Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network
نویسندگان
چکیده
Abstract Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network massive device connectivity with ultra‐low latency requirement. The cutting edge technologies artificial intelligence, quantum machine learning, millimetre enable hyper‐connectivity extend development of mobile communication. potential utilise different computing infrastructures, on‐demand software, platforms, intelligence access a amount data in real‐time. delivery real‐time demands third‐party remote exploit resources service storage meet user requirements. Moreover, certain infrastructures cloud, edge, fog recommend privacy protection guarantee effective information retrieval by centre. As result, multi‐keyword searching over encrypted cloud is commonly exercised retrieve integrity. With use computing, generating IoT can easily outsource any kind complex management system from local system. It may commercialise site achieve better resource‐saving. However, are expected ensure using encryption techniques before sensitive outsourced via devices. Thus, this paper presents synonym‐based ranked search order solve privacy‐preserving computation cost. proposed mechanism constructs an m‐Way tree allot index vector for each document which applies depth‐first compute top score ranking realise efficiency. examination results show that assumed vectors be subdivided into sub‐vectors storing them security
منابع مشابه
Efficient Multikeyword Ranked Search over Encrypted Cloud Data with Rank Integrity
Due to the high popularity of cloud computing, more data owners are motivated to outsource the data to the cloud server. In that sensitive data will be encrypted before outsourcing to the cloud server for security purpose. In this paper, we introduce a secure multi-keyword ranked search over encrypted cloud data, which performs dynamic update operations like deletion and insertion of documents....
متن کاملSecure keyword-based Ranked Semantic Search over Encrypted Cloud Data
With the advent of cloud computing, many organizations and individuals are interested in outsourcing their complex data management to the public cloud for economic savings and ease of access. As sensitive information may have to be encrypted before outsourcing, the data utilization service based on plaintext keyword search is not suitable for the encrypted cloud data. In this paper, we propose ...
متن کاملSecure and Dynamic Multi-keyword Ranked Search Scheme and Fuzzy Search over Encrypted Cloud Data
With the increased rate of growth and adaptation of cloud computing, daily, more and more sensitive information is being centralized onto the cloud. For the protection of valuable proprietary information, the data must be encrypted before outsourcing. There is no tolerance for typos and format inconsistencies which are normal user behavior. This makes effective data storage and utilization a ve...
متن کاملSecure kNN Query Processing in Untrusted
Mobile devices with geo-positioning capabilities (e.g., GPS) enable users to access information that is relevant to their present location. Users are interested in querying about points of interest (POI) in their physical proximity, such as restaurants, cafes, ongoing events, etc. Entities specialized in various areas of interest (e.g., certain niche directions in arts, entertainment, travel) g...
متن کاملDistributed Ranked Search
P2P deployments are a natural infrastructure for building distributed search networks. Proposed systems support locating and retrieving all results, but lack the information necessary to rank them. Users, however, are primarily interested in the most relevant results, not necessarily all possible results. Using random sampling, we extend a class of well-known information retrieval ranking algor...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IET networks
سال: 2022
ISSN: ['2047-4954', '2047-4962']
DOI: https://doi.org/10.1049/ntw2.12050