{"id":"https://openalex.org/W2651887877","doi":"https://doi.org/10.1007/978-3-319-61176-1_18","title":"Searchable Encryption to Reduce Encryption Degradation in Adjustably Encrypted Databases","display_name":"Searchable Encryption to Reduce Encryption Degradation in Adjustably Encrypted Databases","publication_year":2017,"publication_date":"2017-01-01","ids":{"openalex":"https://openalex.org/W2651887877","doi":"https://doi.org/10.1007/978-3-319-61176-1_18","mag":"2651887877"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-319-61176-1_18","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-61176-1_18","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://inria.hal.science/hal-01684354","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102985450","display_name":"Florian Kerschbaum","orcid":"https://orcid.org/0000-0003-4288-2286"},"institutions":[{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"education","lineage":["https://openalex.org/I151746483"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Florian Kerschbaum","raw_affiliation_strings":["University of Waterloo, Waterloo, Canada"],"affiliations":[{"raw_affiliation_string":"University of Waterloo, Waterloo, Canada","institution_ids":["https://openalex.org/I151746483"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5069383644","display_name":"Martin H\u00e4rterich","orcid":null},"institutions":[{"id":"https://openalex.org/I4210119349","display_name":"Karlsruhe University of Education","ror":"https://ror.org/01t1kq612","country_code":"DE","type":"education","lineage":["https://openalex.org/I4210119349"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Martin H\u00e4rterich","raw_affiliation_strings":["SAP, Karlsruhe, Germany"],"affiliations":[{"raw_affiliation_string":"SAP, Karlsruhe, Germany","institution_ids":["https://openalex.org/I4210119349"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5102985450"],"corresponding_institution_ids":["https://openalex.org/I151746483"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":{"value":5000,"currency":"EUR","value_usd":5392},"fwci":1.4144,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.8470058,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"325","last_page":"336"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12288","display_name":"Optimization and Search Problems","score":0.9871000051498413,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.9055924415588379},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.846237301826477},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.6163054704666138},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.5001215934753418},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.4866681694984436},{"id":"https://openalex.org/keywords/probabilistic-encryption","display_name":"Probabilistic encryption","score":0.47970765829086304},{"id":"https://openalex.org/keywords/filesystem-level-encryption","display_name":"Filesystem-level encryption","score":0.47837939858436584},{"id":"https://openalex.org/keywords/40-bit-encryption","display_name":"40-bit encryption","score":0.45380666851997375},{"id":"https://openalex.org/keywords/on-the-fly-encryption","display_name":"On-the-fly encryption","score":0.4430783987045288},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3494241237640381},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.24209728837013245},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.13496774435043335}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.9055924415588379},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.846237301826477},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.6163054704666138},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.5001215934753418},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.4866681694984436},{"id":"https://openalex.org/C54569210","wikidata":"https://www.wikidata.org/wiki/Q7246854","display_name":"Probabilistic encryption","level":3,"score":0.47970765829086304},{"id":"https://openalex.org/C18319499","wikidata":"https://www.wikidata.org/wiki/Q5448402","display_name":"Filesystem-level encryption","level":4,"score":0.47837939858436584},{"id":"https://openalex.org/C158215988","wikidata":"https://www.wikidata.org/wiki/Q4637271","display_name":"40-bit