{"id":"https://openalex.org/W2003046592","doi":"https://doi.org/10.1109/iwqos.2014.6914304","title":"Keyword search with access control over encrypted data in cloud computing","display_name":"Keyword search with access control over encrypted data in cloud computing","publication_year":2014,"publication_date":"2014-05-01","ids":{"openalex":"https://openalex.org/W2003046592","doi":"https://doi.org/10.1109/iwqos.2014.6914304","mag":"2003046592"},"language":"en","primary_location":{"id":"doi:10.1109/iwqos.2014.6914304","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwqos.2014.6914304","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 IEEE 22nd International Symposium of Quality of Service (IWQoS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5015815028","display_name":"Zhirong Shen","orcid":"https://orcid.org/0000-0003-2673-5868"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhirong Shen","raw_affiliation_strings":["Department of Computer Science and Technology, Tsinghua University, Beijing, China","Tsinghua National Laboratory for Information Science and Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Technology, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]},{"raw_affiliation_string":"Tsinghua National Laboratory for Information Science and Technology, Beijing, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101740783","display_name":"Jiwu Shu","orcid":"https://orcid.org/0000-0002-7362-2789"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiwu Shu","raw_affiliation_strings":["Department of Computer Science and Technology, Tsinghua University, Beijing, China","Tsinghua National Laboratory for Information Science and Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Technology, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]},{"raw_affiliation_string":"Tsinghua National Laboratory for Information Science and Technology, Beijing, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5091437474","display_name":"Wei Xue","orcid":"https://orcid.org/0000-0001-9740-6581"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Xue","raw_affiliation_strings":["Department of Computer Science and Technology, Tsinghua University, Beijing, China","Tsinghua National Laboratory for Information Science and Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Technology, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]},{"raw_affiliation_string":"Tsinghua National Laboratory for Information Science and Technology, Beijing, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5015815028"],"corresponding_institution_ids":["https://openalex.org/I99065089"],"apc_list":null,"apc_paid":null,"fwci":2.0451,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.88902328,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"87","last_page":"92"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9843000173568726,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8516451120376587},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.8047571182250977},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7701600790023804},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.6279641389846802},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6049782037734985},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.5899184942245483},{"id":"https://openalex.org/keywords/web-search-query","display_name":"Web search query","score":0.47897887229919434},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4768886864185333},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.4548821747303009},{"id":"https://openalex.org/keywords/client-side-encryption","display_name":"Client-side encryption","score":0.41769659519195557},{"id":"https://openalex.org/keywords/data-access","display_name":"Data access","score":0.41393932700157166},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.34882405400276184},{"id":"https://openalex.org/keywords/search-engine","display_name":"Search engine","score":0.27972203493118286},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.27963903546333313},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2690128982067108},{"id":"https://openalex.org/keywords/on-the-fly-encryption","display_name":"On-the-fly encryption","score":0.1689731776714325},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.10735353827476501}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8516451120376587},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.8047571182250977},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7701600790023804},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.6279641389846802},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6049782037734985},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.5899184942245483},{"id":"https://openalex.org/C164120249","wikidata":"https://www.wikidata.org/wiki/Q995982","display_name":"Web search