{"id":"https://openalex.org/W3196527158","doi":"https://doi.org/10.1109/jiot.2021.3110300","title":"Privacy-Preserving Keyword Similarity Search Over Encrypted Spatial Data in Cloud Computing","display_name":"Privacy-Preserving Keyword Similarity Search Over Encrypted Spatial Data in Cloud Computing","publication_year":2021,"publication_date":"2021-09-06","ids":{"openalex":"https://openalex.org/W3196527158","doi":"https://doi.org/10.1109/jiot.2021.3110300","mag":"3196527158"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2021.3110300","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2021.3110300","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5089593844","display_name":"Fuyuan Song","orcid":"https://orcid.org/0000-0002-0784-7007"},"institutions":[{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"education","lineage":["https://openalex.org/I151746483"]},{"id":"https://openalex.org/I16609230","display_name":"Hunan University","ror":"https://ror.org/05htk5m33","country_code":"CN","type":"education","lineage":["https://openalex.org/I16609230"]}],"countries":["CA","CN"],"is_corresponding":true,"raw_author_name":"Fuyuan Song","raw_affiliation_strings":["College of Computer Science and Electronic Engineering, Hunan University, Changsha, China","Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, Canada"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Electronic Engineering, Hunan University, Changsha, China","institution_ids":["https://openalex.org/I16609230"]},{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, Canada","institution_ids":["https://openalex.org/I151746483"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035491991","display_name":"Zheng Qin","orcid":"https://orcid.org/0000-0003-0877-3887"},"institutions":[{"id":"https://openalex.org/I16609230","display_name":"Hunan University","ror":"https://ror.org/05htk5m33","country_code":"CN","type":"education","lineage":["https://openalex.org/I16609230"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zheng Qin","raw_affiliation_strings":["College of Computer Science and Electronic Engineering, Hunan University, Changsha, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Electronic Engineering, Hunan University, Changsha, China","institution_ids":["https://openalex.org/I16609230"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048975561","display_name":"Liang Xue","orcid":"https://orcid.org/0000-0001-8069-3182"},"institutions":[{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"education","lineage":["https://openalex.org/I151746483"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Liang Xue","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, Canada","institution_ids":["https://openalex.org/I151746483"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081463234","display_name":"Jixin Zhang","orcid":"https://orcid.org/0000-0001-6890-8953"},"institutions":[{"id":"https://openalex.org/I74525822","display_name":"Hubei University of Technology","ror":"https://ror.org/02d3fj342","country_code":"CN","type":"education","lineage":["https://openalex.org/I74525822"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jixin Zhang","raw_affiliation_strings":["School of Computer Science, Hubei University of Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Hubei University of Technology, Wuhan, China","institution_ids":["https://openalex.org/I74525822"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083787204","display_name":"Xiaodong Lin","orcid":"https://orcid.org/0000-0001-8916-6645"},"institutions":[{"id":"https://openalex.org/I79817857","display_name":"University of Guelph","ror":"https://ror.org/01r7awg59","country_code":"CA","type":"education","lineage":["https://openalex.org/I79817857"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Xiaodong Lin","raw_affiliation_strings":["School of Computer Science, University of Guelph, Guelph, Canada"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, University of Guelph, Guelph, Canada","institution_ids":["https://openalex.org/I79817857"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100773343","display_name":"Xuemin Shen","orcid":"https://orcid.org/0000-0002-4140-287X"},"institutions":[{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"education","lineage":["https://openalex.org/I151746483"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Xuemin