Skip to main content
Top
Published in: World Wide Web 5/2023

31-05-2023

A novel semantic-aware search scheme based on BCI-tree index over encrypted cloud data

Authors: Qian Zhou, Hua Dai, Yuanlong Liu, Geng Yang, Xun Yi, Zheng Hu

Published in: World Wide Web | Issue 5/2023

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Most of the traditional privacy-preserving search schemes in cloud adopt TF-IDF model which is on the basis of keyword frequency statistics. The embedding semantic association between keywords and documents are not considered. To solve this problem, we propose a novel semantic-aware search scheme based on BCI-tree index over encrypted cloud data. The LDA model is adopted to generate vectors for documents and queried keywords and the vectors contain topic-based semantic information. The homomorphic encryption on vectors is used to perform privacy-preserving semantic relevance score computation between queried keywords and documents. To achieve efficient search processing, a novel binary clustering tree-based index (BCI-tree index) is designed, which is constructed following the divisive hierarchical clustering algorithm. By using the BCI-tree index, a depth-first recursive search algorithm is proposed. In addition, a threshold presetting-based optimization is applied to further accelerate the search speed. The experimental results show that the proposed scheme performs good in the semantic precision of search results and the search time cost.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Ballard, L., Kamara, S., Monrose, F.: Achieving efficient conjunctive keyword searches over encrypted data. In: Proceedings of 2005 International Conference on Information and Communications Security. pp. 414–426. Springer (2005) Ballard, L., Kamara, S., Monrose, F.: Achieving efficient conjunctive keyword searches over encrypted data. In: Proceedings of 2005 International Conference on Information and Communications Security. pp. 414–426. Springer (2005)
2.
go back to reference Blei, D.M., Ng, A.Y., Jordan, M.I.: Latent dirichlet allocation. J. Mach. Learn. Res. 3(1), 993–1022 (2003)MATH Blei, D.M., Ng, A.Y., Jordan, M.I.: Latent dirichlet allocation. J. Mach. Learn. Res. 3(1), 993–1022 (2003)MATH
3.
go back to reference Boneh, D., Waters, B.: Conjunctive, subset, and range queries on encrypted data. In: Theory of Cryptography Conference. pp. 535–554. Springer (2007) Boneh, D., Waters, B.: Conjunctive, subset, and range queries on encrypted data. In: Theory of Cryptography Conference. pp. 535–554. Springer (2007)
4.
go back to reference Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. In: Proceeding of the 30th IEEE International Conference on Computer Communications. pp. 829–837. IEEE (2011) Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. In: Proceeding of the 30th IEEE International Conference on Computer Communications. pp. 829–837. IEEE (2011)
5.
go back to reference Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans. Parallel Distrib. Sys. 25(1), 222–233 (2014)CrossRef Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans. Parallel Distrib. Sys. 25(1), 222–233 (2014)CrossRef
6.
go back to reference Cao, Q., Li, Y., Wu, Z., Miao, Y., Liu, J.: Privacy-preserving conjunctive keyword search on encrypted data with enhanced fine-grained access control. World Wide Web 23, 959–989 (2020)CrossRef Cao, Q., Li, Y., Wu, Z., Miao, Y., Liu, J.: Privacy-preserving conjunctive keyword search on encrypted data with enhanced fine-grained access control. World Wide Web 23, 959–989 (2020)CrossRef
7.
go back to reference Chang, Y.C., Mitzenmacher, M.: Privacy preserving keyword searches on remote encrypted data. In: Proceedings of 2005 International Conference on Applied Cryptography and Network Security.pp. 442–455. Springer (2005) Chang, Y.C., Mitzenmacher, M.: Privacy preserving keyword searches on remote encrypted data. In: Proceedings of 2005 International Conference on Applied Cryptography and Network Security.pp. 442–455. Springer (2005)
8.
