{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T16:42:20Z","timestamp":1761324140303},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2018,2,15]],"date-time":"2018-02-15T00:00:00Z","timestamp":1518652800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Front. Comput. Sci."],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1007\/s11704-016-6244-5","type":"journal-article","created":{"date-parts":[[2018,2,15]],"date-time":"2018-02-15T09:56:13Z","timestamp":1518688573000},"page":"593-607","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Preferred search over encrypted data"],"prefix":"10.1007","volume":"12","author":[{"given":"Zhirong","family":"Shen","sequence":"first","affiliation":[]},{"given":"Jiwu","family":"Shu","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Xue","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,2,15]]},"reference":[{"issue":"4","key":"6244_CR1","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/1721654.1721672","volume":"53","author":"M Armbrust","year":"2010","unstructured":"Armbrust M, Fox A, Griffith R, Joseph A, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I, Zaharia M. A view of cloud computing. Communications of the ACM, 2010, 53(4): 50\u201358","journal-title":"Communications of the ACM"},{"issue":"2","key":"6244_CR2","first-page":"317","volume":"16","author":"Y J Ren","year":"2015","unstructured":"Ren Y J, Shen J, Wang J, Han J, Lee S Y. Mutual verifiable provable data auditing in public cloud storage. Journal of Internet Technology, 2015, 16(2): 317\u2013323","journal-title":"Journal of Internet Technology"},{"issue":"4","key":"6244_CR3","doi-asserted-by":"publisher","first-page":"902","DOI":"10.1587\/transinf.2014EDP7283","volume":"E98\u2013D","author":"T H Ma","year":"2015","unstructured":"Ma T H, Zhou J J, Tang M L, Tian Y, Dhelaan A, Rodhaan A, Lee S Y. Social network and tag sources based augmenting collaborative recommender system. IEICE transactions on Information and Systems, 2015, E98\u2013D(4): 902\u2013910","journal-title":"IEICE transactions on Information and Systems"},{"issue":"9","key":"6244_CR4","doi-asserted-by":"publisher","first-page":"2872","DOI":"10.1016\/j.jpdc.2014.06.003","volume":"74","author":"J W Shu","year":"2014","unstructured":"Shu J W, Shen Z R, Xue W. Shield: a stackable secure storage system for file sharing in public storage. Journal of Parallel and Distributed Computing, 2014, 74(9): 2872\u20132883","journal-title":"Journal of Parallel and Distributed Computing"},{"key":"6244_CR5","first-page":"376","volume-title":"Proceedings of Asia and South Pacific Design Automation Conference","author":"J W Shu","year":"2013","unstructured":"Shu J W, Shen Z R, Xue W, Fu Y X. Secure storage system and key technologies. In: Proceedings of Asia and South Pacific Design Automation Conference. 2013, 376\u2013383"},{"key":"6244_CR6","first-page":"339","volume-title":"Proceedings of IEEE International Conference on Cloud Computing Technology and Science","author":"K Cai","year":"2013","unstructured":"Cai K, Hong C, Zhang M, Feng D G, Lv Z Q. A secure conjunctive keywords search over encrypted cloud data against inclusion-relation attack. In: Proceedings of IEEE International Conference on Cloud Computing Technology and Science. 2013, 339\u2013346"},{"issue":"3","key":"6244_CR7","doi-asserted-by":"publisher","first-page":"628","DOI":"10.1016\/j.ins.2010.09.032","volume":"181","author":"H Guo","year":"2011","unstructured":"Guo H, Li Z J, Mu Y, Zhang X Y. Provably secure identity-based authenticated key agreement protocols with malicious private key generators. Information Science, 2011, 181(3): 628\u2013647","journal-title":"Information Science"},{"key":"6244_CR8","first-page":"841","volume-title":"Proceedings of International Conference on Data Engineering","author":"G Koutrika","year":"2005","unstructured":"Koutrika G, Ioannidis Y. Personalized queries under a generalized preference model. In: Proceedings of International Conference on Data Engineering. 2005, 841\u2013852"},{"key":"6244_CR9","first-page":"829","volume-title":"Proceedings of IEEE International Conference on Computer Communications","author":"N Cao","year":"2011","unstructured":"Cao N, Wang C, Li M, Ren K, Lou W. Privacy-preserving multikeyword ranked search over encrypted cloud data. In: Proceedings of IEEE International Conference on Computer Communications. 2011, 829\u2013837"},{"key":"6244_CR10","first-page":"241","volume-title":"Proceedings of International Conference on the Theory and Application of Cryptology and Information Security","author":"T Okamoto","year":"2009","unstructured":"Okamoto T, Takashima W. Hierarchical predicate encryption for innerproducts. In: Proceedings of International Conference on the Theory and Application of Cryptology and Information Security. 