Searchable Encryption over Feature-Rich Data

Storage services allow data owners to store their huge amount of potentially sensitive data, such as audios, images, and videos, on remote cloud servers in encrypted form. To enable retrieval of encrypted files of interest, searchable symmetric encryption (SSE) schemes have been proposed. However, m...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:IEEE transactions on dependable and secure computing Ročník 15; číslo 3; s. 496 - 510
Hlavní autoři: Wang, Qian, He, Meiqi, Du, Minxin, Chow, Sherman S. M., Lai, Russell W. F., Zou, Qin
Médium: Journal Article
Jazyk:angličtina
Vydáno: Washington IEEE 01.05.2018
IEEE Computer Society
Témata:
ISSN:1545-5971, 1941-0018
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract Storage services allow data owners to store their huge amount of potentially sensitive data, such as audios, images, and videos, on remote cloud servers in encrypted form. To enable retrieval of encrypted files of interest, searchable symmetric encryption (SSE) schemes have been proposed. However, many schemes construct indexes based on keyword-file pairs and focus on boolean expressions of exact keyword matches. Moreover, most dynamic SSE schemes cannot achieve forward privacy and reveal unnecessary information when updating the encrypted databases. We tackle the challenge of supporting large-scale similarity search over encrypted feature-rich multimedia data, by considering the search criteria as a high-dimensional feature vector instead of a keyword. Our solutions are built on carefully-designed fuzzy Bloom filters which utilize locality sensitive hashing (LSH) to encode an index associating the file identifiers and feature vectors. Our schemes are proven to be secure against adaptively chosen query attack and forward private in the standard model. We have evaluated the performance of our scheme on real-world high-dimensional datasets, and achieved a search quality of 99 percent recall with only a few number of hash tables for LSH. This shows that our index is compact and searching is not only efficient but also accurate.
AbstractList Storage services allow data owners to store their huge amount of potentially sensitive data, such as audios, images, and videos, on remote cloud servers in encrypted form. To enable retrieval of encrypted files of interest, searchable symmetric encryption (SSE) schemes have been proposed. However, many schemes construct indexes based on keyword-file pairs and focus on boolean expressions of exact keyword matches. Moreover, most dynamic SSE schemes cannot achieve forward privacy and reveal unnecessary information when updating the encrypted databases. We tackle the challenge of supporting large-scale similarity search over encrypted feature-rich multimedia data, by considering the search criteria as a high-dimensional feature vector instead of a keyword. Our solutions are built on carefully-designed fuzzy Bloom filters which utilize locality sensitive hashing (LSH) to encode an index associating the file identifiers and feature vectors. Our schemes are proven to be secure against adaptively chosen query attack and forward private in the standard model. We have evaluated the performance of our scheme on real-world high-dimensional datasets, and achieved a search quality of 99 percent recall with only a few number of hash tables for LSH. This shows that our index is compact and searching is not only efficient but also accurate.
Author Wang, Qian
Zou, Qin
Du, Minxin
He, Meiqi
Chow, Sherman S. M.
Lai, Russell W. F.
Author_xml – sequence: 1
  givenname: Qian
  orcidid: 0000-0002-8967-8525
  surname: Wang
  fullname: Wang, Qian
  email: qianwang@whu.edu.cn
  organization: State Key Lab of Software Engineering, School of Computer Science, Wuhan University, Wuhan, Hubei, China
– sequence: 2
  givenname: Meiqi
  surname: He
  fullname: He, Meiqi
  email: mqhe@hku.hk
  organization: Department of Computer Science, The University of Hong Kong, Hong Kong
– sequence: 3
  givenname: Minxin
  orcidid: 0000-0001-6620-6923
  surname: Du
  fullname: Du, Minxin
  email: duminxin@whu.edu.cn
  organization: State Key Lab of Software Engineering, School of Computer Science, Wuhan University, Wuhan, Hubei, China
– sequence: 4
  givenname: Sherman S. M.
  surname: Chow
  fullname: Chow, Sherman S. M.
