{"id":"https://openalex.org/W4410412702","doi":"https://doi.org/10.1155/int/8819489","title":"A Protecting\u2010Privacy Path Query Supporting Semantic\u2010Based Multikeyword Search Over Ciphertext Graph Data in Cloud Computing","display_name":"A Protecting\u2010Privacy Path Query Supporting Semantic\u2010Based Multikeyword Search Over Ciphertext Graph Data in Cloud Computing","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4410412702","doi":"https://doi.org/10.1155/int/8819489"},"language":"en","primary_location":{"id":"doi:10.1155/int/8819489","is_oa":true,"landing_page_url":"https://doi.org/10.1155/int/8819489","pdf_url":"https://onlinelibrary.wiley.com/doi/pdfdirect/10.1155/int/8819489","source":{"id":"https://openalex.org/S57950554","display_name":"International Journal of Intelligent Systems","issn_l":"0884-8173","issn":["0884-8173","1098-111X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Intelligent Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://onlinelibrary.wiley.com/doi/pdfdirect/10.1155/int/8819489","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5021519853","display_name":"Bin Wu","orcid":"https://orcid.org/0000-0003-4848-7316"},"institutions":[{"id":"https://openalex.org/I134626604","display_name":"Jiujiang University","ror":"https://ror.org/0066vpg85","country_code":"CN","type":"education","lineage":["https://openalex.org/I134626604"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bin Wu","raw_affiliation_strings":["Jiujiang Key Laboratory of Network and Information Security ,  Jiujiang , Jiangxi,  332005 ,  China","School of Computer and Big Data Science ,  Jiujiang University ,  Jiujiang , Jiangxi,  332005 ,  China ,  jju.edu.cn"],"affiliations":[{"raw_affiliation_string":"Jiujiang Key Laboratory of Network and Information Security ,  Jiujiang , Jiangxi,  332005 ,  China","institution_ids":["https://openalex.org/I134626604"]},{"raw_affiliation_string":"School of Computer and Big Data Science ,  Jiujiang University ,  Jiujiang , Jiangxi,  332005 ,  China ,  jju.edu.cn","institution_ids":["https://openalex.org/I134626604"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064810846","display_name":"Zhuolin Mei","orcid":"https://orcid.org/0000-0002-8941-0844"},"institutions":[{"id":"https://openalex.org/I134626604","display_name":"Jiujiang University","ror":"https://ror.org/0066vpg85","country_code":"CN","type":"education","lineage":["https://openalex.org/I134626604"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhuolin Mei","raw_affiliation_strings":["Jiujiang Key Laboratory of Network and Information Security ,  Jiujiang , Jiangxi,  332005 ,  China","School of Computer and Big Data Science ,  Jiujiang University ,  Jiujiang , Jiangxi,  332005 ,  China ,  jju.edu.cn"],"affiliations":[{"raw_affiliation_string":"Jiujiang Key Laboratory of Network and Information Security ,  Jiujiang , Jiangxi,  332005 ,  China","institution_ids":["https://openalex.org/I134626604"]},{"raw_affiliation_string":"School of Computer and Big Data Science ,  Jiujiang University ,  Jiujiang , Jiangxi,  332005 ,  China ,  jju.edu.cn","institution_ids":["https://openalex.org/I134626604"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101919822","display_name":"Jiaoli Shi","orcid":"https://orcid.org/0000-0002-8908-1921"},"institutions":[{"id":"https://openalex.org/I134626604","display_name":"Jiujiang University","ror":"https://ror.org/0066vpg85","country_code":"CN","type":"education","lineage":["https://openalex.org/I134626604"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiaoli Shi","raw_affiliation_strings":["School of Computer and Big Data Science ,  Jiujiang University ,  Jiujiang , Jiangxi,  332005 ,  China ,  jju.edu.cn"],"affiliations":[{"raw_affiliation_string":"School of Computer and Big Data Science ,  Jiujiang University ,  Jiujiang , Jiangxi,  332005 ,  China ,  jju.edu.cn","institution_ids":["https://openalex.org/I134626604"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078484260","display_name":"Zongmin Cui","orcid":"https://orcid.org/0000-0001-5592-425X"},"institutions":[{"id":"https://openalex.org/I134626604","display_name":"Jiujiang University","ror":"https://ror.org/0066vpg85","country_code":"CN","type":"education","lineage":["https://openalex.org/I134626604"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zongmin Cui","raw_affiliation_strings":["School of Computer and Big Data Science ,  Jiujiang University ,  Jiujiang , Jiangxi,  332005 ,  China ,  jju.edu.cn"],"affiliations":[{"raw_affiliation_string":"School of Computer and Big Data Science ,  Jiujiang University ,  Jiujiang , Jiangxi,  332005 ,  China ,  jju.edu.cn","institution_ids":["https://openalex.org/I134626604"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015953855","display_name":"Zhiqiang Zhao","orcid":"https://orcid.org/0000-0001-6627-9807"},"institutions":[{"id":"https://openalex.org/I4210131492","display_name":"Ningxia Normal University","ror":"https://ror.org/03saxfv98","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210131492"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhiqiang Zhao","raw_affiliation_strings":["School of Mathematics and Computer Science ,  Ningxia Normal University ,  Guyuan , Ningxia,  756099 ,  China ,  nxtu.cn"],"affiliations":[{"raw_affiliation_string":"School of Mathematics and Computer Science ,  Ningxia Normal University ,  