Searchable Encryption over Feature-Rich Data
Storage services allow data owners to store their huge amount of potentially sensitive data, such as audios, images, and videos, on remote cloud servers in encrypted form. To enable retrieval of encrypted files of interest, searchable symmetric encryption (SSE) schemes have been proposed. However, m...
Uloženo v:
| Vydáno v: | IEEE transactions on dependable and secure computing Ročník 15; číslo 3; s. 496 - 510 |
|---|---|
| Hlavní autoři: | , , , , , |
| Médium: | Journal Article |
| Jazyk: | angličtina |
| Vydáno: |
Washington
IEEE
01.05.2018
IEEE Computer Society |
| Témata: | |
| ISSN: | 1545-5971, 1941-0018 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | Storage services allow data owners to store their huge amount of potentially sensitive data, such as audios, images, and videos, on remote cloud servers in encrypted form. To enable retrieval of encrypted files of interest, searchable symmetric encryption (SSE) schemes have been proposed. However, many schemes construct indexes based on keyword-file pairs and focus on boolean expressions of exact keyword matches. Moreover, most dynamic SSE schemes cannot achieve forward privacy and reveal unnecessary information when updating the encrypted databases. We tackle the challenge of supporting large-scale similarity search over encrypted feature-rich multimedia data, by considering the search criteria as a high-dimensional feature vector instead of a keyword. Our solutions are built on carefully-designed fuzzy Bloom filters which utilize locality sensitive hashing (LSH) to encode an index associating the file identifiers and feature vectors. Our schemes are proven to be secure against adaptively chosen query attack and forward private in the standard model. We have evaluated the performance of our scheme on real-world high-dimensional datasets, and achieved a search quality of 99 percent recall with only a few number of hash tables for LSH. This shows that our index is compact and searching is not only efficient but also accurate. |
|---|---|
| AbstractList | Storage services allow data owners to store their huge amount of potentially sensitive data, such as audios, images, and videos, on remote cloud servers in encrypted form. To enable retrieval of encrypted files of interest, searchable symmetric encryption (SSE) schemes have been proposed. However, many schemes construct indexes based on keyword-file pairs and focus on boolean expressions of exact keyword matches. Moreover, most dynamic SSE schemes cannot achieve forward privacy and reveal unnecessary information when updating the encrypted databases. We tackle the challenge of supporting large-scale similarity search over encrypted feature-rich multimedia data, by considering the search criteria as a high-dimensional feature vector instead of a keyword. Our solutions are built on carefully-designed fuzzy Bloom filters which utilize locality sensitive hashing (LSH) to encode an index associating the file identifiers and feature vectors. Our schemes are proven to be secure against adaptively chosen query attack and forward private in the standard model. We have evaluated the performance of our scheme on real-world high-dimensional datasets, and achieved a search quality of 99 percent recall with only a few number of hash tables for LSH. This shows that our index is compact and searching is not only efficient but also accurate. |
