{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T07:28:24Z","timestamp":1743060504705,"version":"3.40.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030185787"},{"type":"electronic","value":"9783030185794"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-18579-4_16","type":"book-chapter","created":{"date-parts":[[2019,4,23]],"date-time":"2019-04-23T15:05:36Z","timestamp":1556031936000},"page":"264-280","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Privacy Preserving Elastic Stream Processing with Clouds Using Homomorphic Encryption"],"prefix":"10.1007","author":[{"given":"Arosha","family":"Rodrigo","sequence":"first","affiliation":[]},{"given":"Miyuru","family":"Dayarathna","sequence":"additional","affiliation":[]},{"given":"Sanath","family":"Jayasena","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,4,24]]},"reference":[{"issue":"2","key":"16_CR1","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1109\/MEMB.2010.936454","volume":"29","author":"M Blount","year":"2010","unstructured":"Blount, M., et al.: Real-time analysis for intensive care: development and deployment of the artemis analytic system. IEEE Eng. Med. Biol. Mag. 29(2), 110\u2013118 (2010)","journal-title":"IEEE Eng. Med. Biol. Mag."},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"Cervino, J., Kalyvianaki, E., Salvachua, J., Pietzuch, P.: Adaptive provisioning of stream processing systems in the cloud. In: 2012 IEEE 28th International Conference on Data Engineering Workshops (ICDEW), pp. 295\u2013301, April 2012","DOI":"10.1109\/ICDEW.2012.40"},{"issue":"7","key":"16_CR3","doi-asserted-by":"publisher","first-page":"678","DOI":"10.1016\/j.datak.2010.02.006","volume":"69","author":"A Cuzzocrea","year":"2010","unstructured":"Cuzzocrea, A., Chakravarthy, S.: Event-based lossy compression for effective and efficient OLAP over data streams. Data Knowl. Eng. 69(7), 678\u2013708 (2010)","journal-title":"Data Knowl. Eng."},{"key":"16_CR4","unstructured":"Dai, W., Sunar, B.: cuHE: a homomorphic encryption accelerator library. Cryptology ePrint Archive, Report 2015\/818 (2015). https:\/\/eprint.iacr.org\/2015\/818"},{"issue":"2","key":"16_CR5","doi-asserted-by":"publisher","first-page":"33:1","DOI":"10.1145\/3170432","volume":"51","author":"M Dayarathna","year":"2018","unstructured":"Dayarathna, M., Perera, S.: Recent advancements in event processing. ACM Comput. Surv. 51(2), 33:1\u201333:36 (2018)","journal-title":"ACM Comput. Surv."},{"key":"16_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1007\/978-3-642-37450-0_12","volume-title":"Database Systems for Advanced Applications","author":"M Dayarathna","year":"2013","unstructured":"Dayarathna, M., Suzumura, T.: A mechanism for stream program performance recovery in resource limited compute clusters. In: Meng, W., Feng, L., Bressan, S., Winiwarter, W., Song, W. (eds.) DASFAA 2013. LNCS, vol. 7826, pp. 164\u2013178. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-37450-0_12"},{"key":"16_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1007\/978-3-642-40196-1_19","volume-title":"Quantitative Evaluation of Systems","author":"M Dayarathna","year":"2013","unstructured":"Dayarathna, M., Suzumura, T.: A performance analysis of system S, S4, and esper via two level benchmarking. In: Joshi, K., Siegle, M., Stoelinga, M., D\u2019Argenio, P.R. (eds.) QEST 2013. LNCS, vol. 8054, pp. 225\u2013240. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-40196-1_19"},{"key":"16_CR8","unstructured":"DERA. Edgar log file data set (2017). https:\/\/www.sec.gov\/dera\/data\/edgar-log-file-data-set.html"},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Proceedings of the Forty-First Annual ACM Symposium on Theory of Computing, STOC 2009, pp. 169\u2013178. ACM, New York (2009)","DOI":"10.1145\/1536414.1536440"},{"key":"16_CR10","unstructured":"Google: Cloud dataflow (2017). https:\/\/cloud.google.com\/dataflow\/"},{"key":"16_CR11","doi-asserted-by":"crossref","unstructured":"Halevi, S.: An implementation of homomorphic encryption (2017). https:\/\/github.com\/shaih\/HElib","DOI":"10.1007\/978-3-319-57048-8_5"},{"key":"16_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"554","DOI":"10.1007\/978-3-662-44371-2_31","volume-title":"Advances in Cryptology \u2013 CRYPTO 2014","author":"S Halevi","year":"2014","unstructured":"Halevi, S., Shoup, V.: Algorithms in HElib. In: Garay, J.A., Gennaro, R. (eds.) CRYPTO 2014. LNCS, vol. 8616, pp. 554\u2013571. