{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T14:09:25Z","timestamp":1773670165643,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":37,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642316791","type":"print"},{"value":"9783642316807","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31680-7_10","type":"book-chapter","created":{"date-parts":[[2012,6,27]],"date-time":"2012-06-27T17:40:32Z","timestamp":1340818832000},"page":"180-200","source":"Crossref","is-referenced-by-count":35,"title":["PRISM \u2013 Privacy-Preserving Search in MapReduce"],"prefix":"10.1007","author":[{"given":"Erik-Oliver","family":"Blass","sequence":"first","affiliation":[]},{"given":"Roberto","family":"Di Pietro","sequence":"additional","affiliation":[]},{"given":"Refik","family":"Molva","sequence":"additional","affiliation":[]},{"given":"Melek","family":"\u00d6nen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","unstructured":"PRISM source code (2012), http:\/\/www.ccs.neu.edu\/~blass\/prism.tgz"},{"key":"10_CR2","unstructured":"Amazon. Elastic mapreduce (2010), http:\/\/aws.amazon.com\/elasticmapreduce\/"},{"key":"10_CR3","unstructured":"Apache. Hadoop (2010), http:\/\/hadoop.apache.org\/"},{"key":"10_CR4","unstructured":"Bellovin, S.M., Cheswick, W.R.: Privacy-enhanced searches using encrypted Bloom filters (2007), http:\/\/mice.cs.columbia.edu\/getTechreport.php?techreportID=483"},{"key":"10_CR5","unstructured":"Bilge, L., Kirda, E., Kr\u00fcgel, C., Balduzzi, M.: Exposure: Finding malicious domains using passive dns analysis. In: Proceedings of 18th Annual Network and Distributed System Security Symposium, San Diego, USA, pp. 195\u2013211 (2011) ISBN 1891562320"},{"key":"10_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"506","DOI":"10.1007\/978-3-540-24676-3_30","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"D. Boneh","year":"2004","unstructured":"Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public Key Encryption with Keyword Search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 506\u2013522. Springer, Heidelberg (2004)"},{"key":"10_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1007\/978-3-540-74143-5_4","volume-title":"Advances in Cryptology - CRYPTO 2007","author":"D. Boneh","year":"2007","unstructured":"Boneh, D., Kushilevitz, E., Ostrovsky, R., Skeith III, W.E.: Public Key Encryption That Allows PIR Queries. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol.\u00a04622, pp. 50\u201367. Springer, Heidelberg (2007)"},{"key":"10_CR8","series-title":"Lecture Notes in Computer Science","first-page":"234","volume-title":"Advances in Cryptology - CRYPTO \u201986","author":"G. Brassard","year":"1987","unstructured":"Brassard, G., Cr\u00e9peau, C., Robert, J.M.: All-or-Nothing Disclosure of Secrets. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol.\u00a0263, pp. 234\u2013238. Springer, Heidelberg (1987)"},{"key":"10_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"402","DOI":"10.1007\/3-540-48910-X_28","volume-title":"Advances in Cryptology - EUROCRYPT \u201999","author":"C. Cachin","year":"1999","unstructured":"Cachin, C., Micali, S., Stadler, M.A.: Computationally Private Information Retrieval with Polylogarithmic Communication. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol.\u00a01592, pp. 402\u2013412. Springer, Heidelberg (1999)"},{"key":"10_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1007\/11496137_30","volume-title":"Applied Cryptography and Network Security","author":"Y.-C. Chang","year":"2005","unstructured":"Chang, Y.-C., Mitzenmacher, M.: Privacy Preserving Keyword Searches on Remote Encrypted Data. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol.\u00a03531, pp. 442\u2013455. Springer, Heidelberg (2005)"},{"key":"10_CR11","unstructured":"Chief Information Officer\u2019s Council. Proposed security assessment & authorization for U.S. government cloud computing (2010), http:\/\/www.digitalgovernment.com\/media\/Knowledge-Centers\/asset_upload_file652_2491.pdf"},{"key":"10_CR12","unstructured":"Chief Information Officer\u2019s Council. Privacy recommendations for the use of cloud computing by federal departments and agencies (2010), http:\/\/www.cio.gov\/"},{"key":"10_CR13","unstructured":"Chor, B., Goldreich, O., Kushilevitz, E., Sudan, M.: Private information retrieval. In: Proceedings of Symposium on Foundations of Computer Science, Milwaukee, USA, pp. 41\u201351 (1995)"},{"key":"10_CR14","unstructured":"Cloud Security Alliance. Security guidance for critical areas of focus in cloud computing (2009), https:\/\/cloudsecurityalliance.org\/guidance\/csaguide.v2.1.pdf"},{"key":"10_CR15","unstructured":"Cloud Security Alliance. Top cloud computing threats (2010), https:\/\/cloudsecurityalliance.org\/topthreats\/csathreats.v1.0.pdf"},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of Conference on Computer and Communications Security, CCS, Alexandria, USA, pp. 79\u201388 (2006)","DOI":"10.1145\/1180405.1180417"},{"key":"10_CR17","unstructured":"Dean, J., Ghemawat, S.: Mapreduce: Simplified data processing on large clusters. In: Proceedings of OSDI, San Francisco, USA, pp. 137\u2013150 (2004)"},{"key":"10_CR18","unstructured":"EU, Eu information management instruments (2010), http:\/\/europa.eu\/"},{"key":"10_CR19","doi-asserted-by":"crossref","unstructured":"Gertner, Y., Ishai, Y., Kushilevitz, E.: Protecting data privacy in private information retrieval. In: Proceedings of Symposium on Theory of Computing, Dallas, USA, pp. 151\u2013160 (1998) ISBN 0-89791-962-9","DOI":"10.1145\/276698.276723"},{"key":"10_CR20","unstructured":"GNU, The gnu crypto project (2011), http:\/\/www.gnu.org\/software\/"},{"key":"10_CR21","unstructured":"Goh, E.-J.: Secure indexes. Cryptology ePrint Archive Report 2003\/216 (2003), http:\/\/eprint.iacr.org\/2003\/216"},{"key":"10_CR22","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1145\/233551.233553","volume":"45","author":"O. Goldreich","year":"1996","unstructured":"Goldreich, O., Ostrovsky, R.: Software protection and simulation on oblivious ram. Journal of the ACM\u00a045, 431\u2013473 (1996) ISSN 0004-5411","journal-title":"Journal of the ACM"},{"issue":"2","key":"10_CR23","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1016\/0022-0000(84)90070-9","volume":"28","author":"S. Goldwasser","year":"1984","unstructured":"Goldwasser, S., Micali, S.: Probabilistic encryption. Journal of Computer and System Sciences\u00a028(2), 270\u2013299 (1984) ISSN 0022-0000","journal-title":"Journal of Computer and System Sciences"},{"key":"10_CR24","unstructured":"Google. Google apps for government (2010), http:\/\/googleenterprise.blogspot.com\/2010\/07\/google-apps-for-government.html"},{"key":"10_CR25","unstructured":"Hadoop. Powered by hadoop, list of applications using hadoop mapreduce (2011), http:\/\/wiki.apache.org\/hadoop\/PoweredBy"},{"key":"10_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/978-3-540-47942-0_2","volume-title":"Information and Communication Security","author":"C. Hall","year":"1999","unstructured":"Hall, C., Goldberg, I., Schneier, B.: Reaction Attacks against Several Public-Key Cryptosystem. In: Varadharajan, V., Mu, Y. (eds.) ICICS 1999. LNCS, vol.