| Author | Wang, Qian Zou, Qin Du, Minxin He, Meiqi Chow, Sherman S. M. Lai, Russell W. F. |
| Author_xml | – sequence: 1 givenname: Qian orcidid: 0000-0002-8967-8525 surname: Wang fullname: Wang, Qian email: qianwang@whu.edu.cn organization: State Key Lab of Software Engineering, School of Computer Science, Wuhan University, Wuhan, Hubei, China – sequence: 2 givenname: Meiqi surname: He fullname: He, Meiqi email: mqhe@hku.hk organization: Department of Computer Science, The University of Hong Kong, Hong Kong – sequence: 3 givenname: Minxin orcidid: 0000-0001-6620-6923 surname: Du fullname: Du, Minxin email: duminxin@whu.edu.cn organization: State Key Lab of Software Engineering, School of Computer Science, Wuhan University, Wuhan, Hubei, China – sequence: 4 givenname: Sherman S. M. surname: Chow fullname: Chow, Sherman S. M. email: sherman@ie.cuhk.edu.hk organization: Department of Information Engineering, Chinese University of Hong Kong, Hong Kong – sequence: 5 givenname: Russell W. F. surname: Lai fullname: Lai, Russell W. F. email: wflai@ie.cuhk.edu.hk organization: Department of Information Engineering, Chinese University of Hong Kong, Hong Kong – sequence: 6 givenname: Qin surname: Zou fullname: Zou, Qin email: qzou@whu.edu.cn organization: State Key Lab of Software Engineering, School of Computer Science, Wuhan University, Wuhan, Hubei, China |
| BookMark | eNp9kMtKAzEUhoNUsK0-gLgZcOvUnFwmyVJ6UaEg2LoOmSRDp9SZmkmFvr0ZWly4cHVu_3fO4R-hQdM2HqFbwBMArB7Xs9V0QjAUE8IVZYxdoCEoBjnGIAcp54znXAm4QqOu22JMmFRsiB5W3gS7MeXOZ_PGhuM-1m2Ttd8-ZAtv4iH4_L22m2xmorlGl5XZdf7mHMfoYzFfT1_y5dvz6_RpmVuiaMydqXDBbUlcUblSpEoAKx12RAlqpHCSuTR0pFAk9bw0noB0lSxJaQkt6Bjdn_buQ_t18F3U2_YQmnRSExCMUwGqV4mTyoa264KvtK2j6d-PwdQ7DVj31ujeGt1bo8_WJBL-kPtQf5pw_Je5OzG19_5XL3j6B3P6A9oHcBs |
| CODEN | ITDSCM |
| CitedBy_id | crossref_primary_10_1016_j_ins_2022_05_095 crossref_primary_10_1109_JSYST_2021_3090465 crossref_primary_10_1016_j_procs_2023_01_079 crossref_primary_10_1109_TDSC_2019_2894411 crossref_primary_10_1109_TSC_2024_3357358 crossref_primary_10_1109_TVLSI_2020_3010585 crossref_primary_10_1155_2019_5280806 crossref_primary_10_1093_comjnl_bxac139 crossref_primary_10_1109_TDSC_2018_2877332 crossref_primary_10_3390_electronics12183965 crossref_primary_10_1109_TDSC_2019_2916569 crossref_primary_10_1016_j_jksuci_2022_12_003 crossref_primary_10_1007_s11280_019_00774_x crossref_primary_10_1109_TDSC_2018_2864748 crossref_primary_10_1109_TDSC_2019_2937783 crossref_primary_10_1109_JPROC_2021_3127277 crossref_primary_10_1109_ACCESS_2020_2972975 crossref_primary_10_1109_MNET_2017_1600240 crossref_primary_10_1109_TSC_2020_3020688 crossref_primary_10_1155_2022_9780188 crossref_primary_10_1109_JSYST_2022_3183153 crossref_primary_10_1016_j_comcom_2021_05_009 