{"id":"https://openalex.org/W3179996071","doi":"https://doi.org/10.1109/tcc.2021.3093304","title":"Verifiable and Dynamic Multi-Keyword Search Over Encrypted Cloud Data Using Bitmap","display_name":"Verifiable and Dynamic Multi-Keyword Search Over Encrypted Cloud Data Using Bitmap","publication_year":2021,"publication_date":"2021-07-01","ids":{"openalex":"https://openalex.org/W3179996071","doi":"https://doi.org/10.1109/tcc.2021.3093304","mag":"3179996071"},"language":"en","primary_location":{"id":"doi:10.1109/tcc.2021.3093304","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcc.2021.3093304","pdf_url":null,"source":{"id":"https://openalex.org/S2492498579","display_name":"IEEE Transactions on Cloud Computing","issn_l":"2168-7161","issn":["2168-7161","2372-0018"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Cloud Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102017758","display_name":"Feng Li","orcid":"https://orcid.org/0000-0002-8294-7606"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Feng Li","raw_affiliation_strings":["School of Cyber Engineering, Xidian University, Xi&#x0027;an, Shaanxi, China"],"raw_orcid":"https://orcid.org/0000-0002-8294-7606","affiliations":[{"raw_affiliation_string":"School of Cyber Engineering, Xidian University, Xi&#x0027;an, Shaanxi, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012016098","display_name":"Jianfeng Ma","orcid":"https://orcid.org/0000-0003-4251-1143"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianfeng Ma","raw_affiliation_strings":["Shaanxi Key Laboratory of Network and System Security, School of Cyber Engineering, Xidian University, Xi&#x0027;an, Shaanxi, China"],"raw_orcid":"https://orcid.org/0000-0003-4251-1143","affiliations":[{"raw_affiliation_string":"Shaanxi Key Laboratory of Network and System Security, School of Cyber Engineering, Xidian University, Xi&#x0027;an, Shaanxi, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102885964","display_name":"Yinbin Miao","orcid":null},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yinbin Miao","raw_affiliation_strings":["School of Cyber Engineering, Xidian University, Xi&#x0027;an, Shaanxi, China"],"raw_orcid":"https://orcid.org/0000-0001-5437-3572","affiliations":[{"raw_affiliation_string":"School of Cyber Engineering, Xidian University, Xi&#x0027;an, Shaanxi, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108054661","display_name":"Qi Jiang","orcid":"https://orcid.org/0000-0002-0894-4992"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qi Jiang","raw_affiliation_strings":["School of Cyber Engineering, Xidian University, Xi&#x0027;an, Shaanxi, China"],"raw_orcid":"https://orcid.org/0000-0002-0894-4992","affiliations":[{"raw_affiliation_string":"School of Cyber Engineering, Xidian University, Xi&#x0027;an, Shaanxi, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058120371","display_name":"Ximeng Liu","orcid":"https://orcid.org/0000-0002-4238-3295"},"institutions":[{"id":"https://openalex.org/I80947539","display_name":"Fuzhou University","ror":"https://ror.org/011xvna82","country_code":"CN","type":"education","lineage":["https://openalex.org/I80947539"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ximeng Liu","raw_affiliation_strings":["Key Laboratory of Information Security of Network Systems, College of Mathematics and Computer Science, Fuzhou University, Fuzhou, Fujian, China"],"raw_orcid":"https://orcid.org/0000-0002-4238-3295","affiliations":[{"raw_affiliation_string":"Key Laboratory of Information Security of Network Systems, College of Mathematics and Computer Science, Fuzhou University, Fuzhou, Fujian, China","institution_ids":["https://openalex.org/I80947539"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001746807","display_name":"Kim\u2010Kwang Raymond Choo","orcid":"https://orcid.org/0000-0001-9208-5336"},"institutions":[{"id":"https://openalex.org/I45438204","display_name":"The University of Texas at San Antonio","ror":"https://ror.org/01kd65564","country_code":"US","type":"education","lineage":["https://openalex.org/I45438204"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kim-Kwang Raymond Choo","raw_affiliation_strings":["Department of Information Systems and Cyber Security, The University of Texas at San Antonio, San Antonio, TX, USA"],"raw_orcid":"https://orcid.org/0000-0001-9208-5336","affiliations":[{"raw_affiliation_string":"Department of Information Systems and Cyber Security, The University of Texas at San Antonio, San Antonio, TX, USA","institution_ids":["https://openalex.org/I45438204"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5102017758"],"corresponding_institution_ids":["https://openalex.org/I149594827"],"apc_list":null,"apc_paid":null,"fwci":3.3596,"has_fulltext":false,"cited_by_count":31,"citation_normalized_percentile":{"value":0.93450795,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":"11","issue":"1","first_page":"336","last_page":"348"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9927999973297119,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8062553405761719},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.801415741443634},{"id":"https://openalex.org/keywords/bitmap","display_name":"Bitmap","score":0.782992959022522},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7283756136894226},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.6549647450447083},{"id":"https://openalex.org/keywords/keyword-search","display_name":"Keyword