{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:31:17Z","timestamp":1750221077979,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,12,29]],"date-time":"2018-12-29T00:00:00Z","timestamp":1546041600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,12,29]]},"DOI":"10.1145\/3301551.3301608","type":"proceedings-article","created":{"date-parts":[[2019,3,11]],"date-time":"2019-03-11T12:33:01Z","timestamp":1552307581000},"page":"163-167","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Sustainable Data Management Strategies and Systems in Untrust Cloud Environments"],"prefix":"10.1145","author":[{"given":"Huafei","family":"Zhu","sequence":"first","affiliation":[{"name":"Cyber Security Lab, School of Computer Science and Engineering, Nanyang Technology University, Singapore"}]},{"given":"Ng Wee","family":"Keong","sequence":"additional","affiliation":[{"name":"Cyber Security Lab, School of Computer Science and Engineering, Nanyang Technology University, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2018,12,29]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"119","volume-title":"IWCMC Conference Proceedings","author":"Adeel S.","year":"2018","unstructured":"S. Adeel , A. Haider , I. Waseem , and L. Rabia . Enhancing e-healthcare privacy preservation framework through l-diversity . In IWCMC Conference Proceedings , pages 119 -- 136 . IEEE, June 2018 . S. Adeel, A. Haider, I. Waseem, and L. Rabia. Enhancing e-healthcare privacy preservation framework through l-diversity. In IWCMC Conference Proceedings, pages 119--136. IEEE, June 2018."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63688-7_9"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/975541"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCONS.2017.8250718"},{"key":"e_1_3_2_1_5_1","first-page":"201","volume-title":"NSDI Conference Proceedings","author":"Popa R. A.","year":"2018","unstructured":"Lan, R. A. Popa , and S. Ratnasamy . Safebricks: Shielding network functions in the cloud . In NSDI Conference Proceedings , pages 201 -- 216 . USENIX, April 2018 . Lan, R. A. Popa, and S. Ratnasamy. Safebricks: Shielding network functions in the cloud. In NSDI Conference Proceedings, pages 201--216. USENIX, April 2018."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSC.2017.97"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055817"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043566"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30539-2_10"},{"key":"e_1_3_2_1_10_1","first-page":"0913","volume-title":"ICCSP Conference Proceedings","author":"Seema Y.","year":"2017","unstructured":"Y. Seema and P. Harshitha . Apoorva: Centralized multi-user and dynamic multi-keywords search scheme over encrypted cloud data . In ICCSP Conference Proceedings , pages 0913 -- 0917 . IEEE, March 2017 . Y. Seema and P. Harshitha. Apoorva: Centralized multi-user and dynamic multi-keywords search scheme over encrypted cloud data. In ICCSP Conference Proceedings, pages 0913--0917. IEEE, March 2017."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2017.2739141"},{"issue":"2861424","key":"e_1_3_2_1_12_1","first-page":"42445","article-title":"Verifiable public key encryption with keyword search based on homomorphic encryption in multi-user setting","volume":"6","author":"Wang D. N. W. Q. Q. G. X. M.","year":"2018","unstructured":"D. N. W. Q. Q. G. X. M. Wang . Verifiable public key encryption with keyword search based on homomorphic encryption in multi-user setting . IEEE Access , 6 ( 2861424 ): 42445 -- 42453 , August 2018 . D. N. W. Q. Q. G. X. M. Wang. Verifiable public key encryption with keyword search based on homomorphic encryption in multi-user setting. IEEE Access, 6(2861424):42445--42453, August 2018.","journal-title":"IEEE Access"},{"key":"e_1_3_2_1_13_1","first-page":"1937","volume-title":"Trustcom\/BigDataSE\/ISPA Conference Proceedings","author":"Wang H. H. J. D. H. W. R.","year":"2016","unstructured":"H. H. J. D. H. W. R. Wang . A multi-keyword multi-user searchable encryption scheme based on cloud storage . In Trustcom\/BigDataSE\/ISPA Conference Proceedings , pages 1937 -- 1943 . IEEE, August 2016 . H. H. J. D. H. W. R. Wang. A multi-keyword multi-user searchable encryption scheme based on cloud storage. In Trustcom\/BigDataSE\/ISPA Conference Proceedings, pages 1937--1943. IEEE, August 2016."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3064176.3064184"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-31550-8_2"}],"event":{"name":"ICIT 2018: IoT and Smart City","sponsor":["The Hong Kong Polytechnic The Hong Kong Polytechnic University","TU Tianjin University"],"location":"Hong Kong Hong Kong","acronym":"ICIT 2018"},"container-title":["Proceedings of the 6th International Conference on Information Technology: IoT and Smart City"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3301551.3301608","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3301551.3301608","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:35Z","timestamp":1750208255000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3301551.3301608"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,29]]},"references-count":15,"alternative-id":["10.1145\/3301551.3301608","10.1145\/3301551"],"URL":"https:\/\/doi.org\/10.1145\/3301551.3301608","relation":{},"subject":[],"published":{"date-parts":[[2018,12,29]]},"assertion":[{"value":"2018-12-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}