期刊文献+
共找到490篇文章
< 1 2 25 >
每页显示 20 50 100
Constructing Certificateless Encryption with Keyword Search against Outside and Inside Keyword Guessing Attacks 被引量:4
1
作者 Yang Lu Jiguo Li 《China Communications》 SCIE CSCD 2019年第7期156-173,共18页
Searchable public key encryption is a useful cryptographic paradigm that enables an untrustworthy server to retrieve the encrypted data without revealing the contents of the data. It offers a promising solution to enc... Searchable public key encryption is a useful cryptographic paradigm that enables an untrustworthy server to retrieve the encrypted data without revealing the contents of the data. It offers a promising solution to encrypted data retrieval in cryptographic cloud storage. Certificateless public key cryptography (CLPKC) is a novel cryptographic primitive that has many merits. It overcomes the key escrow problem in identity-based cryptography (IBC) and the cumbersome certificate problem in conventional public key cryptography (PKC). Motivated by the appealing features of CLPKC, several certificateless encryption with keyword search (CLEKS) schemes have been presented in the literature. But, our cryptanalysis demonstrates that the previously proposed CLEKS frameworks suffer from the security vulnerability caused by the keyword guessing attack. To remedy the security weakness in the previous frameworks and provide resistance against both inside and outside keyword guessing attacks, we propose a new CLEKS framework. Under the new framework, we design a concrete CLEKS scheme and formally prove its security in the random oracle model. Compared with previous two CLEKS schemes, the proposed scheme has better overall performance while offering stronger security guarantee as it withstands the existing known types of keyword guessing attacks. 展开更多
关键词 searchable public key ENCRYPTION CERTIFICATELESS ENCRYPTION with keyword search INSIDE keyword guessing ATTACK OUTSIDE keyword guessing ATTACK random oracle model
下载PDF
Certificateless Public Key Encryption with Keyword Search 被引量:24
2
作者 PENG Yanguo CUI Jiangtao +1 位作者 PENG Changgen YING Zuobin 《China Communications》 SCIE CSCD 2014年第11期100-113,共14页
Public Key Encryption with Keyword Search (PEKS), an indispensable part of searchable encryption, is stock-in- trade for both protecting data and providing operability of encrypted data. So far most of PEKS schemes ... Public Key Encryption with Keyword Search (PEKS), an indispensable part of searchable encryption, is stock-in- trade for both protecting data and providing operability of encrypted data. So far most of PEKS schemes have been established on Identity-Based Cryptography (IBC) with key escrow problem inherently. Such problem severely restricts the promotion of IBC-based Public Key Infrastructure including PEKS component. Hence, Certificateless Public Key Cryptography (CLPKC) is efficient to remove such problem. CLPKC is introduced into PEKS, and a general model of Certificateless PEKS (CLPEKS) is formalized. In addition, a practical CLPEKS scheme is constructed with security and efficiency analyses. The proposal is secure channel free, and semantically secure against adaptive chosen keyword attack and keyword guessing attack. To illustrate the superiority, massive experiments are conducted on Enron Email dataset which is famous in information retrieval field. Compared with existed constructions, CLPEKS improves the efficiency in theory and removes the key escrow problem. 展开更多
关键词 provable secure certificateless public key encryption keyword search
下载PDF
KRBKSS: a keyword relationship based keyword-set search system for peer-to-peer networks 被引量:1
3
作者 张亮 邹福泰 马范援 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2005年第6期577-582,共6页
may incur significant bandwidth for executing more com- plicated search queries such as multiple-attribute queries. In order to reduce query overhead, KSS (keyword-set search) by Gnawali partitions the index by a set ... may incur significant bandwidth for executing more com- plicated search queries such as multiple-attribute queries. In order to reduce query overhead, KSS (keyword-set search) by Gnawali partitions the index by a set of keywords. However, a KSS index is considerably larger than a standard inverted index, since there are more word sets than there are individual words. And the insert overhead and storage overhead are obviously un- acceptable for full-text search on a collection of documents even if KSS uses the distance window technology. In this paper, we extract the relationship information between query keywords from websites’ queries logs to improve performance of KSS system. Experiments results clearly demonstrated that the improved keyword-set search system based on keywords relationship (KRBKSS) is more efficient than KSS index in insert overhead and storage overhead, and a standard inverted index in terms of communication costs for query. 展开更多
