{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T18:29:41Z","timestamp":1743013781350,"version":"3.40.3"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319723587"},{"type":"electronic","value":"9783319723594"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-72359-4_30","type":"book-chapter","created":{"date-parts":[[2017,12,7]],"date-time":"2017-12-07T16:19:11Z","timestamp":1512663551000},"page":"506-524","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Outsourcing Encrypted Excel Files"],"prefix":"10.1007","author":[{"given":"Ya-Nan","family":"Li","sequence":"first","affiliation":[]},{"given":"Qianhong","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Wenyi","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Qin","sequence":"additional","affiliation":[]},{"given":"Qin","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Meixia","family":"Miao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,8]]},"reference":[{"key":"30_CR1","doi-asserted-by":"crossref","unstructured":"Ateniese, G., Burns, R.C., Curtmola, R., Herring, J., Kissner, L., Peterson, Z.N.J., Song, D.X.: Provable data possession at untrusted stores. In: Proceedings of CCS 2007, pp. 598\u2013609. ACM (2007)","DOI":"10.1145\/1315245.1315318"},{"key":"30_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"506","DOI":"10.1007\/978-3-540-24676-3_30","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"D Boneh","year":"2004","unstructured":"Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506\u2013522. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-24676-3_30"},{"key":"30_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"573","DOI":"10.1007\/11761679_34","volume-title":"Advances in Cryptology - EUROCRYPT 2006","author":"D Boneh","year":"2006","unstructured":"Boneh, D., Sahai, A., Waters, B.: Fully collusion resistant traitor tracing with short ciphertexts and private keys. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 573\u2013592. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11761679_34"},{"key":"30_CR4","doi-asserted-by":"crossref","unstructured":"Boneh, D., Waters, B.: A fully collusion resistant broadcast, trace, and revoke system. In: Proceedings CCS 2006, pp. 211\u2013220. ACM (2006)","DOI":"10.1145\/1180405.1180432"},{"key":"30_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1007\/978-3-540-70936-7_29","volume-title":"Theory of Cryptography","author":"D Boneh","year":"2007","unstructured":"Boneh, D., Waters, B.: Conjunctive, subset, and range queries on encrypted data. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 535\u2013554. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-70936-7_29"},{"issue":"1","key":"30_CR6","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1109\/TPDS.2013.45","volume":"25","author":"N Cao","year":"2014","unstructured":"Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 25(1), 222\u2013233 (2014)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"30_CR7","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1016\/j.ins.2016.08.093","volume":"387","author":"A Castiglione","year":"2017","unstructured":"Castiglione, A., De Santis, A., Masucci, B., Palmieri, F., Huang, X., Castiglione, A.: Supporting dynamic updates in storage clouds with the akl-taylor scheme. Inf. Sci. 387, 56\u201374 (2017)","journal-title":"Inf. Sci."},{"issue":"10","key":"30_CR8","doi-asserted-by":"publisher","first-page":"2349","DOI":"10.1109\/TIFS.2016.2581147","volume":"11","author":"A Castiglione","year":"2016","unstructured":"Castiglione, A., Santis, A.D., Masucci, B., Palmieri, F., Castiglione, A., Huang, X.: Cryptographic hierarchical access control for dynamic structures. IEEE Trans. Inf. Forensics Secur. 11(10), 2349\u20132364 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"4","key":"30_CR9","doi-asserted-by":"crossref","first-page":"850","DOI":"10.1109\/TIFS.2015.2512533","volume":"11","author":"A Castiglione","year":"2016","unstructured":"Castiglione, A., Santis, A.D., Masucci, B., Palmieri, F., Castiglione, A., Li, J., Huang, X.: Hierarchical and shared access control. IEEE Trans. Inf. Forensics Secur. 11(4), 850\u2013865 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"10","key":"30_CR10","doi-asserted-by":"publisher","first-page":"3184","DOI":"10.1109\/TC.2015.2512870","volume":"65","author":"X Chen","year":"2016","unstructured":"Chen, X., Li, J., Weng, J., Ma, J., Lou, W.: Verifiable computation over large database with incremental updates. IEEE Trans. Comput. 