{"id":"https://openalex.org/W4391342087","doi":"https://doi.org/10.1109/jiot.2024.3360141","title":"Ciphertext Range Query Scheme Against Agent Transfer and Permission Extension Attacks for Cloud Computing","display_name":"Ciphertext Range Query Scheme Against Agent Transfer and Permission Extension Attacks for Cloud Computing","publication_year":2024,"publication_date":"2024-01-30","ids":{"openalex":"https://openalex.org/W4391342087","doi":"https://doi.org/10.1109/jiot.2024.3360141"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2024.3360141","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2024.3360141","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5050295224","display_name":"Hongyi Qiao","orcid":"https://orcid.org/0009-0009-9537-7823"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]},{"id":"https://openalex.org/I158809036","display_name":"Shenzhen Institute of Information Technology","ror":"https://ror.org/03wrf9427","country_code":"CN","type":"education","lineage":["https://openalex.org/I158809036"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Hongyi Qiao","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, China","Institute of Information Technology, Shenzhen Institute of Information Technology, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]},{"raw_affiliation_string":"Institute of Information Technology, Shenzhen Institute of Information Technology, Shenzhen, China","institution_ids":["https://openalex.org/I158809036"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043346874","display_name":"Cong Peng","orcid":"https://orcid.org/0000-0002-9958-3255"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Cong Peng","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087506605","display_name":"Qi Feng","orcid":"https://orcid.org/0000-0002-6927-7855"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qi Feng","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088264677","display_name":"Min Luo","orcid":"https://orcid.org/0000-0002-1819-9332"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Min Luo","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, China","Shanghai Technology Innovation Centre of Distributed Privacy-Preserving Artificial Intelligence, Matrix Elements Technologies, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]},{"raw_affiliation_string":"Shanghai Technology Innovation Centre of Distributed Privacy-Preserving Artificial Intelligence, Matrix Elements Technologies, Shanghai, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025668908","display_name":"Debiao He","orcid":"https://orcid.org/0000-0002-2446-7436"},"institutions":[{"id":"https://openalex.org/I152269853","display_name":"Qilu University of Technology","ror":"https://ror.org/04hyzq608","country_code":"CN","type":"education","lineage":["https://openalex.org/I152269853"]},{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]},{"id":"https://openalex.org/I4210142748","display_name":"Shandong Academy of Sciences","ror":"https://ror.org/04y8d6y55","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210142748"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Debiao He","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, China","Ministry of Education, Shandong Computer Science Center, Key Laboratory of Computing Power Network and Information Security, Qilu University of Technology (Shandong Academy of Sciences), Jinan, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]},{"raw_affiliation_string":"Ministry of Education, Shandong Computer Science Center, Key Laboratory of Computing Power Network and Information Security, Qilu University of Technology (Shandong Academy of Sciences), Jinan, China","institution_ids":["https://openalex.org/I152269853","https://openalex.org/I4210142748"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5050295224"],"corresponding_institution_ids":["https://openalex.org/I158809036","https://openalex.org/I37461747"],"apc_list":null,"apc_paid":null,"fwci":1.6237,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.84818013,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":"11","issue":"10","first_page":"17975","last_page":"17988"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9900000095367432,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9900000095367432,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9891999959945679,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.972100019454956,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/permission","display_name":"Permission","score":0.8379597663879395},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8206188678741455},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6733131408691406},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.6337259411811829},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.5674364566802979},{"id":"https://openalex.org/keywords/extension","display_name":"Extension (predicate logic)","score":0.5259972810745239},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.49286723136901855},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4608426094055176},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.41432273387908936},{"id":"https://openalex.org/keywords/range","display_name":"Range (aeronautics)","score":0.4105088710784912},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.39751946926116943},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.3184930384159088},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.12271395325660706},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.106172114610672},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.09500983357429504}],"concepts":[{"id":"https://openalex.org/C2779089604","wikidata":"https://www.wikidata.org/wiki/Q7169333","display_name":"Permission","level":2,"score":0.8379597663879395},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8206188678741455},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6733131408691406},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.6337259411811829},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.5674364566802979},{"id":"https://openalex.org/C2778029271","wikidata":"https://www.wikidata.org/wiki/Q5421931","display_name":"Extension (predicate