{"id":"https://openalex.org/W4400810604","doi":"https://doi.org/10.1109/tcc.2024.3430237","title":"MFSSE: Multi-Keyword Fuzzy Ranked Symmetric Searchable Encryption With Pattern Hidden in Mobile Cloud Computing","display_name":"MFSSE: Multi-Keyword Fuzzy Ranked Symmetric Searchable Encryption With Pattern Hidden in Mobile Cloud Computing","publication_year":2024,"publication_date":"2024-07-19","ids":{"openalex":"https://openalex.org/W4400810604","doi":"https://doi.org/10.1109/tcc.2024.3430237"},"language":"en","primary_location":{"id":"doi:10.1109/tcc.2024.3430237","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcc.2024.3430237","pdf_url":null,"source":{"id":"https://openalex.org/S2492498579","display_name":"IEEE Transactions on Cloud Computing","issn_l":"2168-7161","issn":["2168-7161","2372-0018"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Cloud Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5073181706","display_name":"Dajiang Chen","orcid":"https://orcid.org/0000-0003-0745-5836"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Dajiang Chen","raw_affiliation_strings":["Network and Data Security Key Laboratory of Sichuan Province, School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, China"],"raw_orcid":"https://orcid.org/0000-0003-0745-5836","affiliations":[{"raw_affiliation_string":"Network and Data Security Key Laboratory of Sichuan Province, School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091388237","display_name":"Zeyu Liao","orcid":"https://orcid.org/0009-0009-1068-0584"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zeyu Liao","raw_affiliation_strings":["Network and Data Security Key Laboratory of Sichuan Province, School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, China"],"raw_orcid":"https://orcid.org/0009-0009-1068-0584","affiliations":[{"raw_affiliation_string":"Network and Data Security Key Laboratory of Sichuan Province, School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090479396","display_name":"Zhidong Xie","orcid":null},"institutions":[{"id":"https://openalex.org/I4210158522","display_name":"PLA Academy of Military Science","ror":"https://ror.org/05ct4s596","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210158522"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhidong Xie","raw_affiliation_strings":["Academy of Military Sciences PLA, Beijing, China"],"raw_orcid":"https://orcid.org/0009-0000-2405-3084","affiliations":[{"raw_affiliation_string":"Academy of Military Sciences PLA, Beijing, China","institution_ids":["https://openalex.org/I4210158522"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101893410","display_name":"Ruidong Chen","orcid":"https://orcid.org/0000-0002-1970-5743"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ruidong Chen","raw_affiliation_strings":["School of Computer Science &#x0026; Engineering, University of Electronic Science and Technology of China, Chengdu, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computer Science &#x0026; Engineering, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100763095","display_name":"Zhen Qin","orcid":"https://orcid.org/0000-0001-7857-9719"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhen Qin","raw_affiliation_strings":["Network and Data Security Key Laboratory of Sichuan Province, School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, China"],"raw_orcid":"https://orcid.org/0000-0001-7857-9719","affiliations":[{"raw_affiliation_string":"Network and Data Security Key Laboratory of Sichuan Province, School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088153559","display_name":"Mingsheng Cao","orcid":"https://orcid.org/0000-0003-0691-2724"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mingsheng Cao","raw_affiliation_strings":["Network and Data Security Key Laboratory of Sichuan Province, School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, China"],"raw_orcid":"https://orcid.org/0000-0003-0691-2724","affiliations":[{"raw_affiliation_string":"Network and Data Security Key Laboratory of Sichuan Province, School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072659343","display_name":"Hong\u2010Ning Dai","orcid":"https://orcid.org/0000-0001-6165-4196"},"institutions":[{"id":"https://openalex.org/I141568987","display_name":"Hong Kong Baptist University","ror":"https://ror.org/0145fw131","country_code":"HK","type":"education","lineage":["https://openalex.org/I141568987"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Hong-Ning