{"id":"https://openalex.org/W3025869016","doi":"https://doi.org/10.1109/smartcloud.2019.00015","title":"A Secure Model to Execute Queries Over Encrypted Databases in the Cloud","display_name":"A Secure Model to Execute Queries Over Encrypted Databases in the Cloud","publication_year":2019,"publication_date":"2019-12-01","ids":{"openalex":"https://openalex.org/W3025869016","doi":"https://doi.org/10.1109/smartcloud.2019.00015","mag":"3025869016"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/smartcloud.2019.00015","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5045573738","display_name":"Sultan Almakdi","orcid":"https://orcid.org/0000-0003-2415-7304"},"institutions":[{"id":"https://openalex.org/I78715868","display_name":"University of Arkansas at Fayetteville","ror":"https://ror.org/05jbt9m15","country_code":"US","type":"funder","lineage":["https://openalex.org/I78715868"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sultan Almakdi","raw_affiliation_strings":["Dept. of Computer Science and Computer Engineering, University of Arkansas, Fayetteville, USA"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer Science and Computer Engineering, University of Arkansas, Fayetteville, USA","institution_ids":["https://openalex.org/I78715868"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5073470546","display_name":"Brajendra Panda","orcid":"https://orcid.org/0000-0003-1117-9328"},"institutions":[{"id":"https://openalex.org/I78715868","display_name":"University of Arkansas at Fayetteville","ror":"https://ror.org/05jbt9m15","country_code":"US","type":"funder","lineage":["https://openalex.org/I78715868"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Brajendra Panda","raw_affiliation_strings":["Dept. of Computer Science and Computer Engineering, University of Arkansas, Fayetteville, USA"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer Science and Computer Engineering, University of Arkansas, Fayetteville, USA","institution_ids":["https://openalex.org/I78715868"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.282,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.599613,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":74,"max":76},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9988,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-database","display_name":"Cloud database","score":0.48373702}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7665173},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7531209},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6760466},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.6514616},{"id":"https://openalex.org/C2778974508","wikidata":"https://www.wikidata.org/wiki/Q2499178","display_name":"Cloud database","level":3,"score":0.48373702},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3605403},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.34249938},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1420922}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/smartcloud.2019.00015","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":18,"referenced_works":["https://openalex.org/W1570842386","https://openalex.org/W1755636270","https://openalex.org/W2000214662","https://openalex.org/W2003500686","https://openalex.org/W2031533839","https://openalex.org/W2043508455","https://openalex.org/W2075422883","https://openalex.org/W2108416218","https://openalex.org/W2109915041","https://openalex.org/W2136720346","https://openalex.org/W2244548536","https://openalex.org/W2250570571","https://openalex.org/W2308447870","https://openalex.org/W2326245332","https://openalex.org/W2560928722","https://openalex.org/W2765456579","https://openalex.org/W2810505968","https://openalex.org/W2977890690"],"related_works":["https://openalex.org/W4390047751","https://openalex.org/W4312274205","https://openalex.org/W4285687366","https://openalex.org/W3199753225","https://openalex.org/W3135740393","https://openalex.org/W2973190448","https://openalex.org/W2892003115","https://openalex.org/W2884115854","https://openalex.org/W2308871417","https://openalex.org/W1187916458"],"abstract_inverted_index":{"Recently,":[0],"database":[1,8,42,51],"users":[2,174],"have":[3,102],"begun":[4],"to":[5,10,17,117,132,141,169,182,193,233],"use":[6],"cloud":[7,28,35,171,192],"services":[9],"outsource":[11],"their":[12,61],"databases.":[13],"This":[14],"is":[15,64,85,216],"due":[16],"the":[18,23,27,54,65,91,104,125,149,167,170,184,191,203,230,239],"high":[19],"computation":[20],"speed":[21],"and":[22,172,208,212,219],"huge":[24],"storage":[25],"capacity":[26],"owners":[29,52],"provide":[30],"at":[31],"low":[32],"prices.":[33],"Despite":[34],"computing":[36],"being":[37],"an":[38],"attractive":[39],"environment":[40],"for":[41,48,50,202],"users,":[43],"privacy":[44,105],"issues":[45,106],"are":[46,93,151,200],"cause":[47],"concern":[49],"since":[53],"data":[55,73,84,92,127,150],"access":[56],"will":[57],"be":[58,130],"out":[59],"of":[60,68,166,186,197,237,242],"control.":[62],"Encryption":[63,160],"only":[66],"way":[67],"assuaging":[69],"users'":[70],"fears":[71],"surrounding":[72],"privacy.":[74],"However,":[75],"executing":[76],"Structured":[77],"Query":[78],"Language":[79],"(SQL)":[80],"queries":[81,144],"over":[82,145],"encrypted":[83,94,126,146,152,188,243],"a":[86,96,139,154,194,246],"challenging":[87],"task,":[88],"especially":[89],"if":[90],"by":[95,107,153],"randomized":[97,156],"encryption":[98,116,157],"algorithm.":[99],"Many":[100],"researchers":[101],"addressed":[103],"using":[108],"deterministic":[109],"encryption,":[110,113],"onion":[111],"layers":[112],"or":[114],"homomorphic":[115],"encrypt":[118],"data.":[119],"But,":[120],"even":[121],"with":[122,175],"these":[123],"systems,":[124],"can":[128],"still":[129],"subject":[131],"attack.":[133],"In":[134],"this":[135],"research,":[136],"we":[137],"propose":[138],"model":[140,180,211,226],"execute":[142],"SQL":[143],"data,":[147],"where":[148],"single":[155],"algorithm-namely,":[158],"Advanced":[159],"Standard":[161],"AES-CBC.":[162],"We":[163,206],"move":[164],"most":[165],"computations":[168],"leave":[173],"no":[176],"crypto":[177],"computation.":[178],"Our":[179,221],"intends":[181],"narrow":[183],"range":[185],"retrieved":[187],"records":[189,198,244],"from":[190],"small":[195],"set":[196,241],"that":[199,214,224],"candidates":[201],"user's":[204],"query.":[205],"implement":[207],"evaluate":[209],"our":[210,225],"find":[213],"it":[215],"both":[217],"practical":[218],"efficient.":[220],"experiments":[222],"show":[223],"succeeds":[227],"in":[228,245],"minimizing":[229],"decryption":[231,238],"processes":[232],"less":[234],"than":[235],"30%":[236],"whole":[240],"table.":[247]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W3025869016","counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2021,"cited_by_count":2}],"updated_date":"2025-04-21T12:41:49.401231","created_date":"2020-05-21"}