{"id":"https://openalex.org/W3170984837","doi":"https://doi.org/10.1109/jiot.2021.3088296","title":"A Provably Secure and Efficient Range Query Scheme for Outsourced Encrypted Uncertain Data From Cloud-Based Internet of Things Systems","display_name":"A Provably Secure and Efficient Range Query Scheme for Outsourced Encrypted Uncertain Data From Cloud-Based Internet of Things Systems","publication_year":2021,"publication_date":"2021-06-10","ids":{"openalex":"https://openalex.org/W3170984837","doi":"https://doi.org/10.1109/jiot.2021.3088296","mag":"3170984837"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2021.3088296","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2021.3088296","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5021752932","display_name":"Cheng Guo","orcid":"https://orcid.org/0000-0001-7489-7381"},"institutions":[{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]},{"id":"https://openalex.org/I27357992","display_name":"Dalian University of Technology","ror":"https://ror.org/023hj5876","country_code":"CN","type":"education","lineage":["https://openalex.org/I27357992"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Cheng Guo","raw_affiliation_strings":["Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, Guilin, China","School of Software Technology and the Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province, Dalian University of Technology, Dalian, China"],"affiliations":[{"raw_affiliation_string":"Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, Guilin, China","institution_ids":["https://openalex.org/I5343935"]},{"raw_affiliation_string":"School of Software Technology and the Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province, Dalian University of Technology, Dalian, China","institution_ids":["https://openalex.org/I27357992"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018062609","display_name":"Shenghao Su","orcid":null},"institutions":[{"id":"https://openalex.org/I27357992","display_name":"Dalian University of Technology","ror":"https://ror.org/023hj5876","country_code":"CN","type":"education","lineage":["https://openalex.org/I27357992"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shenghao Su","raw_affiliation_strings":["School of Software Technology and the Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province, Dalian University of Technology, Dalian, China"],"affiliations":[{"raw_affiliation_string":"School of Software Technology and the Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province, Dalian University of Technology, Dalian, China","institution_ids":["https://openalex.org/I27357992"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001746807","display_name":"Kim\u2010Kwang Raymond Choo","orcid":"https://orcid.org/0000-0001-9208-5336"},"institutions":[{"id":"https://openalex.org/I170239107","display_name":"University of South Australia","ror":"https://ror.org/01p93h210","country_code":"AU","type":"education","lineage":["https://openalex.org/I170239107"]},{"id":"https://openalex.org/I45438204","display_name":"The University of Texas at San Antonio","ror":"https://ror.org/01kd65564","country_code":"US","type":"education","lineage":["https://openalex.org/I45438204"]}],"countries":["AU","US"],"is_corresponding":false,"raw_author_name":"Kim-Kwang Raymond Choo","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Department of Computer Science, and UniSA STEM, University of South Australia, Adelaide, SA, Australia","Department of Information Systems and Cyber Security, University of Texas at San Antonio, San Antonio, TX, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Department of Computer Science, and UniSA STEM, University of South Australia, Adelaide, SA, Australia","institution_ids":["https://openalex.org/I170239107"]},{"raw_affiliation_string":"Department of Information Systems and Cyber Security, University of Texas at San Antonio, San Antonio, TX, USA","institution_ids":["https://openalex.org/I45438204"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053932676","display_name":"Pengxu Tian","orcid":"https://orcid.org/0000-0001-5681-7288"},"institutions":[{"id":"https://openalex.org/I27357992","display_name":"Dalian University of Technology","ror":"https://ror.org/023hj5876","country_code":"CN","type":"education","lineage":["https://openalex.org/I27357992"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Pengxu Tian","raw_affiliation_strings":["School of Software Technology and the Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province, Dalian University of Technology, Dalian, China"],"affiliations":[{"raw_affiliation_string":"School of Software Technology and the Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province, Dalian University of Technology, Dalian, China","institution_ids":["https://openalex.org/I27357992"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102019389","display_name":"Xinyu Tang","orcid":"https://orcid.org/0000-0001-9221-154X"},"institutions":[{"id":"https://openalex.org/I27357992","display_name":"Dalian University of Technology","ror":"https://ror.org/023hj5876","country_code":"CN","type":"education","lineage":["https://openalex.org/I27357992"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xinyu Tang","raw_affiliation_strings":["School of Software Technology and the Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province, Dalian University of Technology, Dalian, China"],"affiliations":[{"raw_affiliation_string":"School of Software Technology and the Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province, Dalian University of