{"id":"https://openalex.org/W2403694173","doi":"https://doi.org/10.1145/2897845.2897884","title":"Secure Dynamic SSE via Access Indistinguishable Storage","display_name":"Secure Dynamic SSE via Access Indistinguishable Storage","publication_year":2016,"publication_date":"2016-05-27","ids":{"openalex":"https://openalex.org/W2403694173","doi":"https://doi.org/10.1145/2897845.2897884","mag":"2403694173"},"language":"en","primary_location":{"id":"doi:10.1145/2897845.2897884","is_oa":true,"landing_page_url":"https://doi.org/10.1145/2897845.2897884","pdf_url":"http://dl.acm.org/ft_gateway.cfm?id=2897884&type=pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"http://dl.acm.org/ft_gateway.cfm?id=2897884&type=pdf","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100610986","display_name":"Tianhao Wang","orcid":"https://orcid.org/0000-0002-9017-7947"},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Tianhao Wang","raw_affiliation_strings":["Purdue University, West Lafayette, IN, USA"],"affiliations":[{"raw_affiliation_string":"Purdue University, West Lafayette, IN, USA","institution_ids":["https://openalex.org/I219193219"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101712881","display_name":"Yunlei Zhao","orcid":"https://orcid.org/0000-0002-2623-9170"},"institutions":[{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yunlei Zhao","raw_affiliation_strings":["Fudan University &amp; State Key Laboratory of Cryptology, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Fudan University &amp; State Key Laboratory of Cryptology, Shanghai, China","institution_ids":["https://openalex.org/I4210132990","https://openalex.org/I24943067"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5100610986"],"corresponding_institution_ids":["https://openalex.org/I219193219"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":3,"citation_normalized_percentile":{"value":0.05369768,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"535","last_page":"546"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8018087148666382},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7161738276481628},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.674225389957428},{"id":"https://openalex.org/keywords/cloud-storage","display_name":"Cloud storage","score":0.6255283355712891},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6250866055488586},{"id":"https://openalex.org/keywords/filesystem-level-encryption","display_name":"Filesystem-level encryption","score":0.5304868817329407},{"id":"https://openalex.org/keywords/outsourcing","display_name":"Outsourcing","score":0.5243954062461853},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5050426125526428},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5003983974456787},{"id":"https://openalex.org/keywords/data-access","display_name":"Data access","score":0.4421215355396271},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.33743077516555786},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.303199827671051},{"id":"https://openalex.org/keywords/on-the-fly-encryption","display_name":"On-the-fly encryption","score":0.2545343041419983}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8018087148666382},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7161738276481628},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.674225389957428},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.6255283355712891},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6250866055488586},{"id":"https://openalex.org/C18319499","wikidata":"https://www.wikidata.org/wiki/Q5448402","display_name":"Filesystem-level encryption","level":4,"score":0.5304868817329407},{"id":"https://openalex.org/C46934059","wikidata":"https://www.wikidata.org/wiki/Q61515","display_name":"Outsourcing","level":2,"score":0.5243954062461853},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5050426125526428},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5003983974456787},{"id":"https://openalex.org/C47487241","wikidata":"https://www.wikidata.org/wiki/Q5227230","display_name":"Data access","level":2,"score":0.4421215355396271},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.33743077516555786},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.303199827671051},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.2545343041419983},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2897845.2897884","is_oa":true,"landing_page_url":"https://doi.org/10.1145/2897845.2897884","pdf_url":"http://dl.acm.org/ft_gateway.cfm?id=2897884&type=pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/2897845.2897884","is_oa":true,"landing_page_url":"https://doi.org/10.1145/2897845.2897884","pdf_url":"http://dl.acm.org/ft_gateway.cfm?id=2897884&type=pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1231421488","display_name":null,"funder_award_id":"under","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2735831771","display_name":null,"funder_award_id":"U1536205","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3214160367","display_name":null,"funder_award_id":"No. 