{"id":"https://openalex.org/W2766749922","doi":"https://doi.org/10.1109/tcc.2017.2769645","title":"Achieving Secure and Efficient Dynamic Searchable Symmetric Encryption over Medical Cloud Data","display_name":"Achieving Secure and Efficient Dynamic Searchable Symmetric Encryption over Medical Cloud Data","publication_year":2017,"publication_date":"2017-11-03","ids":{"openalex":"https://openalex.org/W2766749922","doi":"https://doi.org/10.1109/tcc.2017.2769645","mag":"2766749922"},"language":"en","primary_location":{"id":"doi:10.1109/tcc.2017.2769645","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcc.2017.2769645","pdf_url":null,"source":{"id":"https://openalex.org/S2492498579","display_name":"IEEE Transactions on Cloud Computing","issn_l":"2168-7161","issn":["2168-7161","2372-0018"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Cloud Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://figshare.com/articles/journal_contribution/Achieving_secure_and_efficient_dynamic_searchable_symmetric_encryption_over_medical_cloud_data/20823355","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100325334","display_name":"Hongwei Li","orcid":"https://orcid.org/0000-0002-1961-7946"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Hongwei Li","raw_affiliation_strings":["School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China","Science and Technology on Communication Security Laboratory, Chengdu, China"],"raw_orcid":"https://orcid.org/0000-0002-1961-7946","affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]},{"raw_affiliation_string":"Science and Technology on Communication Security Laboratory, Chengdu, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015401377","display_name":"Yi Yang","orcid":"https://orcid.org/0000-0002-4547-1207"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yi Yang","raw_affiliation_strings":["School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113616242","display_name":"Yuanshun Dai","orcid":null},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuanshun Dai","raw_affiliation_strings":["School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005228053","display_name":"Shui Yu","orcid":"https://orcid.org/0000-0003-4485-6743"},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Shui Yu","raw_affiliation_strings":["School of Software, University of Technology Sydney, Australia"],"raw_orcid":"https://orcid.org/0000-0003-4485-6743","affiliations":[{"raw_affiliation_string":"School of Software, University of Technology Sydney, Australia","institution_ids":["https://openalex.org/I114017466"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5051297830","display_name":"Yong Xiang","orcid":"https://orcid.org/0000-0003-3545-7863"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Yong Xiang","raw_affiliation_strings":["School of Information Technology, Deakin University, Geelong, Australia"],"raw_orcid":"https://orcid.org/0000-0003-3545-7863","affiliations":[{"raw_affiliation_string":"School of Information Technology, Deakin University, Geelong, Australia","institution_ids":["https://openalex.org/I149704539"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100325334"],"corresponding_institution_ids":["https://openalex.org/I150229711"],"apc_list":null,"apc_paid":null,"fwci":13.1076,"has_fulltext":false,"cited_by_count":208,"citation_normalized_percentile":{"value":0.98925634,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"8","issue":"2","first_page":"484","last_page":"494"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9814000129699707,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9805999994277954,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8347231149673462},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8179968595504761},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7085561752319336},{"id":"https://openalex.org/keywords/symmetric-key-algorithm","display_name":"Symmetric-key algorithm","score":0.699242353439331},{"id":"https://openalex.org/keywords/outsourcing","display_name":"Outsourcing","score":0.6196872591972351},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.6023352742195129},{"id":"https://openalex.org/keywords/filesystem-level-encryption","display_name":"Filesystem-level encryption","score":0.5221574306488037},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5058664679527283},{"id":"https://openalex.org/keywords/client-side-encryption","display_name":"Client-side