{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,26]],"date-time":"2025-10-26T21:40:52Z","timestamp":1761514852495,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":63,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,1,8]],"date-time":"2022-01-08T00:00:00Z","timestamp":1641600000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,1,8]]},"DOI":"10.1145\/3493700.3493771","type":"proceedings-article","created":{"date-parts":[[2022,1,7]],"date-time":"2022-01-07T23:54:21Z","timestamp":1641599661000},"page":"344-347","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Cryptographic Techniques for Data Processing"],"prefix":"10.1145","author":[{"given":"Shantanu","family":"Sharma","sequence":"first","affiliation":[{"name":"New Jersey Institute of Technology, US"}]},{"given":"Sharad","family":"Mehrotra","sequence":"additional","affiliation":[{"name":"University of California, Irvine, US"}]}],"member":"320","published-online":{"date-parts":[[2022,1,8]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/564691.564717"},{"key":"e_1_3_2_1_2_1","unstructured":"[2] Available at: https:\/\/www.nytimes.com\/2017\/07\/31\/business\/media\/hbo-hack-game-of-thrones.html."},{"key":"e_1_3_2_1_3_1","unstructured":"[3] Available at: https:\/\/www.nytimes.com\/2017\/09\/07\/business\/equifax-cyberattack.html."},{"key":"e_1_3_2_1_4_1","unstructured":"[4] Available at: https:\/\/en.wikipedia.org\/wiki\/Facebook%E2%80%93Cambridge_Analytica_data_scandal."},{"key":"e_1_3_2_1_5_1","first-page":"563","article-title":"Order-preserving encryption for numeric data","author":"Agrawal","year":"2004","unstructured":"[5] R.\u00a0Agrawal et\u00a0al., \u201cOrder-preserving encryption for numeric data,\u201d in SIGMOD, pp.\u00a0563\u2013574, 2004.","journal-title":"SIGMOD"},{"key":"e_1_3_2_1_6_1","first-page":"535","article-title":"Deterministic and efficiently searchable encryption","author":"Bellare","year":"2007","unstructured":"[6] M.\u00a0Bellare et\u00a0al., \u201cDeterministic and efficiently searchable encryption,\u201d in CRYPTO, pp.\u00a0535\u2013552, 2007.","journal-title":"CRYPTO"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(84)90070-9"},{"key":"e_1_3_2_1_9_1","first-page":"44","article-title":"\u201cPractical techniques for searches on encrypted data","author":"Song","year":"2000","unstructured":"[9] D.\u00a0X. Song et\u00a0al., \u201cPractical techniques for searches on encrypted data,\u201d in IEEE SP, pp.\u00a044\u201355, 2000.","journal-title":"IEEE SP"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2011-0426"},{"key":"e_1_3_2_1_11_1","first-page":"90","article-title":"Private large-scale databases with distributed searchable symmetric encryption","author":"Ishai","year":"2016","unstructured":"[11] Y.\u00a0Ishai et\u00a0al., \u201cPrivate large-scale databases with distributed searchable symmetric encryption,\u201d in CT-RSA, pp.\u00a090\u2013107, 2016.","journal-title":"CT-RSA"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.14778\/3055330.3055334"},{"key":"e_1_3_2_1_14_1","first-page":"192","article-title":"Sharemind: A framework for fast privacy-preserving computations","volume":"5283","author":"Bogdanov","year":"2008","unstructured":"[14] D.\u00a0Bogdanov et\u00a0al., \u201cSharemind: A framework for fast privacy-preserving computations,\u201d in ESORICS, vol.\u00a05283, pp.\u00a0192\u2013206, 2008.","journal-title":"ESORICS"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2019.06.005"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2933844"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2330667.2330691"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.14778\/2535573.2488336"},{"volume-title":"TrustedDB: A trusted hardware-based database with privacy and data confidentiality","author":"Bajaj","key":"e_1_3_2_1_19_1","unstructured":"[19] S.\u00a0Bajaj et\u00a0al., \u201cTrustedDB: A trusted hardware-based database with privacy and data confidentiality,\u201d IEEE TKDE, vol.\u00a026, no.\u00a03."