{"id":"https://openalex.org/W2037743788","doi":"https://doi.org/10.1145/2675682.2676397","title":"SUDO","display_name":"SUDO","publication_year":2014,"publication_date":"2014-10-28","ids":{"openalex":"https://openalex.org/W2037743788","doi":"https://doi.org/10.1145/2675682.2676397","mag":"2037743788"},"language":"en","primary_location":{"id":"doi:10.1145/2675682.2676397","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2675682.2676397","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 1st ACM SIGSPATIAL International Workshop on Privacy in Geographic Information Collection and Analysis","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100428785","display_name":"Ling\u2010Jyh Chen","orcid":"https://orcid.org/0000-0001-5667-7764"},"institutions":[{"id":"https://openalex.org/I4210098366","display_name":"Institute of Information Science, Academia Sinica","ror":"https://ror.org/00z83z196","country_code":"TW","type":"facility","lineage":["https://openalex.org/I4210098366","https://openalex.org/I84653119"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Ling-Jyh Chen","raw_affiliation_strings":["Institute of Information Science, Academia Sinica"],"affiliations":[{"raw_affiliation_string":"Institute of Information Science, Academia Sinica","institution_ids":["https://openalex.org/I4210098366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081403826","display_name":"Chen-Ruei Hong","orcid":null},"institutions":[{"id":"https://openalex.org/I134161618","display_name":"National Taiwan Normal University","ror":"https://ror.org/059dkdx38","country_code":"TW","type":"education","lineage":["https://openalex.org/I134161618"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Chen-Ruei Hong","raw_affiliation_strings":["National Taiwan Normal University"],"affiliations":[{"raw_affiliation_string":"National Taiwan Normal University","institution_ids":["https://openalex.org/I134161618"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028708524","display_name":"Dong\u2013Po Deng","orcid":"https://orcid.org/0000-0001-7416-388X"},"institutions":[{"id":"https://openalex.org/I4210098366","display_name":"Institute of Information Science, Academia Sinica","ror":"https://ror.org/00z83z196","country_code":"TW","type":"facility","lineage":["https://openalex.org/I4210098366","https://openalex.org/I84653119"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Dongpo Deng","raw_affiliation_strings":["Institute of Information Science, Academia Sinica"],"affiliations":[{"raw_affiliation_string":"Institute of Information Science, Academia Sinica","institution_ids":["https://openalex.org/I4210098366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083385772","display_name":"Hu-Cheng Lee","orcid":null},"institutions":[{"id":"https://openalex.org/I4210098366","display_name":"Institute of Information Science, Academia Sinica","ror":"https://ror.org/00z83z196","country_code":"TW","type":"facility","lineage":["https://openalex.org/I4210098366","https://openalex.org/I84653119"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Hu-Cheng Lee","raw_affiliation_strings":["Institute of Information Science, Academia Sinica"],"affiliations":[{"raw_affiliation_string":"Institute of Information Science, Academia Sinica","institution_ids":["https://openalex.org/I4210098366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025213400","display_name":"Hsin-Hung Hsieh","orcid":"https://orcid.org/0000-0001-5879-1552"},"institutions":[{"id":"https://openalex.org/I4210098366","display_name":"Institute of Information Science, Academia Sinica","ror":"https://ror.org/00z83z196","country_code":"TW","type":"facility","lineage":["https://openalex.org/I4210098366","https://openalex.org/I84653119"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Hsin-Hung Hsieh","raw_affiliation_strings":["Institute of Information Science, Academia Sinica"],"affiliations":[{"raw_affiliation_string":"Institute of Information Science, Academia Sinica","institution_ids":["https://openalex.org/I4210098366"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100428785"],"corresponding_institution_ids":["https://openalex.org/I4210098366"],"apc_list":null,"apc_paid":null,"fwci":0.409,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.7379091,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9695000052452087,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7406716346740723},{"id":"https://openalex.org/keywords/location-based-service","display_name":"Location-based