关键词 Peer-to-peer (P2P) keyword-set search (KSS) keyword relationship
下载PDF
An Efficient Multi-Keyword Query Processing Strategy on P2P Based Web Search 被引量:2
4
作者 SHEN Derong LI Meifang +1 位作者 ZHU Hongkai YU Ge 《Wuhan University Journal of Natural Sciences》 CAS 2007年第5期881-886,共6页
The paper presents a novel benefit based query processing strategy for efficient query routing. Based on DHT as the overlay network, it first applies Nash equilibrium to construct the optimal peer group based on the c... The paper presents a novel benefit based query processing strategy for efficient query routing. Based on DHT as the overlay network, it first applies Nash equilibrium to construct the optimal peer group based on the correlations of keywords and coverage and overlap of the peers to decrease the time cost, and then presents a two-layered architecture for query processing that utilizes Bloom filter as compact representation to reduce the bandwidth consumption. Extensive experiments conducted on a real world dataset have demonstrated that our approach obviously decreases the processing time, while improves the precision and recall as well. 展开更多
关键词 multi-keyword P2P Web search CORRELATION coverage and overlap Nash equilibrium
下载PDF
Multi-Owner Keyword Search over Shared Data without Secure Channels in the Cloud
5
作者 Yilun Wu Xicheng Lu +3 位作者 Jinshu Su Peixin Chen Xiaofeng Wang Bofeng Zhang 《China Communications》 SCIE CSCD 2017年第5期124-133,共10页
Searchable encryption allows cloud users to outsource the massive encrypted data to the remote cloud and to search over the data without revealing the sensitive information. Many schemes have been proposed to support ... Searchable encryption allows cloud users to outsource the massive encrypted data to the remote cloud and to search over the data without revealing the sensitive information. Many schemes have been proposed to support the keyword search in a public cloud. However,they have some potential limitations. First,most of the existing schemes only consider the scenario with the single data owner. Second,they need secure channels to guarantee the secure transmission of secret keys from the data owner to data users. Third,in some schemes,the data owner should be online to help data users when data users intend to perform the search,which is inconvenient.In this paper,we propose a novel searchable scheme which supports the multi-owner keyword search without secure channels. More than that,our scheme is a non-interactive solution,in which all the users only need to communicate with the cloud server. Furthermore,the analysis proves that our scheme can guarantee the security even without secure channels. Unlike most existing public key encryption based searchable schemes,we evaluate the performance of our scheme,which shows that our scheme is practical. 展开更多
关键词 keyword search cloud security secure channels proxy re-encryption
下载PDF
Improved Research on Fuzzy Search over Encrypted Cloud Data Based on Keywords
6
作者 Ping Zhang Jianzhong Wang 《Journal of Computer and Communications》 2015年第9期90-98,共9页
A search strategy over encrypted cloud data based on keywords has been improved and has presented a method using different strategies on the client and the server to improve the search efficiency in this paper. The cl... A search strategy over encrypted cloud data based on keywords has been improved and has presented a method using different strategies on the client and the server to improve the search efficiency in this paper. The client uses the Chinese and English to achieve the synonym construction of the keywords, the establishment of the fuzzy-syllable words and synonyms set of keywords and the implementation of fuzzy search strategy over the encryption of cloud data based on keywords. The server side through the analysis of the user’s query request provides keywords for users to choose and topic words and secondary words are picked out. System will match topic words with historical inquiry in time order, and then the new query result of the request is directly gained. The analysis of the simulation experiment shows that the fuzzy search strategy can make better use of historical results on the basis of privacy protection for the realization of efficient data search, saving the search time and improving the efficiency of search. 展开更多