Technology, Dalian, China","institution_ids":["https://openalex.org/I27357992"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5021752932"],"corresponding_institution_ids":["https://openalex.org/I27357992","https://openalex.org/I5343935"],"apc_list":null,"apc_paid":null,"fwci":1.9573,"has_fulltext":false,"cited_by_count":18,"citation_normalized_percentile":{"value":0.88498263,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"9","issue":"3","first_page":"1848","last_page":"1860"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9914000034332275,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8729430437088013},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7514276504516602},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6790760159492493},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.6121518611907959},{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.5919570922851562},{"id":"https://openalex.org/keywords/outsourcing","display_name":"Outsourcing","score":0.5621931552886963},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4877503514289856},{"id":"https://openalex.org/keywords/relevance","display_name":"Relevance (law)","score":0.47665244340896606},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4452435374259949},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3863217830657959},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.32874661684036255},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.29377713799476624},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.10637810826301575}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8729430437088013},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7514276504516602},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6790760159492493},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.6121518611907959},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.5919570922851562},{"id":"https://openalex.org/C46934059","wikidata":"https://www.wikidata.org/wiki/Q61515","display_name":"Outsourcing","level":2,"score":0.5621931552886963},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4877503514289856},{"id":"https://openalex.org/C158154518","wikidata":"https://www.wikidata.org/wiki/Q7310970","display_name":"Relevance (law)","level":2,"score":0.47665244340896606},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4452435374259949},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3863217830657959},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.32874661684036255},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.29377713799476624},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.10637810826301575},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2021.3088296","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2021.3088296","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1573300324","display_name":null,"funder_award_id":"61877077","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3623727191","display_name":null,"funder_award_id":"61871064","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W1561514023","https://openalex.org/W1895952394","https://openalex.org/W2024400846","https://openalex.org/W2041480327","https://openalex.org/W2042502381","https://openalex.org/W2050868968","https://openalex.org/W2074356711","https://openalex.org/W2102855375","https://openalex.org/W2110037957","https://openalex.org/W2115016714","https://openalex.org/W2125791539","https://openalex.org/W2132172731","https://openalex.org/W2145426052","https://openalex.org/W2147929033","https://openalex.org/W2165558283","https://openalex.org/W2192495285","https://openalex.org/W2422800230","https://openalex.org/W2558325443","https://openalex.org/W2619058717","https://openalex.org/W2765364525","https://openalex.org/W2776652484","https://openalex.org/W2795339516","https://openalex.org/W2807345103","https://openalex.org/W2950674756","https://openalex.org/W3008052621","https://openalex.org/W4233498442"],"related_works":["https://openalex.org/W4224216661","https://openalex.org/W2132360941","https://openalex.org/W3210347767","https://openalex.org/W2066014542","https://openalex.org/W67940504","https://openalex.org/W2024170198","https://openalex.org/W2358200898","https://openalex.org/W2325765407","https://openalex.org/W2152144666","https://openalex.org/W1819617256"],"abstract_inverted_index":{"The":[0,176],"outsourcing":[1],"of":[2,94,118,168],"data":[3,9,30,38,49,69,105,128,148],"is":[4,10,33,70,186],"becoming":[5],"increasingly":[6],"commonplace":[7],"as":[8,44],"constantly":[11],"been":[12],"synchronized":[13],"between":[14],"user":[15],"systems":[16],"(e.g.,":[17],"personal":[18],"computers":[19],"and":[20,23,48,80,113,129,155,164,178,188],"sensor":[21],"devices)":[22],"cloud":[24],"computing":[25],"servers.":[26],"However,":[27],"to":[28,35,40,103,106,110],"ensure":[29],"privacy,":[31,149],"it":[32],"necessary":[34],"encrypt":[36],"sensitive":[37],"prior":[39],"outsourcing.":[41],"Limitations":[42],"such":[43],"measurement,":[45],"network":[46],"delays,":[47],"obfuscation":[50],"may,":[51],"however,":[52],"result":[53],"in":[54],"uncertain":[55,68,88],"data.":[56,124],"Compared":[57],"with":[58],"searching":[59],"over":[60,85],"encrypted":[61,67,87],"certain":[62],"data,":[63,89,154],"processing":[64,114],"queries":[65],"for":[66,90],"more":[71],"challenging.":[72],"In":[73],"this":[74],"article,":[75],"we":[76,99,126],"propose":[77],"a":[78,107,141],"secure":[79,187],"efficient":[81,158],"range":[82],"query":[83],"scheme":[84,146],"outsourced":[86],"example,":[91],"from":[92],"Internet":[93],"Things":[95],"(IoT)":[96],"systems.":[97],"Specifically,":[98],"use":[100],"pivot":[101],"mapping":[102],"map":[104,131],"low-dimensional":[108],"space":[109],"facilitate":[111],"calculation":[112],"while":[115],"preserving":[116],"some":[117],"the":[119,123,151,162,166],"original":[120],"relevance":[121,152],"among":[122,153],"Additionally,":[125],"encode":[127],"then":[130],"codes":[132],"into":[133],"multiple":[134],"Bloom":[135],"filters":[136],"which":[137],"are":[138],"organized":[139],"by":[140],"binary":[142],"tree-based":[143],"index.":[144],"Our":[145],"achieves":[147],"hides":[150],"also":[156],"supports":[157],"queries.":[159],"We":[160],"analyze":[161],"security":[163],"evaluate":[165],"performance":[167],"our":[169,183],"approach":[170,185],"using":[171],"experiments":[172],"on":[173],"Microsoft":[174],"Azure.":[175],"analysis":[177],"experimental":[179],"results":[180],"demonstrate":[181],"that":[182],"proposed":[184],"efficient.":[189]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":7},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":1}],"updated_date":"2026-03-14T08:43:22.919905","created_date":"2025-10-10T00:00:00"}
