Towards efficient Secure Boolean Range Query over encrypted spatial data
Uloženo v:
| Vydáno v: | Computers & security Ročník 136; s. 103544 |
|---|---|
| Hlavní autoři: | , , , |
| Médium: | Journal Article |
| Jazyk: | angličtina |
| Vydáno: |
01.01.2024
|
| ISSN: | 0167-4048 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| ArticleNumber | 103544 |
|---|---|
| Author | Ge, Xinrui Hao, Rong Zhao, Xuan Yu, Jia |
| Author_xml | – sequence: 1 givenname: Xuan surname: Zhao fullname: Zhao, Xuan – sequence: 2 givenname: Jia surname: Yu fullname: Yu, Jia – sequence: 3 givenname: Xinrui orcidid: 0000-0003-0274-9691 surname: Ge fullname: Ge, Xinrui – sequence: 4 givenname: Rong surname: Hao fullname: Hao, Rong |
| BookMark | eNp9kMFKAzEURbOoYFv9AVf5galvJjNJZqlFrVAQta6H9OVFpoxJSVKlf-8UXblw9eA-zuVyZmzigyfGrkpYlFDK690CQ6JFBZUYA9HU9YRNx4cqaqj1OZultAMoldR6ylab8GWiTZyc67Enn_kr4SESvw1hIOP5i_HvxJ8PFI88fFLk5DEe95ksT3uTezNwa7K5YGfODIkuf--cvd3fbZarYv308Li8WRcoAHKBrUAtCLRFrQC320o11rQgEGxllG1qXQJKCdI5KavGKVRYKykqrZHaVsyZ_unFGFKK5Drs8zgj-BxNP3QldCcL3a47WehOFrofCyNa_UH3sf8w8fgf9A1AoWYx |
| CitedBy_id | crossref_primary_10_1109_TIFS_2024_3465928 crossref_primary_10_1109_ACCESS_2024_3522584 crossref_primary_10_1109_TIFS_2025_3598430 |
| Cites_doi | 10.1007/BF00288933 10.1109/TIFS.2021.3118880 10.1109/TIFS.2018.2868162 10.1145/362686.362692 10.1145/1496091.1496100 10.1109/TKDE.2010.149 10.1109/TKDE.2016.2530060 10.1007/s10707-019-00373-y 10.14778/1687627.1687666 |
| ContentType | Journal Article |
| DBID | AAYXX CITATION |
| DOI | 10.1016/j.cose.2023.103544 |
| DatabaseName | CrossRef |
| DatabaseTitle | CrossRef |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| ExternalDocumentID | 10_1016_j_cose_2023_103544 |
| GroupedDBID | --K --M -~X .DC .~1 0R~ 1B1 1RT 1~. 1~5 29F 4.4 457 4G. 5GY 5VS 7-5 71M 8P~ 9DU 9JN AAEDT AAEDW AAIKJ AAKOC AALRI AAOAW AAQFI AAQXK AATTM AAXKI AAXUO AAYFN AAYWO AAYXX ABBOA ABFSI ABJNI ABMAC ABWVN ABXDB ACDAQ ACGFO ACGFS ACLOT ACNNM ACRLP ACRPL ACVFH ACZNC ADBBV ADCNI ADEZE ADHUB ADJOM ADMUD ADNMO AEBSH AEIPS AEKER AENEX AEUPX AFFNX AFJKZ AFPUW AFTJW AGHFR AGQPQ AGUBO AGYEJ AHHHB AHZHX AIALX AIEXJ AIGII AIIUN AIKHN AITUG AKBMS AKRWK AKYEP ALMA_UNASSIGNED_HOLDINGS AMRAJ ANKPU AOUOD APXCP ASPBG AVWKF AXJTR AZFZN BKOJK BKOMP BLXMC CITATION CS3 DU5 E.L EBS EFJIC EFKBS EFLBG EJD EO8 EO9 EP2 EP3 FDB FEDTE FGOYB FIRID FNPLU FYGXN G-2 G-Q GBLVA GBOLZ HLX HLZ HVGLF HZ~ IHE J1W KOM LG8 LG9 M41 MO0 MS~ N9A O-L O9- OAUVE OZT P-8 P-9 P2P PC. PQQKQ Q38 R2- RNS ROL RPZ RXW SBC SBM SDF SDG SDP SES SEW SPC SPCBC SSV SSZ T5K TAE TN5 TWZ WH7 WUQ XJE XPP XSW YK3 ZMT ~G- ~HD |
| ID | FETCH-LOGICAL-c300t-c93c83e08dc870cbb275da903c0d2a7d54810c6606ff6625f7c7c4763288ce993 |
| ISICitedReferencesCount | 4 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001102097800001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 0167-4048 |
| IngestDate | Sat Nov 29 07:25:32 EST 2025 Tue Nov 18 21:49:54 EST 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-c300t-c93c83e08dc870cbb275da903c0d2a7d54810c6606ff6625f7c7c4763288ce993 |