query","level":3,"score":0.47897887229919434},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4768886864185333},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.4548821747303009},{"id":"https://openalex.org/C166501710","wikidata":"https://www.wikidata.org/wiki/Q5132476","display_name":"Client-side encryption","level":4,"score":0.41769659519195557},{"id":"https://openalex.org/C47487241","wikidata":"https://www.wikidata.org/wiki/Q5227230","display_name":"Data access","level":2,"score":0.41393932700157166},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.34882405400276184},{"id":"https://openalex.org/C97854310","wikidata":"https://www.wikidata.org/wiki/Q19541","display_name":"Search engine","level":2,"score":0.27972203493118286},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.27963903546333313},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2690128982067108},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.1689731776714325},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10735353827476501}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iwqos.2014.6914304","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwqos.2014.6914304","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 IEEE 22nd International Symposium of Quality of Service (IWQoS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W8287904","https://openalex.org/W100863554","https://openalex.org/W1485110506","https://openalex.org/W1511513446","https://openalex.org/W1512194687","https://openalex.org/W1572593068","https://openalex.org/W1589843374","https://openalex.org/W1596208550","https://openalex.org/W1966350672","https://openalex.org/W2056634932","https://openalex.org/W2100979877","https://openalex.org/W2108072891","https://openalex.org/W2108590723","https://openalex.org/W2138001464","https://openalex.org/W2154448764","https://openalex.org/W2161214567","https://openalex.org/W2163942291","https://openalex.org/W6600354236","https://openalex.org/W6604066429","https://openalex.org/W6630429490","https://openalex.org/W6630704763","https://openalex.org/W6641687852","https://openalex.org/W6676054806","https://openalex.org/W6682569730","https://openalex.org/W6683799570"],"related_works":["https://openalex.org/W1495119096","https://openalex.org/W2284242097","https://openalex.org/W2121067221","https://openalex.org/W2277948094","https://openalex.org/W2086058948","https://openalex.org/W2357522001","https://openalex.org/W2045901755","https://openalex.org/W2546066963","https://openalex.org/W1653371073","https://openalex.org/W2062599910"],"abstract_inverted_index":{"Cloud":[0],"computing":[1],"has":[2],"become":[3],"an":[4,37,48],"increasingly":[5],"popular":[6],"service":[7,29],"for":[8,43,46,79,103],"data":[9,16,32,44,60,82,133],"storage":[10],"and":[11,76,100,150,160,173,210],"processing.":[12],"To":[13],"keep":[14],"users'":[15],"on":[17,58,220],"the":[18,27,31,41,59,73,80,90,123,171,174,180,212,215,227,230],"cloud":[19,28,74,116,135],"from":[20],"leaking":[21],"to":[22,97,112,154,201,225],"unauthorized":[23],"users,":[24],"probably":[25],"including":[26],"providers,":[30],"must":[33,52],"be":[34,53,164],"stored":[35],"in":[36,134],"encrypted":[38,68,115,132],"form.":[39],"In":[40,118],"meantime,":[42],"intended":[45],"sharing,":[47],"efficient":[49],"access":[50,77,110,129,204],"control":[51,78,130],"provided.":[54],"A":[55],"common":[56],"operation":[57,66],"is":[61,70,83],"keyword":[62,126],"search.":[63],"Currently,":[64],"search":[65,69,113,127,152,158,216],"over":[67,114,131],"performed":[71],"at":[72],"servers":[75],"in-cloud":[81],"usually":[84],"enforced":[85],"by":[86],"users.":[87],"Separation":[88],"of":[89,93,109,125,214,229],"two":[91],"types":[92],"operations":[94],"can":[95,145,163,178],"lead":[96],"reduced":[98],"efficiency":[99],"compromised":[101],"privacy":[102],"users":[104],"with":[105,128],"a":[106,140,151,157,161,188,195],"given":[107],"set":[108],"privileges":[111],"data.":[117],"this":[119,184],"paper,":[120],"we":[121,186],"study":[122],"problem":[124],"computing.":[136],"We":[137],"first":[138],"propose":[139,187],"scalable":[141],"framework":[142],"where":[143],"user":[144],"use":[146],"his":[147],"attribute":[148,176],"values":[149,177],"query":[153,172,208],"locally":[155],"derive":[156],"capability,":[159],"file":[162],"retrieved":[165],"only":[166],"when":[167],"its":[168],"keywords":[169],"match":[170],"user's":[175],"pass":[179],"policy":[181],"check.":[182],"Using":[183],"framework,":[185],"novel":[189],"scheme":[190],"called":[191,199],"KSAC.":[192],"KSAC":[193],"utilizes":[194],"recent":[196],"cryptographic":[197],"primitive":[198],"HPE":[200],"enforce":[202],"fine-grained":[203],"control,":[205],"perform":[206],"multi-field":[207],"search,":[209],"support":[211],"derivation":[213],"capability.":[217],"Intensive":[218],"evaluations":[219],"real-world":[221],"dataset":[222],"are":[223],"conducted":[224],"validate":[226],"applicability":[228],"proposed":[231],"scheme.":[232]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
