期刊文献+
共找到470篇文章
< 1 2 24 >
每页显示 20 50 100
Efficient Expressive Attribute-Based Encryption with Keyword Search over Prime-Order Groups
1
作者 Qing Miao Lan Guo +1 位作者 Yang Lu Zhongqi Wang 《Intelligent Automation & Soft Computing》 SCIE 2023年第3期2737-2754,共18页
Attribute-based encryption with keyword search(ABEKS)is a novel cryptographic paradigm that can be used to implementfine-grained access control and retrieve ciphertexts without disclosing the sensitive information.It i... Attribute-based encryption with keyword search(ABEKS)is a novel cryptographic paradigm that can be used to implementfine-grained access control and retrieve ciphertexts without disclosing the sensitive information.It is a perfect combination of attribute-based encryption(ABE)and public key encryption with keyword search(PEKS).Nevertheless,most of the existing ABEKS schemes have limited search capabilities and only support single or simple conjunctive keyword search.Due to the weak search capability and inaccurate search results,it is difficult to apply these schemes to practical applications.In this paper,an effi-cient expressive ABEKS(EABEKS)scheme supporting unbounded keyword uni-verse over prime-order groups is designed,which supplies the expressive keyword search function supporting the logical connectives of“AND”and“OR”.The proposed scheme not only leads to low computation and communica-tion costs,but also supports unbounded keyword universe.In the standard model,the scheme is proven to be secure under the chosen keyword attack and the cho-sen plaintext attack.The comparison analysis and experimental results show that it has better performance than the existing EABEKS schemes in the storage,com-putation and communication costs. 展开更多
关键词 searchable encryption expressive keyword search attribute-based encryption unbounded keyword universe prime-order group
下载PDF
Hash Function Based Keyword Searchable Encryption Framework in Cloud Server Using MD5 and MECC
2
作者 R.Lakshmana Kumar R.Subramanian S.Karthik 《Journal of Information Hiding and Privacy Protection》 2021年第4期201-226,共26页
Cloud Computing expands its usability to various fields that utilize data and store it in a common space that is required for computing and the purpose of analysis as like the IoT devices.These devices utilize the clo... Cloud Computing expands its usability to various fields that utilize data and store it in a common space that is required for computing and the purpose of analysis as like the IoT devices.These devices utilize the cloud for storing and retrieving data since the devices are not capable of storing processing data on its own.Cloud Computing provides various services to the users like the IaaS,PaaS and SaaS.The major drawback that is faced by cloud computing include the Utilization of Cloud services for the storage of data that could be accessed by all the users related to cloud.The use of Public Key Encryptions with keyword search(PEKS)provides security against the untrustworthy third-party search capability on publicly encryption keys without revealing the data’s contents.But the Security concerns of PEKs arise when Inside Keywords Guessing attacks(IKGA),is identified in the system due to the untrusted server presume the keyword in trapdoor.This issue could be solved by using various algorithms like the Certificateless Hashed Public Key Authenticated Encryption with Keyword Search(CL-HPAEKS)which utilizes the Modified Elliptic Curve Cryptography(MECC)along with the Mutation Centred flower pollinations algorithm(CM-FPA)that is used in enhancing the performance of the algorithm using the Optimization in keys.The additional use of Message Digests 5(MD5)hash function in the system enhances the security Level that is associated with the system.The system that is proposed achieves the security level performance of 96 percent and the effort consumed by the algorithm is less compared to the other encryption techniques. 展开更多
关键词 Certificateless Hashed Public Key Authenticated Encryption with keyword search(CL-HPAEKS) modified elliptic curve cryptography(MECC) digest 5(MD5) inside keywords guessing attacks(IKGA) public key encryptions with keyword search(PEKS)
下载PDF
A Proxy Re-Encryption with Keyword Search Scheme in Cloud Computing
3
作者 Yongli Tang Huanhuan Lian +1 位作者 Zemao Zhao Xixi Yan 《Computers, Materials & Continua》 SCIE EI 2018年第8期339-352,共14页
