{"id":"https://openalex.org/W2804039238","doi":"https://doi.org/10.1002/cpe.4681","title":"Improved collusion\u2010resisting secure nearest neighbor query over encrypted data in cloud","display_name":"Improved collusion\u2010resisting secure nearest neighbor query over encrypted data in cloud","publication_year":2018,"publication_date":"2018-05-25","ids":{"openalex":"https://openalex.org/W2804039238","doi":"https://doi.org/10.1002/cpe.4681","mag":"2804039238"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1002/cpe.4681","pdf_url":null,"source":{"id":"https://openalex.org/S11065456","display_name":"Concurrency and Computation Practice and Experience","issn_l":"1532-0626","issn":["1532-0626","1532-0634"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100750950","display_name":"Youwen Zhu","orcid":"https://orcid.org/0000-0003-4365-9713"},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"funder","lineage":["https://openalex.org/I881766915"]},{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"funder","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Youwen Zhu","raw_affiliation_strings":["Collaborative Innovation Center of Novel Software Technology and Industrialization, Nanjing University, Nanjing 210023, China","College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, China","Youwen Zhu, College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, China","or Collaborative Innovation Center of Novel Software Technology and Industrialization, Nanjing University, Nanjing 210023, China."],"affiliations":[{"raw_affiliation_string":"Collaborative Innovation Center of Novel Software Technology and Industrialization, Nanjing University, Nanjing 210023, China","institution_ids":["https://openalex.org/I881766915"]},{"raw_affiliation_string":"or Collaborative Innovation Center of Novel Software Technology and Industrialization, Nanjing University, Nanjing 210023, China.","institution_ids":["https://openalex.org/I881766915"]},{"raw_affiliation_string":"Youwen Zhu, College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, China","institution_ids":["https://openalex.org/I9842412"]},{"raw_affiliation_string":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, China","institution_ids":["https://openalex.org/I9842412"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100328212","display_name":"Yue Zhang","orcid":"https://orcid.org/0000-0003-4012-537X"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"funder","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yue Zhang","raw_affiliation_strings":["College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, China","MIIT Key Laboratory of Safety-Critical Software, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, China"],"affiliations":[{"raw_affiliation_string":"MIIT Key Laboratory of Safety-Critical Software, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, China","institution_ids":["https://openalex.org/I9842412"]},{"raw_affiliation_string":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, China","institution_ids":["https://openalex.org/I9842412"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014035360","display_name":"Xingxin Li","orcid":"https://orcid.org/0000-0003-0020-9253"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"funder","lineage":["https://openalex.org/I9842412"]},{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"funder","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xingxin Li","raw_affiliation_strings":["College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, China","Guangxi Key Laboratory of Cryptography and Information Security, Guilin University of Electronic Technology, Guilin 541004, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, China","institution_ids":["https://openalex.org/I9842412"]},{"raw_affiliation_string":"Guangxi Key Laboratory of Cryptography and Information Security, Guilin University of Electronic Technology, Guilin 541004, China","institution_ids":["https://openalex.org/I5343935"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055842190","display_name":"Hongyang Yan","orcid":null},"institutions":[{"id":"https://openalex.org/I205237279","display_name":"Nankai University","ror":"https://ror.org/01y1kjr75","country_code":"CN","type":"funder","lineage":["https://openalex.org/I205237279"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hongyang Yan","raw_affiliation_strings":["College of Computer and Control Engineering, Nankai University, Tianjin 300350, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Control Engineering, Nankai University, Tianjin 300350, China","institution_ids":["https://openalex.org/I205237279"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100336868","display_name":"Jing Li","orcid":"https://orcid.org/0000-0002-0288-7296"},"institutions":[{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"funder","lineage":["https://openalex.org/I37987034"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jing Li","raw_affiliation_strings":["School of Computer and Educational Software, Guangzhou University, Guangzhou 510006, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Educational Software, Guangzhou University, Guangzhou 510006, China","institution_ids":["https://openalex.org/I37987034"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100750950"],"corresponding_institution_ids":["https://openalex.org/I881766915","https://openalex.org/I9842412"],"apc_list":{"value":4740,"currency":"USD","value_usd":4740},"apc_paid":null,"fwci":3.371,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":27,"citation_normalized_percentile":{"value":0.933927,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":92,"max":93},"biblio":{"volume":"31","issue":"21","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9992,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9952,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security