{"id":"https://openalex.org/W4285276444","doi":"https://doi.org/10.1109/tcc.2022.3173260","title":"An Efficient Oblivious Random Data Access Scheme in Cloud Computing","display_name":"An Efficient Oblivious Random Data Access Scheme in Cloud Computing","publication_year":2022,"publication_date":"2022-05-10","ids":{"openalex":"https://openalex.org/W4285276444","doi":"https://doi.org/10.1109/tcc.2022.3173260"},"language":"en","primary_location":{"id":"doi:10.1109/tcc.2022.3173260","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcc.2022.3173260","pdf_url":null,"source":{"id":"https://openalex.org/S2492498579","display_name":"IEEE Transactions on Cloud Computing","issn_l":"2168-7161","issn":["2168-7161","2372-0018"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Cloud Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://figshare.com/articles/journal_contribution/An_Efficient_Oblivious_Random_Data_Access_Scheme_in_Cloud_Computing/20583915","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5046831600","display_name":"Hong Liu","orcid":"https://orcid.org/0000-0002-1260-5360"},"institutions":[{"id":"https://openalex.org/I10535382","display_name":"Chongqing University of Posts and Telecommunications","ror":"https://ror.org/03dgaqz26","country_code":"CN","type":"education","lineage":["https://openalex.org/I10535382"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Hong Liu","raw_affiliation_strings":["Department of Software Engineering, Chongqing University of Posts and Telecommunications, Chongqing, China","Software Engineering, Chongqing University of Posts and Telecommunications, 12419 Chongqing, Chongqing, China"],"raw_orcid":"https://orcid.org/0000-0002-1260-5360","affiliations":[{"raw_affiliation_string":"Department of Software Engineering, Chongqing University of Posts and Telecommunications, Chongqing, China","institution_ids":["https://openalex.org/I10535382"]},{"raw_affiliation_string":"Software Engineering, Chongqing University of Posts and Telecommunications, 12419 Chongqing, Chongqing, China","institution_ids":["https://openalex.org/I10535382"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102547568","display_name":"Xiaojing Lu","orcid":null},"institutions":[{"id":"https://openalex.org/I10535382","display_name":"Chongqing University of Posts and Telecommunications","ror":"https://ror.org/03dgaqz26","country_code":"CN","type":"education","lineage":["https://openalex.org/I10535382"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaojing Lu","raw_affiliation_strings":["Department of Software Engineering, Chongqing University of Posts and Telecommunications, Chongqing, China","Software Engineering, Chongqing University of Posts and Telecommunications, 12419 Chongqing, Chongqing, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Software Engineering, Chongqing University of Posts and Telecommunications, Chongqing, China","institution_ids":["https://openalex.org/I10535382"]},{"raw_affiliation_string":"Software Engineering, Chongqing University of Posts and Telecommunications, 12419 Chongqing, Chongqing, China","institution_ids":["https://openalex.org/I10535382"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060921826","display_name":"Shengchen Duan","orcid":"https://orcid.org/0000-0002-0918-8412"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shengchen Duan","raw_affiliation_strings":["Department of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China","Cyberspace Security, Beijing University of Posts and Telecommunications, 12472 Beijing, Beijing, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]},{"raw_affiliation_string":"Cyberspace Security, Beijing University of Posts and Telecommunications, 12472 Beijing, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085698418","display_name":"Yushu Zhang","orcid":"https://orcid.org/0000-0001-8183-8435"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yushu Zhang","raw_affiliation_strings":["College of Computer Science, Nanjing University of Aeronautics and Astronautics, Nanjing, China","College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, Jiangsu, China"],"raw_orcid":"https://orcid.org/0000-0001-8183-8435","affiliations":[{"raw_affiliation_string":"College of Computer Science, Nanjing University of Aeronautics and Astronautics, Nanjing, China","institution_ids":["https://openalex.org/I9842412"]},{"raw_affiliation_string":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, Jiangsu, China","institution_ids":["https://openalex.org/I9842412"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5051297830","display_name":"Yong