| ORCID | 0000-0003-0274-9691 |
| ParticipantIDs | crossref_citationtrail_10_1016_j_cose_2023_103544 crossref_primary_10_1016_j_cose_2023_103544 |
| PublicationCentury | 2000 |
| PublicationDate | 2024-01-00 |
| PublicationDateYYYYMMDD | 2024-01-01 |
| PublicationDate_xml | – month: 01 year: 2024 text: 2024-01-00 |
| PublicationDecade | 2020 |
| PublicationTitle | Computers & security |
| PublicationYear | 2024 |
| References | 10.1016/j.cose.2023.103544_br0250 Wong (10.1016/j.cose.2023.103544_br0060) 2009 Lai (10.1016/j.cose.2023.103544_br0210) 2018 Bloom (10.1016/j.cose.2023.103544_br0180) 1970; 13 Finkel (10.1016/j.cose.2023.103544_br0050) 1974; 4 Katz (10.1016/j.cose.2023.103544_br0270) 2007 Canetti (10.1016/j.cose.2023.103544_br0260) 1996 Shen (10.1016/j.cose.2023.103544_br0070) 2009 Vaquero (10.1016/j.cose.2023.103544_br0300) 2009; 39 De Felipe (10.1016/j.cose.2023.103544_br0100) 2008 Cui (10.1016/j.cose.2023.103544_br0020) 2019 Rocha-Junior (10.1016/j.cose.2023.103544_br0140) 2011 Cong (10.1016/j.cose.2023.103544_br0110) 2009; 2 Xu (10.1016/j.cose.2023.103544_br0290) 2019; 14 Zhou (10.1016/j.cose.2023.103544_br0090) 2005 Li (10.1016/j.cose.2023.103544_br0120) 2010; 23 Tao (10.1016/j.cose.2023.103544_br0130) 2013; 26 Chen (10.1016/j.cose.2023.103544_br0010) 2020; 24 Sagan (10.1016/j.cose.2023.103544_br0040) 2012 Tong (10.1016/j.cose.2023.103544_br0170) 2021 Zhang (10.1016/j.cose.2023.103544_br0150) 2016; 28 Wang (10.1016/j.cose.2023.103544_br0190) 2021 Song (10.1016/j.cose.2023.103544_br0280) 2021; 9 Canetti (10.1016/j.cose.2023.103544_br0080) 2003 Wang (10.1016/j.cose.2023.103544_br0200) 2020 Su (10.1016/j.cose.2023.103544_br0160) 2015; 11 Wang (10.1016/j.cose.2023.103544_br0220) 2021; 16 Iovino (10.1016/j.cose.2023.103544_br0230) 2008 Gong (10.1016/j.cose.2023.103544_br0240) 2022 |
| References_xml | – volume: 4 start-page: 1 issue: 1 year: 1974 ident: 10.1016/j.cose.2023.103544_br0050 article-title: Quad trees a data structure for retrieval on composite keys publication-title: Acta Inform. doi: 10.1007/BF00288933 – volume: 16 start-page: 4909 year: 2021 ident: 10.1016/j.cose.2023.103544_br0220 article-title: Enabling efficient spatial keyword queries on encrypted data with strong security guarantees publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2021.3118880 – volume: 14 issue: 4 year: 2019 ident: 10.1016/j.cose.2023.103544_br0290 article-title: Enabling efficient and geometric range query with access control over encrypted spatial data publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2018.2868162 – volume: 11 start-page: 796 issue: 5 year: 2015 ident: 10.1016/j.cose.2023.103544_br0160 article-title: Privacy-preserving top-k spatial keyword queries in untrusted cloud environments publication-title: IEEE Trans. Serv. Comput. – start-page: 457 year: 2009 ident: 10.1016/j.cose.2023.103544_br0070 article-title: Predicate privacy in encryption