1 |
冯朝胜,秦志光,袁丁.云数据安全存储技术[J].计算机学报, 2015, 38(1): 150-162.
|
|
FENG C S, QIN Z G, YUAN D. Techniques of secure storage for cloud data[J]. Chinese Journal of Computers, 2015, 38(1): 150-162.
|
2 |
KABIR H M D, KHOSRAVI A, MONDAL S K, et al. Uncertainty-aware decisions in cloud computing: foundations and future directions[J]. ACM Computing Surveys, 2022, 54(4): No.74. 10.1145/3447583
|
3 |
LINTHICUM D S. Approaching cloud computing performance[J]. IEEE Cloud Computing, 2018, 5(2): 33-36. 10.1109/mcc.2018.022171665
|
4 |
SEHGAL N K, BHATT P C P. Foundations of cloud computing[M]// Cloud Computing: Concepts and Practices. Cham: Springer, 2018: 11-40. 10.1007/978-3-319-77839-6_2
|
5 |
BÖSCH C, HARTEL P, JONKER W, et al. A survey of provably secure searchable encryption[J]. ACM Computing Surveys, 2015, 47(2): No.18. 10.1145/2636328
|
6 |
WANG Y L, WANG J F, CHEN X F. Secure searchable encryption: a survey[J]. Journal of Communications and Information Networks, 2016, 1: 52-65. 10.1007/bf03391580
|
7 |
POH G S, CHIN J J, YAU W C, et al. Searchable symmetric encryption: designs and challenges[J]. ACM Computing Surveys, 2018, 50(3): No.40. 10.1145/3064005
|
8 |
CHEN Q, FAN K, ZHANG K, et al. Privacy-preserving searchable encryption in the intelligent edge computing[J]. Computer Communications, 2020, 164: 31-41. 10.1016/j.comcom.2020.09.012
|
9 |
CURTMOLA R, GARAY J, KAMARA S, et al. Searchable symmetric encryption: improved definitions and efficient constructions[J]. Journal of Computer Security, 2011, 19(5): 895-934. 10.3233/jcs-2011-0426
|
10 |
XIA Z H, WANG X H, SUN X M, et al. A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data[J]. IEEE Transactions on Parallel and Distributed Systems, 2016, 27(2): 340-352. 10.1109/tpds.2015.2401003
|
11 |
CHEN C, ZHU X J, SHEN P S, et al. An efficient privacy-preserving ranked keyword search method[J]. IEEE Transactions on Parallel and Distributed Systems, 2016, 27(4): 951-963. 10.1109/tpds.2015.2425407
|
12 |
WANG C, CAO N, REN K, et al. Enabling secure and efficient ranked keyword search over outsourced cloud data[J]. IEEE Transactions on Parallel and Distributed Systems, 2012, 23(8): 1467-1479. 10.1109/tpds.2011.282
|
13 |
CAO N, WANG C, LI M, et al. Privacy-preserving multi-keyword ranked search over encrypted cloud data [C]// Proceedings of the 2011 IEEE Conference on Computer Communications. Piscataway: IEEE, 2011: 829-837. 10.1109/infcom.2011.5935306
|
14 |
DING X F, LIU P, JIN H. Privacy-preserving multi-keyword top-k similarity search over encrypted data[J]. IEEE Transactions on Dependable and Secure Computing, 2019, 16(2): 344-357. 10.1109/tdsc.2017.2693969
|
15 |
DAI X L, DAI H, RONG C M, et al. Enhanced semantic-aware multi-keyword ranked search scheme over encrypted cloud data[J]. IEEE Transactions on Cloud Computing, 2022, 10(4): 2595-2612. 10.1109/tcc.2020.3047921
|
16 |
LI H W, YANG Y, LUAN T H, et al. Enabling fine-grained multi-keyword search supporting classified sub-dictionaries over encrypted cloud data[J]. IEEE Transactions on Dependable and Secure Computing, 2016, 13(3): 312-325. 10.1109/tdsc.2015.2406704
|
17 |
YANG Y, ZHAN Y C, LIU J, et al. Chinese multi-keyword fuzzy rank search over encrypted cloud data based on locality-sensitive hashing[J]. Journal of Information Science and Engineering, 2019, 35(1): 137-158.
|
18 |
SUN W H, WANG B, CAO N, et al. Verifiable privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking[J]. IEEE Transactions on Parallel and Distributed Systems, 2014, 25(11): 3025-3035. 10.1109/tpds.2013.282
|
19 |
LI J Y, MA J F, MIAO Y B, et al. Verifiable semantic-aware ranked keyword search in cloud-assisted edge computing[J]. IEEE Transactions on Services Computing, 2022, 15(6): 3591-3605. 10.1109/tsc.2021.3098864
|
20 |
WANG B, SONG W, LOU W J, et al. Inverted index based multi-keyword public-key searchable encryption with strong privacy guarantee [C]// Proceedings of the 2015 IEEE Conference on Computer Communications. Piscataway: IEEE, 2015: 2092-2100. 10.1109/infocom.2015.7218594
|
21 |
JIANG X X, YU J, YAN J B, et al. Enabling efficient and verifiable multi-keyword ranked search over encrypted cloud data[J]. Information Sciences, 2017, 403/404: 22-41. 10.1016/j.ins.2017.03.037
|
22 |
DAI H, YANG M H, YANG G, et al. A keyword-grouping inverted index based multi-keyword ranked search scheme over encrypted cloud data[J]. IEEE Transactions on Sustainable Computing, 2022, 7(3): 561-578. 10.1109/tsusc.2021.3125520
|
23 |
WU H C, LUK R W P, WONG K F, et al. Interpreting TF-IDF term weights as making relevance decisions[J]. ACM Transactions on Information Systems, 2008, 26(3): No.13. 10.1145/1361684.1361686
|
24 |
WONG W K, CHEUNG D W L, KAO B, et al. Secure kNN computation on encrypted databases [C]// Proceedings of the 2009 ACM SIGMOD International Conference on Management of Data. New York: ACM, 2009: 139-152. 10.1145/1559845.1559862
|
25 |
CHERUKU H, SUBHASHINI P. Ranked search over encrypted cloud data in azure using secure K-NN[M]// AGGARWAL V B, BHATNAGAR V, MISHRA D K. Big Data Analytics: Proceedings of CSI 2015, AISC 654. Singapore: Springer, 2018: 341-350.
|
26 |
SALTON G, WONG A, YANG C S. A vector space model for automatic indexing[J]. Communications of the ACM, 1975, 18(11): 613-620. 10.1145/361219.361220
|
27 |
BAQUET D. New York Times Dataset[DS/OL]. [2022-05-23]. .
|
28 |
LANG K. NewsWeeder: learning to filter netnews [C]// Proceedings of the 12th International Conference on Machine Learning. San Francisco: Morgan Kaufmann Publishers Inc., 1995: 331-339. 10.1016/b978-1-55860-377-6.50048-7
|