go back to reference Chen, C., Zhu, X., Shen, P., Hu, J., Guo, S., Tari, Z., Zomaya, A.Y.: An efficient privacy-preserving ranked keyword search method. IEEE Trans. Parallel Distrib. Syst. 27(4), 951–963 (2016)CrossRef Chen, C., Zhu, X., Shen, P., Hu, J., Guo, S., Tari, Z., Zomaya, A.Y.: An efficient privacy-preserving ranked keyword search method. IEEE Trans. Parallel Distrib. Syst. 27(4), 951–963 (2016)CrossRef
9.
go back to reference Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. J. Comput. Secur. 19(5), 895–934 (2011)CrossRef Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. J. Comput. Secur. 19(5), 895–934 (2011)CrossRef
10.
go back to reference Dai, H., Dai, X., Yi, X., Yang, G., Huang, H.: Semantic-aware multi-keyword ranked search scheme over encrypted cloud data. J. Netw. Comput. Appl. 147, 102442 (2019)CrossRef Dai, H., Dai, X., Yi, X., Yang, G., Huang, H.: Semantic-aware multi-keyword ranked search scheme over encrypted cloud data. J. Netw. Comput. Appl. 147, 102442 (2019)CrossRef
11.
go back to reference Dai, H., Yang, M., Yang, G., Xiang, Y., Hu, Z., Wang, H.: A keyword-grouping inverted index based multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Sustain. Comput. 7(3), 561–578 (2022)CrossRef Dai, H., Yang, M., Yang, G., Xiang, Y., Hu, Z., Wang, H.: A keyword-grouping inverted index based multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Sustain. Comput. 7(3), 561–578 (2022)CrossRef
12.
go back to reference Dai, X., Dai, H., Rong, C., Yang, G., Xiao, F.: Enhanced semantic-aware multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Cloud Comput., pp. 1–16 (2020) Dai, X., Dai, H., Rong, C., Yang, G., Xiao, F.: Enhanced semantic-aware multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Cloud Comput., pp. 1–16 (2020)
13.
go back to reference Delfs, H., Knebl, H.: Introduction to cryptography principles and applications, 3rd edn. Springer-Verlag, Berlin (2007)CrossRefMATH Delfs, H., Knebl, H.: Introduction to cryptography principles and applications, 3rd edn. Springer-Verlag, Berlin (2007)CrossRefMATH
14.
go back to reference Fu, Z., Huang, F., Ren, K., Weng, J., Wang, C.: Privacy-preserving smart semantic search based on conceptual graphs over encrypted outsourced data. IEEE Trans. Inf. Forensics Sec. 12(8), 1874–1884 (2017)CrossRef Fu, Z., Huang, F., Ren, K., Weng, J., Wang, C.: Privacy-preserving smart semantic search based on conceptual graphs over encrypted outsourced data. IEEE Trans. Inf. Forensics Sec. 12(8), 1874–1884 (2017)CrossRef
15.
go back to reference Fu, Z., Sun, X., Ji, S., Xie, G.: Towards efficient content-aware search over encrypted outsourced data in cloud. In: Proceedings of the 35th Annual IEEE International Conference on Computer Communications. pp. 1–9. IEEE (2016) Fu, Z., Sun, X., Ji, S., Xie, G.: Towards efficient content-aware search over encrypted outsourced data in cloud. In: Proceedings of the 35th Annual IEEE International Conference on Computer Communications. pp. 1–9. IEEE (2016)
16.
go back to reference Fu, Z., Sun, X., Linge, N., Zhou, L.: Achieving effective cloud search services: multi-keyword ranked search over encrypted cloud data supporting synonym query. IEEE Trans. Cons. Electr. 60(1), 164–172 (2014)CrossRef Fu, Z., Sun, X., Linge, N., Zhou, L.: Achieving effective cloud search services: multi-keyword ranked search over encrypted cloud data supporting synonym query. IEEE Trans. Cons. Electr. 60(1), 164–172 (2014)CrossRef
17.