Shen","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, Canada","institution_ids":["https://openalex.org/I151746483"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5089593844"],"corresponding_institution_ids":["https://openalex.org/I151746483","https://openalex.org/I16609230"],"apc_list":null,"apc_paid":null,"fwci":4.6187,"has_fulltext":false,"cited_by_count":53,"citation_normalized_percentile":{"value":0.95559107,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":100},"biblio":{"volume":"9","issue":"8","first_page":"6184","last_page":"6198"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9778000116348267,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8401127457618713},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6540027260780334},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6255004405975342},{"id":"https://openalex.org/keywords/range-query","display_name":"Range query (database)","score":0.5245157480239868},{"id":"https://openalex.org/keywords/web-search-query","display_name":"Web search query","score":0.45008012652397156},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.44252145290374756},{"id":"https://openalex.org/keywords/nearest-neighbor-search","display_name":"Nearest neighbor search","score":0.4345744848251343},{"id":"https://openalex.org/keywords/outsourcing","display_name":"Outsourcing","score":0.41845089197158813},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.4163472354412079},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.37013357877731323},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.36465492844581604},{"id":"https://openalex.org/keywords/search-engine","display_name":"Search engine","score":0.22340288758277893},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.18710947036743164},{"id":"https://openalex.org/keywords/web-query-classification","display_name":"Web query classification","score":0.13840162754058838}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8401127457618713},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6540027260780334},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6255004405975342},{"id":"https://openalex.org/C136736807","wikidata":"https://www.wikidata.org/wiki/Q818943","display_name":"Range query (database)","level":5,"score":0.5245157480239868},{"id":"https://openalex.org/C164120249","wikidata":"https://www.wikidata.org/wiki/Q995982","display_name":"Web search query","level":3,"score":0.45008012652397156},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.44252145290374756},{"id":"https://openalex.org/C116738811","wikidata":"https://www.wikidata.org/wiki/Q608751","display_name":"Nearest neighbor search","level":2,"score":0.4345744848251343},{"id":"https://openalex.org/C46934059","wikidata":"https://www.wikidata.org/wiki/Q61515","display_name":"Outsourcing","level":2,"score":0.41845089197158813},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.4163472354412079},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.37013357877731323},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.36465492844581604},{"id":"https://openalex.org/C97854310","wikidata":"https://www.wikidata.org/wiki/Q19541","display_name":"Search engine","level":2,"score":0.22340288758277893},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.18710947036743164},{"id":"https://openalex.org/C118689300","wikidata":"https://www.wikidata.org/wiki/Q7978614","display_name":"Web query classification","level":4,"score":0.13840162754058838},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2021.3110300","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2021.3110300","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G251628540","display_name":null,"funder_award_id":"61772191","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2540788264","display_name":null,"funder_award_id":"61902123","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G494063011","display_name":null,"funder_award_id":"62002112","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322725","display_name":"China Scholarship Council","ror":"https://ror.org/04atp4p48"},{"id":"https://openalex.org/F4320334593","display_name":"Natural Sciences and Engineering Research Council of