{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,15]],"date-time":"2023-09-15T09:10:59Z","timestamp":1694769059336},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Front. Comput. Sci."],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1007\/s11704-019-8394-8","type":"journal-article","created":{"date-parts":[[2019,3,21]],"date-time":"2019-03-21T15:03:01Z","timestamp":1553180581000},"page":"220-230","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Practices of backuping homomorphically encrypted databases"],"prefix":"10.1007","volume":"13","author":[{"given":"Sa","family":"Wang","sequence":"first","affiliation":[]},{"given":"Yiwen","family":"Shao","sequence":"additional","affiliation":[]},{"given":"Yungang","family":"Bao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,4,11]]},"reference":[{"key":"8394_CR1","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1145\/2043556.2043566","volume-title":"Proceedings of the 23rd ACM Symposium on Operating Systems Principles","author":"R A Popa","year":"2011","unstructured":"Popa R A, Redfield C, Zeldovich N, Balakrishnan H. Cryptdb: protecting confidentiality with encrypted query processing. In: Proceedings of the 23rd ACM Symposium on Operating Systems Principles. 2011, 85\u2013100"},{"key":"8394_CR2","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/978-3-642-35362-8_15","volume-title":"Proceedings of the 4th International Conference on Cyberspace Safety and Security","author":"L Ferretti","year":"2012","unstructured":"Ferretti L, Colajanni M, Marchetti M. Supporting security and consistency for cloud database. In: Proceedings of the 4th International Conference on Cyberspace Safety and Security. 2012, 179\u2013193"},{"key":"8394_CR3","first-page":"25","volume-title":"IEEE Transactions on Parallel and Distributed Systems","author":"L Ferretti","year":"2014","unstructured":"Ferretti L, Colajanni M, Marchetti M. Distributed, concurrent, and independent access to encrypted cloud databases. IEEE Transactions on Parallel and Distributed Systems. 2014, 25(2): 437\u2013446"},{"key":"8394_CR4","first-page":"195","volume-title":"Proceedings of IFIP Annual Conference on Data and Applications Security and Privacy","author":"K Kerschbaum","year":"2013","unstructured":"Kerschbaum K, H\u00e4rterich M, Grofig P, Kohler M, Schaad A, Schr\u00f6pfer A, Tighzert W. Optimal re-encryption strategy for joins in encrypted databases. In: Proceedings of IFIP Annual Conference on Data and Applications Security and Privacy. 2013, 195\u2013210"},{"issue":"5","key":"8394_CR5","doi-asserted-by":"publisher","first-page":"289","DOI":"10.14778\/2535573.2488336","volume":"6","author":"S Tu","year":"2013","unstructured":"Tu S, Kaashoek M F, Madden S, Zeldovich N. Processing analytical queries over encrypted data. Proceedings of the VLDB Endowment, 2013, 6(5): 289\u2013300","journal-title":"Proceedings of the VLDB Endowment"},{"key":"8394_CR6","doi-asserted-by":"crossref","first-page":"1325","DOI":"10.1145\/2508859.2512491","volume-title":"Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security","author":"F Kerschbaum","year":"2013","unstructured":"Kerschbaum F, Grofig P, Hang I, H\u00e4rterich M, Kohler M, Schaad A, Schr\u00f6pfer A, Tighzert W. Adjustably encrypted in-memory columnstore. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security. 2013, 1325\u20131328"},{"key":"8394_CR7","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1007\/978-3-642-45204-8_2","volume-title":"Proceedings of the International Conference on Information Systems Security","author":"F Kerschbaum","year":"2013","unstructured":"Kerschbaum F, H\u00e4rterich M, Kohler M, Hang I, Schaad A, Schr\u00f6pfer A, Tighzert W. An encrypted in-memory column-store: the onion selection problem. In: Proceedings of the International Conference on Information Systems Security. 