{"id":"https://openalex.org/W4390604469","doi":"https://doi.org/10.1109/tc.2024.3349653","title":"Optimal Compression for Encrypted Key-Value Store in Cloud Systems","display_name":"Optimal Compression for Encrypted Key-Value Store in Cloud Systems","publication_year":2024,"publication_date":"2024-01-05","ids":{"openalex":"https://openalex.org/W4390604469","doi":"https://doi.org/10.1109/tc.2024.3349653"},"language":"en","primary_location":{"id":"doi:10.1109/tc.2024.3349653","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tc.2024.3349653","pdf_url":null,"source":{"id":"https://openalex.org/S157670870","display_name":"IEEE Transactions on Computers","issn_l":"0018-9340","issn":["0018-9340","1557-9956","2326-3814"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Computers","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100374085","display_name":"Chen Zhang","orcid":"https://orcid.org/0000-0001-9637-2754"},"institutions":[{"id":"https://openalex.org/I47605537","display_name":"The Hang Seng University of Hong Kong","ror":"https://ror.org/04fa64g55","country_code":"CN","type":"education","lineage":["https://openalex.org/I47605537"]},{"id":"https://openalex.org/I889458895","display_name":"University of Hong Kong","ror":"https://ror.org/02zhqgq86","country_code":"HK","type":"education","lineage":["https://openalex.org/I889458895"]}],"countries":["CN","HK"],"is_corresponding":true,"raw_author_name":"Chen Zhang","raw_affiliation_strings":["Department of Computer Science, The Hang Seng University of Hong Kong, Hong Kong"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, The Hang Seng University of Hong Kong, Hong Kong","institution_ids":["https://openalex.org/I47605537","https://openalex.org/I889458895"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089546542","display_name":"Qingyuan Xie","orcid":"https://orcid.org/0000-0001-6799-1417"},"institutions":[{"id":"https://openalex.org/I4210124427","display_name":"City College of Dongguan University of Technology","ror":"https://ror.org/02vdh2x09","country_code":"CN","type":"education","lineage":["https://openalex.org/I2799850029","https://openalex.org/I4210124427"]},{"id":"https://openalex.org/I168719708","display_name":"City University of Hong Kong","ror":"https://ror.org/03q8dnn23","country_code":"HK","type":"education","lineage":["https://openalex.org/I168719708"]}],"countries":["CN","HK"],"is_corresponding":false,"raw_author_name":"Qingyuan Xie","raw_affiliation_strings":["City University of Hong Kong (Dongguan), Dongguan, China","Department of Computer Science, City University of Hong Kong, Hong Kong"],"affiliations":[{"raw_affiliation_string":"City University of Hong Kong (Dongguan), Dongguan, China","institution_ids":["https://openalex.org/I4210124427","https://openalex.org/I168719708"]},{"raw_affiliation_string":"Department of Computer Science, City University of Hong Kong, Hong Kong","institution_ids":["https://openalex.org/I168719708"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100420894","display_name":"Mingyue Wang","orcid":"https://orcid.org/0000-0002-2649-1819"},"institutions":[{"id":"https://openalex.org/I168719708","display_name":"City University of Hong Kong","ror":"https://ror.org/03q8dnn23","country_code":"HK","type":"education","lineage":["https://openalex.org/I168719708"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Mingyue Wang","raw_affiliation_strings":["Department of Computer Science, City University of Hong Kong, Hong Kong"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, City University of Hong Kong, Hong Kong","institution_ids":["https://openalex.org/I168719708"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021523270","display_name":"Yu Guo","orcid":"https://orcid.org/0000-0002-9078-7462"},"institutions":[{"id":"https://openalex.org/I25254941","display_name":"Beijing Normal University","ror":"https://ror.org/022k4wk35","country_code":"CN","type":"education","lineage":["https://openalex.org/I25254941"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yu Guo","raw_affiliation_strings":["School of Artificial Intelligence, Beijing Normal University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Artificial Intelligence, Beijing Normal University, Beijing, China","institution_ids":["https://openalex.org/I25254941"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5013643572","display_name":"Xiaohua Jia","orcid":"https://orcid.org/0000-0001-8702-8302"},"institutions":[{"id":"https://openalex.org/I168719708","display_name":"City University of Hong