With the widespread use of cloud computing technology,more and more users and enterprises decide to store their data in a cloud server by outsourcing.However,these huge amounts of data may contain personal privacy,bus... With the widespread use of cloud computing technology,more and more users and enterprises decide to store their data in a cloud server by outsourcing.However,these huge amounts of data may contain personal privacy,business secrets and other sensitive information of the users and enterprises.Thus,at present,how to protect,retrieve,and legally use the sensitive information while preventing illegal accesses are security challenges of data storage in the cloud environment.A new proxy re-encryption with keyword search scheme is proposed in this paper in order to solve the problem of the low retrieval efficiency of the encrypted data in the cloud server.In this scheme,the user data are divided into files,file indexes and the keyword corresponding to the files,which are respectively encrypted to store.The improved scheme does not need to re-encrypt partial file cipher-text as in traditional schemes,but re-encrypt the cipher-text of keywords corresponding to the files.Therefore the scheme can improve the computational efficiency as well as resist chosen keyword attack.And the scheme is proven to be indistinguishable under Hash Diffie-Hellman assumption.Furthermore,the scheme does not need to use any secure channels,making it more effective in the cloud environment. 展开更多
关键词 Cloud computing keyword search proxy re-encryption provable security
下载PDF
Chosen-Ciphertext Attack Secure Public-Key Encryption with Keyword Search
4
作者 Hyun Sook Rhee 《Computers, Materials & Continua》 SCIE EI 2022年第10期69-85,共17页
As the use of cloud storage for various services increases,the amount of private personal information along with data stored in the cloud storage is also increasing.To remotely use the data stored on the cloud storage... As the use of cloud storage for various services increases,the amount of private personal information along with data stored in the cloud storage is also increasing.To remotely use the data stored on the cloud storage,the data to be stored needs to be encrypted for this reason.Since“searchable encryption”is enable to search on the encrypted data without any decryption,it is one of convenient solutions for secure data management.A public key encryption with keyword search(for short,PEKS)is one of searchable encryptions.Abdalla et al.firstly defined IND-CCA security for PEKS to enhance it’s security and proposed consistent IND-CCA secure PEKS based on the“robust”ANO-CCA secure identity-based encryption(IBE).In this paper,we propose two generic constructions of consistent IND-CCA secure PEKS combining(1)a hierarchical identity based encryption(for short,HIBE)and a signature scheme or(2)a HIBE,an encapsulation,and a message authentication code(for short,MAC)scheme.Our generic constructions identify that HIBE requires the security of a signature or a MAC as well as the weaker“ANO-CPA security(resp.,IND-CPA security)”of HIBE than“ANOCCA security(resp.,IND-CCA security)”of IBE required in for achieving IND-CCA secure(resp.,consistent)PEKS.Finally,we prove that our generic constructions satisfy IND-CCA security and consistency under the security models. 展开更多
关键词 searchable encryption public-key encryption with keyword search chosen ciphertext security data privacy
下载PDF
Certificateless Public Key Encryption with Keyword Search 被引量:23
5
作者 PENG Yanguo CUI Jiangtao +1 位作者 PENG Changgen YING Zuobin 《China Communications》 SCIE CSCD 2014年第11期100-113,共14页
Public Key Encryption with Keyword Search(PEKS),an indispensable part of searchable encryption,is stock-intrade for both protecting data and providing operability of encrypted data.So far most of PEKS schemes have bee... Public Key Encryption with Keyword Search(PEKS),an indispensable part of searchable encryption,is stock-intrade for both protecting data and providing operability of encrypted data.So far most of PEKS schemes have been established on Identity-Based Cryptography(IBC) with key escrow problem inherently.Such problem severely restricts the promotion of IBC-based Public Key Infrastructure including PEKS component.Hence,Certificateless Public Key Cryptography(CLPKC) is efficient to remove such problem.CLPKC is introduced into PEKS,and a general model of Certificate/ess PEKS(CLPEKS) is formalized.In addition,a practical CLPEKS scheme is constructed with security and efficiency analyses.The proposal is secure channel free,and semantically secure against adaptive chosen keyword attack and keyword guessing attack.To illustrate the superiority,massive experiments are conducted on Enron Email dataset which is famous in information retrieval field.Compared with existed constructions,CLPEKS improves the efficiency in theory and removes the key escrow problem. 展开更多
关键词 关键词搜索 公钥加密 证书 公钥基础设施 密钥托管 猜测攻击 可操作性 数据提供
下载PDF
Constructing Certificateless Encryption with Keyword Search against Outside and Inside Keyword Guessing Attacks 被引量:4
6
作者 Yang Lu Jiguo Li 《China Communications》 SCIE CSCD 2019年第7期156-173,共18页