2013, 14\u201326"},{"key":"8394_CR8","first-page":"587","volume-title":"Proceedings of USENIX Symposium on Operating Systems Design and Implementation","author":"A Papadimitriou","year":"2016","unstructured":"Papadimitriou A, Bhagwan R, Chandran N, Ramjee R, Haeberlen A, Singh H, Modi A, Badrinarayanan S. Big data analytics over encrypted datasets with seabed. In: Proceedings of USENIX Symposium on Operating Systems Design and Implementation. 2016, 587\u2013602"},{"issue":"11","key":"8394_CR9","first-page":"169","volume":"4","author":"R Rivest","year":"1978","unstructured":"Rivest R, Adleman L, Dertouzos M. On data banks and privacy homomorphisms. Foundations of Secure Computation, 1978, 4(11): 169\u2013177","journal-title":"Foundations of Secure Computation"},{"key":"8394_CR10","first-page":"169","volume-title":"Proceedings of the 41st Annual ACM Symposium on Theory of Computing","author":"C Gentry","year":"2009","unstructured":"Gentry C. Fully homomorphic encryption using ideal lattices. In: Proceedings of the 41st Annual ACM Symposium on Theory of Computing. 2009, 169\u2013178"},{"key":"8394_CR11","volume-title":"Building practical systems that compute on encrypted data. PhD Thesis","author":"R A Popa","year":"2014","unstructured":"Popa R A. Building practical systems that compute on encrypted data. PhD Thesis, Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2014."},{"issue":"2","key":"8394_CR12","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R L Rivest","year":"1978","unstructured":"Rivest R L, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 1978, 21(2): 120\u2013126","journal-title":"Communications of the ACM"},{"issue":"4","key":"8394_CR13","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T ElGamal","year":"1985","unstructured":"ElGamal T. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 1985, 31(4): 469\u2013472","journal-title":"IEEE Transactions on Information Theory"},{"key":"8394_CR14","first-page":"223","volume-title":"Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques","author":"P Paillier","year":"1999","unstructured":"Paillier P. Public-key cryptosystems based on composite degree residuosity classes. In: Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques. 1999, 223\u2013238"},{"key":"8394_CR15","first-page":"224","volume-title":"Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques","author":"A Boldyreva","year":"2009","unstructured":"Boldyreva A, Chenette N, Lee Y, O\u2019neill A. Order-preserving symmetric encryption. In: Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques. 2009, 224\u2013241"},{"key":"8394_CR16","doi-asserted-by":"publisher","first-page":"563","DOI":"10.1145\/1007568.1007632","volume-title":"Proceedings of the 2004ACM SIGMOD International Conference on Management of Data","author":"R Agrawal","year":"2004","unstructured":"Agrawal R, Kiernan J, Srikant R, Xu Y. Order preserving encryption for numeric data. In: Proceedings of the 2004ACM SIGMOD International Conference on Management of Data. 2004, 563\u2013574"},{"key":"8394_CR17","first-page":"578","volume-title":"Proceedings of Annual Cryptology Conference","author":"A Boldyreva","year":"2011","unstructured":"Boldyreva A, Chenette N, O\u2019Neill A. Order-preserving encryption revisited: improved security analysis and alternative solutions. In: Proceedings of Annual Cryptology Conference. 2011, 578\u2013595"},{"key":"8394_CR18","first-page":"44","volume-title":"Proceedings of IEEE Symposium on Security and Privacy","author":"D X Song","year":"2000","unstructured":"Song D X, Wagner D, Perrig A. Practical techniques for searches on encrypted data. In: Proceedings of IEEE Symposium on Security and Privacy. 2000, 44\u201355"},{"issue":"5","key":"8394_CR19","doi-asserted-by":"publisher","first-page":"895","DOI":"10.3233\/JCS-2011-0426","volume":"19","author":"R Curtmola","year":"2011","unstructured":"Curtmola R, Garay J, Kamara S, Ostrovsky R. Searchable symmetric encryption: improved definitions and efficient constructions. Journal of Computer Security, 2011, 19(5): 895\u2013934","journal-title":"Journal of Computer Security"},{"key":"8394_CR20","doi-asserted-by":"crossref","first-page":"965","DOI":"10.1145\/2382196.2382298","volume-title":"Proceedings of the 2012ACM Conference on Computer and Communications Security","author":"S Kamara","year":"2012","unstructured":"Kamara S, Papamanthou C, Roeder T. Dynamic searchable symmetric encryption. In: Proceedings of the 2012ACM Conference on Computer and Communications Security. 