关键词 CLOUD Data FUZZY search keywordS SYNONYMS searchable ENCRYPTION
下载PDF
A Proxy Re-Encryption with Keyword Search Scheme in Cloud Computing
7
作者 Yongli Tang Huanhuan Lian +1 位作者 Zemao Zhao Xixi Yan 《Computers, Materials & Continua》 SCIE EI 2018年第8期339-352,共14页
With the widespread use of cloud computing technology,more and more users and enterprises decide to store their data in a cloud server by outsourcing.However,these huge amounts of data may contain personal privacy,bus... With the widespread use of cloud computing technology,more and more users and enterprises decide to store their data in a cloud server by outsourcing.However,these huge amounts of data may contain personal privacy,business secrets and other sensitive information of the users and enterprises.Thus,at present,how to protect,retrieve,and legally use the sensitive information while preventing illegal accesses are security challenges of data storage in the cloud environment.A new proxy re-encryption with keyword search scheme is proposed in this paper in order to solve the problem of the low retrieval efficiency of the encrypted data in the cloud server.In this scheme,the user data are divided into files,file indexes and the keyword corresponding to the files,which are respectively encrypted to store.The improved scheme does not need to re-encrypt partial file cipher-text as in traditional schemes,but re-encrypt the cipher-text of keywords corresponding to the files.Therefore the scheme can improve the computational efficiency as well as resist chosen keyword attack.And the scheme is proven to be indistinguishable under Hash Diffie-Hellman assumption.Furthermore,the scheme does not need to use any secure channels,making it more effective in the cloud environment. 展开更多
关键词 Cloud computing keyword search proxy re-encryption provable security
下载PDF
Efficient Expressive Attribute-Based Encryption with Keyword Search over Prime-Order Groups
8
作者 Qing Miao Lan Guo +1 位作者 Yang Lu Zhongqi Wang 《Intelligent Automation & Soft Computing》 SCIE 2023年第3期2737-2754,共18页
Attribute-based encryption with keyword search(ABEKS)is a novel cryptographic paradigm that can be used to implementfine-grained access control and retrieve ciphertexts without disclosing the sensitive information.It i... Attribute-based encryption with keyword search(ABEKS)is a novel cryptographic paradigm that can be used to implementfine-grained access control and retrieve ciphertexts without disclosing the sensitive information.It is a perfect combination of attribute-based encryption(ABE)and public key encryption with keyword search(PEKS).Nevertheless,most of the existing ABEKS schemes have limited search capabilities and only support single or simple conjunctive keyword search.Due to the weak search capability and inaccurate search results,it is difficult to apply these schemes to practical applications.In this paper,an effi-cient expressive ABEKS(EABEKS)scheme supporting unbounded keyword uni-verse over prime-order groups is designed,which supplies the expressive keyword search function supporting the logical connectives of“AND”and“OR”.The proposed scheme not only leads to low computation and communica-tion costs,but also supports unbounded keyword universe.In the standard model,the scheme is proven to be secure under the chosen keyword attack and the cho-sen plaintext attack.The comparison analysis and experimental results show that it has better performance than the existing EABEKS schemes in the storage,com-putation and communication costs. 展开更多
关键词 searchable encryption expressive keyword search attribute-based encryption unbounded keyword universe prime-order group
下载PDF
Chosen-Ciphertext Attack Secure Public-Key Encryption with Keyword Search
9
作者 Hyun Sook Rhee 《Computers, Materials & Continua》 SCIE EI 2022年第10期69-85,共17页
