{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T00:28:07Z","timestamp":1761611287581},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642235559"},{"type":"electronic","value":"9783642235566"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-23556-6_4","type":"book-chapter","created":{"date-parts":[[2011,8,19]],"date-time":"2011-08-19T04:08:57Z","timestamp":1313726937000},"page":"52-69","source":"Crossref","is-referenced-by-count":22,"title":["A Comprehensive Framework for Secure Query Processing on Relational Data in the Cloud"],"prefix":"10.1007","author":[{"given":"Shiyuan","family":"Wang","sequence":"first","affiliation":[]},{"given":"Divyakant","family":"Agrawal","sequence":"additional","affiliation":[]},{"given":"Amr","family":"El Abbadi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","first-page":"199","volume-title":"Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS 2009","author":"T. Ristenpart","year":"2009","unstructured":"Ristenpart, T., Tromer, E., Shacham, H., Savage, S.: Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS 2009, pp. 199\u2013212. ACM, New York (2009)"},{"key":"4_CR2","doi-asserted-by":"crossref","first-page":"216","DOI":"10.1145\/564691.564717","volume-title":"Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data, SIGMOD 2002","author":"H. Hacig\u00fcm\u00fc\u015f","year":"2002","unstructured":"Hacig\u00fcm\u00fc\u015f, H., Iyer, B., Li, C., Mehrotra, S.: Executing sql over encrypted data in the database-service-provider model. In: Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data, SIGMOD 2002, pp. 216\u2013227. ACM, New York (2002)"},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Hore, B., Mehrotra, S., Tsudik, G.: A privacy-preserving index for range queries. In: Proceedings of the Thirtieth International Conference on Very Large Data Bases, VLDB 2004. VLDB Endowment, vol.\u00a030, pp. 720\u2013731 (2004)","DOI":"10.1016\/B978-012088469-8.50064-4"},{"key":"4_CR4","doi-asserted-by":"crossref","first-page":"563","DOI":"10.1145\/1007568.1007632","volume-title":"Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data. SIGMOD 2004","author":"R. Agrawal","year":"2004","unstructured":"Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Order preserving encryption for numeric data. In: Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data. SIGMOD 2004, pp. 563\u2013574. ACM, New York (2004)"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Ge, T., Zdonik, S.B.: Fast, secure encryption for indexing in a column-oriented dbms. In: ICDE, pp. 676\u2013685 (2007)","DOI":"10.1109\/ICDE.2007.367913"},{"key":"4_CR6","first-page":"93","volume-title":"Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003","author":"E. Damiani","year":"2003","unstructured":"Damiani, E., Vimercati, S.D.C., Jajodia, S., Paraboschi, S., Samarati, P.: Balancing confidentiality and efficiency in untrusted relational dbmss. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003, pp. 93\u2013102. ACM, New York (2003)"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Shmueli, E., Waisenberg, R., Elovici, Y., Gudes, E.: Designing secure indexes for encrypted databases. In: IFIP Working Conference on Database Security, pp. 54\u201368 (2005)","DOI":"10.1007\/11535706_5"},{"key":"4_CR8","first-page":"169","volume-title":"Proceedings of the 41st Annual ACM Symposium on Theory of Computing, STOC 2009","author":"C. Gentry","year":"2009","unstructured":"Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Proceedings of the 41st Annual ACM Symposium on Theory of Computing, STOC 2009, pp. 169\u2013178. ACM, New York (2009)"},{"issue":"6","key":"4_CR9","doi-asserted-by":"publisher","first-page":"965","DOI":"10.1145\/293347.293350","volume":"45","author":"B. Chor","year":"1998","unstructured":"Chor, B., Kushilevitz, E., Goldreich, O., Sudan, M.: Private information retrieval. Journal of The ACM\u00a045(6), 965\u2013981 (1998)","journal-title":"Journal of The ACM"},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Kantarcioglu, M., Clifton, C.: Security issues in querying encrypted data. In: IFIP Working Conference on Database Security, pp. 325\u2013337 (2005)","DOI":"10.1007\/11535706_24"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Williams, P., Sion, R., Carbunar, B.: Building castles out of mud: practical access pattern privacy and correctness on untrusted storage. In: CCS, pp. 139\u2013148 (2008)","DOI":"10.1145\/1455770.1455790"},{"issue":"2","key":"4_CR12","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1145\/62044.62050","volume":"36","author":"M.O. Rabin","year":"1989","unstructured":"Rabin, M.O.: Efficient dispersal of information for security, load balancing, and fault tolerance. Journal of The ACM\u00a036(2), 335\u2013348 (1989)","journal-title":"Journal of The ACM"},{"issue":"2","key":"4_CR13","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1002\/spe.631","volume":"35","author":"J.S. Plank","year":"2005","unstructured":"Plank, J.S., Ding, Y.: Note: Correction to the 1997 tutorial on reed-solomon coding. Softw., Pract. Exper.