74143-5_4"},{"key":"294_CR10","doi-asserted-by":"crossref","unstructured":"Boneh, D., Crescenzo, G.D., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: EUROCRYPT, pp. 506\u2013522 (2004)","DOI":"10.1007\/978-3-540-24676-3_30"},{"key":"294_CR11","doi-asserted-by":"crossref","unstructured":"Gu, C., Zhu, Y., Pan, H.: Efficient public key encryption with keyword search schemes from pairings. In: Information security and cryptology, vol. 4990 of lecture notes in computer science, pp. 372\u2013383, Springer, Berlin (2008)","DOI":"10.1007\/978-3-540-79499-8_29"},{"key":"294_CR12","doi-asserted-by":"crossref","unstructured":"Park, D., Kim, K., Lee, P.: Public key encryption with conjunctive field keyword search, In: Lim C., Yung M., (eds.) Information security applications, vol. 3325 of lecture notes in computer science, pp. 73\u201386, Springer, Berlin (2005)","DOI":"10.1007\/978-3-540-31815-6_7"},{"key":"294_CR13","doi-asserted-by":"crossref","first-page":"262","DOI":"10.1016\/j.jnca.2010.07.007","volume":"34","author":"B Zhang","year":"2011","unstructured":"Zhang, B., Zhang, F.: An efficient public key encryption with conjunctive-subset keywords search. J. Netw. Comput. Appl. 34, 262\u2013267 (2011)","journal-title":"J. Netw. Comput. Appl."},{"key":"294_CR14","unstructured":"Goh, E.-J.: Secure indexes. Cryptology ePrint Archive, Report 2003\/216 (2003)"},{"key":"294_CR15","doi-asserted-by":"crossref","unstructured":"Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS \u201906, pp. 79\u201388, ACM (2006)","DOI":"10.1145\/1180405.1180417"},{"key":"294_CR16","doi-asserted-by":"crossref","unstructured":"Wang, C., Cao, N., Li, J., Ren, K., Lou, W.: Secure ranked keyword search over encrypted cloud data. In: ICDCS\u201910, pp. 253\u2013262 (2010)","DOI":"10.1109\/ICDCS.2010.34"},{"key":"294_CR17","doi-asserted-by":"crossref","unstructured":"Raykova, M., Vo, B., Bellovin, S.M., Malkin, T.: Secure anonymous database search. In: Proceedings of the 2009 ACM Workshop on Cloud Computing Security, CCSW\u201909, pp. 115\u2013126, ACM (2009)","DOI":"10.1145\/1655008.1655025"},{"key":"294_CR18","doi-asserted-by":"crossref","unstructured":"Wang, P., Wang, H., Pieprzyk, J.: An efficient scheme of common secure indices for conjunctive keyword-based retrieval on encrypted data. In: Information security applications, lecture notes in computer science, pp. 145\u2013159, Springer (2009)","DOI":"10.1007\/978-3-642-00306-6_11"},{"issue":"1","key":"294_CR19","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1007\/s10619-013-7123-9","volume":"32","author":"C Orencik","year":"2014","unstructured":"Orencik, C., Savas, E.: An efficient privacy-preserving multi-keyword search over encrypted cloud data with ranking. Distrib. Parallel Databases 32(1), 119\u2013160 (2014)","journal-title":"Distrib. Parallel Databases"},{"key":"294_CR20","doi-asserted-by":"crossref","unstructured":"Chen, Z., Wu, C., Wang, D., Li, S.: Conjunctive keywords searchable encryption with efficient pairing, constant ciphertext and short trapdoor. In: PAISI, pp. 176\u2013189 (2012)","DOI":"10.1007\/978-3-642-30428-6_15"},{"key":"294_CR21","doi-asserted-by":"crossref","unstructured":"Cash, D., Jarecki, S., Jutla, C., Krawczyk, H., Rou, M.