[1] |
HASHIZUME K, ROSADO D G, FEMANDEZ M E, et al. An analysis of security issues for cloud computing[J]. Journal of Internet Services & Applications, 2013,4(1):1-13.
|
[2] |
CAO N, WANG C, LI M, et al. Privacy-preserving multi-keyword ranked search over encrypted cloud data[J]. IEEE Transactions on Parallel and Distributed Systems, 2011,25(1):829-837.
|
[3] |
SUN W H, WANG B CAO N, et al. Verifiable privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking[J]. IEEE Parallel and Distributed Technology Systems and Applications, 2013,25(11):3025-3035.
|
[4] |
LIU L G, LIU Z J. A novel fast dimension-reducing ranked query method with high security for encrypted cloud data[J]. Chinese Journal of Electronics, 2020,29(2):344-350.
|
[5] |
BALLARD L, KAMARA S, MONROSE F. Achieving efficient conjunctive keyword searches over encrypted data [C]// Proceedings of the 7th International Conference on Information and Communications Security. 2005:414-426.
|
[6] |
LI M, YU S C, CAO N, et al. Authorized private keyword search over encrypted data in cloud computing[C]// Proceedings of the 2011 31st International Conference on Distributed Computing Systems. 2011:383-392.
|
[7] |
CAO N, WANG C, LI M, et al. Privacy-preserving multi-keyword ranked search over encrypted cloud data [J]. IEEE Transactions on Parallel and Distributed Systems, 2014,25(1):222-233.
|
[8] |
MURATA M, NAGANO H, MUKAI R, et al. BM25 with exponential IDF for instance search[J]. IEEE Transactions on Multimedia, 2014,16(6):1690-1699.
|
[9] |
SONG D X, WAGNER D, PERRIG A. Practical techniques for searches on encrypted data[C]// Proceedings of the 2000 IEEE Symposium on Security and Privacy. 2000:44-55.
|
[10] |
CURTMOLA R, GARAY J, KAMARA S, et al. Searchable symmetric encryption: Improved definitions and efficient constructions[J]. Journal of Computer Security, 2011,19(5):895-934.
|
[11] |
LI R X, XU Z Y, KANG W S, et al. Efficient multi-keyword ranked query over encrypted data in cloud computing[J]. Future Generation Computer Systems, 2014,30:179-190.
|
[12] |
WANG J F, CHEN X F, MA H, et al. A verifiable fuzzy keyword search scheme over encrypted data[J]. Journal of Internet Services and Information Security, 2012,2(1/2):49-58.
|
[13] |
XIA Z H, WANG X H, SUN X M, et al. A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data[J]. IEEE Transactions on Parallel and Distributed Systems, 2016,27(2):340-352.
|
[14] |
FU Z J, WU X L, GUAN C W, et al. Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement[J]. IEEE Transactions on Information Forensics and Security, 2016,11(12):2706-2716.
|
[15] |
WAN Z G, DENG R H. VPSearch: Achieving verifiability for privacy-preserving multi-keyword search over encrypted cloud data[J]. IEEE Transactions on Dependable and Secure Computing, 2018,15(6) :1083-1095.
|
[16] |
YANG Y, LIN H R, LIU X M, et al. Blockchain-based verifiable multi-keyword ranked search on encrypted cloud with fair payment[J]. IEEE Access, 2019, 7:140818-140832.
|
[17] |
LIU Q, TIAN Y, WU J, et al. Enabling verifiable and dynamic ranked search over outsourced data[J]. IEEE Transactions on Services Computing, 2019.
|
[18] |
ZHANG W, LIN Y P, GU Q. Catch you if you misbehave: Ranked keyword search results verification in cloud computing[J]. IEEE Transactions on Cloud Computing, 2018,6(1) :74-86.
|
[19] |
GOH E J. Secure indexes[EB/OL]. (2003-11-07) [2021-05-01]. https://crypto.stanford.edu/portia/pubs/articles/G1448527409.html.
|
[20] |
RAYKOVA M, VO B, BELLOVIN S M, et al. Secure anonymous database search[C]// Proceedings of the 2009 ACM Workshop on Cloud Computing Security. 2009:115-126.
|
[21] |
CHANG Y C, MITZENMACHER M. Privacy preserving keyword searches on remote encrypted data[C]// International Conference on Applied Cryptography and Network Security. 2005:442-455.
|
[22] |
CURTMOLA R, GARAY J, KAMARA S, et al. Searchable symmetric encryption: Improved definitions and efficient constructions[J]. Journal of Computer Security, 2011,19(5):895-934.
|
[23] |
GUAN Z T, LIU X Y, WU L F, et al. Cross-lingual multi-keyword rank search with semantic extension over encrypted data[J]. Information Sciences, 2020,514:523-540.
|
[24] |
戴奇林,杨凡. 基于K-L变换的iris数据分类[J]. 农家参谋, 2018(12):213.
|
[25] |
罗刚. 解密搜索引擎技术实战:Lucene&Java 精华版[M]. 北京:电子工业出版社, 2011:401-405.
|