Skip to main content
Erschienen in: Computing 6/2020

01.10.2019

Secure search for encrypted personal health records from big data NoSQL databases in cloud

verfasst von: Lanxiang Chen, Nan Zhang, Hung-Min Sun, Chin-Chen Chang, Shui Yu, Kim-Kwang Raymond Choo

Erschienen in: Computing | Ausgabe 6/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

As the healthcare industry adopts the use of cloud to store personal health record (PHR), there is a need to ensure that we maintain the ability to perform efficient search on encrypted data (stored in the cloud). In this paper, we propose a secure searchable encryption scheme, which is designed to search on encrypted personal health records from a NoSQL database in semi-trusted cloud servers. The proposed scheme supports almost all query operations available in plaintext database environments, especially multi-dimensional, multi-keyword searches with range query. Specifically, in the proposed scheme, an Adelson-Velsky Landis (AVL) tree is utilized to construct the index, and an order-revealing encryption (ORE) algorithm is used to encrypt the AVL tree and realize range query. As document-based databases are probably the most popular NoSQL database, due to their flexibility, high efficiency, and ease of use, MongoDB, a document-based NoSQL database, is chosen to store the encrypted PHR data in our scheme. Experimental results show that the scheme can achieve secure and practical searchable encryption for PHRs. A comparison of the range query demonstrates that the time overhead of our ORE-based scheme is 25.5% shorter than that of the mOPE-based Arx (an encrypted database system) scheme.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
3.
Zurück zum Zitat Poh GS, Chin JJ, Yau WC, Choo KKR, Mohamad MS (2017) Searchable symmetric encryption: designs and challenges. ACM Comput Surv 50(3):40CrossRef Poh GS, Chin JJ, Yau WC, Choo KKR, Mohamad MS (2017) Searchable symmetric encryption: designs and challenges. ACM Comput Surv 50(3):40CrossRef
4.
Zurück zum Zitat Adelson-Velsky G, Landis E (1962) An algorithm for the organization of information. Proc USSR Acad Sci 146(2):263–266MathSciNet Adelson-Velsky G, Landis E (1962) An algorithm for the organization of information. Proc USSR Acad Sci 146(2):263–266MathSciNet
5.
Zurück zum Zitat Cormen TH, Leiserson CE, Rivest RL, Stein C (2001) “Red–black trees. In: Cormen TH, Leiserson CE, Rivest RL, Stein C (eds) Introduction to algorithms, 2nd edn. MIT Press, London, pp 273–301MATH Cormen TH, Leiserson CE, Rivest RL, Stein C (2001) “Red–black trees. In: Cormen TH, Leiserson CE, Rivest RL, Stein C (eds) Introduction to algorithms, 2nd edn. MIT Press, London, pp 273–301MATH
6.
Zurück zum Zitat Elmasri R, Navathe SB (2010) Fundamentals of database systems, 6th edn. Pearson Education, London, pp 652–660MATH Elmasri R, Navathe SB (2010) Fundamentals of database systems, 6th edn. Pearson Education, London, pp 652–660MATH
7.
Zurück zum Zitat Popa RA, Li FH, Zeldovich N (2013) An ideal-security protocol for order-preserving encoding. In: Proceedings IEEE symposium security & privacy (SP), Washington, DC, USA, pp 463–477 Popa RA, Li FH, Zeldovich N (2013) An ideal-security protocol for order-preserving encoding. In: Proceedings IEEE symposium security & privacy (SP), Washington, DC, USA, pp 463–477
8.
Zurück zum Zitat Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: Proceeding IEEE Symposium Security and Privacy (SP), Oakland, CA, USA, pp 44–55 Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: Proceeding IEEE Symposium Security and Privacy (SP), Oakland, CA, USA, pp 44–55
9.
Zurück zum Zitat Goh E (2003) Secure indexes. Cryptology ePrint Archive: 2003/216 Goh E (2003) Secure indexes. Cryptology ePrint Archive: 2003/216
10.
