{"id":"https://openalex.org/W2069774545","doi":"https://doi.org/10.1109/infcomw.2014.6849289","title":"Conditional proxy re-encryption for secure big data group sharing in cloud environment","display_name":"Conditional proxy re-encryption for secure big data group sharing in cloud environment","publication_year":2014,"publication_date":"2014-04-01","ids":{"openalex":"https://openalex.org/W2069774545","doi":"https://doi.org/10.1109/infcomw.2014.6849289","mag":"2069774545"},"language":"en","primary_location":{"id":"doi:10.1109/infcomw.2014.6849289","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infcomw.2014.6849289","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079998325","display_name":"Junggab Son","orcid":"https://orcid.org/0000-0002-6206-083X"},"institutions":[{"id":"https://openalex.org/I4575257","display_name":"Hanyang University","ror":"https://ror.org/046865y68","country_code":"KR","type":"education","lineage":["https://openalex.org/I4575257"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Junggab Son","raw_affiliation_strings":["Department of Computer Science and Engineering, Hanyang University, ERICA Campus, South Korea","Hanyang University"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Hanyang University, ERICA Campus, South Korea","institution_ids":["https://openalex.org/I4575257"]},{"raw_affiliation_string":"Hanyang University","institution_ids":["https://openalex.org/I4575257"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100454675","display_name":"Donghyun Kim","orcid":"https://orcid.org/0000-0002-4845-9369"},"institutions":[{"id":"https://openalex.org/I4575257","display_name":"Hanyang University","ror":"https://ror.org/046865y68","country_code":"KR","type":"education","lineage":["https://openalex.org/I4575257"]},{"id":"https://openalex.org/I123127086","display_name":"North Carolina Central University","ror":"https://ror.org/051r3tx83","country_code":"US","type":"education","lineage":["https://openalex.org/I123127086"]}],"countries":["KR","US"],"is_corresponding":false,"raw_author_name":"Donghyun Kim","raw_affiliation_strings":["Department of Mathematics and Physics, North Carolina Central University, Durham, NC, USA","Hanyang University"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics and Physics, North Carolina Central University, Durham, NC, USA","institution_ids":["https://openalex.org/I123127086"]},{"raw_affiliation_string":"Hanyang University","institution_ids":["https://openalex.org/I4575257"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090705977","display_name":"Rasheed Hussain","orcid":"https://orcid.org/0000-0002-3771-7537"},"institutions":[{"id":"https://openalex.org/I4575257","display_name":"Hanyang University","ror":"https://ror.org/046865y68","country_code":"KR","type":"education","lineage":["https://openalex.org/I4575257"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Rasheed Hussain","raw_affiliation_strings":["Department of Computer Science and Engineering, Hanyang University, ERICA Campus, South Korea","Hanyang University"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Hanyang University, ERICA Campus, South Korea","institution_ids":["https://openalex.org/I4575257"]},{"raw_affiliation_string":"Hanyang University","institution_ids":["https://openalex.org/I4575257"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102887306","display_name":"Heekuck Oh","orcid":"https://orcid.org/0000-0002-2989-8737"},"institutions":[{"id":"https://openalex.org/I123127086","display_name":"North Carolina Central University","ror":"https://ror.org/051r3tx83","country_code":"US","type":"education","lineage":["https://openalex.org/I123127086"]},{"id":"https://openalex.org/I4575257","display_name":"Hanyang University","ror":"https://ror.org/046865y68","country_code":"KR","type":"education","lineage":["https://openalex.org/I4575257"]}],"countries":["KR","US"],"is_corresponding":false,"raw_author_name":"Heekuck Oh","raw_affiliation_strings":["Department of Computer Science and Engineering, Hanyang University, ERICA Campus, South Korea","NORTH CAROLINA CENTRAL UNIVERSITY"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Hanyang University, ERICA Campus, South Korea","institution_ids":["https://openalex.org/I4575257"]},{"raw_affiliation_string":"NORTH CAROLINA CENTRAL