Secure Multi-Keyword Search with User/Owner-side Efficiency in the Cloud
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lee, Younho | - |
dc.contributor.author | Kim, Pyung | - |
dc.contributor.author | Park, Yongsu | - |
dc.date.accessioned | 2022-07-15T16:58:23Z | - |
dc.date.available | 2022-07-15T16:58:23Z | - |
dc.date.created | 2021-05-12 | - |
dc.date.issued | 2016-05 | - |
dc.identifier.issn | 1582-7445 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/154664 | - |
dc.description.abstract | As the amount of data in the cloud grows, ranked search system, the similarity of a query to data is ranked, are of significant importance. on the other hand, to protect privacy, searchable encryption system are being actively studied. In this paper, we present a new similarity-based multi-keyword search scheme for encrypted data. This scheme provides high flexibility in the pre-and post-processing of encrypted data, including splitting stem/suffix and computing from the encrypted index-term matrix, demonstrated to support Latent Semantic Indexing(LSI). On the client side, the computation and communication costs are one to two orders of magnitude lower than those of previous methods, as demonstrated in the experimental results. we also provide a security analysis of the proposed scheme. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | UNIV SUCEAVA, FAC ELECTRICAL ENG | - |
dc.title | Secure Multi-Keyword Search with User/Owner-side Efficiency in the Cloud | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Park, Yongsu | - |
dc.identifier.doi | 10.4316/AECE.2016.02002 | - |
dc.identifier.scopusid | 2-s2.0-84974851886 | - |
dc.identifier.wosid | 000376996100002 | - |
dc.identifier.bibliographicCitation | ADVANCES IN ELECTRICAL AND COMPUTER ENGINEERING, v.16, no.2, pp.11 - 18 | - |
dc.relation.isPartOf | ADVANCES IN ELECTRICAL AND COMPUTER ENGINEERING | - |
dc.citation.title | ADVANCES IN ELECTRICAL AND COMPUTER ENGINEERING | - |
dc.citation.volume | 16 | - |
dc.citation.number | 2 | - |
dc.citation.startPage | 11 | - |
dc.citation.endPage | 18 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Artificial Intelligence | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.subject.keywordAuthor | keyword search | - |
dc.subject.keywordAuthor | encryption | - |
dc.subject.keywordAuthor | data security | - |
dc.subject.keywordAuthor | information security | - |
dc.subject.keywordAuthor | security | - |
dc.identifier.url | https://aece.ro/abstractplus.php?year=2016&number=2&article=2 | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
222, Wangsimni-ro, Seongdong-gu, Seoul, 04763, Korea+82-2-2220-1365
COPYRIGHT © 2021 HANYANG UNIVERSITY.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.