{"id":"https://openalex.org/W2739564306","doi":"https://doi.org/10.1109/icc.2017.7997105","title":"CryptMDB: A practical encrypted MongoDB over big data","display_name":"CryptMDB: A practical encrypted MongoDB over big data","publication_year":2017,"publication_date":"2017-05-01","ids":{"openalex":"https://openalex.org/W2739564306","doi":"https://doi.org/10.1109/icc.2017.7997105","mag":"2739564306"},"language":"en","primary_location":{"id":"doi:10.1109/icc.2017.7997105","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2017.7997105","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5046950426","display_name":"Guowen Xu","orcid":"https://orcid.org/0000-0002-9764-9345"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Guowen Xu","raw_affiliation_strings":["School of Computer Science and Engineering, University of Electronic Science and Technology of China, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007711747","display_name":"Yan Ren","orcid":"https://orcid.org/0000-0001-7602-6328"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yan Ren","raw_affiliation_strings":["Center for Cyber Security, University of Electronic Science and Technology of China, China"],"affiliations":[{"raw_affiliation_string":"Center for Cyber Security, University of Electronic Science and Technology of China, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100325334","display_name":"Hongwei Li","orcid":"https://orcid.org/0000-0002-1961-7946"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]},{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"education","lineage":["https://openalex.org/I151746483"]}],"countries":["CA","CN"],"is_corresponding":false,"raw_author_name":"Hongwei Li","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON, Canada","School of Computer Science and Engineering, University of Electronic Science and Technology of China, China"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON, Canada","institution_ids":["https://openalex.org/I151746483"]},{"raw_affiliation_string":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017433297","display_name":"Dongxiao Liu","orcid":"https://orcid.org/0000-0003-2595-6757"},"institutions":[{"id":"https://openalex.org/I94658018","display_name":"University of Memphis","ror":"https://ror.org/01cq23130","country_code":"US","type":"education","lineage":["https://openalex.org/I94658018"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Dongxiao Liu","raw_affiliation_strings":["Department of Computer Science, University of Memphis, U.S"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Memphis, U.S","institution_ids":["https://openalex.org/I94658018"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113616242","display_name":"Yuanshun Dai","orcid":null},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuanshun Dai","raw_affiliation_strings":["School of Computer Science and Engineering, University of Electronic Science and Technology of China, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100329754","display_name":"Kan Yang","orcid":"https://orcid.org/0000-0003-4234-9596"},"institutions":[{"id":"https://openalex.org/I4210087772","display_name":"National Computer Network Emergency Response Technical Team/Coordination Center of Chinar","ror":"https://ror.org/00247dh76","country_code":"CN","type":"nonprofit","lineage":["https://openalex.org/I4210087772"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kan Yang","raw_affiliation_strings":["National Computer Network Emergency Response Technical Team Coordination Center of China, Beijing, China"],"affiliations":[{"raw_affiliation_string":"National Computer Network Emergency Response Technical Team Coordination Center of China, Beijing, China","institution_ids":["https://openalex.org/I4210087772"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5046950426"],"corresponding_institution_ids":["https://openalex.org/I150229711"],"apc_list":null,"apc_paid":null,"fwci":1.3651,"has_fulltext":false,"cited_by_count":16,"citation_normalized_percentile":{"value":0.85814678,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"2","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8036273717880249},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.7240457534790039},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.703388512134552},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.6568706631660461},{"id":"https://openalex.org/keywords/nosql","display_name":"NoSQL","score":0.5955373644828796},{"id":"https://openalex.org/keywords/relational-database","display_name":"Relational database","score":0.5663827657699585},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.5542673468589783},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.5310240983963013},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.4945161044597626},{"id":"https://openalex.org/keywords/relational-database-management-system","display_name":"Relational database management