Zurück zum Zitat Curtmola R, Garay J, Kamara S, Ostrovsky R (2006) Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings ACM international conference on computer communication security (CCS), Alexandria, VA, USA, pp 79–88 Curtmola R, Garay J, Kamara S, Ostrovsky R (2006) Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings ACM international conference on computer communication security (CCS), Alexandria, VA, USA, pp 79–88
11.
Zurück zum Zitat Wang C, Cao N, Li J, Ren K, Lou W (2012) Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Trans Parallel Distrib Syst 23(8):1467–1479CrossRef Wang C, Cao N, Li J, Ren K, Lou W (2012) Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Trans Parallel Distrib Syst 23(8):1467–1479CrossRef
12.
Zurück zum Zitat Cao N, Wang C, Li M, Ren K, Lou W (2014) Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans Parallel Distrib Syst 25(1):222–233CrossRef Cao N, Wang C, Li M, Ren K, Lou W (2014) Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans Parallel Distrib Syst 25(1):222–233CrossRef
13.
Zurück zum Zitat Chen L, Qiu L, Li KC, Shi W, Zhang N (2017) DMRS: an efficient dynamic multi-keyword ranked search over encrypted cloud data. Soft Comput 21(16):4829–4841CrossRef Chen L, Qiu L, Li KC, Shi W, Zhang N (2017) DMRS: an efficient dynamic multi-keyword ranked search over encrypted cloud data. Soft Comput 21(16):4829–4841CrossRef
14.
Zurück zum Zitat Li J, Wang Q, Wang C, Cao N, Ren K, Lou W (2010) Fuzzy keyword search over encrypted data in cloud computing. In: Proceeding IEEE 29th Conference on Computer Communication (INFOCOM), San Diego, CA, USA, pp 1–5 Li J, Wang Q, Wang C, Cao N, Ren K, Lou W (2010) Fuzzy keyword search over encrypted data in cloud computing. In: Proceeding IEEE 29th Conference on Computer Communication (INFOCOM), San Diego, CA, USA, pp 1–5
15.
Zurück zum Zitat Wang B, Yu S, Lou W, Hou YT (2014) Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud. In: Proceedings IEEE 29th conference on computer communication (INFOCOM), Toronto, ON, Canada, pp 2112–2120 Wang B, Yu S, Lou W, Hou YT (2014) Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud. In: Proceedings IEEE 29th conference on computer communication (INFOCOM), Toronto, ON, Canada, pp 2112–2120
16.
Zurück zum Zitat Wang C, Ren K, Yu S, Urs KM (2012) Achieving usable and privacy-assured similarity search over outsourced cloud data. In Proceedings IEEE 29th conference on computer communication (INFOCOM), Orlando, Florida, pp 451–459 Wang C, Ren K, Yu S, Urs KM (2012) Achieving usable and privacy-assured similarity search over outsourced cloud data. In Proceedings IEEE 29th conference on computer communication (INFOCOM), Orlando, Florida, pp 451–459
17.
Zurück zum Zitat Kamara S, Papamanthou C, Roeder T (2012) Dynamic searchable symmetric encryption. In: Proceedings ACM International conference on computer communication security (CCS), Raleigh, NC, USA, pp. 965–976 Kamara S, Papamanthou C, Roeder T (2012) Dynamic searchable symmetric encryption. In: Proceedings ACM International conference on computer communication security (CCS), Raleigh, NC, USA, pp. 965–976
18.
Zurück zum Zitat Gajek S (2016) Dynamic symmetric searchable encryption from constrained functional encryption. In: Proceedings Cryptographers’ Track at the RSA Conference, San Diego, California, 2016, pp 75–89 Gajek S (2016) Dynamic symmetric searchable encryption from constrained functional encryption. In: Proceedings Cryptographers’ Track at the RSA Conference, San Diego, California, 2016, pp 75–89
19.