  email: sherman@ie.cuhk.edu.hk
  organization: Department of Information Engineering, Chinese University of Hong Kong, Hong Kong
– sequence: 5
  givenname: Russell W. F.
  surname: Lai
  fullname: Lai, Russell W. F.
  email: wflai@ie.cuhk.edu.hk
  organization: Department of Information Engineering, Chinese University of Hong Kong, Hong Kong
– sequence: 6
  givenname: Qin
  surname: Zou
  fullname: Zou, Qin
  email: qzou@whu.edu.cn
  organization: State Key Lab of Software Engineering, School of Computer Science, Wuhan University, Wuhan, Hubei, China
BookMark eNp9kMtKAzEUhoNUsK0-gLgZcOvUnFwmyVJ6UaEg2LoOmSRDp9SZmkmFvr0ZWly4cHVu_3fO4R-hQdM2HqFbwBMArB7Xs9V0QjAUE8IVZYxdoCEoBjnGIAcp54znXAm4QqOu22JMmFRsiB5W3gS7MeXOZ_PGhuM-1m2Ttd8-ZAtv4iH4_L22m2xmorlGl5XZdf7mHMfoYzFfT1_y5dvz6_RpmVuiaMydqXDBbUlcUblSpEoAKx12RAlqpHCSuTR0pFAk9bw0noB0lSxJaQkt6Bjdn_buQ_t18F3U2_YQmnRSExCMUwGqV4mTyoa264KvtK2j6d-PwdQ7DVj31ujeGt1bo8_WJBL-kPtQf5pw_Je5OzG19_5XL3j6B3P6A9oHcBs
CODEN ITDSCM
CitedBy_id crossref_primary_10_1016_j_ins_2022_05_095
crossref_primary_10_1109_JSYST_2021_3090465
crossref_primary_10_1016_j_procs_2023_01_079
crossref_primary_10_1109_TDSC_2019_2894411
crossref_primary_10_1109_TSC_2024_3357358
crossref_primary_10_1109_TVLSI_2020_3010585
crossref_primary_10_1155_2019_5280806
crossref_primary_10_1093_comjnl_bxac139
crossref_primary_10_1109_TDSC_2018_2877332
crossref_primary_10_3390_electronics12183965
crossref_primary_10_1109_TDSC_2019_2916569
crossref_primary_10_1016_j_jksuci_2022_12_003
crossref_primary_10_1007_s11280_019_00774_x
crossref_primary_10_1109_TDSC_2018_2864748
crossref_primary_10_1109_TDSC_2019_2937783
crossref_primary_10_1109_JPROC_2021_3127277
crossref_primary_10_1109_ACCESS_2020_2972975
crossref_primary_10_1109_MNET_2017_1600240
crossref_primary_10_1109_TSC_2020_3020688
crossref_primary_10_1155_2022_9780188
crossref_primary_10_1109_JSYST_2022_3183153
crossref_primary_10_1016_j_comcom_2021_05_009
crossref_primary_10_1109_TETC_2017_2776402
crossref_primary_10_1002_dac_3288
crossref_primary_10_1016_j_future_2018_08_017
crossref_primary_10_1109_TPDS_2020_3030063
crossref_primary_10_1109_JSYST_2020_2997932
crossref_primary_10_1016_j_jpdc_2019_08_007
crossref_primary_10_1109_TBDATA_2018_2881441
crossref_primary_10_1002_int_22884
crossref_primary_10_1016_j_cose_2020_102021
crossref_primary_10_1109_TCC_2020_3000233
crossref_primary_10_1109_TDSC_2024_3355223
crossref_primary_10_1109_JIOT_2023_3288131
crossref_primary_10_1109_TCC_2020_2989296
crossref_primary_10_1109_TDSC_2020_2968425
crossref_primary_10_1109_TKDE_2020_3024883
crossref_primary_10_1109_TMC_2024_3482321
crossref_primary_10_1016_j_jisa_2019_06_011
crossref_primary_10_1109_TIFS_2024_3413630
crossref_primary_10_1109_TII_2021_3064691
crossref_primary_10_1016_j_iot_2020_100180
crossref_primary_10_1093_comjnl_bxy134
crossref_primary_10_1109_TMM_2016_2619912
