{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T22:26:31Z","timestamp":1743114391498,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":23,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819785452"},{"type":"electronic","value":"9789819785469"}],"license":[{"start":{"date-parts":[[2024,10,18]],"date-time":"2024-10-18T00:00:00Z","timestamp":1729209600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,10,18]],"date-time":"2024-10-18T00:00:00Z","timestamp":1729209600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-97-8546-9_10","type":"book-chapter","created":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T09:02:51Z","timestamp":1729155771000},"page":"165-184","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Efficient and\u00a0Privacy-Preserving Multi-user, Multi-database and\u00a0Multi-dimensional Range Query"],"prefix":"10.1007","author":[{"given":"Xinya","family":"Tao","sequence":"first","affiliation":[]},{"given":"Aiqing","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Sultan","family":"Basudan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,10,18]]},"reference":[{"key":"10_CR1","doi-asserted-by":"publisher","first-page":"104127104141","DOI":"10.1109\/ACCESS.2021.3098708","volume":"9","author":"A Sahi","year":"2021","unstructured":"Sahi, A., Lai, D., Li, Y.: A review of the state of the art in privacy and security in the eHealth cloud. IEEE Access 9, 104127104141 (2021)","journal-title":"IEEE Access"},{"key":"10_CR2","doi-asserted-by":"publisher","first-page":"43378","DOI":"10.1109\/ACCESS.2021.3062467","volume":"9","author":"H Zhou","year":"2021","unstructured":"Zhou, H., Sun, G., Fu, S., Wang, L., Hu, J., Gao, Y.: Internet financial fraud detection based on a distributed big data approach with node2vec. IEEE Access 9, 43378\u201343386 (2021)","journal-title":"IEEE Access"},{"issue":"9","key":"10_CR3","doi-asserted-by":"publisher","first-page":"16534","DOI":"10.1109\/TITS.2021.3130978","volume":"23","author":"S Cai","year":"2021","unstructured":"Cai, S., Lyu, X., Li, X., Ban, D., Zeng, T.: A trajectory released scheme for the internet of vehicles based on differential privacy. IEEE Trans. Intell. Transp. Syst. 23(9), 16534\u201316547 (2021)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"10_CR4","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1109\/TKDE.2023.3283020","volume":"36","author":"Y Miao","year":"2024","unstructured":"Miao, Y., Yang, Y., Li, X., Wei, L., Liu, Z., Deng, R.H.: Efficient privacy-preserving spatial data query in cloud computing. IEEE Trans. Knowl. Data Eng. 36, 122\u2013136 (2024)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"7","key":"10_CR5","doi-asserted-by":"publisher","first-page":"4212","DOI":"10.1109\/TMC.2022.3145745","volume":"22","author":"J Liu","year":"2023","unstructured":"Liu, J., Zhang, C., Xue, K., Fang, Y.: Privacy preservation in multi-cloud secure data fusion for infectious-disease analysis. IEEE Trans. Mob. Comput. 22(7), 4212\u20134222 (2023)","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"2","key":"10_CR6","doi-asserted-by":"publisher","first-page":"394","DOI":"10.1109\/TPDS.2020.3023905","volume":"32","author":"C Wang","year":"2021","unstructured":"Wang, C., Yang, Y., Zhou, P.: Towards efficient scheduling of federated mobile devices under computational and statistical heterogeneity. IEEE Trans. Parallel Distrib. Syst. 32(2), 394\u2013410 (2021)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"5","key":"10_CR7","doi-asserted-by":"publisher","first-page":"3766","DOI":"10.1109\/TSC.2023.3259642","volume":"16","author":"L Sun","year":"2023","unstructured":"Sun, L., Zhang, Y., Zheng, Y., Song, W., Lu, R.: Towards efficient and privacy-preserving high-dimensional range query in cloud. IEEE Trans. Serv. Comput. 16(5), 3766\u20133781 (2023)","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"6","key":"10_CR8","doi-asserted-by":"publisher","first-page":"10464","DOI":"10.1109\/JIOT.2023.3326004","volume":"11","author":"X Tu","year":"2024","unstructured":"Tu, X., Bao, H., Lu, R., Huang, C., Dai, H.N.: PMRK: Privacy-preserving multidimensional range query with keyword search over spatial data. IEEE Internet Things J. 11(6), 10464\u201310478 (2024)","journal-title":"IEEE Internet Things J."},{"issue":"7","key":"10_CR9","doi-asserted-by":"publisher","first-page":"12362","DOI":"10.1109\/JIOT.2023.3334615","volume":"11","author":"W Wang","year":"2024","unstructured":"Wang, W., Jia, Z., Xu, M., Li, S.: FPMRQ: fully privacy-preserving multidimensional range queries on encrypted data. IEEE Internet Things J. 11(7), 12362\u201312376 (2024)","journal-title":"IEEE Internet Things J."},{"issue":"18","key":"10_CR10","doi-asserted-by":"publisher","first-page":"14322","DOI":"10.1109\/JIOT.2021.3068566","volume":"8","author":"Z Liu","year":"2021","unstructured":"Liu, Z., Wu, L., Meng, W., Wang, H., Wang, W.: Accurate range query with privacy preservation for outsourced location-based service in IOT. IEEE Internet Things J. 8(18), 14322\u201314337 (2021)","journal-title":"IEEE Internet Things J."