{"id":"https://openalex.org/W3117296437","doi":"https://doi.org/10.1109/access.2020.3047950","title":"SecSky: A Secure Dynamic Skyline Query Scheme With Data Privacy","display_name":"SecSky: A Secure Dynamic Skyline Query Scheme With Data Privacy","publication_year":2020,"publication_date":"2020-12-29","ids":{"openalex":"https://openalex.org/W3117296437","doi":"https://doi.org/10.1109/access.2020.3047950","mag":"3117296437"},"language":"en","primary_location":{"id":"doi:10.1109/access.2020.3047950","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.3047950","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/9312710/09310327.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/9312710/09310327.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5074011980","display_name":"Jiale Zhao","orcid":"https://orcid.org/0009-0001-2805-8664"},"institutions":[{"id":"https://openalex.org/I53592917","display_name":"Jiangxi Normal University","ror":"https://ror.org/05nkgk822","country_code":"CN","type":"education","lineage":["https://openalex.org/I53592917"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jiale Zhao","raw_affiliation_strings":["School of Computer Information Engineering, Jiangxi Normal University, Nanchang, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Information Engineering, Jiangxi Normal University, Nanchang, China","institution_ids":["https://openalex.org/I53592917"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047604730","display_name":"Yong Ma","orcid":"https://orcid.org/0000-0003-3549-9035"},"institutions":[{"id":"https://openalex.org/I53592917","display_name":"Jiangxi Normal University","ror":"https://ror.org/05nkgk822","country_code":"CN","type":"education","lineage":["https://openalex.org/I53592917"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yong Ma","raw_affiliation_strings":["School of Computer Information Engineering, Jiangxi Normal University, Nanchang, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Information Engineering, Jiangxi Normal University, Nanchang, China","institution_ids":["https://openalex.org/I53592917"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048420839","display_name":"Jiangtao Cui","orcid":"https://orcid.org/0000-0001-5569-0780"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiangtao Cui","raw_affiliation_strings":["School of Computer Science and Technology, Xidian University, Shaanxi, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Xidian University, Shaanxi, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003941820","display_name":"Yanguo Peng","orcid":"https://orcid.org/0000-0002-3210-0714"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yanguo Peng","raw_affiliation_strings":["School of Computer Science and Technology, Xidian University, Shaanxi, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Xidian University, Shaanxi, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026092741","display_name":"Kangshun Li","orcid":"https://orcid.org/0000-0002-0429-446X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kangshun Li","raw_affiliation_strings":["College of Computer, Guangdong University of Science and Technology, Dongguan, China"],"affiliations":[{"raw_affiliation_string":"College of Computer, Guangdong University of Science and Technology, Dongguan, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101788328","display_name":"Tengyu Wang","orcid":"https://orcid.org/0000-0003-2367-7084"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tengyu Wang","raw_affiliation_strings":["School of Computer Science and Technology, Xidian University, Shaanxi, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Xidian University, Shaanxi, China","institution_ids":["https://openalex.org/I149594827"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5074011980"],"corresponding_institution_ids":["https://openalex.org/I53592917"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":0.6094,"has_fulltext":true,"cited_by_count":4,"citation_normalized_percentile":{"value":0.68649391,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":93,"max":96},"biblio":{"volume":"9","issue":null,"first_page":"5690","last_page":"5703"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11106","display_name":"Data Management and Algorithms","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11106","display_name":"Data Management and Algorithms","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/skyline","display_name":"Skyline","score":0.8687912821769714},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8255996704101562},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.6194267272949219},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.5543524026870728},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.46370962262153625},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.24474993348121643}],"concepts":[{"id":"https://openalex.org/C2780757406","wikidata":"https://www.wikidata.org/wiki/Q465837","display_name":"Skyline","level":2,"score":0.8687912821769714},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8255996704101562},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.6194267272949219},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.5543524026870728},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.46370962262153625},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.24474993348121643},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2020.3047950","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.3047950","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/9312710/09310327.