{"id":"https://openalex.org/W3215791279","doi":"https://doi.org/10.1145/3472717","title":"C3PO: <u>C</u> loud-based <u>C</u> onfidentiality-preserving <u>C</u> ontinuous Query <u>P</u> r <u>o</u> cessing","display_name":"C3PO: <u>C</u> loud-based <u>C</u> onfidentiality-preserving <u>C</u> ontinuous Query <u>P</u> r <u>o</u> cessing","publication_year":2021,"publication_date":"2021-11-23","ids":{"openalex":"https://openalex.org/W3215791279","doi":"https://doi.org/10.1145/3472717","mag":"3215791279"},"language":"en","primary_location":{"id":"doi:10.1145/3472717","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3472717","pdf_url":null,"source":{"id":"https://openalex.org/S4210174050","display_name":"ACM Transactions on Privacy and Security","issn_l":"2471-2566","issn":["2471-2566","2471-2574"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Privacy and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5030389875","display_name":"Savvas Savvides","orcid":"https://orcid.org/0000-0002-2971-0933"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Savvas Savvides","raw_affiliation_strings":["Fortanix Inc. USA ,\u00a0and\u00a0 Purdue University, Mountain View, CA, USA"],"affiliations":[{"raw_affiliation_string":"Fortanix Inc. USA ,\u00a0and\u00a0 Purdue University, Mountain View, CA, USA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073113225","display_name":"Seema Kumar","orcid":"https://orcid.org/0000-0002-4754-588X"},"institutions":[{"id":"https://openalex.org/I31512782","display_name":"Technical University of Darmstadt","ror":"https://ror.org/05n911h24","country_code":"DE","type":"education","lineage":["https://openalex.org/I31512782"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Seema Kumar","raw_affiliation_strings":["TU Darmstadt, Darmstadt, Germany"],"affiliations":[{"raw_affiliation_string":"TU Darmstadt, Darmstadt, Germany","institution_ids":["https://openalex.org/I31512782"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037106943","display_name":"Julian James Stephen","orcid":"https://orcid.org/0000-0003-2613-531X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Julian James Stephen","raw_affiliation_strings":["IBM T. J. Watson Research Center, Yorktown, NY, USA"],"affiliations":[{"raw_affiliation_string":"IBM T. J. Watson Research Center, Yorktown, NY, USA","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5024420075","display_name":"Patrick Eugster","orcid":"https://orcid.org/0000-0003-3864-9078"},"institutions":[{"id":"https://openalex.org/I31512782","display_name":"Technical University of Darmstadt","ror":"https://ror.org/05n911h24","country_code":"DE","type":"education","lineage":["https://openalex.org/I31512782"]},{"id":"https://openalex.org/I57201433","display_name":"Universit\u00e0 della Svizzera italiana","ror":"https://ror.org/03c4atk17","country_code":"CH","type":"education","lineage":["https://openalex.org/I57201433"]}],"countries":["CH","DE"],"is_corresponding":false,"raw_author_name":"Patrick Eugster","raw_affiliation_strings":["Universit\u00e0 della Svizzera italiana, Switzerland, Purdue University USA, TU Darmstadt Germany, \u00a0and\u00a0SensorHound Inc., USA"],"affiliations":[{"raw_affiliation_string":"Universit\u00e0 della Svizzera italiana, Switzerland, Purdue University USA, TU Darmstadt Germany, \u00a0and\u00a0SensorHound Inc., USA","institution_ids":["https://openalex.org/I57201433","https://openalex.org/I31512782"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5030389875"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.136,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.56913854,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"25","issue":"1","first_page":"1","last_page":"36"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.8777852058410645},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8154224157333374},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7611534595489502},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.6402873396873474},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6263598799705505},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.594758152961731},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.5048952698707581},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4401487112045288},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4349070191383362},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.41847294569015503},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4180000424385071},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.3621729016304016},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.35371941328048706},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.19985905289649963},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.13781991600990295}],"concepts":[{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.8777852058410645},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8154224157333374},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7611534595489502},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.6402873396873474},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6263598799705505},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.594758152961731},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.5048952698707581},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4401487112045288},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4349070191383362},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.41847294569015503},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4180000424385071},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.3621729016304016},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.35371941328048706},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.19985905289649963},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.13781991600990295}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3472717","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3472717","pdf_url":null,"source":{"id":"https://openalex.org/S4210174050","display_name":"ACM