{"id":"https://openalex.org/W4414008213","doi":"https://doi.org/10.1109/jiot.2025.3606622","title":"Practical Multisource\u2013Multiclient Conjunctive Searchable Encryption With Forward and Backward Privacy for Cloud\u2013IoT","display_name":"Practical Multisource\u2013Multiclient Conjunctive Searchable Encryption With Forward and Backward Privacy for Cloud\u2013IoT","publication_year":2025,"publication_date":"2025-09-05","ids":{"openalex":"https://openalex.org/W4414008213","doi":"https://doi.org/10.1109/jiot.2025.3606622"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2025.3606622","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3606622","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5003812750","display_name":"Sensen Li","orcid":"https://orcid.org/0000-0001-7320-2410"},"institutions":[{"id":"https://openalex.org/I169689159","display_name":"PLA Information Engineering University","ror":"https://ror.org/00mm1qk40","country_code":"CN","type":"education","lineage":["https://openalex.org/I169689159"]},{"id":"https://openalex.org/I38877650","display_name":"Zhengzhou University","ror":"https://ror.org/04ypx8c21","country_code":"CN","type":"education","lineage":["https://openalex.org/I38877650"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Sensen Li","raw_affiliation_strings":["Department of Computer Science, Information Engineering University, Zhengzhou, China","Department of Computer Science, Information Engineer University, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Information Engineering University, Zhengzhou, China","institution_ids":["https://openalex.org/I169689159"]},{"raw_affiliation_string":"Department of Computer Science, Information Engineer University, Zhengzhou, China","institution_ids":["https://openalex.org/I169689159","https://openalex.org/I38877650"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100535032","display_name":"Yicai Huang","orcid":null},"institutions":[{"id":"https://openalex.org/I38877650","display_name":"Zhengzhou University","ror":"https://ror.org/04ypx8c21","country_code":"CN","type":"education","lineage":["https://openalex.org/I38877650"]},{"id":"https://openalex.org/I169689159","display_name":"PLA Information Engineering University","ror":"https://ror.org/00mm1qk40","country_code":"CN","type":"education","lineage":["https://openalex.org/I169689159"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yicai Huang","raw_affiliation_strings":["Department of Computer Science, Information Engineering University, Zhengzhou, China","Department of Computer Science, Information Engineer University, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Information Engineering University, Zhengzhou, China","institution_ids":["https://openalex.org/I169689159"]},{"raw_affiliation_string":"Department of Computer Science, Information Engineer University, Zhengzhou, China","institution_ids":["https://openalex.org/I169689159","https://openalex.org/I38877650"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005848828","display_name":"Zhengxin Fu","orcid":"https://orcid.org/0000-0001-8587-0942"},"institutions":[{"id":"https://openalex.org/I38877650","display_name":"Zhengzhou University","ror":"https://ror.org/04ypx8c21","country_code":"CN","type":"education","lineage":["https://openalex.org/I38877650"]},{"id":"https://openalex.org/I169689159","display_name":"PLA Information Engineering University","ror":"https://ror.org/00mm1qk40","country_code":"CN","type":"education","lineage":["https://openalex.org/I169689159"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhengxin Fu","raw_affiliation_strings":["Department of Computer Science, Information Engineering University, Zhengzhou, China","Department of Computer Science, Information Engineer University, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Information Engineering University, Zhengzhou, China","institution_ids":["https://openalex.org/I169689159"]},{"raw_affiliation_string":"Department of Computer Science, Information Engineer University, Zhengzhou, China","institution_ids":["https://openalex.org/I169689159","https://openalex.org/I38877650"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100659382","display_name":"Bin Yu","orcid":"https://orcid.org/0000-0003-1999-7413"},"institutions":[{"id":"https://openalex.org/I169689159","display_name":"PLA Information Engineering University","ror":"https://ror.org/00mm1qk40","country_code":"CN","type":"education","lineage":["https://openalex.org/I169689159"]},{"id":"https://openalex.org/I38877650","display_name":"Zhengzhou University","ror":"https://ror.org/04ypx8c21","country_code":"CN","type":"education","lineage":["https://openalex.org/I38877650"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bin Yu","raw_affiliation_strings":["Department of Computer Science, Information Engineering University, Zhengzhou, China","Department of Computer Science, Information Engineer University, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Information Engineering University, Zhengzhou, China","institution_ids":["https://openalex.org/I169689159"]},{"raw_affiliation_string":"Department of Computer Science, Information Engineer University, Zhengzhou, China","institution_ids":["https://openalex.org/I169689159","https://openalex.org/I38877650"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5003812750"],"corresponding_institution_ids":["https://openalex.org/I169689159","https://openalex.org/I38877650"],"apc_list":null,"apc_paid":null,"fwci":1.5567,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.87739793,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"12","issue":"23","first_page":"49820","last_page":"49842"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9804999828338623,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9804999828338623,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9660000205039978,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9487000107765198,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8595976829528809},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7566304206848145},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6814914345741272},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5223204493522644},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4641749858856201},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4442680776119232},{"id":"https://openalex.org/keywords/privacy-protection","display_name":"Privacy