2009, 241\u2013237"},{"key":"6244_CR11","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1145\/1559845.1559862","volume-title":"Proceedings of ACM SIGMOD International Conference on Management of Data","author":"W K Wong","year":"2009","unstructured":"Wong W K, Cheung D W, Kao B, Mamoulis N. Secure knn computation on encrypted databases. In: Proceedings of ACM SIGMOD International Conference on Management of Data. 2009, 139\u2013152"},{"key":"6244_CR12","first-page":"534","volume-title":"Proceedings of IEEE International Conference on Computer Communications","author":"S C Yu","year":"2010","unstructured":"Yu S C, Wang C, Ren K, Lou W J. Achieving secure, scalable, and fine-grained data access control in cloud computing. In: Proceedings of IEEE International Conference on Computer Communications. 2010, 534\u2013542"},{"key":"6244_CR13","first-page":"383","volume-title":"Proceedings of IEEE International Conference on Distributed Computing Systems","author":"Y S C LiM","year":"2011","unstructured":"LiM, Yu S C, Cao N, Lou WJ. Authorized private keyword search over encrypted data in cloud computing. In: Proceedings of IEEE International Conference on Distributed Computing Systems. 2011, 383\u2013392"},{"issue":"2","key":"6244_CR14","doi-asserted-by":"publisher","first-page":"538","DOI":"10.1007\/s11227-012-0829-z","volume":"63","author":"Z Pervez","year":"2013","unstructured":"Pervez Z, Awan A, Khattak A, Lee S, Huh E. Privacy-aware searching with oblivious term matching for cloud storage. The Journal of Supercomputing, 2013, 63(2): 538\u2013560.","journal-title":"The Journal of Supercomputing"},{"key":"6244_CR15","first-page":"393","volume-title":"Proceedings of IEEE International Conference on Distributed Computing Systems","author":"N Cao","year":"2011","unstructured":"Cao N, Yang Z Y, Wang C, Lou W J. Privacy-preserving query over encrypted graph-structured data in cloud computing. In: Proceedings of IEEE International Conference on Distributed Computing Systems. 2011, 393\u2013402"},{"key":"6244_CR16","first-page":"506","volume-title":"Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques","author":"D Boneh","year":"2004","unstructured":"Boneh D, Crescenzo G, Ostrovsky R, Persiano G. Public key encryption with keyword search. In: Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques. 2004, 506\u2013522"},{"key":"6244_CR17","volume-title":"Proceedings of the 19th Annual Network & Distributed System Security Symposium","author":"Y Lu","year":"2012","unstructured":"Lu Y. Privacy-preserving logarithmic-time search on encrypted data in cloud. In: Proceedings of the 19th Annual Network & Distributed System Security Symposium. 2012"},{"key":"6244_CR18","first-page":"253","volume-title":"Proceedings of IEEE International Conference on Distributed Computing Systems","author":"C Wang","year":"2010","unstructured":"Wang C, Cao N, Li J, Ren K, Lou W J. Secure ranked keyword search over encrypted cloud data. In: Proceedings of IEEE International Conference on Distributed Computing Systems. 2010, 253\u2013262"},{"key":"6244_CR19","volume-title":"Managing Gigabytes: Compressing and Indexing Documents and Images","author":"I Witten","year":"1999","unstructured":"Witten I, Moffat A, Bell T. Managing Gigabytes: Compressing and Indexing Documents and Images. San Mateo, CA: Morgan Kaufmann Publishers, 1999"},{"key":"6244_CR20","first-page":"16","volume-title":"Proceedings of USENIX Annual Technical Conference","author":"T W Yan","year":"1995","unstructured":"Yan T W, Garcia-Molina H. Sift: a tool for wide-area information dissemination. In: Proceedings of USENIX Annual Technical Conference. 1995, 16\u201320"},{"issue":"2","key":"6244_CR21","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/s00530-003-0085-4","volume":"9","author":"WY Liu","year":"2003","unstructured":"Liu WY, Chen Z, Lin F, Zhang H J, Ma WY. Ubiquitous media agents: a framework for managing personally accumulated multimedia files. Multimedia Systems, 2003, 9(2): 144\u2013156","journal-title":"Multimedia Systems"},{"key":"6244_CR22","first-page":"439","volume-title":"Proceedings of the 16th National Conference on Artificial Intelligence and 11th Conference on Innovative Applications of Artificial Intelligence","author":"N Good","year":"1999","unstructured":"Good N, Schafer J, Konstan J, Borchers A, Sarway B, Herlocker J, Biedl J. Combining collaborative filtering with personal agents for better recommendations. In: Proceedings of the 16th National Conference on Artificial Intelligence and 11th Conference on Innovative Applications of Artificial Intelligence. 