},{"key":"e_1_3_2_1_20_1","first-page":"7","article-title":"Correctdb: SQL engine with practical query authentication","volume":"6","author":"Bajaj","year":"2013","unstructured":"[20] S.\u00a0Bajaj et\u00a0al., \u201cCorrectdb: SQL engine with practical query authentication,\u201d PVLDB, vol.\u00a06, no.\u00a07, pp.\u00a0529\u2013540, 2013.","journal-title":"PVLDB"},{"key":"e_1_3_2_1_21_1","first-page":"1395","article-title":"\u201cSecure query processing with data interoperability in a cloud database environment","author":"Wong","year":"2014","unstructured":"[21] W.\u00a0K. Wong et\u00a0al., \u201cSecure query processing with data interoperability in a cloud database environment,\u201d in SIGMOD, pp.\u00a01395\u20131406, 2014.","journal-title":"SIGMOD"},{"key":"e_1_3_2_1_22_1","first-page":"07168","article-title":"ZeroDB white paper","volume":"1602","author":"Egorov M.","year":"2016","unstructured":"[22] M.\u00a0Egorov and M.\u00a0Wilkison, \u201cZeroDB white paper,\u201d CoRR, vol.\u00a0abs\/1602.07168, 2016.","journal-title":"CoRR"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2014.04.010"},{"key":"e_1_3_2_1_24_1","first-page":"271","article-title":"\u201cMrCrypt: static analysis for secure cloud computations","author":"Tetali","year":"2013","unstructured":"[24] S.\u00a0D. Tetali et\u00a0al., \u201cMrCrypt: static analysis for secure cloud computations,\u201d in OOPSLA, pp.\u00a0271\u2013286, 2013.","journal-title":"OOPSLA"},{"key":"e_1_3_2_1_25_1","volume-title":"HotCloud","author":"Stephen","year":"2014","unstructured":"[25] J.\u00a0J. Stephen et\u00a0al., \u201cPractical confidentiality preserving big data analysis,\u201d in HotCloud, 2014."},{"key":"e_1_3_2_1_26_1","volume-title":"CIDR","author":"Arasu","year":"2013","unstructured":"[26] A.\u00a0Arasu et\u00a0al., \u201cOrthogonal security with cipherbase,\u201d in CIDR, 2013."},{"key":"e_1_3_2_1_27_1","unstructured":"[27] Amazon Aurora available at:https:\/\/aws.amazon.com\/rds\/aurora\/."},{"key":"e_1_3_2_1_28_1","unstructured":"[28] MariaDB available at:https:\/\/mariadb.com\/."},{"key":"e_1_3_2_1_29_1","unstructured":"[29] Stealth Pulsar available at:http:\/\/www.stealthsoftwareinc.com\/."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.14778\/3329772.3329779"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxy090"},{"key":"e_1_3_2_1_32_1","first-page":"182","article-title":"Towards a theory of software protection and simulation by oblivious rams","author":"Goldreich","year":"1987","unstructured":"[32] O.\u00a0Goldreich, \u201cTowards a theory of software protection and simulation by oblivious rams,\u201d in STOC, pp.\u00a0182\u2013194, 1987.","journal-title":"STOC"},{"key":"e_1_3_2_1_33_1","first-page":"299","article-title":"Path ORAM: An extremely simple oblivious ram protocol","author":"Stefanov M.","year":"2013","unstructured":"[33] E.\u00a0Stefanov, M.\u00a0van Dijk, E.\u00a0Shi, C.\u00a0Fletcher, L.\u00a0Ren, X.\u00a0Yu, and S.\u00a0Devadas, \u201cPath ORAM: An extremely simple oblivious ram protocol,\u201d in CCS, pp.\u00a0299\u2013310, 2013.","journal-title":"CCS"},{"key":"e_1_3_2_1_34_1","first-page":"644","article-title":"Inference attacks on property-preserving encrypted databases","author":"Naveed","year":"2015","unstructured":"[34] M.\u00a0Naveed et\u00a0al., \u201cInference attacks on property-preserving encrypted databases,\u201d in CCS, pp.\u00a0644\u2013655, 2015.","journal-title":"CCS"},{"key":"e_1_3_2_1_35_1","first-page":"1329","article-title":"Generic attacks on secure outsourced databases","author":"Kellaris","year":"2016","unstructured":"[35] G.\u00a0Kellaris et\u00a0al., \u201cGeneric attacks on secure outsourced databases,\u201d in CCS, pp.\u00a01329\u20131340, 2016.","journal-title":"CCS"},{"key":"e_1_3_2_1_36_1","first-page":"1431","article-title":"Secure data outsourcing","author":"Sion","year":"2007","unstructured":"[36] R.\u00a0Sion, \u201cSecure data outsourcing,\u201d in VLDB, pp.