Return to Article Details Protection Preserving Over Encrypted Data Using Key with Similarity Check Download Download PDF