Kong","ror":"https://ror.org/03q8dnn23","country_code":"HK","type":"education","lineage":["https://openalex.org/I168719708"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Xiaohua Jia","raw_affiliation_strings":["Department of Computer Science, City University of Hong Kong, Hong Kong"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, City University of Hong Kong, Hong Kong","institution_ids":["https://openalex.org/I168719708"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100374085"],"corresponding_institution_ids":["https://openalex.org/I47605537","https://openalex.org/I889458895"],"apc_list":null,"apc_paid":null,"fwci":2.1431,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.88099083,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"73","issue":"3","first_page":"928","last_page":"941"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8179874420166016},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7284339070320129},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.7062420845031738},{"id":"https://openalex.org/keywords/outsourcing","display_name":"Outsourcing","score":0.63199782371521},{"id":"https://openalex.org/keywords/cloud-storage","display_name":"Cloud storage","score":0.6206265687942505},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5833869576454163},{"id":"https://openalex.org/keywords/computer-data-storage","display_name":"Computer data storage","score":0.5174218416213989},{"id":"https://openalex.org/keywords/bandwidth","display_name":"Bandwidth (computing)","score":0.484638512134552},{"id":"https://openalex.org/keywords/compression-ratio","display_name":"Compression ratio","score":0.41888028383255005},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.39340347051620483},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3768976926803589},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2688741087913513},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.13633236289024353},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.13479968905448914}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8179874420166016},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7284339070320129},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.7062420845031738},{"id":"https://openalex.org/C46934059","wikidata":"https://www.wikidata.org/wiki/Q61515","display_name":"Outsourcing","level":2,"score":0.63199782371521},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.6206265687942505},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5833869576454163},{"id":"https://openalex.org/C194739806","wikidata":"https://www.wikidata.org/wiki/Q66221","display_name":"Computer data storage","level":2,"score":0.5174218416213989},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.484638512134552},{"id":"https://openalex.org/C25797200","wikidata":"https://www.wikidata.org/wiki/Q828137","display_name":"Compression ratio","level":3,"score":0.41888028383255005},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.39340347051620483},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3768976926803589},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2688741087913513},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.13633236289024353},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.13479968905448914},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C511840579","wikidata":"https://www.wikidata.org/wiki/Q12757","display_name":"Internal combustion engine","level":2,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C171146098","wikidata":"https://www.wikidata.org/wiki/Q124192","display_name":"Automotive engineering","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tc.2024.3349653","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tc.2024.3349653","pdf_url":null,"source":{"id":"https://openalex.org/S157670870","display_name":"IEEE Transactions on Computers","issn_l":"0018-9340","issn":["0018-9340","1557-9956","2326-3814"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Computers","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1820134740","display_name":null,"funder_award_id":"CityU 11211422","funder_id":"https://openalex.org/F4320321592","funder_display_name":"Research Grants Council, University Grants Committee"},{"id":"https://openalex.org/G5382610034","display_name":null,"funder_award_id":"2022ZD0115901","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G7184951566","display_name":null,"funder_award_id":"62102035","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8227429975","display_name":null,"funder_award_id":"R1012-21","funder_id":"https://openalex.org/F4320321592","funder_display_name":"Research