{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T04:04:52Z","timestamp":1760241892178,"version":"build-2065373602"},"reference-count":34,"publisher":"MDPI AG","issue":"11","license":[{"start":{"date-parts":[[2018,10,24]],"date-time":"2018-10-24T00:00:00Z","timestamp":1540339200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Key R&amp;D Program of China","award":["2017YFB0802300"],"award-info":[{"award-number":["2017YFB0802300"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772403","U1401251"],"award-info":[{"award-number":["61772403","U1401251"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Natural Science Basic Research Plan in Shaanxi Province of China","award":["2017JM6004"],"award-info":[{"award-number":["2017JM6004"]}]},{"name":"National 111 Program of China","award":["B16037","B08038"],"award-info":[{"award-number":["B16037","B08038"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Edge computing is an extension of cloud computing that enables messages to be acquired and processed at low cost. Many terminal devices are being deployed in the edge network to sense and deal with the massive data. By migrating part of the computing tasks from the original cloud computing model to the edge device, the message is running on computing resources close to the data source. The edge computing model can effectively reduce the pressure on the cloud computing center and lower the network bandwidth consumption. However, the security and privacy issues in edge computing are worth noting. In this paper, we propose an efficient auto-correction retrieval scheme for data management in edge computing, named EARS-DM. With automatic error correction for the query keywords instead of similar words extension, EARS-DM can tolerate spelling mistakes and reduce the complexity of index storage space. By the combination of TF-IDF value of keywords and the syntactic weight of query keywords, keywords who are more important will obtain higher relevance scores. We construct an R-tree index building with the encrypted keywords and the children nodes of which are the encrypted identifier FID and Bloom filter BF of files who contain this keyword. The secure index will be uploaded to the edge computing and the search phrase will be performed by the edge computing which is close to the data source. Then EDs sort the matching encrypted file identifier FID by relevance scores and upload them to the cloud server (CS). Performance analysis with actual data indicated that our scheme is efficient and accurate.<\/jats:p>","DOI":"10.3390\/s18113616","type":"journal-article","created":{"date-parts":[[2018,10,26]],"date-time":"2018-10-26T03:16:16Z","timestamp":1540523776000},"page":"3616","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["EARS-DM: Efficient Auto Correction Retrieval Scheme for Data Management in Edge Computing"],"prefix":"10.3390","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6870-6657","authenticated-orcid":false,"given":"Kai","family":"Fan","sequence":"first","affiliation":[{"name":"State Key Laboratory of Integrated Service Networks, Xidian University, Xi\u2019an 710071, China"}]},{"given":"Jie","family":"Yin","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Integrated Service Networks, Xidian University, Xi\u2019an 710071, China"}]},{"given":"Kuan","family":"Zhang","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Nebraska-Lincoln, NE, 68588 USA"}]},{"given":"Hui","family":"Li","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Integrated Service Networks, Xidian University, Xi\u2019an 710071, China"}]},{"given":"Yintang","family":"Yang","sequence":"additional","affiliation":[{"name":"Key Laboratory of the Ministry of Education for Wide Band-Gap Semiconductor Materials and Devices, Xidian University, Xi\u2019an 710071, China"}]}],"member":"1968","published-online":{"date-parts":[[2018,10,24]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Foster, I., Zhao, Y., Raicu, I., and Lu, S. (2008, January 12\u201316). Cloud computing and grid computing 360-degree compared. Proceedings of the 2008 Grid Computing Environments, Austin, TX, USA.","DOI":"10.1109\/GCE.2008.4738445"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1109\/MC.2016.145","article-title":"The promise of edge computing","volume":"49","author":"Shi","year":"2016","journal-title":"Computer"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"680","DOI":"10.1016\/j.future.2016.11.009","article-title":"Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges","volume":"78","author":"Roman","year":"2018","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Cui, R., Zhang, Y., and Li, N. (2017). The study of searchable encryption mechanism. Recent Dev. Intell. Comput. Commun. Devices, 241\u2013248.","DOI":"10.1007\/978-981-10-8944-2_29"},{"key":"ref_5","unstructured":"Liu, Q., and Liu, A. (2017). On the hybrid using of unicast-broadcast in wireless sensor networks. Comput. Electr. Eng., 1\u201319."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1109\/MCOM.2018.1700909","article-title":"Saving energy on the edge: In-memory caching for multi-tier heterogeneous networks","volume":"56","author":"Xu","year":"2018","journal-title":"IEEE Commun. Mag."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"774","DOI":"10.1109\/LWC.2017.2740927","article-title":"Performance guaranteed computation offloading for mobile-edge cloud computing","volume":"6","author":"Tao","year":"2017","journal-title":"IEEE Wirel. Commun. Lett."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1109\/MWC.2018.1700315","article-title":"ECCN: Orchestration of edge-centric computing and content-centric networking in the 5G radio access network","volume":"25","author":"Li","year":"2018","journal-title":"IEEE Wirel. Commun."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"21482","DOI":"10.1109\/ACCESS.2018.2825250","article-title":"Construction of large-scale low-cost delivery infrastructure using vehicular networks","volume":"6","author":"Liu","year":"2018","journal-title":"IEEE Access"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"528","DOI":"10.1016\/j.future.2016.11.012","article-title":"Ontology-based data semantic management and application in IoT-and cloud-enabled smart homes","volume":"76","author":"Tao","year":"2017","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1109\/MNET.2018.1700202","article-title":"Learning IoT in edge: Deep learning for the internet of things with edge computing","volume":"32","author":"Li","year":"2018","journal-title":"IEEE Netw."