As the use of cloud storage for various services increases,the amount of private personal information along with data stored in the cloud storage is also increasing.To remotely use the data stored on the cloud storage... As the use of cloud storage for various services increases,the amount of private personal information along with data stored in the cloud storage is also increasing.To remotely use the data stored on the cloud storage,the data to be stored needs to be encrypted for this reason.Since“searchable encryption”is enable to search on the encrypted data without any decryption,it is one of convenient solutions for secure data management.A public key encryption with keyword search(for short,PEKS)is one of searchable encryptions.Abdalla et al.firstly defined IND-CCA security for PEKS to enhance it’s security and proposed consistent IND-CCA secure PEKS based on the“robust”ANO-CCA secure identity-based encryption(IBE).In this paper,we propose two generic constructions of consistent IND-CCA secure PEKS combining(1)a hierarchical identity based encryption(for short,HIBE)and a signature scheme or(2)a HIBE,an encapsulation,and a message authentication code(for short,MAC)scheme.Our generic constructions identify that HIBE requires the security of a signature or a MAC as well as the weaker“ANO-CPA security(resp.,IND-CPA security)”of HIBE than“ANOCCA security(resp.,IND-CCA security)”of IBE required in for achieving IND-CCA secure(resp.,consistent)PEKS.Finally,we prove that our generic constructions satisfy IND-CCA security and consistency under the security models. 展开更多
关键词 searchable encryption public-key encryption with keyword search chosen ciphertext security data privacy
下载PDF
Chinese Keyword Search by Indexing in Relational Databases
10
作者 Liang Zhu Lijuan Pan Qin Ma 《Journal of Software Engineering and Applications》 2012年第12期107-112,共6页
In this paper, we propose a new method based on index to realize IR-style Chinese keyword search with ranking strategies in relational databases. This method creates an index by using the related information of tuple ... In this paper, we propose a new method based on index to realize IR-style Chinese keyword search with ranking strategies in relational databases. This method creates an index by using the related information of tuple words and presents a ranking strategy in terms of the nature of Chinese words. For a Chinese keyword query, the index is used to match query search words and the tuple words in index quickly, and to compute similarities between the query and tuples by the ranking strategy, and then the set of identifiers of candidate tuples is generated. Thus, we retrieve top-N results of the query using SQL selection statements and output the ranked answers according to the similarities. The experimental results show that our method is efficient and effective. 展开更多
关键词 RELATIONAL DATABASE CHINESE keyword search Index RANKING Strategy
下载PDF
Hash Function Based Keyword Searchable Encryption Framework in Cloud Server Using MD5 and MECC
11
作者 R.Lakshmana Kumar R.Subramanian S.Karthik 《Journal of Information Hiding and Privacy Protection》 2021年第4期201-226,共26页
Cloud Computing expands its usability to various fields that utilize data and store it in a common space that is required for computing and the purpose of analysis as like the IoT devices.These devices utilize the clo... Cloud Computing expands its usability to various fields that utilize data and store it in a common space that is required for computing and the purpose of analysis as like the IoT devices.These devices utilize the cloud for storing and retrieving data since the devices are not capable of storing processing data on its own.Cloud Computing provides various services to the users like the IaaS,PaaS and SaaS.The major drawback that is faced by cloud computing include the Utilization of Cloud services for the storage of data that could be accessed by all the users related to cloud.The use of Public Key Encryptions with keyword search(PEKS)provides security against the untrustworthy third-party search capability on publicly encryption keys without revealing the data’s contents.But the Security concerns of PEKs arise when Inside Keywords Guessing attacks(IKGA),is identified in the system due to the untrusted server presume the keyword in trapdoor.This issue could be solved by using various algorithms like the Certificateless Hashed Public Key Authenticated Encryption with Keyword Search(CL-HPAEKS)which utilizes the Modified Elliptic Curve Cryptography(MECC)along with the Mutation Centred flower pollinations algorithm(CM-FPA)that is used in enhancing the performance of the algorithm using the Optimization in keys.The additional use of Message Digests 5(MD5)hash function in the system enhances the security Level that is associated with the system.The system that is proposed achieves the security level performance of 96 percent and the effort consumed by the algorithm is less compared to the other encryption techniques. 展开更多