Xiang","orcid":"https://orcid.org/0000-0003-3545-7863"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Yong Xiang","raw_affiliation_strings":["School of Information Technology, Deakin University, Geelong, VIC, Australia","Deakin University, School of Information Technology, Melbourne, Victoria, Australia"],"raw_orcid":"https://orcid.org/0000-0003-3545-7863","affiliations":[{"raw_affiliation_string":"School of Information Technology, Deakin University, Geelong, VIC, Australia","institution_ids":["https://openalex.org/I149704539"]},{"raw_affiliation_string":"Deakin University, School of Information Technology, Melbourne, Victoria, Australia","institution_ids":["https://openalex.org/I149704539"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5046831600"],"corresponding_institution_ids":["https://openalex.org/I10535382"],"apc_list":null,"apc_paid":null,"fwci":0.9711,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.79498119,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":"11","issue":"2","first_page":"1940","last_page":"1953"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8409950733184814},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7966429591178894},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6652196645736694},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5678994059562683},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.5540857315063477},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.5391331911087036},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5055253505706787},{"id":"https://openalex.org/keywords/filesystem-level-encryption","display_name":"Filesystem-level encryption","score":0.43810683488845825},{"id":"https://openalex.org/keywords/cloud-storage","display_name":"Cloud storage","score":0.42259493470191956},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3591389060020447},{"id":"https://openalex.org/keywords/on-the-fly-encryption","display_name":"On-the-fly encryption","score":0.3433987498283386},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.33029717206954956},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.15340742468833923}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8409950733184814},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7966429591178894},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6652196645736694},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5678994059562683},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.5540857315063477},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.5391331911087036},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5055253505706787},{"id":"https://openalex.org/C18319499","wikidata":"https://www.wikidata.org/wiki/Q5448402","display_name":"Filesystem-level encryption","level":4,"score":0.43810683488845825},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.42259493470191956},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3591389060020447},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.3433987498283386},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.33029717206954956},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.15340742468833923}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tcc.2022.3173260","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcc.2022.3173260","pdf_url":null,"source":{"id":"https://openalex.org/S2492498579","display_name":"IEEE Transactions on Cloud Computing","issn_l":"2168-7161","issn":["2168-7161","2372-0018"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Cloud Computing","raw_type":"journal-article"},{"id":"pmh:oai:figshare.com:article/20583915","is_oa":true,"landing_page_url":"https://figshare.com/articles/journal_contribution/An_Efficient_Oblivious_Random_Data_Access_Scheme_in_Cloud_Computing/20583915","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"}],"best_oa_location":{"id":"pmh:oai:figshare.com:article/20583915","is_oa":true,"landing_page_url":"https://figshare.com/articles/journal_contribution/An_Efficient_Oblivious_Random_Data_Access_Scheme_in_Cloud_Computing/20583915","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2877690401","display_name":null,"funder_award_id":"cstc2018jcyjAX0510","funder_id":"https://openalex.org/F4320323172","funder_display_name":"Natural Science Foundation of