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-44371-2_31"},{"issue":"5","key":"16_CR13","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1002\/widm.1100","volume":"3","author":"W Hummer","year":"2013","unstructured":"Hummer, W., Satzger, B., Dustdar, S.: Elastic stream processing in the cloud. Wiley Interdisc. Rev. Data Min. Knowl. Discovery 3(5), 333\u2013345 (2013)","journal-title":"Wiley Interdisc. Rev. Data Min. Knowl. Discovery"},{"key":"16_CR14","unstructured":"IBM: Streaming analytics (2017). https:\/\/www.ibm.com\/cloud\/streaming-analytics"},{"key":"16_CR15","doi-asserted-by":"crossref","unstructured":"Ishii, A., Suzumura, T.: Elastic stream computing with clouds. In: 2011 IEEE 4th International Conference on Cloud Computing, pp. 195\u2013202, July 2011","DOI":"10.1109\/CLOUD.2011.11"},{"key":"16_CR16","doi-asserted-by":"crossref","unstructured":"Jayasekara, S., Perera, S., Dayarathna, M., Suhothayan, S.: Continuous analytics on geospatial data streams with WSO2 complex event processor. In: Proceedings of the 9th ACM International Conference on Distributed Event-Based Systems, DEBS 2015, pp. 277\u2013284. ACM, New York (2015)","DOI":"10.1145\/2675743.2772585"},{"key":"16_CR17","unstructured":"Klimt, B., Yang, Y.: Introducing the enron corpus, p. 2, January 2004"},{"key":"16_CR18","doi-asserted-by":"crossref","unstructured":"Loesing, S., Hentschel, M., Kraska, T., Kossmann, D.: Stormy: an elastic and highly available streaming service in the cloud. In: Proceedings of the 2012 Joint EDBT\/ICDT Workshops, EDBT-ICDT 2012, pp. 55\u201360. ACM, New York (2012)","DOI":"10.1145\/2320765.2320789"},{"key":"16_CR19","doi-asserted-by":"crossref","unstructured":"Page, A., Kocabas, O., Ames, S., Venkitasubramaniam, M., Soyata, T.: Cloud-based secure health monitoring: optimizing fully-homomorphic encryption for streaming algorithms. In: 2014 IEEE Globecom Workshops (GC Wkshps), pp. 48\u201352, December 2014","DOI":"10.1109\/GLOCOMW.2014.7063384"},{"key":"16_CR20","doi-asserted-by":"crossref","unstructured":"Quoc, D.L., Chen, R., Bhatotia, P., Fetzer, C., Hilt, V., Strufe, T.: Streamapprox: approximate computing for stream analytics. In: Proceedings of the 18th ACM\/IFIP\/USENIX Middleware Conference, Middleware 2017, pp. 185\u2013197. ACM, New York (2017)","DOI":"10.1145\/3135974.3135989"},{"key":"16_CR21","doi-asserted-by":"crossref","unstructured":"Ravindra, S., Dayarathna, M., Jayasena, S.: Latency aware elastic switching-based stream processing over compressed data streams. In: Proceedings of the 8th ACM\/SPEC on International Conference on Performance Engineering, ICPE 2017, pp. 91\u2013102. ACM, New York (2017)","DOI":"10.1145\/3030207.3030227"},{"key":"16_CR22","doi-asserted-by":"crossref","unstructured":"Shaon, F., Kantarcioglu, M., Lin, Z., Khan, L.: SGX-BigMatrix: a practical encrypted data analytic framework with trusted processors. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, pp. 1211\u20131228. ACM, New York (2017)","DOI":"10.1145\/3133956.3134095"},{"key":"16_CR23","unstructured":"Striim: Striim delivers streaming hybrid cloud integration to microsoft azure (2017). http:\/\/www.striim.com\/press\/hybrid-cloud-integration-to-microsoft-azure"},{"issue":"4","key":"16_CR24","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1002\/bltj.21652","volume":"18","author":"B Theeten","year":"2014","unstructured":"Theeten, B., Bedini, I., Cogan, P., Sala, A., Cucinotta, T.: Towards the optimization of a parallel streaming engine for telco applications. Bell Labs Tech. J. 18(4), 181\u2013197 (2014)","journal-title":"Bell Labs Tech. J."},{"key":"16_CR25","doi-asserted-by":"crossref","unstructured":"Togan, M., Plesca, C.: Comparison-based computations over fully homomorphic encrypted data. In: 2014 10th International Conference on Communications (COMM), pp. 1\u20136, May 2014","DOI":"10.1109\/ICComm.2014.6866760"},{"key":"16_CR26","unstructured":"WSO2: WSO2 stream processor (2018). https:\/\/wso2.com\/analytics-and-stream-processing"}],"container-title":["Lecture Notes in Computer Science","Database Systems for Advanced Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-18579-4_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T08:50:36Z","timestamp":1710233436000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-18579-4_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030185787","9783030185794"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-18579-4_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"24 April 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DASFAA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Database Systems for Advanced Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chiang Mai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Thailand","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 April 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 April 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dasfaa2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/dasfaa2019.eng.cmu.ac.th\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"501","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"92","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"64","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"13 demo papers, 6 tutorial papers","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}