{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T21:58:10Z","timestamp":1725832690105},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319261478"},{"type":"electronic","value":"9783319261485"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-26148-5_3","type":"book-chapter","created":{"date-parts":[[2015,10,14]],"date-time":"2015-10-14T05:50:57Z","timestamp":1444801857000},"page":"38-56","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["TrustedMR: A Trusted MapReduce System Based on Tamper Resistance Hardware"],"prefix":"10.1007","author":[{"given":"Quoc-Cuong","family":"To","sequence":"first","affiliation":[]},{"given":"Benjamin","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Philippe","family":"Pucheral","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,10,28]]},"reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Allard, T., Anciaux, N., Bouganim, L., Guo, Y., Le Folgoc, L., Nguyen, B., Pucheral, P., Ray, I., Ray, I., Yin, S.: Secure Personal Data Servers: a Vision Paper. VLDB, 25\u201335 (2010). Singapore","DOI":"10.14778\/1920841.1920850"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Allard, T., Nguyen, B., Pucheral, P.: METAP: Revisiting Privacy-Preserving Data Publishing using Secure Devices. DAPD (2013)","DOI":"10.1007\/s10619-013-7122-x"},{"key":"3_CR3","unstructured":"Anciaux, N., Bonnet, P., Bouganim, L., Nguyen, B., Popa, I.S., Pucheral, P.: Trusted cells: a sea change for personal data services. In: CIDR, USA (2013)"},{"key":"3_CR4","unstructured":"Arasu, A., Kaushik, R.: Oblivious query processing. In: ICDT (2014)"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Bajaj, S., Sion, R.: TrustedDB: a trusted hardware based database with privacy and data confidentiality. In: SIGMOD Conference 2011, pp. 205\u2013216 (2011)","DOI":"10.1145\/1989323.1989346"},{"key":"3_CR6","unstructured":"Blass, E., Noubir, G., Huu, T.V.: EPiC: Efficient Privacy-Preserving Counting for MapReduce. IACR Cryptology ePrint Archive, 452 (2012)"},{"key":"3_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1007\/978-3-642-31680-7_10","volume-title":"Privacy Enhancing Technologies","author":"E-O Blass","year":"2012","unstructured":"Blass, E.-O., Di Pietro, R., Molva, R., \u00d6nen, M.: PRISM \u2013 privacy-preserving search in MapReduce. In: Fischer-H\u00fcbner, S., Wright, M. (eds.) PETS 2012. LNCS, vol. 7384, pp. 180\u2013200. Springer, Heidelberg (2012)"},{"key":"3_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1007\/978-3-642-01001-9_13","volume-title":"Advances in Cryptology - EUROCRYPT 2009","author":"A Boldyreva","year":"2009","unstructured":"Boldyreva, A., Chenette, N., Lee, Y., O\u2019Neill, A.: Order-preserving symmetric encryption. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 224\u2013241. Springer, Heidelberg (2009)"},{"issue":"1","key":"3_CR9","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1145\/1053283.1053289","volume":"8","author":"A Ceselli","year":"2005","unstructured":"Ceselli, A., Damiani, E., De Capitani di Vimercati, S., Jajodia, S., Paraboschi, S., Samarati, P.: Modeling and assessing inference exposure in encrypted databases. ACM TISSEC 8(1), 119\u2013152 (2005)","journal-title":"ACM TISSEC"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Damiani, E., Capitani Vimercati, S., Jajodia, S., Paraboschi, S., Samarati, P.: Balancing confidentiality and efficiency in untrusted relational DBMSs. In: CCS, pp. 93\u2013102 (2003)","DOI":"10.1145\/948121.948124"},{"issue":"1","key":"3_CR11","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1145\/1327452.1327492","volume":"51","author":"J Dean","year":"2008","unstructured":"Dean, J., Ghemawat, S.: MapReduce: Simplified Data Processing on Large Clusters. Commun. ACM 51(1), 107\u2013113 (2008)","journal-title":"Commun. ACM"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Gentry, C.: Fully homomorphic encryption using ideal lattices. In: STOC, pp. 169\u2013178 (2009)","DOI":"10.1145\/1536414.1536440"},{"issue":"11","key":"3_CR13","first-page":"1111","volume":"4","author":"H Herodotou","year":"2011","unstructured":"Herodotou, H., Babu, S.: Profiling, What-if Analysis, and Cost-based Optimization of MapReduce Programs. PVLDB 4(11), 1111\u20131122 (2011)","journal-title":"PVLDB"},{"issue":"2","key":"3_CR14","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1016\/0022-0000(84)90070-9","volume":"28","author":"S Goldwasser","year":"1984","unstructured":"Goldwasser, S., Micali, S.: Probabilistic encryption. Journal of Computer and System Sciences 28(2), 270\u2013299 (1984)","journal-title":"Journal of Computer and System Sciences"},{"issue":"2","key":"3_CR15","doi-asserted-by":"publisher","first-page":"653","DOI":"10.1109\/TCE.2007.381742","volume":"53","author":"HY Lam","year":"2007","unstructured":"Lam, H.Y., Fung, G.S.K., Lee, W.K.: A Novel Method to Construct Taxonomy Electrical Appliances Based on Load Signatures. IEEE Transactions on Consumer Electronics 53(2), 653\u2013660 (2007)","journal-title":"IEEE Transactions on Consumer Electronics"},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"Mun, M., Hao, S., Mishra, N., et al.: Personal data vaults: a locus of control for personal data streams. In: Proc. of the 6th Int. Conf on Emerging Networking Experiments and Technologies (Co-NEXT 2010), New York, USA, December 2010","DOI":"10.1145\/1921168.1921191"},{"issue":"4","key":"3_CR17","first-page":"5","volume":"35","author":"Y-A Montjoye de","year":"2012","unstructured":"de Montjoye, Y.