1999, 439\u2013446"},{"key":"6244_CR23","first-page":"146","volume-title":"Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques","author":"J Katz","year":"2008","unstructured":"Katz J, Sahai A, Waters B. Predicate encryption supporting disjunctions, polynomial equations, and inner products. In: Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques. 2008, 146\u2013162"},{"key":"6244_CR24","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-4666-2854-0","volume-title":"Principles, Methodologies, and Service-Oriented Approaches for Cloud Computing","author":"X Yang","year":"2013","unstructured":"Yang X, Liu L, Global I. Principles, Methodologies, and Service-Oriented Approaches for Cloud Computing. Hershey, PA: Business Science Reference, 2013"},{"key":"6244_CR25","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/978-3-540-24852-1_3","volume-title":"Proceedings of the International Conference on Applied Cryptography and Network Security","author":"P Golle","year":"2004","unstructured":"Golle P, Staddon J, Waters B. Secure conjunctive keyword search over encrypted data. In: Proceedings of the International Conference on Applied Cryptography and Network Security. 2004, 31\u201345"},{"key":"6244_CR26","first-page":"350","volume-title":"Proceedings of IEEE Symposium on Security and Privacy","author":"E Shi","year":"2007","unstructured":"Shi E, Bethencourt J, Chan H, Song D, Perrig A. Multi-dimensional range query over encrypted data. In: Proceedings of IEEE Symposium on Security and Privacy. 2007, 350\u2013364"},{"key":"6244_CR27","doi-asserted-by":"publisher","first-page":"585","DOI":"10.1145\/1739041.1739111","volume-title":"Proceedings of International Conference on Extending Database Technology","author":"K Stefanidis","year":"2010","unstructured":"Stefanidis K, Drosou M, Pitoura E. PerK: personalized keyword search in relational databases through preferences. In: Proceedings of International Conference on Extending Database Technology. 2010, 585\u2013596"},{"key":"6244_CR28","first-page":"181","volume-title":"Proceedings of Brazilian Symposium on Databases","author":"A Leubner","year":"2002","unstructured":"Leubner A, Kiessling W. Personalized keyword search with partialorder preferences. In: Proceedings of Brazilian Symposium on Databases. 2002, 181\u2013193"},{"issue":"4","key":"6244_CR29","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1145\/958942.958946","volume":"28","author":"J Chomicki","year":"2003","unstructured":"Chomicki J. Preference formulas in relational queries. ACM Transaction on Database Systems, 2003, 28(4): 427\u2013466","journal-title":"ACM Transaction on Database Systems"},{"key":"6244_CR30","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1016\/B978-155860869-6\/50035-4","volume-title":"Proceedings of International Conference on Very Large Data Bases","author":"W Kiessling","year":"2002","unstructured":"Kiessling W. Foundations of preferences in database systems. In: Proceedings of International Conference on Very Large Data Bases. 2002, 311\u2013322"},{"key":"6244_CR31","first-page":"1101","volume-title":"Proceedings of International Conference on Data Engineering","author":"P Georgiadis","year":"2008","unstructured":"Georgiadis P, Kapantaidakis I, Christophides V, Nguer E, Spyratos N. Efficient rewriting algorithms for preference queries. In: Proceedings of International Conference on Data Engineering. 2008, 1101\u20131110"},{"key":"6244_CR32","first-page":"44","volume-title":"Proceedings of IEEE Symposium on Security and Privacy","author":"D Song","year":"2000","unstructured":"Song D, Wagner D, Perrig A. Practical techniques for searches on encrypted data. In: Proceedings of IEEE Symposium on Security and Privacy. 2000, 44\u201355"},{"key":"6244_CR33","volume-title":"Secure indexes","author":"E J Goh","year":"2003","unstructured":"Goh E J. Secure indexes. IACR Cryptology ePrint Archive, 2003"},{"issue":"7","key":"6244_CR34","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1145\/362686.362692","volume":"13","author":"B Bloom","year":"1970","unstructured":"Bloom B. Spacetime trade-offs in hash coding with allowable errors. Communications of the ACM, 1970, 13(7): 422\u2013426","journal-title":"Communications of the ACM"},{"key":"6244_CR35","volume-title":"Proceedings of Network and Distributed System Security Symposium","author":"B Waters","year":"2004","unstructured":"Waters B, Balfanz D, Durfee G, Smetters D. Building an encrypted and searchable audit log. In: Proceedings of Network and Distributed System Security Symposium. 2004"},{"issue":"8","key":"6244_CR36","doi-asserted-by":"publisher","first-page":"1467","DOI":"10.1109\/TPDS.2011.282","volume":"23","author":"C Wang","year":"2012","unstructured":"Wang C, Cao N, Ren K, Lou WJ. Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Transactions on Parallel and Distributed Systems, 2012, 23(8): 1467\u20131479","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"6244_CR37","first-page":"451","volume-title":"Proceedings of IEEE International Conference on Distributed Computing Systems","author":"C Wang","year":"2012","unstructured":"Wang C, Ren K, Yu S C, Urs K. Achieving usable and privacy-assured similarity search over outsourced cloud data. In: Proceedings of IEEE International Conference on Distributed Computing Systems. 