{"id":"https://openalex.org/W2806581615","doi":"https://doi.org/10.1109/access.2018.2844373","title":"Achieving Scalable Access Control Over Encrypted Data for Edge Computing Networks","display_name":"Achieving Scalable Access Control Over Encrypted Data for Edge Computing Networks","publication_year":2018,"publication_date":"2018-01-01","ids":{"openalex":"https://openalex.org/W2806581615","doi":"https://doi.org/10.1109/access.2018.2844373","mag":"2806581615"},"language":"en","primary_location":{"id":"doi:10.1109/access.2018.2844373","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2018.2844373","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2018.2844373","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011853980","display_name":"Hui Cui","orcid":"https://orcid.org/0000-0002-5820-2233"},"institutions":[{"id":"https://openalex.org/I82951845","display_name":"RMIT University","ror":"https://ror.org/04ttjf776","country_code":"AU","type":"education","lineage":["https://openalex.org/I82951845"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Hui Cui","raw_affiliation_strings":["School of Science, RMIT University, Melbourne, VIC, AU"],"affiliations":[{"raw_affiliation_string":"School of Science, RMIT University, Melbourne, VIC, AU","institution_ids":["https://openalex.org/I82951845"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100709723","display_name":"Xun Yi","orcid":"https://orcid.org/0000-0001-7351-5724"},"institutions":[{"id":"https://openalex.org/I82951845","display_name":"RMIT University","ror":"https://ror.org/04ttjf776","country_code":"AU","type":"education","lineage":["https://openalex.org/I82951845"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Xun Yi","raw_affiliation_strings":["School of Science, RMIT University, Melbourne, VIC, AU"],"affiliations":[{"raw_affiliation_string":"School of Science, RMIT University, Melbourne, VIC, AU","institution_ids":["https://openalex.org/I82951845"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5082256444","display_name":"\u202aSurya Nepal\u202c","orcid":"https://orcid.org/0000-0002-3289-6599"},"institutions":[{"id":"https://openalex.org/I1292875679","display_name":"Commonwealth Scientific and Industrial Research Organisation","ror":"https://ror.org/03qn8fb07","country_code":"AU","type":"government","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I4387156119"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Surya Nepal","raw_affiliation_strings":["Commonwealth Scientific and Industrial Research Organisation, Canberra, ACT, AU"],"affiliations":[{"raw_affiliation_string":"Commonwealth Scientific and Industrial Research Organisation, Canberra, ACT, AU","institution_ids":["https://openalex.org/I1292875679"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5011853980"],"corresponding_institution_ids":["https://openalex.org/I82951845"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":3.7186,"has_fulltext":false,"cited_by_count":42,"citation_normalized_percentile":{"value":0.94464112,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"6","issue":null,"first_page":"30049","last_page":"30059"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9847000241279602,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.855515718460083},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7308822870254517},{"id":"https://openalex.org/keywords/edge-computing","display_name":"Edge computing","score":0.6207491159439087},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6038259863853455},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5958754420280457},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.5823509693145752},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.5785530209541321},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5640663504600525},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.5164635181427002},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.4617609679698944},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4525134861469269},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.4319967031478882},{"id":"https://openalex.org/keywords/proxy-re-encryption","display_name":"Proxy re-encryption","score":0.4100201725959778},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.37993454933166504},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.256372332572937},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.15980005264282227}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.855515718460083},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7308822870254517},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.6207491159439087},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6038259863853455},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5958754420280457},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.5823509693145752},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.5785530209541321},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5640663504600525},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.5164635181427002},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.4617609679698944},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4525134861469269},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.4319967031478882},{"id":"https://openalex.org/C2776861820","wikidata":"https://www.wikidata.org/wiki/Q7252899","display_name":"Proxy re-encryption","level":4,"score":0.4100201725959778},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.37993454933166504},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.256372332572937},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.15980005264282227},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0}],"mesh":[],"locations_count":5,"locations":[{"id":"doi:10.1109/access.2018.2844373","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2018.2844373","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:researchrepository.murdoch.edu.au:44032","is_oa":false,"landing_page_url":"https://researchrepository.murdoch.edu.au/id/eprint/44032/","pdf_url":null,"source":{"id":"https://openalex.org/S4306400274","display_name":"Murdoch Research Repository (Murdoch University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I176790772","host_organization_name":"Murdoch University","host_organization_lineage":["https://openalex.org/I176790772"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"  Cui, H. &lt;https://researchrepository.murdoch.edu.au/view/author/Cui, Hui.html&gt;ORCID: 0000-0002-5820-2233 &lt;http://orcid.org/0000-0002-5820-2233&gt;, Yi, X. and Nepal, S.   (2018)  Achieving scalable access control over encrypted data for edge computing networks.    IEEE Access, 6 .   pp. 30049-30059.  ","raw_type":"Journal Article"},{"id":"pmh:oai:alma.61RMIT_INST:11247613210001341","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ACCESS.2018.2844373","pdf_url":null,"source":{"id":"https://openalex.org/S4306402074","display_name":"RMIT Research Repository (RMIT University Library)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I82951845","host_organization_name":"RMIT University","host_organization_lineage":["https://openalex.org/I82951845"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"text"},{"id":"pmh:oai:doaj.org/article:04d1752e6c544e14a199c2a5054f0173","is_oa":true,"landing_page_url":"https://doaj.org/article/04d1752e6c544e14a199c2a5054f0173","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 6, Pp 30049-30059 (2018)","raw_type":"article"},{"id":"pmh:oai:figshare.com:article/27512682","is_oa":true,"landing_page_url":"https://figshare.com/articles/journal_contribution/Achieving_Scalable_Access_Control_over_Encrypted_Data_for_Edge_Computing_Networks/27512682","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"}],"best_oa_location":{"id":"doi:10.1109/access.2018.2844373","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2018.2844373","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W70096886","https://openalex.org/W162787226","https://openalex.org/W1498316612","https://openalex.org/W1510795740","https://openalex.org/W1682451491","https://openalex.org/W1974267799","https://openalex.org/W2044772384","https://openalex.org/W2058701727","https://openalex.org/W2078590992","https://openalex.org/W2086298846","https://openalex.org/W2108072891","https://openalex.org/W2108834246","https://openalex.org/W2114623221","https://openalex.org/W2322315143","https://openalex.org/W2416799949","https://openalex.org/W2519173433","https://openalex.org/W2579975022","https://openalex.org/W2589108343","https://openalex.org/W2738135234","https://openalex.org/W2767189587","https://openalex.org/W2788225348","https://openalex.org/W3128663643","https://openalex.org/W6602830368","https://openalex.org/W6637293744","https://openalex.org/W6790131382"],"related_works":["https://openalex.org/W2792978874","https://openalex.org/W4223919663","https://openalex.org/W1582239555","https://openalex.org/W2982130125","https://openalex.org/W1574326402","https://openalex.org/W4285255193","https://openalex.org/W4225688985","https://openalex.org/W3031006976","https://openalex.org/W1905687471","https://openalex.org/W2042220809"],"abstract_inverted_index":{"The":[0],"concept":[1],"of":[2,4,22,51,57,78,131,167,181],"Internet":[3],"Things":[5],"(IoT)":[6],"has":[7,39,148],"raised":[8],"in":[9,108,151],"the":[10,25,29,44,49,52,58,62,75,86,129,132,140,153,182],"cloud":[11,45],"computing":[12,38,46,73,110],"paradigm":[13],"as":[14],"it":[15,81],"adds":[16],"latency":[17,76],"when":[18],"migrating":[19],"all":[20],"pieces":[21],"data":[23,30,60,79,87,104],"from":[24],"network":[26],"edge":[27,50,72,109,136],"to":[28,34,42,48,85,97,102,135,139,186],"center":[31],"for":[32],"them":[33],"be":[35],"approached.":[36],"Edge":[37],"been":[40],"introduced":[41],"extend":[43],"architecture":[47],"network,":[53],"which":[54,94,127,152],"analyzes":[55],"most":[56],"IoT":[59],"near":[61],"devices":[63],"that":[64,69],"produce":[65],"and":[66,89,106,169],"act":[67],"on":[68],"data.":[70],"Though":[71],"solves":[74],"problem":[77],"processing,":[80],"also":[82],"brings":[83],"issues":[84],"security":[88,105],"privacy":[90,107],"preservation.":[91],"One":[92],"technique":[93],"is":[95,111],"potential":[96],"provide":[98],"scalable":[99],"access":[100],"control":[101],"support":[103],"attribute-based":[112],"encryption":[113],"(ABE).":[114],"In":[115,175],"this":[116],"paper,":[117],"we":[118,177],"propose":[119],"a":[120,164],"primitive":[121],"named":[122],"proxy-aided":[123],"ciphertext-policy":[124],"ABE":[125,142],"(PA-CPABE),":[126],"outsources":[128],"majority":[130],"decryption":[133,145],"computations":[134],"devices.":[137],"Compared":[138],"existing":[141],"with":[143],"outsourced":[144],"schemes,":[146],"PA-CPABE":[147,168,184],"an":[149,179],"advantage":[150],"key":[154],"distribution":[155],"does":[156],"not":[157],"require":[158],"any":[159],"secure":[160],"channels.":[161],"We":[162],"present":[163],"generic":[165],"construction":[166],"then":[170],"formally":[171],"prove":[172],"its":[173,188],"security.":[174],"addition,":[176],"implement":[178],"instantiation":[180],"proposed":[183],"framework":[185],"evaluate":[187],"performance.":[189]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":9},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":8},{"year":2020,"cited_by_count":8},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":3}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
