{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T15:31:31Z","timestamp":1777390291307,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,10,12]],"date-time":"2015-10-12T00:00:00Z","timestamp":1444608000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10,12]]},"DOI":"10.1145\/2810103.2813651","type":"proceedings-article","created":{"date-parts":[[2015,10,6]],"date-time":"2015-10-06T15:22:12Z","timestamp":1444144932000},"page":"644-655","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":348,"title":["Inference Attacks on Property-Preserving Encrypted Databases"],"prefix":"10.1145","author":[{"given":"Muhammad","family":"Naveed","sequence":"first","affiliation":[{"name":"University of Illinois at Urbana Champaign, Urbana, IL, USA"}]},{"given":"Seny","family":"Kamara","sequence":"additional","affiliation":[{"name":"Microsoft Research, Redmond, WA, USA"}]},{"given":"Charles V.","family":"Wright","sequence":"additional","affiliation":[{"name":"Portland State University, Portland, OR, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,10,12]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Fifth Annual Benchmark Study on Privacy and Security of Healthcare Data. http:\/\/www.ponemon.org\/blog\/criminal-attacks-the-new-leading-cause-of-data-breach-in-healthcare. Accessed: 2015-05--15.  Fifth Annual Benchmark Study on Privacy and Security of Healthcare Data. http:\/\/www.ponemon.org\/blog\/criminal-attacks-the-new-leading-cause-of-data-breach-in-healthcare. Accessed: 2015-05--15."},{"key":"e_1_3_2_1_2_1","unstructured":"Google Encrytped Big Query. https:\/\/github.com\/google\/encrypted-bigquery-client.  Google Encrytped Big Query. https:\/\/github.com\/google\/encrypted-bigquery-client."},{"key":"e_1_3_2_1_3_1","volume-title":"Healthcare Cost and Utilization Project (HCUP). 2008--2009","author":"Databases HCUP","unstructured":"HCUP Databases . Healthcare Cost and Utilization Project (HCUP). 2008--2009 . Agency for Healthcare Research and Quality , Rockville, MD . www.hcup-us.ahrq.gov\/databases.jsp. HCUP Databases. Healthcare Cost and Utilization Project (HCUP). 2008--2009. Agency for Healthcare Research and Quality, Rockville, MD. www.hcup-us.ahrq.gov\/databases.jsp."},{"key":"e_1_3_2_1_4_1","unstructured":"Hospital Discharge Data Public Use Data File. http:\/\/www.dshs.state.tx.us\/THCIC\/Hospitals\/Download.shtm.  Hospital Discharge Data Public Use Data File. http:\/\/www.dshs.state.tx.us\/THCIC\/Hospitals\/Download.shtm."},{"key":"e_1_3_2_1_5_1","unstructured":"Hospital Inpatient Discharges (SPARCS De-Identified): 2012. https:\/\/health.data.ny.gov\/Health\/Hospital-Inpatient-Discharges-SPARCS-De-Identified\/u4ud-w55t.  Hospital Inpatient Discharges (SPARCS De-Identified): 2012. https:\/\/health.data.ny.gov\/Health\/Hospital-Inpatient-Discharges-SPARCS-De-Identified\/u4ud-w55t."},{"key":"e_1_3_2_1_6_1","unstructured":"OpenEMR. http:\/\/www.open-emr.org\/. Accessed: 2015-05--15.  OpenEMR. http:\/\/www.open-emr.org\/. Accessed: 2015-05--15."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1007568.1007632"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/BDCloud.2014.75"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1080\/0161-119291866801"},{"key":"e_1_3_2_1_10_1","volume-title":"CIDR","author":"Arasu A.","year":"2013","unstructured":"A. Arasu , S. Blanas , K. Eguro , R. Kaushik , D. Kossmann , R. Ramamurthy , and R. Venkatesan . Orthogonal security with cipherbase . In CIDR , 2013 . A. Arasu, S. Blanas, K. Eguro, R. Kaushik, D. Kossmann, R. Ramamurthy, and R. Venkatesan. Orthogonal security with cipherbase. In CIDR, 2013."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/1777777.1777820"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/3088723.3088749"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/2033036.2033080"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46803-6_19"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/1987260.1987281"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/11767831_12"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972238"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813700"},{"key":"e_1_3_2_1_19_1","volume-title":"Modular order-preserving encryption, revisited","author":"Chenette N.","year":"2015","unstructured":"N. Chenette , A. O'Neill , G. Kollios , and R. Canetti . Modular order-preserving encryption, revisited . 2015 . N. Chenette, A. O'Neill, G. Kollios, and R. Canetti. Modular order-preserving encryption, revisited. 2015."