\u00a035(2), 189\u2013194 (2005)","journal-title":"Softw., Pract. Exper."},{"key":"4_CR14","first-page":"187","volume-title":"Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS 2009","author":"K.D. Bowers","year":"2009","unstructured":"Bowers, K.D., Juels, A., Oprea, A.: Hail: a high-availability and integrity layer for cloud storage. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS 2009, pp. 187\u2013198. ACM, New York (2009)"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Wang, C., Wang, Q., Ren, K., Lou, W.: Ensuring data storage security in cloud computing. In: Proceedings of the 17th IEEE International Workshop in Quality of Service, pp. 1\u20139 (2009)","DOI":"10.1109\/IWQoS.2009.5201385"},{"key":"4_CR16","unstructured":"Cleversafe: Cleversafe responds to cloud security challenges with cleversafe 2.0 software release (2010), http:\/\/www.cleversafe.com\/news-reviews\/press-releases\/press-release-14"},{"key":"4_CR17","unstructured":"www: Information dispersal algorithms: Data-parsing for network security (2010), http:\/\/searchnetworking.techtarget.com\/Information-dispersal-algorithms-Data-parsing-for-network-security"},{"issue":"2","key":"4_CR18","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1145\/356770.356776","volume":"11","author":"D. Comer","year":"1979","unstructured":"Comer, D.: Ubiquitous b-tree. ACM Comput. Surv.\u00a011(2), 121\u2013137 (1979)","journal-title":"ACM Comput. Surv."},{"key":"4_CR19","first-page":"27","volume-title":"Proceedings of the 22nd International Conference on Data Engineering, ICDE 2006","author":"F. Emekci","year":"2006","unstructured":"Emekci, F., Agrawal, D., Abbadi, A.E., Gulbeden, A.: Privacy preserving query processing using third parties. In: Proceedings of the 22nd International Conference on Data Engineering, ICDE 2006, p. 27. IEEE Computer Society, Washington, DC, USA (2006)"},{"key":"4_CR20","unstructured":"Ge, T., Zdonik, S.: Answering aggregation queries in a secure system model. In: Proceedings of the 33rd International Conference on Very Large Data Bases, VLDB 2007. VLDB Endowment, pp. 519\u2013530 (2007)"},{"key":"4_CR21","doi-asserted-by":"crossref","unstructured":"De Capitani di Vimercati, S., Foresti, S., Paraboschi, S., Pelosi, G., Samarati, P.: Efficient and private access to outsourced data. In: ICDCS (to appear 2011)","DOI":"10.1109\/ICDCS.2011.37"},{"key":"4_CR22","first-page":"229","volume-title":"Proceedings of the 1st ACM Symposium on Cloud Computing, SoCC 2010","author":"H. Abu-Libdeh","year":"2010","unstructured":"Abu-Libdeh, H., Princehouse, L., Weatherspoon, H.: Racs: a case for cloud storage diversity. In: Proceedings of the 1st ACM Symposium on Cloud Computing, SoCC 2010, pp. 229\u2013240. ACM, New York (2010)"},{"key":"4_CR23","doi-asserted-by":"crossref","unstructured":"Wang, S., Agrawal, D., Abbadi, A.E.: A comprehensive framework for secure query processing on relational data in the cloud. Technical report, Department of Computer Science, UCSB (2010)","DOI":"10.1007\/978-3-642-23556-6_4"},{"key":"4_CR24","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"M. Bellare","year":"1996","unstructured":"Bellare, M., Canetti, R., Krawczyk, H.: Keying hash functions for message authentication. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 1\u201315. Springer, Heidelberg (1996)"},{"key":"4_CR25","unstructured":"Wang, H., Lakshmanan, L.V.S.: Efficient secure query evaluation over encrypted xml databases. In: Proceedings of the 32nd International Conference on Very Large Data Bases, VLDB 2006. VLDB Endowment, pp. 127\u2013138 (2006)"},{"key":"4_CR26","unstructured":"Samarati, P., Sweeney, L.: Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical report (1998)"},{"key":"4_CR27","unstructured":"Dai, W.: Crypto++ library 5.6.0, http:\/\/www.cryptopp.com"},{"key":"4_CR28","unstructured":"www: report on internet speeds in all 50 states (2009), http:\/\/www.speedmatters.org\/content\/2009report"},{"key":"4_CR29","unstructured":"www: Tpc-w, http:\/\/www.tpc.org\/tpcw"}],"container-title":["Lecture Notes in Computer Science","Secure Data Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-23556-6_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,8]],"date-time":"2023-06-08T21:54:28Z","timestamp":1686261268000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-23556-6_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642235559","9783642235566"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-23556-6_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}