{"id":"https://openalex.org/W2094493303","doi":"https://doi.org/10.1145/1594173.1594175","title":"Search-as-a-service","display_name":"Search-as-a-service","publication_year":2009,"publication_date":"2009-09-01","ids":{"openalex":"https://openalex.org/W2094493303","doi":"https://doi.org/10.1145/1594173.1594175","mag":"2094493303"},"language":"en","primary_location":{"id":"doi:10.1145/1594173.1594175","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1594173.1594175","pdf_url":null,"source":{"id":"https://openalex.org/S131231701","display_name":"ACM Transactions on the Web","issn_l":"1559-1131","issn":["1559-1131","1559-114X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on the Web","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5110002176","display_name":"Aameek Singh","orcid":null},"institutions":[{"id":"https://openalex.org/I4210085935","display_name":"IBM Research - Almaden","ror":"https://ror.org/005w8dd04","country_code":"US","type":"facility","lineage":["https://openalex.org/I1341412227","https://openalex.org/I4210085935","https://openalex.org/I4210114115"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Aameek Singh","raw_affiliation_strings":["IBM Almaden Research Center, San Jose, CA","IBM Almaden Research Center San Jose , CA"],"affiliations":[{"raw_affiliation_string":"IBM Almaden Research Center, San Jose, CA","institution_ids":["https://openalex.org/I4210085935"]},{"raw_affiliation_string":"IBM Almaden Research Center San Jose , CA","institution_ids":["https://openalex.org/I4210085935"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072108555","display_name":"Mudhakar Srivatsa","orcid":"https://orcid.org/0000-0002-5874-3750"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Mudhakar Srivatsa","raw_affiliation_strings":["IBM T. J. Watson Research Center"],"affiliations":[{"raw_affiliation_string":"IBM T. J. Watson Research Center","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100343965","display_name":"Ling Liu","orcid":"https://orcid.org/0000-0002-5326-5518"},"institutions":[{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"education","lineage":["https://openalex.org/I130701444"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ling Liu","raw_affiliation_strings":["Georgia Institute of Technology","[Georgia Institute of Technology.]"],"affiliations":[{"raw_affiliation_string":"Georgia Institute of Technology","institution_ids":["https://openalex.org/I130701444"]},{"raw_affiliation_string":"[Georgia Institute of Technology.]","institution_ids":["https://openalex.org/I130701444"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5110002176"],"corresponding_institution_ids":["https://openalex.org/I4210085935"],"apc_list":null,"apc_paid":null,"fwci":4.3618,"has_fulltext":false,"cited_by_count":38,"citation_normalized_percentile":{"value":0.94441206,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"3","issue":"4","first_page":"1","last_page":"33"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8200892210006714},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.6374974846839905},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6343110799789429},{"id":"https://openalex.org/keywords/search-engine-indexing","display_name":"Search engine indexing","score":0.6082216501235962},{"id":"https://openalex.org/keywords/outsourcing","display_name":"Outsourcing","score":0.5692189931869507},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.48999348282814026},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.46455901861190796},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.46169599890708923},{"id":"https://openalex.org/keywords/data-access","display_name":"Data access","score":0.4400272071361542},{"id":"https://openalex.org/keywords/cloud-storage","display_name":"Cloud storage","score":0.4294847548007965},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.36711937189102173},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3287857174873352},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.18784353137016296}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8200892210006714},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.6374974846839905},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6343110799789429},{"id":"https://openalex.org/C75165309","wikidata":"https://www.wikidata.org/wiki/Q2258979","display_name":"Search engine indexing","level":2,"score":0.6082216501235962},{"id":"https://openalex.org/C46934059","wikidata":"https://www.wikidata.org/wiki/Q61515","display_name":"Outsourcing","level":2,"score":0.5692189931869507},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.48999348282814026},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.46455901861190796},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.46169599890708923},{"id":"https://openalex.org/C47487241","wikidata":"https://www.wikidata.org/wiki/Q5227230","display_name":"Data access","level":2,"score":0.4400272071361542},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.4294847548007965},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.36711937189102173},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3287857174873352},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.18784353137016296},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C136264566","wikidata":"https://www.wikidata.org/wiki/Q159810","display_name":"Economy","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1594173.1594175","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1594173.1594175","pdf_url":null,"source":{"id":"https://openalex.org/S131231701","display_name":"ACM