{"id":"https://openalex.org/W2972273368","doi":"https://doi.org/10.1109/access.2019.2938823","title":"Securing the Intermediate Data of Scientific Workflows in Clouds With ACISO","display_name":"Securing the Intermediate Data of Scientific Workflows in Clouds With ACISO","publication_year":2019,"publication_date":"2019-01-01","ids":{"openalex":"https://openalex.org/W2972273368","doi":"https://doi.org/10.1109/access.2019.2938823","mag":"2972273368"},"language":"en","primary_location":{"id":"doi:10.1109/access.2019.2938823","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2938823","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2019.2938823","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100371598","display_name":"Yawen Wang","orcid":"https://orcid.org/0000-0003-4783-0450"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Yawen Wang","raw_affiliation_strings":["National Digital Switching System Engineering and Technological Research Center, Zhengzhou, China"],"raw_orcid":"https://orcid.org/0000-0003-4783-0450","affiliations":[{"raw_affiliation_string":"National Digital Switching System Engineering and Technological Research Center, Zhengzhou, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102860167","display_name":"Yunfei Guo","orcid":"https://orcid.org/0000-0002-7104-4209"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yunfei Guo","raw_affiliation_strings":["National Digital Switching System Engineering and Technological Research Center, Zhengzhou, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"National Digital Switching System Engineering and Technological Research Center, Zhengzhou, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026436576","display_name":"Zehua Guo","orcid":"https://orcid.org/0000-0001-7314-410X"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zehua Guo","raw_affiliation_strings":["School of Automation, Beijing Institute of Technology, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0001-7314-410X","affiliations":[{"raw_affiliation_string":"School of Automation, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101487992","display_name":"Wenyan Liu","orcid":"https://orcid.org/0000-0002-9312-1295"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Wenyan Liu","raw_affiliation_strings":["National Digital Switching System Engineering and Technological Research Center, Zhengzhou, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"National Digital Switching System Engineering and Technological Research Center, Zhengzhou, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101767237","display_name":"Chao Yang","orcid":"https://orcid.org/0000-0001-8272-3576"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Chao Yang","raw_affiliation_strings":["National Digital Switching System Engineering and Technological Research Center, Zhengzhou, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"National Digital Switching System Engineering and Technological Research Center, Zhengzhou, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100371598"],"corresponding_institution_ids":[],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":3.9899,"has_fulltext":false,"cited_by_count":17,"citation_normalized_percentile":{"value":0.95473003,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"7","issue":null,"first_page":"126603","last_page":"126617"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11986","display_name":"Scientific Computing and Data Management","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11986","display_name":"Scientific Computing and Data Management","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10101","display_name":"Cloud Computing and Resource Management","score":0.9926000237464905,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8611721992492676},{"id":"https://openalex.org/keywords/workflow","display_name":"Workflow","score":0.8183391094207764},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5950254201889038},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.5744985342025757},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5269520878791809},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.46840283274650574},{"id":"https://openalex.org/keywords/workflow-management-system","display_name":"Workflow management system","score":0.452392041683197},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.4392838478088379},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.43396320939064026},{"id":"https://openalex.org/keywords/workflow-technology","display_name":"Workflow technology","score":0.421421617269516},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.42084968090057373},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.36027297377586365},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.346946120262146},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08768084645271301}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8611721992492676},{"id":"https://openalex.org/C177212765","wikidata":"https://www.wikidata.org/wiki/Q627335","display_name":"Workflow","level":2,"score":0.8183391094207764},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5950254201889038},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.5744985342025757},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5269520878791809},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.46840283274650574},{"id":"https://openalex.org/C140824633","wikidata":"https://www.wikidata.org/wiki/Q2808660","display_name":"Workflow management system","level":3,"score":0.452392041683197},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.4392838478088379},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.43396320939064026},{"id":"https://openalex.org/C19612761","wikidata":"https://www.wikidata.org/wiki/Q8034836","display_name":"Workflow