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180417"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30073-1_3"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/233551.233553"},{"key":"e_1_3_2_1_25_1","volume-title":"NDSS","author":"Islam M.","year":"2012","unstructured":"M. Islam , M. Kuzu , and M. Kantarcioglu . Access pattern disclosure on searchable encryption: ramification, attack and mitigation . In NDSS , 2012 . M. Islam, M. Kuzu, and M. Kantarcioglu. Access pattern disclosure on searchable encryption: ramification, attack and mitigation. In NDSS, 2012."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.E93.D.2520"},{"key":"e_1_3_2_1_27_1","first-page":"25","volume-title":"KMIS","author":"Kadhem H.","year":"2010","unstructured":"H. Kadhem , T. Amagasa , and H. Kitagawa . A secure and efficient order preserving encryption scheme for relational databases . In KMIS , pages 25 -- 35 , 2010 . H. Kadhem, T. Amagasa, and H. Kitagawa. A secure and efficient order preserving encryption scheme for relational databases. In KMIS, pages 25--35, 2010."},{"key":"e_1_3_2_1_28_1","volume-title":"Introduction to Modern Cryptography","author":"Katz J.","year":"2008","unstructured":"J. Katz and Y. Lindell . Introduction to Modern Cryptography . Chapman & Hall\/CRC , 2008 . J. Katz and Y. Lindell. Introduction to Modern Cryptography. Chapman & Hall\/CRC, 2008."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660277"},{"key":"e_1_3_2_1_30_1","first-page":"2","article-title":"The Hungarian method for the assignment problem","author":"Kuhn H. W.","year":"1955","unstructured":"H. W. Kuhn . The Hungarian method for the assignment problem . Naval Research Logistics Quarterly , 2 , 1955 . H. W. Kuhn. The Hungarian method for the assignment problem. Naval Research Logistics Quarterly, 2, 1955.","journal-title":"Naval Research Logistics Quarterly"},{"key":"e_1_3_2_1_31_1","volume-title":"Chaotic order preserving encryption for efficient and secure queries on databases. IEICE transactions on information and systems, 92(11):2207--2217","author":"Lee S.","year":"2009","unstructured":"S. Lee , T. Park , D. Lee , T. Nam , and S. Kim . Chaotic order preserving encryption for efficient and secure queries on databases. IEICE transactions on information and systems, 92(11):2207--2217 , 2009 . S. Lee, T. Park, D. Lee, T. Nam, and S. Kim. Chaotic order preserving encryption for efficient and secure queries on databases. IEICE transactions on information and systems, 92(11):2207--2217, 2009."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/548089"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1137\/0105003"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.38"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043566"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-43936-4_20"},{"key":"e_1_3_2_1_37_1","first-page":"44","volume-title":"S&P","author":"Song D.","year":"2000","unstructured":"D. Song , D. Wagner , and A. Perrig . Practical techniques for searching on encrypted data . In S&P , pages 44 -- 55 , 2000 . D. Song, D. Wagner, and A. Perrig. Practical techniques for searching on encrypted data. In S&P, pages 44--55, 2000."},{"key":"e_1_3_2_1_38_1","first-page":"280","volume-title":"ICNP","author":"Xu J.","year":"2002","unstructured":"J. Xu , J. Fan , M. H. Ammar , and S. B. Moon . Prefix-preserving ip address anonymization: Measurement-based security evaluation and a new cryptography-based scheme . In ICNP , pages 280 -- 289 , 2002 . J. Xu, J. Fan, M. H. Ammar, and S. B. Moon. Prefix-preserving ip address anonymization: Measurement-based security evaluation and a new cryptography-based scheme. In ICNP, pages 280--289, 2002."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/11863908_29"}],"event":{"name":"CCS'15: The 22nd ACM Conference on Computer and Communications Security","location":"Denver Colorado USA","acronym":"CCS'15","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810103.2813651","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2810103.2813651","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:24Z","timestamp":1750225704000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810103.2813651"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,12]]},"references-count":39,"alternative-id":["10.1145\/2810103.2813651","10.1145\/2810103"],"URL":"https:\/\/doi.org\/10.1145\/2810103.2813651","relation":{},"subject":[],"published":{"date-parts":[[2015,10,12]]},"assertion":[{"value":"2015-10-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}