{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,12]],"date-time":"2024-07-12T23:40:08Z","timestamp":1720827608985},"reference-count":16,"publisher":"Wiley","license":[{"start":{"date-parts":[[2018,12,2]],"date-time":"2018-12-02T00:00:00Z","timestamp":1543708800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U183610040","61772283","U1536206","U1405254","61602253","61672294","61502242","2018YFB1003205","2017M610574","BK20150925","BK20151530","17ZDA092"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2018,12,2]]},"abstract":"Currently, searchable encryption becomes the focus topic with the emerging cloud computing paradigm. The existing research schemes are mainly semantic extensions of multiple keywords. However, the semantic information carried by the keywords is limited and does not respond well to the content of the document. And when the original scheme constructs the conceptual graph, it ignores the context information of the topic sentence, which leads to errors in the semantic extension. In this paper, we define and construct semantic search encryption scheme for context-based conceptual graph (ESSEC). We make contextual contact with the central key attributes in the topic sentence and extend its semantic information, so as to improve the accuracy of the retrieval and semantic relevance. Finally, experiments based on real data show that the scheme is effective and feasible.<\/jats:p>","DOI":"10.1155\/2018\/1420930","type":"journal-article","created":{"date-parts":[[2018,12,2]],"date-time":"2018-12-02T23:31:25Z","timestamp":1543793485000},"page":"1-10","source":"Crossref","is-referenced-by-count":2,"title":["Semantic Contextual Search Based on Conceptual Graphs over Encrypted Cloud"],"prefix":"10.1155","volume":"2018","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-5843-6953","authenticated-orcid":true,"given":"Zhenghong","family":"Wang","sequence":"first","affiliation":[{"name":"School of Computer and Software, Nanjing University of Information Science & Technology, Nanjing, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-4363-2521","authenticated-orcid":true,"given":"Zhangjie","family":"Fu","sequence":"additional","affiliation":[{"name":"School of Computer and Software, Nanjing University of Information Science & Technology, Nanjing, China"},{"name":"College of Information Science and Technology, Jinan University, Guangzhou 510632, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-7982-726X","authenticated-orcid":true,"given":"Xingming","family":"Sun","sequence":"additional","affiliation":[{"name":"School of Computer and Software, Nanjing University of Information Science & Technology, Nanjing, China"}]}],"member":"311","reference":[{"issue":"16","key":"3","first-page":"506","volume":"3027","year":"2004","journal-title":"Lecture Notes in Computer Science"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.3233\/jcs-2011-0426"},{"key":"4","first-page":"31","year":"2004","journal-title":"Lecture Notes in Computer Science"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/11602897_35"},{"issue":"1","key":"23","first-page":"37","volume":"55","year":"2018","journal-title":"Computers Materials & Continua"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.45"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.06.029"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/tpds.2015.2506573"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2014.7027353"},{"issue":"12","key":"17","volume":"12","year":"2017","journal-title":"IEEE Transactions on Information Forensics & Security"},{"issue":"9","key":"22","first-page":"1","volume":"27","year":"2016","journal-title":"IEEE Transactions on Parallel & Distributed Systems"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2016.2622697"},{"key":"9","year":"1993"},{"issue":"3","key":"27","doi-asserted-by":"crossref","first-page":"299","DOI":"10.1080\/10618600.1996.10474713","volume":"5","year":"1996","journal-title":"Journal of Computational and Graphical Statistics"},{"key":"26","first-page":"3111","volume":"26","year":"2013","journal-title":"Advances in Neural Information Processing Systems"},{"issue":"1","key":"25","first-page":"1","volume":"40","year":"2014","journal-title":"Computers, Materials & Continua"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2018\/1420930.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2018\/1420930.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2018\/1420930.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,12]],"date-time":"2024-07-12T23:10:51Z","timestamp":1720825851000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2018\/1420930\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,2]]},"references-count":16,"alternative-id":["1420930","1420930"],"URL":"https:\/\/doi.org\/10.1155\/2018\/1420930","relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"value":"1939-0114","type":"print"},{"value":"1939-0122","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,12,2]]}}}