{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T13:19:10Z","timestamp":1762867150768,"version":"3.37.3"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2017,7,4]],"date-time":"2017-07-04T00:00:00Z","timestamp":1499126400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1007\/s10586-017-0941-1","type":"journal-article","created":{"date-parts":[[2017,7,4]],"date-time":"2017-07-04T11:52:28Z","timestamp":1499169148000},"page":"1189-1202","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["SearchaStore: fast and secure searchable cloud services"],"prefix":"10.1007","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4659-8979","authenticated-orcid":false,"given":"Wai-Kong","family":"Lee","sequence":"first","affiliation":[]},{"given":"Raphael C.-W.","family":"Phan","sequence":"additional","affiliation":[]},{"given":"Geong-Sen","family":"Poh","sequence":"additional","affiliation":[]},{"given":"Bok-Min","family":"Goi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,4]]},"reference":[{"issue":"4","key":"941_CR1","doi-asserted-by":"crossref","first-page":"1405","DOI":"10.1007\/s10586-015-0488-y","volume":"18","author":"G Yang","year":"2015","unstructured":"Yang, G., Xie, L., Mantysalo, M., Zhou, X., Walter, S.K., Chen, Q., Zheng, L.: A healthcare information sharing scheme in distributed cloud networks. J. Clust. Comput. 18(4), 1405\u20131410 (2015)","journal-title":"J. Clust. Comput."},{"issue":"2","key":"941_CR2","doi-asserted-by":"crossref","first-page":"1547","DOI":"10.1109\/TII.2014.2306397","volume":"10","author":"F Tao","year":"2014","unstructured":"Tao, F., Zuo, Y., Xu, L.D., Zhang, L.: IoT-based intelligent perception and access of manufacturing resource toward cloud manufacturing. IEEE Trans. Ind. Inf. 10(2), 1547\u20131557 (2014)","journal-title":"IEEE Trans. Ind. Inf."},{"key":"941_CR3","doi-asserted-by":"crossref","unstructured":"A. Mhlaba, M. Masinde.: Implementation of Middleware for Internet of Things in Asset Tracking Applications: In-lining Approach. IEEE International Conference on Industrial Informatics, INDIN, pp. 460-469, 2015","DOI":"10.1109\/INDIN.2015.7281778"},{"issue":"2","key":"941_CR4","first-page":"460","volume":"19","author":"A Mhlaba","year":"2015","unstructured":"Mhlaba, A., Masinde, M.: Secure outsourcing of modular exponentiations in cloud and cluster computing. J. Clust. Comput. 19(2), 460\u2013469 (2015)","journal-title":"J. Clust. Comput."},{"issue":"2","key":"941_CR5","doi-asserted-by":"crossref","first-page":"1034","DOI":"10.1109\/TCE.2010.5506036","volume":"56","author":"SG Lee","year":"2010","unstructured":"Lee, S.G., Lee, D., Lee, S.: Personalized DTV program recommendation system under a cloud computing environment. IEEE Trans. Consum. Electron. 56(2), 1034\u20131042 (2010)","journal-title":"IEEE Trans. Consum. Electron."},{"issue":"2","key":"941_CR6","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1007\/s10586-012-0221-z","volume":"16","author":"Y Kim","year":"2013","unstructured":"Kim, Y., Ko, J., Shin, D., Kim, C., Park, C.: A frequency monitoring system development for wide-area power grid protection. J. Clust. Comput. 16(2), 209\u2013219 (2013)","journal-title":"J. Clust. Comput."},{"issue":"1","key":"941_CR7","doi-asserted-by":"crossref","first-page":"485","DOI":"10.1007\/s10586-015-0516-y","volume":"19","author":"S Park","year":"2015","unstructured":"Park, S., Park, E., Seo, J., Li, G.: Factors affecting the continuous use of cloud service-focused on security risks. J. Clust. Comput. 19(1), 485\u2013495 (2015)","journal-title":"J. Clust. Comput."},{"issue":"1","key":"941_CR8","doi-asserted-by":"crossref","first-page":"548558","DOI":"10.1109\/TII.2013.2257807","volume":"10","author":"S Fang","year":"2014","unstructured":"Fang, S., Xu, L., Pei, H., Liu, Y.: An integrated approach to snowmelt flood forecasting in water resource management. IEEE Trans. Ind. Inf. 10(1), 548558 (2014)","journal-title":"IEEE Trans. Ind. Inf."},{"issue":"3","key":"941_CR9","first-page":"211213","volume":"30","author":"L Xu","year":"2013","unstructured":"Xu, L.: Introduction: Systems science in industrial sectors. Syst. Res. Behav. Sci. 30(3), 211213 (2013)","journal-title":"Syst. Res. Behav. Sci."