{"id":"https://openalex.org/W2534665467","doi":"https://doi.org/10.1109/fgct.2016.7605072","title":"Encryption as a service for data healthcare cloud security","display_name":"Encryption as a service for data healthcare cloud security","publication_year":2016,"publication_date":"2016-08-01","ids":{"openalex":"https://openalex.org/W2534665467","doi":"https://doi.org/10.1109/fgct.2016.7605072","mag":"2534665467"},"language":"en","primary_location":{"id":"doi:10.1109/fgct.2016.7605072","is_oa":false,"landing_page_url":"https://doi.org/10.1109/fgct.2016.7605072","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 Fifth International Conference on Future Generation Communication Technologies (FGCT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5035884625","display_name":"Abdelali El Bouchti","orcid":null},"institutions":[{"id":"https://openalex.org/I99297268","display_name":"University of Hassan II Casablanca","ror":"https://ror.org/001q4kn48","country_code":"MA","type":"education","lineage":["https://openalex.org/I99297268"]}],"countries":["MA"],"is_corresponding":true,"raw_author_name":"Abdelali El Bouchti","raw_affiliation_strings":["Sciences Ain Chock, Hassan 2nd University, Casablanca, Morocco","Faculty of Sciences Ain Chock, Hassan 2nd University, Casablanca, Morocco"],"affiliations":[{"raw_affiliation_string":"Sciences Ain Chock, Hassan 2nd University, Casablanca, Morocco","institution_ids":["https://openalex.org/I99297268"]},{"raw_affiliation_string":"Faculty of Sciences Ain Chock, Hassan 2nd University, Casablanca, Morocco","institution_ids":["https://openalex.org/I99297268"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028232343","display_name":"Samir Bahsani","orcid":null},"institutions":[{"id":"https://openalex.org/I4210145365","display_name":"Universit\u00e9 Hassan 1er","ror":"https://ror.org/03cdvht47","country_code":"MA","type":"education","lineage":["https://openalex.org/I4210145365"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Samir Bahsani","raw_affiliation_strings":["Sciences and Techniques, Hassan 1st University, Settat, Morocco","Faculty of Sciences and Techniques, Hassan 1st University, Settat, Morocco"],"affiliations":[{"raw_affiliation_string":"Sciences and Techniques, Hassan 1st University, Settat, Morocco","institution_ids":["https://openalex.org/I4210145365"]},{"raw_affiliation_string":"Faculty of Sciences and Techniques, Hassan 1st University, Settat, Morocco","institution_ids":["https://openalex.org/I4210145365"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5015565022","display_name":"Tarik Nahhal","orcid":null},"institutions":[{"id":"https://openalex.org/I99297268","display_name":"University of Hassan II Casablanca","ror":"https://ror.org/001q4kn48","country_code":"MA","type":"education","lineage":["https://openalex.org/I99297268"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Tarik Nahhal","raw_affiliation_strings":["Sciences Ain Chock, Hassan 2nd University, Casablanca, Morocco","Faculty of Sciences Ain Chock, Hassan 2nd University, Casablanca, Morocco"],"affiliations":[{"raw_affiliation_string":"Sciences Ain Chock, Hassan 2nd University, Casablanca, Morocco","institution_ids":["https://openalex.org/I99297268"]},{"raw_affiliation_string":"Faculty of Sciences Ain Chock, Hassan 2nd University, Casablanca, Morocco","institution_ids":["https://openalex.org/I99297268"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5035884625"],"corresponding_institution_ids":["https://openalex.org/I99297268"],"apc_list":null,"apc_paid":null,"fwci":5.9713,"has_fulltext":false,"cited_by_count":26,"citation_normalized_percentile":{"value":0.96303125,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"48","last_page":"54"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9937000274658203,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.8081556558609009},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.764067530632019},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7330309748649597},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6484476327896118},{"id":"https://openalex.org/keywords/client-side-encryption","display_name":"Client-side encryption","score":0.5893334746360779},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5714254379272461},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.5676264762878418},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.5664820671081543},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3497886657714844},{"id":"https://openalex.org/keywords/on-the-fly-encryption","display_name":"On-the-fly