{"id":"https://openalex.org/W4414556781","doi":"https://doi.org/10.1145/3769425","title":"Efficient Privacy-Preserving Conjunctive Searchable Encryption for Cloud-IoT Healthcare Systems","display_name":"Efficient Privacy-Preserving Conjunctive Searchable Encryption for Cloud-IoT Healthcare Systems","publication_year":2025,"publication_date":"2025-09-26","ids":{"openalex":"https://openalex.org/W4414556781","doi":"https://doi.org/10.1145/3769425"},"language":"en","primary_location":{"id":"doi:10.1145/3769425","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3769425","pdf_url":null,"source":{"id":"https://openalex.org/S4210174050","display_name":"ACM Transactions on Privacy and Security","issn_l":"2471-2566","issn":["2471-2566","2471-2574"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Privacy and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.1145/3769425","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Jiadi Ma","orcid":"https://orcid.org/0009-0008-0366-3236"},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jiadi Ma","raw_affiliation_strings":["College of Computer Science, Beijing University of Technology","College of Computer Science, Beijing University of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science, Beijing University of Technology","institution_ids":["https://openalex.org/I37796252"]},{"raw_affiliation_string":"College of Computer Science, Beijing University of Technology, Beijing, China","institution_ids":["https://openalex.org/I37796252"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Tianqi Peng","orcid":"https://orcid.org/0009-0000-7267-8169"},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tianqi Peng","raw_affiliation_strings":["College of Computer Science, Beijing University of Technology","College of Computer Science, Beijing University of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science, Beijing University of Technology","institution_ids":["https://openalex.org/I37796252"]},{"raw_affiliation_string":"College of Computer Science, Beijing University of Technology, Beijing, China","institution_ids":["https://openalex.org/I37796252"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030231661","display_name":"Bei Gong","orcid":"https://orcid.org/0000-0003-3188-3531"},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]},{"id":"https://openalex.org/I75390827","display_name":"Beijing University of Chemical Technology","ror":"https://ror.org/00df5yc52","country_code":"CN","type":"education","lineage":["https://openalex.org/I75390827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Gong Bei","raw_affiliation_strings":["College of Computer Science, Beijing University of Technology","College of Computer Science, Beijing University of Technology, Beijing China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science, Beijing University of Technology","institution_ids":["https://openalex.org/I37796252"]},{"raw_affiliation_string":"College of Computer Science, Beijing University of Technology, Beijing China","institution_ids":["https://openalex.org/I37796252","https://openalex.org/I75390827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086533220","display_name":"Muhammad Waqas","orcid":"https://orcid.org/0000-0003-0814-7544"},"institutions":[{"id":"https://openalex.org/I12079687","display_name":"Edith Cowan University","ror":"https://ror.org/05jhnwe22","country_code":"AU","type":"education","lineage":["https://openalex.org/I12079687"]},{"id":"https://openalex.org/I55060895","display_name":"University of Greenwich","ror":"https://ror.org/00bmj0a71","country_code":"GB","type":"education","lineage":["https://openalex.org/I55060895"]}],"countries":["AU","GB"],"is_corresponding":false,"raw_author_name":"Muhammad Waqas","raw_affiliation_strings":["School of Computing and Mathematical Sciences, University of Greenwich","School of Engineering, Edith Cowan University","School of Engineering, Edith Cowan University, Joondalup, Australia","School of Computing and Mathematical Sciences, University of Greenwich, London United Kingdom of Great Britain and Northern Ireland"],"affiliations":[{"raw_affiliation_string":"School of Computing and Mathematical Sciences, University of Greenwich","institution_ids":["https://openalex.org/I55060895"]},{"raw_affiliation_string":"School of Engineering, Edith Cowan University","institution_ids":["https://openalex.org/I12079687"]},{"raw_affiliation_string":"School of Engineering, Edith Cowan University, Joondalup, Australia","institution_ids":["https://openalex.org/I12079687"]},{"raw_affiliation_string":"School of Computing and Mathematical Sciences, University of Greenwich, London United Kingdom of Great Britain and Northern Ireland","institution_ids":["https://openalex.org/I55060895"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067599262","display_name":"Hisham Alasmary","orcid":"https://orcid.org/0000-0002-6482-3968"},"institutions":[{"id":"https://openalex.org/I82952536","display_name":"King Khalid University","ror":"https://ror.org/052kwzs30","country_code":"SA","type":"education","lineage":["https://openalex.org/I82952536"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Hisham