-A., Wang, S.S., Pentland, A.: On the Trusted Use of Large-Scale Personal Data. IEEE Data Eng. Bull. 35(4), 5\u20138 (2012)","journal-title":"IEEE Data Eng. Bull."},{"key":"3_CR18","doi-asserted-by":"crossref","unstructured":"Popa, R.A., Redfield, C.M.S., Zeldovich, N., et al.: CryptDB: protecting confidentiality with encrypted query processing. In: SOSP, pp 85\u2013100 (2011)","DOI":"10.1145\/2043556.2043566"},{"key":"3_CR19","unstructured":"Roy, I., Setty, S., Kilzer, A., Shmatikov, V., Witchel, E.: Airavat: security and privacy for MapReduce. In: USENIX NSDI, pp. 297\u2013312 (2010)"},{"key":"3_CR20","doi-asserted-by":"crossref","unstructured":"Hacigumus, H., Iyer, B., Li, C., Mehrotra, S.: Executing SQL over encrypted data in database service provider model. In: ACM SIGMOD, Wisconsin, pp. 216\u2013227 (2002)","DOI":"10.1145\/564716.564717"},{"key":"3_CR21","unstructured":"To, Q.C., Nguyen, B., Pucheral, P.: Privacy-preserving query execution using a decentralized architecture and tamper resistant hardware. In: EDBT, pp. 487\u2013498 (2014)"},{"key":"3_CR22","doi-asserted-by":"crossref","unstructured":"Tu, S., Kaashoek, M.F., Madden, S., Zeldovich, N.: Processing analytical queries over encrypted data. In: PVLDB, pp 289\u2013300 (2013)","DOI":"10.14778\/2535573.2488336"},{"key":"3_CR23","doi-asserted-by":"crossref","unstructured":"Wei, W., Du, J., Yu, T., Gu, X.: SecureMR: a service integrity assurance framework for MapReduce. In: ACSAC, pp. 73\u201382 (2009)","DOI":"10.1109\/ACSAC.2009.17"},{"key":"3_CR24","doi-asserted-by":"crossref","unstructured":"Zhang, K., Zhou, X., Chen, Y., Wang, X., Ruan, Y.: Sedic: privacy-aware data intensive computing on hybrid clouds. In: CCS, pp. 515\u2013526 (2011)","DOI":"10.1145\/2046707.2046767"},{"key":"3_CR25","doi-asserted-by":"crossref","unstructured":"Zhang, C., Chang, E., Yap, R.: Tagged-MapReduce: a general framework for secure computing with mixed-sensitivity data on hybrid clouds. In: CCGrid, pp 31\u201340 (2014)","DOI":"10.1109\/CCGrid.2014.96"},{"issue":"2","key":"3_CR26","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1109\/TPDS.2013.48","volume":"25","author":"X Zhang","year":"2014","unstructured":"Zhang, X., Yang, L.T., Liu, C., Chen, J.: A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using MapReduce on Cloud. IEEE Transactions on Parallel and Distributed Systems 25(2), 363\u2013373 (2014)","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"issue":"6","key":"3_CR27","doi-asserted-by":"publisher","first-page":"1192","DOI":"10.1109\/TPDS.2012.238","volume":"24","author":"X Zhang","year":"2013","unstructured":"Zhang, X., Liu, C., Nepal, S., Pandey, S., Chen, J.: A Privacy Leakage Upper-bound Constraint based Approach for Cost-effective Privacy Preserving of Intermediate Datasets in Cloud. IEEE Transactions on Parallel and Distributed Systems 24(6), 1192\u20131202 (2013)","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"3_CR28","unstructured":"Directive 95\/46\/EC of the European Parliament and of the Council of October 24, 1995 on the protection of individuals with regard to the processing of personal data. Official Journal of the EC, 23 (1995)"},{"key":"3_CR29","doi-asserted-by":"crossref","unstructured":"Wang, J., Wang, Z.: A Survey on Personal Data Cloud. The Scientific World Journal (2014)","DOI":"10.1155\/2014\/969150"},{"key":"3_CR30","doi-asserted-by":"crossref","unstructured":"Katz, J., Lindell, Y.: Introduction to Modern Cryptography: Principles and Protocols. Chapman and Hall\/CRC (2007)","DOI":"10.1201\/9781420010756"},{"key":"3_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1007\/978-3-540-74143-5_30","volume-title":"Advances in Cryptology - CRYPTO 2007","author":"M Bellare","year":"2007","unstructured":"Bellare, M., Boldyreva, A., O\u2019Neill, A.: Deterministic and efficiently searchable encryption. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 535\u2013552. Springer, Heidelberg (2007)"},{"key":"3_CR32","doi-asserted-by":"crossref","unstructured":"Arasu, A., Eguro, K., Kaushik, R., Ramamurthy, R.: Querying encrypted data (tutorial). In: ACM SIGMOD Conference (2014)","DOI":"10.1145\/2588555.2588893"}],"container-title":["Lecture Notes in Computer Science","On the Move to Meaningful Internet Systems: OTM 2015 Conferences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-26148-5_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T06:02:21Z","timestamp":1559282541000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-26148-5_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319261478","9783319261485"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-26148-5_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"28 October 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}