{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T06:51:18Z","timestamp":1773471078101,"version":"3.50.1"},"reference-count":46,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key R&amp;D Program of China","award":["2018YFB0803900"],"award-info":[{"award-number":["2018YFB0803900"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["92067103"],"award-info":[{"award-number":["92067103"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772403"],"award-info":[{"award-number":["61772403"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100015401","name":"Key Research and Development Projects of Shaanxi Province","doi-asserted-by":"publisher","award":["2021ZDLGY06-02"],"award-info":[{"award-number":["2021ZDLGY06-02"]}],"id":[{"id":"10.13039\/501100015401","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Key Scientific Research Program of Education Department of Shaanxi","award":["20JY015"],"award-info":[{"award-number":["20JY015"]}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["JBF211502"],"award-info":[{"award-number":["JBF211502"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007128","name":"Natural Science Foundation of Shaanxi Province","doi-asserted-by":"publisher","award":["2019ZDLGY12-02"],"award-info":[{"award-number":["2019ZDLGY12-02"]}],"id":[{"id":"10.13039\/501100007128","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Natural Science Basic Research Plan in Shaanxi Province of China","award":["2020JM-184"],"award-info":[{"award-number":["2020JM-184"]}]},{"name":"Shaanxi Innovation Team Project","award":["2018TD-007"],"award-info":[{"award-number":["2018TD-007"]}]},{"name":"Xi&#x0027;an Science and Technology Innovation Plan","award":["201809168CX9JC10"],"award-info":[{"award-number":["201809168CX9JC10"]}]},{"name":"National 111 Program of China","award":["B16037"],"award-info":[{"award-number":["B16037"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Cloud Comput."],"published-print":{"date-parts":[[2023,4,1]]},"DOI":"10.1109\/tcc.2021.3134015","type":"journal-article","created":{"date-parts":[[2021,12,9]],"date-time":"2021-12-09T21:10:25Z","timestamp":1639084225000},"page":"1170-1181","source":"Crossref","is-referenced-by-count":32,"title":["MSIAP: A Dynamic Searchable Encryption for Privacy-Protection on Smart Grid With Cloud-Edge-End"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6870-6657","authenticated-orcid":false,"given":"Kai","family":"Fan","sequence":"first","affiliation":[{"name":"State Key Laboratory of Integrated Service Networks, Xidian University, Xi&#x0027;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1029-4263","authenticated-orcid":false,"given":"Qi","family":"Chen","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Integrated Service Networks, Xidian University, Xi&#x0027;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4631-9274","authenticated-orcid":false,"given":"Ruidan","family":"Su","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Integrated Service Networks, Xidian University, Xi&#x0027;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4262-153X","authenticated-orcid":false,"given":"Kuan","family":"Zhang","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Nebraska-Lincoln, Lincoln, NE, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6663-0692","authenticated-orcid":false,"given":"Haoyang","family":"Wang","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Integrated Service Networks, Xidian University, Xi&#x0027;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8310-7169","authenticated-orcid":false,"given":"Hui","family":"Li","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Integrated Service Networks, Xidian University, Xi&#x0027;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9745-5404","authenticated-orcid":false,"given":"Yintang","family":"Yang","sequence":"additional","affiliation":[{"name":"Key Laboratory of the Ministry of Education for Wide Band-Gap Semiconductor Materials and Devices, Xidian University, Xi&#x0027;an, China"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-020-02717-1"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/s00542-019-04515-y"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2020.102363"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2020.3027003"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/FMEC.2018.8364045"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2014.7036872"},{"key":"ref14","first-page":"5529","article-title":"An improved multi-server authentication scheme for distributed mobile cloud computing services","volume":"10","author":"irshad","year":"2016","journal-title":"KSII Trans Internet Inf Syst"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/170035.170072"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359842"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3183713.3183754"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-019-00870-9"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-019-00736-0"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2908056"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2020.2997932"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761599"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2018.2875032"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2019.2896064"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.102429"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9013856"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3183713.3183754"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"2830","DOI":"10.1109\/JSYST.2018.2876226","article-title":"A lightweight and provably secure key agreement system for a smart grid with elliptic curve cryptography","volume":"13","author":"fan","year":"2019","journal-title":"IEEE Syst J"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"491","DOI":"10.1016\/j.future.2018.06.004","article-title":"Pairing based anonymous and secure key agreement protocol for smart grid edge computing infrastructure","volume":"88","author":"khalid","year":"2018","journal-title":"Future Gener Comput Syst"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_30"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.3390\/en14092732"},{"key":"ref23","article-title":"Secure indexes","volume":"2003","author":"goh","year":"2003","journal-title":"IACR Cryptol ePrint Arch"},{"key":"ref45","article-title":"Application research of &#x201C;edge-cloud collaboration","volume":"790","author":"song","year":"2020","journal-title":"IOP Conference Series: Materials Science and Engineering"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89641-8_13"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180417"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-018-1759-3"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3020841"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102525"},{"key":"ref22","first-page":"44","article-title":"Practical techniques for searches on encrypted data","author":"song","year":"2000","journal-title":"Proc IEEE Symp Secur Privacy"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.12.040"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/8583130"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.12.003"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2359389"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39884-1_22"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2406704"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2018.1700415"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2849509"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2906789"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2976746"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1587\/transfun.2019CIP0006"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1049\/iet-gtd.2016.0704"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/EIT.2019.8834255"},{"key":"ref40","first-page":"1","article-title":"Advanced encryption standard (AES) algorithm to encrypt and decrypt data","volume":"16","author":"abdullah","year":"2017","journal-title":"Security and Cryptography for Networks"}],"container-title":["IEEE Transactions on Cloud Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6245519\/10144930\/09645343.pdf?arnumber=9645343","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,26]],"date-time":"2023-06-26T18:50:20Z","timestamp":1687805420000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9645343\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,1]]},"references-count":46,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tcc.2021.3134015","relation":{},"ISSN":["2168-7161","2372-0018"],"issn-type":[{"value":"2168-7161","type":"electronic"},{"value":"2372-0018","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,4,1]]}}}