Grants Council, University Grants Committee"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321592","display_name":"Research Grants Council, University Grants Committee","ror":"https://ror.org/00djwmt25"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":42,"referenced_works":["https://openalex.org/W1570947789","https://openalex.org/W1580001677","https://openalex.org/W1608607819","https://openalex.org/W1984845482","https://openalex.org/W2014465787","https://openalex.org/W2054046497","https://openalex.org/W2086763678","https://openalex.org/W2123686039","https://openalex.org/W2133003537","https://openalex.org/W2159915142","https://openalex.org/W2399989564","https://openalex.org/W2400905995","https://openalex.org/W2517979719","https://openalex.org/W2523200020","https://openalex.org/W2536125594","https://openalex.org/W2600805457","https://openalex.org/W2605719376","https://openalex.org/W2748849550","https://openalex.org/W2790225875","https://openalex.org/W2791142579","https://openalex.org/W2791603174","https://openalex.org/W2893747018","https://openalex.org/W2904207032","https://openalex.org/W2921570539","https://openalex.org/W2926084389","https://openalex.org/W2945783429","https://openalex.org/W2954220898","https://openalex.org/W2956019739","https://openalex.org/W2975475098","https://openalex.org/W2980100508","https://openalex.org/W2987454897","https://openalex.org/W2992719113","https://openalex.org/W3068599874","https://openalex.org/W3092508098","https://openalex.org/W3113181630","https://openalex.org/W3127129830","https://openalex.org/W3176355630","https://openalex.org/W3216937398","https://openalex.org/W4387129774","https://openalex.org/W6636329400","https://openalex.org/W6640789038","https://openalex.org/W6698466579"],"related_works":["https://openalex.org/W2348283597","https://openalex.org/W3022042262","https://openalex.org/W2369572752","https://openalex.org/W4231450971","https://openalex.org/W1999590660","https://openalex.org/W2921774642","https://openalex.org/W3162884427","https://openalex.org/W2946119021","https://openalex.org/W2369516071","https://openalex.org/W4287184259"],"abstract_inverted_index":{"Key-value":[0],"store":[1],"is":[2,34,54,194],"adopted":[3],"by":[4,143],"many":[5],"applications":[6],"due":[7],"to":[8,35,103],"its":[9],"high":[10],"performance":[11],"in":[12,67,196],"processing":[13],"big":[14],"data":[15,75,79,109,186],"workloads.":[16],"With":[17],"the":[18,64,68,71,85,94,105,140,165,182,189],"increasing":[19],"concern":[20],"for":[21,56,74,98],"privacy,":[22],"some":[23],"privacy-preserving":[24,134],"key-value":[25,37,57,100,135,191],"storage":[26,58,65,126,136,192],"systems":[27,59],"have":[28],"been":[29],"proposed.":[30],"A":[31],"remarkable":[32],"solution":[33],"group":[36],"pairs":[38],"into":[39],"packs":[40],"and":[41,44,70,127,145,156,188],"then":[42],"compress":[43],"encrypt":[45],"each":[46],"pack":[47,52,119,176],"separately.":[48],"The":[49],"selection":[50],"of":[51,108,159,167,185],"size":[53,120,177],"important":[55],"because":[60],"it":[61,152],"affects":[62],"both":[63,125],"cost":[66,73,107,184],"cloud":[69],"bandwidth":[72,128],"retrieval.":[76],"However,":[77],"existing":[78],"packing":[80],"strategies":[81],"do":[82],"not":[83],"consider":[84],"trade-off":[86],"between":[87],"them.":[88],"In":[89],"this":[90,113],"paper,":[91],"we":[92,115,131,162],"study":[93],"optimal":[95,118],"compression":[96,146],"problem":[97],"encrypted":[99],"stores,":[101],"aiming":[102],"minimize":[104,181],"overall":[106,183],"outsourcing.":[110],"To":[111],"solve":[112],"problem,":[114],"devise":[116],"an":[117],"computation":[121,178],"scheme,":[122],"which":[123],"considers":[124],"costs.":[129],"Then,":[130],"propose":[132],"a":[133],"system.":[137],"It":[138],"balances":[139],"impact":[141],"caused":[142],"encryption":[144],"without":[147],"compromising":[148],"system":[149,193],"performance.":[150],"Meanwhile,":[151],"supports":[153],"dynamic":[154],"updates":[155],"rich":[157],"types":[158],"queries.":[160],"Finally,":[161],"formally":[163],"analyze":[164],"security":[166],"our":[168,174],"design.":[169],"Performance":[170],"evaluations":[171],"demonstrate":[172],"that":[173],"proposed":[175],"scheme":[179],"can":[180],"outsourcing,":[187],"designed":[190],"feasible":[195],"practice.":[197]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":1}],"updated_date":"2026-03-18T14:38:29.013473","created_date":"2025-10-10T00:00:00"}