Dai","raw_affiliation_strings":["Department of Computer Science, Hong Kong Baptist University, Hong Kong"],"raw_orcid":"https://orcid.org/0000-0001-6165-4196","affiliations":[{"raw_affiliation_string":"Department of Computer Science, Hong Kong Baptist University, Hong Kong","institution_ids":["https://openalex.org/I141568987"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100736887","display_name":"Kuan Zhang","orcid":"https://orcid.org/0000-0002-4262-153X"},"institutions":[{"id":"https://openalex.org/I114395901","display_name":"University of Nebraska\u2013Lincoln","ror":"https://ror.org/043mer456","country_code":"US","type":"education","lineage":["https://openalex.org/I114395901"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kuan Zhang","raw_affiliation_strings":["Department of ECE, University of Nebraska-Lincoln, Lincoln, NE, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of ECE, University of Nebraska-Lincoln, Lincoln, NE, USA","institution_ids":["https://openalex.org/I114395901"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5073181706"],"corresponding_institution_ids":["https://openalex.org/I150229711"],"apc_list":null,"apc_paid":null,"fwci":4.6359,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.95342198,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"12","issue":"4","first_page":"1042","last_page":"1057"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9944999814033508,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9853000044822693,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7794954776763916},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7508436441421509},{"id":"https://openalex.org/keywords/keyword-search","display_name":"Keyword search","score":0.6610092520713806},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6230537295341492},{"id":"https://openalex.org/keywords/fuzzy-logic","display_name":"Fuzzy logic","score":0.5196194052696228},{"id":"https://openalex.org/keywords/mobile-cloud-computing","display_name":"Mobile cloud computing","score":0.46858543157577515},{"id":"https://openalex.org/keywords/symmetric-key-algorithm","display_name":"Symmetric-key algorithm","score":0.4615739583969116},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.35083699226379395},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3362801969051361},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.26793015003204346},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2288140058517456},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.194820374250412},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.16703999042510986}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7794954776763916},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7508436441421509},{"id":"https://openalex.org/C2988412617","wikidata":"https://www.wikidata.org/wiki/Q7441656","display_name":"Keyword search","level":2,"score":0.6610092520713806},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6230537295341492},{"id":"https://openalex.org/C58166","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy logic","level":2,"score":0.5196194052696228},{"id":"https://openalex.org/C2779191767","wikidata":"https://www.wikidata.org/wiki/Q6887075","display_name":"Mobile cloud computing","level":3,"score":0.46858543157577515},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.4615739583969116},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.35083699226379395},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3362801969051361},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.26793015003204346},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2288140058517456},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.194820374250412},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.16703999042510986}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tcc.2024.3430237","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcc.2024.3430237","pdf_url":null,"source":{"id":"https://openalex.org/S2492498579","display_name":"IEEE Transactions on Cloud