-C., Steiner, M.: Highly-scalable searchable symmetric encryption with support for boolean queries. In: Advances in cryptology, CRYPTO 2013, vol. 8042 of lecture notes in computer science, pp. 353\u2013373, Springer, Berlin (2013)","DOI":"10.1007\/978-3-642-40041-4_20"},{"key":"294_CR22","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9781139058452","volume-title":"Jeffrey, Mining of Massive Datasets","author":"A Rajaraman","year":"2011","unstructured":"Rajaraman, A., Ullman, D., Jeffrey, : Jeffrey, Mining of Massive Datasets. Cambridge University Press, Cambridge (2011)"},{"key":"294_CR23","volume-title":"Introduction to Information Retrieval","author":"HS Christopher","year":"2008","unstructured":"Christopher, H.S., Manning, D., Raghavan, Prabhakar: Introduction to Information Retrieval. Cambridge University Press, Cambridge (2008)"},{"key":"294_CR24","doi-asserted-by":"crossref","unstructured":"Lipmaa, H.: First CPIR protocol with data-dependent computation. In: Information, security and cryptology\u2014ICISC 2009, pp. 193\u2013210, Springer (2009)","DOI":"10.1007\/978-3-642-14423-3_14"},{"key":"294_CR25","doi-asserted-by":"crossref","unstructured":"Pinkas, B., Reinman, T.: Oblivious RAM revisited. In: Proceedings of the 30th Annual Conference on Advances in Cryptology, CRYPTO\u201910, pp. 502\u2013519, Springer, Berlin (2010)","DOI":"10.1007\/978-3-642-14623-7_27"},{"key":"294_CR26","doi-asserted-by":"crossref","unstructured":"Hacig\u00fcm\u00fc\u015f, H., Iyer, B., Li, C., Mehrotra, S.: Executing SQL over encrypted data in the database-service-provider model. In: Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data, SIGMOD \u201902, pp. 216\u2013227, ACM (2002)","DOI":"10.1145\/564691.564717"},{"key":"294_CR27","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1007\/s00778-011-0245-7","volume":"21","author":"B Hore","year":"2012","unstructured":"Hore, B., Mehrotra, S., Canim, M., Kantarcioglu, M.: Secure multidimensional range queries over outsourced data. VLDB J. 21, 333\u2013358 (2012)","journal-title":"VLDB J."},{"key":"294_CR28","doi-asserted-by":"crossref","unstructured":"Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Advances in cryptology\u2014EUROCRYPT 1999, pp. 223\u2013238, Springer (1999)","DOI":"10.1007\/3-540-48910-X_16"},{"key":"294_CR29","unstructured":"EU directive 95\/46\/EC\u2014the data protection directive. October 1995. Retrieved on January 02 (2015)"},{"key":"294_CR30","first-page":"361","volume":"5","author":"DD Lewis","year":"2004","unstructured":"Lewis, D.D., Yang, Y., Rose, T.G., Li, F.: RCV1: a new benchmark collection for text categorization research. J. Mach. Learn. Res. 5, 361\u2013397 (2004)","journal-title":"J. Mach. Learn. Res."},{"issue":"8","key":"294_CR31","doi-asserted-by":"crossref","first-page":"1019","DOI":"10.1016\/j.jpdc.2012.04.012","volume":"72","author":"Q Liu","year":"2012","unstructured":"Liu, Q., Tan, C.C., Wu, J., Wang, G.: Cooperative private searching in clouds. J. Parallel Distrib. Comput. 72(8), 1019\u20131031 (2012)","journal-title":"J. Parallel Distrib. Comput."}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-015-0294-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-015-0294-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-015-0294-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,25]],"date-time":"2019-08-25T12:24:29Z","timestamp":1566735869000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-015-0294-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5,23]]},"references-count":31,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2016,6]]}},"alternative-id":["294"],"URL":"https:\/\/doi.org\/10.1007\/s10207-015-0294-9","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,5,23]]}}}