\u00a01431\u20131432, 2007.","journal-title":"VLDB"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2013.6544919"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2588555.2588893"},{"key":"e_1_3_2_1_39_1","first-page":"1268","article-title":"Secure and privacy-preserving database services in the cloud","author":"Agrawal","year":"2013","unstructured":"[39] D.\u00a0Agrawal et\u00a0al., \u201cSecure and privacy-preserving database services in the cloud,\u201d in ICDE, pp.\u00a01268\u20131271, 2013.","journal-title":"ICDE"},{"key":"e_1_3_2_1_40_1","first-page":"1731","article-title":"Data security and privacy for outsourced data in the cloud","author":"Sahin","year":"2018","unstructured":"[40] C.\u00a0Sahin et\u00a0al., \u201cData security and privacy for outsourced data in the cloud,\u201d in ICDE, pp.\u00a01731\u20131734, 2018.","journal-title":"ICDE"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3448016.3457544"},{"key":"e_1_3_2_1_42_1","first-page":"639","article-title":"Adaptively secure multi-party computation","author":"Canetti","year":"1996","unstructured":"[42] R.\u00a0Canetti et\u00a0al., \u201cAdaptively secure multi-party computation,\u201d in STOC, pp.\u00a0639\u2013648, 1996.","journal-title":"STOC"},{"key":"e_1_3_2_1_43_1","first-page":"253","article-title":"Secure ranked keyword search over encrypted cloud data","author":"Wang","year":"2010","unstructured":"[43] C.\u00a0Wang et\u00a0al., \u201cSecure ranked keyword search over encrypted cloud data,\u201d in ICDCS, pp.\u00a0253\u2013262, 2010.","journal-title":"ICDCS"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755688.1755720"},{"key":"e_1_3_2_1_45_1","first-page":"14","article-title":"Fast range query processing with strong privacy protection for cloud computing","volume":"7","author":"Li","year":"1953","unstructured":"[45] R.\u00a0Li et\u00a0al., \u201cFast range query processing with strong privacy protection for cloud computing,\u201d PVLDB, vol.\u00a07, no.\u00a014, pp.\u00a01953\u20131964, 2014.","journal-title":"PVLDB"},{"key":"e_1_3_2_1_46_1","first-page":"697","article-title":"Adaptively secure conjunctive query processing over encrypted data for cloud computing","author":"Li","year":"2017","unstructured":"[46] R.\u00a0Li et\u00a0al., \u201cAdaptively secure conjunctive query processing over encrypted data for cloud computing,\u201d in ICDE, pp.\u00a0697\u2013708, 2017.","journal-title":"ICDE"},{"key":"e_1_3_2_1_47_1","first-page":"587","article-title":"Big data analytics over encrypted datasets with seabed","author":"Papadimitriou","year":"2016","unstructured":"[47] A.\u00a0Papadimitriou et\u00a0al., \u201cBig data analytics over encrypted datasets with seabed,\u201d in OSDI, pp.\u00a0587\u2013602, 2016.","journal-title":"OSDI"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/MARK.1979.8817296"},{"key":"e_1_3_2_1_49_1","first-page":"12","article-title":"\u201cA graduate introduction to numerical methods","volume":"10","author":"Corless","year":"2013","unstructured":"[49] R.\u00a0M. Corless et\u00a0al., \u201cA graduate introduction to numerical methods,\u201d AMC, vol.\u00a010, p.\u00a012, 2013.","journal-title":"AMC"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/293411.293443"},{"key":"e_1_3_2_1_51_1","first-page":"27","article-title":"Privacy preserving query processing using third parties","author":"Emek\u00e7i","year":"2006","unstructured":"[51] F.\u00a0Emek\u00e7i et\u00a0al., \u201cPrivacy preserving query processing using third parties,\u201d in ICDE, p.\u00a027, 2006.","journal-title":"ICDE"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.10.006"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.02.018"},{"key":"e_1_3_2_1_54_1","volume-title":"PETS","author":"Thompson","year":"2009","unstructured":"[54] B.\u00a0Thompson et\u00a0al., \u201cPrivacy-preserving computation and verification of aggregate queries on outsourced databases,\u201d in PETS, 2009."},{"key":"e_1_3_2_1_55_1","first-page":"1","article-title":"Conclave: secure multi-party computation on big data","author":"Volgushev","year":"2019","unstructured":"[55] N.\u00a0Volgushev et\u00a0al., \u201cConclave: secure multi-party computation on big data,\u201d in EuroSys, pp.