Zurück zum Zitat Li R, Xu Z, Kang W, Yow K, Xu C (2014) Efficient multi-keyword ranked query over encrypted data in cloud computing. Future Gener Comput Syst 30(1):179–190CrossRef Li R, Xu Z, Kang W, Yow K, Xu C (2014) Efficient multi-keyword ranked query over encrypted data in cloud computing. Future Gener Comput Syst 30(1):179–190CrossRef
20.
Zurück zum Zitat Zhang W, Lin Y, Xiao S, Wu J, Zhou S (2016) Privacy preserving ranked multi-keyword search for multiple data owners in cloud computing. IEEE Trans Comput 65(5):1566–1577MathSciNetCrossRef Zhang W, Lin Y, Xiao S, Wu J, Zhou S (2016) Privacy preserving ranked multi-keyword search for multiple data owners in cloud computing. IEEE Trans Comput 65(5):1566–1577MathSciNetCrossRef
21.
Zurück zum Zitat Strizhov M, Ray I (2016) Secure multi-keyword similarity search over encrypted cloud data supporting efficient multi-user setup. Trans Data Priv 9(2):131–159 Strizhov M, Ray I (2016) Secure multi-keyword similarity search over encrypted cloud data supporting efficient multi-user setup. Trans Data Priv 9(2):131–159
22.
Zurück zum Zitat Sun W, Liu X, Lou W, Hou YT, Li H (2015) Catch you if you lie to me: efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data. In: Proceedings IEEE 29th conference on computer communication (INFOCOM), Hong Kong, pp 2110–2118 Sun W, Liu X, Lou W, Hou YT, Li H (2015) Catch you if you lie to me: efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data. In: Proceedings IEEE 29th conference on computer communication (INFOCOM), Hong Kong, pp 2110–2118
23.
Zurück zum Zitat Wang J, Chen X, Li J, Zhao J, Shen J (2017) Towards achieving flexible and verifiable search for outsourced database in cloud computing. Future Gener Comput Syst 67:266–275CrossRef Wang J, Chen X, Li J, Zhao J, Shen J (2017) Towards achieving flexible and verifiable search for outsourced database in cloud computing. Future Gener Comput Syst 67:266–275CrossRef
24.
Zurück zum Zitat Chen D, Hu Y, Wang L, Zomaya AY, Li X (2016) H-PARAFAC: hierarchical parallel factor analysis of multidimensional big data. IEEE Trans Parallel Distrib Syst 28(4):1091–1104CrossRef Chen D, Hu Y, Wang L, Zomaya AY, Li X (2016) H-PARAFAC: hierarchical parallel factor analysis of multidimensional big data. IEEE Trans Parallel Distrib Syst 28(4):1091–1104CrossRef
25.
Zurück zum Zitat Chen D, Li X, Wang L, Khan SU, Wang J, Zeng K, Cai C (2015) Fast and scalable multi-way analysis of massive neural data. IEEE Trans Comput 64(3):707–719MathSciNetCrossRef Chen D, Li X, Wang L, Khan SU, Wang J, Zeng K, Cai C (2015) Fast and scalable multi-way analysis of massive neural data. IEEE Trans Comput 64(3):707–719MathSciNetCrossRef
26.
Zurück zum Zitat Tang Y, Chen D, Wang L, Zomaya AY, Chen J, Liu H (2018) Bayesian tensor factorization for multi-way analysis of multi-dimensional EEG. Neurocomputing 318:162–174CrossRef Tang Y, Chen D, Wang L, Zomaya AY, Chen J, Liu H (2018) Bayesian tensor factorization for multi-way analysis of multi-dimensional EEG. Neurocomputing 318:162–174CrossRef
27.