2012, 965\u2013976"},{"key":"8394_CR21","first-page":"19","volume-title":"Proceedings of Federal Information Processing Standards Publications, National Institute of Standards and Technology","author":"V Rijmen","year":"2001","unstructured":"Rijmen V, Daemen J. Advanced encryption standard. In: Proceedings of Federal Information Processing Standards Publications, National Institute of Standards and Technology. 2001, 19\u201322"},{"key":"8394_CR22","volume-title":"Amd memory encryption","author":"D Kaplan","year":"2016","unstructured":"Kaplan D, Powell J, Woller T. Amd memory encryption. White Paper, 2016"},{"key":"8394_CR23","first-page":"1","volume-title":"White Paper","author":"S Johnson","year":"2016","unstructured":"Johnson S, Scarlata V, Rozas C, Brickell E, Mckeen F. IntelR software guard extensions: epid provisioning and attestation services. White Paper, 2016, 1\u201310"},{"issue":"9","key":"8394_CR24","doi-asserted-by":"publisher","first-page":"1681","DOI":"10.1109\/JPROC.2016.2571298","volume":"104","author":"W Xia","year":"2016","unstructured":"Xia W, Jiang H, Feng D, Douglis F, Shilane P, Hua Y, Fu M, Zhang Y, Zhou Y. A comprehensive study of the past, present, and future of data deduplication. Proceedings of the IEEE, 2016, 104(9): 1681\u20131710","journal-title":"Proceedings of the IEEE"},{"issue":"9","key":"8394_CR25","doi-asserted-by":"publisher","first-page":"1098","DOI":"10.1109\/JRPROC.1952.273898","volume":"40","author":"D A Huffman","year":"1952","unstructured":"Huffman D A. A method for the construction of minimum-redundancy codes. Proceedings of the IRE, 1952, 40(9): 1098\u20131101","journal-title":"Proceedings of the IRE"},{"issue":"3","key":"8394_CR26","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1109\/TIT.1977.1055714","volume":"23","author":"J Ziv","year":"1977","unstructured":"Ziv J, Lempel A. A universal algorithm for sequential data compression. IEEE Transactions on Information Theory, 1977, 23(3): 337\u2013343","journal-title":"IEEE Transactions on Information Theory"},{"issue":"5","key":"8394_CR27","doi-asserted-by":"publisher","first-page":"530","DOI":"10.1109\/TIT.1978.1055934","volume":"24","author":"J Ziv","year":"1978","unstructured":"Ziv J, Lempel A. Compression of individual sequences via variablerate coding. IEEE Transactions on Information Theory, 1978, 24(5): 530\u2013536","journal-title":"IEEE Transactions on Information Theory"},{"issue":"5","key":"8394_CR28","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1145\/502059.502052","volume":"35","author":"A Muthitacharoen","year":"2001","unstructured":"Muthitacharoen A, Chen B, Mazi\u00e8res D. A low-bandwidth network file system. ACM SIGOPS Operating Systems Review, 2001, 35(5): 174\u2013187","journal-title":"ACM SIGOPS Operating Systems Review"},{"key":"8394_CR29","first-page":"89","volume-title":"Proceedings of USENIX Conference on File and Storage Technologies","author":"S Quinlan","year":"2002","unstructured":"Quinlan S, Dorward S. Venti: a new approach to archival storage. In: Proceedings of USENIX Conference on File and Storage Technologies. 2002, 89\u2013101"},{"key":"8394_CR30","first-page":"4","volume-title":"Proceedings of the 10th USENIX Conference on File and Storage Technologies","author":"G Wallace","year":"2012","unstructured":"Wallace G, Douglis F, Qian H, Shilane P, Smaldone S, Chamness M, Hsu W. Characteristics of backup workloads in production systems. In: Proceedings of the 10th USENIX Conference on File and Storage Technologies. 2012, 4"},{"key":"8394_CR31","first-page":"1","volume-title":"Proceedings of the 6th USENIX Conference on File and Storage Technologies","author":"B Zhu","year":"2008","unstructured":"Zhu B, Li K, Patterson R H. Avoiding the disk bottleneck in the data domain deduplication file system. In: Proceedings of the 6th USENIX Conference on File and Storage Technologies. 