systems – start-page: 205 year: 2011 ident: 10.1016/j.cose.2023.103544_br0140 article-title: Efficient processing of top-k spatial keyword queries – year: 2022 ident: 10.1016/j.cose.2023.103544_br0240 article-title: Efficient privacy-preserving geographic keyword Boolean range query over encrypted spatial data publication-title: IEEE Syst. J. – year: 2007 ident: 10.1016/j.cose.2023.103544_br0270 – start-page: 75 year: 2008 ident: 10.1016/j.cose.2023.103544_br0230 article-title: Hidden-vector encryption with groups of prime order – volume: 13 start-page: 422 issue: 7 year: 1970 ident: 10.1016/j.cose.2023.103544_br0180 article-title: Space/time trade-offs in hash coding with allowable errors publication-title: Commun. ACM doi: 10.1145/362686.362692 – start-page: 155 year: 2005 ident: 10.1016/j.cose.2023.103544_br0090 article-title: Hybrid index structures for location-based web search – ident: 10.1016/j.cose.2023.103544_br0250 – volume: 39 start-page: 50 issue: 1 year: 2009 ident: 10.1016/j.cose.2023.103544_br0300 article-title: A break in the clouds: towards a cloud definition publication-title: ACM SIGCOMM Comput. Commun. Rev. doi: 10.1145/1496091.1496100 – start-page: 745 year: 2018 ident: 10.1016/j.cose.2023.103544_br0210 article-title: Result pattern hiding searchable encryption for conjunctive queries – start-page: 639 year: 1996 ident: 10.1016/j.cose.2023.103544_br0260 article-title: Adaptively secure multi-party computation – volume: 23 start-page: 585 issue: 4 year: 2010 ident: 10.1016/j.cose.2023.103544_br0120 article-title: IR-tree: an efficient index for geographic document search publication-title: IEEE Trans. Knowl. Data Eng. doi: 10.1109/TKDE.2010.149 – year: 2021 ident: 10.1016/j.cose.2023.103544_br0170 article-title: Privacy-preserving ranked spatial keyword query in mobile cloud-assisted fog computing publication-title: IEEE Trans. Mob. Comput. – start-page: 139 year: 2009 ident: 10.1016/j.cose.2023.103544_br0060 article-title: Secure kNN computation on encrypted databases – start-page: 4 year: 2003 ident: 10.1016/j.cose.2023.103544_br0080 article-title: A forward-secure public-key encryption scheme – start-page: 656 year: 2008 ident: 10.1016/j.cose.2023.103544_br0100 article-title: Keyword search on spatial databases – year: 2012 ident: 10.1016/j.cose.2023.103544_br0040 – start-page: 2253 year: 2020 ident: 10.1016/j.cose.2023.103544_br0200 article-title: Search me in the dark: privacy-preserving Boolean range query over encrypted spatial data – start-page: 2670 year: 2021 ident: 10.1016/j.cose.2023.103544_br0190 article-title: Enabling efficient and expressive spatial keyword queries on encrypted data – volume: 9 start-page: 6184 issue: 8 year: 2021 ident: 10.1016/j.cose.2023.103544_br0280 article-title: Privacy-preserving keyword similarity search over encrypted spatial data in cloud computing publication-title: IEEE Int. Things J. – volume: 28 start-page: 1706 issue: 7 year: 2016 ident: 10.1016/j.cose.2023.103544_br0150 