Analysis","score":0.48840111}],"concepts":[{"id":"https://openalex.org/C2781198186","wikidata":"https://www.wikidata.org/wiki/Q701521","display_name":"Collusion","level":2,"score":0.9620086},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7507154},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.749711},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.68591595},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5603828},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5289369},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.49051255},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.48840111},{"id":"https://openalex.org/C113238511","wikidata":"https://www.wikidata.org/wiki/Q1071612","display_name":"k-nearest neighbors algorithm","level":2,"score":0.47526234},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.401331},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.34276617},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.109888256},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.08149657},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C175444787","wikidata":"https://www.wikidata.org/wiki/Q39072","display_name":"Microeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1002/cpe.4681","pdf_url":null,"source":{"id":"https://openalex.org/S11065456","display_name":"Concurrency and Computation Practice and Experience","issn_l":"1532-0626","issn":["1532-0626","1532-0634"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, justice, and strong institutions","score":0.53}],"grants":[{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"61602240"},{"funder":"https://openalex.org/F4320322769","funder_display_name":"Natural Science Foundation of Jiangsu Province","award_id":"BK20150760"},{"funder":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China","award_id":"2017YFB0802300"}],"datasets":[],"versions":[],"referenced_works_count":40,"referenced_works":["https://openalex.org/W1569223999","https://openalex.org/W1966416874","https://openalex.org/W1968725446","https://openalex.org/W2004493170","https://openalex.org/W2030888439","https://openalex.org/W2037902920","https://openalex.org/W2041480327","https://openalex.org/W2044772384","https://openalex.org/W2051808222","https://openalex.org/W2051847955","https://openalex.org/W2053826825","https://openalex.org/W2054844101","https://openalex.org/W2059094657","https://openalex.org/W2060099509","https://openalex.org/W2074356711","https://openalex.org/W2099739670","https://openalex.org/W2144134823","https://openalex.org/W2147929033","https://openalex.org/W2154448764","https://openalex.org/W2158112071","https://openalex.org/W2164384758","https://openalex.org/W2192495285","https://openalex.org/W2245826006","https://openalex.org/W2250570571","https://openalex.org/W2294473867","https://openalex.org/W2343785519","https://openalex.org/W2344670370","https://openalex.org/W2532777259","https://openalex.org/W2558325443","https://openalex.org/W2562868812","https://openalex.org/W2587173351","https://openalex.org/W2597998853","https://openalex.org/W2600445455","https://openalex.org/W2752901856","https://openalex.org/W2771386056","https://openalex.org/W2790013793","https://openalex.org/W2791289577","https://openalex.org/W2793196814","https://openalex.org/W2793530059","https://openalex.org/W418413933"],"related_works":["https://openalex.org/W3143060468","https://openalex.org/W3143020802","https://openalex.org/W3122232980","https://openalex.org/W2547101978","https://openalex.org/W2363272970","https://openalex.org/W2272761499","https://openalex.org/W2120306875","https://openalex.org/W2009938035","https://openalex.org/W1699588379","https://openalex.org/W1491837399"],"abstract_inverted_index":{"Summary":[0],"Securely":[1],"performing":[2],"nearest":[3],"neighbor":[4],"query":[5,46],"over":[6],"encrypted":[7,121],"data":[8,118,122],"in":[9,15,79,124],"cloud":[10,19,43],"is":[11],"an":[12,53,86,129],"important":[13],"topic":[14],"the":[16,35,40,62,66,73,116,120,136],"area":[17],"of":[18,42],"computing,":[20],"for":[21],"which":[22],"Wang":[23],"et":[24],"al":[25],"recently":[26],"put":[27],"forward":[28],"a":[29],"scheme":[30,131],"(ie,":[31],"CloudBI\u2010II)":[32],"to":[33,90],"address":[34],"challenging":[36],"security":[37],"problem:":[38],"resisting":[39],"collusion":[41,67,137],"server":[44],"and":[45,103],"users.":[47],"In":[48],"this":[49],"paper,":[50],"we":[51,70,106,127],"propose":[52],"efficient":[54,87],"attack":[55,88,111],"method":[56,89],"that":[57,72,108,132],"indicates":[58],"CloudBI\u2010II":[59,94],"will":[60,77],"reveal":[61],"difference":[63,74],"vectors":[64],"under":[65],"attack.":[68,138],"Furthermore,":[69],"show":[71],"vector":[75],"disclosure":[76],"result":[78],"serious":[80],"privacy":[81],"breach":[82],"and,":[83],"thus,":[84],"attain":[85],"break":[91],"CloudBI\u2010II.":[92,125],"Namely,":[93],"cannot":[95],"achieve":[96],"their":[97],"declared":[98],"security.":[99],"Through":[100],"theoretical":[101],"analysis":[102],"experiment":[104],"evaluation,":[105],"confirm":[107],"our":[109],"proposed":[110],"approach":[112],"can":[113,133],"fast":[114],"recover":[115],"original":[117],"from":[119],"set":[123],"Finally,":[126],"provide":[128],"enhanced":[130],"efficiently":[134],"resist":[135]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2804039238","counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":5},{"year":2019,"cited_by_count":9},{"year":2018,"cited_by_count":5}],"updated_date":"2025-03-22T18:35:16.798013","created_date":"2018-06-01"}