{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T15:16:46Z","timestamp":1777130206267,"version":"3.51.4"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,4,30]],"date-time":"2019-04-30T00:00:00Z","timestamp":1556582400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2020,1]]},"DOI":"10.1007\/s12083-019-00736-0","type":"journal-article","created":{"date-parts":[[2019,4,30]],"date-time":"2019-04-30T13:10:32Z","timestamp":1556629832000},"page":"207-218","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["Multi-keyword ranked searchable encryption scheme with access control for cloud storage"],"prefix":"10.1007","volume":"13","author":[{"given":"Maryam","family":"Zarezadeh","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7789-452X","authenticated-orcid":false,"given":"Hamid","family":"Mala","sequence":"additional","affiliation":[]},{"given":"Maede","family":"Ashouri-Talouki","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,4,30]]},"reference":[{"key":"736_CR1","doi-asserted-by":"crossref","unstructured":"Rittinghouse JW, Ransome JF (2016) Cloud computing: implementation, management and security. CRC Press","DOI":"10.1201\/9781439806814"},{"key":"736_CR2","doi-asserted-by":"crossref","unstructured":"Agrawal R, Kiernan J, Srikant R, Xu Y (2004) Order preserving encryption for numeric data. In: Proceedings of the 2004 ACM SIGMOD international conference on Management of data, pp 563\u2013574","DOI":"10.1145\/1007568.1007632"},{"key":"736_CR3","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1016\/j.jnca.2015.11.023","volume":"64","author":"SK Pasupuleti","year":"2016","unstructured":"Pasupuleti SK, Ramalingam S, Buyya R (2016) An efficient and secure privacy-preserving approach for outsourced data of resource constrained mobile devices in cloud computing. J Netw Comput Appl 64:12\u201322","journal-title":"J Netw Comput Appl"},{"key":"736_CR4","unstructured":"Menezes AJ, van Oorschot PC, Vanstone SA (1996) Handbook of applied cryptography. CRC Press"},{"key":"736_CR5","doi-asserted-by":"crossref","unstructured":"Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: Proceedings IEEE symposium on security and privacy, S&P 2000. IEEE, pp 44\u20135","DOI":"10.1109\/SECPRI.2000.848445"},{"key":"736_CR6","doi-asserted-by":"crossref","unstructured":"Kamara S, Papamanthou C, Roeder T (2012) Dynamic searchable symmetric encryption. In: Proceedings of the 2012 ACM conference on computer and communications security. ACM, pp 965\u2013976","DOI":"10.1145\/2382196.2382298"},{"issue":"1","key":"736_CR7","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/s12095-017-0232-y","volume":"10","author":"GS Poh","year":"2018","unstructured":"Poh GS, Mohamad MS, Chin JJ (2018) Searchable symmetric encryption over multiple servers. Cryptogr Commun 10(1):139\u2013158","journal-title":"Cryptogr Commun"},{"key":"736_CR8","unstructured":"Goh EJ (2003) Secure indexes, IACR Cryptology ePrint Archive, 216"},{"key":"736_CR9","doi-asserted-by":"crossref","unstructured":"Curtmola R, Garay JA, Kamara S, Ostrovsky R (2006) Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of the 13th ACM conference on computer and communications security, pp 79\u201388","DOI":"10.1145\/1180405.1180417"},{"issue":"5","key":"736_CR10","doi-asserted-by":"publisher","first-page":"895","DOI":"10.3233\/JCS-2011-0426","volume":"19","author":"R Curtmola","year":"2011","unstructured":"Curtmola R, Garay JA, Kamara S, Ostrovsky R (2011) Searchable symmetric encryption: improved definitions and efficient constructions. J Comput Secur 19(5):895\u2013934","journal-title":"J Comput Secur"},{"key":"736_CR11","doi-asserted-by":"crossref","unstructured":"Cheng R, Yan J, Guan C, Zhang F, Ren K (2015) Verifiable searchable symmetric encryption from indistinguishability obfuscation. In: Proceedings of the 10th ACM symposium on information