{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:38:31Z","timestamp":1772041111829,"version":"3.50.1"},"reference-count":43,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/tifs.2024.3377549","type":"journal-article","created":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T19:08:15Z","timestamp":1710356895000},"page":"4316-4330","source":"Crossref","is-referenced-by-count":7,"title":["Privacy-Preserving and Trusted Keyword Search for Multi-Tenancy Cloud"],"prefix":"10.1109","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2954-7267","authenticated-orcid":false,"given":"Xiaojie","family":"Zhu","sequence":"first","affiliation":[{"name":"Computer, Electrical and Mathematical Sciences and Engineering Division, King Abdullah University of Science and Technology (KAUST), Thuwal, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4507-3356","authenticated-orcid":false,"given":"Peisong","family":"Shen","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2163-987X","authenticated-orcid":false,"given":"Yueyue","family":"Dai","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9178-6640","authenticated-orcid":false,"given":"Lei","family":"Xu","sequence":"additional","affiliation":[{"name":"School of Mathematics and Statistics, Nanjing University of Science and Technology, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0230-1432","authenticated-orcid":false,"given":"Jiankun","family":"Hu","sequence":"additional","affiliation":[{"name":"School of Engineering and Information Technology, The University of New South Wales, Canberra, NSW, Australia"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"Healthvana","year":"2022"},{"key":"ref2","volume-title":"CDPHP","year":"2022"},{"key":"ref3","volume-title":"Customer Success Stories","year":"2022"},{"key":"ref4","volume-title":"HiPAA","year":"2022"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2000.848445"},{"key":"ref6","article-title":"Secure indexes","author":"Goh","year":"2003","journal-title":"Cryptol. ePrint Arch."},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2011-0426"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2012.6364125"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2015.2425407"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.09.013"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1201\/1086\/44530.13.3.20040701\/83065.3"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043566"},{"key":"ref14","first-page":"2371","article-title":"Omnes pro uno: Practical multi-writer encrypted database","volume-title":"Proc. 31st USENIX Secur. Symp. (USENIX Security)","author":"Wang"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04474-8_28"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.03.006"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-018-0489-y"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.45"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.2298\/csis121104028w"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484322"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2819121"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39884-1_22"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218596"},{"key":"ref24","article-title":"Verifiable dynamic symmetric searchable encryption: Optimality and forward security","author":"Bost","year":"2016","journal-title":"Cryptol. ePrint Arch."},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32946-3_21"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2018.2808283"},{"key":"ref27","article-title":"Attribute based encryption with key cloning protection","author":"Hinek","year":"2008"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-05284-2_18"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6847976"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_30"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2442215"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2022.3149761"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.2963978"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1201\/9781420011241"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2873088"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/VETECF.2011.6093096"},{"key":"ref37","volume-title":"Enron Email Dataset","year":"2022"},{"key":"ref38","volume-title":"CPU Cores Threads per CPU Core per Instance Type","year":"2022"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180417"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2011.5983948"},{"key":"ref41","volume-title":"Java Security Message Digest","year":"2022"},{"key":"ref42","volume-title":"JavaTM Platform, Standard Edition 8 API Specification","year":"2023"},{"key":"ref43","volume-title":"Wikimedia Downloads","year":"2023"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/10319981\/10472543.pdf?arnumber=10472543","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,10]],"date-time":"2024-05-10T05:17:30Z","timestamp":1715318250000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10472543\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":43,"URL":"https:\/\/doi.org\/10.1109\/tifs.2024.3377549","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}