logic)","level":2,"score":0.5259972810745239},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.49286723136901855},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4608426094055176},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.41432273387908936},{"id":"https://openalex.org/C204323151","wikidata":"https://www.wikidata.org/wiki/Q905424","display_name":"Range (aeronautics)","level":2,"score":0.4105088710784912},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.39751946926116943},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.3184930384159088},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.12271395325660706},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.106172114610672},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.09500983357429504},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C159985019","wikidata":"https://www.wikidata.org/wiki/Q181790","display_name":"Composite material","level":1,"score":0.0},{"id":"https://openalex.org/C192562407","wikidata":"https://www.wikidata.org/wiki/Q228736","display_name":"Materials science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2024.3360141","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2024.3360141","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G10506919","display_name":null,"funder_award_id":"62272350","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1303638838","display_name":null,"funder_award_id":"62325209","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G130668687","display_name":null,"funder_award_id":"62202339","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4190834028","display_name":null,"funder_award_id":"62172307","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":43,"referenced_works":["https://openalex.org/W27238938","https://openalex.org/W754106230","https://openalex.org/W1499934958","https://openalex.org/W1544695791","https://openalex.org/W1889757464","https://openalex.org/W1895952394","https://openalex.org/W2030888439","https://openalex.org/W2074388704","https://openalex.org/W2088555617","https://openalex.org/W2092071682","https://openalex.org/W2109915041","https://openalex.org/W2154496743","https://openalex.org/W2159915142","https://openalex.org/W2163992091","https://openalex.org/W2167882086","https://openalex.org/W2250570571","https://openalex.org/W2351133878","https://openalex.org/W2400905995","https://openalex.org/W2532272970","https://openalex.org/W2535199873","https://openalex.org/W2536125594","https://openalex.org/W2795336163","https://openalex.org/W2885967006","https://openalex.org/W2890587035","https://openalex.org/W2950674756","https://openalex.org/W2958951374","https://openalex.org/W2963053811","https://openalex.org/W2963120176","https://openalex.org/W3028864909","https://openalex.org/W3037145554","https://openalex.org/W3091981310","https://openalex.org/W3096870392","https://openalex.org/W3115798030","https://openalex.org/W3164531381","https://openalex.org/W3202234232","https://openalex.org/W3216937398","https://openalex.org/W4283397891","https://openalex.org/W4286375121","https://openalex.org/W4366503934","https://openalex.org/W6686773509","https://openalex.org/W6696634852","https://openalex.org/W6727628022","https://openalex.org/W6778209916"],"related_works":["https://openalex.org/W2374086689","https://openalex.org/W3176279093","https://openalex.org/W2373945265","https://openalex.org/W2370203001","https://openalex.org/W1912565424","https://openalex.org/W4246410201","https://openalex.org/W1968505275","https://openalex.org/W2959939328","https://openalex.org/W2385081216","https://openalex.org/W2392327727"],"abstract_inverted_index":{"Range":[0],"query":[1,27,95,172,193],"is":[2,153,196],"commonly":[3],"used":[4],"to":[5,37,40,48,60,97,117,121,141,155,174,198],"support":[6],"ciphertext":[7,29,191,223],"retrieval":[8],"on":[9],"encrypted":[10],"databases":[11],"in":[12,25,79,107,150,220,234],"a":[13,183,188],"cloud-based":[14],"environment,":[15],"and":[16,66,75,110,152,202,225],"order-revealing":[17],"encryption":[18],"(ORE)":[19],"plays":[20],"an":[21],"increasingly":[22],"important":[23],"role":[24],"range":[26,84,173,192],"for":[28],"field":[30],"processing.":[31],"Specifically,":[32],"one":[33],"can":[34,114],"utilize":[35],"ORE":[36,53,88,218],"facilitate":[38,118],"comparators":[39],"determine":[41],"whether":[42],"the":[43,49,80,92,98,101,122,135,144,159,163,178,213,235],"order":[44],"of":[45,71,82,146,215,222],"ciphertext(s)":[46],"corresponds":[47],"associated":[50],"plaintext(s).":[51],"Newer":[52],"designs":[54],"include":[55],"those":[56,67],"that":[57,68,157,195,210],"are":[58,69],"resistant":[59],"common":[61],"attacks":[62],"(e.g.,":[63],"spectral":[64],"attacks)":[65],"capable":[70],"supporting":[72],"both":[73,199],"multi-client":[74,87,190,217],"single-client":[76],"settings.":[77],"However,":[78],"scenario":[81],"cross-database":[83],"queries,":[85],"existing":[86],"approaches":[89],"generally":[90],"pass":[91],"data":[93,160],"owner\u2019s":[94],"key":[96,169],"searcher":[99],"during":[100],"authorization":[102],"process.":[103,238],"Consequently,":[104],"this":[105],"results":[106],"agent":[108,200],"transfer":[109,201],"permission":[111,203],"extension,":[112],"which":[113],"be":[115],"exploited":[116],"unauthorized":[119],"access":[120],"database":[123],"data.":[124],"To":[125],"solve":[126],"these":[127],"limitations,":[128],"we":[129,186],"propose":[130],"om-ORE.":[131],"The":[132,206],"latter":[133],"uses":[134],"oblivious":[136],"pseudorandom":[137],"function":[138],"(OPRF)":[139],"protocol":[140],"further":[142],"enhance":[143],"security":[145],"token":[147,236],"generation":[148,237],"mechanism":[149],"ORE,":[151],"designed":[154],"ensure":[156],"neither":[158],"owner":[161],"nor":[162],"authorized":[164],"client":[165],"reveals":[166],"any":[167],"secret":[168],"or":[170],"expected":[171],"each":[175],"other.":[176],"Using":[177],"proposed":[179],"om-ORE":[180,211],"scheme":[181,194],"as":[182,228,230],"building":[184],"block,":[185],"design":[187],"secure":[189],"resilient":[197],"extension":[204],"attacks.":[205],"performance":[207,233],"evaluation":[208],"shows":[209],"inherits":[212],"advantages":[214],"state-of-the-art":[216],"approaches,":[219],"terms":[221],"size":[224],"comparison":[226],"efficiency,":[227],"well":[229],"having":[231],"comparable":[232]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
