{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,1,16]],"date-time":"2023-01-16T22:18:56Z","timestamp":1673907536343},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2013,1,9]],"date-time":"2013-01-09T00:00:00Z","timestamp":1357689600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Distrib Parallel Databases"],"published-print":{"date-parts":[[2014,3]]},"DOI":"10.1007\/s10619-012-7118-y","type":"journal-article","created":{"date-parts":[[2013,1,8]],"date-time":"2013-01-08T20:38:54Z","timestamp":1357677534000},"page":"65-89","source":"Crossref","is-referenced-by-count":8,"title":["Towards practical private processing of database queries over public data"],"prefix":"10.1007","volume":"32","author":[{"given":"Shiyuan","family":"Wang","sequence":"first","affiliation":[]},{"given":"Divyakant","family":"Agrawal","sequence":"additional","affiliation":[]},{"given":"Amr","family":"El Abbadi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,1,9]]},"reference":[{"key":"7118_CR1","unstructured":"http:\/\/acsc.csl.sri.com\/libpaillier"},{"key":"7118_CR2","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1145\/375551.375602","volume-title":"Proceedings of the Twentieth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems (PODS\u201901)","author":"D. Agrawal","year":"2001","unstructured":"Agrawal, D., Aggarwal, C.C.: On the design and quantification of privacy preserving data mining algorithms. In: Proceedings of the Twentieth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems (PODS\u201901), pp.\u00a0247\u2013255 (2001)"},{"key":"7118_CR3","unstructured":"Arrington, M.: AOL proudly releases massive amounts of private data (2006). http:\/\/www.techcrunch.com\/2006\/08\/06\/aol-proudly-releases-massive-amounts-of-user-search-data"},{"key":"7118_CR4","doi-asserted-by":"crossref","first-page":"16:1","DOI":"10.1145\/1455526.1455529","volume":"12","author":"J. Bethencourt","year":"2009","unstructured":"Bethencourt, J., Song, D., Waters, B.: New techniques for private stream searching. ACM Trans. Inf. Syst. Secur. 12, 16:1\u201316:32 (2009)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"issue":"6","key":"7118_CR5","first-page":"965","volume":"45","author":"B. Chor","year":"1998","unstructured":"Chor, B., Kushilevitz, E., Goldreich, O., Sudan, M.: Private information retrieval. J.\u00a0ACM 45(6), 965\u2013981 (1998)","journal-title":"J.\u00a0ACM"},{"key":"7118_CR6","doi-asserted-by":"crossref","first-page":"710","DOI":"10.1109\/ICDCS.2011.37","volume-title":"Proc. of the 31st International Conference on Distributed Computing Systems (ICDCS 2011)","author":"S. Capitani\u00a0di\u00a0Vimercati De","year":"2011","unstructured":"De Capitani\u00a0di\u00a0Vimercati, S., Foresti, S., Paraboschi, S., Pelosi, G., Samarati, P.: Efficient and private access to outsourced data. In: Proc. of the 31st International Conference on Distributed Computing Systems (ICDCS 2011), pp.\u00a0710\u2013719 (2011)"},{"key":"7118_CR7","first-page":"303","volume-title":"USENIX Security Symposium","author":"R. Dingledine","year":"2004","unstructured":"Dingledine, R., Mathewson, N., Syverson, P.: Tor: the second-generation onion router. In: USENIX Security Symposium, pp.\u00a0303\u2013320 (2004)"},{"key":"7118_CR8","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1145\/1401890.1401926","volume-title":"Proceeding of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD\u201908)","author":"S.R. Ganta","year":"2008","unstructured":"Ganta, S.R., Kasiviswanathan, S.P., Smith, A.: Composition attacks and auxiliary information in data privacy. In: Proceeding of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD\u201908), pp.\u00a0265\u2013273. ACM, New York (2008)"},{"key":"7118_CR9","doi-asserted-by":"crossref","first-page":"803","DOI":"10.1007\/11523468_65","volume-title":"Proceedings of the 32nd International Colloquium on Automata, Languages and Programming","author":"C. Gentry","year":"2005","unstructured":"Gentry, C., Ramzan, Z.: Single-database private information retrieval with constant communication rate. In: Proceedings of the 32nd International Colloquium on Automata, Languages and Programming, pp.