{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T20:01:08Z","timestamp":1773086468935,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":55,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642257308","type":"print"},{"value":"9783642257315","type":"electronic"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-25731-5_1","type":"book-chapter","created":{"date-parts":[[2011,12,9]],"date-time":"2011-12-09T14:29:34Z","timestamp":1323440974000},"page":"1-15","source":"Crossref","is-referenced-by-count":5,"title":["Secure Data Management in the Cloud"],"prefix":"10.1007","author":[{"given":"Divyakant","family":"Agrawal","sequence":"first","affiliation":[]},{"given":"Amr","family":"El Abbadi","sequence":"additional","affiliation":[]},{"given":"Shiyuan","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","unstructured":"Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., Zaharia, M.: Above the Clouds: A Berkeley View of Cloud Computing. Technical Report 2009-28, UC Berkeley (2009)"},{"key":"1_CR2","unstructured":"Amazon: AWS Solution Providers (2009), http:\/\/aws.amazon.com\/solutions\/solution-providers\/"},{"key":"1_CR3","unstructured":"Amazon: AWS Case Studies (2009), http:\/\/aws.amazon.com\/solutions\/case-studies\/"},{"key":"1_CR4","unstructured":"Li, P.: Cloud computing is powering innovation in the silicon valley (2010), http:\/\/www.huffingtonpost.com\/ping-li\/cloud-computing-is-poweri_b_570422.html"},{"key":"1_CR5","unstructured":"Business Review USA: Small, medium-sized companies adopt cloud computing (2010), http:\/\/www.businessreviewusa.com\/news\/cloud-computing\/small-medium-sized-companies-adopt-cloud-computing"},{"key":"1_CR6","unstructured":"InfoWorld: Gartner: Seven cloud-computing security risks (2008), http:\/\/www.infoworld.com\/d\/security-central\/gartner-seven-cloud-computing-security-risks-853?page=0,1"},{"key":"1_CR7","volume-title":"Cloud Security and Privacy","author":"T. Mather","year":"2009","unstructured":"Mather, T., Kumaraswamy, S., Latif, S.: Cloud Security and Privacy. O\u2019Reilly Media, Inc., Sebastopol (2009)"},{"key":"1_CR8","unstructured":"Amazon: Amazon elastic compute cloud (amazon ec2), http:\/\/aws.amazon.com\/ec2\/"},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"Ristenpart, T., Tromer, E., Shacham, H., Savage, S.: Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In: ACM Conference on Computer and Communications Security, pp. 199\u2013212 (2009)","DOI":"10.1145\/1653662.1653687"},{"key":"1_CR10","unstructured":"NIST: Fips publications, http:\/\/csrc.nist.gov\/publications\/PubsFIPS.html"},{"issue":"6","key":"1_CR11","doi-asserted-by":"publisher","first-page":"965","DOI":"10.1145\/293347.293350","volume":"45","author":"B. Chor","year":"1998","unstructured":"Chor, B., Kushilevitz, E., Goldreich, O., Sudan, M.: Private information retrieval. J. ACM\u00a045(6), 965\u2013981 (1998)","journal-title":"J. ACM"},{"key":"1_CR12","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"M. Bellare","year":"1996","unstructured":"Bellare, M., Canetti, R., Krawczyk, H.: Keying Hash Functions for Message Authentication. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 1\u201315. Springer, Heidelberg (1996)"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Haas, P.J., Kiernan, J.: A system for watermarking relational databases. In: Proc. of the 2003 ACM SIGMOD International Conference on Management of Data, pp. 674\u2013674 (2003)","DOI":"10.1145\/872757.872865"},{"issue":"2","key":"1_CR14","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1002\/spe.631","volume":"35","author":"J.S. Plank","year":"2005","unstructured":"Plank, J.S., Ding, Y.: Note: Correction to the 1997 tutorial on reed-solomon coding. Softw. Pract. Exper.\u00a035(2), 189\u2013194 (2005)","journal-title":"Softw. Pract. Exper."