{"id":"https://openalex.org/W4414346740","doi":"https://doi.org/10.1007/s10586-025-05565-w","title":"The hybrid-encryption-based data sharing scheme with keyword-based auditing function in cloud storage setting","display_name":"The hybrid-encryption-based data sharing scheme with keyword-based auditing function in cloud storage setting","publication_year":2025,"publication_date":"2025-09-19","ids":{"openalex":"https://openalex.org/W4414346740","doi":"https://doi.org/10.1007/s10586-025-05565-w"},"language":"en","primary_location":{"id":"doi:10.1007/s10586-025-05565-w","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s10586-025-05565-w","pdf_url":null,"source":{"id":"https://openalex.org/S106148199","display_name":"Cluster Computing","issn_l":"1386-7857","issn":["1386-7857","1573-7543"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cluster Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101494678","display_name":"Luyao Yang","orcid":"https://orcid.org/0000-0002-1478-0170"},"institutions":[{"id":"https://openalex.org/I148099405","display_name":"Xi'an University of Architecture and Technology","ror":"https://ror.org/04v2j2k71","country_code":"CN","type":"education","lineage":["https://openalex.org/I148099405"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Luyao Yang","raw_affiliation_strings":["School of Information and Control Engineering, Xi\u2019An University of Architecture and Technology, Xi\u2019An, 710055, Shaanxi, P.R. China","School of Information and Control Engineering, Xi'An University of Architecture and Technology, Xi'An, 710055, Shaanxi, P.R. China"],"affiliations":[{"raw_affiliation_string":"School of Information and Control Engineering, Xi\u2019An University of Architecture and Technology, Xi\u2019An, 710055, Shaanxi, P.R. China","institution_ids":["https://openalex.org/I148099405"]},{"raw_affiliation_string":"School of Information and Control Engineering, Xi'An University of Architecture and Technology, Xi'An, 710055, Shaanxi, P.R. China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053498620","display_name":"Jinyong Chang","orcid":"https://orcid.org/0000-0002-6569-5152"},"institutions":[{"id":"https://openalex.org/I148099405","display_name":"Xi'an University of Architecture and Technology","ror":"https://ror.org/04v2j2k71","country_code":"CN","type":"education","lineage":["https://openalex.org/I148099405"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jinyong Chang","raw_affiliation_strings":["School of Information and Control Engineering, Xi\u2019An University of Architecture and Technology, Xi\u2019An, 710055, Shaanxi, P.R. China","School of Information and Control Engineering, Xi'An University of Architecture and Technology, Xi'An, 710055, Shaanxi, P.R. China"],"affiliations":[{"raw_affiliation_string":"School of Information and Control Engineering, Xi\u2019An University of Architecture and Technology, Xi\u2019An, 710055, Shaanxi, P.R. China","institution_ids":["https://openalex.org/I148099405"]},{"raw_affiliation_string":"School of Information and Control Engineering, Xi'An University of Architecture and Technology, Xi'An, 710055, Shaanxi, P.R. China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100321497","display_name":"Yuhang Zhang","orcid":"https://orcid.org/0000-0001-7129-7241"},"institutions":[{"id":"https://openalex.org/I148099405","display_name":"Xi'an University of Architecture and Technology","ror":"https://ror.org/04v2j2k71","country_code":"CN","type":"education","lineage":["https://openalex.org/I148099405"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuhang Zhang","raw_affiliation_strings":["School of Information and Control Engineering, Xi\u2019An University of Architecture and Technology, Xi\u2019An, 710055, Shaanxi, P.R. China","School of Information and Control Engineering, Xi'An University of Architecture and Technology, Xi'An, 710055, Shaanxi, P.R. China"],"affiliations":[{"raw_affiliation_string":"School of Information and Control Engineering, Xi\u2019An University of Architecture and Technology, Xi\u2019An, 710055, Shaanxi, P.R. China","institution_ids":["https://openalex.org/I148099405"]},{"raw_affiliation_string":"School of Information and Control Engineering, Xi'An University of Architecture and Technology, Xi'An, 710055, Shaanxi, P.R. China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5024369927","display_name":"Yu\u2010Rong Liu","orcid":"https://orcid.org/0000-0003-1112-4255"},"institutions":[{"id":"https://openalex.org/I148099405","display_name":"Xi'an University of Architecture and Technology","ror":"https://ror.org/04v2j2k71","country_code":"CN","type":"education","lineage":["https://openalex.org/I148099405"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yurong Liu","raw_affiliation_strings":["School of Information and Control Engineering, Xi\u2019An University of Architecture and Technology, Xi\u2019An, 710055, Shaanxi, P.R. China","School of Information and Control Engineering, Xi'An University of Architecture and Technology, Xi'An, 710055, Shaanxi, P.R. China"],"affiliations":[{"raw_affiliation_string":"School of Information and Control Engineering, Xi\u2019An University of Architecture and Technology, Xi\u2019An, 710055, Shaanxi, P.R. China","institution_ids":["https://openalex.org/I148099405"]},{"raw_affiliation_string":"School of Information and Control Engineering, Xi'An University of Architecture and Technology, Xi'An, 