Searchable public key encryption is a useful cryptographic paradigm that enables an untrustworthy server to retrieve the encrypted data without revealing the contents of the data. It offers a promising solution to enc... Searchable public key encryption is a useful cryptographic paradigm that enables an untrustworthy server to retrieve the encrypted data without revealing the contents of the data. It offers a promising solution to encrypted data retrieval in cryptographic cloud storage. Certificateless public key cryptography (CLPKC) is a novel cryptographic primitive that has many merits. It overcomes the key escrow problem in identity-based cryptography (IBC) and the cumbersome certificate problem in conventional public key cryptography (PKC). Motivated by the appealing features of CLPKC, several certificateless encryption with keyword search (CLEKS) schemes have been presented in the literature. But, our cryptanalysis demonstrates that the previously proposed CLEKS frameworks suffer from the security vulnerability caused by the keyword guessing attack. To remedy the security weakness in the previous frameworks and provide resistance against both inside and outside keyword guessing attacks, we propose a new CLEKS framework. Under the new framework, we design a concrete CLEKS scheme and formally prove its security in the random oracle model. Compared with previous two CLEKS schemes, the proposed scheme has better overall performance while offering stronger security guarantee as it withstands the existing known types of keyword guessing attacks. 展开更多
关键词 searchable public key ENCRYPTION CERTIFICATELESS ENCRYPTION with keyword search INSIDE keyword guessing ATTACK OUTSIDE keyword guessing ATTACK random oracle model
下载PDF
Multi-Owner Keyword Search over Shared Data without Secure Channels in the Cloud
7
作者 Yilun Wu Xicheng Lu +3 位作者 Jinshu Su Peixin Chen Xiaofeng Wang Bofeng Zhang 《China Communications》 SCIE CSCD 2017年第5期124-133,共10页
Searchable encryption allows cloud users to outsource the massive encrypted data to the remote cloud and to search over the data without revealing the sensitive information. Many schemes have been proposed to support ... Searchable encryption allows cloud users to outsource the massive encrypted data to the remote cloud and to search over the data without revealing the sensitive information. Many schemes have been proposed to support the keyword search in a public cloud. However,they have some potential limitations. First,most of the existing schemes only consider the scenario with the single data owner. Second,they need secure channels to guarantee the secure transmission of secret keys from the data owner to data users. Third,in some schemes,the data owner should be online to help data users when data users intend to perform the search,which is inconvenient.In this paper,we propose a novel searchable scheme which supports the multi-owner keyword search without secure channels. More than that,our scheme is a non-interactive solution,in which all the users only need to communicate with the cloud server. Furthermore,the analysis proves that our scheme can guarantee the security even without secure channels. Unlike most existing public key encryption based searchable schemes,we evaluate the performance of our scheme,which shows that our scheme is practical. 展开更多
关键词 关键字搜索 安全通道 共享数据 加密数据 敏感信息 安全传输 联机帮助 非交互式
下载PDF
Keyword Search on Both XML and Relational Data
8
作者 Liru Zhang Tadashi Ohmori Mamoru Hoshi 《通讯和计算机(中英文版)》 2011年第4期264-275,共12页
关键词 关系数据库系统 XML数据 关键字搜索 半结构化数据库 RDBMS 数据库存储 用户信息 数据库检索
下载PDF
Chinese Keyword Search by Indexing in Relational Databases
9
作者 Liang Zhu Lijuan Pan Qin Ma 《Journal of Software Engineering and Applications》 2012年第12期107-112,共6页
In this paper, we propose a new method based on index to realize IR-style Chinese keyword search with ranking strategies in relational databases. This method creates an index by using the related information of tuple ... In this paper, we propose a new method based on index to realize IR-style Chinese keyword search with ranking strategies in relational databases. This method creates an index by using the related information of tuple words and presents a ranking strategy in terms of the nature of Chinese words. For a Chinese keyword query, the index is used to match query search words and the tuple words in index quickly, and to compute similarities between the query and tuples by the ranking strategy, and then the set of identifiers of candidate tuples is generated. Thus, we retrieve top-N results of the query using SQL selection statements and output the ranked answers according to the similarities. The experimental results show that our method is efficient and effective. 展开更多
关键词 RELATIONAL DATABASE CHINESE keyword search Index RANKING Strategy
下载PDF
