{"id":"https://openalex.org/W4380716407","doi":"https://doi.org/10.1109/jiot.2023.3286508","title":"Privacy-Preserving Joint Data and Function Homomorphic Encryption for Cloud Software Services","display_name":"Privacy-Preserving Joint Data and Function Homomorphic Encryption for Cloud Software Services","publication_year":2023,"publication_date":"2023-06-15","ids":{"openalex":"https://openalex.org/W4380716407","doi":"https://doi.org/10.1109/jiot.2023.3286508"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2023.3286508","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2023.3286508","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5092172124","display_name":"Amin Hosseingholizadeh","orcid":"https://orcid.org/0000-0002-6026-1670"},"institutions":[{"id":"https://openalex.org/I158248296","display_name":"Amirkabir University of Technology","ror":"https://ror.org/04gzbav43","country_code":"IR","type":"education","lineage":["https://openalex.org/I158248296"]}],"countries":["IR"],"is_corresponding":true,"raw_author_name":"Amin Hosseingholizadeh","raw_affiliation_strings":["Department of Mathematics and Computer Science, Amirkabir University of Technology, Tehran, Iran"],"raw_orcid":"https://orcid.org/0000-0002-6026-1670","affiliations":[{"raw_affiliation_string":"Department of Mathematics and Computer Science, Amirkabir University of Technology, Tehran, Iran","institution_ids":["https://openalex.org/I158248296"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055832370","display_name":"Farhad Rahmati","orcid":"https://orcid.org/0000-0002-4859-6179"},"institutions":[{"id":"https://openalex.org/I158248296","display_name":"Amirkabir University of Technology","ror":"https://ror.org/04gzbav43","country_code":"IR","type":"education","lineage":["https://openalex.org/I158248296"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Farhad Rahmati","raw_affiliation_strings":["Department of Mathematics and Computer Science, Amirkabir University of Technology, Tehran, Iran"],"raw_orcid":"https://orcid.org/0000-0002-4859-6179","affiliations":[{"raw_affiliation_string":"Department of Mathematics and Computer Science, Amirkabir University of Technology, Tehran, Iran","institution_ids":["https://openalex.org/I158248296"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051739014","display_name":"Mohammad Ali","orcid":"https://orcid.org/0000-0002-8685-0991"},"institutions":[{"id":"https://openalex.org/I158248296","display_name":"Amirkabir University of Technology","ror":"https://ror.org/04gzbav43","country_code":"IR","type":"education","lineage":["https://openalex.org/I158248296"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Mohammad Ali","raw_affiliation_strings":["Department of Mathematics and Computer Science, Amirkabir University of Technology, Tehran, Iran"],"raw_orcid":"https://orcid.org/0000-0002-8685-0991","affiliations":[{"raw_affiliation_string":"Department of Mathematics and Computer Science, Amirkabir University of Technology, Tehran, Iran","institution_ids":["https://openalex.org/I158248296"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077201612","display_name":"Hamid Damadi","orcid":"https://orcid.org/0000-0002-8307-5328"},"institutions":[{"id":"https://openalex.org/I158248296","display_name":"Amirkabir University of Technology","ror":"https://ror.org/04gzbav43","country_code":"IR","type":"education","lineage":["https://openalex.org/I158248296"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Hamid Damadi","raw_affiliation_strings":["Department of Mathematics and Computer Science, Amirkabir University of Technology, Tehran, Iran"],"raw_orcid":"https://orcid.org/0000-0002-8307-5328","affiliations":[{"raw_affiliation_string":"Department of Mathematics and Computer Science, Amirkabir University of Technology, Tehran, Iran","institution_ids":["https://openalex.org/I158248296"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5058120371","display_name":"Ximeng Liu","orcid":"https://orcid.org/0000-0002-4238-3295"},"institutions":[{"id":"https://openalex.org/I80947539","display_name":"Fuzhou University","ror":"https://ror.org/011xvna82","country_code":"CN","type":"education","lineage":["https://openalex.org/I80947539"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ximeng Liu","raw_affiliation_strings":["College of Computer and Data Science and the Key Laboratory of Information Security of Network Systems, Fuzhou University, Fuzhou, China"],"raw_orcid":"https://orcid.org/0000-0002-4238-3295","affiliations":[{"raw_affiliation_string":"College of Computer and Data Science and the Key Laboratory of Information Security of Network Systems, Fuzhou University, Fuzhou, China","institution_ids":["https://openalex.org/I80947539"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5092172124"],"corresponding_institution_ids":["https://openalex.org/I158248296"],"apc_list":null,"apc_paid":null,"fwci":2.5561,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.91412092,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"11","issue":"1","first_page":"728","last_page":"741"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8401381969451904},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.8263475298881531},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.7996214628219604},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5934514403343201},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.5809223651885986},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5609268546104431},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.5310129523277283},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.49691060185432434},{"id":"https://openalex.org/keywords/software-as-a-service","display_name":"Software as a service","score":0.45443952083587646},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.45332804322242737},{"id":"https://openalex.org/keywords/client-side-encryption","display_name":"Client-side encryption","score":0.4471926987171173},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.43554559350013733},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.42424774169921875},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.4125121235847473},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.20683428645133972},{"id":"https://openalex.org/keywords/on-the-fly-encryption","display_name":"On-the-fly