\u00a01726, pp. 2\u201312. Springer, Heidelberg (1999)"},{"issue":"1","key":"10_CR27","doi-asserted-by":"crossref","first-page":"472","DOI":"10.14778\/1920841.1920903","volume":"3","author":"D. Jian","year":"2010","unstructured":"Jian, D., Ooi, B.C., Shi, L., Wu, S.: The performance of mapreduce: An in-depth study. Proceedings of the VLDB Endowment\u00a03(1), 472\u2013483 (2010)","journal-title":"Proceedings of the VLDB Endowment"},{"key":"10_CR28","unstructured":"Katz, J., Lindell, Y.: Introduction to modern cryptography. Chapman & Hall\/CRC (2008) ISBN 978-1-58488-551-1"},{"key":"10_CR29","doi-asserted-by":"crossref","unstructured":"Kushilevitz, E., Ostrovsky, R.: Replication is not needed: single database, computationally-private information retrieval. In: Proceedings of Symposium on Foundations of Computer Science, Miami Beach, USA, pp. 364\u2013373 (1997)","DOI":"10.1109\/SFCS.1997.646125"},{"key":"10_CR30","unstructured":"McCullagh, D.: Fbi wants records kept of web sites visited (2010), http:\/\/news.cnet.com\/8301-13578_3-10448060-38.html"},{"key":"10_CR31","first-page":"356","volume":"20","author":"W. Ogata","year":"2004","unstructured":"Ogata, W., Kurosawa, K.: Oblivious keyword search. Journal of Complexity \u2013 Special Issue on Coding and Cryptography\u00a020, 356\u2013371 (2004) ISSN 0885-064X","journal-title":"Journal of Complexity \u2013 Special Issue on Coding and Cryptography"},{"key":"10_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1007\/11535218_14","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","author":"R. Ostrovsky","year":"2005","unstructured":"Ostrovsky, R., Skeith III, W.E.: Private Searching on Streaming Data. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol.\u00a03621, pp. 223\u2013240. Springer, Heidelberg (2005)"},{"key":"10_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1007\/978-3-540-71677-8_26","volume-title":"Public Key Cryptography \u2013 PKC 2007","author":"R. Ostrovsky","year":"2007","unstructured":"Ostrovsky, R., Skeith III, W.E.: A Survey of Single-Database Private Information Retrieval: Techniques and Applications. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol.\u00a04450, pp. 393\u2013411. Springer, Heidelberg (2007)"},{"key":"10_CR34","doi-asserted-by":"crossref","unstructured":"Pavlo, A., Paulson, E., Rasin, A., Abadi, D.J., DeWitt, D.J., Madden, S., Stonebraker, M.: A comparison of approaches to large-scale data analysis. In: Proceedings of International Conference on Management of Data, Rhode Island, USA, pp. 165\u2013178 (2009)","DOI":"10.1145\/1559845.1559865"},{"key":"10_CR35","unstructured":"Sion, R., Carbunar, B.: On the computational practicality of private information retrieval. In: Proceedings of Network and Distributed Systems Security Symposium, San Diego, USA, pp. 1\u201310 (2007)"},{"key":"10_CR36","unstructured":"Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceedings of Symposium on Security and Privacy, Berkeley, USA, pp. 44\u201355 (2000)"},{"key":"10_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1007\/978-3-642-18178-8_10","volume-title":"Information Security","author":"J. Trostle","year":"2011","unstructured":"Trostle, J., Parrish, A.: Efficient Computationally Private Information Retrieval from Anonymity or Trapdoor Groups. In: Burmester, M., Tsudik, G., Magliveras, S., Ili\u0107, I. (eds.) ISC 2010. LNCS, vol.\u00a06531, pp. 114\u2013128. Springer, Heidelberg (2011)"}],"container-title":["Lecture Notes in Computer Science","Privacy Enhancing Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31680-7_10.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,2]],"date-time":"2025-04-02T19:53:12Z","timestamp":1743623592000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-31680-7_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642316791","9783642316807"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31680-7_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012]]}}}