protection","score":0.4438285231590271},{"id":"https://openalex.org/keywords/privacy-software","display_name":"Privacy software","score":0.4134584069252014},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1066046953201294}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8595976829528809},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7566304206848145},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6814914345741272},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5223204493522644},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4641749858856201},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4442680776119232},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.4438285231590271},{"id":"https://openalex.org/C509729295","wikidata":"https://www.wikidata.org/wiki/Q7246032","display_name":"Privacy software","level":3,"score":0.4134584069252014},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1066046953201294}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2025.3606622","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3606622","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W1502708590","https://openalex.org/W1952573265","https://openalex.org/W1963071371","https://openalex.org/W2016575873","https://openalex.org/W2086763678","https://openalex.org/W2145426052","https://openalex.org/W2147929033","https://openalex.org/W2152516507","https://openalex.org/W2184702105","https://openalex.org/W2280248542","https://openalex.org/W2313589991","https://openalex.org/W2526481299","https://openalex.org/W2592956480","https://openalex.org/W2765463836","https://openalex.org/W2766707306","https://openalex.org/W2891020614","https://openalex.org/W2891871515","https://openalex.org/W2976097787","https://openalex.org/W2987992784","https://openalex.org/W3002682074","https://openalex.org/W3005805302","https://openalex.org/W3094474718","https://openalex.org/W3128530640","https://openalex.org/W3138969459","https://openalex.org/W3171942792","https://openalex.org/W4308410011","https://openalex.org/W4321021982","https://openalex.org/W4323349099","https://openalex.org/W4385516966","https://openalex.org/W4389370921","https://openalex.org/W4391725264","https://openalex.org/W4400121239","https://openalex.org/W4401726202","https://openalex.org/W4405183522"],"related_works":["https://openalex.org/W3022534164","https://openalex.org/W4396832952","https://openalex.org/W3015944045","https://openalex.org/W3013058036","https://openalex.org/W2769903624","https://openalex.org/W4225340788","https://openalex.org/W1591172238","https://openalex.org/W2951971312","https://openalex.org/W2972172135","https://openalex.org/W4300474583"],"abstract_inverted_index":{"Searchable":[0],"encryption":[1,28,122,164],"has":[2],"garnered":[3],"considerable":[4],"attention":[5],"for":[6,43],"its":[7,83],"ability":[8],"to":[9,12],"empower":[10],"users":[11],"perform":[13],"searches":[14,129],"on":[15,94,138],"encrypted":[16],"data":[17,35,38,108],"stored":[18],"remotely":[19],"without":[20],"compromising":[21],"confiden-tiality.":[22],"Multi-source":[23],"multi-client":[24,119],"(M/M)":[25],"searchable":[26,121],"symmetric":[27,161],"excels":[29],"in":[30,85,214],"efficiently":[31],"outsourcing":[32],"and":[33,134,145,158,172,184,204],"sharing":[34],"from":[36],"multiple":[37],"sources,":[39],"making":[40],"it":[41,75,91],"ideal":[42],"cloud-IoT":[44],"applications":[45],"with":[46,147],"numerous":[47],"terminal":[48],"devices.":[49],"However,":[50],"empirical":[51],"analysis":[52,192],"shows":[53],"that":[54,194],"the":[55,63,148,174,195,201],"recently":[56],"proposed":[57,196],"M/M":[58],"scheme,":[59,124],"despite":[60],"being":[61],"potentially":[62,101],"most":[64,218],"representative":[65],"scheme":[66,150],"currently":[67],"available,":[68],"still":[69],"confronts":[70],"two":[71],"primary":[72],"challenges.":[73],"First,":[74],"only":[76],"supports":[77],"single":[78],"keyword":[79],"searches,":[80],"which":[81,125],"constrains":[82],"applicability":[84],"more":[86],"complex":[87],"query":[88],"scenarios.":[89,219],"Second,":[90],"focuses":[92],"exclusively":[93],"forward":[95,133],"privacy":[96],"but":[97],"neglects":[98],"backward":[99,135],"privacy,":[100],"leaving":[102],"sensitive":[103],"information":[104],"vulnerable":[105],"during":[106],"dynamic":[107,160],"updates.":[109],"To":[110],"tackle":[111],"these":[112],"issues,":[113],"we":[114,141],"propose":[115],"a":[116],"new":[117],"multi-source":[118],"conjunctive":[120,128],"(MMCSE)":[123],"enables":[126],"non-interactive":[127],"while":[130],"ensur-ing":[131],"both":[132,178],"privacy.":[136],"Building":[137],"this":[139],"foun-dation,":[140],"further":[142],"bolster":[143],"security":[144,191],"functionality":[146],"enhanced":[149],"named":[151],"eMMCSE.":[152],"By":[153],"leveraging":[154],"puncturable":[155],"pseudorandom":[156],"functions":[157],"n-dimensional":[159],"hidden":[162],"vector":[163],"(n-DSHVE),":[165],"eMMCSE":[166],"effectively":[167],"minimizes":[168],"result":[169],"pattern":[170],"leakage":[171],"provides":[173],"revocation":[175,180,186],"mechanism,":[176],"supporting":[177],"coarse-grained":[179],"of":[181,187],"specific":[182],"clients":[183],"fine-grained":[185],"particular":[188],"records.":[189],"The":[190],"demonstrates":[193],"schemes":[197],"are":[198],"secure":[199],"against":[200],"adversarial":[202],"server":[203],"colluding":[205],"clients.":[206],"Addi-tionally,":[207],"experimental":[208],"results":[209],"highlight":[210],"their":[211],"marked":[212],"enhance-ments":[213],"search":[215],"efficiency":[216],"across":[217]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-20T23:13:51.555489","created_date":"2025-10-10T00:00:00"}