go back to reference Fu, Z., Xia, L., Sun, X., Liu, A.X., Xie, G.: Semantic-aware searching over encrypted data for cloud computing. IEEE Trans. Inf. Forensics Sec. 13(9), 2359–2371 (2018)CrossRef Fu, Z., Xia, L., Sun, X., Liu, A.X., Xie, G.: Semantic-aware searching over encrypted data for cloud computing. IEEE Trans. Inf. Forensics Sec. 13(9), 2359–2371 (2018)CrossRef
18.
go back to reference Gabryel, M., Damaševičius, R., Przybyszewski, K.: Application of the bag-of-words algorithm in classification the quality of sales leads. In: Proceedings of 2018 International Conference on Artificial Intelligence and Soft Computing. pp. 615–622. Springer (2018) Gabryel, M., Damaševičius, R., Przybyszewski, K.: Application of the bag-of-words algorithm in classification the quality of sales leads. In: Proceedings of 2018 International Conference on Artificial Intelligence and Soft Computing. pp. 615–622. Springer (2018)
19.
go back to reference Hozhabr, M., Asghari, P., Javadi, H.: Dynamic secure multi-keyword ranked search over encrypted cloud data. J. Inf. Sec. Appl. 61(1), 1–12 (2021) Hozhabr, M., Asghari, P., Javadi, H.: Dynamic secure multi-keyword ranked search over encrypted cloud data. J. Inf. Sec. Appl. 61(1), 1–12 (2021)
20.
go back to reference Hua, J., Liu, Y., Chen, H., Tian, X., Jin, C.: An enhanced wildcard-based fuzzy searching scheme in encrypted databases. World Wide Web 23, 2185–2214 (2020)CrossRef Hua, J., Liu, Y., Chen, H., Tian, X., Jin, C.: An enhanced wildcard-based fuzzy searching scheme in encrypted databases. World Wide Web 23, 2185–2214 (2020)CrossRef
21.
go back to reference Ibrahim, A., Jin, H., Yassin, A.A., Zou, D.: Secure rank-ordered search of multi-keyword trapdoor over encrypted cloud data. In: Proceedings of 2012 IEEE Asia-Pacific Services Computing Conference. pp. 263–270. IEEE (2012) Ibrahim, A., Jin, H., Yassin, A.A., Zou, D.: Secure rank-ordered search of multi-keyword trapdoor over encrypted cloud data. In: Proceedings of 2012 IEEE Asia-Pacific Services Computing Conference. pp. 263–270. IEEE (2012)
22.
go back to reference Kiayias, A., Oksuz, O., Russell, A., Tang, Q., Wang, B.: Efficient encrypted keyword search for multi-user data sharing. In: Proceedings of European Symposium on Research in Computer Security. pp. 173–195. Springer (2016) Kiayias, A., Oksuz, O., Russell, A., Tang, Q., Wang, B.: Efficient encrypted keyword search for multi-user data sharing. In: Proceedings of European Symposium on Research in Computer Security. pp. 173–195. Springer (2016)
23.
go back to reference Lang, K.: Newsweeder: Learning to filter netnews. In: Proceedings of the 12th International Conference on Machine Learning. pp. 331–339. Elsevier (1995) Lang, K.: Newsweeder: Learning to filter netnews. In: Proceedings of the 12th International Conference on Machine Learning. pp. 331–339. Elsevier (1995)
24.
go back to reference Li, J., Wang, Q., Wang, C., Cao, N., Ren, K., Lou, W.: Fuzzy keyword search over encrypted data in cloud computing. In: Proceedings of the 29th IEEE International Conference on Computer Communications. pp. 1–5. IEEE (2010) Li, J., Wang, Q., Wang, C., Cao, N., Ren, K., Lou, W.: Fuzzy keyword search over encrypted data in cloud computing. In: Proceedings of the 29th IEEE International Conference on Computer Communications. pp. 1–5. IEEE (2010)
25.
