{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:20:04Z","timestamp":1740122404032,"version":"3.37.3"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"S3","license":[{"start":{"date-parts":[[2017,12,21]],"date-time":"2017-12-21T00:00:00Z","timestamp":1513814400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Nature Science Foundation of China","doi-asserted-by":"crossref","award":["61772101","61772124"],"award-info":[{"award-number":["61772101","61772124"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Nature Science Foundation of China","doi-asserted-by":"crossref","award":["61170169","61170168"],"award-info":[{"award-number":["61170169","61170168"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Shanxi Province Natural Science Foundation for Young","award":["201601D202038"],"award-info":[{"award-number":["201601D202038"]}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","award":["02190022116008","02190022116016"],"award-info":[{"award-number":["02190022116008","02190022116016"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2019,5]]},"DOI":"10.1007\/s10586-017-1521-0","type":"journal-article","created":{"date-parts":[[2017,12,21]],"date-time":"2017-12-21T06:52:25Z","timestamp":1513839145000},"page":"5763-5773","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Privacy protection and integrity verification of aggregate queries in cloud computing"],"prefix":"10.1007","volume":"22","author":[{"given":"Jun","family":"Hong","sequence":"first","affiliation":[]},{"given":"Tao","family":"Wen","sequence":"additional","affiliation":[]},{"given":"Quan","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Zhengwang","family":"Ye","sequence":"additional","affiliation":[]},{"given":"Ying","family":"Yin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,21]]},"reference":[{"issue":"1","key":"1521_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2010.07.006","volume":"35","author":"S Subashini","year":"2011","unstructured":"Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 35(1), 1\u201311 (2011)","journal-title":"J. Netw. Comput. Appl."},{"issue":"4","key":"1521_CR2","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/1721654.1721672","volume":"53","author":"M Armbrust","year":"2010","unstructured":"Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., et al.: A view of cloud computing. Commun. ACM 53(4), 50\u201358 (2010)","journal-title":"Commun. ACM"},{"issue":"1","key":"1521_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2010.07.006","volume":"34","author":"S Subashini","year":"2011","unstructured":"Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1\u201311 (2011)","journal-title":"J. Netw. Comput. Appl."},{"issue":"1","key":"1521_CR4","doi-asserted-by":"publisher","first-page":"71","DOI":"10.3724\/SP.J.1001.2011.03958","volume":"22","author":"D-G Feng","year":"2011","unstructured":"Feng, D.-G., Zhang, M., Zhang, Y., Zhen, X.: Study on cloud computing security. J. Softw. 22(1), 71\u201383 (2011)","journal-title":"J. Softw."},{"key":"1521_CR5","unstructured":"Ramgovind, S., Eloff, M.M., Smith, E.: The management of security in cloud computing. In: Proceedings of the Information Security for South Africa (ISSA), 2010, pp. 1\u20137. IEEE (2010)"},{"issue":"1","key":"1521_CR6","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1109\/TKDE.2007.190670","volume":"20","author":"Y Zhao","year":"2007","unstructured":"Zhao, Y., Yu, J.X., Wang, G., Chen, L., Wang, B., Yu, G.: Maximal subspace coregulated gene clustering. IEEE Trans. Knowl. Data Eng. 20(1), 83\u201398 (2007)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"1521_CR7","doi-asserted-by":"crossref","unstructured":"Hacigum\u0308\u00fc\u015f, H., Iyer, B., Li, C., Mehrotra, S.: Executing SQL over encrypted data in the database-service-provider model. In: Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data, pp. 216\u2013227. ACM (2002)","DOI":"10.1145\/564691.564717"},{"key":"1521_CR8","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Order preserving encryption for numeric data. In: Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data, pp. 563\u2013574. ACM (2004)","DOI":"10.1145\/1007568.1007632"},{"key":"1521_CR9","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1007\/978-3-642-01001-9_13","volume-title":"Advances in Cryptology - EUROCRYPT 2009","author":"Alexandra Boldyreva","year":"2009","unstructured":"Boldyreva, A., Chenette, N., Lee, Y., O\u2019Neill, A.: Order-preserving symmetric encryption. In: Advances in Cryptology\u2014EUROCRYPT 2009, Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26\u201330, 2009, vol. 5479, pp. 224\u2013241 (2009)"},{"key":"1521_CR10","doi-asserted-by":"crossref","unstructured":"Mykletun, E., Tsudik, G.: Aggregation queries in the database-as-a-service model. In: Proceedings of the Data and Applications Security XX, pp. 89\u2013103. Springer (2006)","DOI":"10.1007\/11805588_7"},{"key":"1521_CR11","doi-asserted-by":"crossref","unstructured":"Hacigumus, H., Iyer, B., Mehrotra, S.: Efficient execution of aggregation queries over encrypted databases. In: Lecture Notes in Computer Science. vol. 2973, pp. 125\u2013136 (2004)","DOI":"10.1007\/978-3-540-24571-1_10"},{"key":"1521_CR12","doi-asserted-by":"crossref","unstructured":"Thompson, B., Haber, S., Horne, W.G., Sander, T., Yao, D.: Privacy preserving computation and verification of aggregate queries on outsourced databases. In: Proceedings of the Privacy Enhancing Technologies, pp. 185\u2013201. Springer (2009)","DOI":"10.1007\/978-3-642-03168-7_11"},{"issue":"3","key":"1521_CR13","first-page":"35","volume":"5","author":"MA Alzain","year":"2015","unstructured":"Alzain, M.A., Li, A.S., Soh, B., Pardede, E.: Multi-cloud data management using Shamir\u2019s secret sharing and quantum Byzantine agreement schemes. Int. J. Cloud Appl. Comput. 5(3), 35\u201352 (2015)","journal-title":"Int. J. Cloud Appl. Comput."},{"key":"1521_CR14","unstructured":"Emekci, F., Agrawal, D., Abbadi, A.E., Gulbeden, A.: Privacy preserving query processing using third parties. In: Proceedings of the 22nd International Conference on Data Engineering, 2006. ICDE\u201906. IEEE (2006)"},{"issue":"11","key":"1521_CR15","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 22(11), 612\u2013613 (1979)","journal-title":"Commun. ACM"},{"key":"1521_CR16","doi-asserted-by":"crossref","unstructured":"Hadavi, M.A., Damiani, E., Jalili, R., Cimato, S., Ganjei, Z.: AS5: a secure searchable secret sharing scheme for privacy preserving database outsourcing. In: Data Privacy Management and Autonomous Spontaneous Security (2013)","DOI":"10.1007\/978-3-642-35890-6_15"},{"key":"1521_CR17","unstructured":"Haber, S., Horne, W.G., Sander, T., Yao, D.: Privacy-aware verification of aggregate queries on outsourced databases with applications to historic data integrity. In: Proceedings of the Privacy Enhancing Technologies (2009)"},{"key":"1521_CR18","doi-asserted-by":"crossref","unstructured":"Nath, S., Venkatesan, R.: Publicly verifiable grouped aggregation queries on outsourced data streams. Proceedings of the IEEE, International Conference on Data Engineering, pp. 517\u2013528. IEEE (2013)","DOI":"10.1109\/ICDE.2013.6544852"},{"key":"1521_CR19","doi-asserted-by":"crossref","unstructured":"Zhuo, G., Jia, Q., Guo, L., Li, M., Li, P.: Privacy-preserving verifiable data aggregation and analysis for cloud-assisted mobile crowdsourcing. Proceedings of the IEEE INFOCOM 2016\u2014the IEEE International Conference on Computer Communications, pp. 1\u20139. IEEE (2016)","DOI":"10.1109\/INFOCOM.2016.7524547"},{"key":"1521_CR20","doi-asserted-by":"crossref","unstructured":"Pang, H., Jain, A., Ramamritham, K., Tan, K.-L.: Verifying completeness of relational query results in data publishing. In: Proceedings of the 2005 ACM SIGMOD International Conference on Management of Data, pp. 407\u2013418. ACM (2005)","DOI":"10.1145\/1066157.1066204"},{"key":"1521_CR21","doi-asserted-by":"crossref","unstructured":"Narasimha, M., Tsudik, G.: Dsac: integrity for outsourced databases with signature aggregation and chaining. In: Proceedings of the 14th ACM International Conference on Information and Knowledge Management, pp. 235\u2013236. ACM (2005)","DOI":"10.1145\/1099554.1099604"},{"key":"1521_CR22","doi-asserted-by":"crossref","unstructured":"Hong, J., Wen, T., Gu, Q., Sheng, G.: Query integrity verification based-on mac chain in cloud storage. In: Proceedings of the 2014 IEEE\/ACIS 13th International Conference onComputer and Information Science (ICIS), pp. 125\u2013129. IEEE (2014)","DOI":"10.1109\/ICIS.2014.6912119"},{"key":"1521_CR23","first-page":"028","volume":"1","author":"Z Min","year":"2010","unstructured":"Min, Z., Cheng, H., Chi, C.: Server transparent query authentication of outsourced database. J. Comput. Res. Dev. 1, 028 (2010)","journal-title":"J. Comput. Res. Dev."