{"id":"https://openalex.org/W3186729601","doi":"https://doi.org/10.1109/tsc.2021.3098864","title":"Verifiable Semantic-Aware Ranked Keyword Search in Cloud-Assisted Edge Computing","display_name":"Verifiable Semantic-Aware Ranked Keyword Search in Cloud-Assisted Edge Computing","publication_year":2021,"publication_date":"2021-07-26","ids":{"openalex":"https://openalex.org/W3186729601","doi":"https://doi.org/10.1109/tsc.2021.3098864","mag":"3186729601"},"language":"en","primary_location":{"id":"doi:10.1109/tsc.2021.3098864","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsc.2021.3098864","pdf_url":null,"source":{"id":"https://openalex.org/S204223317","display_name":"IEEE Transactions on Services Computing","issn_l":"1939-1374","issn":["1939-1374","2372-0204"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Services Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100446476","display_name":"Jiayi Li","orcid":"https://orcid.org/0000-0002-1934-2129"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]},{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jiayi Li","raw_affiliation_strings":["School of Cyber Engineering, Xidian University, Xi&#x0027;an, China","Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, Guilin, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Engineering, Xidian University, Xi&#x0027;an, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, Guilin, China","institution_ids":["https://openalex.org/I5343935"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012016098","display_name":"Jianfeng Ma","orcid":"https://orcid.org/0000-0003-4251-1143"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianfeng Ma","raw_affiliation_strings":["School of Cyber Engineering, Xidian University, Xi&#x0027;an, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Engineering, Xidian University, Xi&#x0027;an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102885964","display_name":"Yinbin Miao","orcid":null},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]},{"id":"https://openalex.org/I168719708","display_name":"City University of Hong Kong","ror":"https://ror.org/03q8dnn23","country_code":"HK","type":"education","lineage":["https://openalex.org/I168719708"]},{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN","HK"],"is_corresponding":false,"raw_author_name":"Yinbin Miao","raw_affiliation_strings":["School of Cyber Engineering, Xidian University, Xi&#x0027;an, China","Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, Guilin, China","Department of Computer Science, City University of Hong Kong, Hong Kong, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Engineering, Xidian University, Xi&#x0027;an, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, Guilin, China","institution_ids":["https://openalex.org/I5343935"]},{"raw_affiliation_string":"Department of Computer Science, City University of Hong Kong, Hong Kong, China","institution_ids":["https://openalex.org/I168719708"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100333516","display_name":"Lei Chen","orcid":"https://orcid.org/0000-0002-8257-5806"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Lei Chen","raw_affiliation_strings":["Nsfocus Information Technology Co., Ltd, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Nsfocus Information Technology Co., Ltd, Beijing, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100713554","display_name":"Yunbo Wang","orcid":"https://orcid.org/0000-0002-6215-8888"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yunbo Wang","raw_affiliation_strings":["School of Cyber Engineering, Xidian University, Xi&#x0027;an, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Engineering, Xidian University, Xi&#x0027;an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058120371","display_name":"Ximeng Liu","orcid":"https://orcid.org/0000-0002-4238-3295"},"institutions":[{"id":"https://openalex.org/I80947539","display_name":"Fuzhou University","ror":"https://ror.org/011xvna82","country_code":"CN","type":"education","lineage":["https://openalex.org/I80947539"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ximeng Liu","raw_affiliation_strings":["Key Laboratory of Information Security of Network Systems, College of Mathematics and Computer Science, Fuzhou University, Fuzhou, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Information Security of Network Systems, College of Mathematics and Computer Science, Fuzhou University, Fuzhou, China","institution_ids":["https://openalex.org/I80947539"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001746807","display_name":"Kim\u2010Kwang Raymond Choo","orcid":"https://orcid.org/0000-0001-9208-5336"},"institutions":[{"id":"https://openalex.org/I45438204","display_name":"The University of Texas at San Antonio","ror":"https://ror.org/01kd65564","country_code":"US","type":"education","lineage":["https://openalex.org/I45438204"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kim-Kwang Raymond Choo","raw_affiliation_strings":["Department of Information Systems and Cyber Security, The University of Texas at San Antonio, San Antonio, TX, USA"],"affiliations":[{"raw_affiliation_string":"Department of Information Systems and Cyber Security, The University of Texas at San Antonio, San Antonio, TX, USA","institution_ids":["https://openalex.org/I45438204"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5100446476"],"corresponding_institution_ids":["https://openalex.org/I149594827","https://openalex.org/I5343935"],"apc_list":null,"apc_paid":null,"fwci":1.8199,"has_fulltext":false,"cited_by_count":20,"citation_normalized_percentile":{"value":0.87811677,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"15","issue":"6","first_page":"3591","last_page":"3605"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9884999990463257,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7857372760772705},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.6351439952850342},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5849217176437378},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.5710236430168152},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.5672007203102112},{"id":"https://openalex.org/keywords/latent-dirichlet-allocation","display_name":"Latent Dirichlet allocation","score":0.5428254008293152},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.4888715147972107},{"id":"https://openalex.org/keywords/directory","display_name":"Directory","score":0.41377806663513184},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3964610695838928},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.2969741225242615},{"id":"https://openalex.org/keywords/topic-model","display_name":"Topic