crossref_primary_10_1109_TETC_2017_2776402 crossref_primary_10_1002_dac_3288 crossref_primary_10_1016_j_future_2018_08_017 crossref_primary_10_1109_TPDS_2020_3030063 crossref_primary_10_1109_JSYST_2020_2997932 crossref_primary_10_1016_j_jpdc_2019_08_007 crossref_primary_10_1109_TBDATA_2018_2881441 crossref_primary_10_1002_int_22884 crossref_primary_10_1016_j_cose_2020_102021 crossref_primary_10_1109_TCC_2020_3000233 crossref_primary_10_1109_TDSC_2024_3355223 crossref_primary_10_1109_JIOT_2023_3288131 crossref_primary_10_1109_TCC_2020_2989296 crossref_primary_10_1109_TDSC_2020_2968425 crossref_primary_10_1109_TKDE_2020_3024883 crossref_primary_10_1109_TMC_2024_3482321 crossref_primary_10_1016_j_jisa_2019_06_011 crossref_primary_10_1109_TIFS_2024_3413630 crossref_primary_10_1109_TII_2021_3064691 crossref_primary_10_1016_j_iot_2020_100180 crossref_primary_10_1093_comjnl_bxy134 crossref_primary_10_1109_TMM_2016_2619912 crossref_primary_10_1109_TMC_2018_2811481 crossref_primary_10_1109_TNET_2019_2903879 crossref_primary_10_1007_s11227_021_03967_2 crossref_primary_10_1109_TIFS_2017_2721221 crossref_primary_10_1109_TDSC_2016_2599873 crossref_primary_10_1109_TPDS_2021_3058165 crossref_primary_10_1109_TIFS_2018_2818651 crossref_primary_10_1109_ACCESS_2018_2889782 crossref_primary_10_1007_s41870_020_00582_x crossref_primary_10_1109_TIFS_2017_2730365 crossref_primary_10_1109_TPDS_2018_2885519 crossref_primary_10_1016_j_jpdc_2019_08_011 crossref_primary_10_1155_2021_6617959 crossref_primary_10_1109_ACCESS_2019_2957497 crossref_primary_10_1109_TDSC_2019_2957091 crossref_primary_10_1109_TMC_2016_2604820 crossref_primary_10_1109_TIFS_2018_2868162 crossref_primary_10_1109_TPDS_2018_2808283 crossref_primary_10_1016_j_sysarc_2024_103221 crossref_primary_10_1109_TCC_2021_3092358 crossref_primary_10_1109_JIOT_2024_3464760 crossref_primary_10_1007_s10586_024_04635_9 crossref_primary_10_1109_TDSC_2023_3241164 crossref_primary_10_1016_j_jisa_2019_102361 crossref_primary_10_1109_TDSC_2021_3095933 crossref_primary_10_1016_j_ins_2019_07_078 crossref_primary_10_1109_TIFS_2017_2758746 crossref_primary_10_1109_ACCESS_2019_2941560 crossref_primary_10_1109_TIFS_2018_2883275 crossref_primary_10_1109_TMC_2018_2875910 crossref_primary_10_1080_09540091_2021_2023097 crossref_primary_10_1016_j_eswa_2021_116070 crossref_primary_10_1109_ACCESS_2017_2676008 crossref_primary_10_1016_j_sysarc_2023_102856 crossref_primary_10_3390_math11061546 crossref_primary_10_1109_TIFS_2021_3109459 crossref_primary_10_1109_TBDATA_2017_2705048 crossref_primary_10_1109_TDSC_2020_2970928 crossref_primary_10_1016_j_sigpro_2021_108019 crossref_primary_10_1109_TIFS_2024_3486002 crossref_primary_10_1109_ACCESS_2020_3001014 crossref_primary_10_1109_JIOT_2023_3288119 crossref_primary_10_1007_s11227_019_03087_y crossref_primary_10_1109_JIOT_2020_3029472 crossref_primary_10_1109_TIFS_2018_2850330 crossref_primary_10_1109_JIOT_2020_2993231 crossref_primary_10_1109_TIFS_2018_2819128 crossref_primary_10_1109_TSC_2019_2897096 crossref_primary_10_1007_s11704_021_0277_0 crossref_primary_10_1093_comjnl_bxy075 crossref_primary_10_1109_TDSC_2019_2922403 crossref_primary_10_1109_TCC_2020_3034232 |