\u00a03:1\u20133:18, 2019.","journal-title":"EuroSys"},{"key":"e_1_3_2_1_56_1","first-page":"337","article-title":"Function secret sharing","author":"Boyle N.","year":"2015","unstructured":"[56] E.\u00a0Boyle, N.\u00a0Gilboa, and Y.\u00a0Ishai, \u201cFunction secret sharing,\u201d in EUROCRYPT, pp.\u00a0337\u2013367, 2015.","journal-title":"EUROCRYPT"},{"key":"e_1_3_2_1_57_1","first-page":"299","article-title":"Splinter: Practical private queries on public data","author":"Wang","year":"2017","unstructured":"[57] F.\u00a0Wang et\u00a0al., \u201cSplinter: Practical private queries on public data,\u201d in NSDI, pp.\u00a0299\u2013313, 2017.","journal-title":"NSDI"},{"key":"e_1_3_2_1_58_1","volume-title":"HotCloud","author":"Ko","year":"2011","unstructured":"[58] S.\u00a0Y. Ko et\u00a0al., \u201cThe hybrex model for confidentiality and privacy in cloud computing,\u201d in HotCloud, 2011."},{"key":"e_1_3_2_1_59_1","first-page":"515","article-title":"Sedic: privacy-aware data intensive computing on hybrid clouds","author":"Zhang","year":"2011","unstructured":"[59] K.\u00a0Zhang et\u00a0al., \u201cSedic: privacy-aware data intensive computing on hybrid clouds,\u201d in CCS, pp.\u00a0515\u2013526, 2011.","journal-title":"CCS"},{"key":"e_1_3_2_1_60_1","first-page":"2643","article-title":"Prometheus: Privacy-aware data retrieval on hybrid cloud","author":"Zhou","year":"2013","unstructured":"[60] Z.\u00a0Zhou et\u00a0al., \u201cPrometheus: Privacy-aware data retrieval on hybrid cloud,\u201d in INFOCOM, pp.\u00a02643\u20132651, 2013.","journal-title":"INFOCOM"},{"key":"e_1_3_2_1_61_1","volume-title":"Tagged-MapReduce: A general framework for secure computing with mixed-sensitivity data on hybrid clouds","author":"Zhang","year":"2014","unstructured":"[61] C.\u00a0Zhang et\u00a0al., \u201cTagged-MapReduce: A general framework for secure computing with mixed-sensitivity data on hybrid clouds,\u201d 2014."},{"key":"e_1_3_2_1_62_1","first-page":"153","article-title":"\u201cSEMROD: secure and efficient MapReduce over hybrid clouds","author":"Oktay","year":"2015","unstructured":"[62] K.\u00a0Y. Oktay et\u00a0al., \u201cSEMROD: secure and efficient MapReduce over hybrid clouds,\u201d in SIGMOD, pp.\u00a0153\u2013166, 2015.","journal-title":"SIGMOD"},{"key":"e_1_3_2_1_63_1","first-page":"733","article-title":"\u201cSecure and efficient query processing over hybrid clouds","author":"Oktay","year":"2017","unstructured":"[63] K.\u00a0Y. Oktay et\u00a0al., \u201cSecure and efficient query processing over hybrid clouds,\u201d in ICDE, pp.\u00a0733\u2013744, 2017.","journal-title":"ICDE"},{"key":"e_1_3_2_1_64_1","first-page":"650","article-title":"Partitioned data security on outsourced sensitive and non-sensitive data","author":"Mehrotra","year":"2019","unstructured":"[64] S.\u00a0Mehrotra et\u00a0al., \u201cPartitioned data security on outsourced sensitive and non-sensitive data,\u201d in ICDE, pp.\u00a0650\u2013661, 2019.","journal-title":"ICDE"}],"event":{"name":"CODS-COMAD 2022: 5th Joint International Conference on Data Science & Management of Data (9th ACM IKDD CODS and 27th COMAD)","sponsor":["SIGGRAPH ACM Special Interest Group on Computer Graphics and Interactive Techniques"],"location":"Bangalore India","acronym":"CODS-COMAD 2022"},"container-title":["Proceedings of the 5th Joint International Conference on Data Science &amp; Management of Data (9th ACM IKDD CODS and 27th COMAD)"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3493700.3493771","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3493700.3493771","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:44Z","timestamp":1750188644000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3493700.3493771"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,8]]},"references-count":63,"alternative-id":["10.1145\/3493700.3493771","10.1145\/3493700"],"URL":"https:\/\/doi.org\/10.1145\/3493700.3493771","relation":{},"subject":[],"published":{"date-parts":[[2022,1,8]]},"assertion":[{"value":"2022-01-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}