{"id":"https://openalex.org/W3093994018","doi":"https://doi.org/10.1109/icccnt49239.2020.9225606","title":"Improved Attribute-Based Encryption Scheme in Fog Computing Environment for Healthcare Systems","display_name":"Improved Attribute-Based Encryption Scheme in Fog Computing Environment for Healthcare Systems","publication_year":2020,"publication_date":"2020-07-01","ids":{"openalex":"https://openalex.org/W3093994018","doi":"https://doi.org/10.1109/icccnt49239.2020.9225606","mag":"3093994018"},"language":"en","primary_location":{"id":"doi:10.1109/icccnt49239.2020.9225606","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccnt49239.2020.9225606","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5024830197","display_name":"Bedatrayee Ghosh","orcid":null},"institutions":[{"id":"https://openalex.org/I121750182","display_name":"National Institute of Technology Warangal","ror":"https://ror.org/017ebfz38","country_code":"IN","type":"education","lineage":["https://openalex.org/I121750182"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Bedatrayee Ghosh","raw_affiliation_strings":["National Institute of Technology, Warangal, India"],"affiliations":[{"raw_affiliation_string":"National Institute of Technology, Warangal, India","institution_ids":["https://openalex.org/I121750182"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027747650","display_name":"Priyanka Parimi","orcid":"https://orcid.org/0000-0002-3011-6907"},"institutions":[{"id":"https://openalex.org/I121750182","display_name":"National Institute of Technology Warangal","ror":"https://ror.org/017ebfz38","country_code":"IN","type":"education","lineage":["https://openalex.org/I121750182"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Priyanka Parimi","raw_affiliation_strings":["National Institute of Technology, Warangal, India"],"affiliations":[{"raw_affiliation_string":"National Institute of Technology, Warangal, India","institution_ids":["https://openalex.org/I121750182"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5079939425","display_name":"Rashmi Ranjan Rout","orcid":"https://orcid.org/0000-0003-3457-6633"},"institutions":[{"id":"https://openalex.org/I121750182","display_name":"National Institute of Technology Warangal","ror":"https://ror.org/017ebfz38","country_code":"IN","type":"education","lineage":["https://openalex.org/I121750182"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Rashmi Ranjan Rout","raw_affiliation_strings":["National Institute of Technology, Warangal, India"],"affiliations":[{"raw_affiliation_string":"National Institute of Technology, Warangal, India","institution_ids":["https://openalex.org/I121750182"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5024830197"],"corresponding_institution_ids":["https://openalex.org/I121750182"],"apc_list":null,"apc_paid":null,"fwci":0.1326,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.55442517,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9904000163078308,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7990023493766785},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6983416676521301},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6835731267929077},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.6004260778427124},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5811482667922974},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5550695061683655},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.5416039228439331},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.5051897168159485},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5009961128234863},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.4764597415924072},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.41056379675865173},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.250819593667984}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7990023493766785},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6983416676521301},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6835731267929077},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.6004260778427124},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5811482667922974},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5550695061683655},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.5416039228439331},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.5051897168159485},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5009961128234863},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.4764597415924072},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.41056379675865173},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.250819593667984},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccnt49239.2020.9225606","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccnt49239.2020.9225606","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1980303100","https://openalex.org/W2086477792","https://openalex.org/W2108072891","https://openalex.org/W2114290352","https://openalex.org/W2168074924","https://openalex.org/W2198252115","https://openalex.org/W2419244432","https://openalex.org/W2516341111","https://openalex.org/W2548207196","https://openalex.org/W2551980355","https://openalex.org/W2565477418","https://openalex.org/W2615777654","https://openalex.org/W2736247572","https://openalex.org/W2754362182","https://openalex.org/W2754668202","https://openalex.org/W6743989407"],"related_works":["https://openalex.org/W2131846073","https://openalex.org/W4372269058","https://openalex.org/W114534093","https://openalex.org/W2383331906","https://openalex.org/W361351722","https://openalex.org/W4223919663","https://openalex.org/W1513098086","https://openalex.org/W2743419166","https://openalex.org/W2963348623","https://openalex.org/W2921225894"],"abstract_inverted_index":{"In":[0,85,103],"today's":[1],"smart":[2],"healthcare":[3,59,83,194],"system,":[4],"medical":[5],"records":[6],"of":[7,15,31,71,100,128,134,161,198],"patients":[8],"are":[9,182],"exposed":[10],"to":[11,25,93],"a":[12,32,47,118,139],"large":[13],"number":[14],"users":[16],"for":[17,49,78,111,138,189],"various":[18],"purposes,":[19],"from":[20],"monitoring":[21],"the":[22,29,50,58,65,95,123,129,142,148,154,159,162,166,169,174,178],"patients'":[23],"health":[24],"data":[26,51,190],"analysis.":[27],"Preserving":[28],"privacy":[30,54],"patient":[33],"has":[34],"become":[35],"an":[36,90,135,186],"important":[37],"and":[38,53,117,125,168,207],"challenging":[39],"issue.":[40],"outsourced":[41,101,179],"Ciphertext-Policy":[42],"Attribute-Based":[43],"Encryption":[44],"(CP-ABE)":[45],"provides":[46],"solution":[48,188],"sharing":[52],"preservation":[55],"problem":[56,99],"in":[57,61,69,82,132,177,193],"system":[60],"fog":[62,155],"environment.":[63],"However,":[64],"high":[66],"computational":[67,170],"cost":[68],"case":[70,133],"frequent":[72,96],"attribute":[73,97,136],"updates":[74],"renders":[75],"it":[76,185],"infeasible":[77],"providing":[79],"access":[80,191],"control":[81,192],"systems.":[84,195],"this":[86],"paper,":[87],"we":[88,107],"propose":[89],"efficient":[91],"method":[92],"overcome":[94],"update":[98,150,176],"CP-ABE.":[102],"our":[104,199],"proposed":[105,200],"approach,":[106],"generate":[108],"two":[109],"keys":[110],"each":[112],"user":[113],"(a":[114],"static":[115],"key":[116,144,149,175],"dynamic":[119,143],"key)":[120],"based":[121],"on":[122],"constant":[124],"changing":[126],"attributes":[127],"users.":[130],"Therefore,":[131],"change":[137],"user,":[140],"only":[141],"is":[145,151,202],"updated.":[146],"Also,":[147],"done":[152],"at":[153],"nodes":[156],"without":[157],"compromising":[158],"security":[160],"system.":[163],"Thus,":[164],"both":[165],"communication":[167],"overhead":[171],"associated":[172],"with":[173],"CP-ABE":[180],"scheme":[181],"reduced,":[183],"making":[184],"ideal":[187],"The":[196],"efficacy":[197],"approach":[201],"shown":[203],"through":[204],"theoretical":[205],"analysis":[206],"experimentation.":[208]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
