{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,20]],"date-time":"2024-07-20T05:09:03Z","timestamp":1721452143101},"reference-count":24,"publisher":"Oxford University Press (OUP)","issue":"10","license":[{"start":{"date-parts":[[2018,7,13]],"date-time":"2018-07-13T00:00:00Z","timestamp":1531440000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/academic.oup.com\/journals\/pages\/open_access\/funder_policies\/chorus\/standard_publication_model"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10,1]]},"DOI":"10.1093\/comjnl\/bxy067","type":"journal-article","created":{"date-parts":[[2018,6,16]],"date-time":"2018-06-16T07:07:11Z","timestamp":1529132831000},"page":"1577-1588","source":"Crossref","is-referenced-by-count":6,"title":["Efficient Privacy-Preserving Data Sanitization over Cloud Using Optimal GSA Algorithm"],"prefix":"10.1093","volume":"61","author":[{"given":"S","family":"Renuga","sequence":"first","affiliation":[{"name":"CSE Department, Ponjesly College of Engineering, Nagercoil, Tamil Nadu, India"}]},{"given":"S S K","family":"Jagatheeshwari","sequence":"additional","affiliation":[{"name":"EEE Department, Ponjesly College of Engineering, Nagercoil, Tamil Nadu, India"}]}],"member":"286","published-online":{"date-parts":[[2018,7,13]]},"reference":[{"key":"key\n\t\t\t\t20181008071242778_bxy067C1","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1109\/TPDS.2015.2401003","article-title":"A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data","volume":"27","author":"Xia","year":"2016","journal-title":"IEEE Trans. Parallel Distributed Syst."},{"key":"key\n\t\t\t\t20181008071242778_bxy067C2","doi-asserted-by":"crossref","first-page":"845","DOI":"10.1016\/j.procs.2016.03.105","article-title":"Confidentiality-conserving multi-keyword ranked search above encrypted cloud data","volume":"79","author":"Dhumal","year":"2016","journal-title":"Procedia Comput. Sci."},{"key":"key\n\t\t\t\t20181008071242778_bxy067C3","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1016\/j.future.2013.06.029","article-title":"Efficient multi-keyword ranked query over encrypted data in cloud computing","volume":"30","author":"Li","year":"2014","journal-title":"Future Generation Comput. Syst."},{"key":"key\n\t\t\t\t20181008071242778_bxy067C4","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1016\/j.jpdc.2016.05.017","article-title":"A privacy-preserved full-text retrieval algorithm over encrypted data for cloud storage applications","volume":"99","author":"Song","year":"2017","journal-title":"J. Parallel Distributed Comput."},{"key":"key\n\t\t\t\t20181008071242778_bxy067C5","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1016\/j.procs.2016.02.023","article-title":"Efficient keyword search over encrypted cloud data","volume":"78","author":"Meharwade","year":"2016","journal-title":"Procedia Comput. Sci."},{"key":"key\n\t\t\t\t20181008071242778_bxy067C6","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1016\/j.jnca.2015.11.023","article-title":"An efficient and secure privacy-preserving approach for outsourced data of resource constrained mobile devices in cloud computing","volume":"64","author":"Pasupuleti","year":"2016","journal-title":"J. Netw. Comput. Appl."},{"key":"key\n\t\t\t\t20181008071242778_bxy067C7","author":"Evans","year":"2011"},{"key":"key\n\t\t\t\t20181008071242778_bxy067C8","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1016\/j.ijinfomgt.2016.11.005","article-title":"SecureNoSQL: an approach for secure search of encrypted nosql databases in the public cloud","volume":"37","author":"Ahmadian","year":"2017","journal-title":"Int. J. Inf. Manage."},{"key":"key\n\t\t\t\t20181008071242778_bxy067C9","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1016\/j.compeleceng.2012.11.002","article-title":"Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage","volume":"39","author":"Koo","year":"2013","journal-title":"Comput. Electr. Eng."},{"key":"key\n\t\t\t\t20181008071242778_bxy067C10","first-page":"84","author":"Zhou","year":"2017"},{"key":"key\n\t\t\t\t20181008071242778_bxy067C11","doi-asserted-by":"crossref","first-page":"260","DOI":"10.1016\/j.future.2016.09.018","article-title":"A QoS-driven approach for cloud computing addressing attributes of performance and security","volume":"68","author":"Batista","year":"2017","journal-title":"Future Generation Comput. Syst."},{"key":"key\n\t\t\t\t20181008071242778_bxy067C12","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1016\/j.cose.2015.04.007","article-title":"Parallel search over encrypted data under attribute based encryption on the Cloud Computing","volume":"54","author":"Bouabana-Tebibel","year":"2015","journal-title":"Comput. Secur."