{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T12:51:27Z","timestamp":1770295887761,"version":"3.49.0"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,8,15]],"date-time":"2024-08-15T00:00:00Z","timestamp":1723680000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2024,8,15]],"date-time":"2024-08-15T00:00:00Z","timestamp":1723680000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"DOI":"10.13039\/501100024597","name":"Office of the Permanent Secretary, Ministry of Higher Education, Science, Research and Innovation, Thailand","doi-asserted-by":"publisher","award":["RGNS 65-110"],"award-info":[{"award-number":["RGNS 65-110"]}],"id":[{"id":"10.13039\/501100024597","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"DOI":"10.1186\/s13677-024-00692-y","type":"journal-article","created":{"date-parts":[[2024,8,15]],"date-time":"2024-08-15T06:02:13Z","timestamp":1723701733000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["SSF-CDW: achieving scalable, secure, and fast OLAP query for encrypted cloud data warehouse"],"prefix":"10.1186","volume":"13","author":[{"given":"Somchart","family":"Fugkeaw","sequence":"first","affiliation":[]},{"given":"Phatwasin","family":"Suksai","sequence":"additional","affiliation":[]},{"given":"Lyhour","family":"Hak","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,15]]},"reference":[{"key":"692_CR1","unstructured":"Azure Synapse Analytics (n.a.) [Online]. https:\/\/azure.microsoft.com\/en-us\/blog\/azure-sql-data-warehouse-is-now-azure-synapse-analytics\/. Accessed 5 Feb 2024"},{"key":"692_CR2","unstructured":"Amazon Redshift (n.a.) [Online]. https:\/\/aws.amazon.com\/redshift\/. Accessed 5 Feb 2024"},{"key":"692_CR3","unstructured":"Google BigQuery (n.a.) [Online]. https:\/\/cloud.google.com\/bigquery\/. Accessed 5 Feb 2024"},{"key":"692_CR4","unstructured":"Snowflake Data Cloud (n.a.) [Online]. https:\/\/www.snowflake.com\/en\/data-cloud\/workloads\/data-warehouse\/. Accessed 5 Feb 2024"},{"key":"692_CR5","doi-asserted-by":"publisher","unstructured":"Blanco C, Fern\u00e1ndez-Medina E, Trujillo J, Piattini M (2009) Data Warehouse Security. In: Liu L, \u00d6zsu MT (eds) Encyclopedia of Database Systems. Springer, Boston. https:\/\/doi.org\/10.1007\/978-0-387-39940-9_333","DOI":"10.1007\/978-0-387-39940-9_333"},{"issue":"3","key":"692_CR6","doi-asserted-by":"publisher","first-page":"1270","DOI":"10.1016\/j.dss.2005.10.008","volume":"42","author":"E Fern\u00e1ndez-Medina","year":"2006","unstructured":"Fern\u00e1ndez-Medina E, Trujillo J, Villarroel R, Piattini M (2006) Access control and audit model for the multidimensional modeling of data warehouses. Decis Support Syst 42(3):1270\u20131289","journal-title":"Decis Support Syst"},{"key":"692_CR7","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1016\/j.cose.2019.06.001","volume":"86","author":"MP Singh","year":"2019","unstructured":"Singh MP, Sural S, Vaidya J, Atluri V (2019) Managing attribute-based access control policies in a unified framework using data warehousing and in-memory database. Comput Secur 86:183\u2013205. https:\/\/doi.org\/10.1016\/j.cose.2019.06.001","journal-title":"Comput Secur"},{"key":"692_CR8","doi-asserted-by":"publisher","unstructured":"Fugkeaw S, Sato H (2015) Privacy-preserving access control model for big data cloud. In: 2015 International Computer Science and Engineering Conference (ICSEC). pp 1\u20136. https:\/\/doi.org\/10.1109\/ICSEC.2015.7401416","DOI":"10.1109\/ICSEC.2015.7401416"},{"key":"692_CR9","doi-asserted-by":"publisher","unstructured":"Lopes CC, Times VC (2015) A framework for investigating the performance of sum aggregations over encrypted data warehouses. In: Proc. ACM SAC.