{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T09:56:14Z","timestamp":1743069374288,"version":"3.40.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031771521"},{"type":"electronic","value":"9783031771538"}],"license":[{"start":{"date-parts":[[2024,11,16]],"date-time":"2024-11-16T00:00:00Z","timestamp":1731715200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,16]],"date-time":"2024-11-16T00:00:00Z","timestamp":1731715200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-77153-8_5","type":"book-chapter","created":{"date-parts":[[2024,11,15]],"date-time":"2024-11-15T04:34:51Z","timestamp":1731645291000},"page":"46-55","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Privacy Preserving Adjacency Query Supporting Homoionym Search over\u00a0Medical Graph Data in\u00a0Cloud Computing"],"prefix":"10.1007","author":[{"given":"Hourong","family":"Li","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yun","family":"Tian","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Bin","family":"Wu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jiaoli","family":"Shi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2024,11,16]]},"reference":[{"issue":"1","key":"5_CR1","doi-asserted-by":"publisher","first-page":"1026","DOI":"10.1109\/TCC.2021.3129000","volume":"11","author":"J Sampe","year":"2023","unstructured":"Sampe, J., Artigas, M.S., Vernik, G., et al.: Outsourcing data processing jobs with Lithops. IEEE Trans. Cloud Comput. 11(1), 1026\u20131037 (2023)","journal-title":"IEEE Trans. Cloud Comput."},{"issue":"1","key":"5_CR2","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1109\/TDSC.2020.3015886","volume":"19","author":"J Li","year":"2022","unstructured":"Li, J., Ye, H., et al.: Efficient and secure outsourcing of differentially private data publishing with multiple evaluators. IEEE Trans. Dependable Sec. Comput. 19(1), 109\u2013121 (2022)","journal-title":"IEEE Trans. Dependable Sec. Comput."},{"issue":"3","key":"5_CR3","first-page":"2058","volume":"23","author":"Y Ren","year":"2023","unstructured":"Ren, Y., Song, Z., Sun, S., et al.: Outsourcing lda-based face recognition to an untrusted cloud. IEEE Trans. Dependable Sec. Comput. 23(3), 2058\u20132070 (2023)","journal-title":"IEEE Trans. Dependable Sec. Comput."},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Liu, W., Wen, D., Wang, H., et al.: Skyline nearest neighbor search on multi-layer graphs. In: 2014 IEEE 35th International Conference on Data Engineering Workshops, pp. 259-265. IEEE, Piscataway, N.J., USA (2019)","DOI":"10.1109\/ICDEW.2019.000-3"},{"issue":"1","key":"5_CR5","doi-asserted-by":"publisher","first-page":"997","DOI":"10.14778\/1920841.1920967","volume":"3","author":"M Potamias","year":"2010","unstructured":"Potamias, M., Bonchi, F., Gionis, A., et al.: K-nearest neighbors in uncertain graphs. Proc\/ VLDB Endowment 3(1), 997\u20131008 (2010)","journal-title":"Proc\/ VLDB Endowment"},{"issue":"6","key":"5_CR6","doi-asserted-by":"publisher","first-page":"6984","DOI":"10.1109\/TPAMI.2020.3005590","volume":"45","author":"R Wang","year":"2023","unstructured":"Wang, R., Yan, J., Yang, X., et al.: Combinatorial learning of robust deep graph matching: an embedding based approach. IEEE Trans. Pattern Anal. Mach. Intell. 45(6), 6984\u20137000 (2023)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"5_CR7","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1016\/j.tcs.2018.10.011","volume":"769","author":"C Bazgan","year":"2019","unstructured":"Bazgan, C., Pontoizeau, T., Tuza, Z., et al.: Finding a potential community in networks. Theoret. Comput. Sci. 769, 32\u201342 (2019)","journal-title":"Theoret. Comput. Sci."},{"issue":"4","key":"5_CR8","doi-asserted-by":"publisher","first-page":"2759","DOI":"10.1109\/TNSE.2022.3169220","volume":"9","author":"P Ferrer-Cid","year":"2023","unstructured":"Ferrer-Cid, P., Barcel\u00f3-Ordinas, J., Garc\u00eda-Vidal, J., et al.: Volterra graph-based outlier detection for air pollution sensor networks. IEEE Trans. Netw. Sci. Eng. 9(4), 2759\u20132771 (2023)","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"issue":"1","key":"5_CR9","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1109\/TDSC.2020.3015886","volume":"19","author":"X Li","year":"2022","unstructured":"Li, X., Ye, H., Li, T., et al.: Efficient and secure outsourcing of differentially private data publishing with multiple evaluators. IEEE Trans. Dependable Secure Comput. 19(1), 67\u201376 (2022)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"1","key":"5_CR10","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1109\/TSC.2019.2942297","volume":"15","author":"X Zhang","year":"2022","unstructured":"Zhang, X., Zhao, J., Xu, C., et al.: DOPIV: post-quantum secure identity-based data outsourcing with public integrity verification in cloud storage. IEEE Trans. Serv. Comput. 15(1), 334\u2013345 (2022)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"5_CR11","unstructured":"Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceeding: IEEE Symposium on Security and Privacy (S &P 2000), vol. 2000, pp. 44\u201355. IEEE: Los Alamitos, CA, USA (2000)"},{"key":"5_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1007\/11496137_30","volume-title":"Applied Cryptography and Network Security","author":"Y-C Chang","year":"2005","unstructured":"Chang, Y.-C., Mitzenmacher, M.: Privacy preserving keyword searches on remote encrypted data. In: Ioannidis, J., Keromytis, A., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 442\u2013455. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11496137_30"},{"key":"5_CR13","unstructured":"Goh, E.J.: Secure indexes. In: Cryptology ePrint Archive, Report 2003\/216 (2003)"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Curtmola, R., Garay, J., Kamara, S., et al.: Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS 2006), pp. 79-88. ACM, Alexandria, VA, United States (2006)","DOI":"10.1145\/1180405.1180417"},{"key":"5_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1249","DOI":"10.1007\/978-3-540-69839-5_96","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2008","author":"J Baek","year":"2008","unstructured":"Baek, J., Safavi-Naini, R., Susilo, W.: Public key encryption with keyword search revisited. In: Gervasi, O., Murgante, B., Lagan\u00e0, A., Taniar, D., Mun, Y., Gavrilova, M.L. (eds.) ICCSA 2008. LNCS, vol. 5072, pp. 1249\u20131259. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-69839-5_96"},{"key":"5_CR16","doi-asserted-by":"crossref","unstructured":"Cao, N., Wang, C., Li, M., et al.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. In: IEEE Conference on Computer Communications (INFOCOM 2011), pp. 829-837. IEEE: Shanghai, China (2011)","DOI":"10.1109\/INFCOM.2011.5935306"},{"key":"5_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2024.102343","volume":"122","author":"Z Mei","year":"2024","unstructured":"Mei, Z., Yu, J., Zhang, C., et al.: Secure multi-dimensional data retrieval with access control and range query in the cloud. Inf. Syst. 122, 102343 (2024)","journal-title":"Inf. Syst."},{"key":"5_CR18","doi-asserted-by":"crossref","unstructured":"Wang, C., Ren, K., Yu, S., et al. Achieving usable and privacy-assured similarity search over outsourced cloud data. In: IEEE Conference on Computer Communications (INFOCOM 2012), pp. 451-459. IEEE: Orlando, FL, USA (2012)","DOI":"10.1109\/INFCOM.2012.6195784"},{"key":"5_CR19","doi-asserted-by":"crossref","unstructured":"Chase, M., Kamara, S., et al.: Structured encryption and controlled disclosure. structured encryption and controlled disclosure. Cryptol. Inform. Sec. 2010, 577-594 (2010)","DOI":"10.1007\/978-3-642-17373-8_33"},{"key":"5_CR20","doi-asserted-by":"crossref","unstructured":"Cao, N., Yang, Z., Wang, C., et al.: Privacy-preserving query over encrypted graph-structured data in cloud computing. In: Proceedings of the 2011 31st International Conference on Distributed Computing Systems (ICDCS 2011), pp. 393 - 402. IEEE, Los Alamitos, CA, USA (2011)","DOI":"10.1109\/ICDCS.2011.84"},{"key":"5_CR21","doi-asserted-by":"publisher","first-page":"940","DOI":"10.1109\/TIFS.2017.2774451","volume":"13","author":"M Shen","year":"2018","unstructured":"Shen, M., Ma, B., Zhu, L., et al.: Cloud-based approximate constrained shortest distance queries over encrypted graphs with privacy protection. IEEE Trans. Inf. Forensics Secur. 13, 940\u2013953 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"5_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1007\/978-3-030-49669-2_20","volume-title":"Data and Applications Security and Privacy XXXIV","author":"R Ciucanu","year":"2020","unstructured":"Ciucanu, R., Lafourcade, P.: $$\\sf GOOSE$$: a secure framework for graph outsourcing and SPARQL evaluation. In: Singhal, A., Vaidya, J. (eds.) DBSec 2020. LNCS, vol. 12122, pp. 347\u2013366. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-49669-2_20"},{"key":"5_CR23","doi-asserted-by":"crossref","unstructured":"Katz, J., Lindell, Y.: Introduction to Modern Cryptography. Chapman & Hall\/CRC (2007)","DOI":"10.1201\/9781420010756"},{"issue":"4","key":"5_CR24","first-page":"35","volume":"24","author":"A Singhal","year":"2001","unstructured":"Singhal, A.: Modern information retrieval: a brief overview. Bull. IEEE Comput. Soc. Tech. Committee Data Eng. 24(4), 35\u201343 (2001)","journal-title":"Bull. IEEE Comput. Soc. Tech. Committee Data Eng."},{"issue":"1","key":"5_CR25","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1080\/15427951.2009.10129177","volume":"6","author":"J Leskovec","year":"2009","unstructured":"Leskovec, J., Lang, K.J., Dasgupta, A., et al.: Community structure in large networks: natural cluster sizes and the absence of large well-defined clusters. Internet Math. 6(1), 29\u2013123 (2009)","journal-title":"Internet Math."},{"key":"5_CR26","unstructured":"Klimt, B., Yang, Y.: Introducing the Enron corpus. In: First Conference on Email and Anti-Spam (CEAS 2004), pp. 1-2. Google, Microsoft, etc.: Mountain View, CA, USA (2004)"}],"container-title":["Lecture Notes in Computer Science","CLOUD Computing \u2013 CLOUD 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-77153-8_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,15]],"date-time":"2024-11-15T05:11:23Z","timestamp":1731647483000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-77153-8_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,16]]},"ISBN":["9783031771521","9783031771538"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-77153-8_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,11,16]]},"assertion":[{"value":"16 November 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CLOUD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cloud Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bangkok","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Thailand","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 November 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cloud2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.servicessociety.org\/cloud","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}