Zurück zum Zitat Hacigümüş H, Iyer B, Li C, and Mehrotra S (2002) Executing SQL over encrypted data in the database-service-provider model. In: Proceedings ACM SIGMOD international conference manage data (SIGMOD), Madison, WI, pp 216–227 Hacigümüş H, Iyer B, Li C, and Mehrotra S (2002) Executing SQL over encrypted data in the database-service-provider model. In: Proceedings ACM SIGMOD international conference manage data (SIGMOD), Madison, WI, pp 216–227
28.
Zurück zum Zitat Damiani E, Vimercati SD, Jajodia S, Paraboschi S, Samarati P (2003) Balancing confidentiality and efficiency in untrusted relational DBMSs. In: Proceedings ACM international conference computer communication security (CCS), Washington, DC, pp 93–102 Damiani E, Vimercati SD, Jajodia S, Paraboschi S, Samarati P (2003) Balancing confidentiality and efficiency in untrusted relational DBMSs. In: Proceedings ACM international conference computer communication security (CCS), Washington, DC, pp 93–102
29.
Zurück zum Zitat Ge T, Zdonik S (2007) Fast, secure encryption for indexing in a column-oriented DBMS. In: Proceedings IEEE 23rd international conference data engineer. (ICDE), Istanbul, Turkey, pp 676–685 Ge T, Zdonik S (2007) Fast, secure encryption for indexing in a column-oriented DBMS. In: Proceedings IEEE 23rd international conference data engineer. (ICDE), Istanbul, Turkey, pp 676–685
30.
Zurück zum Zitat Chow SS, Lee JH, Subramanian L (2009) Two-party computation model for privacy-preserving queries over distributed databases. In: Proceedings 16th network and distributed system security symposium (NDSS), San Diego, CA, pp 1–16 Chow SS, Lee JH, Subramanian L (2009) Two-party computation model for privacy-preserving queries over distributed databases. In: Proceedings 16th network and distributed system security symposium (NDSS), San Diego, CA, pp 1–16
31.
Zurück zum Zitat Popa RA, Redfield C, Zeldovich N, Balakrishnan H (2011) CryptDB: protecting confidentiality with encrypted query processing. In: Proceedings ACM symposium operating system principles (SOSP), Cascais, Portugal, pp 85–100 Popa RA, Redfield C, Zeldovich N, Balakrishnan H (2011) CryptDB: protecting confidentiality with encrypted query processing. In: Proceedings ACM symposium operating system principles (SOSP), Cascais, Portugal, pp 85–100
32.
Zurück zum Zitat Boldyreva A, Chenette N, Lee Y, O’neill A (2009) Order preserving symmetric encryption. In: Proceedings international conference theory and applications of cryptographic techniques (EUROCRYPT), Cologne, Germany, pp 224–241 Boldyreva A, Chenette N, Lee Y, O’neill A (2009) Order preserving symmetric encryption. In: Proceedings international conference theory and applications of cryptographic techniques (EUROCRYPT), Cologne, Germany, pp 224–241
33.
Zurück zum Zitat Tu S, Kaashoek MF, Madden S, Zeldovich N (2013) Processing analytical queries over encrypted data. In: Proceedings international conference very large data bases (VLDB), Riva del Garda, Italy, pp 289–300 Tu S, Kaashoek MF, Madden S, Zeldovich N (2013) Processing analytical queries over encrypted data. In: Proceedings international conference very large data bases (VLDB), Riva del Garda, Italy, pp 289–300
34.
Zurück zum Zitat Cash D, Jaeger J, Jarecki S, Jutla CS, Krawczyk H, Rosu MC, Steiner M (2014) Dynamic searchable encryption in very-large databases: data structures and implementation. In: Proceedings 21st network and distributed system security symposium (NDSS), San Diego, CA Cash D, Jaeger J, Jarecki S, Jutla CS, Krawczyk H, Rosu MC, Steiner M (2014) Dynamic searchable encryption in very-large databases: data structures and implementation. In: Proceedings 21st network and distributed system security symposium (NDSS), San Diego, CA
35.