Alasmary","raw_affiliation_strings":["Department of Computer Science, King Khalid University","Department of Computer Science, King Khalid University, Abha Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, King Khalid University","institution_ids":["https://openalex.org/I82952536"]},{"raw_affiliation_string":"Department of Computer Science, King Khalid University, Abha Saudi Arabia","institution_ids":["https://openalex.org/I82952536"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100320984","display_name":"Sheng Chen","orcid":"https://orcid.org/0000-0002-0907-735X"},"institutions":[{"id":"https://openalex.org/I43439940","display_name":"University of Southampton","ror":"https://ror.org/01ryk1543","country_code":"GB","type":"education","lineage":["https://openalex.org/I43439940"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Sheng Chen","raw_affiliation_strings":["University of Southampton","University of Southampton, Southampton United Kingdom of Great Britain and Northern Ireland"],"affiliations":[{"raw_affiliation_string":"University of Southampton","institution_ids":["https://openalex.org/I43439940"]},{"raw_affiliation_string":"University of Southampton, Southampton United Kingdom of Great Britain and Northern Ireland","institution_ids":["https://openalex.org/I43439940"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":6,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I37796252"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.13552281,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"29","issue":"1","first_page":"1","last_page":"27"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7778000235557556},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.6941999793052673},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5471000075340271},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.5353999733924866},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.5069000124931335},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.38580000400543213},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.3763999938964844},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.37560001015663147}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7778000235557556},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7343999743461609},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.6941999793052673},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5471000075340271},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.5353999733924866},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5293999910354614},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.5069000124931335},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.38580000400543213},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3763999938964844},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.37560001015663147},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.34610000252723694},{"id":"https://openalex.org/C99221444","wikidata":"https://www.wikidata.org/wiki/Q1532069","display_name":"Private information retrieval","level":2,"score":0.33009999990463257},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.3239000141620636},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.3109999895095825},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3068000078201294},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.2939999997615814},{"id":"https://openalex.org/C160735492","wikidata":"https://www.wikidata.org/wiki/Q31207","display_name":"Health care","level":2,"score":0.2840000092983246},{"id":"https://openalex.org/C2778950925","wikidata":"https://www.wikidata.org/wiki/Q4672474","display_name":"Access structure","level":4,"score":0.2777999937534332},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.2678000032901764},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.26089999079704285},{"id":"https://openalex.org/C65647387","wikidata":"https://www.wikidata.org/wiki/Q1781706","display_name":"Conjunctive query","level":3,"score":0.260699987411499},{"id":"https://openalex.org/C2987335383","wikidata":"https://www.wikidata.org/wiki/Q878048","display_name":"Cloud server","level":3,"score":0.25200000405311584}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1145/3769425","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3769425","pdf_url":null,"source":{"id":"https://openalex.org/S4210174050","display_name":"ACM Transactions on Privacy and Security","issn_l":"2471-2566","issn":["2471-2566","2471-2574"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Privacy and Security","raw_type":"journal-article"},{"id":"pmh:oai:eprints.soton.ac.uk:505703","is_oa":false,"landing_page_url":"http://doi.org/10.1145/3769425>).","pdf_url":null,"source":{"id":"https://openalex.org/S4306401019","display_name":"ePrints Soton (University of Southampton)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I43439940","host_organization_name":"University of