| Cites_doi | 10.14722/ndss.2014.23298 10.1109/TPDS.2015.2401003 10.1007/3-540-48910-X_16 10.1109/TSC.2015.2481880 10.1109/INFCOM.2013.6567073 10.1145/2382196.2382298 10.1145/2484313.2484347 10.1109/ICDE.2012.23 10.1109/ICTEL.2013.6632121 10.4086/toc.2012.v008a014 10.1145/997817.997857 10.1109/TIP.2016.2568460 10.1145/1559845.1559862 10.1007/978-3-540-70936-7_29 10.1007/978-3-642-17373-8_33 10.1109/INFOCOM.2014.6848153 10.1201/9781420010756 10.1007/s10791-007-9039-3 10.1007/978-3-642-40041-4_20 10.1145/1459359.1459388 10.1109/BigData.Congress.2014.66 10.1109/ICCV.2009.5459466 10.1145/1031171.1031213 10.1109/TPAMI.2003.1195989 10.1007/978-3-540-24852-1_3 10.1109/ICDCS.2015.104 10.3233/JCS-2011-0426 |
| ContentType | Journal Article |
| Copyright | Copyright IEEE Computer Society 2018 |
| Copyright_xml | – notice: Copyright IEEE Computer Society 2018 |
| DBID | 97E RIA RIE AAYXX CITATION JQ2 |
| DOI | 10.1109/TDSC.2016.2593444 |
| DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef ProQuest Computer Science Collection |
| DatabaseTitle | CrossRef ProQuest Computer Science Collection |
| DatabaseTitleList | ProQuest Computer Science Collection |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 1941-0018 |
| EndPage | 510 |
| ExternalDocumentID | 10_1109_TDSC_2016_2593444 7517405 |
| Genre | orig-research |
| GrantInformation_xml | – fundername: Fundamental Research Funds for the Central Universities grantid: 2042016kf0137 – fundername: National Basic Research Program of China grantid: 2014CB340600 – fundername: Huawei Innovation Research Program (HIRP) 2015 grantid: YB2015110147 – fundername: Early Career Award from Research Grants Council, Hong Kong – fundername: General Research Fund grantid: 14201914 – fundername: National Natural Science Foundation of China grantid: 61373167 funderid: 10.13039/501100001809 |
| GroupedDBID | .4S .DC 0R~ 29I 4.4 5GY 5VS 6IK 7WY 8FE 8FG 8FL 8R4 8R5 97E AAJGR AARMG AASAJ AAWTH ABAZT ABJCF ABQJQ ABUWG ABVLG ACGFO ACIWK AENEX AETIX AFKRA AGQYO AGSQL AHBIQ AIBXA AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ARAPS ARCSS ATWAV AZQEC BEFXN BENPR BEZIV BFFAM BGLVJ BGNUA BKEBE BPEOZ BPHCQ CCPQU CS3 DU5 DWQXO EBS EDO EJD FRNLG GNUQQ HCIFZ HZ~ IEDLZ IFIPE IPLJI ITG ITH JAVBF K60 K6V K6~ K7- L6V LAI M0C M43 M7S O9- OCL P2P P62 PHGZM PHGZT PQBIZ PQBZA PQGLB PQQKQ PROAC PTHSS PUEGO Q2X RIA RIE RNI RNS RZB AAYXX CITATION JQ2 |
| ID | FETCH-LOGICAL-c293t-daf065cb2d6fdb7af0714bd0d2973a87d84db2dd2692d29e8ae218df8b2bc2363 |
| IEDL.DBID | RIE |
| ISICitedReferencesCount | 139 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000432024700010&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1545-5971 |
| IngestDate | Thu Sep 25 00:43:16 EDT 2025 Tue Nov 18 22:27:55 EST 2025 Sat Nov 29 03:48:42 EST 2025 Wed Aug 27 08:31:53 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | true |
| Issue | 3 |
| Language | English |