service","score":0.5928869247436523},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5889983177185059},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.464688777923584},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.45827269554138184},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.4205673038959503},{"id":"https://openalex.org/keywords/outsourcing","display_name":"Outsourcing","score":0.41455739736557007},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4109608232975006},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.3514893054962158},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.14118480682373047}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7406716346740723},{"id":"https://openalex.org/C155292070","wikidata":"https://www.wikidata.org/wiki/Q1198122","display_name":"Location-based service","level":2,"score":0.5928869247436523},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5889983177185059},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.464688777923584},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.45827269554138184},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.4205673038959503},{"id":"https://openalex.org/C46934059","wikidata":"https://www.wikidata.org/wiki/Q61515","display_name":"Outsourcing","level":2,"score":0.41455739736557007},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4109608232975006},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.3514893054962158},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.14118480682373047},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2675682.2676397","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2675682.2676397","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 1st ACM SIGSPATIAL International Workshop on Privacy in Geographic Information Collection and Analysis","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3700862683","display_name":null,"funder_award_id":"101-2628-E-001-004-MY3, 102-2219-E-001-002","funder_id":"https://openalex.org/F4320322795","funder_display_name":"Ministry of Science and Technology, Taiwan"},{"id":"https://openalex.org/G847317719","display_name":null,"funder_award_id":"AS-102-TP-A06","funder_id":"https://openalex.org/F4320321041","funder_display_name":"Academia Sinica"}],"funders":[{"id":"https://openalex.org/F4320321041","display_name":"Academia Sinica","ror":"https://ror.org/05bxb3784"},{"id":"https://openalex.org/F4320322795","display_name":"Ministry of Science and Technology, Taiwan","ror":"https://ror.org/02kv4zf79"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W1572300106","https://openalex.org/W1584714745","https://openalex.org/W1689932539","https://openalex.org/W1985991610","https://openalex.org/W2056773559","https://openalex.org/W2089959302","https://openalex.org/W2102611836","https://openalex.org/W2116347193","https://openalex.org/W2132172731","https://openalex.org/W2149692139","https://openalex.org/W2154496743","https://openalex.org/W2159890390","https://openalex.org/W2159992568","https://openalex.org/W2613648655","https://openalex.org/W4242306072"],"related_works":["https://openalex.org/W17155033","https://openalex.org/W3207760230","https://openalex.org/W1496222301","https://openalex.org/W4312814274","https://openalex.org/W1590307681","https://openalex.org/W2536018345","https://openalex.org/W4285370786","https://openalex.org/W2296488620","https://openalex.org/W2358353312","https://openalex.org/W2353836703"],"abstract_inverted_index":{"Location-based":[0],"systems":[1],"(LBS)":[2],"represent":[3],"an":[4],"emerging":[5,67],"genre":[6],"of":[7,18,65,69,93,111],"applications":[8],"that":[9,107],"exploit":[10],"positioning":[11],"technologies":[12],"and":[13,36,40,80,101,127,129],"facilitate":[14],"a":[15,82],"wide":[16],"range":[17],"location-based":[19],"services.":[20],"Unlike":[21],"conventional":[22],"information":[23,41],"systems,":[24],"LBS":[25,31,70,116,135],"data":[26,32,136],"management":[27,137],"is":[28,33,109,124],"challenging":[29],"because":[30],"high":[34],"dimensional":[35],"spatio-temporal":[37],"in":[38,45,63,133],"nature,":[39],"leakage":[42],"may":[43],"result":[44],"location":[46,113],"related":[47],"privacy":[48,114],"crises.":[49],"The":[50],"issue":[51],"has":[52,60],"become":[53,61],"even":[54],"more":[55],"complicated,":[56],"as":[57],"database":[58],"outsourcing":[59],"inevitable":[62],"view":[64],"the":[66,77,91,121],"popularity":[68],"deployment.":[71],"In":[72],"this":[73],"paper,":[74],"we":[75,105],"tackle":[76],"research":[78],"challenge":[79],"propose":[81],"SecUre":[83],"Database":[84],"Outsourcing":[85],"system,":[86],"called":[87],"SUDO.":[88],"By":[89],"combining":[90],"techniques":[92],"Hilbert":[94],"space-filling":[95],"curves,":[96],"different":[97,118],"invertible":[98],"encryption":[99],"algorithms,":[100],"genuine":[102],"mixed":[103],"data,":[104],"show":[106],"SUDO":[108],"capable":[110],"preserving":[112],"for":[115],"against":[117],"attacks.":[119],"Moreover,":[120],"proposed":[122],"solution":[123],"simple,":[125],"effective,":[126],"scalable;":[128],"it":[130],"shows":[131],"promise":[132],"supporting":[134],"with":[138],"outsourced":[139],"databases.":[140]},"counts_by_year":[{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-06-24T00:00:00"}
