Citation: | SUN Jin, SONG Nana, WANG Lu, KANG Mengna, YE Kexin. A Distributed KBB Index Tree Multi-Keyword Fuzzy Sorting Search Scheme[J]. Journal of Electronics & Information Technology. doi: 10.11999/JEIT250151 |
[1] |
SINGH N, KUMAR J, SINGH A K, et al. Privacy-preserving multi-keyword hybrid search over encrypted data in cloud[J]. Journal of Ambient Intelligence and Humanized Computing, 2024, 15(1): 261–274. doi: 10.1007/s12652-022-03889-8.
|
[2] |
CAO Ning, WANG Cong, LI Ming, et al. Privacy-preserving multi-keyword ranked search over encrypted cloud data[J]. IEEE Transactions on Parallel and Distributed Systems, 2014, 25(1): 222–233. doi: 10.1109/TPDS.2013.45.
|
[3] |
LI Jinguo, WEN Mi, LU Kejie, et al. PIMRS: Achieving privacy and integrity-preserving multi-owner ranked-keyword search over encrypted cloud data[J]. Security and Communication Networks, 2016, 9(16): 3765–3776. doi: 10.1002/sec.1482.
|
[4] |
WU Zigang, WANG Haijiang, WAN Jian, et al. An inner product predicate-based medical data-sharing and privacy protection system[J]. IEEE Access, 2024, 12: 68680–68696. doi: 10.1109/ACCESS.2024.3400611.
|
[5] |
TONG Qiuyun, MIAO Yinbin, CHEN Lei, et al. VFIRM: Verifiable fine-grained encrypted image retrieval in multi-owner multi-user settings[J]. IEEE Transactions on Services Computing, 2022, 15(6): 3606–3619. doi: 10.1109/TSC.2021.3083512.
|
[6] |
ZHONG Hong, LI Zhanfei, CUI Jie, et al. Efficient dynamic multi-keyword fuzzy search over encrypted cloud data[J]. Journal of Network and Computer Applications, 2020, 149: 102469. doi: 10.1016/j.jnca.2019.102469.
|
[7] |
XIA Zhihua, WANG Xinhui, SUN Xingming, et al. A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data[J]. IEEE Transactions on Parallel and Distributed Systems, 2016, 27(2): 340–352. doi: 10.1109/TPDS.2015.2401003.
|
[8] |
GUO Jiaqi, TIAN Cong, LU Xu, et al. Multi-keyword ranked search with access control for multiple data owners in the cloud[J]. Journal of Information Security and Applications, 2024, 82: 103742. doi: 10.1016/j.jisa.2024.103742.
|
[9] |
GAO Sheng, CHEN Yuqi, ZHU Jianming, et al. BPMS: Blockchain-based privacy-preserving multi-keyword search in multi-owner setting[J]. IEEE Transactions on Cloud Computing, 2023, 11(3): 2260–2272. doi: 10.1109/TCC.2022.3196712.
|
[10] |
CHEN Kai, LIN Zhongrui, WAN Jian, et al. Multi-owner secure encrypted search using searching adversarial networks[C]. Proceedings of the 18th International Conference on Cryptology and Network Security, Fuzhou, China, 2019: 184–195. doi: 10.1007/978-3-030-31578-8_10.
|
[11] |
MIAO Yinbin, LIU Ximeng, CHOO K K R, et al. Privacy-preserving attribute-based keyword search in shared multi-owner setting[J]. IEEE Transactions on Dependable and Secure Computing, 2021, 18(3): 1080–1094. doi: 10.1109/TDSC.2019.2897675.
|
[12] |
YIN Hui, QIN Zheng, ZHANG Jixin, et al. Secure conjunctive multi-keyword ranked search over encrypted cloud data for multiple data owners[J]. Future Generation Computer Systems, 2019, 100: 689–700. doi: 10.1016/j.future.2019.05.001.
|
[13] |
CHEN Lanxiang, LEE W K, CHANG C C, et al. Blockchain based searchable encryption for electronic health record sharing[J]. Future Generation Computer Systems, 2019, 95: 420–429. doi: 10.1016/j.future.2019.01.018.
|
[14] |
WITTEN I H, MOFFAT A, and BELL T C. Managing Gigabytes: Compressing and Indexing Documents and Images[M]. 2nd ed. San Francisco: Morgan Kaufmann, 1999: 576.
|
[15] |
XU Dequan, PENG Changgen, WANG Weizheng, et al. Privacy-preserving dynamic multi-keyword ranked search scheme in multi-user settings[J]. IEEE Transactions on Consumer Electronics, 2023, 69(4): 890–901. doi: 10.1109/TCE.2023.3269045.
|
[16] |
LI Yang and ZHANG Haiyu. Big data technology for teaching quality monitoring and improvement in higher education-joint K-means clustering algorithm and Apriori algorithm[J]. Systems and Soft Computing, 2024, 6: 200125. doi: 10.1016/j.sasc.2024.200125.
|
[17] |
ZUBAIR M, IQBAL A, SHIL A, et al. An improved K-means clustering algorithm towards an efficient data-driven modeling[J]. Annals of Data Science, 2024, 11(5): 1525–1544. doi: 10.1007/s40745-022-00428-2.
|
[18] |
MANASRAH A M, NASIR M A, and SALEM M. A privacy-preserving multi-keyword search approach in cloud computing[J]. Soft Computing, 2020, 24(8): 5609–5631. doi: 10.1007/s00500-019-04033-z.
|
[19] |
ZOU Yipeng, PENG Tao, WANG Guojun, et al. Blockchain-assisted multi-keyword fuzzy search encryption for secure data sharing[J]. Journal of Systems Architecture, 2023, 144: 102984. doi: 10.1016/j.sysarc.2023.102984.
|
[20] |
ABIDIN Z and JUNAIDI A. Text stemming and lemmatization of regional languages in Indonesia: A systematic literature review[J]. Journal of Information Systems Engineering and Business Intelligence, 2024, 10(2): 217–231. doi: 10.20473/jisebi.10.2.217-231.
|
[21] |
ZHAO Fanyi, ZHANG Mingxuan, ZHOU Shiji, et al. Detection of network security traffic anomalies based on machine learning KNN method[J]. Journal of Artificial Intelligence General Science JAIGS, 2024, 1(1): 209–218. doi: 10.60087/jaigs.v1i1.213.
|
[22] |
SAIF M B, MIGLIORINI S, and SPOTO F. A survey on data availability in layer 2 blockchain rollups: Open challenges and future improvements[J]. Future Internet, 2024, 16(9): 315. doi: 10.3390/fi16090315.
|
[23] |
XIA Zhihua, WANG Xinhui, SUN Xingming, et al. A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data[J]. IEEE Transactions on Parallel and Distributed Systems, 2016, 27(2): 340–352. doi: 10.1109/TPDS.2015.2401003. (查阅网上资料,本条文献与第7条文献重复,请确认).
|