{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T17:59:30Z","timestamp":1772906370957,"version":"3.50.1"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319557526","type":"print"},{"value":"9783319557533","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-55753-3_35","type":"book-chapter","created":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T03:38:10Z","timestamp":1490067490000},"page":"559-575","source":"Crossref","is-referenced-by-count":17,"title":["Fast Multi-dimensional Range Queries on Encrypted Cloud Databases"],"prefix":"10.1007","author":[{"given":"Jialin","family":"Chi","sequence":"first","affiliation":[]},{"given":"Cheng","family":"Hong","sequence":"additional","affiliation":[]},{"given":"Min","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Zhenfeng","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,22]]},"reference":[{"key":"35_CR1","doi-asserted-by":"crossref","unstructured":"Hacigumus, H., Iyer, B., Mehrotra, S.: Providing database as a service. In: ICDE, pp. 29\u201338 (2002)","DOI":"10.1109\/ICDE.2002.994695"},{"key":"35_CR2","unstructured":"Amazon Web Services. https:\/\/aws.amazon.com"},{"key":"35_CR3","unstructured":"Microsoft Azure. https:\/\/azure.microsoft.com"},{"key":"35_CR4","unstructured":"Google Fires Engineer for Privacy Breach. http:\/\/edition.cnn.com\/2010\/TECH\/web\/09\/15\/google.privacy.firing"},{"key":"35_CR5","unstructured":"Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: S&P, pp. 44\u201355 (2000)"},{"issue":"1","key":"35_CR6","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1109\/TPDS.2013.45","volume":"25","author":"N Cao","year":"2014","unstructured":"Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 25(1), 222\u2013233 (2014)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"35_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1007\/978-3-319-48740-3_32","volume-title":"Web Information Systems Engineering \u2013 WISE 2016","author":"C Hong","year":"2016","unstructured":"Hong, C., Li, Y., Zhang, M., Feng, D.: Fast multi-keywords search over encrypted cloud data. In: Cellary, W., Mokbel, M.F., Wang, J., Wang, H., Zhou, R., Zhang, Y. (eds.) WISE 2016. LNCS, vol. 10041, pp. 433\u2013446. Springer, Cham (2016). doi: 10.1007\/978-3-319-48740-3_32"},{"key":"35_CR8","doi-asserted-by":"crossref","unstructured":"Hacigumus, H., Iyer, B., Li, C., Mehrotra, S.: Executing SQL over encrypted data in the database-service-provider model. In: SIGMOD, pp. 216\u2013227 (2002)","DOI":"10.1145\/564691.564717"},{"key":"35_CR9","doi-asserted-by":"crossref","unstructured":"Li, R., Liu, A.X., Wang, A.L., Bruhadeshwar, B.: Fast range query processing with strong privacy protection for cloud computing. In: VLDB, pp. 1953\u20131964 (2014)","DOI":"10.14778\/2733085.2733100"},{"key":"35_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/978-3-319-26187-4_5","volume-title":"Web Information Systems Engineering \u2013 WISE 2015","author":"J Chi","year":"2015","unstructured":"Chi, J., Hong, C., Zhang, M., Zhang, Z.: Privacy-enhancing range query processing over encrypted cloud databases. In: Wang, J., Cellary, W., Wang, D., Wang, H., Chen, S.-C., Li, T., Zhang, Y. (eds.) WISE 2015. LNCS, vol. 9419, pp. 63\u201377. Springer, Cham (2015). doi: 10.1007\/978-3-319-26187-4_5"},{"key":"35_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1007\/978-3-540-70936-7_29","volume-title":"Theory of Cryptography","author":"D Boneh","year":"2007","unstructured":"Boneh, D., Waters, B.: Conjunctive, subset, and range queries on encrypted data. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 535\u2013554. Springer, Heidelberg (2007). doi: 10.1007\/978-3-540-70936-7_29"},{"key":"35_CR12","doi-asserted-by":"crossref","unstructured":"Shi, E., Bethencourt, J., Chan, T.H.H., Song, D., Perrig, A.: Multi-dimensional range query over encrypted data. In: S&P, pp. 350\u2013364 (2007)","DOI":"10.1109\/SP.2007.29"},{"key":"35_CR13","unstructured":"Lu, Y.: Privacy-preserving logarithmic-time search on encrypted data in cloud. In: NDSS (2012)"},{"key":"35_CR14","doi-asserted-by":"crossref","unstructured":"Wang, B., Hou, Y., Li, M., Wang, H., Li, H.: Maple: scalable multi-dimensional range search over encrypted cloud data with tree-based index. In: AsiaCCS, pp. 111\u2013122 (2014)","DOI":"10.1145\/2590296.2590305"},{"issue":"4","key":"35_CR15","doi-asserted-by":"crossref","first-page":"704","DOI":"10.1109\/TIFS.2015.2506145","volume":"11","author":"B Wang","year":"2016","unstructured":"Wang, B., Li, M., Wang, H.: Geometric range search on encrypted spatial data. IEEE Trans. Inf. Forensics Secur. 