\u00a0803\u2013815 (2005)"},{"key":"7118_CR10","volume-title":"Data Mining: Concepts and Techniques","author":"J. Han","year":"2000","unstructured":"Han, J., Kamber, M.: Data Mining: Concepts and Techniques. Morgan Kaufmann, San Mateo (2000)"},{"key":"7118_CR11","first-page":"417","volume-title":"Lessons from the Identity Trail: Anonymity, Privacy, and Identity in a Networked Society","author":"D.C. Howe","year":"2009","unstructured":"Howe, D.C., Nissenbaum, H.: TrackMeNot: resisting surveillance in web search. In: Lessons from the Identity Trail: Anonymity, Privacy, and Identity in a Networked Society, pp.\u00a0417\u2013436. Oxford University Press, London (2009). Chap.\u00a023"},{"key":"7118_CR12","first-page":"463","volume":"22","author":"O.H. Ibarra","year":"1975","unstructured":"Ibarra, O.H., Kim, C.E.: Fast approximation algorithms for the knapsack and sum of subset problems. J.\u00a0ACM 22, 463\u2013468 (1975)","journal-title":"J.\u00a0ACM"},{"key":"7118_CR13","doi-asserted-by":"crossref","first-page":"1026","DOI":"10.1109\/TKDE.2004.45","volume":"16","author":"M. Kantarcioglu","year":"2004","unstructured":"Kantarcioglu, M., Clifton, C.: Privacy-preserving distributed mining of association rules on horizontally partitioned data. IEEE Trans. Knowl. Data Eng. 16, 1026\u20131037 (2004)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"7118_CR14","first-page":"364","volume-title":"FOCS","author":"E. Kushilevitz","year":"1997","unstructured":"Kushilevitz, E., Ostrovsky, R.: Replication is not needed: single database, computationally-private information retrieval. In: FOCS, pp.\u00a0364\u2013373 (1997)"},{"key":"7118_CR15","first-page":"106","volume-title":"ICDE","author":"N. Li","year":"2007","unstructured":"Li, N., Li, T., Venkatasubramanian, S.: t-Closeness: privacy beyond k-anonymity and l-diversity. In: ICDE, pp.\u00a0106\u2013115 (2007)"},{"key":"7118_CR16","unstructured":"McCullagh, D.: Privacy leaks hit Facebook, Google, at&t (2010). http:\/\/news.cnet.com\/2702-1009_3-986.html"},{"key":"7118_CR17","first-page":"263","volume-title":"Secureware","author":"C.A. Melchor","year":"2008","unstructured":"Melchor, C.A., Crespin, B., Gaborit, P., Jolivet, V., Rousseau, P.: High-speed private information retrieval computation on GPU. In: Secureware, pp.\u00a0263\u2013272 (2008)"},{"key":"7118_CR18","first-page":"1848","volume-title":"IEEE Internal Symposium on Information Theory","author":"C.A. Melchor","year":"2008","unstructured":"Melchor, C.A., Gaborit, P.: A\u00a0fast private information retrieval protocol. In: IEEE Internal Symposium on Information Theory, pp.\u00a01848\u20131852 (2008)"},{"key":"7118_CR19","first-page":"763","volume-title":"VLDB","author":"M.F. Mokbel","year":"2006","unstructured":"Mokbel, M.F., Chow, C.Y., Aref, W.G.: The new Casper: query processing for location services without compromising privacy. In: VLDB, pp.\u00a0763\u2013774 (2006)"},{"key":"7118_CR20","first-page":"768","volume-title":"SDM","author":"M. Murugesan","year":"2009","unstructured":"Murugesan, M., Clifton, C.: Providing privacy through plausibly deniable search. In: SDM, pp.\u00a0768\u2013779 (2009)"},{"key":"7118_CR21","first-page":"158","volume-title":"Financial Cryptography","author":"F.G. Olumofin","year":"2011","unstructured":"Olumofin, F.G., Goldberg, I.: Revisiting the computational practicality of private information retrieval. In: Financial Cryptography, pp.\u00a0158\u2013172 (2011)"},{"key":"7118_CR22","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1007\/978-3-642-14527-8_6","volume-title":"Privacy Enhancing Technologies","author":"F.G. Olumofin","year":"2010","unstructured":"Olumofin, F.G., Tysowski, P.K., Goldberg, I., Hengartner, U.: Achieving efficient query privacy for location based services. In: Privacy Enhancing Technologies, pp.\u00a093\u2013110 (2010)"},{"key":"7118_CR23","doi-asserted-by":"crossref","first-page":"397","DOI":"10.1007\/s00145-007-0565-3","volume":"20","author":"R. Ostrovsky","year":"2007","unstructured":"Ostrovsky, R., Skeith, W.E.: Private searching on streaming data. J. Cryptol. 20, 397\u2013430 (2007)","journal-title":"J. Cryptol."},{"key":"7118_CR24","series-title":"Lecture Notes in Computer Science","first-page":"223","volume-title":"Advances in Cryptology (EUROCRYPT\u201999)","author":"P. Paillier","year":"1999","unstructured":"Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Advances in Cryptology (EUROCRYPT\u201999). Lecture Notes in Computer Science, vol.