Journal on Communications ›› 2019, Vol. 40 ›› Issue (2): 40-50.doi: 10.11959/j.issn.1000-436x.2019024
• Papers • Previous Articles Next Articles
Qiang ZHANG1,Guojun WANG2(),Shaobo ZHANG3
Revised:
2018-08-14
Online:
2019-02-01
Published:
2019-03-04
Supported by:
CLC Number:
Qiang ZHANG,Guojun WANG,Shaobo ZHANG. Method of privacy protection based on multiple edge servers in personalized search[J]. Journal on Communications, 2019, 40(2): 40-50.
[1] | TANG J , CUI Y , LI Q ,et al. Ensuring security and privacy preservation for cloud data services[J]. Acm Computing Surveys, 2016,49(1): 1-39. |
[2] | SONG D X , WAGNER D , PERRIG A . Practical techniques for searches on encrypted data[C]// IEEE Symposium on Security & Privacy. 2002: 44-55. |
[3] | LI H W , LIU D X , DAI Y S ,et al. Engineering searchable encryption of mobile cloud networks:when QoE meets QoP[J]. IEEE Wireless Communications, 2015,22(4): 74-80. |
[4] | CHANG Y C , MITZENMACHER M . Privacy preserving keyword searches on remote encrypted data[C]// International Conference on Applied Cryptography and Network Security. 2005: 442-455. |
[5] | CURTMOLA R , GARAY J , KAMARA S ,et al. Searchable symmetric encryption:improved definitions and efficient constructions[J]. Journal of Computer Security, 2011,19(5): 895-934. |
[6] | DAN B , CRESCENZO G D , OSTROVSKY R ,et al. Public key encryption with keyword search[C]// International Conference on the Theory and Applications of Cryptographic Techniques. 2004: 506-522. |
[7] | 李经纬, 贾春福, 刘哲理 ,等. 可搜索加密技术研究综述[J]. 软件学报, 2015,26(1): 109-128. |
LI J W , JIA C F , LIU Z L ,et al. Survey on the searchable encryption[J]. Journal of Software, 2015,26(1): 109-128. | |
[8] | CUI J , ZHOU H , ZHONG H ,et al. AKSER:attribute-based keyword search with efficient revocation in cloud computing[J]. Information Sciences, 2017,423: 343-352. |
[9] | ZHAO F , YAN F W , JIN H ,et al. Personalized mobile searching approach based on combining content-based filtering and collaborative filtering[J]. IEEE Systems Journal, 2017,11(1): 324-332. |
[10] | LEUNG W T , LEE D L , LEE W C . PMSE:a personalized mobile search engine[J]. IEEE Transactions on Knowledge & Data Engineering, 2013,25(4): 820-834. |
[11] | FU Z J , REN K , SHU J G ,et al. Enabling personalized search over encrypted outsourced data with efficiency improvement[J]. IEEE Transactions on Parallel & Distributed Systems, 2016,27(9): 2546-2559. |
[12] | FU Z J , WU X L , WANG Q ,et al. Enabling central keyword-based semantic extension search over encrypted outsourced data[J]. IEEE Transactions on Information Forensics & Security, 2017,12(12): 2986-2997. |
[13] | ALHABASHNEH O , IQBAL R , DOCTOR F ,et al. Fuzzy rule based profiling approach for enterprise information seeking and retrieval[J]. Information Sciences, 2017,(394-395): 18-37. |
[14] | ZHANG Q , WANG G J , LIU Q . Enabling cooperative privacy-preserving personalized search in cloud environments[J]. Information Sciences, 2019,480: 1-13. |
[15] | WONG W K , CHEUNG W L , KAO B ,et al. Secure kNN computation on encrypted databases[C]// ACM SIGMOD International Conference on Management of Data. 2009: 139-152. |
[16] | 张强, 王国军 . 个性化搜索中一种基于位置服务的隐私保护方法[J]. 电子与信息学报, 2018,40(8): 1998-2005. |
ZHANG Q , WANG G J . Privacy preserving method based on location service in personalized search[J]. Journal of Electronics & Information Technology, 2018,40(8): 1998-2005. | |
[17] | DU Q , XIE H R , CAI Y ,et al. Folksonomy-based personalized search by hybrid user profiles in multiple levels[J]. Neurocomputing, 2016,204(C): 142-152. |
[18] | MILLER G A , . WordNet:a lexical database for english[C]// Communications of the ACM. 1995,2(11): 39-41. |
[19] | D’ORAZIO C J , CHOO K K R . A technique to circumvent SSL/TLS validations on iOS devices[J]. Future Generation Computer Systems, 2017,74: 366-374. |
[20] | OPPLIGER R , HAUSER R , BASIN D . SSL/TLS session-aware user authentication[J]. Computers & Security, 2008,27(3-4): 64-70. |
