{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T16:27:15Z","timestamp":1756312035161,"version":"3.40.3"},"publisher-location":"Cham","reference-count":41,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030496685"},{"type":"electronic","value":"9783030496692"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-49669-2_21","type":"book-chapter","created":{"date-parts":[[2020,6,17]],"date-time":"2020-06-17T23:09:17Z","timestamp":1592435357000},"page":"367-387","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["SGX-IR: Secure Information Retrieval with Trusted Processors"],"prefix":"10.1007","author":[{"given":"Fahad","family":"Shaon","sequence":"first","affiliation":[]},{"given":"Murat","family":"Kantarcioglu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,6,18]]},"reference":[{"key":"21_CR1","unstructured":"Apache Lucene. https:\/\/lucene.apache.org\/. Accessed 20 Apr 2020"},{"key":"21_CR2","unstructured":"Apache Solor. https:\/\/lucene.apache.org\/solr\/. Accessed 20 Apr 2020"},{"key":"21_CR3","unstructured":"Elasticsearch. https:\/\/www.elastic.co\/. Accessed 20 Apr 2020"},{"key":"21_CR4","unstructured":"Intel software guard extension - academic research. https:\/\/software.intel.com\/en-us\/sgx\/documentation\/academic-research. Accessed 20 Apr 2020"},{"key":"21_CR5","unstructured":"Anati, I., Gueron, S., Johnson, S., Scarlata, V.: Innovative technology for CPU based attestation and sealing. In: Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy, vol. 13 (2013)"},{"key":"21_CR6","doi-asserted-by":"crossref","unstructured":"Batcher, K.E.: Sorting networks and their applications. In: Proceedings of the April 30\u2013May 2, 1968, Spring Joint Computer Conference, pp. 307\u2013314. ACM (1968)","DOI":"10.1145\/1468075.1468121"},{"issue":"2","key":"21_CR7","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/2636328","volume":"47","author":"C B\u00f6sch","year":"2015","unstructured":"B\u00f6sch, C., Hartel, P., Jonker, W., Peter, A.: A survey of provably secure searchable encryption. ACM Comput. Surv. (CSUR) 47(2), 18 (2015)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"21_CR8","unstructured":"Christopher, T.W.: Bitonic sort. https:\/\/www.tools-of-computing.com\/tc\/CS\/Sorts\/bitonic_sort.htm. Accessed 20 Apr 2020"},{"key":"21_CR9","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511809071","volume-title":"Introduction to Information Retrieval","author":"CD Manning","year":"2008","unstructured":"Manning, C.D., Raghavan, P., Sch\u00fctze, H.: Introduction to Information Retrieval. Cambridge University Press, Cambridge (2008)"},{"key":"21_CR10","unstructured":"Costan, V., Devadas, S.: Intel SGX explained. IACR Cryptology ePrint Archive 2016(086), 1\u2013118 (2016)"},{"key":"21_CR11","doi-asserted-by":"crossref","unstructured":"Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 79\u201388. ACM (2006)","DOI":"10.1145\/1180405.1180417"},{"key":"21_CR12","unstructured":"Eskandarian, S., Zaharia, M.: ObliDB: oblivious query processing using hardware enclaves. arXiv preprint arXiv:1710.00458 (2017)"},{"key":"21_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"386","DOI":"10.1007\/978-3-319-61176-1_22","volume-title":"Data and Applications Security and Privacy XXXI","author":"B Fuhry","year":"2017","unstructured":"Fuhry, B., Bahmani, R., Brasser, F., Hahn, F., Kerschbaum, F., Sadeghi, A.-R.: HardIDX: practical and secure index with SGX. In: Livraga, G., Zhu, S. (eds.) DBSec 2017. LNCS, vol. 10359, pp. 386\u2013408. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-61176-1_22"},{"key":"21_CR14","doi-asserted-by":"crossref","unstructured":"Golub, G.H., Van der Vorst, H.A.: Eigenvalue computation in the 20th century. In: Numerical Analysis: Historical Developments in the 20th Century, pp. 209\u2013239. Elsevier (2001)","DOI":"10.1016\/B978-0-444-50617-7.50010-0"},{"key":"21_CR15","unstructured":"Gribov, A., Vinayagamurthy, D., Gorbunov, S.: StealthDB: a scalable encrypted database with full SQL query support. arXiv preprint arXiv:1711.02279 (2017)"},{"issue":"1","key":"21_CR16","doi-asserted-by":"publisher","first-page":"172","DOI":"10.2478\/popets-2019-0010","volume":"2019","author":"T Hoang","year":"2019","unstructured":"Hoang, T., Ozmen, M.O., Jang, Y., Yavuz, A.A.: Hardware-supported oram in effect: practical oblivious search and update on very large dataset. Proc. Priv. Enhanc. Technol. 2019(1), 172\u2013191 (2019)","journal-title":"Proc. Priv. Enhanc. Technol."