{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,25]],"date-time":"2024-09-25T04:40:28Z","timestamp":1727239228316},"reference-count":89,"publisher":"Informa UK Limited","issue":"2","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Information Security Journal: A Global Perspective"],"published-print":{"date-parts":[[2024,3,3]]},"DOI":"10.1080\/19393555.2023.2270976","type":"journal-article","created":{"date-parts":[[2023,12,20]],"date-time":"2023-12-20T11:27:12Z","timestamp":1703071632000},"page":"172-191","update-policy":"http:\/\/dx.doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":0,"title":["Secure query processing and optimization in cloud environment: a review"],"prefix":"10.1080","volume":"33","author":[{"given":"Divya","family":"VL","sequence":"first","affiliation":[{"name":"Department of Computer Science, Cochin University College of Engineering Kuttanadu, Pulincunnu, Kerala, India"}]},{"given":"Job","family":"PA","sequence":"additional","affiliation":[{"name":"Department of Mechanical Engineering, Cochin University College of Engineering Kuttanadu, Pulincunnu, Kerala, India"}]},{"given":"Preetha","family":"Mathew K","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Cochin University College of Engineering Kuttanadu, Pulincunnu, Kerala, India"}]}],"member":"301","published-online":{"date-parts":[[2023,12,20]]},"reference":[{"key":"e_1_3_2_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-020-01943-x"},{"key":"e_1_3_2_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/NCG.2018.8593141"},{"key":"e_1_3_2_4_1","doi-asserted-by":"publisher","DOI":"10.17993\/3ctecno.2019.specialissue3.65-75"},{"key":"e_1_3_2_5_1","doi-asserted-by":"publisher","DOI":"10.3390\/s22020528"},{"key":"e_1_3_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDIS.2019.00026"},{"key":"e_1_3_2_7_1","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2018.090108"},{"key":"e_1_3_2_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-71017-0_32"},{"key":"e_1_3_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCI.2014.6921762"},{"key":"e_1_3_2_10_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.5240"},{"key":"e_1_3_2_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.09.037"},{"key":"e_1_3_2_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2014.07.003"},{"key":"e_1_3_2_13_1","doi-asserted-by":"publisher","DOI":"10.14778\/2536222.2536223"},{"issue":"12","key":"e_1_3_2_14_1","doi-asserted-by":"crossref","first-page":"5741","DOI":"10.1109\/TKDE.2021.3060757","article-title":"Efficient oblivious query processing for range and kNN Queries","volume":"34","author":"Chang Z.","year":"2021","unstructured":"Chang, Z., Xie, D., Li, F., Phillips, J. M., & Balasubramonian, R. (2021). Efficient oblivious query processing for range and kNN Queries. IEEE Transactions on Knowledge and Data Engineering, 34(12), 5741\u20135754.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"e_1_3_2_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10619-014-7166-6"},{"key":"e_1_3_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2017.00135"},{"key":"e_1_3_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/EAIS.2016.7502501"},{"key":"e_1_3_2_18_1","doi-asserted-by":"publisher","DOI":"10.17223\/2226308X\/14\/27"},{"key":"e_1_3_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2013.6742784"},{"key":"e_1_3_2_20_1","doi-asserted-by":"publisher","DOI":"10.23919\/INM.2017.7987295"},{"issue":"1","key":"e_1_3_2_21_1","first-page":"49","article-title":"Sequre sql\u2013a framework for query optimization and privacy on outsourced data","volume":"1","author":"Dima R. M.","year":"2018","unstructured":"Dima, R. M., & Obunadike, G. N. (2018). Sequre sql\u2013a framework for query optimization and privacy on outsourced data. Fudma Journal of Sciences-ISSN, 2616-1370, 1(1), 49\u201357.","journal-title":"Fudma Journal of Sciences-ISSN, 2616-1370"},{"key":"e_1_3_2_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2015.01.026"},{"key":"e_1_3_2_23_1","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/435254"},{"issue":"2","key":"e_1_3_2_24_1","first-page":"36","article-title":"Query processing and interlinking of fuzzy object-oriented database","volume":"6","author":"Dwivedi S.","year":"2017","unstructured":"Dwivedi, S., & Kumar, S. (2017). Query processing and interlinking of fuzzy object-oriented database. Am J Eng Res, 6(2), 36\u201341.","journal-title":"Am J Eng Res"},{"key":"e_1_3_2_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-018-0844-x"},{"key":"e_1_3_2_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2018.07.147"},{"key":"e_1_3_2_27_1","volume-title":"Proceedings of the First Italian Conference on Cybersecurity (ITASEC17)","volume":"1816","author":"Gaetani E.","year":"2017","unstructured":"Gaetani, E., Aniello, L., Baldoni, R., Lombardi, F., Margheri, A., & Sassone, V. (2017). Blockchain-based database to ensure data integrity in cloud computing environments. Proceedings of the First Italian Conference on Cybersecurity (ITASEC17), January 17-20, Venice, Italy (Vol. 1816)."