关键词 Certificateless Hashed Public Key Authenticated Encryption with keyword search(CL-HPAEKS) modified elliptic curve cryptography(MECC) digest 5(MD5) inside keywords guessing attacks(IKGA) public key encryptions with keyword search(PEKS)
下载PDF
Stability-mutation feature identification of Web search keywords based on keyword concentration change ratio
12
作者 Hongtao LU Guanghui YE Gang LI 《Chinese Journal of Library and Information Science》 2014年第3期33-44,共12页
Purpose: The aim of this paper is to discuss how the keyword concentration change ratio(KCCR) is used while identifying the stability-mutation feature of Web search keywords during information analyses and predictions... Purpose: The aim of this paper is to discuss how the keyword concentration change ratio(KCCR) is used while identifying the stability-mutation feature of Web search keywords during information analyses and predictions.Design/methodology/approach: By introducing the stability-mutation feature of keywords and its significance, the paper describes the function of the KCCR in identifying keyword stability-mutation features. By using Ginsberg's influenza keywords, the paper shows how the KCCR can be used to identify the keyword stability-mutation feature effectively.Findings: Keyword concentration ratio has close positive correlation with the change rate of research objects retrieved by users, so from the characteristic of the 'stability-mutation' of keywords, we can understand the relationship between these keywords and certain information. In general, keywords representing for mutation fit for the objects changing in short-term, while those representing for stability are suitable for long-term changing objects. Research limitations: It is difficult to acquire the frequency of keywords, so indexes or parameters which are closely related to the true search volume are chosen for this study.Practical implications: The stability-mutation feature identification of Web search keywords can be applied to predict and analyze the information of unknown public events through observing trends of keyword concentration ratio.Originality/value: The stability-mutation feature of Web search could be quantitatively described by the keyword concentration change ratio(KCCR). Through KCCR, the authors took advantage of Ginsberg's influenza epidemic data accordingly and demonstrated how accurate and effective the method proposed in this paper was while it was used in information analyses and predictions. 展开更多
关键词 Web search Web search keyword Information analysis and prediction Concentration change ratio Feature identification Influenza epidemic
下载PDF
A Lightweight, Searchable, and Controllable EMR Sharing Scheme
13
作者 Xiaohui Yang Peiyin Zhao 《Computers, Materials & Continua》 SCIE EI 2024年第4期1521-1538,共18页
Electronic medical records (EMR) facilitate the sharing of medical data, but existing sharing schemes suffer fromprivacy leakage and inefficiency. This article proposes a lightweight, searchable, and controllable EMR ... Electronic medical records (EMR) facilitate the sharing of medical data, but existing sharing schemes suffer fromprivacy leakage and inefficiency. This article proposes a lightweight, searchable, and controllable EMR sharingscheme, which employs a large attribute domain and a linear secret sharing structure (LSSS), the computationaloverhead of encryption and decryption reaches a lightweight constant level, and supports keyword search andpolicy hiding, which improves the high efficiency of medical data sharing. The dynamic accumulator technologyis utilized to enable data owners to flexibly authorize or revoke the access rights of data visitors to the datato achieve controllability of the data. Meanwhile, the data is re-encrypted by Intel Software Guard Extensions(SGX) technology to realize resistance to offline dictionary guessing attacks. In addition, blockchain technology isutilized to achieve credible accountability for abnormal behaviors in the sharing process. The experiments reflectthe obvious advantages of the scheme in terms of encryption and decryption computation overhead and storageoverhead, and theoretically prove the security and controllability in the sharing process, providing a feasible solutionfor the safe and efficient sharing of EMR. 展开更多
