{"id":"https://openalex.org/W2770638201","doi":"https://doi.org/10.1109/tifs.2017.2774451","title":"Cloud-Based Approximate Constrained Shortest Distance Queries Over Encrypted Graphs With Privacy Protection","display_name":"Cloud-Based Approximate Constrained Shortest Distance Queries Over Encrypted Graphs With Privacy Protection","publication_year":2017,"publication_date":"2017-11-16","ids":{"openalex":"https://openalex.org/W2770638201","doi":"https://doi.org/10.1109/tifs.2017.2774451","mag":"2770638201"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2017.2774451","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/1809.07912","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5047030842","display_name":"Meng Shen","orcid":"https://orcid.org/0000-0002-1867-0972"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Meng Shen","raw_affiliation_strings":["Beijing Engineering Research Center of High Volume Language Information Processing and Cloud Computing Applications, School of Computer Science, Beijing Institute of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Engineering Research Center of High Volume Language Information Processing and Cloud Computing Applications, School of Computer Science, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074133722","display_name":"Baoli Ma","orcid":"https://orcid.org/0000-0001-6878-2860"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Baoli Ma","raw_affiliation_strings":["Beijing Engineering Research Center of High Volume Language Information Processing and Cloud Computing Applications, School of Computer Science, Beijing Institute of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Engineering Research Center of High Volume Language Information Processing and Cloud Computing Applications, School of Computer Science, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100634361","display_name":"Liehuang Zhu","orcid":"https://orcid.org/0000-0003-3277-3887"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liehuang Zhu","raw_affiliation_strings":["Beijing Engineering Research Center of High Volume Language Information Processing and Cloud Computing Applications, School of Computer Science, Beijing Institute of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Engineering Research Center of High Volume Language Information Processing and Cloud Computing Applications, School of Computer Science, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010194411","display_name":"Rashid Mijumbi","orcid":"https://orcid.org/0000-0002-0797-9034"},"institutions":[{"id":"https://openalex.org/I4210105201","display_name":"Nokia (Ireland)","ror":"https://ror.org/01dcaj468","country_code":"IE","type":"company","lineage":["https://openalex.org/I2738502077","https://openalex.org/I4210105201"]}],"countries":["IE"],"is_corresponding":false,"raw_author_name":"Rashid Mijumbi","raw_affiliation_strings":["Bell Labs CTO, Nokia, Dublin, Ireland"],"affiliations":[{"raw_affiliation_string":"Bell Labs CTO, Nokia, Dublin, Ireland","institution_ids":["https://openalex.org/I4210105201"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060514022","display_name":"Xiaojiang Du","orcid":"https://orcid.org/0000-0003-4235-9671"},"institutions":[{"id":"https://openalex.org/I84392919","display_name":"Temple University","ror":"https://ror.org/00kx1jb78","country_code":"US","type":"education","lineage":["https://openalex.org/I84392919"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xiaojiang Du","raw_affiliation_strings":["Department of Computer and Information Sciences, Temple University, Philadelphia, PA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer and Information Sciences, Temple University, Philadelphia, PA, USA","institution_ids":["https://openalex.org/I84392919"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5075234257","display_name":"Jiankun Hu","orcid":"https://orcid.org/0000-0003-0230-1432"},"institutions":[{"id":"https://openalex.org/I188329596","display_name":"University of Canberra","ror":"https://ror.org/04s1nv328","country_code":"AU","type":"education","lineage":["https://openalex.org/I188329596"]},{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Jiankun Hu","raw_affiliation_strings":["School of Engineering and IT, University of New South Wales, Canberra, ACT, Australia"],"affiliations":[{"raw_affiliation_string":"School of Engineering and IT, University of New South Wales, Canberra, ACT, Australia","institution_ids":["https://openalex.org/I188329596","https://openalex.org/I31746571"]}]}],"institution_assertions":[],"countries_distinct_count":4,"institutions_distinct_count":5,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":18.143,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":157,"citation_normalized_percentile":{"value":0.925473,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":"13","issue":"4","first_page":"940","last_page":"953"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Advanced Cryptographic Schemes and Protocols","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Advanced Cryptographic Schemes and Protocols","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Combinatorial Optimization and Complexity Theory","score":0.9995,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Techniques for Data Analysis and Machine Learning","score":0.9963,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/privacy-preserving-computation","display_name":"Privacy-Preserving Computation","score":0.553564},{"id":"https://openalex.org/keywords/searchable-encryption","display_name":"Searchable Encryption","score":0.538264},{"id":"https://openalex.org/keywords/secure-computation","display_name":"Secure Computation","score":0.531107},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.5159524},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-Based