{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T07:22:10Z","timestamp":1769757730133,"version":"3.49.0"},"reference-count":82,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2021,4,20]],"date-time":"2021-04-20T00:00:00Z","timestamp":1618876800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Priv. Secur."],"published-print":{"date-parts":[[2021,8,31]]},"abstract":"<jats:p>\n            Searchable Encryption (SE) is a technique that allows Cloud Service Providers to search over encrypted datasets without learning the content of queries and records. In recent years, many SE schemes have been proposed to protect outsourced data. However, most of them leak sensitive information, from which attackers could still infer the content of queries and records by mounting leakage-based inference attacks, such as the\n            <jats:italic>count attack<\/jats:italic>\n            and\n            <jats:italic>file-injection attack<\/jats:italic>\n            .\n          <\/jats:p>\n          <jats:p>\n            In this work, first we define the leakage in searchable encrypted databases and analyse how the leakage is leveraged in existing leakage-based attacks. Second, we propose a &lt;underline&gt;P&lt;\/underline&gt;rivacy-preserving &lt;underline&gt;M&lt;\/underline&gt;ulti-&lt;underline&gt;c&lt;\/underline&gt;loud based dynamic symmetric SE scheme for relational &lt;underline&gt;D&lt;\/underline&gt;ata&lt;underline&gt;b&lt;\/underline&gt;ase (\n            <jats:italic>P-McDb<\/jats:italic>\n            ).\n            <jats:italic>P-McDb<\/jats:italic>\n            has minimal leakage, which not only ensures confidentiality of queries and records but also protects the search, intersection, and size patterns. Moreover,\n            <jats:italic>P-McDb<\/jats:italic>\n            ensures both forward and backward privacy of the database. Thus,\n            <jats:italic>P-McDb<\/jats:italic>\n            could resist existing leakage-based attacks, e.g., active file\/record-injection attacks. We give security definition and analysis to show how\n            <jats:italic>P-McDb<\/jats:italic>\n            hides the aforementioned patterns. Finally, we implemented a prototype of\n            <jats:italic>P-McDb<\/jats:italic>\n            and tested it using the TPC-H benchmark dataset. Our evaluation results show that users can get the required records in 2.16 s when searching over 4.1 million records.\n          <\/jats:p>","DOI":"10.1145\/3446920","type":"journal-article","created":{"date-parts":[[2021,4,20]],"date-time":"2021-04-20T10:09:39Z","timestamp":1618913379000},"page":"1-35","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["Privacy-preserving Dynamic Symmetric Searchable Encryption with Controllable Leakage"],"prefix":"10.1145","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8124-6800","authenticated-orcid":false,"given":"Shujie","family":"Cui","sequence":"first","affiliation":[{"name":"Monash University, Melbourne, Australia"}]},{"given":"Xiangfu","family":"Song","sequence":"additional","affiliation":[{"name":"Shandong University, Jinan, China"}]},{"given":"Muhammad Rizwan","family":"Asghar","sequence":"additional","affiliation":[{"name":"The University of Auckland, Auckland, New Zealand"}]},{"given":"Steven D.","family":"Galbraith","sequence":"additional","affiliation":[{"name":"The University of Auckland, Auckland, New Zealand"}]},{"given":"Giovanni","family":"Russello","sequence":"additional","affiliation":[{"name":"The University of Auckland, Auckland, New Zealand"}]}],"member":"320","published-online":{"date-parts":[[2021,4,20]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"Mohamed Ahmed Abdelraheem Tobias Andersson and Christian Gehrmann. 2017. Inference and record-injection attacks on searchable encrypted relational databases. IACR Cryptol. ePrint Arch. (2017) 24.  