technology","level":3,"score":0.421421617269516},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.42084968090057373},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.36027297377586365},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.346946120262146},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08768084645271301},{"id":"https://openalex.org/C187736073","wikidata":"https://www.wikidata.org/wiki/Q2920921","display_name":"Management","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2019.2938823","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2938823","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:16f5568e735c43a5a9ba6414c44e5185","is_oa":true,"landing_page_url":"https://doaj.org/article/16f5568e735c43a5a9ba6414c44e5185","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 7, Pp 126603-126617 (2019)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2019.2938823","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2938823","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.4399999976158142}],"awards":[{"id":"https://openalex.org/G3051082215","display_name":null,"funder_award_id":"Z170003","funder_id":"https://openalex.org/F4320322919","funder_display_name":"Natural Science Foundation of Beijing Municipality"},{"id":"https://openalex.org/G3381088647","display_name":null,"funder_award_id":"2018YFB1003700","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G3934757944","display_name":null,"funder_award_id":"2018YFB0804004","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G4137032510","display_name":null,"funder_award_id":"61521003","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322919","display_name":"Natural Science Foundation of Beijing Municipality","ror":null},{"id":"https://openalex.org/F4320323110","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":48,"referenced_works":["https://openalex.org/W613054787","https://openalex.org/W1494464477","https://openalex.org/W1585067194","https://openalex.org/W1969622238","https://openalex.org/W1970275772","https://openalex.org/W1970979311","https://openalex.org/W1976188373","https://openalex.org/W1976644536","https://openalex.org/W1986421100","https://openalex.org/W1986834168","https://openalex.org/W1998082182","https://openalex.org/W2011893902","https://openalex.org/W2051226862","https://openalex.org/W2051644464","https://openalex.org/W2056640105","https://openalex.org/W2074444460","https://openalex.org/W2078962046","https://openalex.org/W2088723799","https://openalex.org/W2088823897","https://openalex.org/W2096179904","https://openalex.org/W2114835420","https://openalex.org/W2116508348","https://openalex.org/W2117278106","https://openalex.org/W2128548442","https://openalex.org/W2145007750","https://openalex.org/W2162460714","https://openalex.org/W2169741774","https://openalex.org/W2218919311","https://openalex.org/W2258432161","https://openalex.org/W2285054753","https://openalex.org/W2417781097","https://openalex.org/W2516921826","https://openalex.org/W2526197136","https://openalex.org/W2539177760","https://openalex.org/W2561389184","https://openalex.org/W2583680829","https://openalex.org/W2593887026","https://openalex.org/W2597991262","https://openalex.org/W2600393154","https://openalex.org/W2614535848","https://openalex.org/W2617748895","https://openalex.org/W2739088306","https://openalex.org/W2751537599","https://openalex.org/W2784150309","https://openalex.org/W2909207503","https://openalex.org/W2916636053","https://openalex.org/W2970566175","https://openalex.org/W4248419975"],"related_works":["https://openalex.org/W2373541195","https://openalex.org/W2379425324","https://openalex.org/W2376410910","https://openalex.org/W2375552622","https://openalex.org/W2391168633","https://openalex.org/W2365658322","https://openalex.org/W2385499106","https://openalex.org/W2352344200","https://openalex.org/W291310304","https://openalex.org/W2370109655"],"abstract_inverted_index":{"Many":[0],"scientific":[1,9,14,40,183,229],"workflow":[2,10,62,98,107,176,184],"applications":[3],"are":[4,137],"moving":[5],"to":[6,116,162,206],"clouds.":[7],"A":[8],"is":[11,51,81,197],"a":[12,152,182,186,203],"complicated":[13],"computing":[15],"task":[16],"consisting":[17],"of":[18,39,46,60,102,174,189,223,227],"many":[19],"sub-tasks,":[20],"and":[21,75,126,133,145,178,221],"each":[22],"sub-task":[23,34],"execution":[24,38],"can":[25,215],"generate":[26],"the":[27,32,44,47,58,61,67,78,90,100,118,129,164,172,175,190,218,224,228],"intermediate":[28,48,68,79,91,119,166,191,225],"data":[29,69,80,120,167,226],"used":[30],"for":[31],"successor":[33],"execution.":[35,63],"The":[36,209],"correct":[37],"workflows":[41],"depends":[42],"on":[43],"security":[45,153,168],"data,":[49,192],"which":[50,160],"transmitted":[52],"frequently":[53],"between":[54],"virtual":[55],"machines":[56],"during":[57],"process":[59],"In":[64,128],"multi-tenant":[65],"clouds,":[66],"contains":[70,185],"three":[71],"attributes:":[72],"availability,":[73,124,131,219],"confidentiality":[74,132],"integrity.":[76,127],"If":[77],"lost,":[82],"stolen,":[83],"or":[84,105],"tampered":[85],"with":[86],"by":[87,121,139],"malicious":[88],"tenants,":[89],"data's":[92],"attribute":[93],"will":[94],"be":[95],"damaged,":[96],"causing":[97],"interruption,":[99],"leakage":[101],"secret":[103],"information":[104],"incorrect":[106],"results.":[108],"For":[109],"these":[110],"problems,":[111],"we":[112,150,201],"propose":[113,202],"ACISO":[114,214],"scheme":[115],"secure":[117],"improving":[122],"its":[123],"confidentiality,":[125,220],"scheme,":[130],"integrity":[134,222],"strategy":[135,154],"pools":[136],"constructed":[138],"various":[140],"erasure":[141],"codes,":[142],"encryption":[143],"algorithms":[144],"hash":[146],"functions,":[147],"respectively.":[148],"Then":[149],"present":[151],"optimal":[155],"allocation":[156],"model":[157,196],"named":[158],"SSOA,":[159],"aims":[161],"maximize":[163],"overall":[165],"strength":[169],"while":[170],"meeting":[171],"constraints":[173],"makespan":[177],"storage":[179],"overhead.":[180],"Normally,":[181],"large":[187],"number":[188],"so":[193],"solving":[194],"this":[195],"NP":[198],"hard.":[199],"Therefore,":[200],"heuristic":[204],"solution":[205],"solve":[207],"SSOA.":[208],"simulation":[210],"results":[211],"show":[212],"that":[213],"effectively":[216],"improve":[217],"workflows.":[230]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2}],"updated_date":"2026-05-12T08:28:47.272897","created_date":"2025-10-10T00:00:00"}