encryption","score":0.4881783127784729},{"id":"https://openalex.org/keywords/40-bit-encryption","display_name":"40-bit encryption","score":0.47912025451660156},{"id":"https://openalex.org/keywords/on-the-fly-encryption","display_name":"On-the-fly encryption","score":0.45325595140457153},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.441314160823822},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4347289204597473},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.43082892894744873},{"id":"https://openalex.org/keywords/cloud-storage","display_name":"Cloud storage","score":0.4289873242378235},{"id":"https://openalex.org/keywords/probabilistic-encryption","display_name":"Probabilistic encryption","score":0.4169575572013855},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.2866988480091095},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.09012439846992493}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8347231149673462},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8179968595504761},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7085561752319336},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.699242353439331},{"id":"https://openalex.org/C46934059","wikidata":"https://www.wikidata.org/wiki/Q61515","display_name":"Outsourcing","level":2,"score":0.6196872591972351},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.6023352742195129},{"id":"https://openalex.org/C18319499","wikidata":"https://www.wikidata.org/wiki/Q5448402","display_name":"Filesystem-level encryption","level":4,"score":0.5221574306488037},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5058664679527283},{"id":"https://openalex.org/C166501710","wikidata":"https://www.wikidata.org/wiki/Q5132476","display_name":"Client-side encryption","level":4,"score":0.4881783127784729},{"id":"https://openalex.org/C158215988","wikidata":"https://www.wikidata.org/wiki/Q4637271","display_name":"40-bit encryption","level":3,"score":0.47912025451660156},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.45325595140457153},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.441314160823822},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4347289204597473},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.43082892894744873},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.4289873242378235},{"id":"https://openalex.org/C54569210","wikidata":"https://www.wikidata.org/wiki/Q7246854","display_name":"Probabilistic encryption","level":3,"score":0.4169575572013855},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2866988480091095},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09012439846992493},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1109/tcc.2017.2769645","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcc.2017.2769645","pdf_url":null,"source":{"id":"https://openalex.org/S2492498579","display_name":"IEEE Transactions on Cloud Computing","issn_l":"2168-7161","issn":["2168-7161","2372-0018"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Cloud Computing","raw_type":"journal-article"},{"id":"pmh:oai:dro.deakin.edu.au:DU:30105139","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306401102","display_name":"Own your potential (DEAKIN)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I149704539","host_organization_name":"Deakin University","host_organization_lineage":["https://openalex.org/I149704539"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Journal Article"},{"id":"pmh:oai:figshare.com:article/20823355","is_oa":true,"landing_page_url":"https://figshare.com/articles/journal_contribution/Achieving_secure_and_efficient_dynamic_searchable_symmetric_encryption_over_medical_cloud_data/20823355","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},{"id":"pmh:oai:opus.lib.uts.edu.au:10453/147653","is_oa":false,"landing_page_url":"http://hdl.handle.net/10453/147653","pdf_url":null,"source":{"id":"https://openalex.org/S4306401357","display_name":"UTS ePRESS (University of Technology Sydney)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I114017466","host_organization_name":"University of Technology Sydney","host_organization_lineage":["https://openalex.org/I114017466"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Journal