{"id":"https://openalex.org/W2917232482","doi":"https://doi.org/10.1109/glocom.2018.8648113","title":"DACSC: Dynamic and Fine-Grained Access Control for Secure Data Collaboration in Cloud Computing","display_name":"DACSC: Dynamic and Fine-Grained Access Control for Secure Data Collaboration in Cloud Computing","publication_year":2018,"publication_date":"2018-12-01","ids":{"openalex":"https://openalex.org/W2917232482","doi":"https://doi.org/10.1109/glocom.2018.8648113","mag":"2917232482"},"language":"en","primary_location":{"id":"doi:10.1109/glocom.2018.8648113","is_oa":false,"landing_page_url":"https://doi.org/10.1109/glocom.2018.8648113","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE Global Communications Conference (GLOBECOM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5052193415","display_name":"Qinlong Huang","orcid":"https://orcid.org/0000-0002-0378-0941"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Qinlong Huang","raw_affiliation_strings":["School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100341092","display_name":"Nan Li","orcid":"https://orcid.org/0000-0002-9351-2800"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Nan Li","raw_affiliation_strings":["School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5071134614","display_name":"Yixian Yang","orcid":"https://orcid.org/0000-0001-8067-4774"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yixian Yang","raw_affiliation_strings":["School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5052193415"],"corresponding_institution_ids":["https://openalex.org/I139759216"],"apc_list":null,"apc_paid":null,"fwci":0.1629,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.61974619,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9919999837875366,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.8446571826934814},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8231038451194763},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.822259783744812},{"id":"https://openalex.org/keywords/upload","display_name":"Upload","score":0.6460437774658203},{"id":"https://openalex.org/keywords/data-access","display_name":"Data access","score":0.6106097102165222},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5410254597663879},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.5168388485908508},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5031189322471619},{"id":"https://openalex.org/keywords/trusted-computing","display_name":"Trusted Computing","score":0.48644089698791504},{"id":"https://openalex.org/keywords/mandatory-access-control","display_name":"Mandatory access control","score":0.4601500630378723},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.33256077766418457},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.282365083694458},{"id":"https://openalex.org/keywords/role-based-access-control","display_name":"Role-based access control","score":0.2606760859489441},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.14137053489685059}],"concepts":[{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.8446571826934814},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8231038451194763},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.822259783744812},{"id":"https://openalex.org/C71901391","wikidata":"https://www.wikidata.org/wiki/Q7126699","display_name":"Upload","level":2,"score":0.6460437774658203},{"id":"https://openalex.org/C47487241","wikidata":"https://www.wikidata.org/wiki/Q5227230","display_name":"Data access","level":2,"score":0.6106097102165222},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5410254597663879},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.5168388485908508},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5031189322471619},{"id":"https://openalex.org/C2776831232","wikidata":"https://www.wikidata.org/wiki/Q966812","display_name":"Trusted Computing","level":2,"score":0.48644089698791504},{"id":"https://openalex.org/C2777407602","wikidata":"https://www.wikidata.org/wiki/Q1888932","display_name":"Mandatory access control","level":4,"score":0.4601500630378723},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.33256077766418457},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.282365083694458},{"id":"https://openalex.org/C45567728","wikidata":"https://www.wikidata.org/wiki/Q1702839","display_name":"Role-based access control","level":3,"score":0.2606760859489441},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.14137053489685059}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/glocom.2018.8648113","is_oa":false,"landing_page_url":"https://doi.org/10.1109/glocom.2018.8648113","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE Global Communications Conference (GLOBECOM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Partnerships for the goals","score":0.41999998688697815,"id":"https://metadata.un.org/sdg/17"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W162787226","https://openalex.org/W1442181477","https://openalex.org/W1498316612","https://openalex.org/W1561443225","https://openalex.org/W1581001589","https://openalex.org/W1963941691","https://openalex.org/W1993032872","https://openalex.org/W2010302109","https://openalex.org/W2108072891","https://openalex.org/W2601755223","https://openalex.org/W2742523794","https://openalex.org/W2763513601","https://openalex.org/W2769916480","https://openalex.org/W2783418282","https://openalex.org/W2790332478","https://openalex.org/W6606608094","https://openalex.org/W6629862473","https://openalex.org/W6634909913"],"related_works":["https://openalex.org/W2158881272","https://openalex.org/W2350594541","https://openalex.org/W2295582286","https://openalex.org/W2539425047","https://openalex.org/W2148952798","https://openalex.org/W2110382905","https://openalex.org/W4248995959","https://openalex.org/W1653371073","https://openalex.org/W1495119096","https://openalex.org/W3157043287"],"abstract_inverted_index":{"Data":[0],"collaboration":[1,13,92,196],"is":[2,72,186,191],"more":[3,5],"and":[4,23,27,48,69,84,136,180,188,190],"popular":[6],"in":[7,66,93,143,198],"cloud":[8,21,36,94,199],"computing.":[9,95,200],"In":[10,31,76],"a":[11,67,73,82,116,132,144],"typical":[12],"scenario,":[14],"data":[15,19,46,58,91,195],"owner":[16],"outsources":[17],"the":[18,29,34,56,106,126,155,169,194],"to":[20,44,54,59,104,130,139],"platforms,":[22],"users":[24,65,123],"can":[25],"access":[26,50,86,108,128,134,141,171],"re-upload":[28],"data.":[30,112],"consideration":[32],"of":[33,97,110],"semi-trusted":[35],"platform,":[37],"attribute-based":[38],"encryption":[39],"(ABE)":[40],"has":[41],"been":[42],"utilized":[43],"guarantee":[45],"confidentiality":[47],"fine-grained":[49,85],"control.":[51],"However,":[52],"how":[53],"allow":[55],"collaborative":[57],"be":[60],"accessed":[61],"only":[62],"by":[63],"authorized":[64,175],"flexible":[68],"dynamic":[70,83],"manner":[71],"challenging":[74],"problem.":[75],"this":[77],"paper,":[78],"we":[79,99,114,150],"propose":[80],"DACSC,":[81],"control":[87],"scheme":[88],"for":[89,193],"secure":[90,187],"First":[96],"all,":[98],"adopt":[100],"ciphertext-policy":[101],"ABE":[102,161],"technique":[103],"define":[105],"original":[107,127],"policy":[109,118,129,135,156,172],"outsourced":[111],"Second,":[113],"introduce":[115],"tree-based":[117],"extending":[119,157],"framework":[120],"which":[121,166],"allows":[122],"who":[124],"satisfy":[125],"customize":[131],"new":[133],"add":[137],"it":[138],"current":[140],"policies":[142],"non-restrictive":[145],"or":[146],"restrictive":[147],"way.":[148],"Furthermore,":[149],"achieve":[151],"integrity":[152],"checking":[153],"during":[154],"procedure":[158],"based":[159],"on":[160],"with":[162],"equality":[163],"test":[164],"algorithm,":[165],"ensures":[167],"that":[168,184],"added":[170],"comes":[173],"from":[174],"user.":[176],"The":[177],"security":[178],"analysis":[179],"experimental":[181],"results":[182],"indicate":[183],"DACSC":[185],"efficient,":[189],"suitable":[192],"scenario":[197]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
