{"id":"https://openalex.org/W4391093677","doi":"https://doi.org/10.1109/iciscae59047.2023.10393315","title":"Research on symmetric encryption and decryption of multi-user shared data for cloud storage environment","display_name":"Research on symmetric encryption and decryption of multi-user shared data for cloud storage environment","publication_year":2023,"publication_date":"2023-09-23","ids":{"openalex":"https://openalex.org/W4391093677","doi":"https://doi.org/10.1109/iciscae59047.2023.10393315"},"language":"en","primary_location":{"id":"doi:10.1109/iciscae59047.2023.10393315","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/iciscae59047.2023.10393315","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE 6th International Conference on Information Systems and Computer Aided Education (ICISCAE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100456586","display_name":"Liang Wang","orcid":"https://orcid.org/0000-0003-2719-2463"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Xinyan Wang","raw_affiliation_strings":["State Grid Henan Information &amp; Telecommunication Company,Data Center,Zhengzhou,China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"State Grid Henan Information &amp; Telecommunication Company,Data Center,Zhengzhou,China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087117798","display_name":"Jing Zhang","orcid":"https://orcid.org/0000-0001-9834-081X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jing Zhang","raw_affiliation_strings":["State Grid Henan Information &amp; Telecommunication Company,Data Center,Zhengzhou,China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"State Grid Henan Information &amp; Telecommunication Company,Data Center,Zhengzhou,China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113332176","display_name":"Zhaotai Meng","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zhaotai Meng","raw_affiliation_strings":["State Grid Henan Information &amp; Telecommunication Company,Data Center,Zhengzhou,China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"State Grid Henan Information &amp; Telecommunication Company,Data Center,Zhengzhou,China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024408423","display_name":"Yi Bin","orcid":"https://orcid.org/0000-0001-9714-8738"},"institutions":[{"id":"https://openalex.org/I4210118629","display_name":"NARI Group (China)","ror":"https://ror.org/02egn3136","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210118629"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bin Yi","raw_affiliation_strings":["Nari Information &amp; Communication Technology Company,Nanjing,China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Nari Information &amp; Communication Technology Company,Nanjing,China","institution_ids":["https://openalex.org/I4210118629"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101873316","display_name":"An Hu","orcid":"https://orcid.org/0009-0001-8068-9535"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"An Hu","raw_affiliation_strings":["State Grid Henan Information &amp; Telecommunication Company,Data Center,Zhengzhou,China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"State Grid Henan Information &amp; Telecommunication Company,Data Center,Zhengzhou,China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100846520","display_name":"Ming Gu","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ming Gu","raw_affiliation_strings":["State Grid Henan Information &amp; Telecommunication Company,Data Center,Zhengzhou,China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"State Grid Henan Information &amp; Telecommunication Company,Data Center,Zhengzhou,China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5100456586"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.5091,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.73255573,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"297","last_page":"301"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9805999994277954,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9805999994277954,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9747999906539917,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9496999979019165,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8216431736946106},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7318885922431946},{"id":"https://openalex.org/keywords/client-side-encryption","display_name":"Client-side encryption","score":0.6837495565414429},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.587599515914917},{"id":"https://openalex.org/keywords/cloud-storage","display_name":"Cloud storage","score":0.5566356778144836},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.486025869846344},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.46590501070022583},{"id":"https://openalex.org/keywords/data-sharing","display_name":"Data sharing","score":0.4130035936832428},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.41046109795570374},{"id":"https://openalex.org/keywords/on-the-fly-encryption","display_name":"On-the-fly encryption","score":0.35316041111946106},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11576521396636963}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8216431736946106},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7318885922431946},{"id":"https://openalex.org/C166501710","wikidata":"https://www.wikidata.org/wiki/Q5132476","display_name":"Client-side encryption","level":4,"score":0.6837495565414429},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.587599515914917},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.5566356778144836},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.486025869846344},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.46590501070022583},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.4130035936832428},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.41046109795570374},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.35316041111946106},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11576521396636963},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iciscae59047.2023.10393315","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/iciscae59047.2023.10393315","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE 6th International Conference on Information Systems and Computer Aided Education (ICISCAE)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2329178507","https://openalex.org/W2595956926","https://openalex.org/W2051488261","https://openalex.org/W4239325954","https://openalex.org/W2603856638","https://openalex.org/W2529439037","https://openalex.org/W4309584611","https://openalex.org/W2032151215","https://openalex.org/W3116715377","https://openalex.org/W3214026606"],"abstract_inverted_index":{"This":[0],"paper":[1,97],"mainly":[2],"studies":[3],"the":[4,19,41,74,87,132,150,170,189],"symmetric":[5,100],"encryption":[6,49,68,101,114,171],"and":[7,26,43,123,127,134,161],"decryption":[8],"technology":[9,50,69,102,129,146,183],"for":[10,103,188],"multi-user":[11,30,46,65,77,90,104,120,137,153,175],"shared":[12,31,47,66,78,91,105,121,138],"data":[13,32,67,92,106,154,176],"in":[14,73,173],"cloud":[15,22,35,59,193],"storage":[16,23,194],"environment.":[17],"With":[18],"popularity":[20],"of":[21,45,76,136,152,181,192],"technology,":[24],"more":[25,27],"users":[28],"store":[29],"on":[33,108],"third-party":[34],"platforms.":[36],"In":[37],"order":[38],"to":[39,56,85,89,115,119,130],"protect":[40],"privacy":[42],"integrity":[44,135],"data,":[48,122],"has":[51,70,158,184],"become":[52],"an":[53],"important":[54],"means":[55],"deal":[57],"with":[58],"security":[60,151,190],"challenges":[61],"[1].":[62],"The":[63,140,179],"traditional":[64],"some":[71],"problems":[72],"scenario":[75],"data.":[79,139],"For":[80],"example,":[81],"it":[82,167],"is":[83],"difficult":[84],"restrict":[86],"access":[88,109,118],"after":[93],"decryption.":[94],"Therefore,":[95],"this":[96,145,182],"proposes":[98],"a":[99,165],"based":[107],"control,":[110],"which":[111],"uses":[112,124],"attribute":[113],"achieve":[116],"controllable":[117],"group":[125],"cryptography":[126],"obfuscation":[128],"ensure":[131],"confidentiality":[133],"experimental":[141],"results":[142],"show":[143],"that":[144],"not":[147],"only":[148],"ensures":[149],"sharing,":[155],"but":[156],"also":[157],"high":[159],"efficiency":[160],"user":[162],"friendliness.":[163],"As":[164],"result,":[166],"can":[168],"meet":[169],"requirements":[172],"large-scale":[174],"sharing":[177],"scenarios.":[178],"research":[180],"certain":[185],"reference":[186],"significance":[187],"improvement":[191],"field.":[195]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1}],"updated_date":"2026-04-29T09:16:38.111599","created_date":"2025-10-10T00:00:00"}