11(4), 704\u2013719 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"35_CR16","doi-asserted-by":"crossref","unstructured":"Wang, P., Ravishankar, C.V.: Secure and efficient range queries on outsourced databases using R-trees. In: ICDE, pp. 314\u2013325 (2013)","DOI":"10.1109\/ICDE.2013.6544835"},{"issue":"3","key":"35_CR17","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1007\/s00778-011-0245-7","volume":"21","author":"B Hore","year":"2012","unstructured":"Hore, B., Mehrotra, S., Canim, M., Kantarcioglu, M.: Secure multidimensional range queries over outsourced data. VLDB J. 21(3), 333\u2013358 (2012)","journal-title":"VLDB J."},{"issue":"9","key":"35_CR18","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1145\/361002.361007","volume":"18","author":"JL Bentley","year":"1975","unstructured":"Bentley, J.L.: Multidimensional binary search trees used for associative searching. Commun. ACM 18(9), 509\u2013517 (1975)","journal-title":"Commun. ACM"},{"key":"35_CR19","doi-asserted-by":"crossref","unstructured":"Guttman, A.: R-trees: a dynamic index structure for spatial searching. In: SIGMOD, pp. 47\u201357 (1984)","DOI":"10.1145\/602259.602266"},{"key":"35_CR20","doi-asserted-by":"crossref","unstructured":"Wong, W.K., Cheung, D.W.L., Kao, B., Mamoulis, N.: Secure kNN computation on encrypted databases. In: SIGMOD, pp. 139\u2013152 (2009)","DOI":"10.1145\/1559845.1559862"},{"issue":"12","key":"35_CR21","doi-asserted-by":"crossref","first-page":"2432","DOI":"10.1002\/sec.954","volume":"7","author":"G Chunsheng","year":"2014","unstructured":"Chunsheng, G., Jixing, G.: Known-plaintext attack on secure kNN computation on encrypted databases. Secur. Commun. Netw. 7(12), 2432\u20132441 (2014)","journal-title":"Secur. Commun. Netw."},{"issue":"3","key":"35_CR22","doi-asserted-by":"crossref","first-page":"431","DOI":"10.1145\/233551.233553","volume":"43","author":"O Goldreich","year":"1996","unstructured":"Goldreich, O., Ostrovsky, R.: Software protection and simulation on oblivious rams. J. ACM 43(3), 431\u2013473 (1996)","journal-title":"J. ACM"},{"key":"35_CR23","doi-asserted-by":"crossref","DOI":"10.1002\/0471722162","volume-title":"Order Statistics","author":"HA David","year":"2003","unstructured":"David, H.A., Nagaraja, H.N.: Order Statistics, 3rd edn. Wiley, New York (2003)","edition":"3"},{"key":"35_CR24","unstructured":"GMP: The GNU Multiple Precision Arithmetic Library. http:\/\/gmplib.org"},{"key":"35_CR25","doi-asserted-by":"crossref","unstructured":"Cho, E., Myers, S.A., Leskovec, J.: Friendship and mobility: user movement in location-based social networks. In: KDD, pp. 1082\u20131090 (2011)","DOI":"10.1145\/2020408.2020579"},{"key":"35_CR26","doi-asserted-by":"crossref","unstructured":"Kaul, M., Yang, B., Jensen, C.S.: Building accurate 3D spatial networks to enable next generation intelligent transportation systems. In: MDM, pp. 137\u2013146 (2013)","DOI":"10.1109\/MDM.2013.24"},{"key":"35_CR27","unstructured":"PBC: The Pairing-Based Cryptography Library. https:\/\/crypto.stanford.edu\/pbc"}],"container-title":["Lecture Notes in Computer Science","Database Systems for Advanced Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-55753-3_35","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,22]],"date-time":"2023-08-22T18:51:51Z","timestamp":1692730311000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-55753-3_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319557526","9783319557533"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-55753-3_35","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}