},{"key":"e_1_3_2_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.10.030"},{"key":"e_1_3_2_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCS.2017.8014599"},{"key":"e_1_3_2_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10619-014-7150-1"},{"key":"e_1_3_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICEECCOT.2017.8284517"},{"key":"e_1_3_2_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-017-1521-0"},{"key":"e_1_3_2_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10619-018-7220-x"},{"key":"e_1_3_2_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10257-019-00422-x"},{"key":"e_1_3_2_35_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-017-0077-0"},{"key":"e_1_3_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3167132.3167148"},{"key":"e_1_3_2_37_1","doi-asserted-by":"publisher","DOI":"10.14778\/3067421.3067423"},{"issue":"3","key":"e_1_3_2_38_1","doi-asserted-by":"crossref","first-page":"358","DOI":"10.1109\/TSUSC.2018.2881416","article-title":"An efficient multi-cloud service composition using a distributed multiagent-based, memory-driven approach","volume":"6","author":"Kendrick P.","year":"2018","unstructured":"Kendrick, P., Baker, T., Maamar, Z., Hussain, A., Buyya, R., & Al-Jumeily, D. (2018). An efficient multi-cloud service composition using a distributed multiagent-based, memory-driven approach. IEEE Transactions on Sustainable Computing, 6(3), 358\u2013369.","journal-title":"IEEE Transactions on Sustainable Computing"},{"key":"e_1_3_2_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13198-019-00845-2"},{"key":"e_1_3_2_40_1","doi-asserted-by":"crossref","unstructured":"Kim H.-I. Kim H.-J. & Chang J.-W. (2017). A privacy-preserving top-k query processing algorithm in the cloud computing. In Economics of Grids Clouds Systems and Services: 13th International Conference GECON 2016 (Vol. 13 pp. 277\u2013292). Springer International Publishing: Athens Greece.","DOI":"10.1007\/978-3-319-61920-0_20"},{"key":"e_1_3_2_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2017.07.005"},{"key":"e_1_3_2_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-021-04286-2"},{"key":"e_1_3_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1989323.1989355"},{"key":"e_1_3_2_44_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJAIP.2020.108760"},{"issue":"8","key":"e_1_3_2_45_1","first-page":"1797","article-title":"Teacher-learner & multi-objective genetic algorithm based query optimization approach for heterogeneous distributed database systems","volume":"95","author":"Lakshmi S. V.","year":"2017","unstructured":"Lakshmi, S. V., & Vatsavayi, V. K. (2017). Teacher-learner & multi-objective genetic algorithm based query optimization approach for heterogeneous distributed database systems. Journal of Theoretical & Applied Information Technology, 95(8), 1797\u20131807.","journal-title":"Journal of Theoretical & Applied Information Technology"},{"key":"e_1_3_2_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS48642.2020.9162307"},{"key":"e_1_3_2_47_1","doi-asserted-by":"publisher","DOI":"10.1002\/9781119682318.ch10"},{"key":"e_1_3_2_48_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.2666"},{"key":"e_1_3_2_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2017.122"},{"key":"e_1_3_2_50_1","doi-asserted-by":"publisher","DOI":"10.14778\/2733085.2733100"},{"key":"e_1_3_2_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-017-1797-9"},{"key":"e_1_3_2_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-018-0515-8"},{"issue":"4","key":"e_1_3_2_53_1","doi-asserted-by":"crossref","first-page":"1436","DOI":"10.1109\/TNET.2020.3027814","article-title":"A low-cost multi-failure resilient replication scheme for high-data availability in cloud storage","volume":"29","author":"Liu J.","year":"2020","unstructured":"Liu, J., Shen, H., Chi, H., Narman, H. S., Yang, Y., Cheng, L., & Chung, W. (2020). A low-cost multi-failure resilient replication scheme for high-data availability in cloud storage. IEEE\/ACM Transactions on Networking, 29(4), 1436\u20131451.","journal-title":"IEEE\/ACM Transactions on Networking"},{"issue":"2","key":"e_1_3_2_54_1","doi-asserted-by":"crossref","first-page":"762","DOI":"10.1109\/TCC.2020.2975184","article-title":"Attribute-based encryption with privacy protection and accountability for CloudIoT","volume":"10","author":"Li J.","year":"2020","unstructured":"Li, J., Zhang, Y., Ning, J., Huang, X., Poh, G. S., & Wang, D. (2020). Attribute-based encryption with privacy protection and accountability for CloudIoT. IEEE Transactions on Cloud Computing, 10(2), 762\u2013773.","journal-title":"IEEE Transactions on Cloud