},{"key":"941_CR10","unstructured":"Song, X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. SP 00: Proceedings of the IEEE Symposium on Security and Privacy, pp. 44, (2000)"},{"key":"941_CR11","unstructured":"Goh, E.J.: Secure indexes. Cryptology ePrint Archive. Report 2003\/216. http:\/\/eprint.iacr.org\/2003\/216\/"},{"key":"941_CR12","doi-asserted-by":"crossref","unstructured":"Curtmola, R., Garay, J.A., Kamara, S., Ostrovsky, R.: Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions. ACM Conference on Computer and Communications Security, CCS, pp. 7988. (2006)","DOI":"10.1145\/1180405.1180417"},{"key":"941_CR13","doi-asserted-by":"crossref","unstructured":"Chase, M., Kamara, S.: Structured Encryption and Controlled Disclosure. ASIACRYPT, Lecture Notes in Computer Science. 6477, pp. 577594. Springer, Heidelberg(2010)","DOI":"10.1007\/978-3-642-17373-8_33"},{"key":"941_CR14","doi-asserted-by":"crossref","unstructured":"Kamara, S., Papamanthou, C., Roeder, T.: Dynamic searchable symmetric encryption. ACM Conference on Computer and Communications Security. pp. 965976. (2012)","DOI":"10.1145\/2382196.2382298"},{"key":"941_CR15","doi-asserted-by":"crossref","unstructured":"Naveed, M., Prabhakaran, M., Gunter, C.A.: Dynamic searchable encryption via blind storage. Proceedings of the IEEE Symposium on Security and Privacy, pp. 639\u2013654. (2014)","DOI":"10.1109\/SP.2014.47"},{"issue":"5","key":"941_CR16","doi-asserted-by":"crossref","first-page":"895","DOI":"10.3233\/JCS-2011-0426","volume":"19","author":"R Curtmola","year":"2011","unstructured":"Curtmola, R., Garay, J.A., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. J. Comput. Secur. 19(5), 895\u2013934 (2011)","journal-title":"J. Comput. Secur."},{"issue":"2014","key":"941_CR17","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1007\/978-3-662-43936-4_5","volume":"8566","author":"T Moataz","year":"2014","unstructured":"Moataz, T., Justus, B., Ray, I., Cuppens-Boulahia, N., Cuppens, F., Ray, I.: Privacy-preserving multiple keyword search on outsourced data in the clouds. Lect. Notes Comput. Sci. 8566(2014), 66\u201381 (2014)","journal-title":"Lect. Notes Comput. Sci."},{"key":"941_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"353","DOI":"10.1007\/978-3-642-40041-4_20","volume-title":"Advances in Cryptology","author":"D Cash","year":"2013","unstructured":"Cash, D., Jarecki, S., Jutla, C.S., Krawczyk, H., Rosu, M., Steiner, M.: Highly-scalable searchable symmetric encryption with support for Boolean queries. Advances in Cryptology. Lecture Notes in Computer Science, vol. 8042, pp. 353\u2013373. Springer, Berlin (2013)"},{"key":"941_CR19","doi-asserted-by":"crossref","unstructured":"Moataz, T., Shikfa, A.: Boolean symmetric searchable encryption. 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS, pp. 265276. (2013)","DOI":"10.1145\/2484313.2484347"},{"issue":"4","key":"941_CR20","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1109\/TDSC.2013.9","volume":"10","author":"J Yu","year":"2013","unstructured":"Yu, J., Lu, P., Zhu, Y., Xue, G., Li, M.: Toward secure multikeyword top-k retrieval over encrypted cloud data. IEEE Trans. Dependable Secur. Comput. 10(4), 239\u2013250 (2013)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"941_CR21","first-page":"258","volume-title":"Parallel and Dynamic Searchable Symmetric Encryption. Financial Cryptography","author":"S Kamara","year":"2013","unstructured":"Kamara, S., Papamanthou, C.: Parallel and Dynamic Searchable Symmetric Encryption. Financial Cryptography, pp. 258\u2013274. Springer, Berlin (2013)"},{"key":"941_CR22","doi-asserted-by":"crossref","unstructured":"Cash, D., Jaeger, J., Jarecki, S., Jutla, C., Krawczyk, H., Rosu, M.C., Steiner, M.: Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation. Network and Distributed System Security Symposium, NDSS (2014)","DOI":"10.14722\/ndss.2014.23264"},{"issue":"2","key":"941_CR23","first-page":"1","volume":"27","author":"Z Xia","year":"2015","unstructured":"Xia, Z., Wang, X., Sun, X., Wang, Q.: A secure and dynamic multi-keyword ranked search scheme over outsourced cloud data. IEEE Trans. Parallel Distrib.Syst. 27(2), 1\u201313 (2015)","journal-title":"IEEE Trans. Parallel Distrib.Syst."},{"key":"941_CR24","doi-asserted-by":"crossref","unstructured":"Boneh, D., Kushilevitz, E., Ostrovsky, R., Skeith, W.E. III.: Public key encryption that allows PIR queries. CRYPTO, Lecture Notes in Computer Science. 