Skip to main content

Advances, Systems and Applications

Table 2 Comparison of functionalities

From: Secure semantic search using deep learning in a blockchain-assisted multi-user setting

 

Blockchain-based schemes

   

Semantic-aware schemes

   

Our

 

[24]

[33]

[34]

[20]

[36]

[37]

[8]

[9]

 

Semantic retrieval

\(\times\)

\(\checkmark\)

\(\times\)

\(\times\)

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

Probabilistic

\(\times\)

\(\times\)

\(\times\)

\(\times\)

\(\checkmark\)

\(\checkmark\)

\(\times\)

\(\checkmark\)

\(\checkmark\)

Retrieval heuristic

\(\times\)

\(\checkmark\)

\(\times\)

\(\times\)

\(\times\)

\(\times\)

\(\times\)

\(\times\)

\(\checkmark\)

Weight model

YAKE

Word2Vec

SBERT

Word2Vec

Doc2Vec

Multi-keyword

\(\times\)

\(\checkmark\)

\(\times\)

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

Result ordering

\(\times\)

\(\checkmark\)

\(\times\)

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

Integrity

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

\(\times\)

\(\times\)

\(\checkmark\)

\(\times\)

\(\checkmark\)

No TTP

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

\(\times\)

\(\times\)

\(\times\)

\(\times\)

\(\checkmark\)

Access control

\(\times\)

\(\times\)

\(\times\)

\(\times\)

\(\times\)

\(\times\)

\(\times\)

\(\times\)

\(\checkmark\)

Policy expressibility

\(\times\)

\(\times\)

\(\times\)

\(\times\)

\(\checkmark\)

Revocation

\(\times\)

\(\times\)

\(\times\)

\(\times\)

\(\times\)

\(\times\)

\(\times\)

\(\times\)

\(\checkmark\)