{"id":"https://openalex.org/W2901964657","doi":"https://doi.org/10.1109/iccnc.2019.8685554","title":"ESAS: An Efficient Semantic and Authorized Search Scheme over Encrypted Outsourced Data","display_name":"ESAS: An Efficient Semantic and Authorized Search Scheme over Encrypted Outsourced Data","publication_year":2019,"publication_date":"2019-02-01","ids":{"openalex":"https://openalex.org/W2901964657","doi":"https://doi.org/10.1109/iccnc.2019.8685554","mag":"2901964657"},"language":"en","primary_location":{"id":"doi:10.1109/iccnc.2019.8685554","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccnc.2019.8685554","pdf_url":null,"source":{"id":"https://openalex.org/S4306498526","display_name":"2019 International Conference on Computing, Networking and Communications (ICNC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 International Conference on Computing, Networking and Communications (ICNC)","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["arxiv","crossref","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/1811.06917","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100665614","display_name":"Xueyan Liu","orcid":"https://orcid.org/0000-0001-8918-0148"},"institutions":[{"id":"https://openalex.org/I153473198","display_name":"North China Electric Power University","ror":"https://ror.org/04qr5t414","country_code":"CN","type":"education","lineage":["https://openalex.org/I153473198"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xueyan Liu","raw_affiliation_strings":["School of Control and Computer Engineering, North China Electric Power University, Beijing, China","School of Control and Computer Engineering, North China Electric Power University, Beijing China"],"affiliations":[{"raw_affiliation_string":"School of Control and Computer Engineering, North China Electric Power University, Beijing, China","institution_ids":["https://openalex.org/I153473198"]},{"raw_affiliation_string":"School of Control and Computer Engineering, North China Electric Power University, Beijing China","institution_ids":["https://openalex.org/I153473198"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090064722","display_name":"Zhitao Guan","orcid":"https://orcid.org/0000-0003-0901-8621"},"institutions":[{"id":"https://openalex.org/I153473198","display_name":"North China Electric Power University","ror":"https://ror.org/04qr5t414","country_code":"CN","type":"education","lineage":["https://openalex.org/I153473198"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhitao Guan","raw_affiliation_strings":["School of Control and Computer Engineering, North China Electric Power University, Beijing, China","School of Control and Computer Engineering, North China Electric Power University, Beijing China"],"affiliations":[{"raw_affiliation_string":"School of Control and Computer Engineering, North China Electric Power University, Beijing, China","institution_ids":["https://openalex.org/I153473198"]},{"raw_affiliation_string":"School of Control and Computer Engineering, North China Electric Power University, Beijing China","institution_ids":["https://openalex.org/I153473198"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060514022","display_name":"Xiaojiang Du","orcid":"https://orcid.org/0000-0003-4235-9671"},"institutions":[{"id":"https://openalex.org/I84392919","display_name":"Temple University","ror":"https://ror.org/00kx1jb78","country_code":"US","type":"education","lineage":["https://openalex.org/I84392919"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xiaojiang Du","raw_affiliation_strings":["Department, Zhitao Guan of Computer and Information Sciences, Temple University, Philadelphia, PA, USA"],"affiliations":[{"raw_affiliation_string":"Department, Zhitao Guan of Computer and Information Sciences, Temple University, Philadelphia, PA, USA","institution_ids":["https://openalex.org/I84392919"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100634361","display_name":"Liehuang Zhu","orcid":"https://orcid.org/0000-0003-3277-3887"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liehuang Zhu","raw_affiliation_strings":["School of Computer, Beijing Institute of Technology, Beijing, China","Sch. of Comput., Beijing Inst. of Technol., Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]},{"raw_affiliation_string":"Sch. of Comput., Beijing Inst. of Technol., Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100619287","display_name":"Zhengtao Yu","orcid":"https://orcid.org/0000-0002-4012-461X"},"institutions":[{"id":"https://openalex.org/I10660446","display_name":"Kunming University of Science and Technology","ror":"https://ror.org/00xyeez13","country_code":"CN","type":"education","lineage":["https://openalex.org/I10660446"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhengtao Yu","raw_affiliation_strings":["School of Information Engineering and Automation, Kunming University of Science and Technology, Kunming, Yunnan, China","School of Information Engineering and Automation, Kunming University of Science and Technology, Kunming (China)"],"affiliations":[{"raw_affiliation_string":"School of Information Engineering and Automation, Kunming University of Science and Technology, Kunming, Yunnan, China","institution_ids":["https://openalex.org/I10660446"]},{"raw_affiliation_string":"School of Information Engineering and Automation, Kunming University of Science and Technology, Kunming (China)","institution_ids":["https://openalex.org/I10660446"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5076116273","display_name":"Yinglong Ma","orcid":"https://orcid.org/0000-0003-4732-4865"},"institutions":[{"id":"https://openalex.org/I153473198","display_name":"North China Electric Power University","ror":"https://ror.org/04qr5t414","country_code":"CN","type":"education","lineage":["https://openalex.org/I153473198"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yinglong Ma","raw_affiliation_strings":["School of Control and Computer Engineering, North China Electric Power University, Beijing, China","School of Control and Computer Engineering, North China Electric Power University, Beijing China"],"affiliations":[{"raw_affiliation_string":"School of Control and Computer Engineering, North China Electric Power University, Beijing, China","institution_ids":["https://openalex.org/I153473198"]},{"raw_affiliation_string":"School of Control and Computer Engineering, North China Electric Power University, Beijing