{"id":"https://openalex.org/W2053811759","doi":"https://doi.org/10.1109/trustcom.2013.57","title":"iPEKS: Fast and Secure Cloud Data Retrieval from the Public-Key Encryption with Keyword Search","display_name":"iPEKS: Fast and Secure Cloud Data Retrieval from the Public-Key Encryption with Keyword Search","publication_year":2013,"publication_date":"2013-07-01","ids":{"openalex":"https://openalex.org/W2053811759","doi":"https://doi.org/10.1109/trustcom.2013.57","mag":"2053811759"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/trustcom.2013.57","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004621285","display_name":"Fu-Kuo Tseng","orcid":null},"institutions":[{"id":"https://openalex.org/I148366613","display_name":"National Yang Ming Chiao Tung University","ror":"https://ror.org/00se2k293","country_code":"TW","type":"education","lineage":["https://openalex.org/I148366613"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Fu-Kuo Tseng","raw_affiliation_strings":["Department of Computer Science; National Chiao Tung University; Hsinchu; Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science; National Chiao Tung University; Hsinchu; Taiwan","institution_ids":["https://openalex.org/I148366613"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111500218","display_name":"Rong-Jaye Chen","orcid":null},"institutions":[{"id":"https://openalex.org/I148366613","display_name":"National Yang Ming Chiao Tung University","ror":"https://ror.org/00se2k293","country_code":"TW","type":"education","lineage":["https://openalex.org/I148366613"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Rong-Jaye Chen","raw_affiliation_strings":["Department of Computer Science; National Chiao Tung University; Hsinchu; Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science; National Chiao Tung University; Hsinchu; Taiwan","institution_ids":["https://openalex.org/I148366613"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100829650","display_name":"Bao\u2010Shuh Paul Lin","orcid":null},"institutions":[{"id":"https://openalex.org/I148366613","display_name":"National Yang Ming Chiao Tung University","ror":"https://ror.org/00se2k293","country_code":"TW","type":"education","lineage":["https://openalex.org/I148366613"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Bao-Shuh Paul Lin","raw_affiliation_strings":["Department of Computer Science; National Chiao Tung University; Hsinchu; Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science; National Chiao Tung University; Hsinchu; Taiwan","institution_ids":["https://openalex.org/I148366613"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.809,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":13,"citation_normalized_percentile":{"value":0.64624,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":87,"max":88},"biblio":{"volume":"3325","issue":null,"first_page":"452","last_page":"458"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Advanced Cryptographic Schemes and Protocols","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Advanced Cryptographic Schemes and Protocols","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Security Challenges in Cloud Computing","score":0.9976,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Techniques for Data Analysis and Machine Learning","score":0.9844,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/searchable-encryption","display_name":"Searchable Encryption","score":0.624557},{"id":"https://openalex.org/keywords/remote-data-checking","display_name":"Remote Data Checking","score":0.528702},{"id":"https://openalex.org/keywords/privacy-preserving-computation","display_name":"Privacy-Preserving Computation","score":0.525402},{"id":"https://openalex.org/keywords/image-encryption","display_name":"Image Encryption","score":0.510369},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security Analysis","score":0.506431}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.827716},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.80700386},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7760562},{"id":"https://openalex.org/C2988412617","wikidata":"https://www.wikidata.org/wiki/Q7441656","display_name":"Keyword search","level":2,"score":0.7594619},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.65008795},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.62769985},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.6007164},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.50053525},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.49235547},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.41533256},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.4140879},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3116257},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.2709449},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.089643866},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/trustcom.2013.57","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":21,"referenced_works":["https://openalex.org/W1539207281","https://openalex.org/W1580750219","https://openalex.org/W1589843374","https://openalex.org/W1596208550","https://openalex.org/W1681309784","https://openalex.org/W1847647515","https://openalex.org/W1988374166","https://openalex.org/W2006737181","https://openalex.org/W2023572954","https://openalex.org/W2047122237","https://openalex.org/W2076623138","https://openalex.org/W2086042811","https://openalex.org/W2088336724","https://openalex.org/W2109026747","https://openalex.org/W2114296561","https://openalex.org/W2117740674","https://openalex.org/W2132257180","https://openalex.org/W2154654620","https://openalex.org/W2161214567","https://openalex.org/W7485291","https://openalex.org/W83995583"],"related_works":["https://openalex.org/W4396879184","https://openalex.org/W4390962791","https://openalex.org/W4254460476","https://openalex.org/W3179891621","https://openalex.org/W3138083505","https://openalex.org/W2783353176","https://openalex.org/W2339543721","https://openalex.org/W18954787","https://openalex.org/W1829339118","https://openalex.org/W1514794536"],"abstract_inverted_index":{"In":[0,109,167],"recent":[1],"years,":[2],"considerable":[3],"concern":[4],"has":[5],"arisen":[6],"over":[7],"the":[8,11,15,23,30,36,47,51,104,120,126,135,139,144,150,152,163,181],"security":[9,164],"of":[10,19,25,46,67,83,106,129,134,138],"data":[12,37,49,84],"stored":[13],"in":[14,92,177],"cloud.":[16],"A":[17],"number":[18,82,128,137],"studies":[20],"have":[21,70,146],"suggested":[22],"use":[24],"cryptographic":[26],"primitives":[27],"to":[28,73,75,102,125,161],"protect":[29],"data.":[31],"As":[32],"these":[33,93],"tools":[34],"transform":[35],"into":[38],"an":[39,114],"unintelligible":[40],"form,":[41],"secure":[42],"and":[43,65,165,170],"efficient":[44],"retrieval":[45],"encrypted":[48],"from":[50],"cloud":[52],"becomes":[53],"a":[54,80,174],"major":[55],"challenge.":[56,77],"The":[57,142],"public-key":[58],"encryption":[59],"with":[60,180],"keyword":[61],"search":[62,97,121],"(PEKS)":[63],"scheme":[64],"many":[66],"its":[68],"variants":[69],"been":[71,147],"proposed":[72],"respond":[74],"this":[76,110],"However,":[78],"given":[79],"large":[81],"(or":[85],"searchable":[86,140],"keywords)":[87],"would":[88],"be":[89,100,155],"tested":[90],"sequentially":[91],"PEKS":[94],"schemes,":[95],"previous":[96,182],"results":[98],"should":[99],"employed":[101],"improve":[103],"efficiency":[105,153,178],"future":[107],"searches.":[108],"paper,":[111],"we":[112],"present":[113],"interactive":[115],"construction":[116],"named":[117],"iPEKS":[118],"where":[119],"time":[122],"is":[123],"linear":[124],"total":[127,136],"distinct":[130],"searched":[131,148],"keywords":[132,145],"instead":[133],"keywords.":[141],"more":[143],"previously,":[149],"better":[151],"can":[154],"improved.":[156],"We":[157],"provide":[158],"theoretical":[159],"analysis":[160],"show":[162],"privacy.":[166],"addition,":[168],"implementation":[169],"performance":[171],"experiments":[172],"exhibit":[173],"great":[175],"improvement":[176],"compared":[179],"schemes.":[183]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2053811759","counts_by_year":[{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":5},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":3}],"updated_date":"2024-11-21T01:37:59.291551","created_date":"2016-06-24"}