{"id":"https://openalex.org/W4414769872","doi":"https://doi.org/10.1002/cpe.70329","title":"Adaptive Event\u2010Driven Key Management for Securing Cloud Data Against Key Exposure","display_name":"Adaptive Event\u2010Driven Key Management for Securing Cloud Data Against Key Exposure","publication_year":2025,"publication_date":"2025-10-02","ids":{"openalex":"https://openalex.org/W4414769872","doi":"https://doi.org/10.1002/cpe.70329"},"language":"en","primary_location":{"id":"doi:10.1002/cpe.70329","is_oa":false,"landing_page_url":"https://doi.org/10.1002/cpe.70329","pdf_url":null,"source":{"id":"https://openalex.org/S11065456","display_name":"Concurrency and Computation Practice and Experience","issn_l":"1532-0626","issn":["1532-0626","1532-0634"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Concurrency and Computation: Practice and Experience","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101234532","display_name":"Atul Kumar Singh","orcid":"https://orcid.org/0009-0001-0296-0756"},"institutions":[{"id":"https://openalex.org/I105094715","display_name":"National Institute of Technology Kurukshetra","ror":"https://ror.org/04909p852","country_code":"IN","type":"education","lineage":["https://openalex.org/I105094715"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Atul Kumar Singh","raw_affiliation_strings":["National Institute of Technology  Kurukshetra India","National Institute of Technology, Kurukshetra, India"],"affiliations":[{"raw_affiliation_string":"National Institute of Technology  Kurukshetra India","institution_ids":["https://openalex.org/I105094715"]},{"raw_affiliation_string":"National Institute of Technology, Kurukshetra, India","institution_ids":["https://openalex.org/I105094715"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5065855727","display_name":"Kriti Bhushan","orcid":"https://orcid.org/0000-0002-4106-1278"},"institutions":[{"id":"https://openalex.org/I105094715","display_name":"National Institute of Technology Kurukshetra","ror":"https://ror.org/04909p852","country_code":"IN","type":"education","lineage":["https://openalex.org/I105094715"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Kriti Bhushan","raw_affiliation_strings":["National Institute of Technology  Kurukshetra India","National Institute of Technology, Kurukshetra, India"],"affiliations":[{"raw_affiliation_string":"National Institute of Technology  Kurukshetra India","institution_ids":["https://openalex.org/I105094715"]},{"raw_affiliation_string":"National Institute of Technology, Kurukshetra, India","institution_ids":["https://openalex.org/I105094715"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5065855727"],"corresponding_institution_ids":["https://openalex.org/I105094715"],"apc_list":{"value":4740,"currency":"USD","value_usd":4740},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.40903862,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"37","issue":"25-26","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9918000102043152,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9868999719619751,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/key-management","display_name":"Key management","score":0.6607999801635742},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6531000137329102},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5907999873161316},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5687999725341797},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5317000150680542},{"id":"https://openalex.org/keywords/key-exchange","display_name":"Key exchange","score":0.5135999917984009},{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.3977999985218048},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.38429999351501465}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8715000152587891},{"id":"https://openalex.org/C17886624","wikidata":"https://www.wikidata.org/wiki/Q1320561","display_name":"Key management","level":3,"score":0.6607999801635742},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6531000137329102},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5907999873161316},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5687999725341797},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5317000150680542},{"id":"https://openalex.org/C99674996","wikidata":"https://www.wikidata.org/wiki/Q1414155","display_name":"Key exchange","level":4,"score":0.5135999917984009},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4375},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.3977999985218048},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.38429999351501465},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.38190001249313354},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.34599998593330383},{"id":"https://openalex.org/C160333310","wikidata":"https://www.wikidata.org/wiki/Q6398153","display_name":"Key distribution","level":4,"score":0.3458999991416931},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.3449000120162964},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3425999879837036},{"id":"https://openalex.org/C166501710","wikidata":"https://www.wikidata.org/wiki/Q5132476","display_name":"Client-side encryption","level":4,"score":0.2799000144004822},{"id":"https://openalex.org/C94520183","wikidata":"https://www.wikidata.org/wiki/Q190746","display_name":"Advanced Encryption Standard","level":3,"score":0.27889999747276306},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.27250000834465027},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.27079999446868896},{"id":"https://openalex.org/C35181327","wikidata":"https://www.wikidata.org/wiki/Q6398156","display_name":"Key