| License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c293t-daf065cb2d6fdb7af0714bd0d2973a87d84db2dd2692d29e8ae218df8b2bc2363 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0001-6620-6923 0000-0002-8967-8525 |
| PQID | 2174537196 |
| PQPubID | 27603 |
| PageCount | 15 |
| ParticipantIDs | proquest_journals_2174537196 crossref_citationtrail_10_1109_TDSC_2016_2593444 crossref_primary_10_1109_TDSC_2016_2593444 ieee_primary_7517405 |
| PublicationCentury | 2000 |
| PublicationDate | 2018-05-01 |
| PublicationDateYYYYMMDD | 2018-05-01 |
| PublicationDate_xml | – month: 05 year: 2018 text: 2018-05-01 day: 01 |
| PublicationDecade | 2010 |
| PublicationPlace | Washington |
| PublicationPlace_xml | – name: Washington |
| PublicationTitle | IEEE transactions on dependable and secure computing |
| PublicationTitleAbbrev | TDSC |
| PublicationYear | 2018 |
| Publisher | IEEE IEEE Computer Society |
| Publisher_xml | – name: IEEE – name: IEEE Computer Society |
| References | ref13 ref12 weber (ref15) 0 ref14 ref31 ref30 ref11 ref2 ref1 ref17 ref16 katz (ref27) 2007 ref19 ref18 ref24 ref23 ref26 ref25 lv (ref20) 0 ref22 ref21 kamara (ref10) 0 ref28 ref29 ref8 ref7 ref4 ref3 ref6 ref5 song (ref9) 0 |
| References_xml | – ident: ref11 doi: 10.14722/ndss.2014.23298 – ident: ref8 doi: 10.1109/TPDS.2015.2401003 – ident: ref28 doi: 10.1007/3-540-48910-X_16 – ident: ref7 doi: 10.1109/TSC.2015.2481880 – ident: ref21 doi: 10.1109/INFCOM.2013.6567073 – ident: ref2 doi: 10.1145/2382196.2382298 – ident: ref14 doi: 10.1145/2484313.2484347 – ident: ref18 doi: 10.1109/ICDE.2012.23 – ident: ref22 doi: 10.1109/ICTEL.2013.6632121 – ident: ref26 doi: 10.4086/toc.2012.v008a014 – ident: ref29 doi: 10.1145/997817.997857 – ident: ref6 doi: 10.1109/TIP.2016.2568460 – ident: ref24 doi: 10.1145/1559845.1559862 – ident: ref13 doi: 10.1007/978-3-540-70936-7_29 – ident: ref4 doi: 10.1007/978-3-642-17373-8_33 – ident: ref23 doi: 10.1109/INFOCOM.2014.6848153 – year: 2007 ident: ref27 publication-title: Introduction to Modern Cryptography Principles and Protocols doi: 10.1201/9781420010756 – ident: ref25 doi: 10.1007/s10791-007-9039-3 – start-page: 44 year: 0 ident: ref9 article-title: Practical techniques for searches on encrypted data publication-title: Proc IEEE Symp Secur Privacy – start-page: 194 year: 0 ident: ref15 article-title: A quantitative analysis and performance study for similarity-search methods in high-dimensional spaces publication-title: Proc 24th Int Conf Very Large Data Bases – ident: ref3 doi: 10.1007/978-3-642-40041-4_20 – ident: ref30 doi: 10.1145/1459359.1459388 – ident: ref17 doi: 10.1109/BigData.Congress.2014.66 – ident: ref31 doi: 10.1109/ICCV.2009.5459466 – ident: ref16 doi: 10.1145/1031171.1031213 – start-page: 950 year: 0 ident: ref20 article-title: Multi-probe LSH: Efficient indexing for high-dimensional similarity search publication-title: Proc Int Conf On Very Large Data Bases – ident: ref19 doi: 10.1109/TPAMI.2003.1195989 – ident: ref12 doi: 10.1007/978-3-540-24852-1_3 – ident: ref5 doi: 10.1109/ICDCS.2015.104 – start-page: 258 year: 0 ident: ref10 article-title: Parallel and dynamic searchable symmetric encryption publication-title: Proc 18th Int Conf Financial Cryptogr Data Secur – ident: ref1 doi: 10.3233/JCS-2011-0426 |