Canada","ror":"https://ror.org/01h531d29"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":44,"referenced_works":["https://openalex.org/W1519321993","https://openalex.org/W1980403034","https://openalex.org/W2031533839","https://openalex.org/W2041480327","https://openalex.org/W2078401527","https://openalex.org/W2114486350","https://openalex.org/W2116626915","https://openalex.org/W2154448764","https://openalex.org/W2282819945","https://openalex.org/W2293642771","https://openalex.org/W2317269620","https://openalex.org/W2342635042","https://openalex.org/W2505406653","https://openalex.org/W2523401173","https://openalex.org/W2592546899","https://openalex.org/W2603469204","https://openalex.org/W2770373332","https://openalex.org/W2783225074","https://openalex.org/W2791390287","https://openalex.org/W2807091904","https://openalex.org/W2883150186","https://openalex.org/W2889349423","https://openalex.org/W2911553799","https://openalex.org/W2920782418","https://openalex.org/W2947538082","https://openalex.org/W2950815277","https://openalex.org/W2953030092","https://openalex.org/W2962888775","https://openalex.org/W2964280086","https://openalex.org/W2982964071","https://openalex.org/W2989596860","https://openalex.org/W3002779531","https://openalex.org/W3016824677","https://openalex.org/W3033597179","https://openalex.org/W3037789107","https://openalex.org/W3046946952","https://openalex.org/W3081084450","https://openalex.org/W3092302056","https://openalex.org/W3135955057","https://openalex.org/W3158107828","https://openalex.org/W3160147183","https://openalex.org/W3171173903","https://openalex.org/W3190854914","https://openalex.org/W6712419705"],"related_works":["https://openalex.org/W2405216906","https://openalex.org/W924614198","https://openalex.org/W2506818298","https://openalex.org/W2615705047","https://openalex.org/W1995504712","https://openalex.org/W1992367047","https://openalex.org/W1969396192","https://openalex.org/W1480566255","https://openalex.org/W1497288369","https://openalex.org/W343687854"],"abstract_inverted_index":{"With":[0],"the":[1,10,14,25,33,41,57,65,71,82,125,154,176,192,229],"proliferation":[2],"of":[3,16,75,81,178,210,231],"cloud":[4,21,42,193],"computing,":[5],"data":[6,12,51,58,67,89,130,232],"owners":[7,52,59,233],"can":[8,117],"outsource":[9],"spatial":[11,66,88,98,129,143,200,240],"from":[13],"Internet":[15],"Things":[17],"devices":[18],"to":[19,23,123,182,195],"a":[20,110,141,168,204],"server":[22,43,194],"enjoy":[24],"pay-as-you-go":[26],"storage":[27],"resources":[28],"and":[29,53,60,68,73,94,157,180,185,213,220,226,234],"location-based":[30],"services.":[31],"However,":[32],"outsourced":[34],"services":[35],"may":[36,44],"raise":[37],"privacy":[38,230],"concerns,":[39],"since":[40],"not":[45,96],"be":[46],"fully":[47],"trusted":[48],"for":[49,199],"both":[50],"search":[54,61,90,93,100,126,146,202,235],"users.":[55],"If":[56],"users":[62,236],"conventionally":[63],"encrypt":[64],"query":[69,76,113],"requests,":[70],"efficiency":[72],"functionality":[74],"processing":[77],"are":[78],"weakened.":[79],"Most":[80],"existing":[83],"works":[84],"only":[85],"focus":[86],"on":[87,137],"or":[91],"keyword":[92,99,144,201,241],"do":[95],"consider":[97],"over":[101],"encrypted":[102],"data.":[103],"In":[104],"this":[105],"article,":[106],"we":[107,139],"first":[108],"design":[109],"geometric":[111,121],"range":[112,122],"(GRQ)":[114],"scheme,":[115],"which":[116,172],"generate":[118],"an":[119,161],"arbitrary":[120],"fit":[124],"user\u2019s":[127],"desired":[128],"while":[131,237],"protecting":[132],"location":[133],"privacy.":[134],"Furthermore,":[135],"based":[136],"GRQ,":[138],"propose":[140],"multidimensional":[142],"similarity":[145],"scheme":[147],"with":[148],"access":[149,162,187],"control":[150,163],"(MSSAC)":[151],"by":[152,167,207],"integrating":[153],"polynomial":[155,170],"function":[156],"matrix":[158,214],"transformation.":[159],"Specifically,":[160],"strategy":[164],"is":[165,173],"defined":[166],"role-based":[169],"function,":[171],"embedded":[174],"in":[175,203],"vectors":[177],"indices":[179],"trapdoors":[181],"achieve":[183],"efficient":[184,239],"lightweight":[186],"control.":[188],"Moreover,":[189],"MSSAC":[190,227],"enables":[191],"execute":[196],"compute-then-compare":[197],"operations":[198],"privacy-preserving":[205],"manner":[206],"leveraging":[208],"techniques":[209],"randomizable":[211],"permutation":[212],"multiplication.":[215],"The":[216],"formal":[217],"security":[218],"analyses":[219],"extensive":[221],"experiments":[222],"demonstrate":[223],"that":[224],"GRQ":[225],"preserve":[228],"achieving":[238],"search.":[242]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":16},{"year":2024,"cited_by_count":11},{"year":2023,"cited_by_count":15},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":3}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