Mohamed Ahmed Abdelraheem Tobias Andersson and Christian Gehrmann. 2017. Inference and record-injection attacks on searchable encrypted relational databases. IACR Cryptol. ePrint Arch. (2017) 24."},{"key":"e_1_2_1_2_1","volume-title":"Data Privacy Management, Cryptocurrencies and Blockchain Technology","author":"Abdelraheem Mohamed Ahmed","unstructured":"Mohamed Ahmed Abdelraheem , Tobias Andersson , and Christian Gehrmann . 2017. Searchable encrypted relational databases: Risks and countermeasures . In Data Privacy Management, Cryptocurrencies and Blockchain Technology . Springer , 70--85. Mohamed Ahmed Abdelraheem, Tobias Andersson, and Christian Gehrmann. 2017. Searchable encrypted relational databases: Risks and countermeasures. In Data Privacy Management, Cryptocurrencies and Blockchain Technology. Springer, 70--85."},{"key":"e_1_2_1_3_1","first-page":"1","article-title":"Forward and backward private searchable encryption with SGX. In EuroSec 2019","volume":"4","author":"Amjad Ghous","year":"2019","unstructured":"Ghous Amjad , Seny Kamara , and Tarik Moataz . 2019 . Forward and backward private searchable encryption with SGX. In EuroSec 2019 . ACM , 4 : 1 -- 4 :6. Ghous Amjad, Seny Kamara, and Tarik Moataz. 2019. Forward and backward private searchable encryption with SGX. In EuroSec 2019. ACM, 4:1--4:6.","journal-title":"ACM"},{"key":"e_1_2_1_4_1","unstructured":"Arvind Arasu Spyros Blanas Ken Eguro Raghav Kaushik Donald Kossmann Ravishankar Ramamurthy and Ramarathnam Venkatesan. 2013. Orthogonal security with cipherbase. In CIDR.  Arvind Arasu Spyros Blanas Ken Eguro Raghav Kaushik Donald Kossmann Ravishankar Ramamurthy and Ramarathnam Venkatesan. 2013. Orthogonal security with cipherbase. In CIDR."},{"key":"e_1_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Muhammad Rizwan Asghar Mihaela Ion Giovanni Russello and Bruno Crispo. 2013. : Enforcing security policies in outsourced environments. Comput. Secur. (2013) 2--24.  Muhammad Rizwan Asghar Mihaela Ion Giovanni Russello and Bruno Crispo. 2013. : Enforcing security policies in outsourced environments. Comput. Secur. (2013) 2--24.","DOI":"10.1016\/j.cose.2012.11.010"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517488.2517492"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.14778\/3236187.3236217"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_30"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2014.6890956"},{"key":"e_1_2_1_11_1","volume-title":"SIGSAC","author":"Bost Raphael","year":"2016","unstructured":"Raphael Bost . 2016 . oo: Forward secure searchable encryption . In SIGSAC 2016. ACM, 1143--1154. Raphael Bost. 2016. oo: Forward secure searchable encryption. In SIGSAC 2016. ACM, 1143--1154."},{"key":"e_1_2_1_12_1","unstructured":"Raphael Bost and Pierre-Alain Fouque. 2017. Thwarting leakage abuse attacks against searchable encryption - A formal approach and applications to database padding. IACR Cryptol. ePrint Arch. (2017) 1060.  Raphael Bost and Pierre-Alain Fouque. 2017. Thwarting leakage abuse attacks against searchable encryption - A formal approach and applications to database padding. IACR Cryptol. ePrint Arch. (2017) 1060."},{"key":"e_1_2_1_13_1","unstructured":"Raphael Bost Pierre-Alain Fouque and David Pointcheval. 2016. Verifiable dynamic symmetric searchable encryption: Optimality and forward security. IACR Cryptol. ePrint Arch. (2016) 62.  Raphael Bost Pierre-Alain Fouque and David Pointcheval. 2016. Verifiable dynamic symmetric searchable encryption: Optimality and forward security. IACR Cryptol. ePrint Arch. (2016) 62."},{"key":"e_1_2_1_14_1","volume-title":"CCS","author":"Bost Rapha\u00ebl","year":"2017","unstructured":"Rapha\u00ebl Bost , Brice Minaud , and Olga Ohrimenko . 