Attribute-based keyword search encryption for power data protection
10
作者 Xun Zhang Dejun Mu Jinxiong Zhao 《High-Confidence Computing》 2023年第2期32-39,共8页
To protect the privacy of power data,we usually encrypt data before outsourcing it to the cloud servers.However,it is challenging to search over the encrypted data.In addition,we need to ensure that only authorized us... To protect the privacy of power data,we usually encrypt data before outsourcing it to the cloud servers.However,it is challenging to search over the encrypted data.In addition,we need to ensure that only authorized users can retrieve the power data.The attribute-based searchable encryption is an advanced technology to solve these problems.However,many existing schemes do not support large universe,expressive access policies,and hidden access policies.In this paper,we propose an attributebased keyword search encryption scheme for power data protection.Firstly,our proposed scheme can support encrypted data retrieval and achieve fine-grained access control.Only authorized users whose attributes satisfy the access policies can search and decrypt the encrypted data.Secondly,to satisfy the requirement in the power grid environment,the proposed scheme can support large attribute universe and hidden access policies.The access policy in this scheme does not leak private information about users.Thirdly,the security analysis and performance analysis indicate that our scheme is efficient and practical.Furthermore,the comparisons with other schemes demonstrate the advantages of our proposed scheme. 展开更多
关键词 Attribute-based encryption searchable encryption keyword search Power grid data
原文传递
Keyword Search Encryption Scheme Resistant Against Keyword-Guessing Attack by the Untrusted Server 被引量:4
11
作者 王智弘 涂泰源 《Journal of Shanghai Jiaotong university(Science)》 EI 2014年第4期440-442,共3页
The user data stored in an untrusted server, such as the centralized data center or cloud computing server, may be dangerous of eavesdropping if the data format is a plaintext. However, the general ciphertext is diffi... The user data stored in an untrusted server, such as the centralized data center or cloud computing server, may be dangerous of eavesdropping if the data format is a plaintext. However, the general ciphertext is difficult to search and thus limited for practical usage. The keyword search encryption is a helpful mechanism that provides a searchable ciphertext for some predefined keywords. The previous studies failed to consider the attack from the data storage server to guess the keyword. This kind of attack may cause some critical information revealed to the untrusted server. This paper proposes a new keyword search encryption model that can effectively resist the keyword-guessing attack performed by the untrusted data storage(testing) server. The testing(query)secret is divided into multiple shares so that the security can be guaranteed if the servers cannot conspire with each other to retrieve all shares of the secret. 展开更多
关键词 keyword search encryption keyword-guessing attack cloud computing environment information security
原文传递
Keyword Searches in Data-Centric XML Documents Using Tree Partitioning 被引量:1
12
作者 李国良 冯建华 周立柱 《Tsinghua Science and Technology》 SCIE EI CAS 2009年第1期7-18,共12页
This paper presents an effective keyword search method for data-centric extensive markup language (XML) documents. The method divides an XML document into compact connected integral subtrees, called self-integral tr... This paper presents an effective keyword search method for data-centric extensive markup language (XML) documents. The method divides an XML document into compact connected integral subtrees, called self-integral trees (SI-Trees), to capture the structural information in the XML document. The SI-Trees are generated based on a schema guide. Meaningful self-integral trees (MSI-Trees) are identified, which contain all or some of the input keywords for the keyword search in the XML documents. Indexing is used to accelerate the retrieval of MSI-Trees related to the input keywords. The MSI-Trees are ranked to identify the top-k results with the highest ranks. Extensive tests demonstrate that this method costs 10-100 ms to answer a keyword query, and outperforms existing approaches by 1-2 orders of magnitude. 展开更多
关键词 keyword searches extensive markup language (XML) self-integral trees RANKING INDEXING
原文传递
ABDKS:attribute-based encryption with dynamic keyword search in fog computing 被引量:1
13
作者 Fei MENG Leixiao CHENG Mingqiang WANG 《Frontiers of Computer Science》 SCIE EI CSCD 2021年第5期187-195,共9页