Guyuan , Ningxia,  756099 ,  China ,  nxtu.cn","institution_ids":["https://openalex.org/I4210131492"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5016876837","display_name":"Jinzhou Huang","orcid":"https://orcid.org/0009-0001-4217-6894"},"institutions":[{"id":"https://openalex.org/I4210113795","display_name":"Hubei University of Arts and Science","ror":"https://ror.org/0212jcf64","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210113795"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jinzhou Huang","raw_affiliation_strings":["School of Computer Engineering ,  Hubei University of Arts and Science ,  Xiangyang , Hubei,  441053 ,  China ,  hbuas.edu.cn"],"affiliations":[{"raw_affiliation_string":"School of Computer Engineering ,  Hubei University of Arts and Science ,  Xiangyang , Hubei,  441053 ,  China ,  hbuas.edu.cn","institution_ids":["https://openalex.org/I4210113795"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5016876837"],"corresponding_institution_ids":["https://openalex.org/I4210113795"],"apc_list":{"value":2500,"currency":"USD","value_usd":2500},"apc_paid":{"value":2500,"currency":"USD","value_usd":2500},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.04849163,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"2025","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7804155349731445},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.7040454745292664},{"id":"https://openalex.org/keywords/semantic-security","display_name":"Semantic security","score":0.6229157447814941},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6091418266296387},{"id":"https://openalex.org/keywords/path","display_name":"Path (computing)","score":0.5230154395103455},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.4620394706726074},{"id":"https://openalex.org/keywords/web-search-query","display_name":"Web search query","score":0.41414710879325867},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3927937150001526},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.3782798647880554},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3425101041793823},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.23430946469306946},{"id":"https://openalex.org/keywords/search-engine","display_name":"Search engine","score":0.20508748292922974},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.19026947021484375},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.14205336570739746},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.11075586080551147}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7804155349731445},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.7040454745292664},{"id":"https://openalex.org/C204806902","wikidata":"https://www.wikidata.org/wiki/Q2333581","display_name":"Semantic security","level":5,"score":0.6229157447814941},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6091418266296387},{"id":"https://openalex.org/C2777735758","wikidata":"https://www.wikidata.org/wiki/Q817765","display_name":"Path (computing)","level":2,"score":0.5230154395103455},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.4620394706726074},{"id":"https://openalex.org/C164120249","wikidata":"https://www.wikidata.org/wiki/Q995982","display_name":"Web search query","level":3,"score":0.41414710879325867},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3927937150001526},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.3782798647880554},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3425101041793823},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.23430946469306946},{"id":"https://openalex.org/C97854310","wikidata":"https://www.wikidata.org/wiki/Q19541","display_name":"Search engine","level":2,"score":0.20508748292922974},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.19026947021484375},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.14205336570739746},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.11075586080551147},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1155/int/8819489","is_oa":true,"landing_page_url":"https://doi.org/10.1155/int/8819489","pdf_url":"https://onlinelibrary.wiley.com/doi/pdfdirect/10.1155/int/8819489","source":{"id":"https://openalex.org/S57950554","display_name":"International Journal of Intelligent Systems","issn_l":"0884-8173","issn":["0884-8173","1098-111X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Intelligent Systems","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1155/int/8819489","is_oa":true,"landing_page_url":"https://doi.org/10.1155/int/8819489","pdf_url":"https://onlinelibrary.wiley.com/doi/pdfdirect/10.1155/int/8819489","source":{"id":"https://openalex.org/S57950554","display_name":"International Journal of Intelligent Systems","issn_l":"0884-8173","issn":["0884-8173","1098-111X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Intelligent Systems","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4521583451","display_name":null,"funder_award_id":"GJJ2401819","funder_id":"https://openalex.org/F4320325626","funder_display_name":"Education Department of Jiangxi Province"},{"id":"https://openalex.org/G5264960860","display_name":null,"funder_award_id":"62262033","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6074535426","display_name":null,"funder_award_id":"NYG2024164","funder_id":"https://openalex.org/F4320328880","funder_display_name":"Scientific