2017 . Forward and backward private searchable encryption from constrained cryptographic primitives . In CCS 2017. ACM, 1465--1482. Rapha\u00ebl Bost, Brice Minaud, and Olga Ohrimenko. 2017. Forward and backward private searchable encryption from constrained cryptographic primitives. In CCS 2017. ACM, 1465--1482."},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.45"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813700"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23264"},{"key":"e_1_2_1_18_1","volume-title":"CCS","author":"Chamani Javad Ghareh","year":"2018","unstructured":"Javad Ghareh Chamani , Dimitrios Papadopoulos , Charalampos Papamanthou , and Rasool Jalili . 2018 . New constructions for forward and backward private symmetric searchable encryption . In CCS 2018. ACM, 1038--1055. Javad Ghareh Chamani, Dimitrios Papadopoulos, Charalampos Papamanthou, and Rasool Jalili. 2018. New constructions for forward and backward private symmetric searchable encryption. In CCS 2018. ACM, 1038--1055."},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39077-7_5"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486381"},{"key":"e_1_2_1_21_1","first-page":"1","article-title":"Intel SGX explained","volume":"2016","author":"Costan Victor","year":"2016","unstructured":"Victor Costan and Srinivas Devadas . 2016 . Intel SGX explained . IACR Cryptol. ePrint Arch. 2016 , 086 (2016), 1 -- 118 . Victor Costan and Srinivas Devadas. 2016. Intel SGX explained. IACR Cryptol. ePrint Arch. 2016, 086 (2016), 1--118.","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2017.50"},{"key":"e_1_2_1_23_1","volume-title":"CCS","author":"Curtmola Reza","year":"2006","unstructured":"Reza Curtmola , Juan A. Garay , Seny Kamara , and Rafail Ostrovsky . 2006 . Searchable symmetric encryption: Improved definitions and efficient constructions . In CCS 2006. ACM, 79--88. Reza Curtmola, Juan A. Garay, Seny Kamara, and Rafail Ostrovsky. 2006. Searchable symmetric encryption: Improved definitions and efficient constructions. In CCS 2006. ACM, 79--88."},{"key":"e_1_2_1_24_1","first-page":"811","article-title":"SEAL: Attack mitigation for encrypted databases via adjustable leakage","volume":"2019","author":"Demertzis Ioannis","year":"2019","unstructured":"Ioannis Demertzis , Dimitrios Papadopoulos , Charalampos Papamanthou , and Saurabh Shintre . 2019 . SEAL: Attack mitigation for encrypted databases via adjustable leakage . IACR Cryptol. ePrint Arch. 2019 (2019), 811 . Ioannis Demertzis, Dimitrios Papadopoulos, Charalampos Papamanthou, and Saurabh Shintre. 2019. SEAL: Attack mitigation for encrypted databases via adjustable leakage. IACR Cryptol. ePrint Arch. 2019 (2019), 811.","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978379"},{"key":"e_1_2_1_26_1","volume-title":"CCS","author":"Ekberg Jan-Erik","year":"2013","unstructured":"Jan-Erik Ekberg , Kari Kostiainen , and N. Asokan . 2013. Trusted execution environments on mobile devices . In CCS 2013 . 1497--1498. Jan-Erik Ekberg, Kari Kostiainen, and N. Asokan. 2013. Trusted execution environments on mobile devices. In CCS 2013. 1497--1498."},{"key":"e_1_2_1_27_1","volume-title":"Retrieved","author":"Email Enron","year":"2020","unstructured":"Enron Email . [n.d.]. Enron Email Dataset . Retrieved June 23, 2020 from http:\/\/www.enronemail.com. Enron Email. [n.d.]. Enron Email Dataset. Retrieved June 23, 2020 from http:\/\/www.enronemail.com."},{"key":"e_1_2_1_28_1","volume-title":"SP 2015. IEEE Computer Society, 395--410","author":"Fisch Ben A.","unstructured":"Ben A. Fisch , Binh Vo , Fernando Krell , Abishek Kumarasubramanian , Vladimir Kolesnikov , Tal Malkin , and Steven M. Bellovin . 2015. Malicious-client security in Blind Seer: A scalable private DBMS . In SP 2015. IEEE Computer Society, 395--410 . Ben A. Fisch, Binh Vo, Fernando Krell, Abishek Kumarasubramanian, Vladimir Kolesnikov, Tal Malkin, and Steven M. Bellovin. 