iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1145/3548657
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,5]],"date-time":"2024-08-05T19:20:26Z","timestamp":1722885626197},"reference-count":52,"publisher":"Association for Computing Machinery (ACM)","issue":"3","funder":[{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"crossref","award":["62072051"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Cyber-Phys. Syst."],"published-print":{"date-parts":[[2022,7,31]]},"abstract":"In the Internet of Things (IoT) era, various IoT devices are equipped with sensing capabilities and employed to support clinical applications. The massive electronic health records (EHRs) are expected to be stored in the cloud, where the data are usually encrypted, and the encrypted data can be used for disease diagnosis. There exist some numeric health indicators, such as blood pressure and heart rate. These numeric indicators can be classified into multiple ranges, and each range may represent an indication of normality or abnormity. Once receiving encrypted IoT data, the CS maps it to one of the ranges, achieving timely monitoring and diagnosis of health indicators. This article presents a new approach to identify the range that an encrypted numeric value corresponds to without exposing the explicit value. We establish the sufficient and necessary condition to convert a range query to matchings of encrypted binary sequences with the minimum number of matching operations. We further apply the minimization of range queries to design and implement a secure range query system, where numeric health indicators encrypted independently by multiple IoT devices can be cohesively stored and efficiently queried by using Lagrange polynomial interpolation. Comprehensive performance studies show that the proposed approach can protect both the health records and range query against untrusted cloud platforms and requires less computational and communication cost than existing techniques.<\/jats:p>","DOI":"10.1145\/3548657","type":"journal-article","created":{"date-parts":[[2022,7,19]],"date-time":"2022-07-19T12:10:37Z","timestamp":1658232637000},"page":"1-23","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Efficient Encrypted Range Query on Cloud Platforms"],"prefix":"10.1145","volume":"6","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-8913-873X","authenticated-orcid":false,"given":"Ping","family":"Yu","sequence":"first","affiliation":[{"name":"Faculty of Computing, Harbin Institute of Technology"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-4933-594X","authenticated-orcid":false,"given":"Wei","family":"Ni","sequence":"additional","affiliation":[{"name":"Commonwealth Scientific and Industrial Research Organization (CSIRO) Sydney"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-7001-6305","authenticated-orcid":false,"given":"Ren Ping","family":"Liu","sequence":"additional","affiliation":[{"name":"University of Technology Sydney"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-9209-1717","authenticated-orcid":false,"given":"Zhaoxin","family":"Zhang","sequence":"additional","affiliation":[{"name":"Faculty of Computing, Harbin Institute of Technology"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-0532-9783","authenticated-orcid":false,"given":"Hua","family":"Zhang","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-7142-9726","authenticated-orcid":false,"given":"Qiaoyan","family":"Wen","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications"}]}],"member":"320","published-online":{"date-parts":[[2022,9,7]]},"reference":[{"key":"e_1_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2014.2300753"},{"key":"e_1_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2015.2450362"},{"key":"e_1_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.08.007"},{"key":"e_1_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.06.013"},{"key":"e_1_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1145\/1866835.1866837"},{"key":"e_1_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35413-2_18"},{"key":"e_1_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2019.2905572"},{"key":"e_1_3_2_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2506145"},{"key":"e_1_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.5555\/1760749.1760788"},{"key":"e_1_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2868162"},{"key":"e_1_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813651"},{"key":"e_1_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8056952"},{"key":"e_1_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2015.2457493"},{"key":"e_1_3_2_15_2","article-title":"Hybrid keyword-field search with efficient key management for industrial Internet of Things","author":"Miao Yinbin","year":"2018","unstructured":"Yinbin Miao, Ximeng Liu, Robert H. Deng, Hongjun Wu, Hongwei Li, Jiguo Li, and Dapeng Wu. 2018. Hybrid keyword-field search with efficient key management for industrial Internet of Things. IEEE Trans. Industr. Inform. 15, 6 (2018), 3206\u20133217.","journal-title":"IEEE Trans. Industr. Inform."