4622, pp. 5067. Springer, Heidelberg. (2007)","DOI":"10.1007\/978-3-540-74143-5_4"},{"key":"941_CR25","doi-asserted-by":"crossref","unstructured":"Stefanov, E., Shi, E.: ObliviStore: High Performance Oblivious Cloud Storage. Proceedings of the IEEE Symposium on Security and Privacy, pp. 253\u2013267. (2013)","DOI":"10.1109\/SP.2013.25"},{"key":"941_CR26","doi-asserted-by":"crossref","unstructured":"Gentry, C., Halevi, S., Smart, N.P.: Fully homomorphic encryption with polylog overhead. Advances in Cryptology\u2014EUROCRYPT, Lecture Notes in Computer Science, vol. 7237, pp. 465\u2013482. Springer, Berlin (2012)","DOI":"10.1007\/978-3-642-29011-4_28"},{"issue":"6","key":"941_CR27","doi-asserted-by":"crossref","first-page":"1555","DOI":"10.1109\/TVCG.2009.161","volume":"15","author":"DM Hughes","year":"2009","unstructured":"Hughes, D.M., Lim, I.S.: Kd-jump: a path-preserving stackless traversal for faster isosurface raytracing on GPUs. IEEE Trans. Vis. Comput. Graph. 15(6), 1555\u20131562 (2009)","journal-title":"IEEE Trans. Vis. Comput. Graph."},{"key":"941_CR28","doi-asserted-by":"crossref","first-page":"843","DOI":"10.1007\/978-3-642-33615-7_27","volume":"7566","author":"K Kaczmarski","year":"2012","unstructured":"Kaczmarski, K.: B+-tree optimized for GPGPU. Lect. Notes Comput. Sci. 7566, 843\u2013854 (2012)","journal-title":"Lect. Notes Comput. Sci."},{"key":"941_CR29","doi-asserted-by":"crossref","unstructured":"C. Kim, J., Chhugani, N., Satish, E., Sedlar, A., Nguyen, D., Kaldewey, T., Lee, V.W., Brandt, S.A., Dubey, P.: FAST: fast architecture sensitive tree search on modern CPUs and GPUs. Proceedings of the 2010 ACM SIGMOD International Conference on Management of data, pp. 339\u2013350. (2010)","DOI":"10.1145\/1807167.1807206"},{"issue":"3","key":"941_CR30","doi-asserted-by":"crossref","first-page":"786","DOI":"10.1109\/TPDS.2014.2312199","volume":"26","author":"X Chen","year":"2015","unstructured":"Chen, X., Ren, L., Wang, Y., Yang, H.: GPU-accelerated sparse LU factorization for circuit simulation with performance modeling. IEEE Trans. Parallel Distrib. Syst. 26(3), 786\u2013795 (2015)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"4","key":"941_CR31","doi-asserted-by":"crossref","first-page":"818","DOI":"10.1109\/LGRS.2013.2279331","volume":"11","author":"S Mei","year":"2014","unstructured":"Mei, S., He, M., Shen, Z.: Optimizing Hopfield Neural Network for Spectral Mixture Unmixing on GPU Platform. IEEE Geosci. Remote Sens. Lett. 11(4), 818\u2013822 (2014)","journal-title":"IEEE Geosci. Remote Sens. Lett."},{"issue":"1","key":"941_CR32","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1109\/TCE.2013.6490270","volume":"59","author":"L Hu","year":"2013","unstructured":"Hu, L., Nooshabadi, S., Mladenov, T.: Forward error correction with Raptor GF(2) and GF(256) codes on GPU. IEEE Trans. Consum. Electron. 59(1), 273\u2013280 (2013)","journal-title":"IEEE Trans. Consum. Electron."},{"issue":"1","key":"941_CR33","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1007\/s10586-016-0536-2","volume":"19","author":"WK Lee","year":"2016","unstructured":"Lee, W.K., Cheong, H.S., Phan, Raphael C.-W., Goi, B.M.: Fast implementation of block ciphers and PRNGs in Maxwell GPU architecture. J. Clust. Comput. 19(1), 335\u2013347 (2016)","journal-title":"J. Clust. Comput."},{"key":"941_CR34","doi-asserted-by":"crossref","unstructured":"Yang, Y., Guan, Z., Sun, H., Chen, Z.: Accelerating RSA with fine-grained parallelism using GPU. Information Security Practice and Experience, Lecture Notes in Computer Science, vol 9065, pp. 454-468. (2015)","DOI":"10.1007\/978-3-319-17533-1_31"},{"issue":"12","key":"941_CR35","first-page":"415435","volume":"262","author":"H Park","year":"2001","unstructured":"Park, H., Park, K.: Parallel algorithms for redblack trees. Theor. Comput. Sci. 262(12), 415435 (2001)","journal-title":"Theor. Comput. Sci."},{"key":"941_CR36","unstructured":"Enron Dataset. https:\/\/www.cs.cmu.edu\/enron\/ . (2015)"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10586-017-0941-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-017-0941-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-017-0941-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,11]],"date-time":"2020-10-11T14:12:35Z","timestamp":1602425555000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10586-017-0941-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,4]]},"references-count":36,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2018,6]]}},"alternative-id":["941"],"URL":"https:\/\/doi.org\/10.1007\/s10586-017-0941-1","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"type":"print","value":"1386-7857"},{"type":"electronic","value":"1573-7543"}],"subject":[],"published":{"date-parts":[[2017,7,4]]}}}