Chongqing"},{"id":"https://openalex.org/G7604368941","display_name":null,"funder_award_id":"BK20201290","funder_id":"https://openalex.org/F4320334982","funder_display_name":"Basic Research Program of Jiangsu Province"}],"funders":[{"id":"https://openalex.org/F4320323172","display_name":"Natural Science Foundation of Chongqing","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320334982","display_name":"Basic Research Program of Jiangsu Province","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W1539859404","https://openalex.org/W1545698365","https://openalex.org/W1571926107","https://openalex.org/W1979493600","https://openalex.org/W1988374166","https://openalex.org/W2004839833","https://openalex.org/W2014841127","https://openalex.org/W2016575873","https://openalex.org/W2033165262","https://openalex.org/W2111446139","https://openalex.org/W2133003537","https://openalex.org/W2145426052","https://openalex.org/W2147929033","https://openalex.org/W2152516507","https://openalex.org/W2170993700","https://openalex.org/W2181401201","https://openalex.org/W2414102663","https://openalex.org/W2508855287","https://openalex.org/W2509556196","https://openalex.org/W2539385377","https://openalex.org/W2540100037","https://openalex.org/W2612035821","https://openalex.org/W2614426900","https://openalex.org/W2775225293","https://openalex.org/W2784296252","https://openalex.org/W2794471476","https://openalex.org/W2794926610","https://openalex.org/W2821410526","https://openalex.org/W2826575142","https://openalex.org/W2883042185","https://openalex.org/W2893321332","https://openalex.org/W2946109000","https://openalex.org/W3006400738","https://openalex.org/W3214305154","https://openalex.org/W6713547331","https://openalex.org/W6720239471","https://openalex.org/W6782091288"],"related_works":["https://openalex.org/W2947510282","https://openalex.org/W2363701519","https://openalex.org/W2601739120","https://openalex.org/W2292786713","https://openalex.org/W3212491810","https://openalex.org/W4385414763","https://openalex.org/W4240313302","https://openalex.org/W4315815885","https://openalex.org/W2955754585","https://openalex.org/W2030246973"],"abstract_inverted_index":{"With":[0],"the":[1,16,28,36,49,124,128,131,162,166,181,185],"development":[2],"of":[3,19,32,51,80,130,140,169,176],"cloud":[4,7],"computing":[5],"and":[6,30,57,100,148,158,189],"storage":[8,149,190],"techniques,":[9],"much":[10],"attention":[11],"has":[12,62],"been":[13],"focused":[14],"on":[15,35,54],"privacy":[17],"protection":[18],"outsourced":[20],"data.":[21],"Existing":[22],"searchable":[23,39,89],"encryption":[24,40,119,143],"solutions":[25],"can":[26,144,153],"ensure":[27],"confidentiality":[29],"availability":[31],"data":[33,186],"stored":[34],"cloud.":[37],"However,":[38],"is":[41,76,91,111,171],"vulnerable":[42],"to":[43,67,103,120,193],"statistical":[44],"inference":[45],"attacks,":[46],"which":[47,61,116],"exploit":[48],"disclosure":[50],"access":[52,73,82,102],"patterns":[53],"encrypted":[55,58,104,107,156],"indexes":[56],"file":[59],"sets,":[60],"become":[63],"a":[64,96,112],"potential":[65],"way":[66],"reveal":[68],"user":[69],"privacy.":[70],"Oblivious":[71],"random":[72],"memory":[74],"(ORAM)":[75],"an":[77],"important":[78],"means":[79],"concealing":[81],"patterns,":[83],"yet":[84],"its":[85],"direct":[86],"use":[87],"in":[88,123],"encryptions":[90],"expensive.":[92],"This":[93,109],"paper":[94],"presents":[95],"scheme":[97,110,152,183],"for":[98],"efficient":[99],"oblivious":[101],"databases":[105],"through":[106],"indexes.":[108],"hybrid":[113],"ORAM":[114],"scheme,":[115],"utilizes":[117],"semi-homomorphic":[118,142],"perform":[121],"calculations":[122],"ciphertext":[125],"domain,":[126],"overcoming":[127],"limitations":[129],"huge":[132],"overhead":[133],"associated":[134],"with":[135],"Path-ORAM.":[136],"For":[137],"excessive":[138],"amounts":[139],"data,":[141],"significantly":[145],"reduce":[146],"communication":[147],"overhead.":[150],"Our":[151],"achieve":[154],"high-security":[155],"search":[157],"update":[159],"operations":[160],"at":[161],"same":[163],"time.":[164],"Moreover,":[165],"execution":[167],"speed":[168],"ODS-Tree":[170],"2-8x":[172],"faster":[173],"than":[174],"that":[175],"ORAM-based":[177],"schemes.":[178],"In":[179],"addition,":[180],"proposed":[182],"reduces":[184],"block":[187],"transmission":[188],"costs":[191],"compared":[192],"existing":[194],"frameworks.":[195]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