Transactions on Privacy and Security","issn_l":"2471-2566","issn":["2471-2566","2471-2574"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Privacy and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6299999952316284,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[{"id":"https://openalex.org/G4824101800","display_name":null,"funder_award_id":"N11AP20014","funder_id":"https://openalex.org/F4320332180","funder_display_name":"Defense Advanced Research Projects Agency"},{"id":"https://openalex.org/G5883876326","display_name":null,"funder_award_id":"SFB-1053","funder_id":"https://openalex.org/F4320320879","funder_display_name":"Deutsche Forschungsgemeinschaft"}],"funders":[{"id":"https://openalex.org/F4320320879","display_name":"Deutsche Forschungsgemeinschaft","ror":"https://ror.org/018mejw64"},{"id":"https://openalex.org/F4320332180","display_name":"Defense Advanced Research Projects Agency","ror":"https://ror.org/02caytj08"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W150223756","https://openalex.org/W1544327602","https://openalex.org/W1556683487","https://openalex.org/W1572300106","https://openalex.org/W1895952394","https://openalex.org/W1975769195","https://openalex.org/W1993536048","https://openalex.org/W2008503861","https://openalex.org/W2074388704","https://openalex.org/W2092071682","https://openalex.org/W2092619935","https://openalex.org/W2108834246","https://openalex.org/W2111664921","https://openalex.org/W2117496982","https://openalex.org/W2132172731","https://openalex.org/W2134643721","https://openalex.org/W2138992486","https://openalex.org/W2182783245","https://openalex.org/W2289689155","https://openalex.org/W2401959250","https://openalex.org/W2541133059","https://openalex.org/W2613240540","https://openalex.org/W2740838595","https://openalex.org/W2753910905","https://openalex.org/W2765747403","https://openalex.org/W2773773675","https://openalex.org/W2943619665","https://openalex.org/W2970420884","https://openalex.org/W3014084098","https://openalex.org/W3020850631","https://openalex.org/W3045250997","https://openalex.org/W3105926382","https://openalex.org/W4210300416","https://openalex.org/W4236277626","https://openalex.org/W4297664342","https://openalex.org/W4298112463"],"related_works":["https://openalex.org/W3028898974","https://openalex.org/W2384844478","https://openalex.org/W1755636270","https://openalex.org/W3192883662","https://openalex.org/W2887779253","https://openalex.org/W4386907889","https://openalex.org/W2912162584","https://openalex.org/W4388894064","https://openalex.org/W3092327956","https://openalex.org/W2048539412"],"abstract_inverted_index":{"With":[0],"the":[1,4,28,36,48,52,103,129,137,141,150,180,216,222],"advent":[2],"of":[3,6,10,65,143,152,182,189,218,224],"Internet":[5],"things":[7],"(IoT),":[8],"billions":[9],"devices":[11,191],"are":[12],"expected":[13],"to":[14,27,46,51,85,110,118,136,139,205],"continuously":[15],"collect":[16],"and":[17,115,165,176,197,214,228],"process":[18],"sensitive":[19,82],"data":[20,50,66,83,89],"(e.g.,":[21],"location,":[22],"personal":[23],"health":[24],"factors).":[25],"Due":[26],"limited":[29],"computational":[30,196],"capacity":[31],"available":[32],"on":[33,231],"IoT":[34,43,190,232],"devices,":[35],"current":[37],"de":[38],"facto":[39],"model":[40],"for":[41,54,61,77],"building":[42,57],"applications":[44],"is":[45,109],"send":[47],"gathered":[49],"cloud":[53,59,75,167],"computation.":[55],"While":[56],"private":[58],"infrastructures":[60,76],"handling":[62],"large":[63],"amounts":[64],"streams":[67],"can":[68,158],"be":[69,159],"expensive,":[70],"using":[71,225],"low-cost":[72],"public":[73,104],"(untrusted)":[74],"processing":[78,99],"continuous":[79,97],"queries":[80],"including":[81],"leads":[84],"strong":[86],"concerns":[87],"over":[88],"confidentiality.":[90],"This":[91],"article":[92],"presents":[93],"C3PO,":[94],"a":[95,201,206,211],"confidentiality-preserving,":[96],"query":[98],"engine,":[100],"that":[101,192],"leverages":[102],"cloud.":[105,131],"The":[106],"key":[107],"idea":[108],"intelligently":[111],"utilize":[112],"partially":[113,226],"homomorphic":[114,227],"property-preserving":[116,229],"encryption":[117,230],"perform":[119],"as":[120,125],"many":[121],"computationally":[122],"intensive":[123],"operations":[124],"possible\u2014without":[126],"revealing":[127],"plaintext\u2014in":[128],"untrusted":[130,163],"C3PO":[132],"provides":[133],"simple":[134],"abstractions":[135],"developer":[138],"hide":[140],"complexities":[142],"applying":[144],"complex":[145],"cryptographic":[146],"primitives,":[147,154],"reasoning":[148],"about":[149],"performance":[151],"such":[153],"deciding":[155],"which":[156],"computations":[157],"executed":[160],"in":[161,194],"an":[162],"tier,":[164],"optimizing":[166],"resource":[168],"usage.":[169],"An":[170],"empirical":[171],"evaluation":[172],"with":[173,210],"several":[174],"benchmarks":[175],"case":[177],"studies":[178],"shows":[179],"feasibility":[181,223],"our":[183],"approach.":[184],"We":[185],"consider":[186],"different":[187],"classes":[188],"differ":[193],"their":[195],"memory":[198],"resources":[199],"(from":[200],"Raspberry":[202],"Pi":[203],"3":[204],"very":[207],"small":[208],"device":[209],"Cortex-M3":[212],"microprocessor)":[213],"through":[215],"use":[217],"optimizations,":[219],"we":[220],"demonstrate":[221],"devices.":[233]},"counts_by_year":[{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
