{"id":"https://openalex.org/W1596404826","doi":"https://doi.org/10.1109/cloud.2015.83","title":"Keyword Search over Shared Cloud Data without Secure Channel or Authority","display_name":"Keyword Search over Shared Cloud Data without Secure Channel or Authority","publication_year":2015,"publication_date":"2015-06-01","ids":{"openalex":"https://openalex.org/W1596404826","doi":"https://doi.org/10.1109/cloud.2015.83","mag":"1596404826"},"language":"en","primary_location":{"id":"doi:10.1109/cloud.2015.83","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cloud.2015.83","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE 8th International Conference on Cloud Computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5027634173","display_name":"Yilun Wu","orcid":"https://orcid.org/0000-0003-1434-2039"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]},{"id":"https://openalex.org/I185261750","display_name":"University of Toronto","ror":"https://ror.org/03dbr7087","country_code":"CA","type":"education","lineage":["https://openalex.org/I185261750"]}],"countries":["CA","CN"],"is_corresponding":true,"raw_author_name":"Yilun Wu","raw_affiliation_strings":["College of Computer, National University of Defense Technology, Changsha, Hunan, China","Department of Electrical and Computer Engineering, University of Toronto, Toronto, Ontario, Canada"],"affiliations":[{"raw_affiliation_string":"College of Computer, National University of Defense Technology, Changsha, Hunan, China","institution_ids":["https://openalex.org/I170215575"]},{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Toronto, Toronto, Ontario, Canada","institution_ids":["https://openalex.org/I185261750"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055375948","display_name":"Jinshu Su","orcid":"https://orcid.org/0000-0001-9273-616X"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jinshu Su","raw_affiliation_strings":["College of Computer, National University of Defense Technology, Changsha, Hunan, China"],"affiliations":[{"raw_affiliation_string":"College of Computer, National University of Defense Technology, Changsha, Hunan, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5083596391","display_name":"Baochun Li","orcid":"https://orcid.org/0000-0003-2404-0974"},"institutions":[{"id":"https://openalex.org/I185261750","display_name":"University of Toronto","ror":"https://ror.org/03dbr7087","country_code":"CA","type":"education","lineage":["https://openalex.org/I185261750"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Baochun Li","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Toronto, Toronto, Ontario, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Toronto, Toronto, Ontario, Canada","institution_ids":["https://openalex.org/I185261750"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5027634173"],"corresponding_institution_ids":["https://openalex.org/I170215575","https://openalex.org/I185261750"],"apc_list":null,"apc_paid":null,"fwci":0.4314,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.75047665,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"580","last_page":"587"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9926000237464905,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7683396339416504},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7587056756019592},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7571450471878052},{"id":"https://openalex.org/keywords/outsourcing","display_name":"Outsourcing","score":0.7400026321411133},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6607136726379395},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.5916004180908203},{"id":"https://openalex.org/keywords/cloud-storage","display_name":"Cloud storage","score":0.46092674136161804},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.43548837304115295},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3580424189567566},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3345435857772827},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.11465844511985779}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7683396339416504},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7587056756019592},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7571450471878052},{"id":"https://openalex.org/C46934059","wikidata":"https://www.wikidata.org/wiki/Q61515","display_name":"Outsourcing","level":2,"score":0.7400026321411133},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6607136726379395},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.5916004180908203},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.46092674136161804},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.43548837304115295},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3580424189567566},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3345435857772827},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.11465844511985779},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cloud.2015.83","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cloud.2015.83","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE 8th International Conference on Cloud Computing","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.6399999856948853}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W288529411","https://openalex.org/W1493744513","https://openalex.org/W1511886987","https://openalex.org/W1512194687","https://openalex.org/W1963071371","https://openalex.org/W1988169383","https://openalex.org/W2038988507","https://openalex.org/W2054701320","https://openalex.org/W2054904172","https://openalex.org/W2093175219","https://openalex.org/W2108590723","https://openalex.org/W2117740674","https://openalex.org/W2120839853","https://openalex.org/W2122590785","https://openalex.org/W2126689465","https://openalex.org/W2131043660","https://openalex.org/W2132257180","https://openalex.org/W2144754501","https://openalex.org/W2146828512","https://openalex.org/W2147929033","https://openalex.org/W2152516507","https://openalex.org/W2156186849","https://openalex.org/W2161214567","https://openalex.org/W2161850389","https://openalex.org/W2293178884"],"related_works":["https://openalex.org/W2931996793","https://openalex.org/W4205234238","https://openalex.org/W3148880067","https://openalex.org/W2788934790","https://openalex.org/W3167767780","https://openalex.org/W1988660452","https://openalex.org/W3043682580","https://openalex.org/W2941559775","https://openalex.org/W3142266060","https://openalex.org/W2593645431"],"abstract_inverted_index":{"Storage":[0],"services":[1],"play":[2],"an":[3,111,137],"important":[4],"role":[5],"in":[6,61,103,140],"a":[7,23,46,62,131,152],"public":[8,63],"cloud.":[9],"By":[10],"outsourcing":[11],"data":[12,163],"to":[13,21,71,86,101,113,191],"the":[14,31,36,50,55,76,88,93,115,123,141,161,180,188,193,200],"remote":[15],"cloud,":[16],"users":[17],"do":[18],"not":[19],"need":[20],"maintain":[22],"local":[24],"storage":[25,32],"infrastructure":[26],"and":[27,96,98,143],"can":[28,144,174,184],"significantly":[29],"lower":[30],"cost.":[33],"To":[34],"protect":[35],"privacy,":[37],"documents":[38,57],"must":[39],"be":[40,58],"encrypted":[41,56,77,162],"before":[42],"outsourcing.":[43],"This":[44,128],"raises":[45],"new":[47],"challenge":[48],"for":[49],"document":[51],"owner:":[52],"how":[53],"should":[54],"securely":[59],"searched":[60],"cloud?":[64],"While":[65],"many":[66],"mechanisms":[67,82,109],"have":[68],"been":[69],"proposed":[70,201],"support":[72],"secure":[73,84,168],"search":[74,159],"over":[75,160],"documents,":[78],"most":[79],"of":[80,118,125],"these":[81],"require":[83,110],"channels":[85],"transmit":[87],"secret":[89,94],"information,":[90],"such":[91],"as":[92],"keys":[95],"trapdoors,":[97],"is":[99,203],"difficult":[100],"deploy":[102],"cloud":[104,126,142],"systems.":[105],"Moreover,":[106],"some":[107],"existing":[108],"authority":[112],"control":[114],"access":[116],"requests":[117],"users,":[119],"which":[120],"inevitably":[121],"increases":[122],"complexity":[124],"infrastructure.":[127],"paper":[129],"considers":[130],"more":[132],"stringent":[133],"security":[134],"model":[135],"where":[136],"eavesdropper":[138,173],"exists":[139],"eavesdrop":[145],"on":[146,166],"all":[147],"transmission":[148],"channels.":[149],"We":[150],"propose":[151],"novel":[153],"mechanism":[154,202],"that":[155,199],"supports":[156],"multi-user":[157],"keyword":[158,194],"without":[164],"relying":[165],"any":[167],"channel":[169],"or":[170],"authority.":[171],"The":[172],"neither":[175],"forge":[176],"valid":[177],"trapdoors":[178,190],"from":[179],"intercepted":[181,189],"information":[182],"nor":[183],"it":[185],"directly":[186],"use":[187],"complete":[192],"search.":[195],"Security":[196],"analysis":[197],"shows":[198],"secure.":[204]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
