{"id":"https://openalex.org/W4200366918","doi":"https://doi.org/10.1109/pst52912.2021.9647830","title":"EPSim-GS: Efficient and Privacy-Preserving Similarity Range Query over Genomic Sequences","display_name":"EPSim-GS: Efficient and Privacy-Preserving Similarity Range Query over Genomic Sequences","publication_year":2021,"publication_date":"2021-12-13","ids":{"openalex":"https://openalex.org/W4200366918","doi":"https://doi.org/10.1109/pst52912.2021.9647830"},"language":"en","primary_location":{"id":"doi:10.1109/pst52912.2021.9647830","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pst52912.2021.9647830","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 18th International Conference on Privacy, Security and Trust (PST)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5072677863","display_name":"Jiacheng Jin","orcid":null},"institutions":[{"id":"https://openalex.org/I106938459","display_name":"University of New Brunswick","ror":"https://ror.org/05nkf0n29","country_code":"CA","type":"education","lineage":["https://openalex.org/I106938459"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Jiacheng Jin","raw_affiliation_strings":["Faculty of Computer Science, University of New Brunswick, Fredericton, Canada"],"affiliations":[{"raw_affiliation_string":"Faculty of Computer Science, University of New Brunswick, Fredericton, Canada","institution_ids":["https://openalex.org/I106938459"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091898557","display_name":"Yandong Zheng","orcid":"https://orcid.org/0000-0003-4534-5670"},"institutions":[{"id":"https://openalex.org/I106938459","display_name":"University of New Brunswick","ror":"https://ror.org/05nkf0n29","country_code":"CA","type":"education","lineage":["https://openalex.org/I106938459"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Yandong Zheng","raw_affiliation_strings":["Faculty of Computer Science, University of New Brunswick, Fredericton, Canada"],"affiliations":[{"raw_affiliation_string":"Faculty of Computer Science, University of New Brunswick, Fredericton, Canada","institution_ids":["https://openalex.org/I106938459"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5069686395","display_name":"Pulei Xiong","orcid":"https://orcid.org/0000-0002-3460-6946"},"institutions":[{"id":"https://openalex.org/I4210159778","display_name":"National Research Council Canada","ror":"https://ror.org/04mte1k06","country_code":"CA","type":"government","lineage":["https://openalex.org/I4210159778"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Pulei Xiong","raw_affiliation_strings":["National Research Council Canada, Ottawa, Canada"],"affiliations":[{"raw_affiliation_string":"National Research Council Canada, Ottawa, Canada","institution_ids":["https://openalex.org/I4210159778"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5072677863"],"corresponding_institution_ids":["https://openalex.org/I106938459"],"apc_list":null,"apc_paid":null,"fwci":0.2721,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.65011104,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"2017","issue":null,"first_page":"1","last_page":"10"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9848999977111816,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7880935072898865},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.7077214121818542},{"id":"https://openalex.org/keywords/paillier-cryptosystem","display_name":"Paillier cryptosystem","score":0.6495243310928345},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.6128702759742737},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5581421256065369},{"id":"https://openalex.org/keywords/similarity","display_name":"Similarity (geometry)","score":0.5553271174430847},{"id":"https://openalex.org/keywords/locality-sensitive-hashing","display_name":"Locality-sensitive hashing","score":0.5384964346885681},{"id":"https://openalex.org/keywords/range-query","display_name":"Range query (database)","score":0.500617504119873},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.49295949935913086},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.48695310950279236},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.41559216380119324},{"id":"https://openalex.org/keywords/nearest-neighbor-search","display_name":"Nearest neighbor search","score":0.41087862849235535},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4107726812362671},{"id":"https://openalex.org/keywords/hash-table","display_name":"Hash table","score":0.3894447088241577},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.3846900165081024},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.35210084915161133},{"id":"https://openalex.org/keywords/web-search-query","display_name":"Web search query","score":0.2846999168395996},{"id":"https://openalex.org/keywords/search-engine","display_name":"Search engine","score":0.1777631938457489},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.12670978903770447},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1266692876815796},{"id":"https://openalex.org/keywords/web-query-classification","display_name":"Web query classification","score":0.12441200017929077},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.10900223255157471}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7880935072898865},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.7077214121818542},{"id":"https://openalex.org/C66989864","wikidata":"https://www.wikidata.org/wiki/Q594646","display_name":"Paillier cryptosystem","level":5,"score":0.6495243310928345},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.6128702759742737},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5581421256065369},{"id":"https://openalex.org/C103278499","wikidata":"https://www.wikidata.org/wiki/Q254465","display_name":"Similarity (geometry)","level":3,"score":0.5553271174430847},{"id":"https://openalex.org/C74270461","wikidata":"https://www.wikidata.org/wiki/Q1625299","display_name":"Locality-sensitive hashing","level":4,"score":0.5384964346885681},{"id":"https://openalex.org/C136736807","wikidata":"https://www.wikidata.org/wiki/Q818943","display_name":"Range query (database)","level":5,"score":0.500617504119873},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.49295949935913086},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.48695310950279236},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.41559216380119324},{"id":"https://openalex.org/C116738811","wikidata":"https://www.wikidata.org/wiki/Q608751","display_name":"Nearest neighbor search","level":2,"score":0.41087862849235535},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4107726812362671},{"id":"https://openalex.org/C67388219","wikidata":"https://www.wikidata.org/wiki/Q207440","display_name":"Hash table","level":3,"score":0.3894447088241577},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.3846900165081024},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.35210084915161133},{"id":"https://openalex.org/C164120249","wikidata":"https://www.wikidata.org/wiki/Q995982","display_name":"Web search query","level":3,"score":0.2846999168395996},{"id":"https://openalex.org/C97854310","wikidata":"https://www.wikidata.org/wiki/Q19541","display_name":"Search engine","level":2,"score":0.1777631938457489},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.12670978903770447},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1266692876815796},{"id":"https://openalex.org/C118689300","wikidata":"https://www.wikidata.org/wiki/Q7978614","display_name":"Web query classification","level":4,"score":0.12441200017929077},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.10900223255157471},{"id":"https://openalex.org/C73468433","wikidata":"https://www.wikidata.org/wiki/Q1639918","display_name":"Hybrid cryptosystem","level":4,"score":0.0},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/pst52912.2021.9647830","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pst52912.2021.9647830","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 18th International Conference on Privacy, Security and Trust (PST)","raw_type":"proceedings-article"},{"id":"pmh:oai:cisti-icist.nrc-cnrc.ca:cistinparc:5efe61db-1a29-48ff-b08a-67f304b444b7","is_oa":false,"landing_page_url":"https://nrc-publications.canada.ca/eng/view/object/?id=5efe61db-1a29-48ff-b08a-67f304b444b7","pdf_url":null,"source":{"id":"https://openalex.org/S7407055245","display_name":"NPARC","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320314062","display_name":"National Research Council","ror":"https://ror.org/02eq2w707"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W1480988843","https://openalex.org/W1547671177","https://openalex.org/W1729744401","https://openalex.org/W1970026646","https://openalex.org/W2001496424","https://openalex.org/W2060238632","https://openalex.org/W2085801087","https://openalex.org/W2087135382","https://openalex.org/W2093175219","https://openalex.org/W2121423622","https://openalex.org/W2132172731","https://openalex.org/W2136068515","https://openalex.org/W2166971704","https://openalex.org/W2284068942","https://openalex.org/W2398522641","https://openalex.org/W2604552141","https://openalex.org/W2742045254","https://openalex.org/W2745343546","https://openalex.org/W2762497841","https://openalex.org/W2788930986","https://openalex.org/W2805670944","https://openalex.org/W2896343737","https://openalex.org/W2964953836","https://openalex.org/W2996418340","https://openalex.org/W3080440842","https://openalex.org/W3132125973","https://openalex.org/W3132211075","https://openalex.org/W3163561067","https://openalex.org/W3202927949","https://openalex.org/W6677987929","https://openalex.org/W6712422079","https://openalex.org/W6742553463","https://openalex.org/W6795393718"],"related_works":["https://openalex.org/W3094967175","https://openalex.org/W2166822184","https://openalex.org/W2135779989","https://openalex.org/W2045263322","https://openalex.org/W2393322642","https://openalex.org/W3096071782","https://openalex.org/W50423144","https://openalex.org/W2031059473","https://openalex.org/W2754607325","https://openalex.org/W2901290148"],"abstract_inverted_index":{"Similarity":[0],"query":[1,126,148,172],"over":[2,43,95,174],"genomic":[3,23,27,44,60,75,97],"sequences":[4,28,45,76],"has":[5,14,67],"played":[6],"a":[7,73,136,145],"significant":[8],"role":[9],"in":[10,16,82,106],"personalized":[11],"medicine":[12],"and":[13,22,32,71,122,143,196,211],"applications":[15],"various":[17],"fields,":[18],"including":[19],"DNA":[20],"alignment":[21],"sequencing.":[24],"Since":[25],"handling":[26],"requires":[29],"massive":[30],"storage":[31],"considerable":[33,69],"computational":[34],"capacity,":[35],"service":[36],"providers":[37],"prefer":[38],"to":[39,56,79,134,139,167,206],"process":[40],"similarity":[41,93,124,146,170],"queries":[42,66,94],"on":[46,151,163],"cloud":[47],"servers":[48],"rather":[49],"than":[50],"at":[51],"the":[52,57,63,108,112,116,141,152,164,169,175,185,192,208,212],"client":[53],"side.":[54],"Due":[55],"sensitivity":[58],"of":[59,65,111,194],"sequences,":[61],"preserving":[62],"privacy":[64],"attracted":[68],"attention,":[70],"as":[72],"result,":[74],"are":[77,100],"demanded":[78],"be":[80],"outsourced":[81],"an":[83,120],"encrypted":[84,96,176],"form.":[85],"Although":[86],"many":[87],"schemes":[88],"have":[89,104],"been":[90],"proposed":[91],"for":[92],"data,":[98],"they":[99],"either":[101],"inefficient":[102],"or":[103],"limitations":[105],"supporting":[107],"dynamic":[109],"update":[110],"dataset.":[113,177],"To":[114],"address":[115],"challenges,":[117],"we":[118,131,156,180,203],"propose":[119,181],"efficient":[121],"privacy-preserving":[123,160,187],"range":[125,147,171],"scheme,":[127],"namely":[128],"EPSim-GS.":[129],"First,":[130],"introduce":[132],"how":[133],"build":[135],"hash":[137,153],"table":[138],"index":[140],"dataset,":[142],"present":[144],"algorithm":[149,173],"based":[150,162],"table.":[154],"Then,":[155],"design":[157],"two":[158,186],"cloud-based":[159],"protocols":[161],"Paillier":[165],"cryptosystem":[166],"support":[168],"After":[178],"that,":[179],"EPSim-GS":[182,195],"by":[183],"leveraging":[184],"protocols.":[188],"We":[189],"then":[190],"analyze":[191],"security":[193],"prove":[197],"that":[198,215],"it":[199,216],"is":[200,217],"privacy-preserving.":[201],"Finally,":[202],"perform":[204],"experiments":[205],"evaluate":[207],"scheme\u2019s":[209],"performance,":[210],"results":[213],"indicate":[214],"computationally":[218],"efficient.":[219]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2026-03-02T08:37:19.008085","created_date":"2025-10-10T00:00:00"}
