{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T22:45:56Z","timestamp":1742942756873,"version":"3.40.3"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031157769"},{"type":"electronic","value":"9783031157776"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-15777-6_15","type":"book-chapter","created":{"date-parts":[[2022,8,23]],"date-time":"2022-08-23T15:24:33Z","timestamp":1661268273000},"page":"261-280","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Repetitive, Oblivious, and\u00a0Unlinkable SkNN Over\u00a0Encrypted-and-Updated Data on\u00a0Cloud"],"prefix":"10.1007","author":[{"given":"Meng","family":"Li","sequence":"first","affiliation":[]},{"given":"Mingwei","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Jianbo","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Chhagan","family":"Lal","sequence":"additional","affiliation":[]},{"given":"Mauro","family":"Conti","sequence":"additional","affiliation":[]},{"given":"Mamoun","family":"Alazab","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,24]]},"reference":[{"key":"15_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1007\/978-3-030-90567-5_10","volume-title":"Information Security and Privacy","author":"X Liu","year":"2021","unstructured":"Liu, X., He, K., Yang, G., Susilo, W., Tonien, J., Huang, Q.: Broadcast authenticated encryption with\u00a0keyword search. In: Baek, J., Ruj, S. (eds.) ACISP 2021. LNCS, vol. 13083, pp. 193\u2013213. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-90567-5_10"},{"issue":"7","key":"15_CR2","doi-asserted-by":"publisher","first-page":"1791","DOI":"10.1109\/TIFS.2018.2885282","volume":"14","author":"Y Luo","year":"2019","unstructured":"Luo, Y., Jia, X., Fu, S., Xu, M.: pRide: privacy-preserving ride matching over road networks for online ride-hailing service. IEEE Trans. Inf. Forensics Secur. (TIFS) 14(7), 1791\u20131802 (2019)","journal-title":"IEEE Trans. Inf. Forensics Secur. (TIFS)"},{"issue":"4","key":"15_CR3","doi-asserted-by":"publisher","first-page":"703","DOI":"10.1109\/TDSC.2018.2850780","volume":"17","author":"L Zhu","year":"2020","unstructured":"Zhu, L., Li, M., Zhang, Z., Qin, Z.: ASAP: an anonymous smart-parking and payment scheme in vehicular networks. IEEE Trans. Dependable Secure Comput. (TDSC) 17(4), 703\u2013715 (2020). https:\/\/doi.org\/10.1109\/TDSC.2018.2850780","journal-title":"IEEE Trans. Dependable Secure Comput. (TDSC)"},{"issue":"1","key":"15_CR4","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1109\/TDSC.2019.2892150","volume":"18","author":"X Zhu","year":"2021","unstructured":"Zhu, X., Ayday, E., Vitenberg, R.: A privacy-preserving framework for outsourcing location-based services to the cloud. IEEE Trans. Dependable Secure Comput. (TDSC) 18(1), 384\u2013399 (2021)","journal-title":"IEEE Trans. Dependable Secure Comput. (TDSC)"},{"key":"15_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"584","DOI":"10.1007\/978-3-030-55304-3_30","volume-title":"Information Security and Privacy","author":"A Damodaran","year":"2020","unstructured":"Damodaran, A., Rial, A.: Unlinkable updatable databases and oblivious transfer with access control. In: Liu, J.K., Cui, H. (eds.) ACISP 2020. LNCS, vol. 12248, pp. 584\u2013604. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-55304-3_30"},{"key":"15_CR6","doi-asserted-by":"publisher","unstructured":"Li, M., Chen, Y., Zheng, S., Hu, D., Lal, C., Conti, M.: Privacy-preserving navigation supporting similar queries in vehicular networks. IEEE Trans. Dependable Secure Comput. (TDSC), 99(2), 1\u201311. https:\/\/doi.org\/10.1109\/TDSC.2020.3017534","DOI":"10.1109\/TDSC.2020.3017534"},{"key":"15_CR7","unstructured":"Danger within: defending cloud environments against insider threats (2018). https:\/\/www.cloudcomputing-news.net\/news\/2018\/may\/01\/danger-within-defending-cloud-environments-against-insider-threats"},{"key":"15_CR8","unstructured":"7 Most Infamous Cloud Security Breaches (2017). https:\/\/blog.storagecraft.com\/7-infamous-cloud-security-breaches"},{"key":"15_CR9","unstructured":"Yao, B., Li, F., Xiao, X.: Secure nearest neighbor revisited. In: Proceeding 29th IEEE International Conference on Data Engineering (ICDE), April, pp. 733\u2013744, Brisbane, Australia (2013)"},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"Elmehdwi, Y., Samanthula, B.K., Jiang, W.: Secure k-nearest neighbor query over encrypted data in outsourced environments. In: Proceeding IEEE 30th International Conference on Data Engineering (ICDE), pp. 664\u2013675, Chicago, USA (2014)","DOI":"10.1109\/ICDE.2014.6816690"},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Lei, X., Liu, A. X., Li, R., Tu, G.