2015. Malicious-client security in Blind Seer: A scalable private DBMS. In SP 2015. IEEE Computer Society, 395--410."},{"key":"e_1_2_1_29_1","volume-title":"Retrived","year":"2020","unstructured":"Flexera. [n.d.]. Flexera 2020 State of the Cloud Report . Retrived June 23, 2020 from https:\/\/info.flexera.com\/SLO-CM-REPORT-State-of-the-Cloud-2020. Flexera. [n.d.]. Flexera 2020 State of the Cloud Report. Retrived June 23, 2020 from https:\/\/info.flexera.com\/SLO-CM-REPORT-State-of-the-Cloud-2020."},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"e_1_2_1_31_1","volume-title":"Software protection and simulation on oblivious RAMs. J. ACM","author":"Goldreich Oded","year":"1996","unstructured":"Oded Goldreich and Rafail Ostrovsky . 1996. Software protection and simulation on oblivious RAMs. J. ACM ( 1996 ), 431--473. Oded Goldreich and Rafail Ostrovsky. 1996. Software protection and simulation on oblivious RAMs. J. ACM (1996), 431--473."},{"key":"e_1_2_1_32_1","volume-title":"CCS","author":"Grubbs Paul","year":"2018","unstructured":"Paul Grubbs , Marie-Sarah Lacharit\u00e9 , Brice Minaud , and Kenneth G. Paterson . 2018. Pump up the volume: Practical database reconstruction from volume leakage on range queries . In CCS 2018 . ACM, 315--331. Paul Grubbs, Marie-Sarah Lacharit\u00e9, Brice Minaud, and Kenneth G. Paterson. 2018. Pump up the volume: Practical database reconstruction from volume leakage on range queries. In CCS 2018. ACM, 315--331."},{"key":"e_1_2_1_33_1","volume-title":"SP 2019. IEEE, 1067--1083","author":"Grubbs Paul","unstructured":"Paul Grubbs , Marie-Sarah Lacharit\u00e9 , Brice Minaud , and Kenneth G. Paterson . 2019. Learning to reconstruct: Statistical learning theory and encrypted database attacks . In SP 2019. IEEE, 1067--1083 . Paul Grubbs, Marie-Sarah Lacharit\u00e9, Brice Minaud, and Kenneth G. Paterson. 2019. Learning to reconstruct: Statistical learning theory and encrypted database attacks. In SP 2019. IEEE, 1067--1083."},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.44"},{"key":"e_1_2_1_35_1","first-page":"1","article-title":"What bugs live in the cloud? A study of 3000+ issues in cloud systems. In SoCC 2014","volume":"7","author":"Gunawi Haryadi S.","year":"2014","unstructured":"Haryadi S. Gunawi , Mingzhe Hao , Tanakorn Leesatapornwongsa , Tiratat Patana-anake, Thanh Do , Jeffry Adityatama , Kurnia J. Eliazar , Agung Laksono , Jeffrey F. Lukman , Vincentius Martin , and Anang D. Satria . 2014 . What bugs live in the cloud? A study of 3000+ issues in cloud systems. In SoCC 2014 . ACM , 7 : 1 -- 7 :14. Haryadi S. Gunawi, Mingzhe Hao, Tanakorn Leesatapornwongsa, Tiratat Patana-anake, Thanh Do, Jeffry Adityatama, Kurnia J. Eliazar, Agung Laksono, Jeffrey F. Lukman, Vincentius Martin, and Anang D. Satria. 2014. What bugs live in the cloud? A study of 3000+ issues in cloud systems. In SoCC 2014. ACM, 7:1--7:14.","journal-title":"ACM"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660297"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-04015-4"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991088"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-29485-8_6"},{"key":"e_1_2_1_40_1","volume-title":"NDSS","author":"Islam Mohammad Saiful","year":"2012","unstructured":"Mohammad Saiful Islam , Mehmet Kuzu , and Murat Kantarcioglu . 2012 . Access pattern disclosure on searchable encryption: Ramification, attack and mitigation . In NDSS 2012. The Internet Society. Mohammad Saiful Islam, Mehmet Kuzu, and Murat Kantarcioglu. 2012. Access pattern disclosure on searchable encryption: Ramification, attack and mitigation. In NDSS 2012. The Internet Society."},{"key":"e_1_2_1_41_1","volume-title":"CCS","author":"Kamara Seny","year":"2012","unstructured":"Seny Kamara , Charalampos Papamanthou , and Tom Roeder . 