},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"Bowers, K.D., Juels, A., Oprea, A.: Hail: a high-availability and integrity layer for cloud storage. In: CCS 2009: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 187\u2013198 (2009)","DOI":"10.1145\/1653662.1653686"},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"Abu-Libdeh, H., Princehouse, L., Weatherspoon, H.: Racs: a case for cloud storage diversity. In: SoCC 2010: Proceedings of the 1st ACM Symposium on Cloud Computing, pp. 229\u2013240 (2010)","DOI":"10.1145\/1807128.1807165"},{"issue":"2","key":"1_CR17","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1145\/62044.62050","volume":"36","author":"M.O. Rabin","year":"1989","unstructured":"Rabin, M.O.: Efficient dispersal of information for security, load balancing, and fault tolerance. J. ACM\u00a036(2), 335\u2013348 (1989)","journal-title":"J. ACM"},{"issue":"11","key":"1_CR18","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM\u00a022(11), 612\u2013613 (1979)","journal-title":"Commun. ACM"},{"key":"1_CR19","doi-asserted-by":"crossref","unstructured":"Agrawal, D., Abbadi, A.E.: Quorum consensus algorithms for secure and reliable data. In: Proceedings of the Sixth IEEE Symposium on Reliable Distributed Systems, pp. 44\u201353 (1988)","DOI":"10.1109\/RELDIS.1988.25779"},{"key":"1_CR20","unstructured":"CleverSafe: Cleversafe responds to cloud security challenges with cleversafe 2.0 software release (2010), http:\/\/www.cleversafe.com\/news-reviews\/press-releases\/press-release-14"},{"key":"1_CR21","unstructured":"InfoLawGroup: Cloud providers competing on data security & privacy contract terms (2010), http:\/\/www.infolawgroup.com\/2010\/04\/articles\/cloud-computing-1\/cloud-providers-competing-on-data-security-privacy-contract-terms"},{"key":"1_CR22","doi-asserted-by":"crossref","unstructured":"Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: SP 2000: Proceedings of the 2000 IEEE Symposium on Security and Privacy, p. 44 (2000)","DOI":"10.1109\/SECPRI.2000.848445"},{"key":"1_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1007\/11496137_30","volume-title":"Applied Cryptography and Network Security","author":"Y.-C. Chang","year":"2005","unstructured":"Chang, Y.-C., Mitzenmacher, M.: Privacy Preserving Keyword Searches on Remote Encrypted Data. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol.\u00a03531, pp. 442\u2013455. Springer, Heidelberg (2005)"},{"key":"1_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"479","DOI":"10.1007\/11863908_29","volume-title":"Computer Security \u2013 ESORICS 2006","author":"Z. Yang","year":"2006","unstructured":"Yang, Z., Zhong, S., Wright, R.N.: Privacy-Preserving Queries on Encrypted Data. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol.\u00a04189, pp. 479\u2013495. Springer, Heidelberg (2006)"},{"key":"1_CR25","doi-asserted-by":"crossref","unstructured":"Hacigumus, H., Iyer, B.R., Li, C., Mehrotra, S.: Executing SQL over encrypted data in the database service provider model. In: SIGMOD Conference (2002)","DOI":"10.1145\/564716.564717"},{"key":"1_CR26","doi-asserted-by":"crossref","unstructured":"Hore, B., Mehrotra, S., Tsudik, G.: A privacy-preserving index for range queries. In: Proc. of the 30th Int\u2019l Conference on Very Large Databases VLDB, pp. 720\u2013731 (2004)","DOI":"10.1016\/B978-012088469-8.50064-4"},{"key":"1_CR27","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Order preserving encryption for numeric data. In: SIGMOD 2004: Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data, pp. 563\u2013574 (2004)","DOI":"10.1145\/1007568.1007632"},{"key":"1_CR28","doi-asserted-by":"crossref","unstructured":"Emekci, F., Agrawal, D., Abbadi, A.E., Gulbeden, A.: Privacy preserving query processing using third parties. In: ICDE (2006)","DOI":"10.1109\/ICDE.2006.116"},{"key":"1_CR29","unstructured":"Ge, T., Zdonik, S.B.: Answering aggregation queries in a secure system model. In: Proceedings of the 33rd International Conference on Very Large Data Bases, pp. 519\u2013530 (2007)"},{"key":"1_CR30","doi-asserted-by":"crossref","unstructured":"Gentry, C.: Fully homomorphic encryption using ideal lattices. In: STOC 2009: Proceedings of the 41st Annual ACM Symposium on Theory of Computing, pp. 169\u2013178 (2009)","DOI":"10.1145\/1536414.1536440"},{"key":"1_CR31","unstructured":"Schneier, B.: Homomorphic encryption breakthrough (2009), http:\/\/www.schneier.com\/blog\/archives\/2009\/07\/homomorphic_enc.html"},{"key":"1_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1007\/978-3-540-78967-3_9","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2008","author":"J. Katz","year":"2008","unstructured":"Katz, J., Sahai, A., Waters, B.: Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol.\u00a04965, pp. 146\u2013162. Springer, Heidelberg (2008)"},{"key":"1_CR33","doi-asserted-by":"crossref","unstructured":"Damiani, E., di Vimercati, S.D.C., Jajodia, S., Paraboschi, S., Samarati, P.: Balancing confidentiality and efficiency in untrusted relational dbmss. In: ACM Conference on Computer and Communications Security, pp. 93\u2013102 (2003)","DOI":"10.1145\/948109.948124"},{"key":"1_CR34","doi-asserted-by":"crossref","unstructured":"Shmueli, E., Waisenberg, R., Elovici, Y., Gudes, E.: Designing secure indexes for encrypted databases. In: Proceedings of the IFIP Conference on Database and Applications Security (2005)","DOI":"10.1007\/11535706_5"},{"key":"1_CR35","doi-asserted-by":"crossref","unstructured":"Ge, T., Zdonik, S.B.: Fast, secure encryption for indexing in a column-oriented dbms. In: ICDE, pp. 676\u2013685 (2007)","DOI":"10.1109\/ICDE.2007.367913"},{"key":"1_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1007\/978-3-642-23556-6_4","volume-title":"Secure Data Management","author":"S. Wang","year":"2011","unstructured":"Wang, S., Agrawal, D., Abbadi, A.E.: A Comprehensive Framework for Secure Query Processing on Relational Data in the Cloud. In: Jonker, W., Petkovi\u0107, M. (eds.) SDM 2011. LNCS, vol.\u00a06933, pp. 52\u201369. Springer, Heidelberg (2011)"},{"key":"1_CR37","doi-asserted-by":"crossref","unstructured":"Bajaj, S., Sion, R.: Trusteddb: a trusted hardware based database with privacy and data confidentiality. In: Proceedings of the 2011 International Conference on Management of Data, SIGMOD 2011, pp. 205\u2013216 (2011)","DOI":"10.1145\/1989323.1989346"},{"issue":"2","key":"1_CR38","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1145\/356770.356776","volume":"11","author":"D. Comer","year":"1979","unstructured":"Comer, D.: Ubiquitous b-tree. ACM Comput. Surv.\u00a011(2), 121\u2013137 (1979)","journal-title":"ACM Comput. Surv."},{"key":"1_CR39","volume-title":"Cryptography and data security.","author":"D.E. Robling Denning","year":"1982","unstructured":"Robling Denning, D.E.: Cryptography and data security. Addison-Wesley Longman Publishing Co., Inc., Boston (1982)"},{"key":"1_CR40","doi-asserted-by":"crossref","unstructured":"Howe, D.C., Nissenbaum, H.: TrackMeNot: Resisting surveillance in web search. In: Lessons from the Identity Trail: Anonymity, Privacy, and Identity in a Networked Society, pp. 417\u2013436. Oxford University Press (2009)","DOI":"10.1093\/oso\/9780195372472.003.0023"},{"key":"1_CR41","doi-asserted-by":"crossref","unstructured":"Kushilevitz, E., Ostrovsky, R.: Replication is not needed: Single database, computationally-private information retrieval. In: FOCS, pp. 364\u2013373 (1997)","DOI":"10.1109\/SFCS.1997.646125"},{"key":"1_CR42","doi-asserted-by":"crossref","unstructured":"Olumofin, F.G., Goldberg, I.: Revisiting the computational practicality of private information retrieval. In: Financial Cryptography (2011)","DOI":"10.1007\/978-3-642-27576-0_13"},{"key":"1_CR43","doi-asserted-by":"crossref","unstructured":"Gentry, C., Ramzan, Z.: Single-database private information retrieval with constant communication rate. In: Proceedings of the 32nd International Colloquium on Automata, Languages and Programming, pp. 803\u2013815 (2005)","DOI":"10.1007\/11523468_65"},{"key":"1_CR44","unstructured":"Sion, R., Carbunar, B.: On the computational practicality of private information retrieval. In: Network and Distributed System Security Symposium (2007)"},{"key":"1_CR45","unstructured":"Williams, P., Sion, R.: Usable private information retrieval. In: Network and Distributed System