2012, 451\u2013459"},{"key":"6244_CR38","first-page":"441","volume-title":"Proceedings of IEEE International Conference on Distributed Computing Systems","author":"J Li","year":"2010","unstructured":"Li J, Wang Q, Wang C, Cao N, Ren K, Lou WJ. Fuzzy keyword search over encrypted data in cloud computing. In: Proceedings of IEEE International Conference on Distributed Computing Systems. 2010, 441\u2013445"},{"key":"6244_CR39","first-page":"71","volume-title":"Proceedings of ACM Symposium on Information, Computer and Communications Security","author":"W H Sun","year":"2013","unstructured":"Sun W H, Wang B, Cao N, Li M, Lou W J, Hou Y, Li H. Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. In: Proceedings of ACM Symposium on Information, Computer and Communications Security. 2013, 71\u201382"},{"key":"6244_CR40","first-page":"87","volume-title":"Proceedings of International Symposium of Quality of Service","author":"Z R Shen","year":"2014","unstructured":"Shen Z R, Shu J W, Xue W. Keyword search with access control over encrypted data in cloud computing. In: Proceedings of International Symposium of Quality of Service. 2014, 87\u201392"},{"key":"6244_CR41","first-page":"207","volume-title":"Proceedings of International Symposium of Quality of Service","author":"Z R Shen","year":"2013","unstructured":"Shen Z R, Shu J W, Xue W. Preferred keyword search over encrypted data in cloud computing. In: Proceedings of International Symposium of Quality of Service. 2013, 207\u2013212"},{"key":"6244_CR42","doi-asserted-by":"publisher","first-page":"490","DOI":"10.1007\/978-3-642-34601-9_37","volume-title":"Proceedings of International Conference on Network and System Security","author":"J W Li","year":"2012","unstructured":"Li J W, Li J, Chen X F, Jia C F, Liu Z L. Efficient keyword search over encrypted data with fine-grained access control in hybrid cloud. In: Proceedings of International Conference on Network and System Security. 2012, 490\u2013502"},{"key":"6244_CR43","first-page":"89","volume-title":"Proceedings of ACM Conference on Computer and Communications Security","author":"V Goyal","year":"2006","unstructured":"Goyal V, Pandey O, Sahai A, Waters B. Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of ACM Conference on Computer and Communications Security. 2006, 89\u201398"},{"issue":"12","key":"6244_CR44","doi-asserted-by":"publisher","first-page":"2706","DOI":"10.1109\/TIFS.2016.2596138","volume":"11","author":"Z J Fu","year":"2016","unstructured":"Fu Z J, Wu X L, Guan C W, Sun X M, Ren K. Towards efficient multikeyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Transactions on Information Forensics and Security, 2016, 11(12): 2706\u20132716","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"2","key":"6244_CR45","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1109\/TPDS.2015.2401003","volume":"27","author":"Z H Xia","year":"2015","unstructured":"Xia Z H, Wang X H, Sun X M, Wang Q. A secure and dynamic multikeyword ranked search scheme over encrypted cloud data. IEEE Transactions on Parallel and Distributed Systems, 2015, 27(2): 340\u2013352","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"issue":"9","key":"6244_CR46","doi-asserted-by":"publisher","first-page":"2546","DOI":"10.1109\/TPDS.2015.2506573","volume":"27","author":"Z J Fu","year":"2015","unstructured":"Fu Z J, Ren K, Shu J G, Sun X M, Huang F X. Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Transactions on Parallel and Distributed Systems, 2015, 27(9): 2546\u20132559","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"issue":"1","key":"6244_CR47","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1587\/transcom.E98.B.190","volume":"E98\u2013B","author":"Z J Fu","year":"2015","unstructured":"Fu Z J, Sun X M, Liu Q, Zhou L, Shu J G. Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Transactions on Communications, 2015, E98\u2013B(1): 190\u2013200","journal-title":"IEICE Transactions on Communications"}],"container-title":["Frontiers of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11704-016-6244-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-016-6244-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-016-6244-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,15]],"date-time":"2019-02-15T00:06:30Z","timestamp":1550189190000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11704-016-6244-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2,15]]},"references-count":47,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2018,6]]}},"alternative-id":["6244"],"URL":"https:\/\/doi.org\/10.1007\/s11704-016-6244-5","relation":{},"ISSN":["2095-2228","2095-2236"],"issn-type":[{"value":"2095-2228","type":"print"},{"value":"2095-2236","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,2,15]]},"assertion":[{"value":"28 April 2016","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 November 2016","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 February 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}