{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:50:40Z","timestamp":1740099040873,"version":"3.37.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319756493"},{"type":"electronic","value":"9783319756509"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-75650-9_13","type":"book-chapter","created":{"date-parts":[[2018,2,16]],"date-time":"2018-02-16T10:14:32Z","timestamp":1518776072000},"page":"189-205","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["ObliviousDB: Practical and Efficient Searchable Encryption with Controllable Leakage"],"prefix":"10.1007","author":[{"given":"Shujie","family":"Cui","sequence":"first","affiliation":[]},{"given":"Muhammad Rizwan","family":"Asghar","sequence":"additional","affiliation":[]},{"given":"Steven D.","family":"Galbraith","sequence":"additional","affiliation":[]},{"given":"Giovanni","family":"Russello","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,2,17]]},"reference":[{"key":"13_CR1","unstructured":"Gartner expects five years for hybrid cloud to reach productivity. \nhttp:\/\/www.cloudcomputing-news.net\/news\/2015\/aug\/18\/gartner-expects-hybrid-cloud-reach-productivity-five-years-are-they-right\/\n\n. Accessed 19 Feb 2016"},{"key":"13_CR2","unstructured":"Rightscale 2016 state of the cloud report. \nhttps:\/\/www.rightscale.com\/lp\/state-of-the-cloud\n\n. Accessed 3 July 2016"},{"key":"13_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1007\/978-3-319-60055-0_14","volume-title":"Information Security and Privacy","author":"S Cui","year":"2017","unstructured":"Cui, S., Asghar, M.R., Galbraith, S.D., Russello, G.: Secure and practical searchable encryption: a position paper. In: Pieprzyk, J., Suriadi, S. (eds.) ACISP 2017. LNCS, vol. 10342, pp. 266\u2013281. Springer, Cham (2017). \nhttps:\/\/doi.org\/10.1007\/978-3-319-60055-0_14"},{"key":"13_CR4","first-page":"668","volume-title":"SIGSAC 2015","author":"D Cash","year":"2015","unstructured":"Cash, D., Grubbs, P., Perry, J., Ristenpart, T.: Leakage-abuse attacks against searchable encryption. In: Ray, I., Li, N., Kruegel, C. (eds.) SIGSAC 2015, pp. 668\u2013679. ACM, New York (2015)"},{"key":"13_CR5","first-page":"644","volume-title":"SIGSAC 2015","author":"M Naveed","year":"2015","unstructured":"Naveed, M., Kamara, S., Wright, C.V.: Inference attacks on property-preserving encrypted databases. In: Ray, I., Li, N., Kruegel, C. (eds.) SIGSAC 2015, pp. 644\u2013655. ACM, New York (2015)"},{"key":"13_CR6","unstructured":"Zhang, Y., Katz, J., Papamanthou, C.: All your queries are belong to us: the power of file-injection attacks on searchable encryption. In: USENIX Security 2016, pp. 707\u2013720. USENIX Association (2016)"},{"key":"13_CR7","first-page":"85","volume-title":"SOSP 2011","author":"RA Popa","year":"2011","unstructured":"Popa, R.A., Redfield, C.M.S., Zeldovich, N., Balakrishnan, H.: CryptDB: protecting confidentiality with encrypted query processing. In: Wobber, T., Druschel, P. (eds.) SOSP 2011, pp. 85\u2013100. ACM, New York (2011)"},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Stefanov, E., Papamanthou, C., Shi, E.: Practical dynamic searchable encryption with small leakage. In: NDSS 2013, vol. 71, pp. 72\u201375 (2014)","DOI":"10.14722\/ndss.2014.23298"},{"key":"13_CR9","first-page":"1143","volume-title":"SIGSAC 2016","author":"R Bost","year":"2016","unstructured":"Bost, R.: \n            $$\\sum $$\n          o\n            $$\\varphi $$\n          o\n            $$\\varsigma $$\n          : forward secure searchable encryption. In: Weippl, E.R., Katzenbeisser, S., Kruegel, C., Myers, A.C., Halevi, S. (eds.) SIGSAC 2016, pp. 1143\u20131154. ACM, New York (2016)"},{"key":"13_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1007\/11496137_30","volume-title":"Applied Cryptography and Network Security","author":"Y-C Chang","year":"2005","unstructured":"Chang, Y.-C., Mitzenmacher, M.: Privacy preserving keyword searches on remote encrypted data. In: Ioannidis, J., Keromytis, A., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 442\u2013455. Springer, Heidelberg (2005). \nhttps:\/\/doi.org\/10.1007\/11496137_30"},{"key":"13_CR11","first-page":"77","volume-title":"CCSW 2013","author":"MR Asghar","year":"2013","unstructured":"Asghar, M.R., Russello, G., Crispo, B., Ion, M.: Supporting complex queries and access policies for multi-user encrypted databases. In: Juels, A., Parno, B. (eds.) CCSW 2013, pp. 77\u201388. ACM, New York (2013)"},{"key":"13_CR12","unstructured":"Asghar, M.R.: Privacy preserving enforcement of sensitive policies in outsourced and distributed environments. Ph.D. dissertation, University of Trento, Trento, Italy, December 2013. \nhttp:\/\/eprints-phd.biblio.unitn.it\/1124\/"},{"issue":"16","key":"13_CR13","doi-asserted-by":"crossref","first-page":"3113","DOI":"10.1016\/j.dam.2007.12.010","volume":"156","author":"SD Galbraith","year":"2008","unstructured":"Galbraith, S.D., Paterson, K.G., Smart, N.P.: Pairings for cryptographers. Discret. Appl. Math. 156(16), 3113\u20133121 (2008)","journal-title":"Discret. Appl. Math."},{"key":"13_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/978-3-540-70567-3_10","volume-title":"Data and Applications Security XXII","author":"C Dong","year":"2008","unstructured":"Dong, C., Russello, G., Dulay, N.: Shared and searchable encrypted data for untrusted servers. In: Atluri, V. (ed.) DBSec 2008. LNCS, vol. 5094, pp. 127\u2013143. Springer, Heidelberg (2008). \nhttps:\/\/doi.org\/10.1007\/978-3-540-70567-3_10"},{"key":"13_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/978-3-642-11925-5_9","volume-title":"Topics in Cryptology - CT-RSA 2010","author":"G Yang","year":"2010","unstructured":"Yang, G., Tan, C.H., Huang, Q., Wong, D.S.: Probabilistic public key encryption with equality test. In: Pieprzyk, J. (ed.) CT-RSA 2010. LNCS, vol. 5985, pp. 119\u2013131. Springer, Heidelberg (2010). \nhttps:\/\/doi.org\/10.1007\/978-3-642-11925-5_9"}],"container-title":["Lecture Notes in Computer Science","Foundations and Practice of Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-75650-9_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,2,16]],"date-time":"2018-02-16T10:20:13Z","timestamp":1518776413000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-75650-9_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319756493","9783319756509"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-75650-9_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}