computer and communications security. ACM, pp 621\u2013626","DOI":"10.1145\/2714576.2714623"},{"key":"736_CR12","doi-asserted-by":"publisher","first-page":"506","DOI":"10.1007\/978-3-540-24676-3_30","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"Dan Boneh","year":"2004","unstructured":"Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. In: International conference on the theory and applications of cryptographic techniques. Springer, Berlin, pp 506\u2013522"},{"key":"736_CR13","doi-asserted-by":"crossref","unstructured":"Li J, Wang Q, Wang C, Cao N, Ren K, Lou W (2010) Fuzzy keyword search over encrypted data in cloud computing. In Infocom, proceedings ieee. IEEE, pp 1\u20135","DOI":"10.1109\/INFCOM.2010.5462196"},{"key":"736_CR14","unstructured":"Raghavendra S, Geeta CM, Shaila K, Buyya R, Venugopal KR, Iyengar SS, Patnaik LM (2015) MSSS: most significant single-keyword search over encrypted cloud data. In: Proceedings of the 6th annual intrernational conference on ICT: BigData, Cloud and Securit"},{"issue":"2","key":"736_CR15","doi-asserted-by":"publisher","first-page":"947","DOI":"10.1007\/s11277-016-3273-1","volume":"90","author":"R Pitchai","year":"2016","unstructured":"Pitchai R, Jayashri S, Raja J (2016) Searchable encrypted data file sharing method using public cloud service for secure storage in cloud computing. Wirel Pers Commun 90(2):947\u2013960","journal-title":"Wirel Pers Commun"},{"key":"736_CR16","unstructured":"Wang H, Dong X, Cao Z (2017) Secure and efficient encrypted keyword search for multi-user setting in cloud computing. Peer-to-Peer Network Appl, 1\u201311"},{"key":"736_CR17","unstructured":"Buyrukbilen S, Bakiras S (2013) Privacy-preserving ranked search on public-key encrypted data, in high performance computing and communications. In: IEEE 10th International conference on ieee international conference on embedded and ubiquitous computing (HPCC_EUC), pp 165\u2013174"},{"issue":"4","key":"736_CR18","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1109\/TDSC.2013.9","volume":"10","author":"J Yu","year":"2013","unstructured":"Yu J, Lu P, Zhu Y, Xue G, Li M (2013) Toward secure multikeyword top-k retrieval over encrypted cloud data. IEEE Trans Depend Sec Comput 10(4):239\u2013250","journal-title":"IEEE Trans Depend Sec Comput"},{"key":"736_CR19","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1109\/TPDS.2013.45","volume":"25","author":"N Cao","year":"2014","unstructured":"Cao N, Wang C, Li M, Ren K, Lou W (2014) Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans Parallel Distrib Syst 25:222\u2013233","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"736_CR20","doi-asserted-by":"publisher","first-page":"3025","DOI":"10.1109\/TPDS.2013.282","volume":"25","author":"W Sun","year":"2014","unstructured":"Sun W, Wang B, Cao N, Li M, Lou W, Hou YT, et al. (2014) Verifiable privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. IEEE Trans Parallel Distrib Syst 25:3025\u20133035","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"736_CR21","doi-asserted-by":"crossref","unstructured":"Zhang W, Xiao S, Lin Y, Zhou T, Zhou S (2014) Secure ranked multi-keyword search for multiple data owners in cloud computing. In: 44th Annual IEEE\/IFIP International conference on dependable systems and networks (DSN), pp 276\u2013286","DOI":"10.1109\/DSN.2014.36"},{"key":"736_CR22","doi-asserted-by":"crossref","unstructured":"Li H, Liu D, Jia K, Lin X (2015) Achieving authorized and ranked multi-keyword search over encrypted cloud data. In: IEEE International conference on in communications (ICC), pp 7450\u20137455","DOI":"10.1109\/ICC.2015.7249517"},{"key":"736_CR23","doi-asserted-by":"crossref","unstructured":"Sun W, Liu X, Lou W, Hou YT, Li H (2015) Catch you if you lie to me: efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data. In: IEEE Conference on