crossref_primary_10_1109_TMC_2018_2811481
crossref_primary_10_1109_TNET_2019_2903879
crossref_primary_10_1007_s11227_021_03967_2
crossref_primary_10_1109_TIFS_2017_2721221
crossref_primary_10_1109_TDSC_2016_2599873
crossref_primary_10_1109_TPDS_2021_3058165
crossref_primary_10_1109_TIFS_2018_2818651
crossref_primary_10_1109_ACCESS_2018_2889782
crossref_primary_10_1007_s41870_020_00582_x
crossref_primary_10_1109_TIFS_2017_2730365
crossref_primary_10_1109_TPDS_2018_2885519
crossref_primary_10_1016_j_jpdc_2019_08_011
crossref_primary_10_1155_2021_6617959
crossref_primary_10_1109_ACCESS_2019_2957497
crossref_primary_10_1109_TDSC_2019_2957091
crossref_primary_10_1109_TMC_2016_2604820
crossref_primary_10_1109_TIFS_2018_2868162
crossref_primary_10_1109_TPDS_2018_2808283
crossref_primary_10_1016_j_sysarc_2024_103221
crossref_primary_10_1109_TCC_2021_3092358
crossref_primary_10_1109_JIOT_2024_3464760
crossref_primary_10_1007_s10586_024_04635_9
crossref_primary_10_1109_TDSC_2023_3241164
crossref_primary_10_1016_j_jisa_2019_102361
crossref_primary_10_1109_TDSC_2021_3095933
crossref_primary_10_1016_j_ins_2019_07_078
crossref_primary_10_1109_TIFS_2017_2758746
crossref_primary_10_1109_ACCESS_2019_2941560
crossref_primary_10_1109_TIFS_2018_2883275
crossref_primary_10_1109_TMC_2018_2875910
crossref_primary_10_1080_09540091_2021_2023097
crossref_primary_10_1016_j_eswa_2021_116070
crossref_primary_10_1109_ACCESS_2017_2676008
crossref_primary_10_1016_j_sysarc_2023_102856
crossref_primary_10_3390_math11061546
crossref_primary_10_1109_TIFS_2021_3109459
crossref_primary_10_1109_TBDATA_2017_2705048
crossref_primary_10_1109_TDSC_2020_2970928
crossref_primary_10_1016_j_sigpro_2021_108019
crossref_primary_10_1109_TIFS_2024_3486002
crossref_primary_10_1109_ACCESS_2020_3001014
crossref_primary_10_1109_JIOT_2023_3288119
crossref_primary_10_1007_s11227_019_03087_y
crossref_primary_10_1109_JIOT_2020_3029472
crossref_primary_10_1109_TIFS_2018_2850330
crossref_primary_10_1109_JIOT_2020_2993231
crossref_primary_10_1109_TIFS_2018_2819128
crossref_primary_10_1109_TSC_2019_2897096
crossref_primary_10_1007_s11704_021_0277_0
crossref_primary_10_1093_comjnl_bxy075
crossref_primary_10_1109_TDSC_2019_2922403
crossref_primary_10_1109_TCC_2020_3034232
Cites_doi 10.14722/ndss.2014.23298
10.1109/TPDS.2015.2401003
10.1007/3-540-48910-X_16
10.1109/TSC.2015.2481880
10.1109/INFCOM.2013.6567073
10.1145/2382196.2382298
10.1145/2484313.2484347
10.1109/ICDE.2012.23
10.1109/ICTEL.2013.6632121
10.4086/toc.2012.v008a014
10.1145/997817.997857
10.1109/TIP.2016.2568460
10.1145/1559845.1559862
10.1007/978-3-540-70936-7_29
10.1007/978-3-642-17373-8_33
10.1109/INFOCOM.2014.6848153
10.1201/9781420010756
10.1007/s10791-007-9039-3
10.1007/978-3-642-40041-4_20
10.1145/1459359.1459388
10.1109/BigData.Congress.2014.66
10.1109/ICCV.2009.5459466
10.1145/1031171.1031213