go back to reference Liang, Y., Li, Y., Zhang, K., Ma, L.: DMSE: dynamic multi-keyword search encryption based on inverted index. J. Syst. Architect. 119, 1–10 (2021)CrossRef Liang, Y., Li, Y., Zhang, K., Ma, L.: DMSE: dynamic multi-keyword search encryption based on inverted index. J. Syst. Architect. 119, 1–10 (2021)CrossRef
26.
go back to reference Liu, C., Zhu, L., Chen, J.: Efficient searchable symmetric encryption for storing multiple source dynamic social data on cloud. J. Netw. Comput. Appl. 86, 3–14 (2017)CrossRef Liu, C., Zhu, L., Chen, J.: Efficient searchable symmetric encryption for storing multiple source dynamic social data on cloud. J. Netw. Comput. Appl. 86, 3–14 (2017)CrossRef
27.
go back to reference Liu, Q., Peng, Y., Wu, J., Wang, T., Wang, G.: Secure multi-keyword fuzzy searches with enhanced service quality in cloud computing. IEEE Trans. Network and Service Management 18(2), 2046–2062 (2020)CrossRef Liu, Q., Peng, Y., Wu, J., Wang, T., Wang, G.: Secure multi-keyword fuzzy searches with enhanced service quality in cloud computing. IEEE Trans. Network and Service Management 18(2), 2046–2062 (2020)CrossRef
28.
go back to reference Orencik, C., Kantarcioglu, M., Savas, E.: A practical and secure multi-keyword search method over encrypted cloud data. In: Proceedings of IEEE 16th International Conference on Cloud Computing. pp. 390–397. IEEE (2013) Orencik, C., Kantarcioglu, M., Savas, E.: A practical and secure multi-keyword search method over encrypted cloud data. In: Proceedings of IEEE 16th International Conference on Cloud Computing. pp. 390–397. IEEE (2013)
29.
go back to reference Poon, H.T., Miri, A.: An efficient conjunctive keyword and phase search scheme for encrypted cloud storage systems. In: Proceedings of 2015 IEEE 8th International Conference on Cloud Computing. pp. 508–515. IEEE (2015) Poon, H.T., Miri, A.: An efficient conjunctive keyword and phase search scheme for encrypted cloud storage systems. In: Proceedings of 2015 IEEE 8th International Conference on Cloud Computing. pp. 508–515. IEEE (2015)
30.
31.
go back to reference Scheuermann, P., Ouksel, M.: Multidimensional b-trees for associative searching in database systems. Inf. Syst. 7(2), 123–137 (1982)CrossRefMATH Scheuermann, P., Ouksel, M.: Multidimensional b-trees for associative searching in database systems. Inf. Syst. 7(2), 123–137 (1982)CrossRefMATH
32.
go back to reference Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceeding of 2000 IEEE Symposium on Security and Privacy. pp. 44–55. IEEE (2000) Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceeding of 2000 IEEE Symposium on Security and Privacy. pp. 44–55. IEEE (2000)
33.
go back to reference Sun, W., Liu, X., Lou, W., Hou, Y.T., Li, H.: Catch you if you lie to me: efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data. In: Proceedings of the 34th IEEE International Conference on Computer Communications. pp. 2110–2118. IEEE (2015) Sun, W., Liu, X., Lou, W., Hou, Y.T., Li, H.: Catch you if you lie to me: efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data. In: Proceedings of the 34th IEEE International Conference on Computer Communications. pp. 2110–2118. IEEE (2015)
34.
go back to reference Sun, W., Wang, B., Cao, N., Li, M., Lou, W., Hou, Y.T., Li, H.: Verifiable privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. IEEE Trans. Parallel Distrib. Syst. 11(25), 3025–3035 (2014)CrossRef Sun, W., Wang, B., Cao, N., Li, M., Lou, W., Hou, Y.T., Li, H.: Verifiable privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. IEEE Trans. Parallel Distrib. Syst. 11(25), 3025–3035 (2014)CrossRef
35.
