{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,6]],"date-time":"2025-08-06T12:13:13Z","timestamp":1754482393917,"version":"3.41.0"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2015,10,14]],"date-time":"2015-10-14T00:00:00Z","timestamp":1444780800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Distrib Parallel Databases"],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1007\/s10619-015-7186-x","type":"journal-article","created":{"date-parts":[[2015,10,14]],"date-time":"2015-10-14T09:41:40Z","timestamp":1444815700000},"page":"505-534","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Access control aware data retrieval for secret sharing based database outsourcing"],"prefix":"10.1007","volume":"34","author":[{"given":"Mohammad Ali","family":"Hadavi","sequence":"first","affiliation":[]},{"given":"Rasool","family":"Jalili","sequence":"additional","affiliation":[]},{"given":"Leila","family":"Karimi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,10,14]]},"reference":[{"key":"7186_CR1","doi-asserted-by":"crossref","unstructured":"Agrawal, D., Abbadi, A., Emekci, F., Metwally, A.: Database management as a service: challenges and opportunities. In: IEEE 25th International Conference on Data Engineering, 2009 (ICDE\u201909), pp. 1709\u20131716 (2009)","DOI":"10.1109\/ICDE.2009.151"},{"key":"7186_CR2","doi-asserted-by":"crossref","unstructured":"Agrawal, D., Abbadi, A., Emekci, F., Metwally, A., Wang, S.: Secure data management service on cloud computing infrastructures. In: New Frontiers in Information and Software as Services. Lecture Notes in Business Information Processing, vol.\u00a074, pp. 57\u201380. Springer, Heidelberg (2011)","DOI":"10.1007\/978-3-642-19294-4_3"},{"key":"7186_CR3","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1127345.1127346","volume":"9","author":"G Ateniese","year":"2006","unstructured":"Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9, 1\u201330 (2006)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"7186_CR4","doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, pp. 321\u2013334 (2007)","DOI":"10.1109\/SP.2007.11"},{"issue":"4","key":"7186_CR5","doi-asserted-by":"crossref","first-page":"212","DOI":"10.1109\/TDSC.2013.6","volume":"10","author":"J Bohli","year":"2013","unstructured":"Bohli, J., Gruschka, N., Jensen, M., Iacono, L.L., Marnau, N.: Security and privacy-enhancing multicloud architectures. IEEE Trans. Dependable Secur. Comput. 10(4), 212\u2013224 (2013)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"7186_CR6","doi-asserted-by":"crossref","unstructured":"Damiani, E., De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Key management for multi-user encrypted databases. In: Proceedings of the 2005 ACM Workshop on Storage Security and Survivability, pp. 74\u201383 (2005)","DOI":"10.1145\/1103780.1103792"},{"key":"7186_CR7","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1016\/j.entcs.2006.11.003","volume":"168","author":"E Damiani","year":"2007","unstructured":"Damiani, E., De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Selective data encryption in outsourced dynamic environments. Electron. Notes Theor. Comput. Sci. 168, 127\u2013142 (2007)","journal-title":"Electron. Notes Theor. Comput. Sci."},{"key":"7186_CR8","doi-asserted-by":"crossref","unstructured":"Dautrich, J.L., Ravishankar, C.V.: Security limitations of using secret sharing for data outsourcing. In: Proceedings of the 26th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec\u201912), pp. 145\u2013160. Springer-Verlag, Berlin (2012)","DOI":"10.1007\/978-3-642-31540-4_12"},{"key":"7186_CR9","unstructured":"De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Over-encryption: management of access control revolution on outsourced data. In: Proceedings of the 33rd International Conference on Very Large Databases, pp. 123 \u2013134 (2007)"},{"key":"7186_CR10","doi-asserted-by":"crossref","unstructured":"De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Preserving confidentiality of security policies in data outsourcing. In: Proceedings of the 7th ACM Workshop on Privacy in the Electronic Society, pp. 75\u201384. ACM, New York (2008)","DOI":"10.1145\/1456403.1456417"},{"issue":"2","key":"7186_CR11","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1735886.1735891","volume":"35","author":"S De\u00a0Capitani\u00a0di Vimercati","year":"2010","unstructured":"De\u00a0Capitani\u00a0di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Encryption policies for regulating access to outsourced data. ACM Trans. Database Syst. 35(2), 1\u201346 (2010)","journal-title":"ACM Trans. Database Syst."},{"key":"7186_CR12","doi-asserted-by":"crossref","unstructured":"De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Private data indexes for selective access to outsourced data. In: Proceedings of WPES, pp. 69\u201380 (2011)","DOI":"10.1145\/2046556.2046566"},{"key":"7186_CR13","doi-asserted-by":"crossref","unstructured":"De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Support for write privileges on outsourced data. In: Information Security and Privacy Research, pp. 199\u2013210. Springer, Berlin (2012)","DOI":"10.1007\/978-3-642-30436-1_17"},{"key":"7186_CR14","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1016\/j.ins.2013.10.006","volume":"263","author":"F Emekci","year":"2014","unstructured":"Emekci, F., Methwally, A., Agrawal, D., Abbadi, A.E.: Dividing secrets to secure data outsourcing. Inf. Sci. 263, 198\u2013210 (2014)","journal-title":"Inf. Sci."},{"key":"7186_CR15","doi-asserted-by":"publisher","unstructured":"Ermakova, T., Fabian, B.: Secret sharing for health data in multi-provider clouds. In: 2013 IEEE 15th Conference on Business Informatics (CBI), pp. 93\u2013100 (2013). doi: 10.1109\/CBI.2013.22","DOI":"10.1109\/CBI.2013.22"},{"key":"7186_CR16","doi-asserted-by":"crossref","unstructured":"Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS\u201906), pp. 89\u201398. ACM, New York (2006)","DOI":"10.1145\/1180405.1180418"},{"key":"7186_CR17","unstructured":"Hadavi, M.A., Jalili, R.: Secure data outsourcing based on threshold secret sharing; towards a more practical solution. In: Proceeding of VLDB PhD Workshop, pp. 54\u201359. VLDB Endowment, Singapore (2010)"},{"key":"7186_CR18","doi-asserted-by":"crossref","unstructured":"Hadavi, M.A., Noferesti, M., Jalili, R., Damiani, E.: Database as a service: towards a unified solution for security requirement. In: 2012 IEEE 36th Annual Computer Software and Applications Conference Workshops (COMPSACW), pp. 415\u2013420. IEEE Computer Society, Izmir (2012)","DOI":"10.1109\/COMPSACW.2012.79"},{"key":"7186_CR19","doi-asserted-by":"crossref","unstructured":"Hadavi, M.A., Damiani, E., Jalili, R., Cimato, S., Ganjei, Z.: AS5: a secure searchable secret sharing scheme for privacy preserving database outsourcing. In: Data Privacy Management and Autonomous Spontaneous Security, pp. 201\u2013216. Springer, Heidelberg (2013)","DOI":"10.1007\/978-3-642-35890-6_15"},{"key":"7186_CR20","doi-asserted-by":"publisher","unstructured":"Hadavi, M.A., Jalili, R., Damiani, E., Cimato, S.: Security and searchability in secret sharing-based data outsourcing. Int. J. Inf. Secur. 