search","score":0.6204639673233032},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.3238449990749359},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2559358477592468},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.23383209109306335},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.16021931171417236},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.1021537184715271}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8062553405761719},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.801415741443634},{"id":"https://openalex.org/C3115412","wikidata":"https://www.wikidata.org/wiki/Q1194708","display_name":"Bitmap","level":2,"score":0.782992959022522},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7283756136894226},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.6549647450447083},{"id":"https://openalex.org/C2988412617","wikidata":"https://www.wikidata.org/wiki/Q7441656","display_name":"Keyword search","level":2,"score":0.6204639673233032},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.3238449990749359},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2559358477592468},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.23383209109306335},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.16021931171417236},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.1021537184715271},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tcc.2021.3093304","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcc.2021.3093304","pdf_url":null,"source":{"id":"https://openalex.org/S2492498579","display_name":"IEEE Transactions on Cloud Computing","issn_l":"2168-7161","issn":["2168-7161","2372-0018"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Cloud Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G564380355","display_name":null,"funder_award_id":"62072361","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":42,"referenced_works":["https://openalex.org/W207790704","https://openalex.org/W1502708590","https://openalex.org/W1502927489","https://openalex.org/W1562394980","https://openalex.org/W1572096077","https://openalex.org/W1607188293","https://openalex.org/W1966678916","https://openalex.org/W1978010829","https://openalex.org/W1988374166","https://openalex.org/W1993536048","https://openalex.org/W2007877577","https://openalex.org/W2011212169","https://openalex.org/W2033165262","https://openalex.org/W2054701320","https://openalex.org/W2065940536","https://openalex.org/W2068988532","https://openalex.org/W2081858681","https://openalex.org/W2093175219","https://openalex.org/W2097111141","https://openalex.org/W2101566835","https://openalex.org/W2131043660","https://openalex.org/W2146828512","https://openalex.org/W2147929033","https://openalex.org/W2152516507","https://openalex.org/W2162319779","https://openalex.org/W2294724888","https://openalex.org/W2490265015","https://openalex.org/W2529033518","https://openalex.org/W2541006527","https://openalex.org/W2592956480","https://openalex.org/W2738705840","https://openalex.org/W2752167152","https://openalex.org/W2766707306","https://openalex.org/W2804851055","https://openalex.org/W2889232097","https://openalex.org/W2891250116","https://openalex.org/W2913048961","https://openalex.org/W2953213487","https://openalex.org/W2955869759","https://openalex.org/W2967320897","https://openalex.org/W2972535651","https://openalex.org/W2972997072"],"related_works":["https://openalex.org/W3041052722","https://openalex.org/W2898591106","https://openalex.org/W188567224","https://openalex.org/W2370199378","https://openalex.org/W3006172505","https://openalex.org/W3011934965","https://openalex.org/W3140834074","https://openalex.org/W2183235846","https://openalex.org/W2738705840","https://openalex.org/W3179996071"],"abstract_inverted_index":{"Searchable":[0],"Symmetric":[1],"Encryption":[2],"(SSE),":[3],"which":[4,68,94],"enables":[5],"users":[6],"to":[7,90,114],"search":[8,31,71,97],"over":[9,58,72],"encrypted":[10,59,73],"data":[11,60,74,88],"without":[12],"decryption,":[13],"has":[14],"gained":[15],"increasing":[16],"attention":[17],"from":[18],"both":[19],"academic":[20],"and":[21,40,52,65,79,99,110,134,147],"industrial":[22],"fields.":[23],"However,":[24],"existing":[25],"SSE":[26],"schemes":[27],"either":[28],"have":[29],"low":[30],"efficiency":[32,98],"or":[33],"cannot":[34],"support":[35],"multi-keyword":[36,70],"search,":[37],"dynamic":[38],"updates,":[39],"result":[41],"verification":[42],"simultaneously.":[43],"To":[44],"solve":[45],"these":[46],"problems,":[47],"we":[48],"propose":[49],"a":[50,87,138],"Verifiable":[51],"Dynamic":[53],"Multi-keyword":[54],"Search":[55],"(VDMS)":[56],"scheme":[57],"by":[61],"using":[62,137],"the":[63,92,96,101,105,116],"bitmap":[64,83,111],"RSA":[66,108],"accumulator,":[67],"provides":[69],"in":[75,149],"an":[76],"efficient,":[77],"verifiable":[78],"updated":[80],"way.":[81],"The":[82,107],"is":[84,127,145],"used":[85],"as":[86],"structure":[89],"build":[91],"indexes,":[93],"improves":[95],"reduces":[100],"storage":[102],"space":[103],"of":[104,118],"indexes.":[106],"accumulator":[109],"are":[112],"combined":[113],"verify":[115],"correctness":[117],"results.":[119],"Formal":[120],"security":[121],"analysis":[122],"proves":[123],"that":[124,142],"our":[125,143],"VDMS":[126,144],"adaptively":[128],"secure":[129],"against":[130],"Chosen-Keyword":[131],"Attacks":[132],"(CKA),":[133],"empirical":[135],"experiments":[136],"real-world":[139],"dataset":[140],"demonstrate":[141],"efficient":[146],"feasible":[148],"practical":[150],"applications.":[151]},"counts_by_year":[{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":9},{"year":2022,"cited_by_count":8}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
