{"id":"https://openalex.org/W4220948165","doi":"https://doi.org/10.1109/tsc.2022.3162266","title":"CASE-SSE: Context-Aware Semantically Extensible Searchable Symmetric Encryption for Encrypted Cloud Data","display_name":"CASE-SSE: Context-Aware Semantically Extensible Searchable Symmetric Encryption for Encrypted Cloud Data","publication_year":2022,"publication_date":"2022-03-25","ids":{"openalex":"https://openalex.org/W4220948165","doi":"https://doi.org/10.1109/tsc.2022.3162266"},"language":"en","primary_location":{"id":"doi:10.1109/tsc.2022.3162266","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsc.2022.3162266","pdf_url":null,"source":{"id":"https://openalex.org/S204223317","display_name":"IEEE Transactions on Services Computing","issn_l":"1939-1374","issn":["1939-1374","2372-0204"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Services Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5043453012","display_name":"Lanxiang Chen","orcid":"https://orcid.org/0000-0002-5232-7801"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]},{"id":"https://openalex.org/I4210123185","display_name":"Zhejiang Lab","ror":"https://ror.org/02m2h7991","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210123185"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Lanxiang Chen","raw_affiliation_strings":["Fujian Provincial Key Laboratory of Network Security and Cryptology, College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China","Zhejiang Lab, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Fujian Provincial Key Laboratory of Network Security and Cryptology, College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"Zhejiang Lab, Hangzhou, China","institution_ids":["https://openalex.org/I4210123185"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008489138","display_name":"Yujie Xue","orcid":"https://orcid.org/0000-0003-2559-1727"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yujie Xue","raw_affiliation_strings":["College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008178136","display_name":"Yi Mu","orcid":"https://orcid.org/0000-0002-1637-845X"},"institutions":[{"id":"https://openalex.org/I6469544","display_name":"City University of Macau","ror":"https://ror.org/04gpd4q15","country_code":"MO","type":"education","lineage":["https://openalex.org/I6469544"]}],"countries":["MO"],"is_corresponding":false,"raw_author_name":"Yi Mu","raw_affiliation_strings":["Faculty of Data Science, City University of Macau, Macao SAR, China"],"affiliations":[{"raw_affiliation_string":"Faculty of Data Science, City University of Macau, Macao SAR, China","institution_ids":["https://openalex.org/I6469544"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036840192","display_name":"Lingfang Zeng","orcid":"https://orcid.org/0000-0003-3130-3015"},"institutions":[{"id":"https://openalex.org/I4210123185","display_name":"Zhejiang Lab","ror":"https://ror.org/02m2h7991","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210123185"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lingfang Zeng","raw_affiliation_strings":["Zhejiang Lab, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Zhejiang Lab, Hangzhou, China","institution_ids":["https://openalex.org/I4210123185"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020136354","display_name":"Fatemeh Rezaeibagha","orcid":"https://orcid.org/0000-0002-1368-016X"},"institutions":[{"id":"https://openalex.org/I176790772","display_name":"Murdoch University","ror":"https://ror.org/00r4sry34","country_code":"AU","type":"education","lineage":["https://openalex.org/I176790772"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Fatemeh Rezaeibagha","raw_affiliation_strings":["Discipline of Information Technology, Murdoch University, Murdoch, WA, Australia"],"affiliations":[{"raw_affiliation_string":"Discipline of Information Technology, Murdoch University, Murdoch, WA, Australia","institution_ids":["https://openalex.org/I176790772"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001712801","display_name":"Robert H. Deng","orcid":"https://orcid.org/0000-0003-3491-8146"},"institutions":[{"id":"https://openalex.org/I79891267","display_name":"Singapore Management University","ror":"https://ror.org/050qmg959","country_code":"SG","type":"education","lineage":["https://openalex.org/I79891267"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Robert H. Deng","raw_affiliation_strings":["School of Information Systems, Singapore Management University, Singapore"],"affiliations":[{"raw_affiliation_string":"School of Information Systems, Singapore Management University, Singapore","institution_ids":["https://openalex.org/I79891267"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5043453012"],"corresponding_institution_ids":["https://openalex.org/I111753288","https://openalex.org/I4210123185"],"apc_list":null,"apc_paid":null,"fwci":3.999,"has_fulltext":false,"cited_by_count":30,"citation_normalized_percentile":{"value":0.94342275,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"16","issue":"2","first_page":"1011","last_page":"1022"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.991100013256073,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9771000146865845,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8959413766860962},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6542695760726929},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.593902587890625},{"id":"https://openalex.org/keywords/word2vec","display_name":"Word2vec","score":0.5539073348045349},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.4508693516254425},{"id":"https://openalex.org/keywords/symmetric-key-algorithm","display_name":"Symmetric-key