{"id":"https://openalex.org/W2121164847","doi":"https://doi.org/10.1145/2590296.2590323","title":"S-ORAM","display_name":"S-ORAM","publication_year":2014,"publication_date":"2014-05-30","ids":{"openalex":"https://openalex.org/W2121164847","doi":"https://doi.org/10.1145/2590296.2590323","mag":"2121164847"},"language":"en","primary_location":{"id":"doi:10.1145/2590296.2590323","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2590296.2590323","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 9th ACM symposium on Information, computer and communications security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100714818","display_name":"Jinsheng Zhang","orcid":"https://orcid.org/0009-0005-7905-1365"},"institutions":[{"id":"https://openalex.org/I173911158","display_name":"Iowa State University","ror":"https://ror.org/04rswrd78","country_code":"US","type":"education","lineage":["https://openalex.org/I173911158"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Jinsheng Zhang","raw_affiliation_strings":["Iowa State University, Ames, IA, USA","Iowa state university, Ames, IA, USA"],"affiliations":[{"raw_affiliation_string":"Iowa State University, Ames, IA, USA","institution_ids":["https://openalex.org/I173911158"]},{"raw_affiliation_string":"Iowa state university, Ames, IA, USA","institution_ids":["https://openalex.org/I173911158"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100414787","display_name":"Wensheng Zhang","orcid":"https://orcid.org/0000-0003-0752-941X"},"institutions":[{"id":"https://openalex.org/I173911158","display_name":"Iowa State University","ror":"https://ror.org/04rswrd78","country_code":"US","type":"education","lineage":["https://openalex.org/I173911158"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Wensheng Zhang","raw_affiliation_strings":["Iowa State University, Ames, IA, USA","Iowa state university, Ames, IA, USA"],"affiliations":[{"raw_affiliation_string":"Iowa State University, Ames, IA, USA","institution_ids":["https://openalex.org/I173911158"]},{"raw_affiliation_string":"Iowa state university, Ames, IA, USA","institution_ids":["https://openalex.org/I173911158"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5079810736","display_name":"Daji Qiao","orcid":"https://orcid.org/0000-0002-3662-6481"},"institutions":[{"id":"https://openalex.org/I173911158","display_name":"Iowa State University","ror":"https://ror.org/04rswrd78","country_code":"US","type":"education","lineage":["https://openalex.org/I173911158"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Daji Qiao","raw_affiliation_strings":["Iowa State University, Ames, IA, USA","Iowa state university, Ames, IA, USA"],"affiliations":[{"raw_affiliation_string":"Iowa State University, Ames, IA, USA","institution_ids":["https://openalex.org/I173911158"]},{"raw_affiliation_string":"Iowa state university, Ames, IA, USA","institution_ids":["https://openalex.org/I173911158"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100714818"],"corresponding_institution_ids":["https://openalex.org/I173911158"],"apc_list":null,"apc_paid":null,"fwci":1.636,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.87729585,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"147","last_page":"158"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.989799976348877,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9876000285148621,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7616153955459595},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.5420622825622559},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5270265340805054},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.497283011674881},{"id":"https://openalex.org/keywords/shuffling","display_name":"Shuffling","score":0.45809584856033325},{"id":"https://openalex.org/keywords/bandwidth","display_name":"Bandwidth (computing)","score":0.43868303298950195},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.4107523560523987},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.3374602198600769},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.29927098751068115},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.10357910394668579}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7616153955459595},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.5420622825622559},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5270265340805054},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.497283011674881},{"id":"https://openalex.org/C167927819","wikidata":"https://www.wikidata.org/wiki/Q1930567","display_name":"Shuffling","level":2,"score":0.45809584856033325},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.43868303298950195},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.4107523560523987},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.3374602198600769},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.29927098751068115},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.10357910394668579},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2590296.2590323","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2590296.2590323","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 