},{"key":"key\n\t\t\t\t20181008071242778_bxy067C13","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1016\/j.procs.2016.06.062","article-title":"Index generation and secure multi-user access control over an encrypted cloud data","volume":"89","author":"Raghavendra","year":"2016","journal-title":"Procedia Comput. Sci."},{"key":"key\n\t\t\t\t20181008071242778_bxy067C14","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1016\/j.procs.2016.03.023","article-title":"Homomorphic encryption for security of cloud data","volume":"79","author":"Dhote","year":"2016","journal-title":"Procedia Comput. Sci."},{"key":"key\n\t\t\t\t20181008071242778_bxy067C15","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1016\/j.jvcir.2016.09.005","article-title":"Reversible data hiding for encrypted signals by homomorphic encryption and signal energy transfer","volume":"41","author":"Wu","year":"2016","journal-title":"J. Vis. Commun. Image Representation"},{"key":"key\n\t\t\t\t20181008071242778_bxy067C16","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jpdc.2015.11.004","article-title":"Secure and controllable k-NN query over encrypted cloud data with key confidentiality","volume":"89","author":"Zhu","year":"2016","journal-title":"J. Parallel Distributed Comput."},{"key":"key\n\t\t\t\t20181008071242778_bxy067C17","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1504\/IJESDF.2013.058654","article-title":"Secure k-NN query on encrypted cloud database without key-sharing","volume":"5","author":"Zhu","year":"2013","journal-title":"Int. J. Electron. Secur. Digit. Forensics"},{"key":"key\n\t\t\t\t20181008071242778_bxy067C18","first-page":"291","article-title":"Attribute based secure query processing in cloud with privacy homomorphism","volume":"3","author":"Khachane","year":"2015","journal-title":"Int. J. Comput. Netw. Commun. Secur."},{"key":"key\n\t\t\t\t20181008071242778_bxy067C19","first-page":"1215","article-title":"Secure query processing of outsourced data using privacy homomorphism: kNN and distance decoding algorithm","volume":"3","author":"Khachane","year":"2014"},{"key":"key\n\t\t\t\t20181008071242778_bxy067C20","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1109\/CC.2015.7385519","article-title":"Privacy-preserving top-k keyword similarity search over outsourced cloud data","volume":"12","author":"Yiping","year":"2015","journal-title":"China Commun."},{"key":"key\n\t\t\t\t20181008071242778_bxy067C21","doi-asserted-by":"crossref","first-page":"2365","DOI":"10.1109\/TIFS.2016.2581316","article-title":"Privacy-preserving and regular language search over encrypted cloud data","volume":"11","author":"Liang","year":"2016","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"key\n\t\t\t\t20181008071242778_bxy067C22","doi-asserted-by":"crossref","first-page":"312","DOI":"10.1109\/TDSC.2015.2406704","article-title":"Enabling fine-grained multi-keyword search supporting classified sub-dictionaries over encrypted cloud data","volume":"13","author":"Li","year":"2016","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"key\n\t\t\t\t20181008071242778_bxy067C23","doi-asserted-by":"crossref","first-page":"1566","DOI":"10.1109\/TC.2015.2448099","article-title":"Privacy preserving ranked multi-keyword search for multiple data owners in cloud computing","volume":"65","author":"Zhang","year":"2016","journal-title":"IEEE Trans. Comput."},{"key":"key\n\t\t\t\t20181008071242778_bxy067C24","doi-asserted-by":"crossref","first-page":"2232","DOI":"10.1016\/j.ins.2009.03.004","article-title":"GSA: a gravitational search algorithm","volume":"179","author":"Rashedi","year":"2009","journal-title":"Inf. Sci. (Ny)"}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/comjnl\/article-pdf\/61\/10\/1577\/25949263\/bxy067.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,19]],"date-time":"2019-10-19T10:47:46Z","timestamp":1571482066000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/comjnl\/article\/61\/10\/1577\/5053261"}},"subtitle":[],"editor":[{"given":"Joseph","family":"Liu","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2018,7,13]]},"references-count":24,"journal-issue":{"issue":"10","published-online":{"date-parts":[[2018,7,13]]},"published-print":{"date-parts":[[2018,10,1]]}},"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxy067","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"value":"0010-4620","type":"print"},{"value":"1460-2067","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2018,10]]},"published":{"date-parts":[[2018,7,13]]}}}