},{"key":"21_CR17","unstructured":"Islam, M.S., Kuzu, M., Kantarcioglu, M.: Access pattern disclosure on searchable encryption: ramification, attack and mitigation. In: NDSS, vol. 20, p. 12 (2012)"},{"key":"21_CR18","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1007\/978-3-540-30115-8_22","volume-title":"Machine Learning: ECML 2004","author":"B Klimt","year":"2004","unstructured":"Klimt, B., Yang, Y.: The Enron corpus: a new dataset for email classification research. In: Boulicaut, J.-F., Esposito, F., Giannotti, F., Pedreschi, D. (eds.) ECML 2004. LNCS (LNAI), vol. 3201, pp. 217\u2013226. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-30115-8_22"},{"key":"21_CR19","doi-asserted-by":"crossref","unstructured":"Kuzu, M., Islam, M.S., Kantarcioglu, M.: Efficient similarity search over encrypted data. In: 2012 IEEE 28th International Conference on Data Engineering (ICDE), pp. 1156\u20131167. IEEE (2012)","DOI":"10.1109\/ICDE.2012.23"},{"key":"21_CR20","unstructured":"Lee, S., Shih, M.W., Gera, P., Kim, T., Kim, H., Peinado, M.: Inferring fine-grained control flow inside $$\\{$$SGX$$\\}$$ enclaves with branch shadowing. In: 26th $$\\{$$USENIX$$\\}$$ Security Symposium ($$\\{$$USENIX$$\\}$$ Security 2017), pp. 557\u2013574 (2017)"},{"key":"21_CR21","doi-asserted-by":"crossref","unstructured":"Lienhart, R., Maydt, J.: An extended set of Haar-like features for rapid object detection. In: 2002 Proceedings of the International Conference on Image Processing, vol. 1, pp. I\u2013900. IEEE (2002)","DOI":"10.1109\/ICIP.2002.1038171"},{"key":"21_CR22","doi-asserted-by":"crossref","unstructured":"Lu, W., Swaminathan, A., Varna, A.L., Wu, M.: Enabling search over encrypted multimedia databases. In: IS&T\/SPIE Electronic Imaging, p. 725418. International Society for Optics and Photonics (2009)","DOI":"10.1117\/12.806980"},{"key":"21_CR23","doi-asserted-by":"crossref","unstructured":"Mishra, P., Poddar, R., Chen, J., Chiesa, A., Popa, R.A.: Oblix: an efficient oblivious search index. In: 2018 IEEE Symposium on Security and Privacy (SP), pp. 279\u2013296. IEEE (2018)","DOI":"10.1109\/SP.2018.00045"},{"key":"21_CR24","doi-asserted-by":"crossref","unstructured":"Naveed, M., Kamara, S., Wright, C.V.: Inference attacks on property-preserving encrypted databases. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 644\u2013655. ACM (2015)","DOI":"10.1145\/2810103.2813651"},{"key":"21_CR25","unstructured":"Ohrimenko, O., et al.: Oblivious multi-party machine learning on trusted processors. In: 25th USENIX Security Symposium (USENIX Security 2016), pp. 619\u2013636. USENIX Association, Austin (2016)"},{"key":"21_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1007\/978-3-319-56620-7_10","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2017","author":"R Pass","year":"2017","unstructured":"Pass, R., Shi, E., Tram\u00e8r, F.: Formal abstractions for attested execution secure processors. In: Coron, J.-S., Nielsen, J.B. (eds.) EUROCRYPT 2017. LNCS, vol. 10210, pp. 260\u2013289. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-56620-7_10"},{"issue":"10","key":"21_CR27","doi-asserted-by":"publisher","first-page":"1090","DOI":"10.1109\/34.879790","volume":"22","author":"PJ Phillips","year":"2000","unstructured":"Phillips, P.J., Moon, H., Rizvi, S., Rauss, P.J., et al.: The FERET evaluation methodology for face-recognition algorithms. IEEE Trans. Pattern Anal. Mach. Intell. 22(10), 1090\u20131104 (2000)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"5","key":"21_CR28","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1016\/S0262-8856(97)00070-X","volume":"16","author":"PJ Phillips","year":"1998","unstructured":"Phillips, P.J., Wechsler, H., Huang, J., Rauss, P.J.: The FERET database and evaluation procedure for face-recognition algorithms. Image Vis. Comput. 16(5), 295\u2013306 (1998)","journal-title":"Image Vis. Comput."