\u00a01592, pp.\u00a0223\u2013238. Springer, Berlin (1999)"},{"issue":"1","key":"7118_CR25","doi-asserted-by":"crossref","first-page":"598","DOI":"10.14778\/1920841.1920918","volume":"3","author":"H. Pang","year":"2010","unstructured":"Pang, H., Ding, X., Xiao, X.: Embellishing text search queries to protect user privacy. Proc. VLDB Endow. 3(1), 598\u2013607 (2010)","journal-title":"Proc. VLDB Endow."},{"key":"7118_CR26","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1007\/978-3-642-14527-8_2","volume-title":"Privacy Enhancing Technologies","author":"S.T. Peddinti","year":"2010","unstructured":"Peddinti, S.T., Saxena, N.: On the privacy of web search based on query obfuscation: a case study of TrackMeNot. In: Privacy Enhancing Technologies, pp.\u00a019\u201337 (2010)"},{"issue":"9","key":"7118_CR27","doi-asserted-by":"crossref","first-page":"4631","DOI":"10.1109\/TIT.2010.2054471","volume":"56","author":"D. Rebollo-Monedero","year":"2010","unstructured":"Rebollo-Monedero, D., Forn\u00e9, J.: Optimized query forgery for private information retrieval. IEEE Trans. Inf. Theory 56(9), 4631\u20134642 (2010)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"6","key":"7118_CR28","doi-asserted-by":"crossref","first-page":"1010","DOI":"10.1109\/69.971193","volume":"13","author":"P. Samarati","year":"2001","unstructured":"Samarati, P.: Protecting respondents\u2019 identities in microdata release. IEEE Trans. Knowl. Data Eng. 13(6), 1010\u20131027 (2001)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"7118_CR29","doi-asserted-by":"crossref","first-page":"188","DOI":"10.1145\/275487.275508","volume-title":"Proceedings of the Seventeenth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS\u201998)","author":"P. Samarati","year":"1998","unstructured":"Samarati, P., Sweeney, L.: Generalizing data to provide anonymity when disclosing information (abstract). In: Proceedings of the Seventeenth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS\u201998), p.\u00a0188 (1998)"},{"key":"7118_CR30","unstructured":"Schwartz, M.J.: Twitter finalizes ftc security settlement (2011). http:\/\/www.informationweek.com\/news\/security\/attacks\/229301037"},{"key":"7118_CR31","volume-title":"Network and Distributed System Security Symposium","author":"R. Sion","year":"2007","unstructured":"Sion, R., Carbunar, B.: On the computational practicality of private information retrieval. In: Network and Distributed System Security Symposium (2007)"},{"key":"7118_CR32","first-page":"1","volume-title":"DBSec","author":"S. Wang","year":"2010","unstructured":"Wang, S., Agrawal, D., Abbadi, A.E.: Generalizing PIR for practical private retrieval of public data. In: DBSec, pp.\u00a01\u201316 (2010)"},{"key":"7118_CR33","volume-title":"Network and Distributed System Security Symposium","author":"P. Williams","year":"2008","unstructured":"Williams, P., Sion, R.: Usable private information retrieval. In: Network and Distributed System Security Symposium (2008)"},{"key":"7118_CR34","first-page":"1","volume-title":"Proceedings of the 2009 International Conference on Computational Science and Engineering","author":"S. Ye","year":"2009","unstructured":"Ye, S., Wu, F., Pandey, R., Chen, H.: Noise injection for search privacy protection. In: Proceedings of the 2009 International Conference on Computational Science and Engineering, vol.\u00a03, pp.\u00a01\u20138 (2009)"}],"container-title":["Distributed and Parallel Databases"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10619-012-7118-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10619-012-7118-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10619-012-7118-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T19:29:50Z","timestamp":1559244590000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10619-012-7118-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,1,9]]},"references-count":34,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,3]]}},"alternative-id":["7118"],"URL":"https:\/\/doi.org\/10.1007\/s10619-012-7118-y","relation":{},"ISSN":["0926-8782","1573-7578"],"issn-type":[{"value":"0926-8782","type":"print"},{"value":"1573-7578","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,1,9]]}}}