{"id":"https://openalex.org/W2920486157","doi":"https://doi.org/10.1109/infocom.2019.8737593","title":"Strongly Secure and Efficient Range Queries in Cloud Databases under Multiple Keys","display_name":"Strongly Secure and Efficient Range Queries in Cloud Databases under Multiple Keys","publication_year":2019,"publication_date":"2019-04-01","ids":{"openalex":"https://openalex.org/W2920486157","doi":"https://doi.org/10.1109/infocom.2019.8737593","mag":"2920486157"},"language":"en","primary_location":{"id":"doi:10.1109/infocom.2019.8737593","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infocom.2019.8737593","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2019 - IEEE Conference on Computer Communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5054135894","display_name":"Ke Cheng","orcid":"https://orcid.org/0000-0001-7948-819X"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ke Cheng","raw_affiliation_strings":["School of Computer Science and Technology, Xidian University, Xi\u2019an, China","School of Computer Science and Technology, Xidian University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Xidian University, Xi\u2019an, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"School of Computer Science and Technology, Xidian University, Xi'an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043356063","display_name":"Yulong Shen","orcid":"https://orcid.org/0000-0002-8448-705X"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yulong Shen","raw_affiliation_strings":["School of Computer Science and Technology, Xidian University, Xi\u2019an, China","School of Computer Science and Technology, Xidian University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Xidian University, Xi\u2019an, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"School of Computer Science and Technology, Xidian University, Xi'an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045468725","display_name":"Yongzhi Wang","orcid":"https://orcid.org/0000-0002-7117-4097"},"institutions":[{"id":"https://openalex.org/I4179309","display_name":"Park University","ror":"https://ror.org/04ngpga37","country_code":"US","type":"education","lineage":["https://openalex.org/I4179309"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yongzhi Wang","raw_affiliation_strings":["Department of Computer Science and Information Systems, Park University Parkville, MO, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Information Systems, Park University Parkville, MO, USA","institution_ids":["https://openalex.org/I4179309"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017914641","display_name":"Liangmin Wang","orcid":"https://orcid.org/0000-0003-0048-5979"},"institutions":[{"id":"https://openalex.org/I115592961","display_name":"Jiangsu University","ror":"https://ror.org/03jc41j30","country_code":"CN","type":"education","lineage":["https://openalex.org/I115592961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liangmin Wang","raw_affiliation_strings":["Department of Computer Science and Communication Engineering, Jiangsu University, Zhenjiang, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Communication Engineering, Jiangsu University, Zhenjiang, China","institution_ids":["https://openalex.org/I115592961"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012016098","display_name":"Jianfeng Ma","orcid":"https://orcid.org/0000-0003-4251-1143"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianfeng Ma","raw_affiliation_strings":["School of Computer Science and Technology, Xidian University, Xi\u2019an, China","School of Computer Science and Technology, Xidian University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Xidian University, Xi\u2019an, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"School of Computer Science and Technology, Xidian University, Xi'an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059939888","display_name":"Xionghong Jiang","orcid":null},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xionghong Jiang","raw_affiliation_strings":["School of Computer Science and Technology, Xidian University, Xi\u2019an, China","School of Computer Science and Technology, Xidian University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Xidian University, Xi\u2019an, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"School of Computer Science and Technology, Xidian University, Xi'an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5009818091","display_name":"Cuicui Su","orcid":null},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Cuicui Su","raw_affiliation_strings":["School of Computer Science and Technology, Xidian University, Xi\u2019an, China","School of Computer Science and Technology, Xidian University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Xidian University, Xi\u2019an, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"School of Computer Science and Technology, Xidian University, Xi'an, China","institution_ids":["https://openalex.org/I149594827"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5054135894"],"corresponding_institution_ids":["https://openalex.org/I149594827"],"apc_list":null,"apc_paid":null,"fwci":0.9801,"has_fulltext":false,"cited_by_count":19,"citation_normalized_percentile":{"value":0.81577578,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"2494","last_page":"2502"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9930999875068665,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.826179027557373},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7307044267654419},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7163569927215576},{"id":"https://openalex.org/keywords/cloud-database","display_name":"Cloud database","score":0.6874681711196899},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.6605280637741089},{"id":"https://openalex.org/keywords/upload","display_name":"Upload","score":0.6005027294158936},{"id":"https://openalex.org/keywords/view","display_name":"View","score":0.47650495171546936},{"id":"https://openalex.org/keywords/range-query","display_name":"Range query (database)","score":0.4676814675331116},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.45223045349121094},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.44998759031295776},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.43313106894493103},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4138638973236084},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.2240067422389984},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.21810629963874817},{"id":"https://openalex.org/keywords/web-search-query","display_name":"Web