},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Tong, Q., Li, X., Miao, Y., Liu, X., Weng, J., Deng, R. H..: Privacy-preserving boolean range query with temporal access control in mobile computing. IEEE Trans. Knowl. Data Eng. (2022)","DOI":"10.1109\/TKDE.2022.3152168"},{"key":"10_CR12","unstructured":"Yang, W., Geng, Y., Li, L., Xie, X., Huang, L.: Achieving secure and dynamic range queries over encrypted cloud data. IEEE Trans. Knowl. Data Eng. (2022)"},{"key":"10_CR13","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1016\/j.ins.2022.03.001","volume":"595","author":"Y Zhan","year":"2022","unstructured":"Zhan, Y., Shen, D., Duan, P., Zhang, B., Hong, Z., Wang, B.: MDOPE: efficient multi-dimensional data order preserving encryption scheme. Inf. Sci. 595, 334\u2013343 (2022)","journal-title":"Inf. Sci."},{"key":"10_CR14","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1016\/j.ins.2017.11.065","volume":"432","author":"Z Mei","year":"2018","unstructured":"Mei, Z., et al.: Executing multi-dimensional range query efficiently and flexibly over outsourced ciphertexts in the cloud. Inf. Sci. 432, 79\u201396 (2018)","journal-title":"Inf. Sci."},{"issue":"5","key":"10_CR15","doi-asserted-by":"publisher","first-page":"3478","DOI":"10.1109\/TDSC.2021.3101120","volume":"19","author":"Y Zheng","year":"2022","unstructured":"Zheng, Y., Lu, R., Guan, Y., Shao, J., Zhu, H.: Towards practical and privacy-preserving multi-dimensional range query over cloud. IEEE Trans. Depend. Secure Comput. 19(5), 3478\u20133493 (2022)","journal-title":"IEEE Trans. Depend. Secure Comput."},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"Wang, X., et al.: Search me in the dark: privacy-preserving Boolean range query over encrypted spatial data. In: IEEE INFOCOM 2020-IEEE Conference on Computer Communications, pp. 2253-2262. IEEE (2020)","DOI":"10.1109\/INFOCOM41043.2020.9155505"},{"key":"10_CR17","doi-asserted-by":"crossref","unstructured":"Yang, Y., Miao, Y., Choo, K.-K.R., Deng, R.H.: Lightweight privacy-preserving spatial keyword query over encrypted cloud data. In: 2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS), pp. 392\u2013402. IEEE (2022)","DOI":"10.1109\/ICDCS54860.2022.00045"},{"key":"10_CR18","doi-asserted-by":"crossref","unstructured":"Wong, W.K., Cheung, D.W., Kao, B., Mamoulis, N.: Secure kNN computation on encrypted databases. In: Proceedings of the 2009 ACM SIGMOD International Conference on Management of data, pp. 139-152 (2009)","DOI":"10.1145\/1559845.1559862"},{"key":"10_CR19","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1016\/j.jpdc.2019.04.015","volume":"131","author":"X Li","year":"2019","unstructured":"Li, X., Zhu, Y., Wang, J., Zhang, J.: Efficient and secure multi-dimensional geometric range query over encrypted data in cloud. J. Parallel Distrib. Comput. 131, 44\u201354 (2019)","journal-title":"J. Parallel Distrib. Comput."},{"issue":"4","key":"10_CR20","doi-asserted-by":"publisher","first-page":"870","DOI":"10.1109\/TIFS.2018.2868162","volume":"14","author":"G Xu","year":"2019","unstructured":"Xu, G., Li, H., Dai, Y., Yang, K., Lin, X.: Enabling efficient and geometric range query with access control over encrypted spatial data. IEEE Trans. Inf. Forensics Secur. 14(4), 870\u2013885 (2019)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"12","key":"10_CR21","doi-asserted-by":"publisher","first-page":"4410","DOI":"10.1109\/TMC.2021.3080714","volume":"21","author":"C Zhang","year":"2022","unstructured":"Zhang, C., Zhu, L., Xu, C., Ni, J., Huang, C., Shen, X.: Location privacy-preserving task recommendation with geometric range query in mobile crowdsensing. IEEE Trans. Mob. Comput. 21(12), 4410\u20134425 (2022)","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"18","key":"10_CR22","doi-asserted-by":"publisher","first-page":"17468","DOI":"10.1109\/JIOT.2022.3158321","volume":"9","author":"Y Zheng","year":"2022","unstructured":"Zheng, Y., et al.: PMRQ: achieving efficient and privacy-preserving multidimensional range query in eHealthcare. IEEE Internet Things J. 9(18), 17468\u201317479 (2022)","journal-title":"IEEE Internet Things J."},{"key":"10_CR23","doi-asserted-by":"crossref","unstructured":"Sung, K., Smith, G.: Vector cross products and 2d planes. basic math for game development with unity 3D: a beginner\u2019s guide to mathematical foundations. 235\u2013302 (2023)","DOI":"10.1007\/978-1-4842-9885-5_6"}],"container-title":["Lecture Notes in Computer Science","Data Security and Privacy Protection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-8546-9_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T09:12:08Z","timestamp":1729156328000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-8546-9_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,18]]},"ISBN":["9789819785452","9789819785469"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-8546-9_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,10,18]]},"assertion":[{"value":"18 October 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DSPP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Data Security and Privacy Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xi'an","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dspp2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}