Citation: | LIU Lianggui and LIU Zhengjin, “A Novel Fast Dimension-Reducing Ranked Query Method with High Security for Encrypted Cloud Data,” Chinese Journal of Electronics, vol. 29, no. 2, pp. 344-350, 2020, doi: 10.1049/cje.2020.01.013 |
P.Golle, J.Staddon, and B.Waters, “Secure conjunctive keyword search over encrypted data”, Proc. 2004 Applied Cryptography and Network Security Conference, Yellow Mountain, China, pp.31-45, 2004.
|
N.Cao, C.Wang, M.Li, et al., “Privacy-preserving multikeyword ranked search over encrypted cloud data”, INFOCOM, 2011 Proceedings IEEE, Shanghai, China, pp.829-837, 2011.
|
R.X.Li, Z.Y.Xu, W.S.Kang, K.C. et al., “Efficient multikeyword ranked query over encrypted data in cloud computing”, Future Generation Computer Systems, Vol.30, No.1, pp.179-190, 2014.
|
L.G.Liu, H.Sun, H.L.Jia, et al., “CGIM: Classificatory group index method for efficient ranked search of encrypted cloud data”, Acta Electronica Sinica, Vol.47, No.2, pp.331-336, 2018.(in Chinese)
|
I.T.Jolliffe, “Principal component analysis”, Journal of Marketing Research, Springer, New York, NY, Vol.87, No.100, pp.1-488, 2002
|
D.X.D.Song, D.Wagner, and A.Perrig, “Practical techniques for searches on encrypted data”, 2000 IEEE Symposium on Security and Privacy, S&P 2000.Proceeding., Berkeley, CA, USA, pp.44-55, 2002.
|
E.J.Goh, “Building secure indexes for searching efficiently on encrypted compressed data”, IACR Cryptology ePrint Archive, 2003.
|
H.W.Li, D.X.Liu, K.Jia, et al., “Achieving authorized and ranked multi-keyword search over encrypted cloud data”, IEEE International Conference on Communications, London, UK, pp.7450-7455, 2015.
|
Q.Liu, X.H.Nie, X.H.Liu, et al., “Verifiable Ranked Search over dynamic encrypted data in cloud computing”, IEEE/ACM International Symposium on Quality of Service, Barcelona, Spain, pp.1-6, 2017.
|
C.Guo, Q.Q.Song, R.H.Zhuang, et al., “RSAE: Ranked keyword search over asymmetric encrypted cloud data”, IEEE Fifth International Conference on Big Data and Cloud Computing, Dalian, China, pp.82-86, 2015.
|
T.y.Peng, Y.P.Lin, X.Yao, et al., “An efficient ranked multikeyword search for multiple data owners over encrypted cloud data”, IEEE Access, Vol.PP, No.99, pp.1-1, 2018.
|
H.Tariq and P.Agarwal, “Secure keyword search using dual encryption in cloud computing”, International Journal of Information Technology, No.7, pp.1-10, 2018.
|
I.Liu, Y.Lin, J.Li, et al., “A secure multi-keyword fuzzy search with polynomial function for encrypted data in cloud computing”, 2018 3rd International Conference on Computer and Communication Systems (ICCCS), Moscow, Russia, pp.41-45, 2018.
|
Z.Fu, X.Sun, Z.Xia, et al., “Multi-keyword ranked search supporting synonym query over encrypted data in cloud computing”, PERFORMANCE Computing and Communications Conference, Austin, Texas, USA, pp.1-8, 2014.
|
Z.J.Fu, X.M.Sun, N.Linge, et al., “Achieving effective cloud search services: multi-keyword ranked search over encrypted cloud data supporting synonym query”, IEEE Transactions on Consumer Electronics, Vol.60, No.1, pp.164-172, 2014.
|
S.Ahmad and P.S.Kumar, “An efficient privacypreserving multi-keyword ranked search over encrypted data in cloud computing”, India Conference, Raipur,India, pp.1-6, 2017.
|
Z.J.Fu, L.Xia, X.M.Sun, et al., “Semantic-aware searching over encrypted data for cloud computing”, IEEE Transactions on Information Forensics & Security, Vol.13, No.9, pp.2359-2371, 2018.
|
C.R.Krishna and S.A.Mittal, “Privacy Preserving synonym based fuzzy multi-keyword ranked search over encrypted cloud data”, International Conference on Computing, Nanjing, China, pp.1-6, 2017.
|
Z.Z.Wu, X.Y.Chen, and X.H.Du, “Enhancing sensitive data security based-on double-layer information flow controlling in the cloud”, Acta Electronica Sinica, Vol.46, No.9, pp.2245-2250, 2018.(in Chinese)
|
J.Zobel and A.Moffat, “Exploring the similarity space”, Acm Sigir Forum, Vol.32, No.1, pp.18-34, 1998.
|