Linked Presentation: Hiding the Access Pattern is Not Enough: Exploiting Search Pattern Leakage in Searchable Encryption