UNIVERSITY","institution_ids":["https://openalex.org/I123127086"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5079998325"],"corresponding_institution_ids":["https://openalex.org/I4575257"],"apc_list":null,"apc_paid":null,"fwci":3.4094,"has_fulltext":false,"cited_by_count":28,"citation_normalized_percentile":{"value":0.93215108,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"541","last_page":"546"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.995199978351593,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9882000088691711,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.8030291795730591},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7373390197753906},{"id":"https://openalex.org/keywords/upload","display_name":"Upload","score":0.7274236083030701},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6780619621276855},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5098540186882019},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.507391631603241},{"id":"https://openalex.org/keywords/data-sharing","display_name":"Data sharing","score":0.5041836500167847},{"id":"https://openalex.org/keywords/proxy-re-encryption","display_name":"Proxy re-encryption","score":0.4679134488105774},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.43701454997062683},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.43503594398498535},{"id":"https://openalex.org/keywords/outsourcing","display_name":"Outsourcing","score":0.42234593629837036},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.34923359751701355},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3382152318954468},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.2848086953163147},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1900181770324707},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.09566256403923035}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.8030291795730591},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7373390197753906},{"id":"https://openalex.org/C71901391","wikidata":"https://www.wikidata.org/wiki/Q7126699","display_name":"Upload","level":2,"score":0.7274236083030701},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6780619621276855},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5098540186882019},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.507391631603241},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.5041836500167847},{"id":"https://openalex.org/C2776861820","wikidata":"https://www.wikidata.org/wiki/Q7252899","display_name":"Proxy re-encryption","level":4,"score":0.4679134488105774},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.43701454997062683},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.43503594398498535},{"id":"https://openalex.org/C46934059","wikidata":"https://www.wikidata.org/wiki/Q61515","display_name":"Outsourcing","level":2,"score":0.42234593629837036},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.34923359751701355},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3382152318954468},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.2848086953163147},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1900181770324707},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.09566256403923035},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1109/infcomw.2014.6849289","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infcomw.2014.6849289","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","raw_type":"proceedings-article"},{"id":"pmh:oai:repository.hanyang.ac.kr:20.500.11754/92323","is_oa":false,"landing_page_url":"https://ieeexplore.ieee.org/document/6849289/","pdf_url":null,"source":{"id":"https://openalex.org/S4306401328","display_name":"The Royal Society of Chemistry\u2019s Journals, Books and Databases (The Royal Society of Chemistry)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I2751430930","host_organization_name":"Royal Society of Chemistry","host_organization_lineage":["https://openalex.org/I2751430930"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Article"},{"id":"pmh:oai:research-information.bris.ac.uk:openaire_cris_publications/3911ac93-22a3-4a51-a24a-eb0fd646ea3d","is_oa":false,"landing_page_url":"https://research-information.bris.ac.uk/en/publications/3911ac93-22a3-4a51-a24a-eb0fd646ea3d","pdf_url":null,"source":{"id":"https://openalex.org/S7407055359","display_name":"Explore Bristol Research","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Son, J, Kim, D, Hussain, R & Oh, H 