computer communications (INFOCOM), pp 2110\u20132118","DOI":"10.1109\/INFOCOM.2015.7218596"},{"key":"736_CR24","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1109\/TETC.2014.2371239","volume":"3","author":"H Li","year":"2015","unstructured":"Li H, Liu D, Dai Y, Luan TH, Shen XS (2015) Enabling efficient multi-keyword ranked search over encrypted mobile cloud data through blind storage. IEEE Trans Emerg Topics Comput 3:127\u2013138","journal-title":"IEEE Trans Emerg Topics Comput"},{"key":"736_CR25","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1109\/TPDS.2015.2401003","volume":"27","author":"Z Xia","year":"2016","unstructured":"Xia Z, Wang X, Sun X, Wang Q (2016) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distrib Syst 27:340\u2013352","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"736_CR26","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/j.ins.2017.03.037","volume":"403","author":"X Jiang","year":"2017","unstructured":"Jiang X, Yu J, Yan J, Hao R (2017) Enabling efficient and verifiable multi-keyword ranked search over encrypted cloud data. Inform Sci 403:22\u201341","journal-title":"Inform Sci"},{"key":"736_CR27","doi-asserted-by":"publisher","first-page":"1187","DOI":"10.1109\/TPDS.2014.2355202","volume":"27","author":"W Sun","year":"2016","unstructured":"Sun W, Yu S, Lou W, Hou YT, Li H (2016) Protecting your right: verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. IEEE Trans Parallel Distrib Syst 27:1187\u20131198","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"736_CR28","unstructured":"Miao Y, Ma J, Liu X, Liu Z, Shen L, Wei F (2016) VMKDO: verifiable multi-keyword search over encrypted cloud data for dynamic data-owner. Peer-to-Peer Netw Appl, 1\u201311"},{"key":"736_CR29","doi-asserted-by":"crossref","unstructured":"Fan Y, Liu Z (2017) Verifiable attribute-based multi-keyword search over encrypted cloud data in multi-owner setting. In: IEEE Second International conference on data science in cyberspace (DSC), pp 441\u2013449","DOI":"10.1109\/DSC.2017.36"},{"key":"736_CR30","doi-asserted-by":"publisher","first-page":"42445","DOI":"10.1109\/ACCESS.2018.2861424","volume":"6","author":"DN Wu","year":"2018","unstructured":"Wu DN, Gan QQ, Wang X (2018) Verifiable public key encryption with keyword search based on homomorphic encryption in multi-user setting. IEEE Access 6:42445\u201342453","journal-title":"IEEE Access"},{"key":"736_CR31","doi-asserted-by":"crossref","unstructured":"Liu Z, Wang Z, Cheng X, Jia C, Yuan K (2013) Multi-user searchable encryption with coarser-grained access control in hybrid cloud. In: Fourth International conference on emerging intelligent data and web technologies (EIDWT). IEEE, pp 249\u2013255","DOI":"10.1109\/EIDWT.2013.48"},{"key":"736_CR32","doi-asserted-by":"crossref","unstructured":"Kaci A, Bouabana-Tebibel T (2014) Access control reinforcement over searchable encryption. In: 2014 IEEE 15th International conference on information reuse and integration (IRI). IEEE, pp 130\u2013137","DOI":"10.1109\/IRI.2014.7051882"},{"key":"736_CR33","doi-asserted-by":"crossref","unstructured":"Li J, Zhang L (2014) Attribute-based keyword search and data access control in cloud. In: 2014 Tenth International conference on computational intelligence and security (CIS). IEEE, pp 382\u2013386","DOI":"10.1109\/CIS.2014.113"},{"key":"736_CR34","first-page":"815","volume-title":"Advances on Broad-Band Wireless Computing, Communication and Applications","author":"Peilin Zhou","year":"2016","unstructured":"Zhou P, Liu Z, Duan S (2016) Flexible attribute-based keyword search via two access policies. In: International conference on broadband and wireless computing, communication and applications. Springer, Cham, pp 815\u2013822"},{"key":"736_CR35","unstructured":"Li H, Yang Y, Dai Y, Bai J, Yu S, Xiang Y (2017) Achieving secure and efficient