
Abstract The more growing discovery of cloud computing capabilities, the more likely researchers are to make progress in this field. The ability to search over the encrypted data is one of the prerequisites for cloud computing. A large number of data owners all over the world are interested in outsourcing data to the cloud, being concerned about protecting the data privacy. The method presented in this paper includes several functionalities which have never been simultaneously available in any other searchable encryption scheme. The proposed scheme is a dynamic scheme in which data update does not leak information from outsourced data or search keywords. In this model, the cloud server is assumed to be malicious and in such circumstances it is possible to verify the search results by data user. In addition to searching with multiple keywords, the user receives the ranked search results as well. The performance analysis of proposed scheme shows that despite the added functionality, its efficiency is reasonable.
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 14 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Top 10% | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Top 10% | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Top 10% |
