{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T16:46:58Z","timestamp":1765039618810,"version":"3.37.3"},"reference-count":39,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key R&#x0026;D Program of China","award":["2021YFB3100400","2021YFF0704102"],"award-info":[{"award-number":["2021YFB3100400","2021YFF0704102"]}]},{"DOI":"10.13039\/501100005230","name":"Natural Science Foundation of Chongqing","doi-asserted-by":"publisher","award":["cstc2018jcyjAX0510"],"award-info":[{"award-number":["cstc2018jcyjAX0510"]}],"id":[{"id":"10.13039\/501100005230","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100005145","name":"Basic Research Program of Jiangsu Province","doi-asserted-by":"publisher","award":["BK20201290"],"award-info":[{"award-number":["BK20201290"]}],"id":[{"id":"10.13039\/501100005145","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Cloud Comput."],"published-print":{"date-parts":[[2023,4,1]]},"DOI":"10.1109\/tcc.2022.3173260","type":"journal-article","created":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T19:46:33Z","timestamp":1652211993000},"page":"1940-1953","source":"Crossref","is-referenced-by-count":4,"title":["An Efficient Oblivious Random Data Access Scheme in Cloud Computing"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1260-5360","authenticated-orcid":false,"given":"Hong","family":"Liu","sequence":"first","affiliation":[{"name":"Department of Software Engineering, Chongqing University of Posts and Telecommunications, Chongqing, China"}]},{"given":"Xiaojing","family":"Lu","sequence":"additional","affiliation":[{"name":"Department of Software Engineering, Chongqing University of Posts and Telecommunications, Chongqing, China"}]},{"given":"Shengchen","family":"Duan","sequence":"additional","affiliation":[{"name":"Department of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8183-8435","authenticated-orcid":false,"given":"Yushu","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Computer Science, Nanjing University of Aeronautics and Astronautics, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3545-7863","authenticated-orcid":false,"given":"Yong","family":"Xiang","sequence":"additional","affiliation":[{"name":"School of Information Technology, Deakin University, Geelong, VIC, Australia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2000.848445"},{"key":"ref2","article-title":"Secure indexes","volume":"2003","author":"Goh","year":"2003","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2011-0426"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17373-8_33"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382298"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96884-1_12"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2852329"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2794442"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2599883"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23298"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2015.2401003"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2897518.2897562"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3035918.3064057"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978303"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2016.62"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2872743"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ISPAN-FCST-ISCC.2017.56"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TSUSC.2017.2704163"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.11.021"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25385-0_11"},{"key":"ref21","first-page":"12","article-title":"Access pattern disclosure on searchable encryption: Ramification, attack and mitigation","volume-title":"Ndss","volume":"20","author":"Islam","year":"2012"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813700"},{"key":"ref23","first-page":"707","article-title":"All your queries are belong to us: The power of file-injection attacks on searchable encryption","volume-title":"Proc. 25th USENIX Secur. Symp.","author":"Zhang"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516660"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-40061-5_3"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/233551.233553"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45608-8_27"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660314"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-95729-6_8"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2018.2879104"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23033"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.14778\/2994509.2994528"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0010"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3128823"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2020.2973139"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17656-3_7"},{"key":"ref37","first-page":"2451","article-title":"Pancake: Frequency smoothing for encrypted data stores","volume-title":"Proc. 29th USENIX Secur. Symp.","author":"Grubbs"},{"article-title":"The CMU enron email dataset","year":"2016","author":"Cohen","key":"ref38"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2288131"}],"container-title":["IEEE Transactions on Cloud Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6245519\/10144930\/09772342.pdf?arnumber=9772342","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,22]],"date-time":"2024-01-22T22:06:20Z","timestamp":1705961180000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9772342\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,1]]},"references-count":39,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tcc.2022.3173260","relation":{},"ISSN":["2168-7161","2372-0018"],"issn-type":[{"type":"electronic","value":"2168-7161"},{"type":"electronic","value":"2372-0018"}],"subject":[],"published":{"date-parts":[[2023,4,1]]}}}