65(10), 3184\u20133195 (2016)","journal-title":"IEEE Trans. Comput."},{"key":"30_CR11","unstructured":"China, I.: China\u2019s social mobile office software market in 2015. https:\/\/www.idc.com.cn\/about\/press.jsp?id=OTUw . Accessed 10 Mar 2016"},{"key":"30_CR12","unstructured":"Chow, S.S.M., Chu, C., Huang, X., Zhou, J., Deng, R.H.: Dynamic secure cloud storage with provenance. In: Cryptography and Security: From Theory to Applications - Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday, pp. 442\u2013464 (2012)"},{"key":"30_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1007\/978-3-642-04444-1_27","volume-title":"Computer Security \u2013 ESORICS 2009","author":"V Ciriani","year":"2009","unstructured":"Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Keep a few: outsourcing data while maintaining confidentiality. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 440\u2013455. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-04444-1_27"},{"key":"30_CR14","unstructured":"Clearinghouse, P.R.: Chronology of data breaches. https:\/\/www.privacyrights.org\/data-breaches"},{"key":"30_CR15","doi-asserted-by":"crossref","unstructured":"Deng, H., Wu, Q., Qin, B., Chow, S.S.M., Domingo-Ferrer, J., Shi, W.: Tracing and revoking leaked credentials: accountability in leaking sensitive outsourced data. In: Proceedings ASIA CCS 2014, pp. 425\u2013434. ACM (2014)","DOI":"10.1145\/2590296.2590342"},{"issue":"4","key":"30_CR16","doi-asserted-by":"publisher","first-page":"15:1","DOI":"10.1145\/2699909","volume":"17","author":"CC Erway","year":"2015","unstructured":"Erway, C.C., K\u00fcp\u00e7\u00fc, A., Papamanthou, C., Tamassia, R.: Dynamic provable data possession. ACM Trans. Inf. Syst. Secur. 17(4), 15:1\u201315:29 (2015)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"issue":"5","key":"30_CR17","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1145\/1506409.1506429","volume":"52","author":"JA Halderman","year":"2009","unstructured":"Halderman, J.A., Schoen, S.D., Heninger, N., Clarkson, W., Paul, W., Calandrino, J.A., Feldman, A.J., Appelbaum, J., Felten, E.W.: Lest we remember: cold-boot attacks on encryption keys. Commun. ACM 52(5), 91\u201398 (2009)","journal-title":"Commun. ACM"},{"key":"30_CR18","unstructured":"Karcher, P., Burris, P., Keitt, T.: Market update: Office 2013 and productivity suite alternatives. Forrester Research, Inc (2013)"},{"key":"30_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"592","DOI":"10.1007\/978-3-642-40203-6_33","volume-title":"Computer Security \u2013 ESORICS 2013","author":"J Li","year":"2013","unstructured":"Li, J., Chen, X., Li, J., Jia, C., Ma, J., Lou, W.: Fine-grained access control system based on outsourced attribute-based encryption. In: Crampton, J., Jajodia, S., Mayes, K. (eds.) ESORICS 2013. LNCS, vol. 8134, pp. 592\u2013609. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-40203-6_33"},{"key":"30_CR20","doi-asserted-by":"crossref","unstructured":"Li, J., Wang, Q., Wang, C., Cao, N., Ren, K., Lou, W.: Fuzzy keyword search over encrypted data in cloud computing. In: Proceedings of INFOCOM 2010, pp. 441\u2013445. IEEE (2010)","DOI":"10.1109\/INFCOM.2010.5462196"},{"key":"30_CR21","doi-asserted-by":"crossref","unstructured":"Li, J., Zhao, G., Chen, X., Xie, D., Rong, C., Li, W., Tang, L., Tang, Y.: Fine-grained data access control systems with user accountability in cloud computing. In: Cloud Computing, Second International Conference, CloudCom 2010, 30 November - 3 December 2010, Indianapolis, Indiana. Proceedings, pp. 89\u201396 (2010)","DOI":"10.1109\/CloudCom.2010.44"},{"key":"30_CR22","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/j.csi.2016.09.012","volume":"54","author":"H Liu","year":"2017","unstructured":"Liu, H., Mu, Y., Zhao, J., Xu, C., Wang, H., Chen, L., Yu, Y.: Identity-based provable data possession revisited: security analysis and generic construction. Computer Stand. Interfaces 54, 10\u201319 (2017)","journal-title":"Computer Stand. Interfaces"},{"issue":"3","key":"30_CR23","doi-asserted-by":"publisher","first-page":"484","DOI":"10.1109\/TIFS.2015.2493983","volume":"11","author":"JK Liu","year":"2016","unstructured":"Liu, J.K., Au, M.H., Huang, X., Lu, R., Li, J.: Fine-grained two-factor access control for web-based cloud computing services. IEEE Trans. Inf. Forensics Secur. 