10.1109/TPAMI.2003.1195989
10.1007/978-3-540-24852-1_3
10.1109/ICDCS.2015.104
10.3233/JCS-2011-0426
ContentType Journal Article
Copyright Copyright IEEE Computer Society 2018
Copyright_xml – notice: Copyright IEEE Computer Society 2018
DBID 97E
RIA
RIE
AAYXX
CITATION
JQ2
DOI 10.1109/TDSC.2016.2593444
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005–Present
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
ProQuest Computer Science Collection
DatabaseTitle CrossRef
ProQuest Computer Science Collection
DatabaseTitleList
ProQuest Computer Science Collection
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1941-0018
EndPage 510
ExternalDocumentID 10_1109_TDSC_2016_2593444
7517405
Genre orig-research
GrantInformation_xml – fundername: Fundamental Research Funds for the Central Universities
  grantid: 2042016kf0137
– fundername: National Basic Research Program of China
  grantid: 2014CB340600
– fundername: Huawei Innovation Research Program (HIRP) 2015
  grantid: YB2015110147
– fundername: Early Career Award from Research Grants Council, Hong Kong
– fundername: General Research Fund
  grantid: 14201914
– fundername: National Natural Science Foundation of China
  grantid: 61373167
  funderid: 10.13039/501100001809
GroupedDBID .4S
.DC
0R~
29I
4.4
5GY
5VS
6IK
7WY
8FE
8FG
8FL
8R4
8R5
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABJCF
ABQJQ
ABUWG
ABVLG
ACGFO
ACIWK
AENEX
AETIX
AFKRA
AGQYO
AGSQL
AHBIQ
AIBXA
AKJIK
AKQYR
ALMA_UNASSIGNED_HOLDINGS
ARAPS
ARCSS
ATWAV
AZQEC
BEFXN
BENPR
BEZIV
BFFAM
BGLVJ
BGNUA
BKEBE
BPEOZ
BPHCQ
CCPQU
CS3
DU5
DWQXO
EBS
EDO
EJD
FRNLG
GNUQQ
HCIFZ
HZ~
IEDLZ
IFIPE
IPLJI
ITG
ITH
JAVBF
K60
K6V
K6~
K7-
L6V
LAI
M0C
M43
M7S
O9-
OCL
P2P
P62
PHGZM
PHGZT
PQBIZ
PQBZA
PQGLB
PQQKQ
PROAC
PTHSS
PUEGO
Q2X
RIA
RIE
RNI
RNS
RZB
AAYXX
CITATION
JQ2
ID FETCH-LOGICAL-c293t-daf065cb2d6fdb7af0714bd0d2973a87d84db2dd2692d29e8ae218df8b2bc2363
IEDL.DBID RIE
ISICitedReferencesCount 139
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000432024700010&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1545-5971
IngestDate Thu Sep 25 00:43:16 EDT 2025
Tue Nov 18 22:27:55 EST 2025
Sat Nov 29 03:48:42 EST 2025
Wed Aug 27 08:31:53 EDT 2025
IsPeerReviewed false
IsScholarly true
Issue 3
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c293t-daf065cb2d6fdb7af0714bd0d2973a87d84db2dd2692d29e8ae218df8b2bc2363
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0001-6620-6923
0000-0002-8967-8525
PQID 2174537196
PQPubID 27603
PageCount 15
ParticipantIDs proquest_journals_2174537196
crossref_citationtrail_10_1109_TDSC_2016_2593444
crossref_primary_10_1109_TDSC_2016_2593444
ieee_primary_7517405
PublicationCentury 2000
PublicationDate 2018-05-01
PublicationDateYYYYMMDD 2018-05-01
PublicationDate_xml – month: 05
  year: 2018
  text: 2018-05-01
  day: 01
PublicationDecade 2010
PublicationPlace Washington
