{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T15:26:18Z","timestamp":1725981978620},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319935232"},{"type":"electronic","value":"9783319935249"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-93524-9_3","type":"book-chapter","created":{"date-parts":[[2018,6,20]],"date-time":"2018-06-20T02:37:00Z","timestamp":1529462220000},"page":"41-55","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Long White Cloud (LWC): A Practical and Privacy-Preserving Outsourced Database"],"prefix":"10.1007","author":[{"given":"Shujie","family":"Cui","sequence":"first","affiliation":[]},{"given":"Ming","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Muhammad Rizwan","family":"Asghar","sequence":"additional","affiliation":[]},{"given":"Giovanni","family":"Russello","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,21]]},"reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Cash, D., Grubbs, P., Perry, J., Ristenpart, T.: Leakage-abuse attacks against searchable encryption. In: Ray, I., Li, N., Kruegel, C. (eds.) SIGSAC 2015, pp. 668\u2013679. ACM (2015)","DOI":"10.1145\/2810103.2813700"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Naveed, M., Kamara, S., Wright, C.V.: Inference attacks on property-preserving encrypted databases. In: Ray, I., Li, N., Kruegel, C. (eds.) SIGSAC 2015, pp. 644\u2013655. ACM (2015)","DOI":"10.1145\/2810103.2813651"},{"key":"3_CR3","unstructured":"Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: S&P 2000, pp. 44\u201355. IEEE Computer Society (2000)"},{"key":"3_CR4","unstructured":"Islam, M.S., Kuzu, M., Kantarcioglu, M.: Access pattern disclosure on searchable encryption: ramification, attack and mitigation. In: NDSS 2012. The Internet Society (2012)"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Ostrovsky, R.: Efficient computation on oblivious rams. In: Ortiz, H. (ed.) STOC 1990, pp. 514\u2013523. ACM (1990)","DOI":"10.1145\/100216.100289"},{"issue":"3","key":"3_CR6","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1145\/233551.233553","volume":"43","author":"O Goldreich","year":"1996","unstructured":"Goldreich, O., Ostrovsky, R.: Software protection and simulation on oblivious rams. J. ACM 43(3), 431\u2013473 (1996)","journal-title":"J. ACM"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Stefanov, E., van Dijk, M., Shi, E., Fletcher, C.W., Ren, L., Yu, X., Devadas, S.: Path ORAM: an extremely simple oblivious RAM protocol. In: Sadeghi, A., Gligor, V.D., Yung, M. (eds.) SIGSAC 2013, pp. 299\u2013310. ACM (2013)","DOI":"10.1145\/2508859.2516660"},{"issue":"6","key":"3_CR8","doi-asserted-by":"publisher","first-page":"965","DOI":"10.1145\/293347.293350","volume":"45","author":"B Chor","year":"1998","unstructured":"Chor, B., Kushilevitz, E., Goldreich, O., Sudan, M.: Private information retrieval. J. ACM 45(6), 965\u2013981 (1998)","journal-title":"J. ACM"},{"key":"3_CR9","unstructured":"Williams, P., Sion, R.: Usable PIR. In: NDSS 2008. The Internet Society (2008)"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Asghar, M.R., Russello, G., Crispo, B., Ion, M.: Supporting complex queries and access policies for multi-user encrypted databases. In: Juels, A., Parno, B. (eds.) CCSW 2013, pp. 77\u201388. ACM (2013)","DOI":"10.1145\/2517488.2517492"},{"key":"3_CR11","unstructured":"Stefanov, E., Papamanthou, C., Shi, E.: Practical dynamic searchable encryption with small leakage. In: NDSS 2013, vol. 71, pp. 72\u201375 (2013)"},{"key":"3_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1007\/978-3-319-29485-8_6","volume-title":"Topics in Cryptology - CT-RSA 2016","author":"Y Ishai","year":"2016","unstructured":"Ishai, Y., Kushilevitz, E., Lu, S., Ostrovsky, R.: Private large-scale databases with distributed searchable symmetric encryption. In: Sako, K. (ed.) CT-RSA 2016. LNCS, vol. 9610, pp. 90\u2013107. Springer, Cham (2016). \nhttps:\/\/doi.org\/10.1007\/978-3-319-29485-8_6"},{"key":"3_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1007\/978-3-319-60055-0_14","volume-title":"Information Security and Privacy","author":"S Cui","year":"2017","unstructured":"Cui, S., Asghar, M.R., Galbraith, S.D., Russello, G.: Secure and practical searchable encryption: a position paper. In: Pieprzyk, J., Suriadi, S. (eds.) ACISP 2017. LNCS, vol. 10342, pp. 266\u2013281. Springer, Cham (2017). \nhttps:\/\/doi.org\/10.1007\/978-3-319-60055-0_14"},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"Curtmola, R., Garay, J.A., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. In: Juels, A., Wright, R.N., di Vimercati, S.D.C. (eds.) CCS 2006, pp. 79\u201388. ACM (2006)","DOI":"10.1145\/1180405.1180417"},{"key":"3_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1007\/978-3-642-39884-1_22","volume-title":"Financial Cryptography and Data Security","author":"S Kamara","year":"2013","unstructured":"Kamara, S., Papamanthou, C.: Parallel and dynamic searchable symmetric encryption. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 258\u2013274. Springer, Heidelberg (2013). \nhttps:\/\/doi.org\/10.1007\/978-3-642-39884-1_22"},{"key":"3_CR16","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1145\/202660.202666","volume":"24","author":"J Jannink","year":"1995","unstructured":"Jannink, J.: Implementing deletion in B+-trees. SIGMOD Rec. 24, 33\u201338 (1995)","journal-title":"SIGMOD Rec."}],"container-title":["Lecture Notes in Computer Science","Information Security Theory and Practice"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-93524-9_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,6,20]],"date-time":"2018-06-20T02:37:56Z","timestamp":1529462276000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-93524-9_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319935232","9783319935249"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-93524-9_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}