encryption","score":0.16772568225860596},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1428433358669281}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8401381969451904},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.8263475298881531},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.7996214628219604},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5934514403343201},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.5809223651885986},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5609268546104431},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.5310129523277283},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.49691060185432434},{"id":"https://openalex.org/C175133352","wikidata":"https://www.wikidata.org/wiki/Q1254596","display_name":"Software as a service","level":4,"score":0.45443952083587646},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.45332804322242737},{"id":"https://openalex.org/C166501710","wikidata":"https://www.wikidata.org/wiki/Q5132476","display_name":"Client-side encryption","level":4,"score":0.4471926987171173},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.43554559350013733},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.42424774169921875},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.4125121235847473},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.20683428645133972},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.16772568225860596},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1428433358669281}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2023.3286508","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2023.3286508","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4910714274","display_name":null,"funder_award_id":"2021J06013","funder_id":"https://openalex.org/F4320321878","funder_display_name":"Natural Science Foundation of Fujian Province"},{"id":"https://openalex.org/G979158640","display_name":null,"funder_award_id":"62072109","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321878","display_name":"Natural Science Foundation of Fujian Province","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":59,"referenced_works":["https://openalex.org/W17575016","https://openalex.org/W56544557","https://openalex.org/W104209573","https://openalex.org/W150223756","https://openalex.org/W1494049356","https://openalex.org/W1501386175","https://openalex.org/W1518622464","https://openalex.org/W1564449568","https://openalex.org/W1594985992","https://openalex.org/W1724472458","https://openalex.org/W1798609567","https://openalex.org/W1819824216","https://openalex.org/W2007466965","https://openalex.org/W2027090774","https://openalex.org/W2031533839","https://openalex.org/W2038761522","https://openalex.org/W2088492763","https://openalex.org/W2097724213","https://openalex.org/W2098290658","https://openalex.org/W2108072891","https://openalex.org/W2110987245","https://openalex.org/W2123314859","https://openalex.org/W2129580084","https://openalex.org/W2132172731","https://openalex.org/W2148888468","https://openalex.org/W2161508639","https://openalex.org/W2177209050","https://openalex.org/W2206887593","https://openalex.org/W2226167778","https://openalex.org/W2230451675","https://openalex.org/W2296067100","https://openalex.org/W2554750353","https://openalex.org/W2559094099","https://openalex.org/W2741191234","https://openalex.org/W2768174108","https://openalex.org/W2768505000","https://openalex.org/W2770306303","https://openalex.org/W2774864053","https://openalex.org/W2775901130","https://openalex.org/W2842348042","https://openalex.org/W2890717664","https://openalex.org/W2928717702","https://openalex.org/W2938817177","https://openalex.org/W2985527074","https://openalex.org/W2991580995","https://openalex.org/W2999828506","https://openalex.org/W3003286954","https://openalex.org/W3007918540","https://openalex.org/W3028867652","https://openalex.org/W3084652823","https://openalex.org/W3124336619","https://openalex.org/W4206908499","https://openalex.org/W4226125741","https://openalex.org/W4286539760","https://openalex.org/W4313046019","https://openalex.org/W6606067566","https://openalex.org/W6688218289","https://openalex.org/W6773031920","https://openalex.org/W6778434676"],"related_works":["https://openalex.org/W4402347828","https://openalex.org/W4391920153","https://openalex.org/W4319296593","https://openalex.org/W1964796915","https://openalex.org/W1964306602","https://openalex.org/W4313046019","https://openalex.org/W1702090048","https://openalex.org/W3045127875","https://openalex.org/W2963269218","https://openalex.org/W2883926355"],"abstract_inverted_index":{"With":[0],"the":[1,29,47,69,72,79,82,88,106,121,166],"widespread":[2],"growth":[3],"of":[4,66,84,91,123,168],"cloud":[5,8,25,39,53,73,107,161],"computing":[6,26,40],"technology,":[7,17],"software":[9,18,54,89,96,162],"services":[10],"are":[11],"ubiquitous":[12],"these":[13],"days.":[14],"Using":[15],"this":[16,132],"providers":[19],"can":[20,111,149],"sell":[21],"their":[22,103],"products":[23],"through":[24,105],"environments":[27,41],"in":[28,38,76,87],"pay-as-you-use":[30],"fashion.":[31],"However,":[32,120],"performing":[33],"secure":[34,189],"and":[35,94,141,155,170,182,190],"accurate":[36],"calculations":[37],"has":[42],"become":[43],"extremely":[44],"challenging.":[45],"As":[46],"data":[48,70,80,115,140],"to":[49,62,71,78,116],"be":[50,56,63,99,117],"processed":[51,118],"by":[52,174],"might":[55],"highly":[57],"sensitive,":[58],"its":[59,172,176],"confidentiality":[60,113,122,151],"needs":[61],"taken":[64],"care":[65],"before":[67],"transferring":[68],"server.":[74,108],"Also,":[75],"addition":[77],"confidentiality,":[81],"security":[83,167,183],"algorithms":[85,104,124,154],"employed":[86],"is":[90,125,188],"vital":[92],"importance,":[93],"thus":[95],"owners":[97],"may":[98],"worried":[100],"about":[101],"revealing":[102],"Homomorphic":[109],"cryptosystems":[110],"provide":[112,150],"for":[114,152,160,192],"online.":[119],"still":[126],"an":[127],"open":[128],"problem.":[129],"To":[130],"address":[131],"issue,":[133],"we":[134],"put":[135],"forward":[136],"a":[137],"privacy-preserving":[138],"joint":[139],"function":[142],"homomorphic":[143],"encryption":[144],"(JDF-HE)":[145],"mechanism.":[146],"Our":[147,180],"JDF-HE":[148,169,187],"both":[153],"data,":[156],"thereby":[157],"being":[158],"suitable":[159,191],"services.":[163],"We":[164],"prove":[165],"analyze":[171],"performance":[173,181],"evaluating":[175],"actual":[177],"execution":[178],"overhead.":[179],"analysis":[184],"demonstrate":[185],"that":[186],"real-time":[193],"applications.":[194]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":10},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