11","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3451337601","display_name":null,"funder_award_id":"1536205","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G37568934","display_name":null,"funder_award_id":"Grant","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5167091242","display_name":null,"funder_award_id":"No. 1","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5172587934","display_name":null,"funder_award_id":"61472084, 61272012, U1536205","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7726157001","display_name":null,"funder_award_id":"Grant No.","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7846354615","display_name":null,"funder_award_id":"61272012","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7991443049","display_name":null,"funder_award_id":"61472084","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G848032724","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G8657973306","display_name":null,"funder_award_id":"1116991","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2403694173.pdf","grobid_xml":"https://content.openalex.org/works/W2403694173.grobid-xml"},"referenced_works_count":25,"referenced_works":["https://openalex.org/W89553247","https://openalex.org/W1480620864","https://openalex.org/W1490590996","https://openalex.org/W1545698365","https://openalex.org/W1887472920","https://openalex.org/W1988374166","https://openalex.org/W1993536048","https://openalex.org/W2011212169","https://openalex.org/W2014465787","https://openalex.org/W2016575873","https://openalex.org/W2033165262","https://openalex.org/W2040193872","https://openalex.org/W2067410255","https://openalex.org/W2079493184","https://openalex.org/W2086763678","https://openalex.org/W2096379058","https://openalex.org/W2102881299","https://openalex.org/W2144140331","https://openalex.org/W2146828512","https://openalex.org/W2147758029","https://openalex.org/W2147929033","https://openalex.org/W2152516507","https://openalex.org/W2170993700","https://openalex.org/W2404098708","https://openalex.org/W4300782482"],"related_works":["https://openalex.org/W4315815885","https://openalex.org/W1484220609","https://openalex.org/W2915067502","https://openalex.org/W1977203299","https://openalex.org/W3097424423","https://openalex.org/W4284976629","https://openalex.org/W2293431571","https://openalex.org/W4205100462","https://openalex.org/W2055187455","https://openalex.org/W3206362444"],"abstract_inverted_index":{"Cloud":[0],"storage":[1,35,106],"services":[2],"such":[3],"as":[4,165,167],"Dropbox":[5],"[1]":[6],"and":[7,14,27,123,147,157],"Google":[8],"Drive":[9],"[2]":[10],"are":[11,46,54],"becoming":[12],"more":[13,15],"popular.":[16],"On":[17],"the":[18,34,58,70,79,93,104,118,133,142,151,155],"one":[19,62],"hand,":[20],"they":[21],"provide":[22],"users":[23],"with":[24],"mobility,":[25],"scalability,":[26],"convenience.":[28],"However,":[29],"privacy":[30],"issues":[31],"arise":[32],"when":[33],"becomes":[36],"not":[37],"fully":[38],"controlled":[39],"by":[40],"users.":[41],"Although":[42],"modern":[43],"encryption":[44,76],"schemes":[45],"effective":[47],"at":[48],"protecting":[49],"content":[50],"of":[51,57,64,69,103,120,125,150,159],"data,":[52],"there":[53,168],"two":[55],"drawbacks":[56],"encryption-before-outsourcing":[59],"approach:":[60],"First,":[61],"kind":[63],"sensitive":[65],"information,":[66],"Access":[67],"Pattern":[68],"data":[71,80,111],"is":[72,169],"left":[73],"unprotected.":[74],"Moreover,":[75,154],"usually":[77],"makes":[78],"difficult":[81],"to":[82,132],"use.":[83],"In":[84],"this":[85],"paper,":[86],"we":[87],"propose":[88],"AIS":[89,113,138],"(Access":[90],"Indistinguishable":[91],"Storage),":[92],"first":[94],"client-side":[95],"system":[96],"that":[97],"can":[98,114,139],"partially":[99],"conceal":[100,115,141],"access":[101,134,171],"pattern":[102],"cloud":[105],"in":[107],"constant":[108],"time.":[109],"Besides":[110],"content,":[112],"information":[116],"about":[117],"number":[119],"initial":[121,127],"files,":[122],"length":[124,158],"each":[126,160],"file.":[128],"When":[129],"it":[130],"comes":[131],"phase":[135],"after":[136,172],"initiation,":[137],"effectively":[140],"behavior":[143],"(read":[144],"or":[145],"write)":[146],"target":[148],"file":[149,161],"current":[152],"access.":[153],"existence":[156],"will":[162],"remain":[163],"confidential":[164],"long":[166],"no":[170],"initiation.":[173]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2026-04-16T08:26:57.006410","created_date":"2025-10-10T00:00:00"}