关键词 LIGHTWEIGHT keyword search large attribute domain CONTROLLABILITY blockchain
下载PDF
Keyword Search on Both XML and Relational Data
14
作者 Liru Zhang Tadashi Ohmori Mamoru Hoshi 《通讯和计算机(中英文版)》 2011年第4期264-275,共12页
关键词 关系数据库系统 XML数据 关键字搜索 半结构化数据库 RDBMS 数据库存储 用户信息 数据库检索
下载PDF
Keyword Cloud在文献检索中的应用研究 被引量:5
15
作者 廖凤 张建勇 《图书馆杂志》 CSSCI 北大核心 2010年第9期57-61,共5页
理论部分对Keyword Cloud的来源、概念、功能以及在图书馆服务中的需求分析进行介绍,为实际应用奠定理论基础。实践部分将Keyword Cloud应用于文献数据库检索服务中,用于汇总检索结果和辅助二次检索;同时引入TagLine技术为传统Keyword C... 理论部分对Keyword Cloud的来源、概念、功能以及在图书馆服务中的需求分析进行介绍,为实际应用奠定理论基础。实践部分将Keyword Cloud应用于文献数据库检索服务中,用于汇总检索结果和辅助二次检索;同时引入TagLine技术为传统Keyword Cloud增加时间框架,便于用户观察热点趋势变化;通过用户调查对Keyword Cloud的实用性和适用性进行评价;总结下一步工作的重点在于关键词语义关系的构建。 展开更多
关键词 云图 标签云图 标签线图 关键词检索 二次检索
下载PDF
InSearch:一种高效的XML关键字查询算法
16
作者 张晓琳 郝琨 +2 位作者 郭丹丹 张换香 刘立新 《小型微型计算机系统》 CSCD 北大核心 2016年第5期933-937,共5页
现有的XML关键字查询算法都是基于前缀编码,而这种编码方式会产生公共祖先重复比较CAR(Common Ancestor Repetition)问题.针对这一问题,提出一种基于区间编码的XM L关键字查询算法In Search(Interval Search).该算法首先建立基于区间编... 现有的XML关键字查询算法都是基于前缀编码,而这种编码方式会产生公共祖先重复比较CAR(Common Ancestor Repetition)问题.针对这一问题,提出一种基于区间编码的XM L关键字查询算法In Search(Interval Search).该算法首先建立基于区间编码的区间索引In Index(Interval Index),计算节点之间的最小范围值和最小公共祖先,遍历区间索引计算候选SLCA节点集合,过滤候选SLCA节点集合,得到SLCA节点集合.理论和实验结果表明,In Search算法是一种高效的SLCA节点查询算法. 展开更多
关键词 XML 关键字查询 区间编码 Insearch
下载PDF
Blockchain-Assisted Secure Fine-Grained Searchable Encryption for a Cloud-Based Healthcare Cyber-Physical System 被引量:19
17
作者 Mamta Brij B.Gupta +3 位作者 Kuan-Ching Li Victor C.M.Leun Kostas E.Psannis Shingo Yamaguchi 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2021年第12期1877-1890,共14页
The concept of sharing of personal health data over cloud storage in a healthcare-cyber physical system has become popular in recent times as it improves access quality.The privacy of health data can only be preserved... The concept of sharing of personal health data over cloud storage in a healthcare-cyber physical system has become popular in recent times as it improves access quality.The privacy of health data can only be preserved by keeping it in an encrypted form,but it affects usability and flexibility in terms of effective search.Attribute-based searchable encryption(ABSE)has proven its worth by providing fine-grained searching capabilities in the shared cloud storage.However,it is not practical to apply this scheme to the devices with limited resources and storage capacity because a typical ABSE involves serious computations.In a healthcare cloud-based cyber-physical system(CCPS),the data is often collected by resource-constraint devices;therefore,here also,we cannot directly apply ABSE schemes.In the proposed work,the inherent computational cost of the ABSE scheme is managed by executing the computationally intensive tasks of a typical ABSE scheme on the blockchain network.Thus,it makes the proposed scheme suitable for online storage and retrieval of personal health data in a typical CCPS.With the assistance of blockchain technology,the proposed scheme offers two main benefits.First,it is free from a trusted authority,which makes it genuinely decentralized and free from a single point of failure.Second,it is computationally efficient because the computational load is now distributed among the consensus nodes in the blockchain network.Specifically,the task of initializing the system,which is considered the most computationally intensive,and the task of partial search token generation,which is considered as the most frequent operation,is now the responsibility of the consensus nodes.This eliminates the need of the trusted authority and reduces the burden of data users,respectively.Further,in comparison to existing decentralized fine-grained searchable encryption schemes,the proposed scheme has achieved a significant reduction in storage and computational cost for the secret key associated with users.It has been verified both theoretically and practically in the performance analysis section. 展开更多
关键词 Cloud-based cyber-physical systems(CCPS) data encryption healthcare information search and retrieval keyword search public-key cryptosystems searchable encryption
下载PDF
Searchable Encryption Cloud Storage with Dynamic Data Update to Support Efficient Policy Hiding 被引量:5
18
作者 Laicheng Cao Yifan Kang +3 位作者 Qirui Wu Rong Wu Xian Guo Tao Feng 《China Communications》 SCIE CSCD 2020年第6期153-163,共11页
