{"id":"https://openalex.org/W4407783392","doi":"https://doi.org/10.1109/comsnets63942.2025.10885758","title":"Enhancing Privacy and Trust in Societal Surveillance through Attribute-Based Encryption","display_name":"Enhancing Privacy and Trust in Societal Surveillance through Attribute-Based Encryption","publication_year":2025,"publication_date":"2025-01-06","ids":{"openalex":"https://openalex.org/W4407783392","doi":"https://doi.org/10.1109/comsnets63942.2025.10885758"},"language":"en","primary_location":{"id":"doi:10.1109/comsnets63942.2025.10885758","is_oa":false,"landing_page_url":"https://doi.org/10.1109/comsnets63942.2025.10885758","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 17th International Conference on COMmunication Systems and NETworks (COMSNETS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5068708228","display_name":"Kasturi Routray","orcid":"https://orcid.org/0009-0009-4473-7390"},"institutions":[{"id":"https://openalex.org/I99729588","display_name":"Indian Institute of Technology Bhubaneswar","ror":"https://ror.org/04gx72j20","country_code":"IN","type":"education","lineage":["https://openalex.org/I99729588"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Kasturi Routray","raw_affiliation_strings":["Indian Institute of Technology Bhubaneswar,India"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Technology Bhubaneswar,India","institution_ids":["https://openalex.org/I99729588"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Aditya Das","orcid":null},"institutions":[{"id":"https://openalex.org/I99729588","display_name":"Indian Institute of Technology Bhubaneswar","ror":"https://ror.org/04gx72j20","country_code":"IN","type":"education","lineage":["https://openalex.org/I99729588"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Aditya Das","raw_affiliation_strings":["Indian Institute of Technology Bhubaneswar,India"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Technology Bhubaneswar,India","institution_ids":["https://openalex.org/I99729588"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5071220202","display_name":"Padmalochan Bera","orcid":"https://orcid.org/0000-0002-0044-7051"},"institutions":[{"id":"https://openalex.org/I99729588","display_name":"Indian Institute of Technology Bhubaneswar","ror":"https://ror.org/04gx72j20","country_code":"IN","type":"education","lineage":["https://openalex.org/I99729588"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Padmalochan Bera","raw_affiliation_strings":["Indian Institute of Technology Bhubaneswar,India"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Technology Bhubaneswar,India","institution_ids":["https://openalex.org/I99729588"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5068708228"],"corresponding_institution_ids":["https://openalex.org/I99729588"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.01168642,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9836999773979187,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9836999773979187,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9562000036239624,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9203000068664551,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6841486096382141},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6460540294647217},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.6363513469696045},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.622299075126648},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4803553819656372},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.4634983241558075},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.38197776675224304},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.2280045747756958}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6841486096382141},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6460540294647217},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.6363513469696045},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.622299075126648},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4803553819656372},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.4634983241558075},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.38197776675224304},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2280045747756958}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/comsnets63942.2025.10885758","is_oa":false,"landing_page_url":"https://doi.org/10.1109/comsnets63942.2025.10885758","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 17th International Conference on COMmunication Systems and NETworks (COMSNETS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5199999809265137,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W24581508","https://openalex.org/W1638747471","https://openalex.org/W2078590992","https://openalex.org/W2108072891","https://openalex.org/W2108880818","https://openalex.org/W2355550369","https://openalex.org/W2730822698","https://openalex.org/W2924849285","https://openalex.org/W2987451067","https://openalex.org/W3003267684","https://openalex.org/W4394714396","https://openalex.org/W4400082584","https://openalex.org/W4401211557","https://openalex.org/W4403105129","https://openalex.org/W6678552747","https://openalex.org/W6797799041"],"related_works":["https://openalex.org/W2584827882","https://openalex.org/W3195097297","https://openalex.org/W4225340788","https://openalex.org/W3038106605","https://openalex.org/W2513267613","https://openalex.org/W3049084372","https://openalex.org/W2528109871","https://openalex.org/W2940702331","https://openalex.org/W2905822832","https://openalex.org/W2240244939"],"abstract_inverted_index":{"The":[0,158],"widespread":[1],"adoption":[2],"of":[3,49,120,125],"societal":[4,61,168],"surveillance":[5,62,121],"systems":[6,19],"has":[7],"significantly":[8],"improved":[9],"public":[10,130],"safety,":[11],"urban":[12],"management,":[13],"and":[14,28,105,108,132,137,149,155,173,180],"resource":[15],"efficiency.":[16,157],"However,":[17],"these":[18],"have":[20],"also":[21],"raised":[22],"serious":[23],"concerns":[24],"about":[25],"individual":[26,127],"privacy":[27,59,107],"data":[29,80,95,103],"protection,":[30],"highlighting":[31],"the":[32,47,93,118,123,146,151],"need":[33],"for":[34,167,177],"strong":[35],"cryptographic":[36],"mechanisms":[37],"to":[38,57,78,99],"protect":[39],"sensitive":[40],"information.":[41],"In":[42],"this":[43],"research,":[44],"we":[45,144],"investigate":[46],"application":[48],"Ciphertext-Policy":[50],"Attribute-Based":[51],"Encryption":[52],"(CP-ABE)":[53],"as":[54],"a":[55,141,164,171],"means":[56],"enhance":[58],"within":[60],"frameworks.":[63],"Unlike":[64],"traditional":[65],"all-or-nothing<sup":[66],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[67],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">1</sup>":[68],"encryption":[69],"approaches,":[70],"our":[71],"proposed":[72],"CP-ABE-based":[73],"architecture":[74],"enables":[75],"selective":[76],"access":[77,92],"encrypted":[79],"segments":[81],"based":[82],"on":[83],"user":[84],"attributes.":[85],"This":[86],"ensures":[87],"that":[88,161],"users":[89],"can":[90,115],"only":[91],"specific":[94],"they":[96],"are":[97],"authorized":[98],"view,":[100],"minimizing":[101],"unnecessary":[102],"exposure":[104],"enhancing":[106],"security.":[109],"Our":[110],"approach":[111,176],"demonstrates":[112],"how":[113],"CP-ABE":[114,162],"effectively":[116],"balance":[117],"requirements":[119],"with":[122,135],"imperative":[124],"protecting":[126],"privacy,":[128],"building":[129],"trust,":[131],"ensuring":[133],"compliance":[134],"legal":[136],"ethical":[138],"standards.":[139],"Through":[140],"use-case":[142],"scenario,":[143],"evaluate":[145],"system\u2019s":[147],"performance":[148],"examine":[150],"trade-offs":[152],"between":[153],"security":[154],"computational":[156],"results":[159],"confirm":[160],"is":[163],"feasible":[165],"solution":[166],"surveillance,":[169],"offering":[170],"scalable":[172],"adaptable":[174],"privacy-preserving":[175],"smart":[178],"cities":[179],"beyond.":[181]},"counts_by_year":[],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-10T00:00:00"}