Attribute-based encryption with keyword search(ABKS)achieves both fine-grained access control and keyword search.However,in the previous ABKS schemes,the search algorithm requires that each keyword to be identical bet... Attribute-based encryption with keyword search(ABKS)achieves both fine-grained access control and keyword search.However,in the previous ABKS schemes,the search algorithm requires that each keyword to be identical between the target keyword set and the ciphertext keyword set,otherwise the algorithm does not output any search result,which is not conducive to use.Moreover,the previous ABKS schemes are vulnerable to what we call a peer-decryption attack,that is,the ciphertext may be eavesdropped and decrypted by an adversary who has sufficient authorities but no information about the ciphertext keywords.In this paper,we provide a new system in fog computing,the ciphertext-policy attribute-based encryption with dynamic keyword search(ABDKS).In ABDKS,the search algorithm requires only one keyword to be identical between the two keyword sets and outputs the corresponding correlation which reflects the number of the same keywords in those two sets.In addition,our ABDKS is resistant to peer-decryption attack,since the decryption requires not only sufficient authority but also at least one keyword of the ciphertext.Beyond that,the ABDKS shifts most computational overheads from resource constrained users to fog nodes.The security analysis shows that the ABDKS can resist Chosen-Plaintext Attack(CPA)and Chosen-Keyword Attack(CKA). 展开更多
关键词 access control attribute-based encryption keyword search fog computing OUTSOURCING
原文传递
Efective Error-Tolerant Keyword Search for Secure Cloud Computing 被引量:1
14
作者 杨波 庞晓琼 +1 位作者 杜军强 解丹 《Journal of Computer Science & Technology》 SCIE EI CSCD 2014年第1期81-89,共9页
The existing solutions to keyword search in the cloud can be divided into two categories: searching on exact keywords and searching on error-tolerant keywords. An error-tolerant keyword search scheme permits to make ... The existing solutions to keyword search in the cloud can be divided into two categories: searching on exact keywords and searching on error-tolerant keywords. An error-tolerant keyword search scheme permits to make searches on encrypted data with only an approximation of some keyword. The scheme is suitable to the case where users' searching input might not exactly match those pre-set keywords. In this paper, we first present a general framework for searching on error-tolerant keywords. Then we propose a concrete scheme, based on a fuzzy extractor, which is proved secure against an adaptive adversary under well-defined security definition. The scheme is suitable for all similarity metrics including Hamming distance, edit distance, and set difference. It does not require the user to construct or store anything in advance, other than the key used to calculate the trapdoor of keywords and the key to encrypt data documents. Thus, our scheme tremendously eases the users' burden. What is more, our scheme is able to transform the servers' searching for error-tolerant keywords on ciphertexts to the searching for exact keywords on plaintexts. The server can use any existing approaches of exact keywords search to search plaintexts on an index table. 展开更多
关键词 cloud computing searchable encryption error-tolerant keyword search fuzzy extractor
原文传递
Ginix: Generalized Inverted Index for Keyword Search
15
作者 Hao Wu Guoliang Li Lizhu Zhou 《Tsinghua Science and Technology》 SCIE EI CAS 2013年第1期77-87,共11页
Keyword search has become a ubiquitous method for users to access text data in the face of information explosion. Inverted lists are usually used to index underlying documents to retrieve documents according to a set ... Keyword search has become a ubiquitous method for users to access text data in the face of information explosion. Inverted lists are usually used to index underlying documents to retrieve documents according to a set of keywords efficiently. Since inverted lists are usually large, many compression techniques have been proposed to reduce the storage space and disk I/O time. However, these techniques usually perform decompression operations on the fly, which increases the CPU time. This paper presents a more efficient index structure, the Generalized INverted IndeX (Ginix), which merges consecutive IDs in inverted lists into intervals to save storage space. With this index structure, more efficient algorithms can be devised to perform basic keyword search operations, i.e., the union and the intersection operations, by taking the advantage of intervals. Specifically, these algorithms do not require conversions from interval lists back to ID lists. As a result, keyword search using Ginix can be more efficient than those using traditional inverted indices. The performance of Ginix is also improved by reordering the documents in datasets using two scalable algorithms. Experiments on the performance and scalability of Ginix on real datasets show that Ginix not only requires less storage space, but also improves the keyword search performance, compared with traditional inverted indexes. 展开更多