article-title: Inverted linear quadtree: efficient top k spatial keyword search publication-title: IEEE Trans. Knowl. Data Eng. doi: 10.1109/TKDE.2016.2530060 – volume: 24 start-page: 85 issue: 1 year: 2020 ident: 10.1016/j.cose.2023.103544_br0010 article-title: Spatial keyword search: a survey publication-title: GeoInformatica doi: 10.1007/s10707-019-00373-y – volume: 2 start-page: 337 issue: 1 year: 2009 ident: 10.1016/j.cose.2023.103544_br0110 article-title: Efficient retrieval of the top-k most relevant spatial web objects publication-title: Proc. VLDB Endow. doi: 10.14778/1687627.1687666 – volume: 26 start-page: 878 issue: 4 year: 2013 ident: 10.1016/j.cose.2023.103544_br0130 article-title: Fast nearest neighbor search with keywords publication-title: IEEE Trans. Knowl. Data Eng. – start-page: 1046 year: 2019 ident: 10.1016/j.cose.2023.103544_br0020 article-title: When geo-text meets security: privacy-preserving Boolean spatial keyword queries |
| SSID | ssj0017688 |
| Score | 2.3984497 |
| SourceID | crossref |
| SourceType | Enrichment Source Index Database |
| StartPage | 103544 |
| Title | Towards efficient Secure Boolean Range Query over encrypted spatial data |
| Volume | 136 |
| WOSCitedRecordID | wos001102097800001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVESC databaseName: Elsevier SD Freedom Collection Journals 2021 issn: 0167-4048 databaseCode: AIEXJ dateStart: 19950101 customDbUrl: isFulltext: true dateEnd: 99991231 titleUrlDefault: https://www.sciencedirect.com omitProxy: false ssIdentifier: ssj0017688 providerName: Elsevier |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtZ1La9wwEIBFuumhlybpgzyLDr0tXmRrbUnHEJKmJYS0pOCezFrWgkNwlvW6JP8-M5JWdlNamkMvZjFaYfuTxzOjeRDyMZmmsZFpFlVlnIKBIsqonIosynRcgUKhjOY2UfhCXF7KPFdXvl1qa9sJiKaR9_dq8V9RwzmAjamzz8AdJoUT8BugwxGww_HfwNtA2BYjNWqb7eh86gbTGm7R7_4N8wnGXzuDu-twe2O4-uXDAlXPFuOrcdvGZaz1NQx874fWrpTW97wbOJ2twzXv-qX2o7Prow5S_5P1nOZ1s-zqXuzduehu__n03odkOvA-eIck1k1nrlpmkKh8KBNjxlNX4_E3ce08BzcTjM2fYCP3ST_419rYT75ZIZJwHaR2U-AcBc5RuDlekM1EpEqOyObx59P8S9hbAgNLhorvcOU-lcpF_T29koG6MtA7rrfJa28w0GMHeodsmOYN2VoDoV42vyXnnjsN3KnjTj13arlTy50idxq4U8-dIvd35PvZ6fXJeeTbZESaM7aKtOJacsNkpUH46rKE265minHNqmQmKrBJY6YzsFTn8wzM3bnQQsP7yBMptQH99D0ZNXeN2SW0qlSpeMZEomdTJs1M2PqCoKXCC62Y3iPx-mkU2teQx1Ymt8WfOeyRcfjPwlVQ-cvo_WeNPiCv-kV5SEarZWeOyEv9c1W3yw8e_CM7EGd0 |
| linkProvider | Elsevier |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Towards+efficient+Secure+Boolean+Range+Query+over+encrypted+spatial+data&rft.jtitle=Computers+%26+security&rft.au=Zhao%2C+Xuan&rft.au=Yu%2C+Jia&rft.au=Ge%2C+Xinrui&rft.au=Hao%2C+Rong&rft.date=2024-01-01&rft.issn=0167-4048&rft.volume=136&rft.spage=103544&rft_id=info:doi/10.1016%2Fj.cose.2023.103544&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_cose_2023_103544 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0167-4048&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0167-4048&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0167-4048&client=summon |