\u00a0Association for Computing Machinery, New York, pp 1000\u20131007. https:\/\/doi.org\/10.1145\/2695664.2695805","DOI":"10.1145\/2695664.2695805"},{"issue":"3","key":"692_CR10","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1145\/1666420.1666444","volume":"53","author":"C Gentry","year":"2010","unstructured":"Gentry C (2010) Computing arbitrary functions of encrypted data. Commun ACM 53(3):97\u2013105","journal-title":"Commun ACM"},{"key":"692_CR11","doi-asserted-by":"publisher","unstructured":"Ahmadian M, Paya A, Marinescu DC. Security of Applications Involving Multiple Organizations and Order Preserving Encryption in Hybrid Cloud Environments. 2014 IEEE International Parallel & Distributed Processing Symposium Workshops, Phoenix, pp. 894\u2013903, https:\/\/doi.org\/10.1109\/IPDPSW.2014.102","DOI":"10.1109\/IPDPSW.2014.102"},{"key":"692_CR12","doi-asserted-by":"publisher","unstructured":"Lopes CC, Times VC, Matwin S, Ciferri RR, Ciferri CDdA. Processing OLAP Queries over an Encrypted Data Warehouse Stored in the Cloud. In: Bellatreche, L., Mohania, M.K. (eds) Data Warehousing and Knowledge Discovery. DaWaK 2014. Lecture Notes in Computer Science, vol 8646. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-319-10160-6_18","DOI":"10.1007\/978-3-319-10160-6_18"},{"key":"692_CR13","doi-asserted-by":"publisher","unstructured":"Shang X et al (2022) One Stone, Three Birds: Finer-Grained Encryption with Apache Parquet @ Large Scale. In: 2022 IEEE International Conference on Big Data (Big Data). Osaka, pp 5802\u20135811. https:\/\/doi.org\/10.1109\/BigData55660.2022.10020987","DOI":"10.1109\/BigData55660.2022.10020987"},{"key":"692_CR14","doi-asserted-by":"publisher","unstructured":"Karkouda K, Nabli A, Gargouri F (2018) CloudWar: A new schema for securing and querying data warehouse hosted in the cloud. In: 2018 28th Int. Conf. Comput. Theory Appl. (ICCTA). pp 6\u201312. https:\/\/doi.org\/10.1109\/ICCTA45985.2018.9499193","DOI":"10.1109\/ICCTA45985.2018.9499193"},{"issue":"6","key":"692_CR15","doi-asserted-by":"publisher","first-page":"1346","DOI":"10.1109\/TIFS.2016.2527620","volume":"11","author":"X Yi","year":"2016","unstructured":"Yi X, Paulet R, Bertino E, Xu G (2016) Private Cell Retrieval From Data Warehouses. IEEE Trans Inf Forensic Secur 11(6):1346\u20131361. https:\/\/doi.org\/10.1109\/TIFS.2016.2527620","journal-title":"IEEE Trans Inf Forensic Secur"},{"issue":"2","key":"692_CR16","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1109\/TSUSC.2018.2838520","volume":"5","author":"M Ahmadian","year":"2020","unstructured":"Ahmadian M, Marinescu DC (2020) Information Leakage in Cloud Data Warehouses. IEEE Trans Sustain Comput 5(2):192\u2013203. https:\/\/doi.org\/10.1109\/TSUSC.2018.2838520","journal-title":"IEEE Trans Sustain Comput"},{"issue":"1","key":"692_CR17","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1109\/TBDATA.2017.2787661","volume":"8","author":"X Zhang","year":"2022","unstructured":"Zhang X, Qi L, Dou W, He Q, Leckie C, Kotagiri R, Salcic Z (2022) MR-Mondrian: Scalable Multidimensional Anonymisation for Big Data Privacy Preservation. IEEE Trans Big Data 8(1):125\u2013139","journal-title":"IEEE Trans Big Data"},{"key":"692_CR18","doi-asserted-by":"crossref","unstructured":"Cuzzocrea A, De\u00a0Maio V, Fadda E (2020) Experimenting and Assessing a Distributed Privacy-Preserving OLAP over Big Data Framework: Principles Practice and Experiences. In: 44th IEEE Annu. Comput. Softw. Appl. Conf. pp 1344\u20131350","DOI":"10.1109\/COMPSAC48688.2020.00-69"},{"key":"692_CR19","doi-asserted-by":"publisher","unstructured":"Cuzzocrea A (2023) Privacy-Preserving OLAP via Modeling and Analysis of Query Workloads: Innovative Theories and Theorems. In: Proc. 35th Int. Conf. Sci. Stat. Database Manage., Article