PublicationPlace_xml – name: Washington
PublicationTitle IEEE transactions on dependable and secure computing
PublicationTitleAbbrev TDSC
PublicationYear 2018
Publisher IEEE
IEEE Computer Society
Publisher_xml – name: IEEE
– name: IEEE Computer Society
References ref13
ref12
weber (ref15) 0
ref14
ref31
ref30
ref11
ref2
ref1
ref17
ref16
katz (ref27) 2007
ref19
ref18
ref24
ref23
ref26
ref25
lv (ref20) 0
ref22
ref21
kamara (ref10) 0
ref28
ref29
ref8
ref7
ref4
ref3
ref6
ref5
song (ref9) 0
References_xml – ident: ref11
  doi: 10.14722/ndss.2014.23298
– ident: ref8
  doi: 10.1109/TPDS.2015.2401003
– ident: ref28
  doi: 10.1007/3-540-48910-X_16
– ident: ref7
  doi: 10.1109/TSC.2015.2481880
– ident: ref21
  doi: 10.1109/INFCOM.2013.6567073
– ident: ref2
  doi: 10.1145/2382196.2382298
– ident: ref14
  doi: 10.1145/2484313.2484347
– ident: ref18
  doi: 10.1109/ICDE.2012.23
– ident: ref22
  doi: 10.1109/ICTEL.2013.6632121
– ident: ref26
  doi: 10.4086/toc.2012.v008a014
– ident: ref29
  doi: 10.1145/997817.997857
– ident: ref6
  doi: 10.1109/TIP.2016.2568460
– ident: ref24
  doi: 10.1145/1559845.1559862
– ident: ref13
  doi: 10.1007/978-3-540-70936-7_29
– ident: ref4
  doi: 10.1007/978-3-642-17373-8_33
– ident: ref23
  doi: 10.1109/INFOCOM.2014.6848153
– year: 2007
  ident: ref27
  publication-title: Introduction to Modern Cryptography Principles and Protocols
  doi: 10.1201/9781420010756
– ident: ref25
  doi: 10.1007/s10791-007-9039-3
– start-page: 44
  year: 0
  ident: ref9
  article-title: Practical techniques for searches on encrypted data
  publication-title: Proc IEEE Symp Secur Privacy
– start-page: 194
  year: 0
  ident: ref15
  article-title: A quantitative analysis and performance study for similarity-search methods in high-dimensional spaces
  publication-title: Proc 24th Int Conf Very Large Data Bases
– ident: ref3
  doi: 10.1007/978-3-642-40041-4_20
– ident: ref30
  doi: 10.1145/1459359.1459388
– ident: ref17
  doi: 10.1109/BigData.Congress.2014.66
– ident: ref31
  doi: 10.1109/ICCV.2009.5459466
– ident: ref16
  doi: 10.1145/1031171.1031213
– start-page: 950
  year: 0
  ident: ref20
  article-title: Multi-probe LSH: Efficient indexing for high-dimensional similarity search
  publication-title: Proc Int Conf On Very Large Data Bases
– ident: ref19
  doi: 10.1109/TPAMI.2003.1195989
– ident: ref12
  doi: 10.1007/978-3-540-24852-1_3
– ident: ref5
  doi: 10.1109/ICDCS.2015.104
– start-page: 258
  year: 0
  ident: ref10
  article-title: Parallel and dynamic searchable symmetric encryption
  publication-title: Proc 18th Int Conf Financial Cryptogr Data Secur
– ident: ref1
  doi: 10.3233/JCS-2011-0426
SSID ssj0024894
Score 2.525704
Snippet Storage services allow data owners to store their huge amount of potentially sensitive data, such as audios, images, and videos, on remote cloud servers in...