1\u201317 (2015). doi: 10.1007\/s10207-015-0277-x","DOI":"10.1007\/s10207-015-0277-x"},{"issue":"7","key":"7186_CR21","doi-asserted-by":"crossref","first-page":"1214","DOI":"10.1109\/TPDS.2010.203","volume":"22","author":"J Hur","year":"2011","unstructured":"Hur, J., Noh, D.K.: Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Trans. Parallel Distrib. Syst. 22(7), 1214\u20131221 (2011)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"7186_CR22","doi-asserted-by":"crossref","unstructured":"Jameson, G.J.O.: The prime number theorem. In: London Mathematical Society Student Texts, vol. 53. Cambridge University Press, Cambridge (2003)","DOI":"10.1017\/CBO9781139164986"},{"key":"7186_CR23","doi-asserted-by":"publisher","unstructured":"Jung, T., Li, X.Y., Wan, Z., Wan, M.: Privacy preserving cloud data access with multi-authorities. In: Proceedings of IEEE on INFOCOM, 2013, pp. 2625\u20132633 (2013). doi: 10.1109\/INFCOM.2013.6567070","DOI":"10.1109\/INFCOM.2013.6567070"},{"key":"7186_CR24","doi-asserted-by":"crossref","unstructured":"Kong, Y., Seberry, J., Getta, J.R., Yu, P.: A cryptographic solution for general access control. In: Information Security, pp. 461\u2013473. Springer, Berlin (2005)","DOI":"10.1007\/11556992_33"},{"issue":"1","key":"7186_CR25","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1109\/TPDS.2012.97","volume":"24","author":"M Li","year":"2013","unstructured":"Li, M., Yu, S., Zheng, Y., Ren, K., Lou, W.: Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans. Parallel Distrib. Syst. 24(1), 131\u2013143 (2013)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"7186_CR26","doi-asserted-by":"crossref","unstructured":"Liang, X., Cao, Z., Lin, H., Shao, J.: Attribute based proxy re-encryption with delegating capabilities. In: ASIACCS\u201909, pp. 276\u2013286. ACM, New York (2009)","DOI":"10.1145\/1533057.1533094"},{"key":"7186_CR27","doi-asserted-by":"crossref","unstructured":"Liu, S., Li, W., Wang, L.: Towards efficient over-encryption in outsourced databases using secret sharing. In: New Technologies, Mobility and Security, 2008 (NTMS\u201908), pp. 1\u20135. IEEE, New York (2008)","DOI":"10.1109\/NTMS.2008.ECP.100"},{"key":"7186_CR28","unstructured":"Maji, H.K., Prabhakaran, M., Rosulek, M.: Attribute-Based Signatures (2010). Cryptology ePrint Archive, Report 2010\/595. http:\/\/eprint.iacr.org\/"},{"key":"7186_CR29","doi-asserted-by":"publisher","unstructured":"Nabeel, M., Bertino, E.: Privacy preserving delegated access control in public clouds. IEEE Trans. Knowl. Data Eng. 26(9), 2268\u20132280 (2013). doi: 10.1109\/TKDE.2013.68","DOI":"10.1109\/TKDE.2013.68"},{"issue":"11","key":"7186_CR30","doi-asserted-by":"crossref","first-page":"2602","DOI":"10.1109\/TKDE.2012.180","volume":"25","author":"M Nabeel","year":"2013","unstructured":"Nabeel, M., Shang, N., Bertino, E.: Privacy preserving policy based content sharing in public clouds. IEEE Trans. Knowl. Data Eng. 25(11), 2602\u20132614 (2013)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"7186_CR31","unstructured":"Ruggles, S., Alexander, J.T., Genadek, K., Goeken, R., Schroeder, M.B., Sobek, M.: Integrated public use microdata series: Version 5.0 [machine-readable database]. Technical Report, University of Minnesota, Minneapolis (2010)"},{"key":"7186_CR32","doi-asserted-by":"publisher","unstructured":"Ruj, S., Stojmenovic, M., Nayak, A.: Privacy preserving access control with authentication for securing data in clouds. In: 2012 12th IEEE\/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid), pp. 556\u2013563 (2012). doi: 10.1109\/CCGrid.2012.92","DOI":"10.1109\/CCGrid.2012.92"},{"key":"7186_CR33","doi-asserted-by":"publisher","unstructured":"Sarfraz, M.I., Nabeel, M., Cao, J., Bertino, E.: DBMask: fine-grained access control on encrypted relational databases. In: Fifth ACM Conference on Data and Application Security and Privacy (CODASPY\u201915), pp. 1\u201311 (2015). doi: 10.1145\/2699026.2699101","DOI":"10.1145\/2699026.2699101"},{"issue":"11","key":"7186_CR34","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 22(11), 612\u2013613 (1979)","journal-title":"Commun. ACM"},{"key":"7186_CR35","doi-asserted-by":"crossref","unstructured":"Tian, X., Wang, X., Zhou, A.: DSP re-encryption: a flexible mechanism for access control enforcement management in DaaS. In: 2009 IEEE International Conference on Cloud Computing, pp. 25\u201332 (2009)","DOI":"10.1109\/CLOUD.2009.65"},{"key":"7186_CR36","doi-asserted-by":"crossref","unstructured":"Tian, X., Sha, C., Wang, X., Zhou, A.: Privacy preserving query processing on secret share based data storage. In: Database Systems for Advanced Applications. Lecture Notes in Computer Science, vol. 6587, pp. 108\u2013122. Springer, Berlin (2011)","DOI":"10.1007\/978-3-642-20149-3_10"},{"key":"7186_CR37","doi-asserted-by":"crossref","unstructured":"Tourani, P., Hadavi, M.A., Jalili, R.: Access control enforcement on outsourced data ensuring privacy of access control policies. In: 2011 International Conference on High Performance Computing and Simulation (HPCS), pp. 491\u2013497. IEEE, Istanbul (2011)","DOI":"10.1109\/HPCSim.2011.5999865"},{"key":"7186_CR38","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-04773-6","volume-title":"Number Theory for Computing","author":"SY Yan","year":"2002","unstructured":"Yan, S.Y.: Number Theory for Computing, 2nd edn. Springer, Berlin (2002)","edition":"2"},{"key":"7186_CR39","doi-asserted-by":"crossref","unstructured":"Yu, S., Wang, C., Ren, K., Lou, W.: Achieving secure, scalable, and fine-grained data access control in cloud computing. In: 2010 Proceedings IEEE on INFOCOM, pp. 1\u20139 (2010)","DOI":"10.1109\/INFCOM.2010.5462174"},{"key":"7186_CR40","doi-asserted-by":"crossref","unstructured":"Zhao, F., Nishide, T., Sakurai, K.: Realizing fine-grained and flexible access control to outsourced data with attribute-based cryptosystems. In: Bao, F., Weng, J. (eds.) Information Security Practice and Experience. Lecture Notes in Computer Science, vol. 6672, pp. 83\u201397. Springer, Berlin (2011)","DOI":"10.1007\/978-3-642-21031-0_7"},{"issue":"10","key":"7186_CR41","doi-asserted-by":"crossref","first-page":"1675","DOI":"10.1093\/comjnl\/bxr080","volume":"54","author":"L Zhou","year":"2011","unstructured":"Zhou, L., Varadharajan, V., Hitchens, M.: Enforcing role-based access control for secure data storage in the cloud. Comput. J. 54(10), 1675\u20131687 (2011)","journal-title":"Comput. J."},{"issue":"12","key":"7186_CR42","doi-asserted-by":"publisher","first-page":"1947","DOI":"10.1109\/TIFS.2013.2286456","volume":"8","author":"L Zhou","year":"2013","unstructured":"Zhou, L., Varadharajan, V., Hitchens, M.: Achieving secure role-based access control on encrypted data in cloud storage. IEEE Trans. Inf. Forensics Secur. 8(12), 1947\u20131960 (2013). doi: 10.1109\/TIFS.2013.2286456","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"7186_CR43","doi-asserted-by":"publisher","unstructured":"Zhu, Y., Huang, D., Hu, C., Wang, X.: From RBAC to ABAC: constructing flexible data access control for cloud storage services. IEEE Trans. Serv. Comput. (2014). doi: 10.1109\/TSC.2014.2363474","DOI":"10.1109\/TSC.2014.2363474"},{"key":"7186_CR44","doi-asserted-by":"crossref","unstructured":"Zych, A., Petkovic, M., Jonker, W.: A key management method for cryptographically enforced access control. In: WOSIS, pp. 9\u201322 (2007)","DOI":"10.5220\/0002432300090022"}],"container-title":["Distributed and Parallel Databases"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10619-015-7186-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10619-015-7186-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10619-015-7186-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T01:12:11Z","timestamp":1748653931000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10619-015-7186-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,14]]},"references-count":44,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2016,12]]}},"alternative-id":["7186"],"URL":"https:\/\/doi.org\/10.1007\/s10619-015-7186-x","relation":{},"ISSN":["0926-8782","1573-7578"],"issn-type":[{"type":"print","value":"0926-8782"},{"type":"electronic","value":"1573-7578"}],"subject":[],"published":{"date-parts":[[2015,10,14]]}}}