dynamic searchable symmetric encryption over medical cloud data. IEEE Transactions on Cloud Computing"},{"issue":"9","key":"736_CR36","doi-asserted-by":"publisher","first-page":"e3548","DOI":"10.1002\/dac.3548","volume":"31","author":"L Cao","year":"2018","unstructured":"Cao L, Wang Y, Dong X, Liu Y, Zhang Y, Guo X, Feng T (2018) Multiuser access control searchable privacy-preserving scheme in cloud storage. Int J Commun Syst 31(9):e3548","journal-title":"Int J Commun Syst"},{"key":"736_CR37","first-page":"1","volume":"99","author":"H Ren","year":"2018","unstructured":"Ren H, Li H, Dai Y, Yang K, Lin X (2018) Querying in internet of things with privacy preserving: challenges, solutions and opportunities. IEEE Netw 99:1\u20138","journal-title":"IEEE Netw"},{"key":"736_CR38","doi-asserted-by":"crossref","unstructured":"He K, Guo J, Weng J, Weng J, Liu JK, Yi X (2018) Attribute-based hybrid Boolean keyword search over outsourced encrypted data\/ IEEE Transactions on Dependable and Secure Computing","DOI":"10.1109\/TDSC.2018.2864186"},{"issue":"4","key":"736_CR39","doi-asserted-by":"publisher","first-page":"870","DOI":"10.1109\/TIFS.2018.2868162","volume":"14","author":"G Xu","year":"2019","unstructured":"Xu G, Li H, Dai Y, Yang K, Lin X (2019) Enabling efficient and geometric range query with access control over encrypted spatial data. IEEE Trans Inf Forens Secur 14(4):870\u2013885","journal-title":"IEEE Trans Inf Forens Secur"},{"key":"736_CR40","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1016\/j.compeleceng.2012.11.002","volume":"39","author":"D Koo","year":"2013","unstructured":"Koo D, Hur J, Yoon H (2013) Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage. Comput Electr Eng 39:34\u201346","journal-title":"Comput Electr Eng"},{"key":"736_CR41","doi-asserted-by":"publisher","first-page":"3358","DOI":"10.1109\/ACCESS.2017.2780129","volume":"6","author":"X Wang","year":"2018","unstructured":"Wang X, Zhang Y (2018) E-SC: collusion-resistant secure outsourcing of sequence comparison algorithm. IEEE Access 6:3358\u20133375","journal-title":"IEEE Access"},{"issue":"2","key":"736_CR42","first-page":"1","volume":"7","author":"X Jiang","year":"2017","unstructured":"Jiang X, Ge X, Yu J, Kong F, Cheng X, Hao R (2017) An efficient symmetric searchable encryption scheme for cloud storage. J Internet Serv Inf Secur (JISIS) 7(2):1\u201318","journal-title":"J Internet Serv Inf Secur (JISIS)"},{"key":"736_CR43","unstructured":"Witten IH, Moffat A, Bell TC (1999) Managing gigabytes: compressing and indexing documents and images. Morgan Kaufmann"},{"issue":"6","key":"736_CR44","doi-asserted-by":"publisher","first-page":"062101","DOI":"10.1007\/s11432-016-0242-7","volume":"60","author":"Y Peng","year":"2017","unstructured":"Peng Y, Li H, Cui J, Zhang J, Ma J, Peng C (2017) hOPE: improved order preserving encryption with the power to homomorphic operations of ciphertexts. Sci Chin Inf Sci 60(6):062101","journal-title":"Sci Chin Inf Sci"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-019-00736-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12083-019-00736-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-019-00736-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,28]],"date-time":"2020-04-28T23:38:45Z","timestamp":1588117125000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12083-019-00736-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4,30]]},"references-count":44,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,1]]}},"alternative-id":["736"],"URL":"https:\/\/doi.org\/10.1007\/s12083-019-00736-0","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,4,30]]},"assertion":[{"value":"3 September 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 February 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 April 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}