{"id":"https://openalex.org/W2049238156","doi":"https://doi.org/10.1109/hpec.2014.7040943","title":"A survey of cryptographic approaches to securing big-data analytics in the cloud","display_name":"A survey of cryptographic approaches to securing big-data analytics in the cloud","publication_year":2014,"publication_date":"2014-09-01","ids":{"openalex":"https://openalex.org/W2049238156","doi":"https://doi.org/10.1109/hpec.2014.7040943","mag":"2049238156"},"language":"en","primary_location":{"id":"doi:10.1109/hpec.2014.7040943","is_oa":false,"landing_page_url":"https://doi.org/10.1109/hpec.2014.7040943","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 IEEE High Performance Extreme Computing Conference (HPEC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011493062","display_name":"Sophia Yakoubov","orcid":"https://orcid.org/0000-0001-7958-8537"},"institutions":[{"id":"https://openalex.org/I4210122954","display_name":"MIT Lincoln Laboratory","ror":"https://ror.org/022z6jk58","country_code":"US","type":"facility","lineage":["https://openalex.org/I4210122954","https://openalex.org/I63966007"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Sophia Yakoubov","raw_affiliation_strings":["MIT Lincoln Laboratory, Lexington, MA","MIT Lincoln Laboratory, Lexington, MA 02421, USA"],"affiliations":[{"raw_affiliation_string":"MIT Lincoln Laboratory, Lexington, MA","institution_ids":["https://openalex.org/I4210122954"]},{"raw_affiliation_string":"MIT Lincoln Laboratory, Lexington, MA 02421, USA","institution_ids":["https://openalex.org/I4210122954"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043450560","display_name":"Vijay Gadepally","orcid":"https://orcid.org/0000-0002-4598-2808"},"institutions":[{"id":"https://openalex.org/I4210122954","display_name":"MIT Lincoln Laboratory","ror":"https://ror.org/022z6jk58","country_code":"US","type":"facility","lineage":["https://openalex.org/I4210122954","https://openalex.org/I63966007"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Vijay Gadepally","raw_affiliation_strings":["MIT Lincoln Laboratory, Lexington, MA","MIT Lincoln Laboratory, Lexington, MA 02421, USA"],"affiliations":[{"raw_affiliation_string":"MIT Lincoln Laboratory, Lexington, MA","institution_ids":["https://openalex.org/I4210122954"]},{"raw_affiliation_string":"MIT Lincoln Laboratory, Lexington, MA 02421, USA","institution_ids":["https://openalex.org/I4210122954"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019673189","display_name":"Nab\u00edl Schear","orcid":null},"institutions":[{"id":"https://openalex.org/I4210122954","display_name":"MIT Lincoln Laboratory","ror":"https://ror.org/022z6jk58","country_code":"US","type":"facility","lineage":["https://openalex.org/I4210122954","https://openalex.org/I63966007"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Nabil Schear","raw_affiliation_strings":["MIT Lincoln Laboratory, Lexington, MA","MIT Lincoln Laboratory, Lexington, MA 02421, USA"],"affiliations":[{"raw_affiliation_string":"MIT Lincoln Laboratory, Lexington, MA","institution_ids":["https://openalex.org/I4210122954"]},{"raw_affiliation_string":"MIT Lincoln Laboratory, Lexington, MA 02421, USA","institution_ids":["https://openalex.org/I4210122954"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019685080","display_name":"Emily Shen","orcid":null},"institutions":[{"id":"https://openalex.org/I4210122954","display_name":"MIT Lincoln Laboratory","ror":"https://ror.org/022z6jk58","country_code":"US","type":"facility","lineage":["https://openalex.org/I4210122954","https://openalex.org/I63966007"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Emily Shen","raw_affiliation_strings":["MIT Lincoln Laboratory, Lexington, MA","MIT Lincoln Laboratory, Lexington, MA 02421, USA"],"affiliations":[{"raw_affiliation_string":"MIT Lincoln Laboratory, Lexington, MA","institution_ids":["https://openalex.org/I4210122954"]},{"raw_affiliation_string":"MIT Lincoln Laboratory, Lexington, MA 02421, USA","institution_ids":["https://openalex.org/I4210122954"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5084079970","display_name":"Arkady Yerukhimovich","orcid":"https://orcid.org/0000-0002-9045-748X"},"institutions":[{"id":"https://openalex.org/I4210122954","display_name":"MIT Lincoln Laboratory","ror":"https://ror.org/022z6jk58","country_code":"US","type":"facility","lineage":["https://openalex.org/I4210122954","https://openalex.org/I63966007"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Arkady Yerukhimovich","raw_affiliation_strings":["MIT Lincoln Laboratory, Lexington, MA","MIT Lincoln Laboratory, Lexington, MA 02421, USA"],"affiliations":[{"raw_affiliation_string":"MIT Lincoln Laboratory, Lexington, MA","institution_ids":["https://openalex.org/I4210122954"]},{"raw_affiliation_string":"MIT Lincoln Laboratory, Lexington, MA 02421, USA","institution_ids":["https://openalex.org/I4210122954"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5011493062"],"corresponding_institution_ids":["https://openalex.org/I4210122954"],"apc_list":null,"apc_paid":null,"fwci":9.8163,"has_fulltext":false,"cited_by_count":69,"citation_normalized_percentile":{"value":0.98123288,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8206983208656311},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.8027318716049194},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.7816916704177856},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.7389765977859497},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.6686045527458191},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5489292144775391},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5064364671707153},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.48406782746315},{"id":"https://openalex.org/keywords/client-side-encryption","display_name":"Client-side