{"id":"https://openalex.org/W2550992964","doi":"https://doi.org/10.1002/sec.1679","title":"Centralized keyword search on encrypted data for cloud applications","display_name":"Centralized keyword search on encrypted data for cloud applications","publication_year":2016,"publication_date":"2016-11-16","ids":{"openalex":"https://openalex.org/W2550992964","doi":"https://doi.org/10.1002/sec.1679","mag":"2550992964"},"language":"en","primary_location":{"id":"doi:10.1002/sec.1679","is_oa":false,"landing_page_url":"https://doi.org/10.1002/sec.1679","pdf_url":null,"source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5024214059","display_name":"Peng Jiang","orcid":"https://orcid.org/0000-0001-5786-1512"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Peng Jiang","raw_affiliation_strings":["State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China","State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications  Beijing 100876 China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China","institution_ids":["https://openalex.org/I139759216"]},{"raw_affiliation_string":"State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications  Beijing 100876 China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008178136","display_name":"Yi Mu","orcid":"https://orcid.org/0000-0002-1637-845X"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Yi Mu","raw_affiliation_strings":["Centre for Computer and Information Security Research, School of Computing and Information Technology University of Wollongong Wollongong Australia","Centre for Computer and Information Security Research, School of Computing and Information Technology University of Wollongong  Wollongong Australia"],"affiliations":[{"raw_affiliation_string":"Centre for Computer and Information Security Research, School of Computing and Information Technology University of Wollongong Wollongong Australia","institution_ids":["https://openalex.org/I204824540"]},{"raw_affiliation_string":"Centre for Computer and Information Security Research, School of Computing and Information Technology University of Wollongong  Wollongong Australia","institution_ids":["https://openalex.org/I204824540"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051751395","display_name":"Fuchun Guo","orcid":"https://orcid.org/0000-0001-6939-7710"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Fuchun Guo","raw_affiliation_strings":["Centre for Computer and Information Security Research, School of Computing and Information Technology University of Wollongong Wollongong Australia","Centre for Computer and Information Security Research, School of Computing and Information Technology University of Wollongong  Wollongong Australia"],"affiliations":[{"raw_affiliation_string":"Centre for Computer and Information Security Research, School of Computing and Information Technology University of Wollongong Wollongong Australia","institution_ids":["https://openalex.org/I204824540"]},{"raw_affiliation_string":"Centre for Computer and Information Security Research, School of Computing and Information Technology University of Wollongong  Wollongong Australia","institution_ids":["https://openalex.org/I204824540"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101738239","display_name":"Xiaofen Wang","orcid":"https://orcid.org/0000-0002-6744-4752"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaofen Wang","raw_affiliation_strings":["Department of Computer Science and Engineering and Big Data Research Center University of Electronic Science and Technology of China Chengdu Sichuan 611731 China","Department of Computer Science and Engineering and Big Data Research Center University of Electronic Science and Technology of China  Chengdu Sichuan 611731 China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering and Big Data Research Center University of Electronic Science and Technology of China Chengdu Sichuan 611731 China","institution_ids":["https://openalex.org/I150229711"]},{"raw_affiliation_string":"Department of Computer Science and Engineering and Big Data Research Center University of Electronic Science and Technology of China  Chengdu Sichuan 611731 China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5071070702","display_name":"Jianchang Lai","orcid":"https://orcid.org/0000-0001-6533-1204"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Jianchang Lai","raw_affiliation_strings":["Centre for Computer and Information Security Research, School of Computing and Information Technology University of Wollongong Wollongong Australia","Centre for Computer and Information Security Research, School of Computing and Information Technology University of Wollongong  Wollongong Australia"],"affiliations":[{"raw_affiliation_string":"Centre for Computer and Information Security Research, School of Computing and Information Technology University of Wollongong Wollongong Australia","institution_ids":["https://openalex.org/I204824540"]},{"raw_affiliation_string":"Centre for Computer and Information Security Research, School of Computing and Information Technology University of Wollongong  Wollongong Australia","institution_ids":["https://openalex.org/I204824540"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5024214059"],"corresponding_institution_ids":["https://openalex.org/I139759216"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":null,"fwci":0.4434,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.80247489,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":"9","issue":"18","first_page":"5064","last_page":"5084"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.993399977684021,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9933000206947327,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8839176297187805},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8502371311187744},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6513221859931946},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.5866736173629761},{"id":"https://openalex.org/keywords/outsourcing","display_name":"Outsourcing","score":0.5727101564407349