{"id":"https://openalex.org/W2010537799","doi":"https://doi.org/10.1145/2019599.2019605","title":"Practical Oblivious Outsourced Storage","display_name":"Practical Oblivious Outsourced Storage","publication_year":2011,"publication_date":"2011-09-01","ids":{"openalex":"https://openalex.org/W2010537799","doi":"https://doi.org/10.1145/2019599.2019605","mag":"2010537799"},"language":"en","primary_location":{"id":"doi:10.1145/2019599.2019605","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2019599.2019605","pdf_url":null,"source":{"id":"https://openalex.org/S2642811","display_name":"ACM Transactions on Information and System Security","issn_l":"1094-9224","issn":["1094-9224","1557-7406"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Information and System Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5014125564","display_name":"Peter Williams","orcid":"https://orcid.org/0000-0002-5052-6540"},"institutions":[{"id":"https://openalex.org/I59553526","display_name":"Stony Brook University","ror":"https://ror.org/05qghxh33","country_code":"US","type":"education","lineage":["https://openalex.org/I59553526"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Peter Williams","raw_affiliation_strings":["Stony Brook University"],"affiliations":[{"raw_affiliation_string":"Stony Brook University","institution_ids":["https://openalex.org/I59553526"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032541561","display_name":"Radu Sion","orcid":"https://orcid.org/0000-0002-1237-8276"},"institutions":[{"id":"https://openalex.org/I59553526","display_name":"Stony Brook University","ror":"https://ror.org/05qghxh33","country_code":"US","type":"education","lineage":["https://openalex.org/I59553526"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Radu Sion","raw_affiliation_strings":["Stony Brook University"],"affiliations":[{"raw_affiliation_string":"Stony Brook University","institution_ids":["https://openalex.org/I59553526"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5011572999","display_name":"Miroslava Sot\u00e1kov\u00e1","orcid":null},"institutions":[{"id":"https://openalex.org/I59553526","display_name":"Stony Brook University","ror":"https://ror.org/05qghxh33","country_code":"US","type":"education","lineage":["https://openalex.org/I59553526"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Miroslava Sotakova","raw_affiliation_strings":["Stony Brook University"],"affiliations":[{"raw_affiliation_string":"Stony Brook University","institution_ids":["https://openalex.org/I59553526"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5014125564"],"corresponding_institution_ids":["https://openalex.org/I59553526"],"apc_list":null,"apc_paid":null,"fwci":2.1929,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.88760242,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":"14","issue":"2","first_page":"1","last_page":"28"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8765658140182495},{"id":"https://openalex.org/keywords/shuffling","display_name":"Shuffling","score":0.694713830947876},{"id":"https://openalex.org/keywords/probabilistic-logic","display_name":"Probabilistic logic","score":0.6518411040306091},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.49642592668533325},{"id":"https://openalex.org/keywords/bounded-function","display_name":"Bounded function","score":0.47912168502807617},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4481196403503418},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.44492462277412415},{"id":"https://openalex.org/keywords/computational-complexity-theory","display_name":"Computational complexity theory","score":0.4388046860694885},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.410576730966568},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.2438669502735138},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1984710693359375}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8765658140182495},{"id":"https://openalex.org/C167927819","wikidata":"https://www.wikidata.org/wiki/Q1930567","display_name":"Shuffling","level":2,"score":0.694713830947876},{"id":"https://openalex.org/C49937458","wikidata":"https://www.wikidata.org/wiki/Q2599292","display_name":"Probabilistic logic","level":2,"score":0.6518411040306091},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.49642592668533325},{"id":"https://openalex.org/C34388435","wikidata":"https://www.wikidata.org/wiki/Q2267362","display_name":"Bounded function","level":2,"score":0.47912168502807617},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4481196403503418},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.44492462277412415},{"id":"https://openalex.org/C179799912","wikidata":"https://www.wikidata.org/wiki/Q205084","display_name":"Computational