go back to reference Swaminathan, A., Mao, Y., Su, G.M., Gou, H., Varna, A.L., He, S., Wu, M., Oard, D.W.: Confidentiality-preserving rank-ordered search. In: Proceedings of the 2007 ACM workshop on Storage security and survivability. pp. 7–12. ACM (2007) Swaminathan, A., Mao, Y., Su, G.M., Gou, H., Varna, A.L., He, S., Wu, M., Oard, D.W.: Confidentiality-preserving rank-ordered search. In: Proceedings of the 2007 ACM workshop on Storage security and survivability. pp. 7–12. ACM (2007)
36.
go back to reference Tseng, C.Y., Lu, C., Chou, C.F.: Efficient privacy-preserving multi-keyword ranked search utilizing document replication and partition. In: Proceedings of the 12th Annual IEEE Consumer Communications and Networking Conference (CCNC). pp. 671–676. IEEE (2015) Tseng, C.Y., Lu, C., Chou, C.F.: Efficient privacy-preserving multi-keyword ranked search utilizing document replication and partition. In: Proceedings of the 12th Annual IEEE Consumer Communications and Networking Conference (CCNC). pp. 671–676. IEEE (2015)
37.
go back to reference Wang, B., Yu, S., Lou, W., Hou, Y.T.: Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud. In: Proceedings of the 33th IEEE International Conference on Computer Communications. pp. 2112–2120. IEEE (2014) Wang, B., Yu, S., Lou, W., Hou, Y.T.: Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud. In: Proceedings of the 33th IEEE International Conference on Computer Communications. pp. 2112–2120. IEEE (2014)
38.
go back to reference Wang, C., Cao, N., Ren, K., Lou, W.: Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Trans. Parallel Distrib. Syst. 23(8), 1467–1479 (2011)CrossRef Wang, C., Cao, N., Ren, K., Lou, W.: Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Trans. Parallel Distrib. Syst. 23(8), 1467–1479 (2011)CrossRef
39.
go back to reference Wang, C., Ren, K., Yu, S., Urs, K.M.R.: Achieving usable and privacy-assured similarity search over outsourced cloud data. In: Proceedings of the 31th IEEE International Conference on Computer Communications. pp. 451–459. IEEE (2012) Wang, C., Ren, K., Yu, S., Urs, K.M.R.: Achieving usable and privacy-assured similarity search over outsourced cloud data. In: Proceedings of the 31th IEEE International Conference on Computer Communications. pp. 451–459. IEEE (2012)
40.
go back to reference Wang, P., Ravishankar, C.V.: On masking topical intent in keyword search. In: Proceedings of 2014 IEEE 30th International Conference on Data Engineering. pp. 256–267. IEEE (2014) Wang, P., Ravishankar, C.V.: On masking topical intent in keyword search. In: Proceedings of 2014 IEEE 30th International Conference on Data Engineering. pp. 256–267. IEEE (2014)
41.
go back to reference Xia, Z., Wang, X., Sun, X., Wang, Q.: A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 27(2), 340–352 (2016)CrossRef Xia, Z., Wang, X., Sun, X., Wang, Q.: A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 27(2), 340–352 (2016)CrossRef
42.
go back to reference Xia, Z., Zhu, Y., Sun, X., Chen, L.: Secure semantic expansion based search over encrypted cloud data supporting similarity ranking. J. Cloud Comput. 3(1), 1–11 (2014)CrossRef Xia, Z., Zhu, Y., Sun, X., Chen, L.: Secure semantic expansion based search over encrypted cloud data supporting similarity ranking. J. Cloud Comput. 3(1), 1–11 (2014)CrossRef
43.