SourceID proquest
crossref
ieee
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 496
SubjectTerms Boolean algebra
Cloud storage
Cybersecurity
Data encryption
Data storage
Encryption
homomorphic encryption
Indexes
Keywords
Multimedia
Multimedia communication
Performance indices
proximity search
searchable encryption
Searching
Servers
similarity search
Sound filters
Title Searchable Encryption over Feature-Rich Data
URI https://ieeexplore.ieee.org/document/7517405
https://www.proquest.com/docview/2174537196
Volume 15
WOSCitedRecordID wos000432024700010&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVIEE
  databaseName: IEEE Electronic Library (IEL)
  customDbUrl:
  eissn: 1941-0018
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0024894
  issn: 1545-5971
  databaseCode: RIE
  dateStart: 20040101
  isFulltext: true
  titleUrlDefault: https://ieeexplore.ieee.org/
  providerName: IEEE
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3dS8MwED_m8MEXp05xOqUPPsmytWnWpI-yD3yQIThhbyVNUhBkk64T_O_NpdlEFMGX0o8klN81d5fm7ncANwVNUjWkkogi1IRZi0vyIimITmM9tAcptSNxfeCzmVgs0scG9Ha5MMYYF3xm-njq9vL1Sm3wV9mAI60yEpbucZ7UuVpfvHrCFT1Ej4BYJznyO5hRmA7m46cRBnElfevrx4yxbzbIFVX5oYmdeZm2_vdiR3Do3cjgrpb7MTTM8gRa2xINgZ-xbejV4cSYHxVMlqr8cBoiwLjNAL2_TWkI5tYHY1nJU3ieTuaje-ILJBBlrXRFtCysB6FyqpNC59xe8YjlOtRYkEoKrgXT9qG28qD2nhHSWIuuC5HTXNE4ic-guVwtzTkEXEnG7QgKs-NFblUPNalhNDKJliIPOxBuIcuUZw_HIhavmVtFhGmGKGeIcuZR7sDtrstbTZ3xV-M2wrpr6BHtQHcrl8xPrnWGq6hhzK3uuPi91yUc2LFFHZfYhWZVbswV7Kv36mVdXrvv5hOa0r8k
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3fS8MwED7GFPTFqVOcTu2DT7JsbZq26aNsjolzCE7YW0mTFATpZOsE_3tzaTcRRfCl9EfSlktz911zdx_AVUbDWAZUEJ65ijBjcUmahRlRsa8CsxFC2SKu42gy4bNZ_FiDziYXRmttg890F3ftWr6ayxX-KutFWFYZC5ZuBcz4PWW21ldlPW5pDxETEAOTvWoN03Pj3nTw1McwrrBr0L7PGPtmhSytyg9dbA3MsPG_V9uHvQpIOjflyB9ATeeH0FiTNDjVnG1Cpwwoxgwp5zaXiw-rIxyM3HQQ_60WmmB2vTMQhTiC5-HttD8iFUUCkcZOF0SJzGAImVIVZiqNzFHksVS5CimpBI8UZ8pcVGZEqDmnudDGpquMpzSV1A_9Y6jn81yfgBNJwSJzB4n58Tw1yofqWDPq6VAJnrotcNciS2RVPxxpLF4T60e4cYJSTlDKSSXlFlxvuryVxTP-atxEsW4aVhJtQXs9Lkk1vZYJ-lGBHxntcfp7r0vYGU0fxsn4bnJ_BrvmObyMUmxDvVis9Dlsy_fiZbm4sN_QJ7pMwms
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Searchable+Encryption+over+Feature-Rich+Data&rft.jtitle=IEEE+transactions+on+dependable+and+secure+computing&rft.au=Wang%2C+Qian&rft.au=He%2C+Meiqi&rft.au=Du%2C+Minxin&rft.au=Chow%2C+Sherman+S.+M.&rft.date=2018-05-01&rft.issn=1545-5971&rft.volume=15&rft.issue=3&rft.spage=496&rft.epage=510&rft_id=info:doi/10.1109%2FTDSC.2016.2593444&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_TDSC_2016_2593444
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1545-5971&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1545-5971&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1545-5971&client=summon