Zurück zum Zitat Faber S, Jarecki S, Krawczyk H, Nguyen Q, Rosu M, Steiner M (2015) Rich queries on encrypted data: beyond exact matches. In: Proceedings 20th European symposium research in computer security (ESORICS), Vienna, Austria, pp 123–145 Faber S, Jarecki S, Krawczyk H, Nguyen Q, Rosu M, Steiner M (2015) Rich queries on encrypted data: beyond exact matches. In: Proceedings 20th European symposium research in computer security (ESORICS), Vienna, Austria, pp 123–145
36.
Zurück zum Zitat Poddar R, Boelter T, Popa RA (2016) Arx: a strongly encrypted database system. Cryptology ePrint Archive: 2016/591 Poddar R, Boelter T, Popa RA (2016) Arx: a strongly encrypted database system. Cryptology ePrint Archive: 2016/591
37.
Zurück zum Zitat Ahmadian M, Plochan F, Roessler Z, Marinescu DC (2017) SecureNoSQL an approach for secure search of encrypted NoSQL databases in the public cloud. Int J Inf Manag 37(2):63–74CrossRef Ahmadian M, Plochan F, Roessler Z, Marinescu DC (2017) SecureNoSQL an approach for secure search of encrypted NoSQL databases in the public cloud. Int J Inf Manag 37(2):63–74CrossRef
38.
Zurück zum Zitat Li M, Yu S, Cao N, Lou W (2011) Authorized private keyword search over encrypted data in cloud computing. In: Proceeding IEEE 31st international conference on distributed computing systems (ICDCS), Washington, DC, USA, pp 383–392 Li M, Yu S, Cao N, Lou W (2011) Authorized private keyword search over encrypted data in cloud computing. In: Proceeding IEEE 31st international conference on distributed computing systems (ICDCS), Washington, DC, USA, pp 383–392
39.
Zurück zum Zitat Xhafa F, Wang J, Chen X, Liu JK, Li J, Krause P (2014) An efficient PHR service system supporting fuzzy keyword search and fine-grained access control. Soft Comput 18(9):1795–1802CrossRef Xhafa F, Wang J, Chen X, Liu JK, Li J, Krause P (2014) An efficient PHR service system supporting fuzzy keyword search and fine-grained access control. Soft Comput 18(9):1795–1802CrossRef
40.
Zurück zum Zitat Liu Z, Weng J, Li J, Yang J, Fu C, Jia C (2016) Cloud-based electronic health record system supporting fuzzy keyword search. Soft Comput 20(8):3243–3255CrossRef Liu Z, Weng J, Li J, Yang J, Fu C, Jia C (2016) Cloud-based electronic health record system supporting fuzzy keyword search. Soft Comput 20(8):3243–3255CrossRef
41.
Zurück zum Zitat Guo C, Zhuang R, Jie Y, Ren Y, Wu T, Choo KKR (2016) Fine-grained database field search using attribute-based encryption for e-healthcare clouds. J Med Syst 40(11):1–8CrossRef Guo C, Zhuang R, Jie Y, Ren Y, Wu T, Choo KKR (2016) Fine-grained database field search using attribute-based encryption for e-healthcare clouds. J Med Syst 40(11):1–8CrossRef
42.
Zurück zum Zitat Yang L, Zheng Q, Fan X (2017) RSPP: a reliable, searchable and privacy-preserving e-Healthcare system for cloud-assisted body area networks. In: Proceedings IEEE 36th conference on computer communication (INFOCOM), GA, USA, pp 1–9 Yang L, Zheng Q, Fan X (2017) RSPP: a reliable, searchable and privacy-preserving e-Healthcare system for cloud-assisted body area networks. In: Proceedings IEEE 36th conference on computer communication (INFOCOM), GA, USA, pp 1–9
43.