Article"}],"best_oa_location":{"id":"pmh:oai:figshare.com:article/20823355","is_oa":true,"landing_page_url":"https://figshare.com/articles/journal_contribution/Achieving_secure_and_efficient_dynamic_searchable_symmetric_encryption_over_medical_cloud_data/20823355","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1857941275","display_name":null,"funder_award_id":"ZYGX2015J056","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"},{"id":"https://openalex.org/G528812580","display_name":null,"funder_award_id":"61728102","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7186594515","display_name":null,"funder_award_id":"61772121","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8683849773","display_name":null,"funder_award_id":"61472065","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W44164607","https://openalex.org/W1512194687","https://openalex.org/W1542399824","https://openalex.org/W1579761987","https://openalex.org/W1582239555","https://openalex.org/W1589843374","https://openalex.org/W1704895987","https://openalex.org/W1965657003","https://openalex.org/W1969084955","https://openalex.org/W1988925670","https://openalex.org/W1993536048","https://openalex.org/W1996124278","https://openalex.org/W2006737181","https://openalex.org/W2011311335","https://openalex.org/W2012753837","https://openalex.org/W2014143000","https://openalex.org/W2016575873","https://openalex.org/W2041480327","https://openalex.org/W2054701320","https://openalex.org/W2100320843","https://openalex.org/W2109752230","https://openalex.org/W2117740674","https://openalex.org/W2118006580","https://openalex.org/W2118875948","https://openalex.org/W2132257180","https://openalex.org/W2139583278","https://openalex.org/W2146828512","https://openalex.org/W2147929033","https://openalex.org/W2148997402","https://openalex.org/W2152516507","https://openalex.org/W2161214567","https://openalex.org/W6682311248","https://openalex.org/W6683799570"],"related_works":["https://openalex.org/W4387191618","https://openalex.org/W4308784203","https://openalex.org/W3022099831","https://openalex.org/W4309584611","https://openalex.org/W2955476130","https://openalex.org/W2995433735","https://openalex.org/W2030246973","https://openalex.org/W4246652009","https://openalex.org/W2615041771","https://openalex.org/W2792250328"],"abstract_inverted_index":{"In":[0,16,63],"medical":[1,10,30,57,79],"cloud":[2,14,80],"computing,":[3],"a":[4,97],"patient":[5],"can":[6,104],"remotely":[7],"outsource":[8],"her":[9],"data":[11,27,31,38,58],"to":[12,24,49,95,135],"the":[13,26,29,37,43,85,122,137,145,170],"server.":[15],"this":[17,64],"case,":[18],"only":[19],"authorized":[20,50],"doctors":[21],"are":[22,116,157],"allowed":[23],"access":[25],"since":[28],"is":[32,39,47,59],"highly":[33],"sensitive.":[34],"Before":[35],"outsourcing,":[36],"commonly":[40],"encrypted,":[41],"where":[42],"corresponding":[44],"secret":[45],"key":[46,138],"sent":[48],"doctors.":[51],"However,":[52],"performing":[53],"searches":[54],"on":[55,175],"encrypted":[56],"difficult":[60],"without":[61],"decryption.":[62],"paper,":[65],"we":[66,83,130],"propose":[67,131],"two":[68],"Secure":[69],"and":[70,90,108,118,164,182],"Efficient":[71],"Dynamic":[72],"Searchable":[73],"Symmetric":[74],"Encryption":[75,92],"(SEDSSE)":[76],"schemes":[77,156,174],"over":[78],"data.":[81],"First,":[82],"utilize":[84],"secure":[86],"k-Nearest":[87],"Neighbor":[88],"(kNN)":[89],"Attribute-Based":[91],"(ABE)":[93],"techniques":[94],"construct":[96],"dynamic":[98,125],"searchable":[99,126,148],"symmetric":[100,127],"encryption":[101,149],"scheme,":[102],"which":[103,141],"achieve":[105],"forward":[106],"privacy":[107,110],"backward":[109],"simultaneously.":[111],"These":[112],"tow":[113],"security":[114],"properties":[115],"vital":[117],"very":[119],"challenging":[120],"in":[121,144,159],"area":[123],"of":[124,161,172],"encryption.":[128],"Then,":[129],"an":[132],"enhanced":[133],"scheme":[134],"solve":[136],"sharing":[139],"problem":[140],"widely":[142],"exists":[143],"kNN":[146],"based":[147],"scheme.":[150],"Compared":[151],"with":[152],"existing":[153],"proposals,":[154],"our":[155,173],"better":[158],"terms":[160],"storage,":[162],"search":[163],"updating":[165],"complexity.":[166],"Extensive":[167],"experiments":[168],"demonstrate":[169],"efficiency":[171],"storage":[176],"overhead,":[177],"index":[178],"building,":[179],"trapdoor":[180],"generating":[181],"query.":[183]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":16},{"year":2024,"cited_by_count":22},{"year":2023,"cited_by_count":30},{"year":2022,"cited_by_count":41},{"year":2021,"cited_by_count":33},{"year":2020,"cited_by_count":27},{"year":2019,"cited_by_count":21},{"year":2018,"cited_by_count":15}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