system","score":0.46750104427337646},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4253639578819275},{"id":"https://openalex.org/keywords/data-access","display_name":"Data access","score":0.41590559482574463},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.24992895126342773},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.17239636182785034}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8036273717880249},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.7240457534790039},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.703388512134552},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.6568706631660461},{"id":"https://openalex.org/C2779599972","wikidata":"https://www.wikidata.org/wiki/Q82231","display_name":"NoSQL","level":3,"score":0.5955373644828796},{"id":"https://openalex.org/C5655090","wikidata":"https://www.wikidata.org/wiki/Q192588","display_name":"Relational database","level":2,"score":0.5663827657699585},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.5542673468589783},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.5310240983963013},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.4945161044597626},{"id":"https://openalex.org/C24394798","wikidata":"https://www.wikidata.org/wiki/Q192588","display_name":"Relational database management system","level":3,"score":0.46750104427337646},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4253639578819275},{"id":"https://openalex.org/C47487241","wikidata":"https://www.wikidata.org/wiki/Q5227230","display_name":"Data access","level":2,"score":0.41590559482574463},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.24992895126342773},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.17239636182785034}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icc.2017.7997105","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2017.7997105","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.7599999904632568}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W1500196754","https://openalex.org/W2009075543","https://openalex.org/W2030888439","https://openalex.org/W2074050720","https://openalex.org/W2087303942","https://openalex.org/W2088810783","https://openalex.org/W2123019706","https://openalex.org/W2125723038","https://openalex.org/W2132172731","https://openalex.org/W2147096042","https://openalex.org/W2159915142","https://openalex.org/W2243540970","https://openalex.org/W2314611979","https://openalex.org/W2407898405","https://openalex.org/W2438432736","https://openalex.org/W2471974251","https://openalex.org/W2493248159","https://openalex.org/W2510965919","https://openalex.org/W2512217068","https://openalex.org/W2517202832","https://openalex.org/W2552589486","https://openalex.org/W6652763362","https://openalex.org/W6718674992","https://openalex.org/W6764614878"],"related_works":["https://openalex.org/W2295775753","https://openalex.org/W4381416854","https://openalex.org/W2603313942","https://openalex.org/W4306877231","https://openalex.org/W2143602713","https://openalex.org/W4386408829","https://openalex.org/W4236503624","https://openalex.org/W4391920153","https://openalex.org/W2993631497","https://openalex.org/W4241927984"],"abstract_inverted_index":{"In":[0,81],"big":[1],"data":[2,4,35,43,79,103,120,148],"era,":[3],"are":[5,16],"usually":[6],"stored":[7],"in":[8,44,63,145],"databases":[9,28,53],"for":[10,33],"easy":[11],"access":[12,36,127,149],"and":[13,37,60,104,121,150],"utilization,":[14],"which":[15],"now":[17],"woven":[18],"into":[19],"every":[20],"aspect":[21],"of":[22,118,147],"our":[23],"lives.":[24],"However,":[25],"traditional":[26],"relational":[27,143],"cannot":[29,41],"address":[30],"users'":[31],"demands":[32],"quick":[34],"calculating,":[38],"since":[39],"they":[40],"process":[42],"a":[45,86],"distributed":[46],"way.":[47],"To":[48],"tackle":[49],"this":[50,82],"problem,":[51],"non-relational":[52],"such":[54],"as":[55],"MongoDB":[56,73,89],"have":[57],"emerged":[58],"up":[59],"been":[61],"applied":[62],"various":[64],"Scenarios.":[65],"Nevertheless,":[66],"it":[67],"should":[68],"be":[69],"noted":[70],"that":[71,112,135],"most":[72],"products":[74],"fail":[75],"to":[76,100,128],"consider":[77],"user's":[78,102,119],"privacy.":[80],"paper,":[83],"we":[84,93],"propose":[85],"practical":[87],"encrypted":[88],"(i.e.,":[90],"CryptMDB).":[91],"Specifically,":[92],"utilize":[94],"an":[95],"additive":[96],"homomorphic":[97],"asymmetric":[98],"cryptosystem":[99],"encrypt":[101],"achieve":[105,116],"strong":[106],"privacy":[107],"protection.":[108],"Security":[109],"analysis":[110],"indicates":[111],"the":[113,129,136],"CryptMDB":[114,137],"can":[115],"confidentiality":[117],"prevent":[122],"adversaries":[123],"from":[124],"illegally":[125],"gaining":[126],"database.":[130],"Furthermore,":[131],"extensive":[132],"experiments":[133],"demonstrate":[134],"achieves":[138],"better":[139],"efficiency":[140],"than":[141],"existing":[142],"database":[144],"terms":[146],"calculating.":[151]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
