• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
成果搜索

author:

Li, Jiayi (Li, Jiayi.) [1] | Ma, Jianfeng (Ma, Jianfeng.) [2] | Miao, Yinbin (Miao, Yinbin.) [3] | Chen, Lei (Chen, Lei.) [4] | Wang, Yunbo (Wang, Yunbo.) [5] | Liu, Ximeng (Liu, Ximeng.) [6] | Choo, Kim-Kwang Raymond (Choo, Kim-Kwang Raymond.) [7]

Indexed by:

EI

Abstract:

Ranked keyword search has gained Ranked keyword search has gained traction due to its attractive properties such as flexibility and accessibility. However, most existing ranked keyword search schemes ignore the semantic associations between the documents and queries. To solve this challenging issue in cloud-assisted edge computing, we first design the Semantic-aware Ranked Multi-keyword Search (SRMS) scheme by adopting the Latent Dirichlet Allocation (LDA) topic model and the Chinese Remainder Theorem (CRT)-based secret sharing mechanism. Considering that the cloud server may be malicious, we implement a basic verification mechanism in SRMS to verify the correctness and completeness of search results and extend this verification mechanism in cloud-assisted edge computing scenarios. Formal security analysis proves that SRMS and extended result verification mechanisms are secure in both the known ciphertext model and the known background model. Extensive experiments using the real-world dataset demonstrate that SRMS is efficient and practical. © 2008-2012 IEEE.

Keyword:

Computation theory Cryptography Edge computing Search engines Semantics Semantic Web Statistics

Community:

  • [ 1 ] [Li, Jiayi]Xidian University, School of Cyber Engineering, Xi'an; 710071, China
  • [ 2 ] [Li, Jiayi]Guilin University of Electronic Technology, Guangxi Key Laboratory of Trusted Software, Guilin; 541004, China
  • [ 3 ] [Ma, Jianfeng]Xidian University, School of Cyber Engineering, Xi'an; 710071, China
  • [ 4 ] [Miao, Yinbin]Guilin University of Electronic Technology, Guangxi Key Laboratory of Trusted Software, Guilin; 541004, China
  • [ 5 ] [Miao, Yinbin]City University of Hong Kong, Department of Computer Science, Hong Kong; 999077, Hong Kong
  • [ 6 ] [Chen, Lei]Nsfocus Information Technology Co., Ltd, Beijing; 100089, China
  • [ 7 ] [Wang, Yunbo]Xidian University, School of Cyber Engineering, Xi'an; 710071, China
  • [ 8 ] [Liu, Ximeng]Fuzhou University, College of Mathematics and Computer Science, Key Laboratory of Information Security of Network Systems, Fuzhou; 350108, China
  • [ 9 ] [Choo, Kim-Kwang Raymond]The University of Texas at San Antonio, Department of Information Systems and Cyber Security, San Antonio; TX; 78249, United States

Reprint 's Address:

Email:

Show more details

Related Keywords:

Related Article:

Source :

IEEE Transactions on Services Computing

Year: 2022

Issue: 6

Volume: 15

Page: 3591-3605

8 . 1

JCR@2022

5 . 5 0 0

JCR@2023

ESI HC Threshold:61

JCR Journal Grade:1

CAS Journal Grade:1

Cited Count:

WoS CC Cited Count:

SCOPUS Cited Count: 7

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 1

Affiliated Colleges:

Online/Total:123/10037660
Address:FZU Library(No.2 Xuyuan Road, Fuzhou, Fujian, PRC Post Code:350116) Contact Us:0591-22865326
Copyright:FZU Library Technical Support:Beijing Aegean Software Co., Ltd. 闽ICP备05005463号-1