model","score":0.2871505618095398},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.19987079501152039},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.181350976228714},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.10507053136825562},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.0865183174610138}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7857372760772705},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.6351439952850342},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5849217176437378},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.5710236430168152},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.5672007203102112},{"id":"https://openalex.org/C500882744","wikidata":"https://www.wikidata.org/wiki/Q269236","display_name":"Latent Dirichlet allocation","level":3,"score":0.5428254008293152},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.4888715147972107},{"id":"https://openalex.org/C2777683733","wikidata":"https://www.wikidata.org/wiki/Q201456","display_name":"Directory","level":2,"score":0.41377806663513184},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3964610695838928},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.2969741225242615},{"id":"https://openalex.org/C171686336","wikidata":"https://www.wikidata.org/wiki/Q3532085","display_name":"Topic model","level":2,"score":0.2871505618095398},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.19987079501152039},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.181350976228714},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.10507053136825562},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0865183174610138},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tsc.2021.3098864","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsc.2021.3098864","pdf_url":null,"source":{"id":"https://openalex.org/S204223317","display_name":"IEEE Transactions on Services Computing","issn_l":"1939-1374","issn":["1939-1374","2372-0204"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Services Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G564380355","display_name":null,"funder_award_id":"62072361","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6506919367","display_name":null,"funder_award_id":"JB211505","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":46,"referenced_works":["https://openalex.org/W13343750","https://openalex.org/W1484820633","https://openalex.org/W1493526108","https://openalex.org/W1512194687","https://openalex.org/W1556212265","https://openalex.org/W1836365731","https://openalex.org/W1880262756","https://openalex.org/W2006737181","https://openalex.org/W2038043464","https://openalex.org/W2041480327","https://openalex.org/W2054701320","https://openalex.org/W2093175219","https://openalex.org/W2099739670","https://openalex.org/W2116717571","https://openalex.org/W2122590785","https://openalex.org/W2131300413","https://openalex.org/W2132172731","https://openalex.org/W2147929033","https://openalex.org/W2159777963","https://openalex.org/W2161214567","https://openalex.org/W2220842785","https://openalex.org/W2322378930","https://openalex.org/W2334889010","https://openalex.org/W2463645795","https://openalex.org/W2475932160","https://openalex.org/W2490265015","https://openalex.org/W2525265766","https://openalex.org/W2659830789","https://openalex.org/W2733253862","https://openalex.org/W2734883239","https://openalex.org/W2794180321","https://openalex.org/W2798594784","https://openalex.org/W2810002716","https://openalex.org/W2889349423","https://openalex.org/W2951475536","https://openalex.org/W2952201977","https://openalex.org/W2953213487","https://openalex.org/W2955869759","https://openalex.org/W2974021353","https://openalex.org/W2978531397","https://openalex.org/W2988328980","https://openalex.org/W3088377478","https://openalex.org/W6639619044","https://openalex.org/W6682311248","https://openalex.org/W6703074907","https://openalex.org/W6764684671"],"related_works":["https://openalex.org/W2355730523","https://openalex.org/W152021879","https://openalex.org/W3107650560","https://openalex.org/W3115906952","https://openalex.org/W3126382579","https://openalex.org/W3134811395","https://openalex.org/W2365629437","https://openalex.org/W2072918937","https://openalex.org/W3155196058","https://openalex.org/W2404647514"],"abstract_inverted_index":{"Ranked":[0,5],"keyword":[1,6,25],"search":[2,7,26,109],"has":[3,8],"gained":[4,9],"traction":[10],"due":[11],"to":[12,102],"its":[13],"attractive":[14],"properties":[15],"such":[16],"as":[17],"flexibility":[18],"and":[19,35,77,106,111,127,140,156],"accessibility.":[20],"However,":[21],"most":[22],"existing":[23],"ranked":[24],"schemes":[27],"ignore":[28],"the":[29,33,49,70,78,88,104,136,141,148],"semantic":[30],"associations":[31],"between":[32],"documents":[34],"queries.":[36],"To":[37],"solve":[38],"this":[39,113],"challenging":[40],"issue":[41],"in":[42,100,116,134],"cloud-assisted":[43,117],"edge":[44,118],"computing,":[45],"we":[46,94],"first":[47],"design":[48],"<bold":[50,54,58,62],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[51,55,59,63],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">S</b>":[52,64],"emantic-aware":[53],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">R</b>":[56],"anked":[57],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">M</b>":[60],"ulti-keyword":[61],"earch":[65],"(SRMS)":[66],"scheme":[67],"by":[68],"adopting":[69],"Latent":[71],"Dirichlet":[72],"Allocation":[73],"(LDA)":[74],"topic":[75],"model":[76,139],"Chinese":[79],"Remainder":[80],"Theorem":[81],"(CRT)-based":[82],"secret":[83],"sharing":[84],"mechanism.":[85],"Considering":[86],"that":[87,125,152],"cloud":[89],"server":[90],"may":[91],"be":[92],"malicious,":[93],"implement":[95],"a":[96],"basic":[97],"verification":[98,114,130],"mechanism":[99,115],"SRMS":[101,126,153],"verify":[103],"correctness":[105],"completeness":[107],"of":[108],"results":[110],"extend":[112],"computing":[119],"scenarios.":[120],"Formal":[121],"security":[122],"analysis":[123],"proves":[124],"extended":[128],"result":[129],"mechanisms":[131],"are":[132],"secure":[133],"both":[135],"known":[137,142],"ciphertext":[138],"background":[143],"model.":[144],"Extensive":[145],"experiments":[146],"using":[147],"real-world":[149],"dataset":[150],"demonstrate":[151],"is":[154],"efficient":[155],"practical.":[157]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":2}],"updated_date":"2026-03-27T14:29:43.386196","created_date":"2025-10-10T00:00:00"}
