{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T16:40:04Z","timestamp":1761324004960,"version":"3.37.3"},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2015,5,17]],"date-time":"2015-05-17T00:00:00Z","timestamp":1431820800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1186\/s13677-015-0034-8","type":"journal-article","created":{"date-parts":[[2015,5,16]],"date-time":"2015-05-16T16:00:09Z","timestamp":1431792009000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":36,"title":["Attribute-based data retrieval with semantic keyword search for e-health cloud"],"prefix":"10.1186","volume":"4","author":[{"given":"Yang","family":"Yang","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,5,17]]},"reference":[{"key":"34_CR1","doi-asserted-by":"crossref","unstructured":"Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G (2004) Public Key Encryption with Keyword Search In: EUROCRYPT, 506\u2013522.. Springer, Heidelberg.","DOI":"10.1007\/978-3-540-24676-3_30"},{"key":"34_CR2","doi-asserted-by":"crossref","unstructured":"Gu C, Zhu Y, Zhang Y (2007) Efficient public key encryption with keyword search schemes from pairings In: INSCRYPT, 372\u201383.. Springer, Heidelberg.","DOI":"10.1007\/978-3-540-79499-8_29"},{"key":"34_CR3","first-page":"143","volume-title":"CSC","author":"B Long","year":"2012","unstructured":"Long B, Gu D, Ding N, Lu H (2012) On Improving the Performance of Public Key Encryption with Keyword Search In: CSC, 143\u2013147.. IEEE, Piscataway, N.J, USA."},{"key":"34_CR4","doi-asserted-by":"crossref","unstructured":"Chen Z, Wu C, Wang D, Li S (2012) Conjunctive keywords searchable encryption with efficient pairing, constant ciphertext and short trapdoor In: PAISI, 176\u2013189.. Springer, Heidelberg.","DOI":"10.1007\/978-3-642-30428-6_15"},{"key":"34_CR5","first-page":"2266","volume-title":"IEEE Transactions on Computers","author":"P Xu","year":"2013","unstructured":"Xu P, Jin H, Wu Q, Wang W (2013) Public-Key Encryption with Fuzzy Keyword Search-A Provably Secure Scheme under Keyword Gusssing Attack In: IEEE Transactions on Computers, 2266\u20132277.. IEEE, Piscataway, N.J, USA."},{"key":"34_CR6","first-page":"2112","volume-title":"INFOCOM\u201914","author":"B Wang","year":"2014","unstructured":"Wang B, Yu S, Lou W, Hou T (2014) Privacy-Preserving Multi-Keyword Fuzzy Search over Encrypted Data in the Cloud In: INFOCOM\u201914, 2112\u20132120.. IEEE, Piscataway, N.J, USA."},{"key":"34_CR7","first-page":"222","volume-title":"IEEE Transactions on Parallel and Distributed Systems","author":"N Cao","year":"2014","unstructured":"Cao N, Wang C, Li M, Ren K, Lou W (2014) Privacy-preserving multi-keyword ranked search over encrypted cloud data In: IEEE Transactions on Parallel and Distributed Systems, 222\u2013233.. IEEE, Piscataway, N.J, USA."},{"key":"34_CR8","doi-asserted-by":"crossref","unstructured":"Attrapadung N, Furukawa J, Imai H (2006) Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private Keys In: ASIACRYPT 2006, LNCS 4284, 161\u2013177.. Springer, Heidelberg.","DOI":"10.1007\/11935230_11"},{"key":"34_CR9","doi-asserted-by":"crossref","unstructured":"Bosch C, Brinkman R, Hartel P, Jonker W (2011) Conjunctive wildcard search over encrypted data In: International Conference on Secure Data Management, LNCS 6933, 114\u2013127.. Springer, Heidelberg.","DOI":"10.1007\/978-3-642-23556-6_8"},{"key":"34_CR10","first-page":"441","volume-title":"Proceedings of the 29th IEEE International Conference on Computer Communications(INFOCOM10)","author":"J Li","year":"2010","unstructured":"Li J, Wang Q, Wang C, Cao N, Ren K, Lou W (2010) Fuzzy keyword search over encrypted data in cloud computing In: Proceedings of the 29th IEEE International Conference on Computer Communications(INFOCOM10), 441\u2013445.. IEEE, Piscataway, N.J, USA."},{"key":"34_CR11","doi-asserted-by":"crossref","unstructured":"Hu C, He P, Liu P (2012) Public Key Encryption with Multi-keyword Search In: NCIS2012, 568\u2013576.. Springer, Heidelberg.","DOI":"10.1007\/978-3-642-35211-9_72"},{"key":"34_CR12","first-page":"277","volume-title":"Information Technology and Control","author":"M Hwang","year":"2014","unstructured":"Hwang M, Hsu S, Lee C (2014) A New Public Key Encryption with Conjunctive Field Keyword Search Scheme In: Information Technology and Control, 277\u2013288.. Kaunas Univ. Technology, Kaunas, Lithuania."},{"key":"34_CR13","doi-asserted-by":"crossref","unstructured":"Sahai A, Waters B (2005) Fuzzy Identity Based Encryption In: EUROCRYPT\u201905, LNCS 3494, 457\u2013473.. Springer, Heidelberg.","DOI":"10.1007\/11426639_27"},{"key":"34_CR14","doi-asserted-by":"crossref","unstructured":"Waters B (2011) Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization In: PKC\u201911, LNCS 6571, 53\u201370.. Springer, Heidelberg.","DOI":"10.1007\/978-3-642-19379-8_4"},{"key":"34_CR15","doi-asserted-by":"crossref","unstructured":"Wang C, Luo J (2013) An Efficient Key-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length. Mathematical Problems in Engineering. volume 2013, Article ID 810969, http:\/\/dx.doi.org\/10.1155\/2013\/810969 .","DOI":"10.1155\/2013\/810969"},{"key":"34_CR16","doi-asserted-by":"crossref","unstructured":"Qin B, Deng H, Wu Q, Domingo-Ferrer J, Naccache D, Zhou Y (2015) Flexible attribute-based encryption applicable to secure e-healthcare records. International Journal of Information Security, vol. 14, nol. 1, Springer, Heidelberg, pp 1\u201313.","DOI":"10.1007\/s10207-014-0272-7"},{"key":"34_CR17","doi-asserted-by":"crossref","unstructured":"Hohenberger S, Waters B (2014) Online\/offline attribute-based encryption In: PKC\u201914, 293\u2013310.. Springer, Heidelberg.","DOI":"10.1007\/978-3-642-54631-0_17"},{"key":"34_CR18","doi-asserted-by":"crossref","unstructured":"Han J, Susilo W, Mu Y, Zhou J, Au MH (2014) PPDCP-ABE: Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption In: ESORICS\u201914, 73\u201390.. Springer, Heidelberg.","DOI":"10.1007\/978-3-319-11212-1_5"},{"key":"34_CR19","unstructured":"WordNet Documentation. http:\/\/wordnet.princeton.edu\/wordnet\/documentation\/ ."}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-015-0034-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13677-015-0034-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-015-0034-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,25]],"date-time":"2019-08-25T02:18:30Z","timestamp":1566699510000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.journalofcloudcomputing.com\/content\/4\/1\/10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5,17]]},"references-count":19,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,12]]}},"alternative-id":["34"],"URL":"https:\/\/doi.org\/10.1186\/s13677-015-0034-8","relation":{},"ISSN":["2192-113X"],"issn-type":[{"type":"electronic","value":"2192-113X"}],"subject":[],"published":{"date-parts":[[2015,5,17]]},"article-number":"10"}}