{"id":"https://openalex.org/W2147096042","doi":"https://doi.org/10.1109/tdsc.2015.2406704","title":"Enabling Fine-Grained Multi-Keyword Search Supporting Classified Sub-Dictionaries over Encrypted Cloud Data","display_name":"Enabling Fine-Grained Multi-Keyword Search Supporting Classified Sub-Dictionaries over Encrypted Cloud Data","publication_year":2015,"publication_date":"2015-02-24","ids":{"openalex":"https://openalex.org/W2147096042","doi":"https://doi.org/10.1109/tdsc.2015.2406704","mag":"2147096042"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2015.2406704","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2015.2406704","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://figshare.com/articles/journal_contribution/Enabling_fine-grained_multi-keyword_search_supporting_classified_sub-dictionaries_over_encrypted_cloud_data/20891791","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100325334","display_name":"Hongwei Li","orcid":"https://orcid.org/0000-0002-1961-7946"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Hongwei Li","raw_affiliation_strings":["School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, Sichuan, China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, Sichuan, China","institution_ids":["https://openalex.org/I150229711"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015401377","display_name":"Yi Yang","orcid":"https://orcid.org/0000-0002-4547-1207"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yi Yang","raw_affiliation_strings":["School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, Sichuan, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, Sichuan, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040978564","display_name":"Tom H. Luan","orcid":"https://orcid.org/0000-0002-5215-7443"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Tom H. Luan","raw_affiliation_strings":["School of Information Technology, Deakin University, Melbourne, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Deakin University, Melbourne, VIC, Australia","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101655447","display_name":"Xiaohui Liang","orcid":"https://orcid.org/0000-0003-4064-2393"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xiaohui Liang","raw_affiliation_strings":["Department of Computer Science, University of Massachusetts at Boston, MA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Massachusetts at Boston, MA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021327800","display_name":"Liang Zhou","orcid":"https://orcid.org/0000-0002-9453-3734"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liang Zhou","raw_affiliation_strings":["National Key Laboratory of Science and Technology on Communication, University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"National Key Laboratory of Science and Technology on Communication, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100773343","display_name":"Xuemin Shen","orcid":"https://orcid.org/0000-0002-4140-287X"},"institutions":[{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"education","lineage":["https://openalex.org/I151746483"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Xuemin Sherman Shen","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON, Canada","institution_ids":["https://openalex.org/I151746483"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5100325334"],"corresponding_institution_ids":["https://openalex.org/I150229711","https://openalex.org/I19820366","https://openalex.org/I4210156404"],"apc_list":null,"apc_paid":null,"fwci":56.972,"has_fulltext":false,"cited_by_count":275,"citation_normalized_percentile":{"value":0.99882504,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"13","issue":"3","first_page":"312","last_page":"325"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9918000102043152,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.884731113910675},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.769672691822052},{"id":"https://openalex.org/keywords/upload","display_name":"Upload","score":0.7360831499099731},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6992878913879395},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.6837468147277832},{"id":"https://openalex.org/keywords/relevance","display_name":"Relevance (law)","score":0.47003692388534546},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.42803868651390076},{"id":"https://openalex.org/keywords/usability","display_name":"Usability","score":0.4200284481048584},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.41499239206314087},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.33265605568885803},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.24768275022506714},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.16661688685417175}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.884731113910675},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.769672691822052},{"id":"https://openalex.org/C71901391","wikidata":"https://www.wikidata.org/wiki/Q7126699","display_name":"Upload","level":2,"score":0.7360831499099731},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6992878913879395},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.6837468147277832},{"id":"https://openalex.org/C158154518","wikidata":"https://www.wikidata.org/wiki/Q7310970","display_name":"Relevance (law)","level":2,"score":0.47003692388534546},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.42803868651390076},{"id":"https://openalex.org/C170130773","wikidata":"https://www.wikidata.org/wiki/Q216378","display_name":"Usability","level":2,"score":0.4200284481048584},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.41499239206314087},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.33265605568885803},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.24768275022506714},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.16661688685417175},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/tdsc.2015.2406704","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2015.2406704","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},{"id":"pmh:oai:dro.deakin.edu.au:DU:30083979","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306402457","display_name":"Deakin