no. 6. pp 1\u201312. https:\/\/doi.org\/10.1145\/3603719.3603735","DOI":"10.1145\/3603719.3603735"},{"key":"692_CR20","doi-asserted-by":"publisher","unstructured":"Cuzzocrea A (2023) Big OLAP Data Cube Compression Algorithms in Column-Oriented Cloud\/Edge Data Infrastructures. In: 2023 IEEE Ninth Multimedia Big Data (BigMM). Laguna Hills, pp 1\u20132. https:\/\/doi.org\/10.1109\/BigMM59094.2023.00020","DOI":"10.1109\/BigMM59094.2023.00020"},{"issue":"3","key":"692_CR21","doi-asserted-by":"publisher","first-page":"1047","DOI":"10.1109\/TPDS.2023.3237691","volume":"34","author":"H Cai","year":"2023","unstructured":"Cai H, Yang Y, Fan W, Xiao F, Zhu Y (2023) Towards Correlated Data Trading for High-Dimensional Private Data. IEEE Trans Parallel Distrib Syst 34(3):1047\u20131059. https:\/\/doi.org\/10.1109\/TPDS.2023.3237691","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"692_CR22","doi-asserted-by":"publisher","first-page":"78743","DOI":"10.1109\/ACCESS.2024.3408221","volume":"12","author":"S Fugkeaw","year":"2024","unstructured":"Fugkeaw S, Hak L (2024) PPAC-CDW: A Privacy-Preserving Access Control Scheme With Fast OLAP Query and Efficient Revocation for Cloud Data Warehouse. IEEE Access 12:78743\u201378758. https:\/\/doi.org\/10.1109\/ACCESS.2024.3408221","journal-title":"IEEE Access"},{"key":"692_CR23","doi-asserted-by":"publisher","first-page":"49848","DOI":"10.1109\/ACCESS.2024.3383320","volume":"12","author":"S Fugkeaw","year":"2024","unstructured":"Fugkeaw S, Hak L, Theeramunkong T (2024) Achieving Secure, Verifiable, and Efficient Boolean Keyword Searchable Encryption for Cloud Data Warehouse. IEEE Access 12:49848\u201349864. https:\/\/doi.org\/10.1109\/ACCESS.2024.3383320","journal-title":"IEEE Access"},{"issue":"9","key":"692_CR24","doi-asserted-by":"publisher","first-page":"6922","DOI":"10.1109\/JIOT.2021.3113519","volume":"9","author":"Z Liu","year":"2022","unstructured":"Liu Z, Cao Z, Dong X, Zhao X, Liu T, Bao H, Shen J (2022) EPMDA-FED: Efficient and Privacy-Preserving Multidimensional Data Aggregation Scheme with Fast Error Detection in Smart Grid. IEEE Internet Things J 9(9):6922\u20136933","journal-title":"IEEE Internet Things J"},{"key":"692_CR25","doi-asserted-by":"publisher","first-page":"392","DOI":"10.1016\/j.future.2016.05.005","volume":"78","author":"R Jiang","year":"2018","unstructured":"Jiang R, Lu R, Choo K-KR (2018) Achieving High Performance and Privacy-Preserving Query over Encrypted Multidimensional Big Metering Data. Future Gener Comput Syst 78:392\u2013401","journal-title":"Future Gener Comput Syst"},{"key":"692_CR26","doi-asserted-by":"publisher","unstructured":"Olawoyin AM, Leung CK, Cuzzocrea A (2023) Privacy Preservation of Big Spatio-Temporal Co-occurrence Data. In: 2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC). Torino, pp 1331\u20131336. https:\/\/doi.org\/10.1109\/COMPSAC57700.2023.00202","DOI":"10.1109\/COMPSAC57700.2023.00202"},{"issue":"5","key":"692_CR27","doi-asserted-by":"publisher","first-page":"5159","DOI":"10.1109\/TKDE.2022.3152168","volume":"35","author":"Q Tong","year":"2023","unstructured":"Tong Q, Li X, Miao Y, Liu X, Weng J, Deng RH (2023) Privacy-Preserving Boolean Range Query With Temporal Access Control in Mobile Computing. IEEE Trans Knowl Data Eng 35(5):5159\u20135172. https:\/\/doi.org\/10.1109\/TKDE.2022.3152168","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"692_CR28","unstructured":"Zeutschler T (n.a.) TinyOlap. GitHub. [Online]. https:\/\/github.com\/Zeutschler\/tinyolap. Accessed 5 Feb 2024"},{"key":"692_CR29","unstructured":"Python Cryptographic Authority (2022) Pyca\/Cryptography. GitHub. [Online]. https:\/\/github.com\/pyca\/cryptography. Accessed 7 Nov 2023"},{"key":"692_CR30","unstructured":"Bethencourt