},{"key":"ref_12","unstructured":"Song, D.X., Wagner, D., and Perrig, A. (2000, January 14\u201317). Practical techniques for searches on encrypted data. Proceedings of the 2000 IEEE Symposium on Security and Privacy, Berkeley, CA, USA."},{"key":"ref_13","first-page":"216","article-title":"Secure indexes","volume":"2003","author":"Goh","year":"2003","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Boneh, D., Di Crescenzo, G., Ostrovsky, R., and Persiano, G. (2004, January 2\u20136). Public key encryption with keyword search. Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland.","DOI":"10.1007\/978-3-540-24676-3_30"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Park, H.A., Byun, J.W., and Lee, D.H. (2005, January 22\u201326). Secure index search for groups. Proceedings of the International Conference on Trust, Privacy and Security in Digital Business, Copenhagen, Denmark.","DOI":"10.1007\/11537878_14"},{"key":"ref_16","first-page":"535","article-title":"Conjunctive, subset, and range queries on encrypted data","volume":"4392","author":"Boneh","year":"2007","journal-title":"Theor. Cryptogr."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1109\/TPDS.2013.45","article-title":"Privacy-preserving multi-keyword ranked search over encrypted cloud data","volume":"25","author":"Cao","year":"2014","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Ji, S., Li, G., Li, C., and Feng, J. (2009, January 20\u201324). Efficient interactive fuzzy keyword search. Proceedings of the 18th International Conference on World Wide Web, Madrid, Spain.","DOI":"10.1145\/1526709.1526760"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Wang, C., Ren, K., Yu, S., and Urs, K.M.R. (2012, January 25\u201330). Achieving usable and privacy-assured similarity search over outsourced cloud data. Proceedings of the 2012 Proceedings IEEE INFOCOM, Orlando, FL, USA.","DOI":"10.1109\/INFCOM.2012.6195784"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Liu, C., Zhu, L., Li, L., and Tan, Y. (2011, January 15\u201317). Fuzzy keyword search on encrypted cloud storage data with small index. Proceedings of the 2011 IEEE International Conference on Cloud Computing and Intelligence Systems (CCIS), Beijing, China.","DOI":"10.1109\/CCIS.2011.6045073"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"667","DOI":"10.2298\/CSIS121104028W","article-title":"Efficient verifiable fuzzy keyword search over encrypted data in cloud computing","volume":"10","author":"Wang","year":"2013","journal-title":"Comput. Sci. Inf. Syst."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"2706","DOI":"10.1109\/TIFS.2016.2596138","article-title":"Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement","volume":"11","author":"Fu","year":"2016","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"2986","DOI":"10.1109\/TIFS.2017.2730365","article-title":"Enabling central keyword-based semantic extension search over encrypted outsourced data","volume":"12","author":"Fu","year":"2017","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"433","DOI":"10.1016\/j.future.2017.09.030","article-title":"Controllable keyword search scheme supporting multiple users","volume":"81","author":"Ye","year":"2018","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"3008","DOI":"10.1109\/JIOT.2017.2779124","article-title":"Practical attribute-based multi-keyword search scheme in mobile crowdsourcing","volume":"5","author":"Miao","year":"2017","journal-title":"IEEE Internet Things J."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Fan, K., Yin, J., Wang, J., Li, H., and Yang, Y. (2017, January 4\u20138). Multi-Keyword Fuzzy and Sortable Ciphertext Retrieval Scheme for Big Data. Proceedings of the GLOBECOM 2017\u20142017 IEEE Global Communications Conference, Singapore.","DOI":"10.1109\/GLOCOM.2017.8254990"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1109\/MNET.2018.1700327","article-title":"Secure and Efficient Privacy-Preserving Ciphertext Retrieval in Connected Vehicular Cloud Computing","volume":"32","author":"Fan","year":"2018","journal-title":"IEEE Netw."},{"key":"ref_28","unstructured":"Witten, I.H., Moffat, A., and Bell, T.C. (1999). Managing Gigabytes: Compressing and Indexing Documents and Images, Morgan Kaufmann."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Pal, S.K., Sardana, P., and Sardana, A. (2014, January 5\u20137). Efficient search on encrypted data using bloom filter. Proceedings of the 2014 International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, India.","DOI":"10.1109\/IndiaCom.2014.6828170"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Guttman, A. (1984). R-Trees: A Dynamic Index Structure for Spatial Searching, ACM.","DOI":"10.1145\/602264.602266"},{"key":"ref_31","first-page":"449","article-title":"Generating typed dependency parses from phrase structure parses","volume":"6","author":"MacCartney","year":"2006","journal-title":"Proc. LREC"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"377","DOI":"10.1145\/146370.146380","article-title":"Techniques for automatically correcting words in text","volume":"24","author":"Kukich","year":"1992","journal-title":"ACM Comput. Surv."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Wang, C., Cao, N., Li, J., Ren, K., and Lou, W. (2010, January 21\u201325). Secure ranked keyword search over encrypted cloud data. Proceedings of the 2010 IEEE 30th International Conference on Distributed Computing Systems, Genova, Italy.","DOI":"10.1109\/ICDCS.2010.34"},{"key":"ref_34","unstructured":"Chen, J., He, K., Deng, L., Yuan, Q., Du, R., Xiang, Y., and Wu, J. (2017). EliMFS: Achieving Efficient, Leakage-resilient, and Multi-keyword Fuzzy Search on Encrypted Cloud Data. IEEE Trans. Serv. Comput."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/18\/11\/3616\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T15:26:03Z","timestamp":1760196363000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/18\/11\/3616"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,24]]},"references-count":34,"journal-issue":{"issue":"11","published-online":{"date-parts":[[2018,11]]}},"alternative-id":["s18113616"],"URL":"https:\/\/doi.org\/10.3390\/s18113616","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2018,10,24]]}}}