encryption","level":3,"score":0.45380666851997375},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.4430783987045288},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3494241237640381},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.24209728837013245},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.13496774435043335},{"id":"https://openalex.org/C13280743","wikidata":"https://www.wikidata.org/wiki/Q131089","display_name":"Geodesy","level":1,"score":0.0},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/978-3-319-61176-1_18","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-61176-1_18","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:HAL:hal-01684354v1","is_oa":true,"landing_page_url":"https://inria.hal.science/hal-01684354","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"31th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2017, Philadelphia, PA, United States. pp.325-336, &#x27E8;10.1007/978-3-319-61176-1_18&#x27E9;","raw_type":"Conference papers"}],"best_oa_location":{"id":"pmh:oai:HAL:hal-01684354v1","is_oa":true,"landing_page_url":"https://inria.hal.science/hal-01684354","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"31th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2017, Philadelphia, PA, United States. pp.325-336, &#x27E8;10.1007/978-3-319-61176-1_18&#x27E9;","raw_type":"Conference papers"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W124107535","https://openalex.org/W287743910","https://openalex.org/W1502708590","https://openalex.org/W1557302011","https://openalex.org/W1607140588","https://openalex.org/W1827368922","https://openalex.org/W1895952394","https://openalex.org/W1993536048","https://openalex.org/W1996252886","https://openalex.org/W1999670653","https://openalex.org/W2030888439","https://openalex.org/W2043508455","https://openalex.org/W2074388704","https://openalex.org/W2092071682","https://openalex.org/W2106320249","https://openalex.org/W2117994621","https://openalex.org/W2118747942","https://openalex.org/W2137604948","https://openalex.org/W2145426052","https://openalex.org/W2148757108","https://openalex.org/W2154496743","https://openalex.org/W2156060381","https://openalex.org/W2159915142","https://openalex.org/W2250570571","https://openalex.org/W2422800230","https://openalex.org/W2471129008","https://openalex.org/W2542247256","https://openalex.org/W2543343085","https://openalex.org/W2543577951","https://openalex.org/W2668185779"],"related_works":["https://openalex.org/W4315815885","https://openalex.org/W2915067502","https://openalex.org/W2293431571","https://openalex.org/W2624912447","https://openalex.org/W4205100462","https://openalex.org/W4250199380","https://openalex.org/W3004922236","https://openalex.org/W4239572594","https://openalex.org/W974835996","https://openalex.org/W3097424423"],"abstract_inverted_index":{"Processing":[0],"queries":[1,93,136],"on":[2,124,130],"encrypted":[3,60,135],"data":[4,7],"protects":[5],"sensitive":[6],"stored":[8],"in":[9,72,137],"cloud":[10,52],"databases.":[11,61],"CryptDB":[12],"has":[13,46],"introduced":[14],"the":[15,29,37,47,110,180],"approach":[16],"of":[17,32,39,105,134,144,156,182],"adjustable":[18],"encryption":[19,68,77,100],"for":[20,36,94,108],"such":[21,172],"processing.":[22],"A":[23],"database":[24],"column":[25],"is":[26,159,170],"adjusted":[27],"to":[28,74,90,162],"necessary":[30],"level":[31],"encryption,":[33],"e.g.":[34],"order-preserving,":[35],"set":[38],"executed":[40],"queries,":[41],"but":[42,154],"never":[43],"reversed.":[44],"This":[45],"drawback":[48],"that":[49,173],"long":[50],"running":[51],"databases":[53],"will":[54],"eventually":[55],"transform":[56],"into":[57],"only":[58,83,89,149],"order-preserving":[59,118,163],"In":[62,141],"this":[63,76],"paper":[64],"we":[65],"propose":[66],"searchable":[67,114],"as":[69,103],"an":[70,131,138],"alternative":[71],"order":[73],"reduce":[75],"degradation.":[78],"It":[79],"maintains":[80],"security":[81,175],"while":[82],"marginally":[84],"impacting":[85],"performance":[86,152],"when":[87],"applied":[88],"infrequently":[91],"used":[92],"searching.":[95],"We":[96,120],"present":[97],"a":[98,125,150],"budget-based":[99],"selection":[101,168],"algorithm":[102,123,147,169],"part":[104],"query":[106],"planning":[107],"making":[109],"appropriate":[111],"choice":[112,143],"between":[113],"and":[115],"deterministic":[116,165],"or":[117,164],"encryption.":[119,166],"evaluate":[121],"our":[122,146],"long-tail":[126],"distributed":[127],"TPC-C":[128],"benchmark":[129],"experimental":[132],"implementation":[133],"in-memory":[139],"database.":[140],"one":[142,155],"parameters":[145],"incurs":[148],"$$1.5\\%$$":[151],"penalty,":[153],"15":[157],"columns":[158],"not":[160],"decrypted":[161],"Our":[167],"configurable,":[171],"higher":[174],"gains":[176],"are":[177],"possible":[178],"at":[179],"cost":[181],"performance.":[183]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":3}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