2008, 1\u201314"},{"key":"8394_CR32","first-page":"111","volume-title":"Proceedings of the 7th USENIX Conference on File and Storage Technologies","author":"M Lillibridge","year":"2009","unstructured":"Lillibridge M, Eshghi K, Bhagwat D, Deolalikar V, Trezis G, Camble P. Sparse indexing: large scale, inline deduplication using sampling and locality. In: Proceedings of the 7th USENIX Conference on File and Storage Technologies. 2009, 111\u2013123"},{"key":"8394_CR33","first-page":"197","volume-title":"Proceedings of the 7th USENIX Conference on File and Storage Technologies","author":"C Dubnicki","year":"2009","unstructured":"Dubnicki C, Gryz L, Heldt L, Kaczmarczyk M, Kilian W, Strzelczak P, Szczepkowski J, Ungureanu C, Welnicki M. Hydrastor: a scalable secondary storage. In: Proceedings of the 7th USENIX Conference on File and Storage Technologies. 2009, 197\u2013210"},{"key":"8394_CR34","first-page":"25","volume-title":"Proceedings of the 2011 USENIX Annual Technical Conference","author":"F Guo","year":"2011","unstructured":"Guo F, Efstathopoulos P. Building a high-performance deduplication system. In: Proceedings of the 2011 USENIX Annual Technical Conference. 2011, 25\u201325."},{"key":"8394_CR35","first-page":"1","volume-title":"Proceedings of the 10th USENIX Conference on File and Storage Technologies","author":"K Srinivasan","year":"2012","unstructured":"Srinivasan K, Bisson T, Goodson G R, Voruganti K. iDedup: latencyaware, inline data deduplication for primary storage. In: Proceedings of the 10th USENIX Conference on File and Storage Technologies. 2012, 1\u201314"},{"key":"8394_CR36","volume-title":"System for backing up files from disk volumes on multiple nodes of a computer network","author":"D L Whiting","year":"1998","unstructured":"Whiting D L, Dilatush T. System for backing up files from disk volumes on multiple nodes of a computer network. 1998, US Patent 5,778,395"},{"key":"8394_CR37","first-page":"296","volume-title":"Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques","author":"M Bellare","year":"2013","unstructured":"Bellare M, Keelveedhi S, Ristenpart T. Message-locked encryption and secure deduplication. In: Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques. 2013, 296\u2013312"},{"key":"8394_CR38","first-page":"179","volume-title":"Proceedings of USENIX Security Symposium","author":"S Keelveedhi","year":"2013","unstructured":"Keelveedhi S, Bellare M, Ristenpart T. Dupless: server-aided encryption for deduplicated storage. In: Proceedings of USENIX Security Symposium. 2013, 179\u2013194"},{"key":"8394_CR39","first-page":"25","volume-title":"IEEE Transactions on Parallel and Distributed Systems","author":"J Li","year":"2014","unstructured":"Li J, Chen X, Li M, Li J, Lee P P, Lou W. Secure deduplication with efficient and reliable convergent key management. IEEE Transactions on Parallel and Distributed Systems. 2014, 25(6): 1615\u20131625"}],"container-title":["Frontiers of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-019-8394-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11704-019-8394-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-019-8394-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,14]],"date-time":"2023-09-14T19:07:41Z","timestamp":1694718461000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11704-019-8394-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4]]},"references-count":39,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,4]]}},"alternative-id":["8394"],"URL":"https:\/\/doi.org\/10.1007\/s11704-019-8394-8","relation":{},"ISSN":["2095-2228","2095-2236"],"issn-type":[{"value":"2095-2228","type":"print"},{"value":"2095-2236","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,4]]},"assertion":[{"value":"19 November 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 January 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 April 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}