{"id":"https://openalex.org/W1999827997","doi":"https://doi.org/10.1109/wcsp.2014.6992161","title":"Privacy-preserving personalized search over encrypted cloud data supporting multi-keyword ranking","display_name":"Privacy-preserving personalized search over encrypted cloud data supporting multi-keyword ranking","publication_year":2014,"publication_date":"2014-10-01","ids":{"openalex":"https://openalex.org/W1999827997","doi":"https://doi.org/10.1109/wcsp.2014.6992161","mag":"1999827997"},"language":"en","primary_location":{"id":"doi:10.1109/wcsp.2014.6992161","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wcsp.2014.6992161","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 Sixth International Conference on Wireless Communications and Signal Processing (WCSP)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5059804502","display_name":"Ruihui Zhao","orcid":"https://orcid.org/0000-0001-8070-5008"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ruihui Zhao","raw_affiliation_strings":["School of Computer Science and Engineering, University of Electronic Science and Technology of China, China","School of Computer Science and Engineering; University of Electronic Science and Technology of China; China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, China","institution_ids":["https://openalex.org/I150229711"]},{"raw_affiliation_string":"School of Computer Science and Engineering; University of Electronic Science and Technology of China; China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100325334","display_name":"Hongwei Li","orcid":"https://orcid.org/0000-0002-1961-7946"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hongwei Li","raw_affiliation_strings":["School of Computer Science and Engineering, University of Electronic Science and Technology of China, China","School of Computer Science and Engineering; University of Electronic Science and Technology of China; China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, China","institution_ids":["https://openalex.org/I150229711"]},{"raw_affiliation_string":"School of Computer Science and Engineering; University of Electronic Science and Technology of China; China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015401377","display_name":"Yi Yang","orcid":"https://orcid.org/0000-0002-4547-1207"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yi Yang","raw_affiliation_strings":["School of Computer Science and Engineering, University of Electronic Science and Technology of China, China","School of Computer Science and Engineering; University of Electronic Science and Technology of China; China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, China","institution_ids":["https://openalex.org/I150229711"]},{"raw_affiliation_string":"School of Computer Science and Engineering; University of Electronic Science and Technology of China; China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5004408654","display_name":"Yu Liang","orcid":"https://orcid.org/0000-0001-5422-0920"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yu Liang","raw_affiliation_strings":["School of Computer Science and Engineering, University of Electronic Science and Technology of China, China","School of Computer Science and Engineering; University of Electronic Science and Technology of China; China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, China","institution_ids":["https://openalex.org/I150229711"]},{"raw_affiliation_string":"School of Computer Science and Engineering; University of Electronic Science and Technology of China; China","institution_ids":["https://openalex.org/I150229711"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5059804502"],"corresponding_institution_ids":["https://openalex.org/I150229711"],"apc_list":null,"apc_paid":null,"fwci":1.636,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.86810044,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9764999747276306,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8444184064865112},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7159428596496582},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6620730757713318},{"id":"https://openalex.org/keywords/ranking","display_name":"Ranking (information retrieval)","score":0.5281075239181519},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.5201176404953003},{"id":"https://openalex.org/keywords/personalized-search","display_name":"Personalized search","score":0.4918537139892578},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.42485305666923523},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.41776224970817566},{"id":"https://openalex.org/keywords/ambiguity","display_name":"Ambiguity","score":0.41020405292510986},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.36525148153305054},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.3337782323360443},{"id":"https://openalex.org/keywords/search-engine","display_name":"Search