},{"key":"e_1_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1145\/2636328"},{"key":"e_1_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1145\/3320269.3384739"},{"key":"e_1_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3060757"},{"key":"e_1_3_2_19_2","article-title":"Locality-preserving oblivious RAM","author":"Asharov Gilad","year":"2019","unstructured":"Gilad Asharov, T. H. Hubert Chan, Kartik Nayak, Rafael Pass, Ling Ren, and Elaine Shi. 2019. Locality-preserving oblivious RAM. In Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 214\u2013243.","journal-title":"Annual International Conference on the Theory and Applications of Cryptographic Techniques"},{"key":"e_1_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23320"},{"key":"e_1_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2366300"},{"key":"e_1_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2017.2693265"},{"key":"e_1_3_2_23_2","doi-asserted-by":"crossref","first-page":"216","DOI":"10.1145\/564691.564717","volume-title":"Proceedings of the ACM SIGMOD International Conference on Management of Data","author":"Hacig\u00fcm\u00fc\u015f Hakan","year":"2002","unstructured":"Hakan Hacig\u00fcm\u00fc\u015f, Bala Iyer, Chen Li, and Sharad Mehrotra. 2002. Executing SQL over encrypted data in the database-service-provider model. In Proceedings of the ACM SIGMOD International Conference on Management of Data. ACM, 216\u2013227."},{"key":"e_1_3_2_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.18"},{"key":"e_1_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2536601"},{"key":"e_1_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2977253"},{"key":"e_1_3_2_27_2","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-021-01179-2"},{"key":"e_1_3_2_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2845106"},{"key":"e_1_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2019.08.011"},{"key":"e_1_3_2_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2020.2983030"},{"key":"e_1_3_2_31_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-015-1497-6"},{"key":"e_1_3_2_32_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-98989-1_12"},{"key":"e_1_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2017.2787711"},{"key":"e_1_3_2_34_2","doi-asserted-by":"publisher","DOI":"10.5555\/2590701.2590705"},{"key":"e_1_3_2_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2013.2273889"},{"key":"e_1_3_2_36_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2871204"},{"key":"e_1_3_2_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2010.206"},{"key":"e_1_3_2_38_2","article-title":"Search me in the dark: Privacy-preserving boolean range query over encrypted spatial data","author":"Wang Xiangyu","unstructured":"Xiangyu Wang, Jianfeng Ma, Ximeng Liu, Robert H Deng, Yinbin Miao, Dan Zhu, and Zhuoran Ma. 2020. Search me in the dark: Privacy-preserving boolean range query over encrypted spatial data. In IEEE INFOCOM 2020 - IEEE Conference on Computer Communications. 2253\u20132262.","journal-title":"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications"},{"key":"e_1_3_2_39_2","doi-asserted-by":"publisher","DOI":"10.1007\/11496137_31"},{"key":"e_1_3_2_40_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2779124"},{"key":"e_1_3_2_41_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2015.10.005"},{"key":"e_1_3_2_42_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00030"},{"key":"e_1_3_2_43_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.3015997"},{"key":"e_1_3_2_44_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00029"},{"key":"e_1_3_2_45_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2866321"},{"key":"e_1_3_2_46_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.2974218"},{"key":"e_1_3_2_47_2","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133970"},{"key":"e_1_3_2_48_2","article-title":"Practical backwardsecure searchable encryption from symmetric puncturable encryption","author":"Sun Shi Feng","unstructured":"Shi Feng Sun, Xingliang Yuan, Joseph K Liu, Ron Steinfeld, Amin Sakzad, Viet Vo, and Surya Nepal. Practical backwardsecure searchable encryption from symmetric puncturable encryption. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. 763\u2013780.","journal-title":"Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security"},{"key":"e_1_3_2_49_2","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978303"},{"key":"e_1_3_2_50_2","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133980"},{"key":"e_1_3_2_51_2","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243833"},{"key":"e_1_3_2_52_2","doi-asserted-by":"publisher","DOI":"10.1145\/3301417.3312496"},{"key":"e_1_3_2_53_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.3004827"}],"container-title":["ACM Transactions on Cyber-Physical Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3548657","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,24]],"date-time":"2023-11-24T19:02:54Z","timestamp":1700852574000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548657"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,31]]},"references-count":52,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,7,31]]}},"alternative-id":["10.1145\/3548657"],"URL":"https:\/\/doi.org\/10.1145\/3548657","relation":{},"ISSN":["2378-962X","2378-9638"],"issn-type":[{"value":"2378-962X","type":"print"},{"value":"2378-9638","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,7,31]]},"assertion":[{"value":"2020-10-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-06-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-09-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}