Research Online (Deakin University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I149704539","host_organization_name":"Deakin University","host_organization_lineage":["https://openalex.org/I149704539"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Journal Article"},{"id":"pmh:oai:figshare.com:article/20891791","is_oa":true,"landing_page_url":"https://figshare.com/articles/journal_contribution/Enabling_fine-grained_multi-keyword_search_supporting_classified_sub-dictionaries_over_encrypted_cloud_data/20891791","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"}],"best_oa_location":{"id":"pmh:oai:figshare.com:article/20891791","is_oa":true,"landing_page_url":"https://figshare.com/articles/journal_contribution/Enabling_fine-grained_multi-keyword_search_supporting_classified_sub-dictionaries_over_encrypted_cloud_data/20891791","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G6083559614","display_name":null,"funder_award_id":"U1333127","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6294138225","display_name":null,"funder_award_id":"2015T80972","funder_id":"https://openalex.org/F4320321543","funder_display_name":"China Postdoctoral Science Foundation"},{"id":"https://openalex.org/G7570247754","display_name":null,"funder_award_id":"2014M552336","funder_id":"https://openalex.org/F4320321543","funder_display_name":"China Postdoctoral Science Foundation"},{"id":"https://openalex.org/G8683849773","display_name":null,"funder_award_id":"61472065","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321543","display_name":"China Postdoctoral Science Foundation","ror":"https://ror.org/0426zh255"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W117116306","https://openalex.org/W1500196754","https://openalex.org/W1512194687","https://openalex.org/W1516033050","https://openalex.org/W1579761987","https://openalex.org/W1589843374","https://openalex.org/W1895952394","https://openalex.org/W1965657003","https://openalex.org/W1969084955","https://openalex.org/W1975168722","https://openalex.org/W1981354959","https://openalex.org/W1988925670","https://openalex.org/W1996124278","https://openalex.org/W1998930836","https://openalex.org/W2021781226","https://openalex.org/W2036169870","https://openalex.org/W2041480327","https://openalex.org/W2054701320","https://openalex.org/W2087303942","https://openalex.org/W2099739670","https://openalex.org/W2108590723","https://openalex.org/W2117420234","https://openalex.org/W2118006580","https://openalex.org/W2132257180","https://openalex.org/W2139583278","https://openalex.org/W2147929033","https://openalex.org/W2148997402","https://openalex.org/W2161214567","https://openalex.org/W2164165510","https://openalex.org/W4210694990","https://openalex.org/W6682311248","https://openalex.org/W6683799570"],"related_works":["https://openalex.org/W2429057255","https://openalex.org/W2187546663","https://openalex.org/W148745890","https://openalex.org/W4389670110","https://openalex.org/W2944823289","https://openalex.org/W2611942503","https://openalex.org/W4315621326","https://openalex.org/W2899790217","https://openalex.org/W2598865957","https://openalex.org/W2070735207"],"abstract_inverted_index":{"Using":[0],"cloud":[1,20,77],"computing,":[2],"individuals":[3],"can":[4,119,204],"store":[5],"their":[6],"data":[7,13,25,50],"on":[8,145],"remote":[9],"servers":[10],"and":[11,90,101,110,128,150,171,173,196,215,224],"allow":[12],"access":[14],"to":[15,28,39,52,141,211],"public":[16],"users":[17],"through":[18],"the":[19,23,40,46,53,58,70,87,97,124,137,155,158,181,186,189,193,201,206,212],"servers.":[21],"As":[22],"outsourced":[24,49],"are":[26,34,82],"likely":[27],"contain":[29],"sensitive":[30],"privacy":[31,167],"information,":[32],"they":[33],"typically":[35],"encrypted":[36,59,76],"before":[37],"uploaded":[38],"cloud.":[41],"This,":[42],"however,":[43],"significantly":[44],"limits":[45],"usability":[47],"of":[48,55,131,157,163,165,169,175,188,220],"due":[51],"difficulty":[54],"searching":[56],"over":[57,75],"data.":[60,78],"In":[61],"this":[62,66],"paper,":[63],"we":[64,85,106,134,153,184],"address":[65],"issue":[67],"by":[68],"developing":[69],"fine-grained":[71],"multi-keyword":[72,113],"search":[73,100,114,123],"schemes":[74,160,203],"Our":[79],"original":[80],"contributions":[81],"three-fold.":[83],"First,":[84],"introduce":[86],"relevance":[88],"scores":[89],"preference":[91],"factors":[92],"upon":[93],"keywords":[94],"which":[95],"enable":[96],"precise":[98],"keyword":[99],"personalized":[102],"user":[103],"experience.":[104],"Second,":[105],"develop":[107],"a":[108],"practical":[109],"very":[111],"efficient":[112],"scheme.":[115],"The":[116],"proposed":[117,159,190,202],"scheme":[118],"support":[120],"complicated":[121],"logic":[122],"mixed":[125],"\u201cAND\u201d,":[126],"\u201cOR\u201d":[127],"\u201cNO\u201d":[129],"operations":[130],"keywords.":[132],"Third,":[133],"further":[135],"employ":[136],"classified":[138],"sub-dictionaries":[139],"technique":[140],"achieve":[142,205],"better":[143,216],"efficiency":[144],"index":[146,170],"building,":[147],"trapdoor":[148],"generating":[149],"query.":[151],"Lastly,":[152],"analyze":[154],"security":[156,194,208],"in":[161,218],"terms":[162,219],"confidentiality":[164],"documents,":[166],"protection":[168],"trapdoor,":[172],"unlinkability":[174],"trapdoor.":[176],"Through":[177],"extensive":[178],"experiments":[179],"using":[180],"real-world":[182],"dataset,":[183],"validate":[185],"performance":[187,217],"schemes.":[191],"Both":[192],"analysis":[195],"experimental":[197],"results":[198],"demonstrate":[199],"that":[200],"same":[207],"level":[209],"comparing":[210],"existing":[213],"ones":[214],"functionality,":[221],"query":[222],"complexity":[223],"efficiency.":[225]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":10},{"year":2023,"cited_by_count":9},{"year":2022,"cited_by_count":12},{"year":2021,"cited_by_count":23},{"year":2020,"cited_by_count":37},{"year":2019,"cited_by_count":46},{"year":2018,"cited_by_count":39},{"year":2017,"cited_by_count":45},{"year":2016,"cited_by_count":33},{"year":2015,"cited_by_count":11},{"year":2014,"cited_by_count":5}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