J et al (2006) Advanced Crypto Software Collection. ACSC, University of Texas. [Online]. https:\/\/acsc.cs.utexas.edu\/cpabe\/. Accessed 7 Nov 2023"},{"key":"692_CR31","unstructured":"PBC (Pairing-Based Cryptography) library. https:\/\/crypto.stanford.edu\/pbc\/. Accessed 22 Nov 2023"},{"key":"692_CR32","unstructured":"Eijs H (2023) pycryptodomex: Cryptographic library for Python. PyPI. [Online]. https:\/\/pypi.org\/project\/pycryptodomex\/. Accessed 22 Nov 2023"},{"key":"692_CR33","unstructured":"Eijs H (2023) pycryptodome: Cryptographic library for Python. PyPI. [Online]. https:\/\/pypi.org\/project\/pycryptodome\/. Accessed 22 Jun 2023"},{"key":"692_CR34","unstructured":"SymPy Development Team (2023) SymPy: Python library for symbolic mathematics. SymPy. [Online]. https:\/\/www.sympy.org\/. Accessed 23 Jun 2024"},{"key":"692_CR35","unstructured":"Pandas Development Team (2023) pandas: powerful Python data analysis toolkit. pandas. [Online]. https:\/\/pandas.pydata.org\/. Accessed 24 Jun 2024"},{"key":"692_CR36","unstructured":"Redis (2023) Redis: In-memory data structure store. Redis. [Online]. https:\/\/redis.io\/. Accessed 24 Jun 2024"},{"key":"692_CR37","unstructured":"Python Software Foundation (2023) timeit - Measure execution time of small code snippets. Python Documentation. [Online]. https:\/\/docs.python.org\/3\/library\/timeit.html. Accessed 24 Jun 2024"},{"key":"692_CR38","unstructured":"Python Software Foundation (2023) json - JSON encoder and decoder. Python Documentation. [Online]. https:\/\/docs.python.org\/3\/library\/json.html. Accessed 24 Jun 2024"},{"key":"692_CR39","unstructured":"Python Software Foundation (2023) os - Miscellaneous operating system interfaces. Python Documentation. [Online]. https:\/\/docs.python.org\/3\/library\/os.html. Accessed 24 Jun 2024"},{"key":"692_CR40","unstructured":"Transaction Processing Performance Council (2023) TPC-H dbgen: Database population tool. TPC-H. [Online]. http:\/\/www.tpc.org\/tpc_documents_current_versions\/current_specifications5.asp. Accessed 24 Jun 2024"},{"key":"692_CR41","unstructured":"Transaction Processing Performance Council (2023) TPC-H Benchmark Scale Factor. TPC-H. [Online]. http:\/\/www.tpc.org\/tpc_documents_current_versions\/current_specifications5.asp. Accessed 24 Jun 2024"},{"key":"692_CR42","unstructured":"Transaction Processing Performance Council (2023) TPC-H: A decision support benchmark. TPC-H. [Online]. http:\/\/www.tpc.org\/tpch\/. Accessed 24 Jun 2024"},{"key":"692_CR43","unstructured":"Monster22real (2024) SSF-CDW: A Scalable, Secure, and Fast OLAP Query for Encrypted Cloud Data Warehouse. GitHub. [Online]. https:\/\/github.com\/monster22real\/SSF-CDW. Accessed 24 Jun 2024"}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-024-00692-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13677-024-00692-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-024-00692-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,15]],"date-time":"2024-08-15T06:04:36Z","timestamp":1723701876000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofcloudcomputing.springeropen.com\/articles\/10.1186\/s13677-024-00692-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,15]]},"references-count":43,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,12]]}},"alternative-id":["692"],"URL":"https:\/\/doi.org\/10.1186\/s13677-024-00692-y","relation":{},"ISSN":["2192-113X"],"issn-type":[{"value":"2192-113X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,8,15]]},"assertion":[{"value":"12 March 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 August 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 August 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"129"}}