2014, Conditional proxy re-encryption for secure big data group sharing in cloud environment. in 2014 IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2014., 6849289, Proceedings - IEEE INFOCOM, Institute of Electrical and Electronics Engineers (IEEE), pp. 541-546. https://doi.org/10.1109/INFCOMW.2014.6849289","raw_type":"contributionToPeriodical"},{"id":"pmh:oai:research-information.bris.ac.uk:publications/3911ac93-22a3-4a51-a24a-eb0fd646ea3d","is_oa":false,"landing_page_url":"https://hdl.handle.net/1983/3911ac93-22a3-4a51-a24a-eb0fd646ea3d","pdf_url":null,"source":{"id":"https://openalex.org/S7407055359","display_name":"Explore Bristol Research","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Son, J, Kim, D, Hussain, R & Oh, H 2014, Conditional proxy re-encryption for secure big data group sharing in cloud environment. in 2014 IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2014., 6849289, Proceedings - IEEE INFOCOM, Institute of Electrical and Electronics Engineers (IEEE), pp. 541-546. https://doi.org/10.1109/INFCOMW.2014.6849289","raw_type":"contributionToPeriodical"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4099999964237213,"display_name":"Partnerships for the goals","id":"https://metadata.un.org/sdg/17"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W1519370602","https://openalex.org/W1571885089","https://openalex.org/W1590823599","https://openalex.org/W1610688607","https://openalex.org/W1933165082","https://openalex.org/W1964344998","https://openalex.org/W1995588336","https://openalex.org/W2014143000","https://openalex.org/W2058410460","https://openalex.org/W2104286472","https://openalex.org/W2108834246","https://openalex.org/W2114428623","https://openalex.org/W2134894205","https://openalex.org/W2139343945","https://openalex.org/W2161850389","https://openalex.org/W6635176429","https://openalex.org/W6636423917"],"related_works":["https://openalex.org/W2027329669","https://openalex.org/W2951386372","https://openalex.org/W2406675271","https://openalex.org/W4233802515","https://openalex.org/W3032239509","https://openalex.org/W2116361063","https://openalex.org/W1538523055","https://openalex.org/W2138038098","https://openalex.org/W4240851858","https://openalex.org/W2894568935"],"abstract_inverted_index":{"Conditional":[0],"PRE":[1],"(CPRE)":[2],"is":[3,55,187],"a":[4,82,93,115,145,160,184],"novel":[5],"public":[6],"key":[7,23],"primitive":[8],"which":[9,124],"enables":[10],"the":[11,26,48,58,62,65,72,76,90,119,126,131,134,139,153,166,172,178,181,200],"group":[12,27,38,59,105,135],"sharing":[13,40,103,195],"of":[14,47,64,71,133,162,174],"confidential":[15],"data":[16,39,66,74,102,194],"without":[17],"revealing":[18],"its":[19],"plaintext":[20],"or":[21],"decryption":[22,173],"to":[24,34,68,89,143,152,180],"outside":[25],"member.":[28],"Previously,":[29],"several":[30],"efforts":[31],"are":[32,96],"made":[33],"facilitate":[35],"CPRE":[36,50,117,121],"in":[37,41,107,137,196],"cloud":[42,108,197],"environment.":[43,109],"The":[44],"main":[45],"drawback":[46],"state-of-art":[49],"schemes":[51],"for":[52,99,191],"this":[53,111],"purpose":[54],"that":[56],"whenever":[57],"member":[60,106],"changes,":[61,136],"originator":[63,140],"needs":[67,142],"download":[69],"all":[70],"existing":[73,202],"on":[75],"cloud,":[77],"encrypt":[78],"them":[79,88],"again":[80],"with":[81],"new":[83,116,146],"condition":[84,147],"value,":[85],"and":[86,149,170],"uploads":[87],"cloud.":[91,154,182],"As":[92,183],"result,":[94,185],"they":[95],"not":[97],"suitable":[98,190],"secure":[100,192],"big":[101,193],"among":[104],"In":[110,155],"paper,":[112],"we":[113],"introduce":[114],"called":[118],"outsourcing":[120],"scheme":[122],"(O-CPRE)":[123],"reduces":[125],"client":[127,163,179],"overhead":[128,164],"drastically.":[129],"When":[130],"membership":[132],"O-CPRE,":[138],"only":[141],"select":[144],"value":[148],"upload":[150],"it":[151],"addition,":[156],"O-CPRE":[157,186],"will":[158],"move":[159],"part":[161],"at":[165,171],"initial":[167],"setup":[168],"stage":[169],"each":[175],"message":[176],"from":[177],"much":[188],"more":[189],"environment":[198],"than":[199],"other":[201],"schemes.":[203]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":3},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":4},{"year":2015,"cited_by_count":2}],"updated_date":"2026-04-03T22:45:19.894376","created_date":"2025-10-10T00:00:00"}