Security Symposium (2008)"},{"key":"1_CR46","doi-asserted-by":"crossref","unstructured":"Williams, P., Sion, R., Carbunar, B.: Building castles out of mud: practical access pattern privacy and correctness on untrusted storage. In: ACM Conference on Computer and Communications Security, pp. 139\u2013148 (2008)","DOI":"10.1145\/1455770.1455790"},{"key":"1_CR47","doi-asserted-by":"crossref","unstructured":"Melchor, C.A., Gaborit, P.: A fast private information retrieval protocol. In: IEEE Internal Symposium on Information Theory, pp. 1848\u20131852 (2008)","DOI":"10.1109\/ISIT.2008.4595308"},{"key":"1_CR48","doi-asserted-by":"crossref","unstructured":"Mokbel, M.F., Chow, C.Y., Aref, W.G.: The new casper: A privacy-aware location-based database server. In: ICDE, pp. 1499\u20131500 (2007)","DOI":"10.1109\/ICDE.2007.369052"},{"key":"1_CR49","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/978-3-642-14527-8_2","volume-title":"Privacy Enhancing Technologies","author":"S.T. Peddinti","year":"2010","unstructured":"Peddinti, S.T., Saxena, N.: On the Privacy of Web Search Based on Query Obfuscation: A Case Study of Trackmenot. In: Atallah, M.J., Hopper, N.J. (eds.) PETS 2010. LNCS, vol.\u00a06205, pp. 19\u201337. Springer, Heidelberg (2010)"},{"key":"1_CR50","doi-asserted-by":"crossref","unstructured":"Murugesan, M., Clifton, C.: Providing privacy through plausibly deniable search. In: SDM, pp. 768\u2013779 (2009)","DOI":"10.1137\/1.9781611972795.66"},{"issue":"1","key":"1_CR51","first-page":"598","volume":"3","author":"H. Pang","year":"2010","unstructured":"Pang, H., Ding, X., Xiao, X.: Embellishing text search queries to protect user privacy. PVLDB\u00a03(1), 598\u2013607 (2010)","journal-title":"PVLDB"},{"key":"1_CR52","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/11681878_14","volume-title":"Theory of Cryptography","author":"C. Dwork","year":"2006","unstructured":"Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating Noise to Sensitivity in Private Data Analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol.\u00a03876, pp. 265\u2013284. Springer, Heidelberg (2006)"},{"key":"1_CR53","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/978-3-642-14527-8_6","volume-title":"Privacy Enhancing Technologies","author":"F.G. Olumofin","year":"2010","unstructured":"Olumofin, F.G., Tysowski, P.K., Goldberg, I., Hengartner, U.: Achieving Efficient Query Privacy for Location Based Services. In: Atallah, M.J., Hopper, N.J. (eds.) PETS 2010. LNCS, vol.\u00a06205, pp. 93\u2013110. Springer, Heidelberg (2010)"},{"key":"1_CR54","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1007\/978-3-642-02982-0_9","volume-title":"Advances in Spatial and Temporal Databases","author":"G. Ghinita","year":"2009","unstructured":"Ghinita, G., Kalnis, P., Kantarcioglu, M., Bertino, E.: A Hybrid Technique for Private Location-Based Queries with Database Protection. In: Mamoulis, N., Seidl, T., Pedersen, T.B., Torp, K., Assent, I. (eds.) SSTD 2009. LNCS, vol.\u00a05644, pp. 98\u2013116. Springer, Heidelberg (2009)"},{"key":"1_CR55","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-13739-6_1","volume-title":"Data and Applications Security and Privacy XXIV","author":"S. Wang","year":"2010","unstructured":"Wang, S., Agrawal, D., El Abbadi, A.: Generalizing PIR for Practical Private Retrieval of Public Data. In: Foresti, S., Jajodia, S. (eds.) Data and Applications Security and Privacy XXIV. LNCS, vol.\u00a06166, pp. 1\u201316. Springer, Heidelberg (2010)"}],"container-title":["Lecture Notes in Computer Science","Databases in Networked Information Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-25731-5_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,15]],"date-time":"2025-03-15T10:48:31Z","timestamp":1742035711000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-25731-5_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642257308","9783642257315"],"references-count":55,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-25731-5_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011]]}}}