search query","score":0.1921084225177765},{"id":"https://openalex.org/keywords/database-design","display_name":"Database design","score":0.14333564043045044},{"id":"https://openalex.org/keywords/web-query-classification","display_name":"Web query classification","score":0.14199480414390564},{"id":"https://openalex.org/keywords/search-engine","display_name":"Search engine","score":0.078431636095047}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.826179027557373},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7307044267654419},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7163569927215576},{"id":"https://openalex.org/C2778974508","wikidata":"https://www.wikidata.org/wiki/Q2499178","display_name":"Cloud database","level":3,"score":0.6874681711196899},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.6605280637741089},{"id":"https://openalex.org/C71901391","wikidata":"https://www.wikidata.org/wiki/Q7126699","display_name":"Upload","level":2,"score":0.6005027294158936},{"id":"https://openalex.org/C54239708","wikidata":"https://www.wikidata.org/wiki/Q1329910","display_name":"View","level":3,"score":0.47650495171546936},{"id":"https://openalex.org/C136736807","wikidata":"https://www.wikidata.org/wiki/Q818943","display_name":"Range query (database)","level":5,"score":0.4676814675331116},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.45223045349121094},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.44998759031295776},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.43313106894493103},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4138638973236084},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.2240067422389984},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.21810629963874817},{"id":"https://openalex.org/C164120249","wikidata":"https://www.wikidata.org/wiki/Q995982","display_name":"Web search query","level":3,"score":0.1921084225177765},{"id":"https://openalex.org/C148840519","wikidata":"https://www.wikidata.org/wiki/Q1049878","display_name":"Database design","level":2,"score":0.14333564043045044},{"id":"https://openalex.org/C118689300","wikidata":"https://www.wikidata.org/wiki/Q7978614","display_name":"Web query classification","level":4,"score":0.14199480414390564},{"id":"https://openalex.org/C97854310","wikidata":"https://www.wikidata.org/wiki/Q19541","display_name":"Search engine","level":2,"score":0.078431636095047},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/infocom.2019.8737593","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infocom.2019.8737593","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2019 - IEEE Conference on Computer Communications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W1556873914","https://openalex.org/W1571926107","https://openalex.org/W1964075810","https://openalex.org/W1988768686","https://openalex.org/W2014841127","https://openalex.org/W2030888439","https://openalex.org/W2033165262","https://openalex.org/W2119948977","https://openalex.org/W2148554959","https://openalex.org/W2149140091","https://openalex.org/W2159915142","https://openalex.org/W2186354314","https://openalex.org/W2321567755","https://openalex.org/W2532292902","https://openalex.org/W2592546899","https://openalex.org/W2592789682","https://openalex.org/W2604861932","https://openalex.org/W2618583153","https://openalex.org/W2701059868","https://openalex.org/W2787158286","https://openalex.org/W2788385473","https://openalex.org/W2805670944","https://openalex.org/W6677829731","https://openalex.org/W6735697342","https://openalex.org/W6748115830"],"related_works":["https://openalex.org/W2088555617","https://openalex.org/W2387631462","https://openalex.org/W2491175701","https://openalex.org/W2511490666","https://openalex.org/W807829151","https://openalex.org/W2109915041","https://openalex.org/W4389286057","https://openalex.org/W2385851311","https://openalex.org/W3199753225","https://openalex.org/W2090848562"],"abstract_inverted_index":{"Cloud":[0],"database":[1,9,21,81,156],"provides":[2],"an":[3,16],"advantageous":[4],"platform":[5,242],"for":[6,138],"outsourcing":[7],"of":[8,100,171,215,247],"service.":[10],"To":[11],"protect":[12],"data":[13,46,77,106,116,221,226],"confidentiality":[14,170],"from":[15],"untrusted":[17],"cloud,":[18],"the":[19,29,48,54,79,105,115,124,128,147,169,209,213,245],"original":[20],"is":[22,192],"often":[23],"encrypted":[24,76],"and":[25,82,108,176,198,225],"then":[26],"uploaded":[27,73],"to":[28,34,43,78,86,180,243],"cloud.":[30],"However,":[31],"in":[32,65,97,163],"order":[33],"support":[35],"functional":[36],"queries,":[37],"existing":[38],"secure":[39,139,154,217],"databases":[40],"require":[41],"users":[42,58,166],"encrypt":[44],"their":[45,172],"under":[47,160],"same":[49],"public/symmetric":[50],"key,":[51],"which":[52,164],"restricts":[53],"usage":[55],"scenarios":[56],"since":[57],"do":[59,177],"not":[60,178],"really":[61],"trust":[62],"each":[63,184],"other":[64],"practice.":[66],"Imagine":[67],"a":[68,71,153,187,195,199,216,235,239],"scenario":[69,95],"where":[70,104],"user":[72,84],"his/her":[74],"own":[75,173],"cloud":[80,155,241],"another":[83],"wants":[85],"execute":[87],"private":[88,129],"range":[89,140,158],"queries":[90,141,159],"on":[91,146,194,238],"this":[92,132,136],"data.":[93,150],"This":[94],"occurs":[96],"many":[98],"cases":[99],"collaborative":[101],"statistical":[102],"analysis":[103],"provider":[107,117],"analyst":[109,125],"are":[110],"different":[111,174],"entities.":[112],"Then":[113],"either":[114],"must":[118,126],"reveal":[119,127],"its":[120],"encryption":[121,149],"key":[122,204],"or":[123],"queries.":[130],"In":[131],"paper,":[133],"we":[134,230],"overcome":[135],"restriction":[137],"by":[142],"enabling":[143],"query":[144,218,223],"executions":[145],"multi-key":[148],"We":[151,206],"propose":[152],"supporting":[157],"multiple":[161],"keys,":[162,175],"all":[165],"could":[167],"preserve":[168],"have":[179],"share":[181],"them":[182],"with":[183],"other.":[185],"At":[186],"higher":[188],"level,":[189],"our":[190,248],"system":[191],"constructed":[193],"two-cloud":[196],"architecture":[197],"novel":[200],"distributed":[201],"two-trapdoor":[202],"public":[203],"cryptosystem.":[205],"prove":[207],"that":[208],"proposed":[210,249],"scheme":[211],"achieves":[212],"goal":[214],"without":[219],"leaking":[220],"privacy,":[222,224],"access":[227],"patterns.":[228],"Finally,":[229],"use":[231],"extensive":[232],"experiments":[233],"over":[234],"real-world":[236],"dataset":[237],"commercial":[240],"verify":[244],"efficacy":[246],"scheme.":[250]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