Southampton","host_organization_lineage":["https://openalex.org/I43439940"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"},{"id":"pmh:oai:gala.gre.ac.uk:51241","is_oa":false,"landing_page_url":"https://orcid.org/0000-0003-0814-7544","pdf_url":null,"source":{"id":"https://openalex.org/S4306401244","display_name":"Greenwich Academic Literature Archive (University of Greenwich)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I55060895","host_organization_name":"University of Greenwich","host_organization_lineage":["https://openalex.org/I55060895"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":null,"raw_type":"NonPeerReviewed"},{"id":"pmh:oai:ro.ecu.edu.au:ecuworks2022-2026-8744","is_oa":true,"landing_page_url":"https://ro.ecu.edu.au/ecuworks2022-2026/7744","pdf_url":"https://ro.ecu.edu.au/context/ecuworks2022-2026/article/8744/viewcontent/Efficient_20Privacy_Preserving_20Conjunctive_20Searchable.pdf","source":{"id":"https://openalex.org/S4306400464","display_name":"Research Online (Edith Cowan University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I12079687","host_organization_name":"Edith Cowan University","host_organization_lineage":["https://openalex.org/I12079687"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Research outputs 2022 to 2026","raw_type":"text"}],"best_oa_location":{"id":"doi:10.1145/3769425","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3769425","pdf_url":null,"source":{"id":"https://openalex.org/S4210174050","display_name":"ACM Transactions on Privacy and Security","issn_l":"2471-2566","issn":["2471-2566","2471-2574"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Privacy and Security","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W2314118214","https://openalex.org/W2914452207","https://openalex.org/W3032201842","https://openalex.org/W3207007432","https://openalex.org/W3215772207","https://openalex.org/W4200307116","https://openalex.org/W4205662536","https://openalex.org/W4210763735","https://openalex.org/W4221131033","https://openalex.org/W4221147176","https://openalex.org/W4283751936","https://openalex.org/W4296437242","https://openalex.org/W4313010978","https://openalex.org/W4320009812","https://openalex.org/W4360993064","https://openalex.org/W4376456651","https://openalex.org/W4376481172","https://openalex.org/W4378194868","https://openalex.org/W4385154266","https://openalex.org/W4387092659","https://openalex.org/W4387197046","https://openalex.org/W4388505035","https://openalex.org/W4388853696","https://openalex.org/W4389370921","https://openalex.org/W4389538156","https://openalex.org/W4389665970","https://openalex.org/W4395056432","https://openalex.org/W4400810604","https://openalex.org/W4402978440","https://openalex.org/W4403675639","https://openalex.org/W4406094226","https://openalex.org/W4407691066","https://openalex.org/W4409474274"],"related_works":[],"abstract_inverted_index":{"In":[0],"cloud-Internet":[1],"of":[2,152],"Things":[3],"(IoT)":[4],"healthcare":[5,58,78],"systems,":[6,79],"private":[7,50],"medical":[8],"data":[9,43],"leakage":[10],"is":[11,19,83,187],"a":[12],"serious":[13],"concern":[14],"as":[15],"the":[16,84,145,150,165],"cloud":[17],"server":[18],"not":[20,54,110],"fully":[21],"trusted.":[22],"Dynamic":[23],"searchable":[24,73],"symmetric":[25],"encryption":[26,74],"(DSSE),":[27],"with":[28,60,159],"necessary":[29],"forward":[30,47,136],"and":[31,48,137,148,181,189],"backward":[32,49,140],"privacy":[33,153],"security":[34,179],"properties,":[35],"enables":[36],"doctors":[37],"to":[38,102],"retrieve":[39],"ciphertexts":[40],"while":[41,134],"guaranteeing":[42],"privacy.":[44,141],"However,":[45],"existing":[46],"DSSE":[51,87],"schemes":[52],"are":[53],"well-suited":[55],"for":[56,76,90,100,131],"cloud-IoT":[57,77],"systems":[59],"attribute-value":[61,91],"type":[62,92],"databases.":[63,93],"To":[64,155],"this":[65],"end,":[66],"we":[67,95,169],"propose":[68],"an":[69,171],"efficient":[70],"privacy-preserving":[71],"conjunctive":[72,86,114],"scheme":[75,88,127],"called":[80],"PC-SE.":[81,177],"It":[82,108],"first":[85],"designed":[89],"Specifically,":[94],"design":[96],"flexible":[97],"search":[98,106,115,130],"capabilities":[99],"PC-SE":[101,186],"address":[103],"users\u2019":[104],"various":[105],"requirements.":[107],"can":[109,162],"only":[111,163],"achieve":[112],"precise":[113],"based":[116],"on":[117],"keywords":[118],"but":[119],"also":[120],"realize":[121],"broad":[122],"attribute":[123,132,167,172],"search.":[124],"Moreover,":[125],"our":[126],"achieves":[128],"fine-grained":[129],"values":[133],"maintaining":[135],"Type-I":[138],"-":[139],"This":[142],"approach":[143],"reduces":[144],"communication":[146],"burden":[147],"minimizes":[149],"risk":[151],"exposure.":[154],"ensure":[156],"that":[157,185],"users":[158],"different":[160],"authorities":[161],"access":[164,173],"corresponding":[166],"values,":[168],"introduce":[170],"control":[174],"mechanism":[175],"in":[176],"Finally,":[178],"analysis":[180],"experimental":[182],"results":[183],"demonstrate":[184],"secure":[188],"effective.":[190]},"counts_by_year":[],"updated_date":"2026-04-12T07:58:50.170612","created_date":"2025-09-27T00:00:00"}