Computing","issn_l":"2168-7161","issn":["2168-7161","2372-0018"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Cloud Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2227486999","display_name":null,"funder_award_id":"61872059","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7568062542","display_name":null,"funder_award_id":"62002047","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":47,"referenced_works":["https://openalex.org/W1512194687","https://openalex.org/W1589843374","https://openalex.org/W1989495031","https://openalex.org/W2033165262","https://openalex.org/W2041480327","https://openalex.org/W2054701320","https://openalex.org/W2087173276","https://openalex.org/W2093175219","https://openalex.org/W2098162425","https://openalex.org/W2108590723","https://openalex.org/W2109426455","https://openalex.org/W2123845384","https://openalex.org/W2133003537","https://openalex.org/W2145426052","https://openalex.org/W2146828512","https://openalex.org/W2147096042","https://openalex.org/W2147717514","https://openalex.org/W2147929033","https://openalex.org/W2162006472","https://openalex.org/W2166524953","https://openalex.org/W2490265015","https://openalex.org/W2535294034","https://openalex.org/W2792158747","https://openalex.org/W2919839278","https://openalex.org/W2953030092","https://openalex.org/W2962901170","https://openalex.org/W3006400738","https://openalex.org/W3022856335","https://openalex.org/W3091517985","https://openalex.org/W3110516712","https://openalex.org/W3139404512","https://openalex.org/W3157065669","https://openalex.org/W3163231210","https://openalex.org/W3164295456","https://openalex.org/W4220751475","https://openalex.org/W4226300264","https://openalex.org/W4285133485","https://openalex.org/W4285241481","https://openalex.org/W4292969453","https://openalex.org/W4313641370","https://openalex.org/W4315779375","https://openalex.org/W4323065874","https://openalex.org/W4381786410","https://openalex.org/W4382310068","https://openalex.org/W4390871494","https://openalex.org/W4391097098","https://openalex.org/W6713547331"],"related_works":["https://openalex.org/W2322947709","https://openalex.org/W1503401473","https://openalex.org/W4385192994","https://openalex.org/W4255237014","https://openalex.org/W4242847202","https://openalex.org/W2768869846","https://openalex.org/W2951531469","https://openalex.org/W2384237980","https://openalex.org/W2625565351","https://openalex.org/W2990532276"],"abstract_inverted_index":{"In":[0,18],"this":[1],"paper,":[2],"we":[3],"propose":[4],"a":[5,109,151,160,194],"novel":[6],"Multi-keyword":[7],"Fuzzy":[8],"Symmetric":[9],"Searchable":[10],"Encryption":[11],"(SSE)":[12],"with":[13],"patterns":[14,188],"hidden,":[15],"namely":[16],"MFSSE.":[17],"MFSSE,":[19],"the":[20,31,34,42,50,116,123,126,129,135,141,184],"search":[21,39,45,51,190],"trapdoor":[22,52],"can":[23,182],"be":[24,171],"modified":[25],"differently":[26],"each":[27],"time":[28],"even":[29],"if":[30],"keywords":[32,139],"are":[33],"same":[35],"when":[36],"performing":[37],"multi-keyword":[38],"to":[40,62,86,122,170],"prevent":[41,183],"leakage":[43,185],"of":[44,112,125,134,138,143,163,186],"patterns.":[46],"Moreover,":[47],"MFSSE":[48,68,181],"modifies":[49],"by":[53],"introducing":[54],"random":[55],"false":[56,59],"negative":[57],"and":[58,76,89,91,100,131,140,156,189,197],"positive":[60],"errors":[61],"resist":[63],"access":[64,187],"pattern":[65],"leakage.":[66],"Furthermore,":[67],"utilizes":[69],"efficient":[70],"cryptographic":[71],"algorithms":[72],"(e.g.,":[73],"Locality-Sensitive":[74],"Hashing)":[75],"lightweight":[77],"operations":[78],"(such":[79],"as,":[80],"integer":[81],"addition,":[82],"matrix":[83],"multiplication,":[84],"etc.)":[85],"minimize":[87],"computational":[88,147],"communication,":[90,113],"storage":[92,166],"overheads":[93],"on":[94],"mobile":[95,174],"devices":[96],"while":[97,192],"meeting":[98],"security":[99],"functional":[101],"requirements.":[102],"Specifically,":[103],"its":[104,146],"query":[105],"process":[106],"requires":[107,158],"only":[108,159],"single":[110],"round":[111],"in":[114,128],"which,":[115],"communication":[117,196],"cost":[118],"is":[119,132,153],"linearly":[120],"related":[121],"number":[124,137,142],"documents":[127],"database,":[130],"independent":[133],"total":[136],"queried":[144],"keywords;":[145],"complexity":[148],"for":[149,173],"matching":[150],"document":[152],"<inline-formula><tex-math":[154],"notation=\"LaTeX\">$O(1)$</tex-math></inline-formula>;":[155],"it":[157],"small":[161],"amount":[162],"fixed":[164],"local":[165],"(i.e.,":[167],"secret":[168],"key)":[169],"suitable":[172],"scenarios.":[175],"The":[176],"experimental":[177],"results":[178],"demonstrate":[179],"that":[180],"patterns,":[191],"keeping":[193],"low":[195],"computation":[198],"overheads.":[199]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":10},{"year":2024,"cited_by_count":2}],"updated_date":"2025-12-26T23:08:49.675405","created_date":"2025-10-10T00:00:00"}