| SSID | ssj0024894 |
| Score | 2.525704 |
| Snippet | Storage services allow data owners to store their huge amount of potentially sensitive data, such as audios, images, and videos, on remote cloud servers in... |
| SourceID | proquest crossref ieee |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 496 |
| SubjectTerms | Boolean algebra Cloud storage Cybersecurity Data encryption Data storage Encryption homomorphic encryption Indexes Keywords Multimedia Multimedia communication Performance indices proximity search searchable encryption Searching Servers similarity search Sound filters |
| Title | Searchable Encryption over Feature-Rich Data |
| URI | https://ieeexplore.ieee.org/document/7517405 https://www.proquest.com/docview/2174537196 |
| Volume | 15 |
| WOSCitedRecordID | wos000432024700010&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVIEE databaseName: IEEE Electronic Library (IEL) customDbUrl: eissn: 1941-0018 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0024894 issn: 1545-5971 databaseCode: RIE dateStart: 20040101 isFulltext: true titleUrlDefault: https://ieeexplore.ieee.org/ providerName: IEEE |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3dS8MwED_m8MEXp05xOqUPPsmytWnWpI-yD3yQIThhbyVNUhBkk64T_O_NpdlEFMGX0o8klN81d5fm7ncANwVNUjWkkogi1IRZi0vyIimITmM9tAcptSNxfeCzmVgs0scG9Ha5MMYYF3xm-njq9vL1Sm3wV9mAI60yEpbucZ7UuVpfvHrCFT1Ej4BYJznyO5hRmA7m46cRBnElfevrx4yxbzbIFVX5oYmdeZm2_vdiR3Do3cjgrpb7MTTM8gRa2xINgZ-xbejV4cSYHxVMlqr8cBoiwLjNAL2_TWkI5tYHY1nJU3ieTuaje-ILJBBlrXRFtCysB6FyqpNC59xe8YjlOtRYkEoKrgXT9qG28qD2nhHSWIuuC5HTXNE4ic-guVwtzTkEXEnG7QgKs-NFblUPNalhNDKJliIPOxBuIcuUZw_HIhavmVtFhGmGKGeIcuZR7sDtrstbTZ3xV-M2wrpr6BHtQHcrl8xPrnWGq6hhzK3uuPi91yUc2LFFHZfYhWZVbswV7Kv36mVdXrvv5hOa0r8k |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3fS8MwED7GFPTFqVOcTu2DT7JsbZq26aNsjolzCE7YW0mTFATpZOsE_3tzaTcRRfCl9EfSlktz911zdx_AVUbDWAZUEJ65ijBjcUmahRlRsa8CsxFC2SKu42gy4bNZ_FiDziYXRmttg890F3ftWr6ayxX-KutFWFYZC5ZuBcz4PWW21ldlPW5pDxETEAOTvWoN03Pj3nTw1McwrrBr0L7PGPtmhSytyg9dbA3MsPG_V9uHvQpIOjflyB9ATeeH0FiTNDjVnG1Cpwwoxgwp5zaXiw-rIxyM3HQQ_60WmmB2vTMQhTiC5-HttD8iFUUCkcZOF0SJzGAImVIVZiqNzFHksVS5CimpBI8UZ8pcVGZEqDmnudDGpquMpzSV1A_9Y6jn81yfgBNJwSJzB4n58Tw1yofqWDPq6VAJnrotcNciS2RVPxxpLF4T60e4cYJSTlDKSSXlFlxvuryVxTP-atxEsW4aVhJtQXs9Lkk1vZYJ-lGBHxntcfp7r0vYGU0fxsn4bnJ_BrvmObyMUmxDvVis9Dlsy_fiZbm4sN_QJ7pMwms |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Searchable+Encryption+over+Feature-Rich+Data&rft.jtitle=IEEE+transactions+on+dependable+and+secure+computing&rft.au=Wang%2C+Qian&rft.au=He%2C+Meiqi&rft.au=Du%2C+Minxin&rft.au=Chow%2C+Sherman+S.+M.&rft.date=2018-05-01&rft.issn=1545-5971&rft.volume=15&rft.issue=3&rft.spage=496&rft.epage=510&rft_id=info:doi/10.1109%2FTDSC.2016.2593444&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_TDSC_2016_2593444 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1545-5971&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1545-5971&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1545-5971&client=summon |