关键词 keyword search index compression document reordering
原文传递
KRBKSS: a keyword relationship based keyword-set search system for peer-to-peer networks 被引量:1
16
作者 张亮 邹福泰 马范援 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2005年第6期577-582,共6页
may incur significant bandwidth for executing more com- plicated search queries such as multiple-attribute queries. In order to reduce query overhead, KSS (keyword-set search) by Gnawali partitions the index by a set ... may incur significant bandwidth for executing more com- plicated search queries such as multiple-attribute queries. In order to reduce query overhead, KSS (keyword-set search) by Gnawali partitions the index by a set of keywords. However, a KSS index is considerably larger than a standard inverted index, since there are more word sets than there are individual words. And the insert overhead and storage overhead are obviously un- acceptable for full-text search on a collection of documents even if KSS uses the distance window technology. In this paper, we extract the relationship information between query keywords from websites’ queries logs to improve performance of KSS system. Experiments results clearly demonstrated that the improved keyword-set search system based on keywords relationship (KRBKSS) is more efficient than KSS index in insert overhead and storage overhead, and a standard inverted index in terms of communication costs for query. 展开更多
关键词 P2P网络 互联网 对等网络技术 关键字搜索
下载PDF
An Efficient Multi-Keyword Query Processing Strategy on P2P Based Web Search 被引量:2
17
作者 SHEN Derong LI Meifang +1 位作者 ZHU Hongkai YU Ge 《Wuhan University Journal of Natural Sciences》 CAS 2007年第5期881-886,共6页
The paper presents a novel benefit based query processing strategy for efficient query routing. Based on DHT as the overlay network, it first applies Nash equilibrium to construct the optimal peer group based on the c... The paper presents a novel benefit based query processing strategy for efficient query routing. Based on DHT as the overlay network, it first applies Nash equilibrium to construct the optimal peer group based on the correlations of keywords and coverage and overlap of the peers to decrease the time cost, and then presents a two-layered architecture for query processing that utilizes Bloom filter as compact representation to reduce the bandwidth consumption. Extensive experiments conducted on a real world dataset have demonstrated that our approach obviously decreases the processing time, while improves the precision and recall as well. 展开更多
关键词 multi-keyword P2P Web search CORRELATION coverage and overlap Nash equilibrium
下载PDF
Improved Research on Fuzzy Search over Encrypted Cloud Data Based on Keywords
18
作者 Ping Zhang Jianzhong Wang 《Journal of Computer and Communications》 2015年第9期90-98,共9页
A search strategy over encrypted cloud data based on keywords has been improved and has presented a method using different strategies on the client and the server to improve the search efficiency in this paper. The cl... A search strategy over encrypted cloud data based on keywords has been improved and has presented a method using different strategies on the client and the server to improve the search efficiency in this paper. The client uses the Chinese and English to achieve the synonym construction of the keywords, the establishment of the fuzzy-syllable words and synonyms set of keywords and the implementation of fuzzy search strategy over the encryption of cloud data based on keywords. The server side through the analysis of the user’s query request provides keywords for users to choose and topic words and secondary words are picked out. System will match topic words with historical inquiry in time order, and then the new query result of the request is directly gained. The analysis of the simulation experiment shows that the fuzzy search strategy can make better use of historical results on the basis of privacy protection for the realization of efficient data search, saving the search time and improving the efficiency of search. 展开更多
关键词 CLOUD Data FUZZY search keywordS SYNONYMS searchable ENCRYPTION
下载PDF
Stability-mutation feature identification of Web search keywords based on keyword concentration change ratio
19
作者 Hongtao LU Guanghui YE Gang LI 《Chinese Journal of Library and Information Science》 2014年第3期33-44,共12页