China","institution_ids":["https://openalex.org/I153473198"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5100665614"],"corresponding_institution_ids":["https://openalex.org/I153473198"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.00471857,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9926000237464905,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9326000213623047,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7843403220176697},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7447952032089233},{"id":"https://openalex.org/keywords/permission","display_name":"Permission","score":0.6676768660545349},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.63606196641922},{"id":"https://openalex.org/keywords/semantic-security","display_name":"Semantic security","score":0.5157161355018616},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5062577128410339},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5010323524475098},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4640677571296692},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.3742755353450775},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.3266031742095947},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.2014070451259613},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.0725310742855072}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7843403220176697},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7447952032089233},{"id":"https://openalex.org/C2779089604","wikidata":"https://www.wikidata.org/wiki/Q7169333","display_name":"Permission","level":2,"score":0.6676768660545349},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.63606196641922},{"id":"https://openalex.org/C204806902","wikidata":"https://www.wikidata.org/wiki/Q2333581","display_name":"Semantic security","level":5,"score":0.5157161355018616},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5062577128410339},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5010323524475098},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4640677571296692},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.3742755353450775},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.3266031742095947},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2014070451259613},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0725310742855072},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1109/iccnc.2019.8685554","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccnc.2019.8685554","pdf_url":null,"source":{"id":"https://openalex.org/S4306498526","display_name":"2019 International Conference on Computing, Networking and Communications (ICNC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 International Conference on Computing, Networking and Communications (ICNC)","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:1811.06917","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1811.06917","pdf_url":"https://arxiv.org/pdf/1811.06917","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"mag:2901964657","is_oa":true,"landing_page_url":"https://arxiv.org/pdf/1811.06917","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"arXiv (Cornell University)","raw_type":null},{"id":"doi:10.48550/arxiv.1811.06917","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.1811.06917","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:1811.06917","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1811.06917","pdf_url":"https://arxiv.org/pdf/1811.06917","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.5199999809265137}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2901964657.pdf","grobid_xml":"https://content.openalex.org/works/W2901964657.grobid-xml"},"referenced_works_count":22,"referenced_works":["https://openalex.org/W1500196754","https://openalex.org/W1979493600","https://openalex.org/W1982626035","https://openalex.org/W1988169383","https://openalex.org/W2021079631","https://openalex.org/W2041480327","https://openalex.org/W2042220809","https://openalex.org/W2054701320","https://openalex.org/W2080765376","https://openalex.org/W2108072891","https://openalex.org/W2114337635","https://openalex.org/W2114597779","https://openalex.org/W2144754501","https://openalex.org/W2170018742","https://openalex.org/W2344811709","https://openalex.org/W2460736843","https://openalex.org/W2490265015","https://openalex.org/W2517389839","https://openalex.org/W2605965597","https://openalex.org/W2736904962","https://openalex.org/W6629862473","https://openalex.org/W6639514768"],"related_works":["https://openalex.org/W2964218693","https://openalex.org/W2924667697","https://openalex.org/W2596455370","https://openalex.org/W1988169383","https://openalex.org/W2886749079","https://openalex.org/W3003769519","https://openalex.org/W2380661091","https://openalex.org/W3188123618","https://openalex.org/W2993858828","https://openalex.org/W3006172505","https://openalex.org/W2895114036","https://openalex.org/W25322359","https://openalex.org/W2144754501","https://openalex.org/W2795339516","https://openalex.org/W2182927402","https://openalex.org/W2165589425","https://openalex.org/W3091952465","https://openalex.org/W1987271515","https://openalex.org/W2593509965","https://openalex.org/W3152636289"],"abstract_inverted_index":{"Nowadays,":[0],"a":[1],"large":[2],"amount":[3],"of":[4],"user":[5,35],"privacy-sensitive":[6],"data":[7,21,29,57],"is":[8,17,58,89],"outsourced":[9,87],"to":[10,44,60],"the":[11,20,34,40,51,64,74,138,146],"cloud":[12],"server":[13],"in":[14,54,127],"ciphertext,":[15],"which":[16,131],"provided":[18],"by":[19,27,93],"owners":[22],"and":[23,81,104,136],"can":[24,67,117,124,132],"be":[25,37,61,118,125],"accessed":[26],"authorized":[28],"users.":[30],"When":[31],"accessing":[32],"data,":[33,88],"should":[36],"assigned":[38],"with":[39,112],"access":[41,115],"permission":[42],"according":[43],"his":[45],"identities":[46],"or":[47],"attributes.":[48],"In":[49,91,120],"addition,":[50,121],"search":[52,65,99,111,122,134],"capabilities":[53],"encrypted":[55,86],"out-sourced":[56],"expected":[59],"enhanced,":[62],"i.e.,":[63],"results":[66],"better":[68],"present":[69],"user's":[70],"intentions.":[71],"To":[72],"address":[73],"above":[75],"issues,":[76],"ESAS,":[77,92],"an":[78,128],"Efficient":[79],"Semantic":[80],"Authorized":[82],"Search":[83],"scheme":[84],"over":[85],"proposed.":[90],"integrating":[94],"PRSCG":[95],"(the":[96],"privacy-preserving":[97],"ranked":[98],"based":[100],"on":[101],"conceptual":[102],"graph)":[103],"CP-ABE":[105],"(ciphertext":[106],"policy":[107],"attribute-based":[108],"encryption),":[109],"semantic":[110],"file-level":[113],"fine-grained":[114],"authorization":[116,123],"realized.":[119],"done":[126],"offline":[129],"manner,":[130],"improve":[133],"efficiency":[135],"reduce":[137],"response":[139],"time.":[140],"The":[141],"security":[142,150],"analysis":[143],"indicate":[144],"that":[145],"proposed":[147],"ESAS":[148],"meets":[149],"requirement.":[151]},"counts_by_year":[],"updated_date":"2026-03-10T16:38:18.471706","created_date":"2025-10-10T00:00:00"}