11(3), 484\u2013497 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"30_CR24","doi-asserted-by":"crossref","unstructured":"Popa, R.A., Li, F.H., Zeldovich, N.: An ideal-security protocol for order-preserving encoding. In: 2013 IEEE Symposium on Security and Privacy SP 2013, Berkeley, CA, 19\u201322 May 2013, pp. 463\u2013477 (2013)","DOI":"10.1109\/SP.2013.38"},{"key":"30_CR25","doi-asserted-by":"crossref","unstructured":"Popa, R.A., Redfield, C.M.S., Zeldovich, N., Balakrishnan, H.: Cryptdb: protecting confidentiality with encrypted query processing. In: Proceedings of SOSP 2011, pp. 85\u2013100. ACM (2011)","DOI":"10.1145\/2043556.2043566"},{"key":"30_CR26","doi-asserted-by":"crossref","unstructured":"Somani, U., Lakhani, K., Mundra, M.: Implementing digital signature with RSA encryption algorithm to enhance the data security of cloud in cloud computing. In: 2010 1st International Conference on Parallel Distributed and Grid Computing (PDGC), pp. 211\u2013216. IEEE (2010)","DOI":"10.1109\/PDGC.2010.5679895"},{"key":"30_CR27","doi-asserted-by":"crossref","unstructured":"Sun, W., Wang, B., Cao, N., Li, M., Lou, W., Hou, Y.T., Li, H.: Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. In: Proceedings of ASIA CCS 2013, pp. 71\u201382. ACM (2013)","DOI":"10.1145\/2484313.2484322"},{"key":"30_CR28","unstructured":"Support, M.: Excel help center. https:\/\/support.office.com\/en-us\/excel"},{"key":"30_CR29","doi-asserted-by":"crossref","unstructured":"Tahir, S., Rajarajan, M., Sajjad, A.: A ranked searchable encryption scheme for encrypted data hosted on the public cloud. In: 2017 International Conference on Information Networking, ICOIN 2017, Da Nang, Vietnam, 11\u201313 Jan 2017, pp. 242\u2013247 (2017)","DOI":"10.1109\/ICOIN.2017.7899512"},{"key":"30_CR30","doi-asserted-by":"crossref","unstructured":"Wang, B., Yu, S., Lou, W., Hou, Y.T.: Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud. In: Proceedings of INFOCOM 2014, pp. 2112\u20132120. IEEE (2014)","DOI":"10.1109\/INFOCOM.2014.6848153"},{"key":"30_CR31","unstructured":"Wang, X., Wu, Q., Zhang, Y.: T-DB: toward fully functional transparent encrypted databases in dbaas framework. CoRR abs\/1708.08191 (2017)"},{"issue":"5","key":"30_CR32","doi-asserted-by":"publisher","first-page":"1182","DOI":"10.1109\/TIFS.2017.2656461","volume":"12","author":"Y Wang","year":"2017","unstructured":"Wang, Y., Wu, Q., Qin, B., Tang, S., Susilo, W.: Online\/offline provable data possession. IEEE Trans. Inf. Forensics Secur. 12(5), 1182\u20131194 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"30_CR33","doi-asserted-by":"crossref","unstructured":"Yu, S., Wang, C., Ren, K., Lou, W.: Achieving secure, scalable, and fine-grained data access control in cloud computing. In: IEEE INFOCOM 2010, pp. 534\u2013542 (2010)","DOI":"10.1109\/INFCOM.2010.5462174"},{"issue":"8","key":"30_CR34","doi-asserted-by":"publisher","first-page":"1210","DOI":"10.1093\/comjnl\/bxx017","volume":"60","author":"J Zhou","year":"2017","unstructured":"Zhou, J., Duan, H., Liang, K., Yan, Q., Chen, F., Yu, F.R., Wu, J., Chen, J.: Securing outsourced data in the multi-authority cloud with fine-grained access control and efficient attribute revocation. Comput. J. 60(8), 1210\u20131222 (2017)","journal-title":"Comput. J."}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-72359-4_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,29]],"date-time":"2023-08-29T19:15:56Z","timestamp":1693336556000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-72359-4_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319723587","9783319723594"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-72359-4_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"8 December 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISPEC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security Practice and Experience","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Melbourne","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 December 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 December 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ispec2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nsclab.org\/ispec2017\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}