DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lee, Younho | ko |
dc.contributor.author | Kim, Pyung | ko |
dc.contributor.author | Park, Yongsu | ko |
dc.date.accessioned | 2016-07-07T06:21:21Z | - |
dc.date.available | 2022-06-02T21:01:00Z | - |
dc.date.created | 2016-06-27 | - |
dc.date.created | 2016-06-27 | - |
dc.date.issued | 2016 | - |
dc.identifier.citation | ADVANCES IN ELECTRICAL AND COMPUTER ENGINEERING, v.16, no.2, pp.11 - 18 | - |
dc.identifier.issn | 1582-7445 | - |
dc.identifier.uri | http://hdl.handle.net/10203/210038 | - |
dc.description.abstract | As the amount of data in the cloud grows, ranked search system, the similarity of a query to data is ranked, are of significant importance. on the other hand, to protect privacy, searchable encryption system are being actively studied. In this paper, we present a new similarity-based multi-keyword search scheme for encrypted data. This scheme provides high flexibility in the pre-and post-processing of encrypted data, including splitting stem/suffix and computing from the encrypted index-term matrix, demonstrated to support Latent Semantic Indexing(LSI). On the client side, the computation and communication costs are one to two orders of magnitude lower than those of previous methods, as demonstrated in the experimental results. we also provide a security analysis of the proposed scheme | - |
dc.language | English | - |
dc.publisher | UNIV SUCEAVA | - |
dc.title | Secure Multi-Keyword Search with User/Owner-side Efficiency in the Cloud | - |
dc.type | Article | - |
dc.identifier.wosid | 000376996100002 | - |
dc.identifier.scopusid | 2-s2.0-84974851886 | - |
dc.type.rims | ART | - |
dc.citation.volume | 16 | - |
dc.citation.issue | 2 | - |
dc.citation.beginningpage | 11 | - |
dc.citation.endingpage | 18 | - |
dc.citation.publicationname | ADVANCES IN ELECTRICAL AND COMPUTER ENGINEERING | - |
dc.identifier.doi | 10.4316/AECE.2016.02002 | - |
dc.embargo.terms | 2017-04-02 | - |
dc.contributor.nonIdAuthor | Lee, Younho | - |
dc.contributor.nonIdAuthor | Park, Yongsu | - |
dc.description.isOpenAccess | Y | - |
dc.type.journalArticle | Article | - |
dc.subject.keywordAuthor | keyword search | - |
dc.subject.keywordAuthor | encryption | - |
dc.subject.keywordAuthor | data security | - |
dc.subject.keywordAuthor | information security | - |
dc.subject.keywordAuthor | security | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.