Encryption","score":0.50155}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8490609},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.72962344},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5200538},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.5159524},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.44646218},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.42880723},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.36397797},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2017.2774451","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},{"is_oa":true,"landing_page_url":"https://arxiv.org/abs/1809.07912","pdf_url":"https://arxiv.org/pdf/1809.07912","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":["Cornell University"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://arxiv.org/abs/1809.07912","pdf_url":"https://arxiv.org/pdf/1809.07912","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":["Cornell University"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false},"sustainable_development_goals":[],"grants":[{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"61602039"},{"funder":"https://openalex.org/F4320322919","funder_display_name":"Natural Science Foundation of Beijing Municipality","award_id":"4164098"}],"datasets":[],"versions":[],"referenced_works_count":42,"referenced_works":["https://openalex.org/W119169328","https://openalex.org/W1539859404","https://openalex.org/W1798609567","https://openalex.org/W1896160955","https://openalex.org/W1969412326","https://openalex.org/W1984680759","https://openalex.org/W1987634495","https://openalex.org/W1994924587","https://openalex.org/W2005945380","https://openalex.org/W2015157269","https://openalex.org/W2016575873","https://openalex.org/W2019384076","https://openalex.org/W2024197950","https://openalex.org/W2050243336","https://openalex.org/W2060882019","https://openalex.org/W2063575624","https://openalex.org/W2074388704","https://openalex.org/W2086763678","https://openalex.org/W2089993141","https://openalex.org/W2090846184","https://openalex.org/W2102415185","https://openalex.org/W2129567254","https://openalex.org/W2130626677","https://openalex.org/W2140679274","https://openalex.org/W2145426052","https://openalex.org/W2146828512","https://openalex.org/W2147929033","https://openalex.org/W2152516507","https://openalex.org/W2169861334","https://openalex.org/W2170018742","https://openalex.org/W2170616854","https://openalex.org/W2181401201","https://openalex.org/W2242625908","https://openalex.org/W2274213011","https://openalex.org/W2400905995","https://openalex.org/W2404199818","https://openalex.org/W2460736843","https://openalex.org/W2534976269","https://openalex.org/W2536125594","https://openalex.org/W2564443285","https://openalex.org/W2593030666","https://openalex.org/W2605422749"],"related_works":["https://openalex.org/W4390664647","https://openalex.org/W4313300189","https://openalex.org/W3212491810","https://openalex.org/W3012147850","https://openalex.org/W2949835517","https://openalex.org/W2947510282","https://openalex.org/W2601739120","https://openalex.org/W2539930818","https://openalex.org/W2363701519","https://openalex.org/W2292786713"],"abstract_inverted_index":{"Constrained":[0],"shortest":[1,16,116],"distance":[2,17,117],"(CSD)":[3],"querying":[4,41,98,120],"is":[5,106,146],"one":[6],"of":[7,46,59,159,197,210],"the":[8,15,31,88,163,186,190,195,206,211],"fundamental":[9],"graph":[10,26,63,137,174,213],"query":[11],"primitives,":[12],"which":[13],"finds":[14],"from":[18],"an":[19,56,107,125,150],"origin":[20],"to":[21,66,70,75,87,96,185],"a":[22,25,28,37,43,93,135,173],"destination":[23],"in":[24,51],"with":[27,201],"constraint":[29,104],"that":[30,140],"total":[32],"cost":[33],"does":[34],"not":[35],"exceed":[36],"given":[38],"threshold.":[39],"CSD":[40,97,119,143],"has":[42],"wide":[44],"range":[45],"applications,":[47],"such":[48],"as":[49],"routing":[50],"telecommunications":[52],"and":[53,156,162,181,208],"transportation.":[54],"With":[55],"increasing":[57],"prevalence":[58],"cloud":[60,71,187],"computing":[61],"paradigm,":[62],"owners":[64],"desire":[65],"outsource":[67,183],"their":[68],"graphs":[69,80,123,180],"servers.":[72],"In":[73,129],"order":[74],"protect":[76],"sensitive":[77],"information,":[78],"these":[79],"are":[81],"usually":[82],"encrypted":[83,100,122],"before":[84],"being":[85],"outsourced":[86],"cloud.":[89],"This,":[90],"however,":[91],"imposes":[92],"great":[94],"challenge":[95],"over":[99,121],"graphs.":[101],"Since":[102],"performing":[103],"filtering":[105],"intractable":[108],"task,":[109],"existing":[110],"work":[111],"mainly":[112],"focuses":[113],"on":[114,149],"unconstrained":[115],"queries.":[118],"remains":[124],"open":[126],"research":[127],"problem.":[128],"this":[130],"paper,":[131],"we":[132],"propose":[133],"Connor,":[134,172],"novel":[136],"encryption":[138,214],"scheme":[139],"enables":[141],"approximate":[142],"querying.":[144,198],"Connor":[145],"built":[147],"based":[148],"efficient,":[151],"tree-based":[152],"ciphertext":[153],"comparison":[154],"protocol,":[155],"makes":[157],"use":[158],"symmetric-key":[160],"primitives":[161],"somewhat":[164],"homomorphic":[165],"encryption,":[166],"making":[167],"it":[168],"computationally":[169],"efficient.":[170],"Using":[171],"owner":[175],"can":[176],"first":[177],"encrypt":[178],"privacy-sensitive":[179],"then":[182],"them":[184],"server,":[188],"achieving":[189],"necessary":[191],"privacy":[192],"without":[193],"losing":[194],"ability":[196],"Extensive":[199],"experiments":[200],"real-world":[202],"data":[203],"sets":[204],"demonstrate":[205],"effectiveness":[207],"efficiency":[209],"proposed":[212],"scheme.":[215]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2770638201","counts_by_year":[{"year":2024,"cited_by_count":8},{"year":2023,"cited_by_count":14},{"year":2022,"cited_by_count":19},{"year":2021,"cited_by_count":17},{"year":2020,"cited_by_count":45},{"year":2019,"cited_by_count":32},{"year":2018,"cited_by_count":18}],"updated_date":"2024-11-29T05:27:25.854438","created_date":"2017-12-04"}