710055, Shaanxi, P.R. China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101494678"],"corresponding_institution_ids":["https://openalex.org/I148099405"],"apc_list":{"value":2190,"currency":"EUR","value_usd":2790},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.37900106,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"28","issue":"13","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9416999816894531,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/audit","display_name":"Audit","score":0.7477999925613403},{"id":"https://openalex.org/keywords/data-sharing","display_name":"Data sharing","score":0.7268999814987183},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6434999704360962},{"id":"https://openalex.org/keywords/cloud-storage","display_name":"Cloud storage","score":0.6403999924659729},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6395999789237976},{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.6269999742507935},{"id":"https://openalex.org/keywords/redundancy","display_name":"Redundancy (engineering)","score":0.5382999777793884},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.5331000089645386},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.5094000101089478}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8695999979972839},{"id":"https://openalex.org/C199521495","wikidata":"https://www.wikidata.org/wiki/Q181487","display_name":"Audit","level":2,"score":0.7477999925613403},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.7268999814987183},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6434999704360962},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.6403999924659729},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6395999789237976},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.6269999742507935},{"id":"https://openalex.org/C152124472","wikidata":"https://www.wikidata.org/wiki/Q1204361","display_name":"Redundancy (engineering)","level":2,"score":0.5382999777793884},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.5331000089645386},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.5094000101089478},{"id":"https://openalex.org/C7545210","wikidata":"https://www.wikidata.org/wiki/Q838123","display_name":"Data redundancy","level":2,"score":0.4830000102519989},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.460999995470047},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.4058000147342682},{"id":"https://openalex.org/C194739806","wikidata":"https://www.wikidata.org/wiki/Q66221","display_name":"Computer data storage","level":2,"score":0.40209999680519104},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.3912999927997589},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.35899999737739563},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.3537999987602234},{"id":"https://openalex.org/C47487241","wikidata":"https://www.wikidata.org/wiki/Q5227230","display_name":"Data access","level":2,"score":0.3310999870300293},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.3192000091075897},{"id":"https://openalex.org/C69360830","wikidata":"https://www.wikidata.org/wiki/Q1172237","display_name":"Data Protection Act 1998","level":2,"score":0.3154999911785126},{"id":"https://openalex.org/C39358052","wikidata":"https://www.wikidata.org/wiki/Q2578632","display_name":"Information security audit","level":5,"score":0.3131999969482422},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.304500013589859},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.28760001063346863},{"id":"https://openalex.org/C196879817","wikidata":"https://www.wikidata.org/wiki/Q872685","display_name":"Data governance","level":4,"score":0.2793999910354614},{"id":"https://openalex.org/C178148461","wikidata":"https://www.wikidata.org/wiki/Q1632136","display_name":"Security controls","level":3,"score":0.27869999408721924},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.27639999985694885},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.2727000117301941},{"id":"https://openalex.org/C1668388","wikidata":"https://www.wikidata.org/wiki/Q1149776","display_name":"Data management","level":2,"score":0.25519999861717224},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.25209999084472656}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s10586-025-05565-w","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s10586-025-05565-w","pdf_url":null,"source":{"id":"https://openalex.org/S106148199","display_name":"Cluster Computing","issn_l":"1386-7857","issn":["1386-7857","1573-7543"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cluster Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W1569083856","https://openalex.org/W1720304360","https://openalex.org/W1994788755","https://openalex.org/W2034944725","https://openalex.org/W2079493184","https://openalex.org/W2102881299","https://openalex.org/W2104348420","https://openalex.org/W2138001464","https://openalex.org/W2961017266","https://openalex.org/W2995331227","https://openalex.org/W3004208557","https://openalex.org/W3022091783","https://openalex.org/W3033391793","https://openalex.org/W3035521882","https://openalex.org/W3039255322","https://openalex.org/W3094285692","https://openalex.org/W3193762657","https://openalex.org/W4285134272","https://openalex.org/W4312436023","https://openalex.org/W4312934694","https://openalex.org/W4313177534","https://openalex.org/W4317620952","https://openalex.org/W4319302723","https://openalex.org/W4319988666","https://openalex.org/W4321608034","https://openalex.org/W4324067724","https://openalex.org/W4379382407","https://openalex.org/W4386766988"],"related_works":[],"abstract_inverted_index":null,"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