[21] | LUO E T , LIU Q , ABAWAJY J H ,et al. Privacy-preserving multi-hop profile-matching protocol for proximity mobile social networks[J]. Future Generation Computer Systems, 2017,68: 222-233. |
[22] | ZHANG Q , LIU Q , WANG G J . PRMS:A personalized mobile search over encrypted outsourced data[J]. IEEE Access, 2018,6: 31541-31552. |
[23] | 吴志强, 李肯立, 郑蕙 . 高效可扩展的对称密文检索架构[J]. 通信学报, 2017,38(8): 79-93. |
WU Z Q , LI K L , ZHENG H . Efficient and scalable architecture for searchable symmetric encryption[J]. Journal on Communications, 2017,38(8): 79-93. | |
[24] | GOSMAN C , CORNEA T , DOBRE C ,et al. Controlling and filtering users data in intelligent transportation system[J]. Future Generation Computer Systems, 2016,78: 807-816. |
[25] | WANG T , LI Y , CHEN Y ,et al. Fog-based evaluation approach for trustworthy communication in sensor-cloud system[J]. IEEE Communications Letters, 2017,21(11): 2532-2535. |
[26] | CAO N , WANG C , LI M ,et al. Privacy-preserving multi-keyword ranked search over encrypted cloud data[J]. IEEE Transactions on Parallel & Distributed systems, 2014,25(1): 222-233. |
[1] | Xindi MA, Qinghua LI, Qi JIANG, Zhuo MA, Sheng GAO, Youliang TIAN, Jianfeng MA. Byzantine-robust federated learning over Non-IID data [J]. Journal on Communications, 2023, 44(6): 138-153. |
[2] | Tao FENG, Liqiu CHEN, Junli FANG, Jianming SHI. Blockchain data sharing scheme based on localized difference privacy and attribute-based searchable encryption [J]. Journal on Communications, 2023, 44(5): 224-233. |
[3] | Baiji HU, Xiaojuan ZHANG, Yuancheng LI, Rongxin LAI. Multi-function supported privacy protection data aggregation scheme for V2G network [J]. Journal on Communications, 2023, 44(4): 187-200. |
[4] | Ming XU, Baojun ZHANG, Yiming WU, Chenduo YING, Ning ZHENG. Cyber attacks and privacy protection distributed consensus algorithm for multi-agent systems [J]. Journal on Communications, 2023, 44(3): 117-127. |
[5] | Xuewang ZHANG, Zhihong LI, Jinzhao LIN. Privacy protection scheme based on fair blind signature and hierarchical encryption for consortium blockchain [J]. Journal on Communications, 2022, 43(8): 131-141. |
[6] | Jifeng WANG, Guofeng WANG. Research on ciphertext search and sharing technology in edge computing mode [J]. Journal on Communications, 2022, 43(4): 227-238. |
[7] | Huamin FENG, Rui SHI, Feng YUAN, Yanjun LI, Yang YANG. Efficient strong privacy protection and transferable attribute-based ticket scheme [J]. Journal on Communications, 2022, 43(3): 63-75. |
[8] | Lin ZHANG, Xinyan WEI, Xiping LIU, Haiping HUANG, Ruchuan WANG. Trust evaluation algorithm of IoT edge server based on cooperation reputation and device feedback [J]. Journal on Communications, 2022, 43(2): 118-130. |
[9] | Yan YAN, Yiming CONG, Mahmood Adnan, Quanzheng SHENG. Statistics release and privacy protection method of location big data based on deep learning [J]. Journal on Communications, 2022, 43(1): 203-216. |
[10] | Bin YU, Nan ZHANG, Xu LU, Zhenhua DUAN, Cong TIAN. Runtime verification approach for DoS attack detection in edge servers [J]. Journal on Communications, 2021, 42(9): 75-86. |
[11] | Hui LIU, Xinyan LIU, Yan XU, Hong ZHONG, Meng WANG. Privacy protection of warning message publishing protocol in VANET [J]. Journal on Communications, 2021, 42(8): 120-129. |
[12] | Hongtao LI, Xiaoyu REN, Jie WANG, Jianfeng MA. Continuous location privacy protection mechanism based on differential privacy [J]. Journal on Communications, 2021, 42(8): 164-175. |
[13] | Wenbo ZHANG, Wenhua HUANG, Jingyu FENG. Secure communication mechanism for VSN based on certificateless signcryption [J]. Journal on Communications, 2021, 42(7): 128-136. |
[14] | Jie CUI, Xuefeng CHEN, Jing ZHANG, Lu WEI, Hong ZHONG. Bus cache-based location privacy protection scheme in the Internet of vehicles [J]. Journal on Communications, 2021, 42(7): 150-161. |
[15] | Guangjun LIU, Wangmei GUO, Jinbo XIONG, Ximeng LIU, Changyu DONG. Lightweight privacy protection data auditing scheme for regenerating-coding-based distributed storage [J]. Journal on Communications, 2021, 42(7): 220-230. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|