9th ACM symposium on Information, computer and communications security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1680103608","display_name":null,"funder_award_id":"N00014-09-1-0748","funder_id":"https://openalex.org/F4320337345","funder_display_name":"Office of Naval Research"},{"id":"https://openalex.org/G3301741750","display_name":null,"funder_award_id":"EECS-1128312","funder_id":"https://openalex.org/F4320337392","funder_display_name":"Division of Electrical, Communications and Cyber Systems"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320337345","display_name":"Office of Naval Research","ror":"https://ror.org/00rk2pe57"},{"id":"https://openalex.org/F4320337392","display_name":"Division of Electrical, Communications and Cyber Systems","ror":"https://ror.org/01krpsy48"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W148817282","https://openalex.org/W1545698365","https://openalex.org/W1593228295","https://openalex.org/W1684309424","https://openalex.org/W1704895987","https://openalex.org/W1988374166","https://openalex.org/W1995227741","https://openalex.org/W2000461888","https://openalex.org/W2014465787","https://openalex.org/W2037357643","https://openalex.org/W2065306547","https://openalex.org/W2076458424","https://openalex.org/W2082801123","https://openalex.org/W2096379058","https://openalex.org/W2115083413","https://openalex.org/W2141389982","https://openalex.org/W2167394920","https://openalex.org/W2170993700","https://openalex.org/W2238866705","https://openalex.org/W2404098708","https://openalex.org/W2964133768","https://openalex.org/W6637411694","https://openalex.org/W6689810000"],"related_works":["https://openalex.org/W4213239787","https://openalex.org/W2045745654","https://openalex.org/W2114337652","https://openalex.org/W4377131110","https://openalex.org/W4388857216","https://openalex.org/W4294559962","https://openalex.org/W2046590706","https://openalex.org/W4390419005","https://openalex.org/W2949444602","https://openalex.org/W1587991081"],"abstract_inverted_index":{"As":[0],"outsourcing":[1],"data":[2,15],"to":[3,26,67,145,169],"remote":[4],"storage":[5,42,105,165],"servers":[6],"gets":[7],"popular,":[8],"protecting":[9],"user's":[10],"pattern":[11],"in":[12,32,128],"accessing":[13],"these":[14],"has":[16,34],"become":[17],"a":[18,52,88,93],"big":[19],"concern.":[20],"ORAM":[21,54,111,116],"constructions":[22],"are":[23,119],"promising":[24],"solutions":[25],"this":[27,47,49],"issue,":[28],"but":[29],"their":[30],"application":[31],"practice":[33],"been":[35],"impeded":[36],"by":[37,75],"the":[38,69,109,114,120,138,154,178],"high":[39],"communication":[40,103,139],"and":[41,64,73,104,113,123,131,159,166],"overheads":[43],"incurred.":[44],"Towards":[45],"addressing":[46],"challenge,":[48],"paper":[50],"proposes":[51],"segmentation-based":[53],"(S-ORAM).":[55],"It":[56],"adopts":[57],"two":[58],"segment-based":[59,65],"techniques,":[60],"namely,":[61],"piece-wise":[62],"shuffling":[63,72],"query,":[66],"improve":[68],"performance":[70],"of":[71,97,102,141],"query":[74],"factoring":[76],"block":[77],"size":[78],"into":[79],"design.":[80],"Extensive":[81],"security":[82],"analysis":[83],"proves":[84],"that":[85],"S-ORAM":[86,107,142,160],"is":[87,143],"highly":[89],"secure":[90],"solution":[91],"with":[92],"negligible":[94],"failure":[95],"probability":[96],"O(N-log":[98],"N).":[99],"In":[100],"terms":[101],"overheads,":[106],"outperforms":[108],"Balanced":[110],"(B-ORAM)":[112],"Path":[115],"(P-ORAM),":[117],"which":[118],"state-of-the-art":[121],"hash":[122],"index":[124],"based":[125],"ORAMs":[126],"respectively,":[127],"both":[129],"practical":[130,136],"theoretical":[132],"evaluations.":[133],"Particularly":[134],"under":[135],"settings,":[137],"overhead":[140],"12":[144],"23":[146],"times":[147],"less":[148,163,171],"than":[149,173],"B-ORAM":[150],"when":[151,175],"they":[152,176],"have":[153,177],"same":[155],"constant-size":[156],"user-side":[157,181],"storage,":[158],"consumes":[161],"80%":[162],"server-side":[164],"around":[167],"60%":[168],"72%":[170],"bandwidth":[172],"P-ORAM":[174],"similar":[179],"logarithmic-size":[180],"storage.":[182]},"counts_by_year":[{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-06-24T00:00:00"}
