[1] HASHIZUME K, ROSADO D G, FEMANDEZ M E, et al. An analysis of security issues for cloud computing[J]. Journal of Internet Services & Applications, 2013,4(1):1-13.
[2] CAO N, WANG C, LI M, et al. Privacy-preserving multi-keyword ranked search over encrypted cloud data[J]. IEEE Transactions on Parallel and Distributed Systems, 2011,25(1):829-837.
[3] SUN W H, WANG B CAO N, et al. Verifiable privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking[J]. IEEE Parallel and Distributed Technology Systems and Applications, 2013,25(11):3025-3035.
[4] LIU L G, LIU Z J. A novel fast dimension-reducing ranked query method with high security for encrypted cloud data[J]. Chinese Journal of Electronics, 2020,29(2):344-350.
[5] BALLARD L, KAMARA S, MONROSE F. Achieving efficient conjunctive keyword searches over encrypted data [C]// Proceedings of the 7th International Conference on Information and Communications Security. 2005:414-426.
[6] LI M, YU S C, CAO N, et al. Authorized private keyword search over encrypted data in cloud computing[C]// Proceedings of the 2011 31st International Conference on Distributed Computing Systems. 2011:383-392.
[7] CAO N, WANG C, LI M, et al. Privacy-preserving multi-keyword ranked search over encrypted cloud data [J]. IEEE Transactions on Parallel and Distributed Systems, 2014,25(1):222-233.
[8] MURATA M, NAGANO H, MUKAI R, et al. BM25 with exponential IDF for instance search[J]. IEEE Transactions on Multimedia, 2014,16(6):1690-1699.
[9] SONG D X, WAGNER D, PERRIG A. Practical techniques for searches on encrypted data[C]// Proceedings of the 2000 IEEE Symposium on Security and Privacy. 2000:44-55.
[10]CURTMOLA R, GARAY J, KAMARA S, et al. Searchable symmetric encryption: Improved definitions and efficient constructions[J]. Journal of Computer Security, 2011,19(5):895-934.
[11]LI R X, XU Z Y, KANG W S, et al. Efficient multi-keyword ranked query over encrypted data in cloud computing[J]. Future Generation Computer Systems, 2014,30:179-190.
[12]WANG J F, CHEN X F, MA H, et al. A verifiable fuzzy keyword search scheme over encrypted data[J]. Journal of Internet Services and Information Security, 2012,2(1/2):49-58.
[13]XIA Z H, WANG X H, SUN X M, et al. A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data[J]. IEEE Transactions on Parallel and Distributed Systems, 2016,27(2):340-352.
[14]FU Z J, WU X L, GUAN C W, et al. Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement[J]. IEEE Transactions on Information Forensics and Security, 2016,11(12):2706-2716.
[15]WAN Z G, DENG R H. VPSearch: Achieving verifiability for privacy-preserving multi-keyword search over encrypted cloud data[J]. IEEE Transactions on Dependable and Secure Computing, 2018,15(6) :1083-1095.
[16]YANG Y, LIN H R, LIU X M, et al. Blockchain-based verifiable multi-keyword ranked search on encrypted cloud with fair payment[J]. IEEE Access, 2019, 7:140818-140832.
[17]LIU Q, TIAN Y, WU J, et al. Enabling verifiable and dynamic ranked search over outsourced data[J]. IEEE Transactions on Services Computing, 2019.
[18]ZHANG W, LIN Y P, GU Q. Catch you if you misbehave: Ranked keyword search results verification in cloud computing[J]. IEEE Transactions on Cloud Computing, 2018,6(1) :74-86.
[19]GOH E J. Secure indexes[EB/OL]. (2003-11-07) [2021-05-01]. https://crypto.stanford.edu/portia/pubs/articles/G1448527409.html.
[20]RAYKOVA M, VO B, BELLOVIN S M, et al. Secure anonymous database search[C]// Proceedings of the 2009 ACM Workshop on Cloud Computing Security. 2009:115-126.
[21]CHANG Y C, MITZENMACHER M. Privacy preserving keyword searches on remote encrypted data[C]// International Conference on Applied Cryptography and Network Security. 2005:442-455.
[22]CURTMOLA R, GARAY J, KAMARA S, et al. Searchable symmetric encryption: Improved definitions and efficient constructions[J]. Journal of Computer Security, 2011,19(5):895-934.
[23]GUAN Z T, LIU X Y, WU L F, et al. Cross-lingual multi-keyword rank search with semantic extension over encrypted data[J]. Information Sciences, 2020,514:523-540.
[24]戴奇林,杨凡. 基于K-L变换的iris数据分类[J]. 农家参谋, 2018(12):213.
[25]罗刚. 解密搜索引擎技术实战:Lucene&Java 精华版[M]. 北京:电子工业出版社, 2011:401-405.
|