},{"key":"21_CR29","doi-asserted-by":"crossref","unstructured":"Porter, M.F.: An algorithm for suffix stripping. Program (2006)","DOI":"10.1108\/00330330610681286"},{"key":"21_CR30","doi-asserted-by":"crossref","unstructured":"Priebe, C., Vaswani, K., Costa, M.: EnclaveDB: a secure database using SGX. IEEE (2018)","DOI":"10.1109\/SP.2018.00025"},{"key":"21_CR31","doi-asserted-by":"crossref","unstructured":"Qin, Z., Yan, J., Ren, K., Chen, C.W., Wang, C.: Towards efficient privacy-preserving image feature extraction in cloud computing. In: Proceedings of the ACM International Conference on Multimedia, pp. 497\u2013506. ACM (2014)","DOI":"10.1145\/2647868.2654941"},{"key":"21_CR32","unstructured":"Rane, A., Lin, C., Tiwari, M.: Raccoon: closing digital side-channels through obfuscated execution. In: 24th USENIX Security Symposium (USENIX Security 2015), pp. 431\u2013446 (2015)"},{"key":"21_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/978-3-319-41483-6_14","volume-title":"Data and Applications Security and Privacy XXX","author":"F Shaon","year":"2016","unstructured":"Shaon, F., Kantarcioglu, M.: A practical framework for executing complex queries over encrypted multimedia data. In: Ranise, S., Swarup, V. (eds.) DBSec 2016. LNCS, vol. 9766, pp. 179\u2013195. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-41483-6_14"},{"key":"21_CR34","doi-asserted-by":"crossref","unstructured":"Shaon, F., Kantarcioglu, M., Lin, Z., Khan, L.: SGX-BigMatrix: a practical encrypted data analytic framework with trusted processors. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 1211\u20131228. ACM (2017)","DOI":"10.1145\/3133956.3134095"},{"key":"21_CR35","doi-asserted-by":"crossref","unstructured":"Sun, W., Zhang, R., Lou, W., Hou, Y.T.: Rearguard: secure keyword search using trusted hardware. In: IEEE INFORM (2018)","DOI":"10.1109\/INFOCOM.2018.8485838"},{"issue":"1","key":"21_CR36","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1162\/jocn.1991.3.1.71","volume":"3","author":"M Turk","year":"1991","unstructured":"Turk, M., Pentland, A.: Eigenfaces for recognition. J. Cogn. Neurosci. 3(1), 71\u201386 (1991)","journal-title":"J. Cogn. Neurosci."},{"key":"21_CR37","doi-asserted-by":"crossref","unstructured":"Viola, P., Jones, M.: Rapid object detection using a boosted cascade of simple features. In: Proceedings of the 2001 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, CVPR 2001, vol. 1, pp. I\u2013511. IEEE (2001)","DOI":"10.1109\/CVPR.2001.990517"},{"key":"21_CR38","unstructured":"Wikipedia contributors: Bitonic sorter \u2013 Wikipedia, the free encyclopedia. https:\/\/en.wikipedia.org\/w\/index.php?title=Bitonic_sorter&oldid=908641033. Accessed 20 Apr 2020"},{"issue":"6","key":"21_CR39","doi-asserted-by":"publisher","first-page":"71","DOI":"10.14257\/ijfgcn.2013.6.6.08","volume":"6","author":"Z Xia","year":"2013","unstructured":"Xia, Z., Zhu, Y., Sun, X., Wang, J.: A similarity search scheme over encrypted cloud images based on secure transformation. Int. J. Future Gener. Commun. Netw. 6(6), 71\u201380 (2013)","journal-title":"Int. J. Future Gener. Commun. Netw."},{"key":"21_CR40","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1016\/j.ins.2018.11.046","volume":"479","author":"H Yan","year":"2019","unstructured":"Yan, H., Chen, Z., Jia, C.: SSIR Secure similarity image retrieval in IoTD. Inf. Sci. 479, 153\u2013163 (2019)","journal-title":"Inf. Sci."},{"key":"21_CR41","unstructured":"Zheng, W., Dave, A., Beekman, J., Popa, R.A., Gonzalez, J., Stoica, I.: Opaque: a data analytics platform with strong security. In: 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2017). USENIX Association, Boston (2017)"}],"container-title":["Lecture Notes in Computer Science","Data and Applications Security and Privacy XXXIV"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-49669-2_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T21:19:13Z","timestamp":1723065553000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-49669-2_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030496685","9783030496692"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-49669-2_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"18 June 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DBSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP Annual Conference on Data and Applications Security and Privacy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Regensburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 June 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 June 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"34","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dbsec2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/dbsec2020.ur.de\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"39","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"14","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virutally due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}