encryption","score":0.3182465434074402},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.200298011302948}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.8081556558609009},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.764067530632019},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7330309748649597},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6484476327896118},{"id":"https://openalex.org/C166501710","wikidata":"https://www.wikidata.org/wiki/Q5132476","display_name":"Client-side encryption","level":4,"score":0.5893334746360779},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5714254379272461},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.5676264762878418},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.5664820671081543},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3497886657714844},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.3182465434074402},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.200298011302948}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/fgct.2016.7605072","is_oa":false,"landing_page_url":"https://doi.org/10.1109/fgct.2016.7605072","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 Fifth International Conference on Future Generation Communication Technologies (FGCT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.6000000238418579}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1969518351","https://openalex.org/W1996360405","https://openalex.org/W2003736153","https://openalex.org/W2005500027","https://openalex.org/W2039673320","https://openalex.org/W2047189132","https://openalex.org/W2072325716","https://openalex.org/W2104237724","https://openalex.org/W2160886020","https://openalex.org/W2161346040","https://openalex.org/W2398000137","https://openalex.org/W2569378140","https://openalex.org/W2627086439","https://openalex.org/W2956040668","https://openalex.org/W2990269601","https://openalex.org/W2992333688","https://openalex.org/W4232836212","https://openalex.org/W6662273385","https://openalex.org/W6712161621","https://openalex.org/W6771197777"],"related_works":["https://openalex.org/W2887779253","https://openalex.org/W4319296593","https://openalex.org/W1964796915","https://openalex.org/W1964306602","https://openalex.org/W4313046019","https://openalex.org/W2953109828","https://openalex.org/W1702090048","https://openalex.org/W2963269218","https://openalex.org/W3045127875","https://openalex.org/W2793967262"],"abstract_inverted_index":{"Data":[0],"security":[1,55,148],"continues":[2],"to":[3,28,33,49,56,96,149],"be":[4,29,97],"one":[5],"of":[6,39,54,100,113],"the":[7,58,85,93,110,114],"top":[8],"concerns":[9],"for":[10,146],"cloud":[11,87,94,111,115,121],"computing,":[12],"an":[13],"issue":[14],"that's":[15],"been":[16],"intensified":[17],"by":[18],"recent":[19],"high-profile":[20],"attacks":[21],"in":[22,66,69,98,109,142],"healthcare.":[23],"The":[24],"encryption":[25,68,128,139],"solution":[26],"have":[27],"quick":[30],"and":[31,35,104,123,133,140],"easy":[32],"provision":[34],"provides":[36],"high":[37],"levels":[38],"protec-":[40],"tion":[41],"without":[42],"sacrificing":[43],"network":[44],"performance.":[45],"It's":[46],"another":[47],"way":[48],"provide":[50],"a":[51,74,81],"critical":[52],"layer":[53],"protect":[57],"customers.":[59],"In":[60],"this":[61],"work,":[62],"we":[63,118,125,131],"are":[64],"interested":[65],"data":[67],"healthcare":[70,120],"cloud.":[71],"We":[72],"propose":[73],"hybrid":[75],"architecture":[76,91,145],"based":[77,151],"on":[78,152],"Cryptography":[79],"as":[80],"Service":[82],"(CaaS)":[83],"included":[84],"private":[86],"OpenStack":[88,153],"platform.":[89,154],"This":[90],"authorizes":[92],"clients":[95],"control":[99],"their":[101],"cryptographic":[102],"operations":[103],"keys":[105],"that":[106],"they":[107],"deploy":[108],"independently":[112],"provider.":[116],"Firstly,":[117],"explore":[119],"environment":[122],"then":[124],"analyze":[126],"some":[127],"algorithms.":[129],"Secondly,":[130],"design":[132],"implement":[134],"two":[135],"cryptography":[136],"algorithms":[137],"(homomorphic":[138],"RSA)":[141],"our":[143],"proposed":[144],"providing":[147],"information":[150]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