Research Foundation of Higher Education Institutions of Ningxia"},{"id":"https://openalex.org/G7076707531","display_name":null,"funder_award_id":"2024AAC03310","funder_id":"https://openalex.org/F4320322877","funder_display_name":"Natural Science Foundation of Ningxia Province"},{"id":"https://openalex.org/G7308152673","display_name":null,"funder_award_id":"62362042","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8590422079","display_name":null,"funder_award_id":"62062045","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8872156583","display_name":null,"funder_award_id":"20224BAB202012","funder_id":"https://openalex.org/F4320322665","funder_display_name":"Natural Science Foundation of Jiangxi Province"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322665","display_name":"Natural Science Foundation of Jiangxi Province","ror":null},{"id":"https://openalex.org/F4320322877","display_name":"Natural Science Foundation of Ningxia Province","ror":null},{"id":"https://openalex.org/F4320325626","display_name":"Education Department of Jiangxi Province","ror":null},{"id":"https://openalex.org/F4320328880","display_name":"Scientific Research Foundation of Higher Education Institutions of Ningxia","ror":null}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4410412702.pdf","grobid_xml":"https://content.openalex.org/works/W4410412702.grobid-xml"},"referenced_works_count":38,"referenced_works":["https://openalex.org/W1493744513","https://openalex.org/W1539859404","https://openalex.org/W2102415185","https://openalex.org/W2131043660","https://openalex.org/W2146591355","https://openalex.org/W2146828512","https://openalex.org/W2152516507","https://openalex.org/W2770638201","https://openalex.org/W2898325432","https://openalex.org/W2973440858","https://openalex.org/W2983840326","https://openalex.org/W3048853384","https://openalex.org/W3205584708","https://openalex.org/W3206968728","https://openalex.org/W3215748784","https://openalex.org/W4205558896","https://openalex.org/W4210300416","https://openalex.org/W4212797794","https://openalex.org/W4220948165","https://openalex.org/W4226300264","https://openalex.org/W4285269838","https://openalex.org/W4316813696","https://openalex.org/W4360993846","https://openalex.org/W4362673243","https://openalex.org/W4364302326","https://openalex.org/W4367146487","https://openalex.org/W4387682089","https://openalex.org/W4388505084","https://openalex.org/W4389403425","https://openalex.org/W4389664979","https://openalex.org/W4390204465","https://openalex.org/W4399363452","https://openalex.org/W4400121239","https://openalex.org/W4400679652","https://openalex.org/W4400910500","https://openalex.org/W4401508264","https://openalex.org/W4401567965","https://openalex.org/W4405182813"],"related_works":["https://openalex.org/W3029058925","https://openalex.org/W2096211577","https://openalex.org/W2015940479","https://openalex.org/W2518737721","https://openalex.org/W2363701519","https://openalex.org/W2991416436","https://openalex.org/W1589129854","https://openalex.org/W1939781145","https://openalex.org/W2383331906","https://openalex.org/W2355126378"],"abstract_inverted_index":{"With":[0],"the":[1,40,43,47,51,58,69,75,92,115,128,145,152,167,171,206],"rapid":[2],"development":[3],"of":[4,16,27,42,60,71,77,82,154,197,211],"information":[5,85],"technology":[6],"and":[7,12,37,74,88,126,157,165,186,193,209],"intelligence,":[8],"there":[9],"are":[10,32],"more":[11,13],"usage":[14],"scenarios":[15],"graph":[17,55,83,130,147,213],"data.":[18,131,214],"Path":[19],"queries":[20],"have":[21],"always":[22],"been":[23],"a":[24,96,137,160,201],"hot":[25],"topic":[26],"research":[28],"for":[29],"scholars.":[30],"There":[31],"already":[33],"many":[34],"mature":[35],"methods":[36],"ideas":[38],"in":[39,57],"study":[41],"path":[44,52,101,109,141,176],"query":[45,53,72,102,110,116,142,207],"on":[46,54,144,151,205],"plaintext":[48],"graph.":[49],"For":[50,118],"data":[56],"case":[59],"cloud":[61,93,168],"outsourcing,":[62],"it":[63,120],"is":[64,95,106,121,163],"necessary":[65],"to":[66,91,124,174],"consider":[67],"both":[68],"construction":[70],"algorithms":[73],"protection":[76],"privacy":[78,84],"information.":[79],"The":[80,99,195],"processing":[81,208],"through":[86,183,190],"encryption,":[87],"then":[89,166],"outsourcing":[90],"platform,":[94],"common":[97],"measure.":[98],"semantic\u2010based":[100,139],"supporting":[103],"multikeyword":[104,140],"search":[105],"an":[107],"extended":[108],"method,":[111],"which":[112],"can":[113],"improve":[114],"function.":[117],"users,":[119],"very":[122],"troublesome":[123],"access":[125],"process":[127],"encrypted":[129],"In":[132],"this":[133,198],"article,":[134],"we":[135],"propose":[136],"protecting\u2010privacy":[138],"scheme":[143],"ciphertext":[146,212],"(PSMP).":[148],"Firstly,":[149],"based":[150],"principle":[153],"searchable":[155],"encryption":[156],"vector":[158],"operation,":[159],"secure":[161,172],"index":[162,173],"constructed,":[164],"server":[169],"uses":[170],"implement":[175],"queries.":[177],"This":[178],"article":[179,199],"demonstrates":[180],"its":[181,188],"security":[182],"formal":[184],"analysis":[185,210],"verifies":[187],"effectiveness":[189],"experimental":[191],"comparison":[192],"analysis.":[194],"work":[196],"has":[200],"certain":[202],"promoting":[203],"effect":[204]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