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:896a43209831429789663f16c0cbe7ef","is_oa":true,"landing_page_url":"https://doaj.org/article/896a43209831429789663f16c0cbe7ef","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 9, Pp 5690-5703 (2021)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2020.3047950","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.3047950","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/9312710/09310327.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2397636570","display_name":null,"funder_award_id":"YJS2019001","funder_id":"https://openalex.org/F4320327476","funder_display_name":"Jiangxi Normal University"},{"id":"https://openalex.org/G6098611959","display_name":null,"funder_award_id":"20181ACE50029","funder_id":"https://openalex.org/F4320327780","funder_display_name":"Key Research and Development Program of Jiangxi Province"}],"funders":[{"id":"https://openalex.org/F4320327476","display_name":"Jiangxi Normal University","ror":"https://ror.org/05nkgk822"},{"id":"https://openalex.org/F4320327780","display_name":"Key Research and Development Program of Jiangxi Province","ror":null},{"id":"https://openalex.org/F4320335598","display_name":"Agencia Estatal de Investigaci\u00f3n","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3117296437.pdf","grobid_xml":"https://content.openalex.org/works/W3117296437.grobid-xml"},"referenced_works_count":39,"referenced_works":["https://openalex.org/W16191149","https://openalex.org/W104209573","https://openalex.org/W1580944449","https://openalex.org/W1965404622","https://openalex.org/W1973434168","https://openalex.org/W2041480327","https://openalex.org/W2043508455","https://openalex.org/W2049864887","https://openalex.org/W2074356711","https://openalex.org/W2107710541","https://openalex.org/W2110261118","https://openalex.org/W2115016714","https://openalex.org/W2132172731","https://openalex.org/W2137619903","https://openalex.org/W2140300215","https://openalex.org/W2147929033","https://openalex.org/W2163992091","https://openalex.org/W2170188482","https://openalex.org/W2182170753","https://openalex.org/W2400905995","https://openalex.org/W2536125594","https://openalex.org/W2588538374","https://openalex.org/W2616664865","https://openalex.org/W2761844358","https://openalex.org/W2767284868","https://openalex.org/W2790368141","https://openalex.org/W2807633791","https://openalex.org/W2883468177","https://openalex.org/W2954220898","https://openalex.org/W2956065540","https://openalex.org/W2995664421","https://openalex.org/W3005018380","https://openalex.org/W3007594950","https://openalex.org/W3007799372","https://openalex.org/W3011124475","https://openalex.org/W6634876484","https://openalex.org/W6669161311","https://openalex.org/W6774607824","https://openalex.org/W6775051629"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W1994126304","https://openalex.org/W2087306197","https://openalex.org/W1973297295","https://openalex.org/W2316530548","https://openalex.org/W2505069962","https://openalex.org/W3096764880","https://openalex.org/W2039842051"],"abstract_inverted_index":{"Skyline":[0],"computation":[1,37],"is":[2,54,79,108,190],"a":[3,11,104,116,134],"typical":[4],"multi-objective":[5],"optimization":[6],"problem":[7,78],"and":[8,127,148,154,171,181],"has":[9],"been":[10],"hot":[12],"spot":[13],"for":[14],"current":[15],"research.":[16],"Most":[17],"of":[18,26,65,70,174,191,197],"them":[19],"have":[20],"concentrated":[21],"on":[22,98,103,163,194],"improving":[23],"the":[24,30,39,71,82,89,96,99,122,139,164,169,172,195],"efficiency":[25,173,193],"skyline":[27,36,97,152],"computing,":[28],"while":[29],"security":[31,170],"issues":[32],"associated":[33],"with":[34],"executing":[35],"in":[38,51,62,88],"cloud":[40,48,90,105],"server":[41,106],"are":[42],"rarely":[43],"taken":[44],"into":[45],"account.":[46],"The":[47,157,184],"data":[49,84,101,200],"stored":[50,102],"plaintext":[52],"form":[53],"attacked":[55],"by":[56],"hackers":[57],"or":[58],"malicious":[59],"administrators,":[60],"resulting":[61],"potential":[63],"leakage":[64],"users\u2019":[66],"private":[67,83,199],"information.":[68],"One":[69],"most":[72],"effective":[73],"approaches":[74],"to":[75,80,94,132,144,149],"solve":[76],"this":[77,112],"encrypt":[81],"before":[85],"storing":[86],"it":[87],"server.":[91],"However,":[92],"how":[93],"compute":[95],"encrypted":[100],"efficiently":[107],"still":[109],"challenging.":[110],"In":[111],"paper,":[113],"we":[114],"present":[115],"novel":[117],"framework":[118],"called":[119],"SecSky.":[120],"Firstly,":[121],"improved":[123],"B+":[124],"tree":[125],"structure":[126],"symmetric":[128],"encryption":[129],"were":[130,176],"combined":[131],"construct":[133],"secure":[135],"storage":[136],"structure.":[137],"Then,":[138],"pruning":[140],"idea":[141],"was":[142,160],"applied":[143],"reduce":[145],"unnecessary":[146],"calculation":[147],"achieve":[150],"efficient":[151],"query":[153],"dynamic":[155],"update.":[156],"whole":[158],"process":[159],"directly":[161],"completed":[162],"ciphertext":[165],"data.":[166],"Finally,":[167],"both":[168],"SecSky":[175],"analyzed":[177],"through":[178],"theoretical":[179],"proof":[180],"simulation":[182],"experiments.":[183],"results":[185],"showed":[186],"that":[187],"our":[188],"scheme":[189],"sound":[192],"premise":[196],"ensuring":[198],"security.":[201]},"counts_by_year":[{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":2}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