2012 . Dynamic searchable symmetric encryption . In CCS 2012. ACM, 965--976. Seny Kamara, Charalampos Papamanthou, and Tom Roeder. 2012. Dynamic searchable symmetric encryption. In CCS 2012. ACM, 965--976."},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978386"},{"key":"e_1_2_1_43_1","volume-title":"CCS","author":"Kim Kee Sung","year":"2017","unstructured":"Kee Sung Kim , Minkyu Kim , Dongsoo Lee , Je Hong Park , and Woo-Hwan Kim . 2017 . Forward secure dynamic searchable symmetric encryption with efficient updates . In CCS 2017. ACM, 1449--1463. Kee Sung Kim, Minkyu Kim, Dongsoo Lee, Je Hong Park, and Woo-Hwan Kim. 2017. Forward secure dynamic searchable symmetric encryption with efficient updates. In CCS 2017. ACM, 1449--1463."},{"key":"e_1_2_1_44_1","volume-title":"Vecchi","author":"Kirkpatrick Scott","year":"1983","unstructured":"Scott Kirkpatrick , D. Gelatt Jr ., and Mario P . Vecchi . 1983 . Optimization by simmulated annealing. Science 220, 4598 (1983), 671--680. Scott Kirkpatrick, D. Gelatt Jr., and Mario P. Vecchi. 1983. Optimization by simmulated annealing. Science 220, 4598 (1983), 671--680."},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00015"},{"key":"e_1_2_1_46_1","doi-asserted-by":"crossref","unstructured":"Evgenios M. Kornaropoulos Charalampos Papamanthou and Roberto Tamassia. 2019. The state of the uniform: Attacks on encrypted databases beyond the uniform query distribution. IACR Cryptol. ePrint Arch. (2019) 441.  Evgenios M. Kornaropoulos Charalampos Papamanthou and Roberto Tamassia. 2019. The state of the uniform: Attacks on encrypted databases beyond the uniform query distribution. IACR Cryptol. ePrint Arch. (2019) 441.","DOI":"10.1109\/SP40000.2020.00029"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-02937-5_17"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2699026.2699116"},{"key":"e_1_2_1_49_1","volume-title":"SP 2018. IEEE Computer Society, 297--314","author":"Lacharit\u00e9 Marie-Sarah","unstructured":"Marie-Sarah Lacharit\u00e9 , Brice Minaud , and Kenneth G. Paterson . 2018. Improved reconstruction attacks on encrypted data using range query leakage . In SP 2018. IEEE Computer Society, 297--314 . Marie-Sarah Lacharit\u00e9, Brice Minaud, and Kenneth G. Paterson. 2018. Improved reconstruction attacks on encrypted data using range query leakage. In SP 2018. IEEE Computer Society, 297--314."},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2894411"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-30215-3_2"},{"key":"e_1_2_1_52_1","volume-title":"SIGSAC","author":"Naveed Muhammad","year":"2015","unstructured":"Muhammad Naveed , Seny Kamara , and Charles V. Wright . 2015. Inference attacks on property-preserving encrypted databases . In SIGSAC 2015 . ACM, 644--655. Muhammad Naveed, Seny Kamara, and Charles V. Wright. 2015. Inference attacks on property-preserving encrypted databases. In SIGSAC 2015. ACM, 644--655."},{"key":"e_1_2_1_53_1","volume-title":"SP 2014. IEEE Computer Society, 639--654","author":"Naveed Muhammad","unstructured":"Muhammad Naveed , Manoj Prabhakaran , and Carl A. Gunter . 2014. Dynamic searchable encryption via blind storage . In SP 2014. IEEE Computer Society, 639--654 . Muhammad Naveed, Manoj Prabhakaran, and Carl A. Gunter. 2014. Dynamic searchable encryption via blind storage. In SP 2014. IEEE Computer Society, 639--654."},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-015-0294-9"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.5555\/1756123.1756146"},{"key":"e_1_2_1_56_1","volume-title":"OSDI","author":"Papadimitriou Antonis","year":"2016","unstructured":"Antonis Papadimitriou , Ranjita Bhagwan , Nishanth Chandran , Ramachandran Ramjee , Andreas Haeberlen , Harmeet Singh , Abhishek Modi , and Saikrishna Badrinarayanan . 