Ciphertext policy attribute based encryption(CP-ABE)can provide high finegrained access control for cloud storage.However,it needs to solve problems such as property privacy protection,ciphertext search and data updat... Ciphertext policy attribute based encryption(CP-ABE)can provide high finegrained access control for cloud storage.However,it needs to solve problems such as property privacy protection,ciphertext search and data update in the application process.Therefore,based on CP-ABE scheme,this paper proposes a dynamically updatable searchable encryption cloud storage(DUSECS)scheme.Using the characteristics of homomorphic encryption,the encrypted data is compared to achieve efficient hiding policy.Meanwhile,adopting linked list structure,the DUSECS scheme realizes the dynamic data update and integrity detection,and the search encryption against keyword guessing attacks is achieved by combining homomorphic encryption with aggregation algorithm.The analysis of security and performance shows that the scheme is secure and efficient. 展开更多
关键词 cloud storage dynamic update keywords search policy hidden
下载PDF
IoT Services:Realizing Private Real-Time Detection via Authenticated Conjunctive Searchable Encryption 被引量:2
19
作者 Chungen Xu Lin Mei +2 位作者 Jinxue Cheng Yu Zhao Cong Zuo 《Journal of Cyber Security》 2021年第1期55-67,共13页
With the rapid development of wireless communication technology,the Internet of Things is playing an increasingly important role in our everyday.The amount of data generated by sensor devices is increasing as a large ... With the rapid development of wireless communication technology,the Internet of Things is playing an increasingly important role in our everyday.The amount of data generated by sensor devices is increasing as a large number of connectable devices are deployed in many fields,including the medical,agricultural,and industrial areas.Uploading data to the cloud solves the problem of data overhead but results in privacy issues.Therefore,the question of how to manage the privacy of uploading data and make it available to be interconnected between devices is a crucial issue.In this paper,we propose a scheme that supports real-time authentication with conjunctive keyword detection(RA-CKD),this scheme can realize the interconnection of encrypted data between devices while ensuring some measure of privacy for both encrypted data and detection tokens.Through authentication technology,connected devices can both authenticate each other’s identity and prevent malicious adversaries from interfering with device interconnection.Finally,we prove that our scheme can resist inside keyword guessing attack through rigorous security reduction.The experiment shows that the efficiency of RA-CKD is good enough to be practical. 展开更多
关键词 searchable encryption conjunctive keyword search Internet of Things AUTHENTICATION
下载PDF
Tourism demand forecasting and tourists’search behavior:evidence from segmented Baidu search volume
20
作者 Yifan Yang Ju'e Guo Shaolong Sun 《Data Science and Management》 2021年第4期1-9,共9页
Given the importance of web search volume for reflecting tourists'preferences for certain tourism services and destinations,incorporating these data into forecasting models can significantly improve forecasting pe... Given the importance of web search volume for reflecting tourists'preferences for certain tourism services and destinations,incorporating these data into forecasting models can significantly improve forecasting performance.This study enriches the literature on tourism demand forecasting and tourists'search behavior through segmented Baidu search volume data.First,this study divides Baidu search volume data based on volume sources and periods.Then,by analyzing the most relevant keywords in tourism demand in different segments,this study captures the dynamic characteristics of tourist search behavior.Finally,this study adopts a series of econometric and machine learning models to further improve the performance of tourism demand and forecasting.The findings indicate that tourists’search behavior has changed significantly with the prevalence and popularization of 4G technology and suggest that search volume improves forecasting performance,especially search volume on mobile terminals,from 2014M1–2019M12. 展开更多
关键词 Baidu search volume Tourist search behavior Tourism demand forecasting Event study Selection of keywords
下载PDF
上一页 1 2 25 下一页 到第
使用帮助 返回顶部