engine","score":0.23756176233291626},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.22138488292694092}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8444184064865112},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7159428596496582},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6620730757713318},{"id":"https://openalex.org/C189430467","wikidata":"https://www.wikidata.org/wiki/Q7293293","display_name":"Ranking (information retrieval)","level":2,"score":0.5281075239181519},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.5201176404953003},{"id":"https://openalex.org/C2776945383","wikidata":"https://www.wikidata.org/wiki/Q7170667","display_name":"Personalized search","level":3,"score":0.4918537139892578},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.42485305666923523},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.41776224970817566},{"id":"https://openalex.org/C2780522230","wikidata":"https://www.wikidata.org/wiki/Q1140419","display_name":"Ambiguity","level":2,"score":0.41020405292510986},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.36525148153305054},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.3337782323360443},{"id":"https://openalex.org/C97854310","wikidata":"https://www.wikidata.org/wiki/Q19541","display_name":"Search engine","level":2,"score":0.23756176233291626},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.22138488292694092},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/wcsp.2014.6992161","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wcsp.2014.6992161","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 Sixth International Conference on Wireless Communications and Signal Processing (WCSP)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/8","display_name":"Decent work and economic growth","score":0.4099999964237213}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W1579761987","https://openalex.org/W1966350672","https://openalex.org/W1975168722","https://openalex.org/W2041480327","https://openalex.org/W2054701320","https://openalex.org/W2087303942","https://openalex.org/W2108590723","https://openalex.org/W2118006580","https://openalex.org/W2122590785","https://openalex.org/W2132867658","https://openalex.org/W2139583278"],"related_works":["https://openalex.org/W2353179089","https://openalex.org/W2923538289","https://openalex.org/W2353125546","https://openalex.org/W2470643824","https://openalex.org/W4400595174","https://openalex.org/W2349635380","https://openalex.org/W4353089801","https://openalex.org/W2353819554","https://openalex.org/W2359488321","https://openalex.org/W2389866386"],"abstract_inverted_index":{"Cloud":[0,87],"computing":[1,7],"is":[2,38,57],"emerging":[3],"as":[4],"a":[5,11,59,81,126,192],"revolutionary":[6],"paradigm":[8],"which":[9,33,139],"provides":[10],"flexible":[12],"and":[13,19,23,46,79,110,137,158,168,174,197],"economic":[14],"strategy":[15],"for":[16,32,113,129],"data":[17,78],"management":[18],"resource":[20],"sharing.":[21],"Security":[22],"privacy":[24,99,108,169],"become":[25],"major":[26],"concerns":[27],"in":[28,62,97,116],"the":[29,52,102,107,120,143,154,159,175,182,188,204,209],"cloud":[30,77],"scenario,":[31],"Searchable":[34],"Encryption":[35],"(SE)":[36],"technology":[37],"proposed":[39,216],"to":[40,124,163,179],"support":[41],"efficient":[42],"keyword":[43,134],"based":[44],"queries":[45],"retrieval":[47,96],"of":[48,54,145],"encrypted":[49,76],"data.":[50],"However,":[51],"absence":[53],"personalized":[55,73,114],"search":[56,74,115,135,148,166,183],"still":[58],"typical":[60],"shortage":[61],"existing":[63],"SE":[64],"schemes.":[65],"In":[66,150],"this":[67],"paper,":[68],"we":[69,105,152],"focus":[70],"on":[71,200,203],"addressing":[72],"over":[75,85],"propose":[80],"Privacy-preserving":[82],"Personalized":[83],"Search":[84],"Encrypted":[86],"Data":[88],"Supporting":[89],"Multi-keyword":[90],"Ranking(PPSE)":[91],"scheme":[92,162,211],"that":[93,181,208],"supports":[94],"Top-k":[95],"stringent":[98],"requirements.":[100],"For":[101],"first":[103],"time,":[104],"formulate":[106],"issue":[109],"design":[111,217],"goals":[112],"SE.":[117],"We":[118],"introduce":[119],"Open":[121],"Directory":[122],"Project":[123],"construct":[125],"formal":[127],"model":[128,157],"integrating":[130],"preferential":[131],"ranking":[132],"with":[133,214],"reasonably":[136],"automatically,":[138],"can":[140],"help":[141,178],"eliminate":[142],"ambiguity":[144],"any":[146],"two":[147],"requests.":[149],"PPSE,":[151],"employ":[153],"vector":[155],"space":[156],"secure":[160],"kNN":[161],"guarantee":[164],"sufficient":[165],"accuracy":[167],"protection.":[170],"The":[171],"tf-idf":[172],"weight":[173,177],"preference":[176],"ensure":[180],"result":[184],"will":[185],"faithfully":[186],"respect":[187],"user's":[189],"interest.":[190],"As":[191],"result,":[193],"thorough":[194],"security":[195],"analysis":[196],"performance":[198],"evaluation":[199],"experiments":[201],"performed":[202],"real-world":[205],"dataset":[206],"demonstrate":[207],"PPSE":[210],"indeed":[212],"accords":[213],"our":[215],"goals.":[218]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