Transactions on the Web","issn_l":"1559-1131","issn":["1559-1131","1559-114X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on the Web","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.4300000071525574}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W95284390","https://openalex.org/W100863554","https://openalex.org/W1535537103","https://openalex.org/W1572593068","https://openalex.org/W1656678770","https://openalex.org/W2028368347","https://openalex.org/W2043508455","https://openalex.org/W2054801486","https://openalex.org/W2105986919","https://openalex.org/W2114349788","https://openalex.org/W2131043660","https://openalex.org/W2132285835","https://openalex.org/W2133579007","https://openalex.org/W2147929033","https://openalex.org/W2150307013","https://openalex.org/W2161214567","https://openalex.org/W2161817975","https://openalex.org/W2418656106","https://openalex.org/W2621280964"],"related_works":["https://openalex.org/W2796974977","https://openalex.org/W1495119096","https://openalex.org/W2284242097","https://openalex.org/W2121067221","https://openalex.org/W2546066963","https://openalex.org/W2277948094","https://openalex.org/W2086058948","https://openalex.org/W2030860479","https://openalex.org/W2357522001","https://openalex.org/W2045901755"],"abstract_inverted_index":{"With":[0],"fast-paced":[1],"growth":[2],"of":[3,79,94,267,314],"digital":[4],"data":[5,50,80,150,306],"and":[6,58,131,172,195,217,239,312,317],"exploding":[7],"storage":[8,29,41,44,68,108],"management":[9],"costs,":[10],"enterprises":[11,38],"are":[12,235],"looking":[13],"for":[14,128,244,305],"new":[15,187],"ways":[16],"to":[17,33,42,98,136,158,166,202,226,241,255,264,281,300],"effectively":[18,289],"manage":[19],"their":[20,40],"data.":[21],"One":[22],"such":[23,275],"cost-effective":[24],"paradigm":[25],"is":[26,82,90,118,152,253,272],"the":[27,71,77,85,92,95,155,162,170,213,242,265,285,297,303,310],"cloud":[28],"model":[30],"also":[31],"referred":[32],"as":[34],"Storage-as-a-Service,":[35],"in":[36,91,178],"which":[37],"outsource":[39],"a":[43,54,62,119,145,186,199,219,273,318],"service":[45],"provider":[46],"(SSP)":[47],"by":[48],"storing":[49],"(usually":[51],"encrypted)":[52],"at":[53,284],"remote":[55],"SSP-managed":[56],"site":[57],"accessing":[59],"it":[60,89],"over":[61,106,113],"high":[63],"speed":[64],"network.":[65],"Along":[66],"with":[67,323],"capacity":[69],"used,":[70],"SSP":[72,86,171,243,286,304],"often":[73],"charges":[74],"clients":[75],"on":[76],"amount":[78],"that":[81,144,151,191,259,277],"accessed":[83],"from":[84,154,169],"site.":[87],"Thus,":[88],"interest":[93],"client":[96,298],"enterprise":[97,123,215,248,299],"download":[99],"only":[100],"relevant":[101],"content.":[102],"This":[103,293],"makes":[104],"search":[105,140,148,163,189,249,279],"outsourced":[107,115],"an":[109],"important":[110],"capability.":[111],"Searching":[112],"encrypted":[114,238],"storage,":[116],"however,":[117],"complex":[120],"challenge.":[121],"Each":[122],"has":[124,165],"different":[125,129],"access":[126,133,193,204,221,228],"privileges":[127],"users":[130],"this":[132,182],"control":[134,194,205,222,229],"needs":[135],"be":[137,176,282],"preserved":[138],"during":[139],"(for":[141],"example,":[142],"ensuring":[143],"user":[146],"cannot":[147],"through":[149],"inaccessible":[153],"filesystem":[156,188],"due":[157],"its":[159],"permissions).":[160],"Secondly,":[161],"mechanism":[164],"preserve":[167],"confidentiality":[168],"indices":[173,234,280],"can":[174],"not":[175,295],"stored":[177],"plain":[179],"text.":[180],"In":[181],"article,":[183],"we":[184],"present":[185],"technique":[190,276],"integrates":[192],"indexing/search":[196],"mechanisms":[197],"into":[198],"unified":[200],"framework":[201],"support":[203],"aware":[206],"search.":[207],"Our":[208],"approach":[209,252,271,316],"performs":[210],"indexing":[211],"within":[212,230],"trusted":[214],"domain":[216],"uses":[218],"novel":[220],"barrel":[223],"(ACB)":[224],"primitive":[225],"encapsulate":[227],"these":[231],"indices.":[232],"The":[233],"then":[236],"systematically":[237],"shipped":[240],"hosting.":[245],"Unlike":[246],"existing":[247],"techniques,":[250],"our":[251,268,270,315],"resilient":[254],"various":[256],"common":[257],"attacks":[258],"leak":[260],"private":[261],"information.":[262],"Additionally,":[263],"best":[266],"knowledge,":[269],"first":[274],"allows":[278],"hosted":[283],"site,":[287],"thus":[288],"providing":[290],"search-as-a-service":[291],".":[292],"does":[294],"require":[296],"fully":[301],"trust":[302],"confidentiality.":[307],"We":[308],"describe":[309],"architecture":[311],"implementation":[313],"detailed":[319],"experimental":[320],"analysis":[321],"comparing":[322],"other":[324],"approaches.":[325]},"counts_by_year":[{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":4},{"year":2015,"cited_by_count":6},{"year":2014,"cited_by_count":10},{"year":2013,"cited_by_count":4},{"year":2012,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