complexity theory","level":2,"score":0.4388046860694885},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.410576730966568},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2438669502735138},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1984710693359375},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/2019599.2019605","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2019599.2019605","pdf_url":null,"source":{"id":"https://openalex.org/S2642811","display_name":"ACM Transactions on Information and System Security","issn_l":"1094-9224","issn":["1094-9224","1557-7406"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Information and System Security","raw_type":"journal-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.187.3239","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.187.3239","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.cs.stonybrook.edu/%7Esion/research/sion2011pir-tissec.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.44999998807907104,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G5502044415","display_name":null,"funder_award_id":"CT CNS-0627554CT CNS-0716608CRI CNS-0708025","funder_id":"https://openalex.org/F4320337388","funder_display_name":"Division of Computer and Network Systems"}],"funders":[{"id":"https://openalex.org/F4320337388","display_name":"Division of Computer and Network Systems","ror":"https://ror.org/02rdzmk74"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W73629738","https://openalex.org/W89064569","https://openalex.org/W171567834","https://openalex.org/W1490590996","https://openalex.org/W1493531320","https://openalex.org/W1544001366","https://openalex.org/W1548880861","https://openalex.org/W1549977838","https://openalex.org/W1878874188","https://openalex.org/W1988374166","https://openalex.org/W2037357643","https://openalex.org/W2057399436","https://openalex.org/W2076458424","https://openalex.org/W2105037262","https://openalex.org/W2134698082","https://openalex.org/W2150307013","https://openalex.org/W2259007241","https://openalex.org/W2751862591","https://openalex.org/W3004540582","https://openalex.org/W3145128584","https://openalex.org/W4206548448","https://openalex.org/W4285719527","https://openalex.org/W6606989391"],"related_works":["https://openalex.org/W4213239787","https://openalex.org/W4377131110","https://openalex.org/W2045745654","https://openalex.org/W2114337652","https://openalex.org/W4388857216","https://openalex.org/W2046590706","https://openalex.org/W4390419005","https://openalex.org/W2949444602","https://openalex.org/W1587991081","https://openalex.org/W2386184744"],"abstract_inverted_index":{"In":[0,32],"this":[1],"article":[2],"we":[3,64],"introduce":[4],"a":[5,12,36,127],"technique,":[6],"guaranteeing":[7],"access":[8,67,141],"pattern":[9,68,142],"privacy":[10,69],"against":[11],"computationally":[13],"bounded":[14],"adversary,":[15],"in":[16,61,126,162],"outsourced":[17],"data":[18,110,151],"storage,":[19],"with":[20,70],"communication":[21],"and":[22,52,134,136],"computation":[23],"overheads":[24],"orders":[25,157],"of":[26,35,39,59,73,109,158],"magnitude":[27,159],"better":[28],"than":[29,75,161],"existing":[30,94,163],"approaches.":[31],"the":[33,57,62,130],"presence":[34],"small":[37],"amount":[38],"temporary":[40],"storage":[41],"(enough":[42],"to":[43,113,118],"store":[44],"O":[45,76,88],"(\u221a":[46],"n":[47,49,55,79,91],"log":[48],")":[50,80,92],"items":[51,60],"IDs,":[53],"where":[54],"is":[56],"number":[58],"database),":[63],"can":[65,153],"achieve":[66,97],"computational":[71],"complexity":[72],"less":[74],"(log":[77,89],"2":[78],"per":[81],"query":[82],"(as":[83],"compared":[84],"to,":[85],"for":[86,93,140],"instance,":[87],"4":[90],"approaches).":[95],"We":[96,144],"these":[98],"novel":[99],"results":[100,125],"by":[101],"applying":[102],"new":[103],"insights":[104],"based":[105],"on":[106,147],"probabilistic":[107],"analyses":[108],"shuffling":[111],"algorithms":[112],"Oblivious":[114],"RAM,":[115],"allowing":[116],"us":[117],"significantly":[119],"improve":[120],"its":[121],"asymptotic":[122],"complexity.":[123],"This":[124],"protocol":[128],"crossing":[129],"boundary":[131],"between":[132],"theory":[133],"practice":[135],"becoming":[137],"generally":[138],"applicable":[139],"privacy.":[143],"show":[145],"that":[146],"off-the-shelf":[148],"hardware,":[149],"large":[150],"sets":[152],"be":[154],"queried":[155],"obliviously":[156],"faster":[160],"work.":[164]},"counts_by_year":[{"year":2016,"cited_by_count":1},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":2},{"year":2012,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