Purpose: The aim of this paper is to discuss how the keyword concentration change ratio(KCCR) is used while identifying the stability-mutation feature of Web search keywords during information analyses and predictions... Purpose: The aim of this paper is to discuss how the keyword concentration change ratio(KCCR) is used while identifying the stability-mutation feature of Web search keywords during information analyses and predictions.Design/methodology/approach: By introducing the stability-mutation feature of keywords and its significance, the paper describes the function of the KCCR in identifying keyword stability-mutation features. By using Ginsberg's influenza keywords, the paper shows how the KCCR can be used to identify the keyword stability-mutation feature effectively.Findings: Keyword concentration ratio has close positive correlation with the change rate of research objects retrieved by users, so from the characteristic of the 'stability-mutation' of keywords, we can understand the relationship between these keywords and certain information. In general, keywords representing for mutation fit for the objects changing in short-term, while those representing for stability are suitable for long-term changing objects. Research limitations: It is difficult to acquire the frequency of keywords, so indexes or parameters which are closely related to the true search volume are chosen for this study.Practical implications: The stability-mutation feature identification of Web search keywords can be applied to predict and analyze the information of unknown public events through observing trends of keyword concentration ratio.Originality/value: The stability-mutation feature of Web search could be quantitatively described by the keyword concentration change ratio(KCCR). Through KCCR, the authors took advantage of Ginsberg's influenza epidemic data accordingly and demonstrated how accurate and effective the method proposed in this paper was while it was used in information analyses and predictions. 展开更多
关键词 Web search Web search keyword Information analysis and prediction Concentration change ratio Feature identification Influenza epidemic
下载PDF
Blockchain-Assisted Secure Fine-Grained Searchable Encryption for a Cloud-Based Healthcare Cyber-Physical System 被引量:11
20
作者 Mamta Brij B.Gupta +3 位作者 Kuan-Ching Li Victor C.M.Leun Kostas E.Psannis Shingo Yamaguchi 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2021年第12期1877-1890,共14页
The concept of sharing of personal health data over cloud storage in a healthcare-cyber physical system has become popular in recent times as it improves access quality.The privacy of health data can only be preserved... The concept of sharing of personal health data over cloud storage in a healthcare-cyber physical system has become popular in recent times as it improves access quality.The privacy of health data can only be preserved by keeping it in an encrypted form,but it affects usability and flexibility in terms of effective search.Attribute-based searchable encryption(ABSE)has proven its worth by providing fine-grained searching capabilities in the shared cloud storage.However,it is not practical to apply this scheme to the devices with limited resources and storage capacity because a typical ABSE involves serious computations.In a healthcare cloud-based cyber-physical system(CCPS),the data is often collected by resource-constraint devices;therefore,here also,we cannot directly apply ABSE schemes.In the proposed work,the inherent computational cost of the ABSE scheme is managed by executing the computationally intensive tasks of a typical ABSE scheme on the blockchain network.Thus,it makes the proposed scheme suitable for online storage and retrieval of personal health data in a typical CCPS.With the assistance of blockchain technology,the proposed scheme offers two main benefits.First,it is free from a trusted authority,which makes it genuinely decentralized and free from a single point of failure.Second,it is computationally efficient because the computational load is now distributed among the consensus nodes in the blockchain network.Specifically,the task of initializing the system,which is considered the most computationally intensive,and the task of partial search token generation,which is considered as the most frequent operation,is now the responsibility of the consensus nodes.This eliminates the need of the trusted authority and reduces the burden of data users,respectively.Further,in comparison to existing decentralized fine-grained searchable encryption schemes,the proposed scheme has achieved a significant reduction in storage and computational cost for the secret key associated with users.It has been verified both theoretically and practically in the performance analysis section. 展开更多
关键词 Cloud-based cyber-physical systems(CCPS) data encryption healthcare information search and retrieval keyword search public-key cryptosystems searchable encryption
下载PDF
上一页 1 2 24 下一页 到第
使用帮助 返回顶部