algorithm","score":0.4126933515071869},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3792789578437805},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.22616946697235107},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.16334152221679688},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.09136858582496643}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8959413766860962},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6542695760726929},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.593902587890625},{"id":"https://openalex.org/C2776461190","wikidata":"https://www.wikidata.org/wiki/Q22673982","display_name":"Word2vec","level":3,"score":0.5539073348045349},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.4508693516254425},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.4126933515071869},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3792789578437805},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.22616946697235107},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.16334152221679688},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.09136858582496643},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tsc.2022.3162266","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsc.2022.3162266","pdf_url":null,"source":{"id":"https://openalex.org/S204223317","display_name":"IEEE Transactions on Services Computing","issn_l":"1939-1374","issn":["1939-1374","2372-0204"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Services Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3258571898","display_name":null,"funder_award_id":"62072105","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3327627158","display_name":null,"funder_award_id":"U1805263","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3450073093","display_name":null,"funder_award_id":"2021R52007","funder_id":"https://openalex.org/F4320336605","funder_display_name":"National Ten Thousand Talent Program"},{"id":"https://openalex.org/G5234939074","display_name":null,"funder_award_id":"61872087","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8938359207","display_name":null,"funder_award_id":"2019J01274","funder_id":"https://openalex.org/F4320321878","funder_display_name":"Natural Science Foundation of Fujian Province"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321878","display_name":"Natural Science Foundation of Fujian Province","ror":null},{"id":"https://openalex.org/F4320336605","display_name":"National Ten Thousand Talent Program","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W59915946","https://openalex.org/W1498436455","https://openalex.org/W1669302834","https://openalex.org/W1979493600","https://openalex.org/W2058301453","https://openalex.org/W2060233069","https://openalex.org/W2087173276","https://openalex.org/W2089993141","https://openalex.org/W2093175219","https://openalex.org/W2108590723","https://openalex.org/W2112064109","https://openalex.org/W2116717571","https://openalex.org/W2132257180","https://openalex.org/W2138204974","https://openalex.org/W2146828512","https://openalex.org/W2147929033","https://openalex.org/W2152516507","https://openalex.org/W2164131468","https://openalex.org/W2184702105","https://openalex.org/W2490265015","https://openalex.org/W2605965597","https://openalex.org/W2606611168","https://openalex.org/W2799619282","https://openalex.org/W2974021353","https://openalex.org/W4294170691","https://openalex.org/W6636510571","https://openalex.org/W6678914141","https://openalex.org/W6680106237","https://openalex.org/W6682691769","https://openalex.org/W6713547331"],"related_works":["https://openalex.org/W2980729574","https://openalex.org/W1560851690","https://openalex.org/W3092047717","https://openalex.org/W2322947709","https://openalex.org/W4385192994","https://openalex.org/W4255237014","https://openalex.org/W4242847202","https://openalex.org/W2768869846","https://openalex.org/W2951531469","https://openalex.org/W2384237980"],"abstract_inverted_index":{"Traditional":[0],"searchable":[1,36],"symmetric":[2,37],"encryption":[3,38],"(SSE)":[4],"schemes":[5],"rarely":[6],"support":[7],"context-aware":[8,33,48,132],"semantic":[9,49],"extension,":[10],"and":[11,71,120,143,157],"then":[12,115],"lead":[13],"to":[14,46,62,84,93,110],"the":[15,23,68,72,76,86,98,104,126],"searched":[16],"results":[17,74,147],"being":[18],"incomplete":[19],"or":[20],"deviating":[21],"from":[22],"user\u2019s":[24],"query":[25,89,100],"intention.":[26],"To":[27],"address":[28],"this":[29,52],"problem,":[30],"a":[31],"new":[32],"semantically":[34,133],"extensible":[35,134],"based":[39,124],"on":[40,125],"Word2vec":[41,69],"model":[42],"(CASE-SSE)":[43],"is":[44,75,141,152],"proposed":[45,55],"achieve":[47],"extension":[50],"in":[51,154],"article.":[53],"The":[54,136,145],"scheme":[56,151],"utilizes":[57],"outsourced":[58,112],"datasets":[59],"as":[60],"corpora":[61],"extract":[63],"all":[64],"keywords":[65,90],"for":[66],"training":[67],"model,":[70],"trained":[73],"ontology":[77],"knowledge":[78],"base":[79],"that":[80,149],"can":[81],"be":[82],"used":[83],"extend":[85],"semantics":[87],"of":[88],"directly.":[91],"Further,":[92],"facilitate":[94],"multi-keyword":[95],"search":[96],"using":[97],"extended":[99],"vector,":[101],"we":[102],"use":[103],"<inline-formula><tex-math":[105],"notation=\"LaTeX\">$k$</tex-math></inline-formula>":[106],"-means":[107],"clustering":[108],"algorithm":[109],"classify":[111],"datasets.":[113],"We":[114],"construct":[116],"an":[117,121],"AVL-tree":[118],"index":[119,123],"inverted":[122],"classified":[127],"results,":[128],"thereby":[129],"achieving":[130],"efficient":[131],"SSE.":[135],"security":[137],"analysis":[138],"indicates":[139],"it":[140],"secure":[142],"effective.":[144],"experimental":[146],"show":[148],"our":[150],"superior":[153],"both":[155],"efficiency":[156],"accuracy.":[158]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":16},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":7}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