encryption","score":0.4785650074481964},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.47398820519447327},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.4618832468986511},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.4441242218017578},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.43149203062057495},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.33832472562789917},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.2656845450401306},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.16617026925086975},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.09090495109558105},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.06395000219345093}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8206983208656311},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.8027318716049194},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.7816916704177856},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.7389765977859497},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.6686045527458191},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5489292144775391},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5064364671707153},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.48406782746315},{"id":"https://openalex.org/C166501710","wikidata":"https://www.wikidata.org/wiki/Q5132476","display_name":"Client-side encryption","level":4,"score":0.4785650074481964},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.47398820519447327},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.4618832468986511},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.4441242218017578},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.43149203062057495},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.33832472562789917},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.2656845450401306},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.16617026925086975},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.09090495109558105},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.06395000219345093},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/hpec.2014.7040943","is_oa":false,"landing_page_url":"https://doi.org/10.1109/hpec.2014.7040943","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 IEEE High Performance Extreme Computing Conference (HPEC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":44,"referenced_works":["https://openalex.org/W25045116","https://openalex.org/W104209573","https://openalex.org/W147290027","https://openalex.org/W236632755","https://openalex.org/W1485800369","https://openalex.org/W1489706603","https://openalex.org/W1498316612","https://openalex.org/W1562783580","https://openalex.org/W1595357546","https://openalex.org/W1724472458","https://openalex.org/W1755636270","https://openalex.org/W1862721573","https://openalex.org/W1874619058","https://openalex.org/W2018746447","https://openalex.org/W2019578639","https://openalex.org/W2027471022","https://openalex.org/W2055043387","https://openalex.org/W2080911030","https://openalex.org/W2108834246","https://openalex.org/W2121423622","https://openalex.org/W2152926062","https://openalex.org/W2160502124","https://openalex.org/W2188232729","https://openalex.org/W2226167778","https://openalex.org/W2252150191","https://openalex.org/W2275530856","https://openalex.org/W2293021588","https://openalex.org/W2397856895","https://openalex.org/W2399424150","https://openalex.org/W2401959250","https://openalex.org/W2402235285","https://openalex.org/W2998818221","https://openalex.org/W4236236547","https://openalex.org/W6601028053","https://openalex.org/W6609148260","https://openalex.org/W6628945002","https://openalex.org/W6629862473","https://openalex.org/W6633630193","https://openalex.org/W6637798261","https://openalex.org/W6637825192","https://openalex.org/W6639221033","https://openalex.org/W6677987929","https://openalex.org/W6687155767","https://openalex.org/W6688800661"],"related_works":["https://openalex.org/W4319296593","https://openalex.org/W1964796915","https://openalex.org/W1964306602","https://openalex.org/W4362706650","https://openalex.org/W3013119816","https://openalex.org/W4313046019","https://openalex.org/W2953109828","https://openalex.org/W1702090048","https://openalex.org/W3045127875","https://openalex.org/W2963269218"],"abstract_inverted_index":{"The":[0],"growing":[1],"demand":[2],"for":[3,30],"cloud":[4,37,90],"computing":[5,38],"motivates":[6],"the":[7,11,82,86,94],"need":[8],"to":[9,76],"study":[10],"security":[12,55],"of":[13,45,88],"data":[14],"received,":[15],"stored,":[16],"processed,":[17],"and":[18,48,54,68,92],"transmitted":[19],"by":[20],"a":[21,28,32,36,42],"cloud.":[22],"In":[23],"this":[24],"paper,":[25],"we":[26],"present":[27],"framework":[29],"such":[31],"study.":[33],"We":[34,57,80],"introduce":[35],"model":[39,91],"that":[40,72],"captures":[41],"rich":[43],"class":[44],"big-data":[46],"use-cases":[47],"allows":[49],"reasoning":[50],"about":[51],"relevant":[52],"threats":[53],"goals.":[56,79],"then":[58],"survey":[59],"three":[60],"cryptographic":[61,83],"techniques":[62,84],"-":[63,71],"homomorphic":[64],"encryption,":[65],"verifiable":[66],"computation,":[67],"multi-party":[69],"computation":[70],"can":[73],"be":[74],"used":[75],"achieve":[77],"these":[78],"describe":[81],"in":[85,96],"context":[87],"our":[89],"highlight":[93],"differences":[95],"performance":[97],"cost":[98],"associated":[99],"with":[100],"each.":[101]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":7},{"year":2020,"cited_by_count":5},{"year":2019,"cited_by_count":10},{"year":2018,"cited_by_count":9},{"year":2017,"cited_by_count":11},{"year":2016,"cited_by_count":9},{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
