{"id":"https://openalex.org/W2801938288","doi":"https://doi.org/10.23919/icitst.2017.8356345","title":"Forward secure searchable symmetric encryption","display_name":"Forward secure searchable symmetric encryption","publication_year":2017,"publication_date":"2017-12-01","ids":{"openalex":"https://openalex.org/W2801938288","doi":"https://doi.org/10.23919/icitst.2017.8356345","mag":"2801938288"},"language":"en","primary_location":{"id":"doi:10.23919/icitst.2017.8356345","is_oa":false,"landing_page_url":"https://doi.org/10.23919/icitst.2017.8356345","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5050999920","display_name":"Muhammad Saqib Niaz","orcid":null},"institutions":[{"id":"https://openalex.org/I95793202","display_name":"Otto-von-Guericke University Magdeburg","ror":"https://ror.org/00ggpsq73","country_code":"DE","type":"education","lineage":["https://openalex.org/I95793202"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Muhammad Saqib Niaz","raw_affiliation_strings":["Databases & Software Engineering, Otto von Guericke University, Magdeburg, Germany"],"affiliations":[{"raw_affiliation_string":"Databases & Software Engineering, Otto von Guericke University, Magdeburg, Germany","institution_ids":["https://openalex.org/I95793202"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5042946019","display_name":"Gunter Saake","orcid":"https://orcid.org/0000-0001-9576-8474"},"institutions":[{"id":"https://openalex.org/I95793202","display_name":"Otto-von-Guericke University Magdeburg","ror":"https://ror.org/00ggpsq73","country_code":"DE","type":"education","lineage":["https://openalex.org/I95793202"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Gunter Saake","raw_affiliation_strings":["Databases & Software Engineering, Otto von Guericke University, Magdeburg, Germany"],"affiliations":[{"raw_affiliation_string":"Databases & Software Engineering, Otto von Guericke University, Magdeburg, Germany","institution_ids":["https://openalex.org/I95793202"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5050999920"],"corresponding_institution_ids":["https://openalex.org/I95793202"],"apc_list":null,"apc_paid":null,"fwci":0.195,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.6579621,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"49","last_page":"54"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9927999973297119,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9796000123023987,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7972261905670166},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7790395021438599},{"id":"https://openalex.org/keywords/outsourcing","display_name":"Outsourcing","score":0.6884326338768005},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5984780788421631},{"id":"https://openalex.org/keywords/filesystem-level-encryption","display_name":"Filesystem-level encryption","score":0.5769484043121338},{"id":"https://openalex.org/keywords/symmetric-key-algorithm","display_name":"Symmetric-key algorithm","score":0.5388253927230835},{"id":"https://openalex.org/keywords/identifier","display_name":"Identifier","score":0.5191249251365662},{"id":"https://openalex.org/keywords/on-the-fly-encryption","display_name":"On-the-fly encryption","score":0.5009152889251709},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4264715909957886},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.3785948157310486},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.2959541082382202},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.28934407234191895}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7972261905670166},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7790395021438599},{"id":"https://openalex.org/C46934059","wikidata":"https://www.wikidata.org/wiki/Q61515","display_name":"Outsourcing","level":2,"score":0.6884326338768005},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5984780788421631},{"id":"https://openalex.org/C18319499","wikidata":"https://www.wikidata.org/wiki/Q5448402","display_name":"Filesystem-level encryption","level":4,"score":0.5769484043121338},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.5388253927230835},{"id":"https://openalex.org/C154504017","wikidata":"https://www.wikidata.org/wiki/Q853614","display_name":"Identifier","level":2,"score":0.5191249251365662},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.5009152889251709},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4264715909957886},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.3785948157310486},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2959541082382202},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.28934407234191895},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/icitst.2017.8356345","is_oa":false,"landing_page_url":"https://doi.org/10.23919/icitst.2017.8356345","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W1502708590","https://openalex.org/W1539859404","https://openalex.org/W1952562593","https://openalex.org/W2016575873","https://openalex.org/W2033165262","https://openalex.org/W2086763678","https://openalex.org/W2131043660","https://openalex.org/W2146828512","https://openalex.org/W2147929033","https://openalex.org/W2152516507","https://openalex.org/W2184702105","https://openalex.org/W2396162732","https://openalex.org/W2404098708","https://openalex.org/W2539385377","https://openalex.org/W6682311248","https://openalex.org/W6712634633","https://openalex.org/W6713547331"],"related_works":["https://openalex.org/W4385414763","https://openalex.org/W4315815885","https://openalex.org/W2774766036","https://openalex.org/W2411306012","https://openalex.org/W2413060814","https://openalex.org/W4385414388","https://openalex.org/W2792158747","https://openalex.org/W2605476161","https://openalex.org/W3086110896","https://openalex.org/W4378965730"],"abstract_inverted_index":{"Data":[0],"outsourcing":[1,40],"to":[2,21,44,53,70,85,94],"third":[3],"party":[4],"clouds":[5],"poses":[6],"numerous":[7],"data":[8,33,38,46,68,77,190],"security":[9,19,88],"threats.":[10],"Access":[11],"by":[12,30],"unauthorized":[13],"users":[14],"is":[15,62,179,214],"one":[16,64],"of":[17,112,120,137,185,204,209],"the":[18,22,32,45,63,67,95,110,118,134,158,164,172,183,188,196,200,210,212],"threat":[20],"outsourced":[23],"data.":[24],"Unauthorized":[25],"access":[26],"can":[27],"be":[28],"avoided":[29],"encrypting":[31,37],"before":[34,39],"outsourcing.":[35,78],"However,":[36],"renders":[41],"it":[42],"unsearchable":[43],"owner.":[47],"Searchable":[48],"encryption":[49,61,81,98],"schemes":[50,82,99],"are":[51,83,91,192],"developed":[52],"specifically":[54],"target":[55],"this":[56,143,205],"problem.":[57],"A":[58],"dynamic":[59,148],"searchable":[60,80,97,149],"that":[65,90,109,128,151],"allows":[66],"owner":[69],"add":[71],"or":[72],"delete":[73],"a":[74,113,121,129,138,147,186],"file":[75,114,135],"after":[76],"Dynamic":[79],"vulnerable":[84],"two":[86],"specific":[87],"threats":[89],"not":[92,116,132],"applicable":[93],"static":[96],"namely":[100],"forward":[101,153],"privacy":[102,107,126],"and":[103,168],"backward":[104,217],"privacy.":[105,154],"Forward":[106],"requires":[108,127],"addition":[111],"should":[115,131],"reveal":[117],"presence":[119],"previously":[122,139],"searched":[123],"keyword.":[124],"Backward":[125],"search":[130],"return":[133],"identifier":[136],"deleted":[140,194],"file.":[141],"In":[142],"paper,":[144],"we":[145],"propose":[146],"scheme":[150,178,213],"guarantees":[152],"It":[155],"only":[156],"uses":[157],"symmetric":[159],"key":[160],"algorithms":[161],"hence":[162],"reducing":[163],"requirements":[165],"for":[166],"storage":[167],"processing":[169],"power":[170],"on":[171],"client":[173],"side.":[174],"Furthermore,":[175],"our":[176],"proposed":[177],"space":[180,206],"reclaiming.":[181],"After":[182],"deletion":[184],"file,":[187],"redundant":[189],"nodes":[191],"also":[193,215],"from":[195],"secure":[197],"index":[198],"in":[199],"subsequent":[201],"searches.":[202],"Because":[203],"reclaiming":[207],"capability":[208],"scheme,":[211],"partially":[216],"private.":[218]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