go back to reference Zhu, X., Dai, H., Yi, X., Yang, G., Li, X.: Muse: an efficient and accurate verifiable privacy-preserving multikeyword text search over encrypted cloud data. Secur. Commun. Netw. 2017, 1–17 (2017)CrossRef Zhu, X., Dai, H., Yi, X., Yang, G., Li, X.: Muse: an efficient and accurate verifiable privacy-preserving multikeyword text search over encrypted cloud data. Secur. Commun. Netw. 2017, 1–17 (2017)CrossRef
44.
go back to reference Zerr, S., Olmedilla, D., Nejdl, W., Siberski, W.: Zerber+r: Top-k retrieval from a confidential index. In: Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology. pp. 439–449 ACM (2009) Zerr, S., Olmedilla, D., Nejdl, W., Siberski, W.: Zerber+r: Top-k retrieval from a confidential index. In: Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology. pp. 439–449 ACM (2009)
45.
go back to reference Zhang, B., Zhang, F.: An efficient public key encryption with conjunctive-subset keywords search. J. Netw. Comput. Appl. 34(1), 262–267 (2011)CrossRef Zhang, B., Zhang, F.: An efficient public key encryption with conjunctive-subset keywords search. J. Netw. Comput. Appl. 34(1), 262–267 (2011)CrossRef
46.
go back to reference Zhang, W., Xiao, S., Lin, Y., Zhou, T., Zhou, S.: Secure ranked multi-keyword search for multiple data owners in cloud computing. In: 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks. pp. 276–286. IEEE (2014) Zhang, W., Xiao, S., Lin, Y., Zhou, T., Zhou, S.: Secure ranked multi-keyword search for multiple data owners in cloud computing. In: 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks. pp. 276–286. IEEE (2014)
47.
go back to reference Zhou, Q., Dai, H., Shen, W., Liu, Y., Yang, G.: Evss: An efficient verifiable search scheme over encrypted cloud data. World Wide Web pp. 1–21 (2022) Zhou, Q., Dai, H., Shen, W., Liu, Y., Yang, G.: Evss: An efficient verifiable search scheme over encrypted cloud data. World Wide Web pp. 1–21 (2022)
48.
go back to reference Zhu, X., Liu, Q., Wang, G.: A novel verifiable and dynamic fuzzy keyword search scheme over encrypted data in cloud computing. In: Proceedings of 2016 IEEE Trustcom/BigDataSE/ISPA. pp. 845–851. IEEE (2016) Zhu, X., Liu, Q., Wang, G.: A novel verifiable and dynamic fuzzy keyword search scheme over encrypted data in cloud computing. In: Proceedings of 2016 IEEE Trustcom/BigDataSE/ISPA. pp. 845–851. IEEE (2016)
49.
go back to reference Zhou Q., Dai H., Hu Z., Liu Y., Yang G.: SAPMS: A Semantic-aware Privacy-preserving Multi-keyword Search Scheme in Cloud. In: Proceedings of the 6th APWeb-WAIM International Joint Conference on Web and Big Data. pp. 251–263. LNCS (2022) Zhou Q., Dai H., Hu Z., Liu Y., Yang G.: SAPMS: A Semantic-aware Privacy-preserving Multi-keyword Search Scheme in Cloud. In: Proceedings of the 6th APWeb-WAIM International Joint Conference on Web and Big Data. pp. 251–263. LNCS (2022)
Metadata
Title
A novel semantic-aware search scheme based on BCI-tree index over encrypted cloud data
Authors
Qian Zhou
Hua Dai
Yuanlong Liu
Geng Yang
Xun Yi
Zheng Hu
Publication date
31-05-2023
Publisher
Springer US
Published in
World Wide Web / Issue 5/2023
Print ISSN: 1386-145X
Electronic ISSN: 1573-1413
DOI
https://doi.org/10.1007/s11280-023-01176-w

Other articles of this Issue 5/2023

World Wide Web 5/2023 Go to the issue

Premium Partner