Zurück zum Zitat Yu S, Wang C, Ren K, Lou W (2010) Achieving secure, scalable, and fine-grained data access control in cloud computing. In: Proceedings IEEE 29th conference on computer communication. (INFOCOM), San Diego, CA, USA, pp 534–542 Yu S, Wang C, Ren K, Lou W (2010) Achieving secure, scalable, and fine-grained data access control in cloud computing. In: Proceedings IEEE 29th conference on computer communication. (INFOCOM), San Diego, CA, USA, pp 534–542
44.
Zurück zum Zitat Lewi K, Wu DJ (2016) Order-revealing encryption: new constructions, applications, and lower bounds. In: Proceedings ACM International conference on computer communication security (CCS), Vienna, Austria, pp 1167–1178 Lewi K, Wu DJ (2016) Order-revealing encryption: new constructions, applications, and lower bounds. In: Proceedings ACM International conference on computer communication security (CCS), Vienna, Austria, pp 1167–1178
45.
Zurück zum Zitat Boneh D, Lewi K, Raykova M, Sahai A, Zhandry M, Zimmerman J (2015) Semantically secure order-revealing encryption: multi-input functional encryption without obfuscation. In: Proceedings Int. Conf. Theory and Applications of Cryptographic Techniques (EUROCRYPT), Sofia, Bulgaria, pp 563–594 Boneh D, Lewi K, Raykova M, Sahai A, Zhandry M, Zimmerman J (2015) Semantically secure order-revealing encryption: multi-input functional encryption without obfuscation. In: Proceedings Int. Conf. Theory and Applications of Cryptographic Techniques (EUROCRYPT), Sofia, Bulgaria, pp 563–594
46.
Zurück zum Zitat Chenette N, Lewi K, Weis SA, Wu DJ (2016) Practical order-revealing encryption with limited leakage. In: Proceedings international symposium foundations of software engineering (FSE), Seattle, WA, USA, pp 474–493 Chenette N, Lewi K, Weis SA, Wu DJ (2016) Practical order-revealing encryption with limited leakage. In: Proceedings international symposium foundations of software engineering (FSE), Seattle, WA, USA, pp 474–493
47.
Zurück zum Zitat Agrawal R, Kiernan J, Srikant R, Xu Y (2004) Order-preserving encryption for numeric data. In Proceedings ACM SIGMOD international conference management of data (SIGMOD), Paris, France, pp 563–574 Agrawal R, Kiernan J, Srikant R, Xu Y (2004) Order-preserving encryption for numeric data. In Proceedings ACM SIGMOD international conference management of data (SIGMOD), Paris, France, pp 563–574
48.
Zurück zum Zitat Alves PGMR, Aranha DF (2016) A framework for searching encrypted databases. In: Proceedings XVI Brazilian symposium on information and computational systems security, Niterói, Rio de Janeiro Alves PGMR, Aranha DF (2016) A framework for searching encrypted databases. In: Proceedings XVI Brazilian symposium on information and computational systems security, Niterói, Rio de Janeiro
50.
Zurück zum Zitat Yang Z, Zhong S, Wright RN (2006) Privacy-preserving queries on encrypted data. In: Proceedings European symposium research in computer security (ESORICS), Hamburg, Germany, pp 479–495 Yang Z, Zhong S, Wright RN (2006) Privacy-preserving queries on encrypted data. In: Proceedings European symposium research in computer security (ESORICS), Hamburg, Germany, pp 479–495
Metadaten
Titel
Secure search for encrypted personal health records from big data NoSQL databases in cloud
verfasst von
Lanxiang Chen
Nan Zhang
Hung-Min Sun
Chin-Chen Chang
Shui Yu
Kim-Kwang Raymond Choo
Publikationsdatum
01.10.2019
Verlag
Springer Vienna
Erschienen in
Computing / Ausgabe 6/2020
Print ISSN: 0010-485X
Elektronische ISSN: 1436-5057
DOI
https://doi.org/10.1007/s00607-019-00762-z

Weitere Artikel der Ausgabe 6/2020

Computing 6/2020 Zur Ausgabe

Premium Partner