encapsulation","level":5,"score":0.2669000029563904},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.25769999623298645},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.25440001487731934}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1002/cpe.70329","is_oa":false,"landing_page_url":"https://doi.org/10.1002/cpe.70329","pdf_url":null,"source":{"id":"https://openalex.org/S11065456","display_name":"Concurrency and Computation Practice and Experience","issn_l":"1532-0626","issn":["1532-0626","1532-0634"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Concurrency and Computation: Practice and Experience","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W1511843316","https://openalex.org/W1562542037","https://openalex.org/W2013940778","https://openalex.org/W2014143000","https://openalex.org/W2144219822","https://openalex.org/W2154205416","https://openalex.org/W2154909745","https://openalex.org/W2323162780","https://openalex.org/W2467335260","https://openalex.org/W2585855180","https://openalex.org/W2588277511","https://openalex.org/W2606779297","https://openalex.org/W2890178353","https://openalex.org/W2961517545","https://openalex.org/W2976339827","https://openalex.org/W3002342065","https://openalex.org/W3005129760","https://openalex.org/W3032772469","https://openalex.org/W3039255322","https://openalex.org/W3047335002","https://openalex.org/W4312436023","https://openalex.org/W4387618795","https://openalex.org/W4389681552","https://openalex.org/W4390659386","https://openalex.org/W4390702694","https://openalex.org/W4392617176","https://openalex.org/W4393119892","https://openalex.org/W4399999464","https://openalex.org/W4406445708","https://openalex.org/W4407079114","https://openalex.org/W4407177223","https://openalex.org/W4408156900","https://openalex.org/W4409195401"],"related_works":[],"abstract_inverted_index":{"ABSTRACT":[0],"Ensuring":[1],"data":[2],"confidentiality":[3],"and":[4,58,82,120,129,156,199,227,261,294],"integrity":[5,65,130,188],"in":[6,16,77,90,243,250],"dynamic":[7],"cloud":[8,95,175,299],"storage":[9],"environments":[10],"is":[11,170,190],"a":[12,72,79,103,292],"growing":[13],"challenge,":[14],"particularly":[15],"the":[17,138,168,178,182,205,275],"face":[18],"of":[19,39,214,219],"key":[20,24,42,56,84,118,154,211,228,284],"exposure":[21,40,285],"threats.":[22],"Traditional":[23],"management":[25,85],"schemes,":[26],"which":[27,67],"rely":[28],"on":[29,61],"periodic":[30],"updates,":[31],"introduce":[32],"significant":[33],"vulnerabilities":[34],"due":[35],"to":[36,93,151,241,258],"long":[37],"windows":[38],"between":[41],"rotations.":[43],"Also,":[44],"it":[45,291],"often":[46],"requires":[47],"high":[48],"computational":[49,161,244],"overhead":[50,255],"from":[51,146],"re\u2010encrypting":[52,164],"entire":[53],"datasets":[54],"during":[55],"updates":[57],"frequently":[59],"depends":[60],"third\u2010party":[62],"auditors":[63],"for":[64,116,126,172,184,223,297],"verification,":[66],"can":[68,88],"compromise":[69],"privacy.":[70],"However,":[71],"major":[73],"research":[74],"gap":[75],"remains":[76],"developing":[78],"scalable,":[80],"efficient,":[81],"auditor\u2010free":[83],"protocol":[86],"that":[87,110,204,274],"adapt":[89],"real":[91],"time":[92,213],"evolving":[94],"access":[96,149],"patterns.":[97],"In":[98],"this":[99],"paper,":[100],"we":[101],"propose":[102],"novel":[104],"Dynamic":[105],"Event\u2010Driven":[106],"Key":[107],"Regeneration":[108],"System":[109],"leverages":[111],"Elliptic":[112],"Curve":[113],"Diffie\u2010Hellman":[114],"(ECDH)":[115],"secure":[117,295],"exchange":[119],"Advanced":[121],"Encryption":[122],"Standard\u2014Galois/Counter":[123],"Mode":[124],"(AES\u2010GCM)":[125],"combined":[127],"encryption":[128,217,269],"verification.":[131],"Unlike":[132],"conventional":[133],"time\u2010":[134],"or":[135],"session\u2010based":[136],"strategies,":[137],"proposed":[139,179,206,276],"design":[140],"uses":[141],"statistically":[142],"adaptive":[143],"thresholding":[144],"derived":[145],"real\u2010time":[147],"file":[148],"patterns":[150],"enable":[152],"on\u2010demand":[153],"regeneration":[155,229],"selective":[157],"re\u2010encryption,":[158],"drastically":[159],"reducing":[160],"overhead.":[162],"By":[163],"only":[165],"affected":[166],"files,":[167,226],"system":[169,207,247,279],"optimized":[171],"large\u2010scale,":[173],"multi\u2010tenant":[174,251],"environments.":[176],"Furthermore,":[177],"approach":[180],"eliminates":[181],"need":[183],"external":[185],"auditors,":[186],"as":[187,231,233],"verification":[189],"performed":[191],"internally":[192],"via":[193],"cryptographic":[194],"mechanisms,":[195],"ensuring":[196],"both":[197],"privacy":[198],"security.":[200],"Experimental":[201],"results":[202,272],"show":[203],"achieves":[208],"an":[209],"average":[210],"generation":[212],"2.3":[215],"ms,":[216],"latency":[218],"just":[220],"0.21":[221],"s":[222],"100":[224,259],"MB":[225],"times":[230],"low":[232,254,288],"0.0012\u20130.0350":[234],"s,":[235],"outperforming":[236],"existing":[237],"approaches":[238],"by":[239],"up":[240,257],"80%":[242],"efficiency.":[245],"The":[246],"scales":[248],"efficiently":[249],"environments,":[252],"maintaining":[253,287],"with":[256,266],"users":[260],"providing":[262],"near\u2010linear":[263],"performance":[264],"even":[265],"1000":[267],"concurrent":[268],"operations.":[270],"These":[271],"demonstrate":[273],"adaptive,":[277],"event\u2010driven":[278],"offers":[280],"enhanced":[281],"protection":[282],"against":[283],"while":[286],"overhead,":[289],"making":[290],"viable":[293],"solution":[296],"modern":[298],"infrastructures.":[300]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-10T00:00:00"}