Computing"},{"key":"e_1_3_2_55_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26690-9_31"},{"key":"e_1_3_2_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3267809.3267822"},{"key":"e_1_3_2_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCES.2015.7393012"},{"key":"e_1_3_2_58_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.5218"},{"key":"e_1_3_2_59_1","doi-asserted-by":"publisher","DOI":"10.11648\/j.iotcc.20140202.11"},{"key":"e_1_3_2_60_1","doi-asserted-by":"publisher","DOI":"10.4018\/IJSI.2020010105"},{"key":"e_1_3_2_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/1871929.1871933"},{"key":"e_1_3_2_62_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-018-2480-9"},{"key":"e_1_3_2_63_1","doi-asserted-by":"publisher","DOI":"10.26438\/ijcse\/v7i2.421426"},{"key":"e_1_3_2_64_1","doi-asserted-by":"publisher","DOI":"10.14778\/3137765.3137805"},{"key":"e_1_3_2_65_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2203.00146"},{"key":"e_1_3_2_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/SmartCloud.2018.00017"},{"key":"e_1_3_2_67_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-019-02806-9"},{"key":"e_1_3_2_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2017.2719054"},{"key":"e_1_3_2_69_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-4906-4"},{"key":"e_1_3_2_70_1","doi-asserted-by":"publisher","DOI":"10.23956\/ijarcsse.v8i6.711"},{"issue":"12","key":"e_1_3_2_71_1","first-page":"16","article-title":"Ensure and secure data confidentiality in cloud computing environment using data obfuscation technique","volume":"6","author":"Sugumar R.","year":"2017","unstructured":"Sugumar, R. (2017). Ensure and secure data confidentiality in cloud computing environment using data obfuscation technique. International Journal of Advanced Studies in Computers, Science and Engineering, 6(12), 16\u201321.","journal-title":"International Journal of Advanced Studies in Computers, Science and Engineering"},{"key":"e_1_3_2_72_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-012-1221-4"},{"issue":"7","key":"e_1_3_2_73_1","first-page":"301","article-title":"Enabling secure and effective spatial query processing on the cloud using forward spatial transformation","volume":"4","author":"Swathi V.","year":"2017","unstructured":"Swathi, V., Saidulu, D., & Chandrakala, B. (2017). Enabling secure and effective spatial query processing on the cloud using forward spatial transformation. International Journal of Computer Engineering in Research Trends, 4(7), 301\u2013307.","journal-title":"International Journal of Computer Engineering in Research Trends"},{"key":"e_1_3_2_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigMM.2017.24"},{"key":"e_1_3_2_75_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2017.2724509"},{"key":"e_1_3_2_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2017.8258302"},{"key":"e_1_3_2_77_1","doi-asserted-by":"publisher","DOI":"10.4018\/IJISP.2017070101"},{"key":"e_1_3_2_78_1","doi-asserted-by":"publisher","DOI":"10.1080\/09720529.2019.1632024"},{"key":"e_1_3_2_79_1","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2022.2033366"},{"key":"e_1_3_2_80_1","doi-asserted-by":"publisher","DOI":"10.12928\/telkomnika.v17i6.13059"},{"key":"e_1_3_2_81_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-017-1178-8"},{"key":"e_1_3_2_82_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-016-0439-0"},{"key":"e_1_3_2_83_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2018.8622401"},{"key":"e_1_3_2_84_1","unstructured":"Wang C. Arani Z. Gruenwald L. d\u2019Orazio L. & Leal E. Cloud query processing with Machine Learning-based multi-objective re-optimization."},{"key":"e_1_3_2_85_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-59419-0_18"},{"issue":"1","key":"e_1_3_2_86_1","doi-asserted-by":"crossref","first-page":"691","DOI":"10.1109\/TCC.2019.2932065","article-title":"Secedmo: Enabling efficient data mining with strong privacy protection in cloud computing","volume":"10","author":"Wu J.","year":"2019","unstructured":"Wu, J., Mu, N., Lei, X., Le, J., Zhang, D., & Liao, X. (2019). Secedmo: Enabling efficient data mining with strong privacy protection in cloud computing. IEEE Transactions on Cloud Computing, 10(1), 691\u2013705.","journal-title":"IEEE Transactions on Cloud Computing"},{"key":"e_1_3_2_87_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.04.003"},{"key":"e_1_3_2_88_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2817235"},{"key":"e_1_3_2_89_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCOINS.2014.6868432"},{"key":"e_1_3_2_90_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3141589"}],"container-title":["Information Security Journal: A Global Perspective"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/19393555.2023.2270976","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,25]],"date-time":"2024-09-25T02:27:57Z","timestamp":1727231277000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/19393555.2023.2270976"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,20]]},"references-count":89,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,3,3]]}},"alternative-id":["10.1080\/19393555.2023.2270976"],"URL":"https:\/\/doi.org\/10.1080\/19393555.2023.2270976","relation":{},"ISSN":["1939-3555","1939-3547"],"issn-type":[{"type":"print","value":"1939-3555"},{"type":"electronic","value":"1939-3547"}],"subject":[],"published":{"date-parts":[[2023,12,20]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uiss20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uiss20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2023-12-20","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}