2016 . Big data analytics over encrypted datasets with Seabed . In OSDI 2016. USENIX Association. Antonis Papadimitriou, Ranjita Bhagwan, Nishanth Chandran, Ramachandran Ramjee, Andreas Haeberlen, Harmeet Singh, Abhishek Modi, and Saikrishna Badrinarayanan. 2016. Big data analytics over encrypted datasets with Seabed. In OSDI 2016. USENIX Association."},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.30"},{"key":"e_1_2_1_58_1","volume-title":"Arx: A strongly encrypted database system. IACR Cryptol. ePrint Arch.","author":"Poddar Rishabh","year":"2016","unstructured":"Rishabh Poddar , Tobias Boelter , and Raluca Ada Popa . 2016 . Arx: A strongly encrypted database system. IACR Cryptol. ePrint Arch. (2016), 591. Rishabh Poddar, Tobias Boelter, and Raluca Ada Popa. 2016. Arx: A strongly encrypted database system. IACR Cryptol. ePrint Arch. (2016), 591."},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12095-017-0232-y"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043566"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/2808425.2808429"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11203-9_23"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/2699026.2699101"},{"key":"e_1_2_1_64_1","volume-title":"S&P","author":"Song Dawn Xiaodong","year":"2000","unstructured":"Dawn Xiaodong Song , David Wagner , and Adrian Perrig . 2000. Practical techniques for searches on encrypted data . In S&P 2000 . IEEE Computer Society , 44--55. Dawn Xiaodong Song, David Wagner, and Adrian Perrig. 2000. Practical techniques for searches on encrypted data. In S&P 2000. IEEE Computer Society, 44--55."},{"key":"e_1_2_1_65_1","first-page":"497","article-title":"Forward private searchable symmetric encryption with optimized I\/O efficiency","volume":"2018","author":"Song Xiangfu","year":"2018","unstructured":"Xiangfu Song , Changyu Dong , Dandan Yuan , Qiuliang Xu , and Minghao Zhao . 2018 . Forward private searchable symmetric encryption with optimized I\/O efficiency . IACR Cryptol. ePrint Arch. 2018 (2018), 497 . Xiangfu Song, Changyu Dong, Dandan Yuan, Qiuliang Xu, and Minghao Zhao. 2018. Forward private searchable symmetric encryption with optimized I\/O efficiency. IACR Cryptol. ePrint Arch. 2018 (2018), 497.","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23298"},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516673"},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516660"},{"key":"e_1_2_1_69_1","volume-title":"CCS","author":"Sun Shifeng","year":"2018","unstructured":"Shifeng Sun , Xingliang Yuan , Joseph K. Liu , Ron Steinfeld , Amin Sakzad , Viet Vo , and Surya Nepal . 2018 . Practical backward-secure searchable encryption from symmetric puncturable encryption . In CCS 2018. ACM, 763--780. Shifeng Sun, Xingliang Yuan, Joseph K. Liu, Ron Steinfeld, Amin Sakzad, Viet Vo, and Surya Nepal. 2018. Practical backward-secure searchable encryption from symmetric puncturable encryption. In CCS 2018. ACM, 763--780."},{"key":"e_1_2_1_70_1","volume-title":"Retrieved","author":"Republic Tech","year":"2014","unstructured":"Tech Republic . 2014 . Dropbox and Box Leak Files in Security through Obscurity Nightmare . Retrieved June 23, 2020 from https:\/\/www.techrepublic.com\/article\/dropbox-and-box-leak-files-in-security-through-obscurity-nightmare. Tech Republic. 2014. Dropbox and Box Leak Files in Security through Obscurity Nightmare. Retrieved June 23, 2020 from https:\/\/www.techrepublic.com\/article\/dropbox-and-box-leak-files-in-security-through-obscurity-nightmare."},{"key":"e_1_2_1_71_1","unstructured":"TPC. [n.d.]. TPC-H. Retrieved June 23 2020 from http:\/\/www.tpc.org\/tpch.  TPC. [n.d.]. TPC-H. Retrieved June 23 2020 from http:\/\/www.tpc.org\/tpch."