},{"key":"1521_CR24","doi-asserted-by":"crossref","unstructured":"Merkle, R.C.: A certified digital signature. In: Advances in CryptologyCRYPTO89 Proceedings, pp. 218\u2013238. Springer (1990)","DOI":"10.1007\/0-387-34805-0_21"},{"key":"1521_CR25","doi-asserted-by":"crossref","unstructured":"Li, F., Hadjieleftheriou, M., Kollios, G., Reyzin, L.: Dynamic authenticated index structures for outsourced databases. In: Proceedings of the 2006 ACM SIGMOD International Conference on Management of Data, pp. 121\u2013132. ACM (2006)","DOI":"10.1145\/1142473.1142488"},{"key":"1521_CR26","doi-asserted-by":"crossref","unstructured":"Goodrich, M.T., Tamassia, R., Triandopoulos, N.: Super-efficient verification of dynamic outsourced databases. In Proceedings of the Topics in Cryptology\u2013CT-RSA 2008, pp. 407\u2013424. Springer (2008)","DOI":"10.1007\/978-3-540-79263-5_26"},{"key":"1521_CR27","unstructured":"Papadopoulos, S., Yang, Y., Papadias, D.: CADS: continuous authentication on data streams. In: Proceedings of the 33rd International Conference on Very Large Data Bases, pp. 135\u2013146. VLDB Endowment (2007)"},{"issue":"10","key":"1521_CR28","first-page":"2077","volume":"49","author":"T Wen","year":"2012","unstructured":"Wen, T., Sheng, G., Guo, Q., Guo-Jun, S.: Query results authentication of outsourced append-only databases. J. Comput. Res. Dev. 49(10), 2077\u20132085 (2012)","journal-title":"J. Comput. Res. Dev."},{"key":"1521_CR29","first-page":"1","volume":"9","author":"G Sheng","year":"2017","unstructured":"Sheng, G., Tang, C., Han, H., Gao, W., Hu, X.: Authentication of outsourced linear function query with efficient updates. Clust. Comput. 9, 1\u20139 (2017)","journal-title":"Clust. Comput."},{"issue":"4","key":"1521_CR30","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1145\/1880022.1880026","volume":"13","author":"F Li","year":"2010","unstructured":"Li, F., Hadjieleftheriou, M., Kollios, G., Reyzin, L.: Authenticated index structures for aggregation queries. ACM Trans. Inf. Syst. Secur. (TISSEC) 13(4), 32 (2010)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"key":"1521_CR31","doi-asserted-by":"crossref","unstructured":"Chen, Q., Hu, H., Xu, J.: Authenticated online data integration services. Proceedings of the ACM SIGMOD International Conference, pp. 167\u2013181. ACM (2015)","DOI":"10.1145\/2723372.2747649"},{"key":"1521_CR32","unstructured":"Chandrasekhar, S., Singhal, M.: Efficient and scalable query authentication for cloud-based storage systems with multiple data sources. IEEE Trans. Serv. Comput. (2015)"},{"key":"1521_CR33","doi-asserted-by":"crossref","unstructured":"Chandrasekhar, S., Singhal, M.: Multi-trapdoor hash functions and their applications in network security. In: Proceedings of the IEEE Conference on Communications and Network Security, pp. 463\u2013471. IEEE (2014)","DOI":"10.1109\/CNS.2014.6997516"},{"key":"1521_CR34","doi-asserted-by":"crossref","unstructured":"Pedersen, T.P.: Non-interactive and information-theoretic secure verifiable secret sharing. In: Proceedings of the Advances in CryptologyCRYPTO91, pp. 129\u2013140. Springer (1992)","DOI":"10.1007\/3-540-46766-1_9"},{"key":"1521_CR35","doi-asserted-by":"crossref","unstructured":"Durfee, G., Franklin, M.: Distribution chain security. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 63\u201370. ACM (2000)","DOI":"10.1145\/352600.352610"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-017-1521-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10586-017-1521-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-017-1521-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,4]],"date-time":"2019-11-04T12:32:27Z","timestamp":1572870747000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10586-017-1521-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,21]]},"references-count":35,"journal-issue":{"issue":"S3","published-print":{"date-parts":[[2019,5]]}},"alternative-id":["1521"],"URL":"https:\/\/doi.org\/10.1007\/s10586-017-1521-0","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"type":"print","value":"1386-7857"},{"type":"electronic","value":"1573-7543"}],"subject":[],"published":{"date-parts":[[2017,12,21]]},"assertion":[{"value":"28 September 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 December 2017","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 December 2017","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 December 2017","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}