-H.: SecEQP: a secure and efficient scheme for SkNN query problem over encrypted geodata on cloud. In: Proceeding 35th IEEE International Conference on Data Engineering (ICDE), April, pp. 662\u2013673, Macao, China (2019)","DOI":"10.1109\/ICDE.2019.00065"},{"key":"15_CR12","doi-asserted-by":"crossref","unstructured":"Cui, N., Yang, X., Wang, B., Li, J., Wang, G.: SVkNN: efficient secure and verifiable k-nearest neighbor query on the cloud platform. In: Proceeding 36th IEEE International Conference on Data Engineering (ICDE), April, pp. 253\u2013264, Dallas, USA (2020)","DOI":"10.1109\/ICDE48307.2020.00029"},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"Li, R., Liu, A., Wang, A. L., Bruhadeshwar, B.: Fast range query processing with strong privacy protection for cloud computing. In: Proceeding 40th International Conference on Very Large Data Bases (VLDB), September, pp. 1953\u20131964, Hangzhou, China (2014)","DOI":"10.14778\/2733085.2733100"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"Li, R., Liu, A.X.: Adaptively secure conjunctive query processing over encrypted data for cloud computing. In: Proceeding IEEE 33rd International Conference on Data Engineering (ICDE), April, pp. 697\u2013708, San Diego, USA (2017)","DOI":"10.1109\/ICDE.2017.122"},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"Wu, S., Li, Q., Li, G., Yuan, D., Yuan, X., Wang, C.: ServeDB: secure, verifiable, and efficient range queries on outsourced database. In: Proceeding IEEE 35th International Conference on Data Engineering (ICDE), April, pp. 626\u2013637, Macao, China (2019)","DOI":"10.1109\/ICDE.2019.00062"},{"key":"15_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"350","DOI":"10.1007\/978-3-030-61078-4_20","volume-title":"Information and Communications Security","author":"Y Chen","year":"2020","unstructured":"Chen, Y., Li, M., Zheng, S., Hu, D., Lal, C., Conti, M.: One-time, oblivious, and unlinkable query processing over encrypted data on cloud. In: Meng, W., Gollmann, D., Jensen, C.D., Zhou, J. (eds.) ICICS 2020. LNCS, vol. 12282, pp. 350\u2013365. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-61078-4_20"},{"key":"15_CR17","unstructured":"Poutinsev, F.: Unfair search engine ranking results (2021). https:\/\/honestproscons.com\/unfair-search-engine-ranking-results. Honest Pros and Cons (HPC)"},{"key":"15_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/3-540-48910-X_16","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 1999","author":"P Paillier","year":"1999","unstructured":"Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223\u2013238. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48910-X_16"},{"key":"15_CR19","doi-asserted-by":"crossref","unstructured":"Liu, A.X., Chen, F.: Collaborative enforcement of firewall policies in virtual private networks. In: Proceeding 27th ACM Symposium on Principles of Distributed Computing (PODC), August, pp. 95-104, Toronto, Canada (2008)","DOI":"10.1145\/1400751.1400766"},{"issue":"8","key":"15_CR20","doi-asserted-by":"publisher","first-page":"3141","DOI":"10.1109\/TKDE.2019.2963312","volume":"33","author":"Y Cao","year":"2021","unstructured":"Cao, Y., Xiao, Y., Xiong, L., Bai, L., Yoshikawa, M.: Protecting spatiotemporal event privacy in continuous location-based services. IEEE Trans. Knowl. Data Eng. (TKDE) 33(8), 3141\u20133154 (2021)","journal-title":"IEEE Trans. Knowl. Data Eng. (TKDE)"},{"key":"15_CR21","doi-asserted-by":"crossref","unstructured":"Canetti, R., Feige, U., Goldreich, O., Naor, M.: Adaptively secure multi-party computation. In: Proceeding 28th ACM Symposium on Theory of Computing (STOC), May, pp. 639\u2013648, Philadelphia, USA (1996)","DOI":"10.1145\/237814.238015"},{"key":"15_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"578","DOI":"10.1007\/978-3-642-22792-9_33","volume-title":"Advances in Cryptology \u2013 CRYPTO 2011","author":"A Boldyreva","year":"2011","unstructured":"Boldyreva, A., Chenette, N., O\u2019Neill, A.: Order-preserving encryption revisited: improved security analysis and alternative solutions. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 578\u2013595. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-22792-9_33"},{"key":"15_CR23","doi-asserted-by":"crossref","unstructured":"Kamara, S., Papamanthou, C., Roeder, T.: Dynamic searchable symmetric encryption. In: Proceeding 19th ACM Conference on Computer and Communications Security (CCS), October, pp. 965\u2013976, Raleigh, USA (2012)","DOI":"10.1145\/2382196.2382298"},{"key":"15_CR24","doi-asserted-by":"crossref","unstructured":"Cash, D., et al.: Dynamic searchable encryption in very-large databases: data structures and implementation. In: Proceeding 21st Annual Network and Distributed System Security Symposium (NDSS), February, pp. 1-16, San Diego, USA (2014)","DOI":"10.14722\/ndss.2014.23264"},{"key":"15_CR25","doi-asserted-by":"publisher","unstructured":"Li, M., Chen, Y., Lal, C., Conti, M., Alazab, M., Hu, D.: Eunomia: anonymous and secure vehicular digital forensics based on blockchain. IEEE Trans. Dependable Secure Comput. (TDSC), 1 (2021). https:\/\/doi.org\/10.1109\/TDSC.2021.3130583","DOI":"10.1109\/TDSC.2021.3130583"},{"key":"15_CR26","doi-asserted-by":"publisher","unstructured":"Li, M., Zhu, L., Zhang, Z., Lal, C., Conti, M., Alazab, M. : User-defined privacy-preserving traffic monitoring against n-by-1 jamming attack. IEEE\/ACM Trans. Networking (TON), p. 1 (2022). https:\/\/doi.org\/10.1109\/TNET.2022.3157654","DOI":"10.1109\/TNET.2022.3157654"},{"issue":"4","key":"15_CR27","doi-asserted-by":"publisher","first-page":"4434","DOI":"10.1109\/TNSM.2021.3098439","volume":"18","author":"M Li","year":"2021","unstructured":"Li, M., Zhu, L., Zhang, Z., Lal, C., Conti, M., Alazab, M.: Anonymous and verifiable reputation system for E-commerce platforms based on blockchain. IEEE Trans. Network Serv. Manag. (TNSM) 18(4), 4434\u20134449 (2021). https:\/\/doi.org\/10.1109\/TNSM.2021.3098439","journal-title":"IEEE Trans. Network Serv. Manag. (TNSM)"},{"issue":"10","key":"15_CR28","doi-asserted-by":"publisher","first-page":"6564","DOI":"10.1109\/TII.2020.2974537","volume":"16","author":"M Li","year":"2020","unstructured":"Li, M., Hu, D., Lal, C., Conti, M., Zhang, Z.: Blockchain-enabled secure energy trading with verifiable fairness in industrial internet of things. IEEE Trans. Ind. Inf. (TII) 16(10), 6564\u20136574 (2020). https:\/\/doi.org\/10.1109\/TII.2020.2974537","journal-title":"IEEE Trans. Ind. Inf. (TII)"},{"key":"15_CR29","doi-asserted-by":"publisher","unstructured":"Li, M., Zhu, L., Zhang, Z., Lal, C., Conti, M., Martinelli, F.: Privacy for 5G-supported vehicular networks. IEEE Open J. Commun. Soc. (OJ-COMS), 2, 1935\u20131956 (2021). https:\/\/doi.org\/10.1109\/OJCOMS.2021.3103445","DOI":"10.1109\/OJCOMS.2021.3103445"},{"key":"15_CR30","doi-asserted-by":"crossref","unstructured":"Szydlo, M.: Merkle tree traversal in log space and time. In: Proceeding 10th International Conference on the Theory and Applications of Cryptographic Techniques (Eurocrypt), May, pp. 541\u2013554, Interlaken, Switzerland (2004)","DOI":"10.1007\/978-3-540-24676-3_32"},{"key":"15_CR31","unstructured":"Yelp Open Dataset. https:\/\/www.yelp.com\/dataset"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-15777-6_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T17:06:59Z","timestamp":1709831219000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-15777-6_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031157769","9783031157776"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-15777-6_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"24 August 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}