},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.14778\/2535573.2488336"},{"key":"e_1_2_1_73_1","volume-title":"Retrieved","year":"2020","unstructured":"Verrizon. 2020 . 2020 Data Breach Investigations Report . Retrieved June 23, 2020 from https:\/\/enterprise.verizon.com\/resources\/reports\/dbir. Verrizon. 2020. 2020 Data Breach Investigations Report. Retrieved June 23, 2020 from https:\/\/enterprise.verizon.com\/resources\/reports\/dbir."},{"key":"e_1_2_1_74_1","volume-title":"INFOCOM 2015","author":"Wang Bing","year":"2092","unstructured":"Bing Wang , Wei Song , Wenjing Lou , and Y. Thomas Hou . 2015. Inverted index based multi-keyword public-key searchable encryption with strong privacy guarantee . In INFOCOM 2015 . IEEE, 2092 --2100. Bing Wang, Wei Song, Wenjing Lou, and Y. Thomas Hou. 2015. Inverted index based multi-keyword public-key searchable encryption with strong privacy guarantee. In INFOCOM 2015. IEEE, 2092--2100."},{"key":"e_1_2_1_75_1","first-page":"497","article-title":"Forward and backward-secure range-searchable symmetric encryption","volume":"2019","author":"Wang Jiafan","year":"2019","unstructured":"Jiafan Wang and Sherman S. M. Chow . 2019 . Forward and backward-secure range-searchable symmetric encryption . IACR Cryptol. ePrint Arch. 2019 (2019), 497 . Jiafan Wang and Sherman S. M. Chow. 2019. Forward and backward-secure range-searchable symmetric encryption. IACR Cryptol. ePrint Arch. 2019 (2019), 497.","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.50"},{"key":"e_1_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897884"},{"key":"e_1_2_1_78_1","volume-title":"USENIX Security","author":"Zhang Yupeng","year":"2016","unstructured":"Yupeng Zhang , Jonathan Katz , and Charalampos Papamanthou . 2016. All your queries are belong to us: The power of file-injection attacks on searchable encryption . In USENIX Security 2016 . USENIX Association , 707--720. Yupeng Zhang, Jonathan Katz, and Charalampos Papamanthou. 2016. All your queries are belong to us: The power of file-injection attacks on searchable encryption. In USENIX Security 2016. USENIX Association, 707--720."},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-29962-0_15"},{"key":"e_1_2_1_80_1","volume-title":"USENIX","author":"Zheng Wenting","year":"2017","unstructured":"Wenting Zheng , Ankur Dave , Jethro G. Beekman , Raluca Ada Popa , Joseph E. Gonzalez , and Ion Stoica . 2017 . Opaque: An oblivious and encrypted distributed analytics platform . In USENIX 2017. USENIX Association, 283--298. Wenting Zheng, Ankur Dave, Jethro G. Beekman, Raluca Ada Popa, Joseph E. Gonzalez, and Ion Stoica. 2017. Opaque: An oblivious and encrypted distributed analytics platform. In USENIX 2017. USENIX Association, 283--298."},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2018.2808283"},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-98989-1_12"},{"key":"e_1_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-29962-0_14"}],"container-title":["ACM Transactions on Privacy and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3446920","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3446920","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:28:26Z","timestamp":1750195706000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3446920"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,20]]},"references-count":82,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2021,8,31]]}},"alternative-id":["10.1145\/3446920"],"URL":"https:\/\/doi.org\/10.1145\/3446920","relation":{},"ISSN":["2471-2566","2471-2574"],"issn-type":[{"value":"2471-2566","type":"print"},{"value":"2471-2574","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,4,20]]},"assertion":[{"value":"2020-02-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-01-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-04-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}