},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.569615364074707},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5311934351921082},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.43034255504608154},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.396409273147583},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.21598082780838013},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08892631530761719}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8839176297187805},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8502371311187744},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6513221859931946},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.5866736173629761},{"id":"https://openalex.org/C46934059","wikidata":"https://www.wikidata.org/wiki/Q61515","display_name":"Outsourcing","level":2,"score":0.5727101564407349},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.569615364074707},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5311934351921082},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.43034255504608154},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.396409273147583},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.21598082780838013},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08892631530761719},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1002/sec.1679","is_oa":false,"landing_page_url":"https://doi.org/10.1002/sec.1679","pdf_url":null,"source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},{"id":"pmh:oai:ro.uow.edu.au:eispapers-7521","is_oa":false,"landing_page_url":"https://ro.uow.edu.au/eispapers/6491","pdf_url":null,"source":{"id":"https://openalex.org/S4306400510","display_name":"Research Online (University of Wollongong)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I204824540","host_organization_name":"University of Wollongong","host_organization_lineage":["https://openalex.org/I204824540"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Faculty of Engineering and Information Sciences - Papers: Part A","raw_type":"article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.47999998927116394,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G4558239745","display_name":null,"funder_award_id":"61300181","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8815724042","display_name":null,"funder_award_id":"61502044","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W8287904","https://openalex.org/W46939464","https://openalex.org/W376198888","https://openalex.org/W1493744513","https://openalex.org/W1502807523","https://openalex.org/W1589843374","https://openalex.org/W1979493600","https://openalex.org/W1988169383","https://openalex.org/W2000181148","https://openalex.org/W2011212169","https://openalex.org/W2014022156","https://openalex.org/W2033165262","https://openalex.org/W2056949817","https://openalex.org/W2063514980","https://openalex.org/W2079321815","https://openalex.org/W2085738922","https://openalex.org/W2087223825","https://openalex.org/W2094240047","https://openalex.org/W2113293692","https://openalex.org/W2117685508","https://openalex.org/W2120976781","https://openalex.org/W2122058555","https://openalex.org/W2132257180","https://openalex.org/W2146828512","https://openalex.org/W2147929033","https://openalex.org/W2152109612","https://openalex.org/W2152924492","https://openalex.org/W2161214567","https://openalex.org/W2165589425","https://openalex.org/W2303085036","https://openalex.org/W2307226808","https://openalex.org/W2412038070","https://openalex.org/W3028898431"],"related_works":["https://openalex.org/W2167384606","https://openalex.org/W4285343634","https://openalex.org/W2189418772","https://openalex.org/W2090942009","https://openalex.org/W2123558779","https://openalex.org/W2612793576","https://openalex.org/W4239453636","https://openalex.org/W3208402582","https://openalex.org/W2546431841","https://openalex.org/W4307730559"],"abstract_inverted_index":{"Abstract":[0],"Centralized":[1],"approaches":[2,76],"are":[3,27],"widely":[4],"adopted":[5],"to":[6,14,77],"improve":[7],"the":[8,22,34,92,100,163,179],"qualities":[9],"of":[10,17,33,181],"outsourced":[11],"services":[12],"owing":[13],"its":[15,137],"feature":[16],"efficient":[18],"system":[19,64,85,120],"management.":[20],"Because":[21],"cloud":[23],"is":[24,37,65,151],"untrusted,":[25],"data":[26,55,102,133,148,174],"usually":[28],"encrypted":[29,39,101,132,147],"before":[30],"outsourcing.":[31],"One":[32],"interesting":[35],"applications":[36],"searchable":[38,78],"keywords,":[40],"a":[41,61,67,82,123,142],"well\u2010known":[42],"cryptographic":[43,125],"primitive":[44],"that":[45,150],"allows":[46],"encryption":[47,79],"while":[48,106],"enabling":[49,170],"search":[50,96,111,130,145,157],"for":[51,86,165],"keywords.":[52],"However,":[53],"achieving":[54],"retrieval":[56,87],"without":[57],"revealing":[58],"privacy":[59],"in":[60],"cloud\u2010based":[62],"centralized":[63,75,84,93,128,143],"still":[66],"challenging":[68],"problem.":[69],"In":[70,89],"this":[71],"paper,":[72],"we":[73],"introduce":[74],"and":[80,97,112,140,156,169],"present":[81],"novel":[83],"services.":[88],"our":[90,182],"system,":[91],"manager":[94],"can":[95,109],"access":[98,113],"all":[99],"from":[103],"authorized":[104],"users,":[105],"each":[107],"user":[108],"only":[110],"his":[114],"or":[115],"her":[116],"own":[117],"data.":[118],"The":[119,176],"builds":[121],"on":[122,131,146,173],"new":[124],"notion":[126],"called":[127],"keyword":[129,144],".":[134],"We":[135,160],"formalize":[136],"security":[138],"model":[139],"propose":[141],"construction":[149,164],"featured":[152],"by":[153],"short":[154],"ciphertext":[155],"result":[158],"verification.":[159],"further":[161],"extend":[162],"removing":[166],"secure":[167],"channel":[168],"batch":[171],"authentication":[172],"legalities.":[175],"experiment":[177],"demonstrates":[178],"performance":[180],"proposals.":[183],"Copyright":[184],"\u00a9":[185],"2016":[186],"John":[187],"Wiley":[188],"&amp;":[189],"Sons,":[190],"Ltd.":[191]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
