{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T18:46:38Z","timestamp":1730227598793,"version":"3.28.0"},"reference-count":37,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1109\/icacci.2018.8554618","type":"proceedings-article","created":{"date-parts":[[2018,12,4]],"date-time":"2018-12-04T01:17:32Z","timestamp":1543886252000},"page":"350-356","source":"Crossref","is-referenced-by-count":5,"title":["Privacy Preserving Dynamically Indexed Multi-Phrase Search over Encrypted Data"],"prefix":"10.1109","author":[{"given":"MD Asrar","family":"Ahmed","sequence":"first","affiliation":[]},{"given":"S.","family":"Ramachandram","sequence":"additional","affiliation":[]},{"given":"Khaleel Ur","family":"Rahman Khan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","article-title":"Confidentiality-preserving rank-ordered search","author":"ashwin","year":"2007","journal-title":"Proceedings of the 2007 ACM Workshop on Storage Security and Survivability"},{"journal-title":"International Conference on Information and Communications Security","article-title":"Achieving efficient conjunctive keyword searches over encrypted data","year":"2005","key":"ref32"},{"journal-title":"Berlin Heidelberg","article-title":"Conjunctive wildcard search over encrypted data","year":"2011","key":"ref31"},{"key":"ref30","article-title":"Secure conjunctive keyword search over encrypted data","author":"philippe","year":"2004","journal-title":"International Conference on Applied Cryptography and Network Security"},{"journal-title":"Request for Comments","year":"2014","key":"ref37"},{"key":"ref36","article-title":"Privacy-preserving Logarithmic-time Search on Encrypted Data in Cloud","author":"yanbin","year":"2012","journal-title":"NDSS"},{"key":"ref35","article-title":"Secure ranked multi-keyword search for multiple data owners in cloud computing","author":"wei","year":"2014","journal-title":"Dependable Systems and Networks (DSN)"},{"key":"ref34","article-title":"Zerber+ r: Top-k retrieval from a confidential index","author":"sergej","year":"2009","journal-title":"Proceedings of the 12th International Conference on Extending Database Technology Advances in Database Technology ACM"},{"key":"ref10","first-page":"3025","article-title":"Verifiable privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking","volume":"25 11","author":"wenhai","year":"2014","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"ref11","first-page":"2546","article-title":"Enabling personalized search over encrypted outsourced data with efficiency improvement","volume":"27 9","author":"zhangjie","year":"2016","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"ref12","article-title":"Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud","author":"bing","year":"2014","journal-title":"INFOCOM"},{"key":"ref13","article-title":"Fuzzy keyword search over encrypted data in cloud computing","author":"jin","year":"2010","journal-title":"INFOCOM"},{"key":"ref14","article-title":"Enabling privacy-assured similarity retrieval over millions of encrypted records","author":"xingliang","year":"2015","journal-title":"European symposium on research in computer security"},{"key":"ref15","first-page":"40","article-title":"Searchable symmetric encryption: designs and challenges","volume":"50 3","author":"geong sen","year":"2017","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"ref16","article-title":"Dynamic Multi-phrase Ranked Search over Encrypted Data with Symmetric Searchable Encryption","author":"cheng","year":"2017","journal-title":"IEEE Transactions on Services Computing"},{"key":"ref17","article-title":"Phrase search over encrypted data with symmetric encryption scheme","author":"yinqi","year":"2012","journal-title":"Distributed Computing Systems Workshops (ICDCSW)"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2013.62"},{"key":"ref19","article-title":"Encrypted phrase searching in the cloud","author":"steven","year":"2012","journal-title":"Global Communications Conference (GLOBECOM) 2012 IEEE"},{"key":"ref28","article-title":"Achieving usable and privacy-assured similarity search over outsourced cloud data","author":"cong","year":"2012","journal-title":"INFOCOM 2012 Proceedings IEEE"},{"key":"ref4","article-title":"Parallel and dynamic searchable symmetric encryption","author":"seny","year":"2013","journal-title":"International Conference on Financial Cryptography and Data Security"},{"journal-title":"Data Engineering (ICDE)","article-title":"Efficient similarity search over encrypted data","year":"2012","key":"ref27"},{"key":"ref3","article-title":"Dynamic searchable symmetric encryption","author":"seny","year":"2012","journal-title":"Proceedings of the 2012 ACM Conference on Computer and Communications Security ACM"},{"key":"ref6","first-page":"222","article-title":"Privacy-preserving multi-keyword ranked search over encrypted cloud data","volume":"25 1","author":"ning","year":"2014","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848153"},{"key":"ref5","first-page":"1467","article-title":"Enabling secure and efficient ranked keyword search over outsourced cloud data","volume":"23 8","author":"cong","year":"2012","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"ref8","first-page":"190","article-title":"Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing","volume":"98 1","author":"zhangjie","year":"2015","journal-title":"IEICE Transactions on Communications"},{"key":"ref7","first-page":"340","article-title":"A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data","volume":"27 2","author":"zhihua","year":"2016","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"ref2","first-page":"895","article-title":"Searchable symmetric encryption: improved definitions and efficient constructions","volume":"19 5","author":"reza","year":"2011","journal-title":"Journal of Computer Security"},{"key":"ref9","first-page":"239","article-title":"Towards secure multi-keyword top-k retrieval over encrypted data","volume":"10 4","author":"jiad","year":"2013","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"ref1","first-page":"2402","article-title":"An efficient public auditing protocol with novel dynamic structure for cloud data","volume":"12 10","author":"jian","year":"2017","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"ref20","article-title":"LPSSE: lightweight phrase search with symmetric searchable encryption in cloud storage","author":"mingchu","year":"2015","journal-title":"Proc Information Technology New Generations (ITNG)"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2896387.2896427"},{"key":"ref21","article-title":"Practical techniques for searches on encrypted data","author":"dawn","year":"2000","journal-title":"Security and Privacy"},{"key":"ref24","article-title":"Fuzzy keyword search over encrypted data in cloud computing","author":"jin","year":"2010","journal-title":"INFOCOM 2010 Proceedings IEEE"},{"key":"ref23","article-title":"Secure indexes","volume":"216","author":"eu-jin","year":"2003","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref26","article-title":"Public key encryption that allows PIR queries","author":"dan","year":"2007","journal-title":"6th Annual International Cryptology Conference"},{"key":"ref25","article-title":"Public key encryption with keyword search","author":"dan","year":"2004","journal-title":"International Conference on the Theory and Applications of Cryptographic Techniques"}],"event":{"name":"2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","start":{"date-parts":[[2018,9,19]]},"location":"Bangalore","end":{"date-parts":[[2018,9,22]]}},"container-title":["2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8536361\/8554361\/08554618.pdf?arnumber=8554618","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T14:36:36Z","timestamp":1643294196000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8554618\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/icacci.2018.8554618","relation":{},"subject":[],"published":{"date-parts":[[2018,9]]}}}