{"id":"https://openalex.org/W7116651030","doi":"https://doi.org/10.1109/jiot.2025.3646729","title":"Optimizing Attribute-Based Encryption for Fine-Grained Access Control in Cloud Environments: An Adaptively Secure, Offline/Online, and Outsourcing Framework","display_name":"Optimizing Attribute-Based Encryption for Fine-Grained Access Control in Cloud Environments: An Adaptively Secure, Offline/Online, and Outsourcing Framework","publication_year":2025,"publication_date":"2025-12-22","ids":{"openalex":"https://openalex.org/W7116651030","doi":"https://doi.org/10.1109/jiot.2025.3646729"},"language":null,"primary_location":{"id":"doi:10.1109/jiot.2025.3646729","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3646729","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Xingbing Fu","orcid":"https://orcid.org/0000-0002-0025-8883"},"institutions":[{"id":"https://openalex.org/I50760025","display_name":"Hangzhou Dianzi University","ror":"https://ror.org/0576gt767","country_code":"CN","type":"education","lineage":["https://openalex.org/I50760025"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xingbing Fu","raw_affiliation_strings":["School of Cyberspace, Hangzhou Dianzi University, Hangzhou, China"],"raw_orcid":"https://orcid.org/0000-0002-0025-8883","affiliations":[{"raw_affiliation_string":"School of Cyberspace, Hangzhou Dianzi University, Hangzhou, China","institution_ids":["https://openalex.org/I50760025"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054642610","display_name":"Jieru Yan","orcid":"https://orcid.org/0000-0003-1073-5396"},"institutions":[{"id":"https://openalex.org/I50760025","display_name":"Hangzhou Dianzi University","ror":"https://ror.org/0576gt767","country_code":"CN","type":"education","lineage":["https://openalex.org/I50760025"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jieru Yan","raw_affiliation_strings":["School of Cyberspace, Hangzhou Dianzi University, Hangzhou, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Cyberspace, Hangzhou Dianzi University, Hangzhou, China","institution_ids":["https://openalex.org/I50760025"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014371323","display_name":"Zihang Yin","orcid":"https://orcid.org/0009-0006-8645-7766"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zihang Yin","raw_affiliation_strings":["School of Information and Communication Engineering, Beijing University of Posts and Telecommunications, Beijing, China"],"raw_orcid":"https://orcid.org/0009-0006-8645-7766","affiliations":[{"raw_affiliation_string":"School of Information and Communication Engineering, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110026968","display_name":"Chenming Zhu","orcid":null},"institutions":[{"id":"https://openalex.org/I4210115152","display_name":"Zhejiang Institute of Special Equipment Inspection","ror":"https://ror.org/01jb3sz14","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210115152"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chenming Zhu","raw_affiliation_strings":["Zhejiang Electronic Information Products Inspection and Research Institute (Key Laboratory of Information Security of Zhejiang Province), Hangzhou, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Zhejiang Electronic Information Products Inspection and Research Institute (Key Laboratory of Information Security of Zhejiang Province), Hangzhou, China","institution_ids":["https://openalex.org/I4210115152"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089947502","display_name":"Butian Huang","orcid":"https://orcid.org/0009-0009-5986-697X"},"institutions":[{"id":"https://openalex.org/I50760025","display_name":"Hangzhou Dianzi University","ror":"https://ror.org/0576gt767","country_code":"CN","type":"education","lineage":["https://openalex.org/I50760025"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Butian Huang","raw_affiliation_strings":["School of Cyberspace, Hangzhou Dianzi University, Hangzhou, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Cyberspace, Hangzhou Dianzi University, Hangzhou, China","institution_ids":["https://openalex.org/I50760025"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5018143382","display_name":"F Li","orcid":null},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fagen Li","raw_affiliation_strings":["School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China"],"raw_orcid":"https://orcid.org/0000-0001-6289-1265","affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I50760025"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.79060954,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"13","issue":"6","first_page":"11553","last_page":"11566"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9846000075340271,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9846000075340271,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.008299999870359898,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.000699999975040555,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.8216000199317932},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7172999978065491},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.7077000141143799},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.5705999732017517},{"id":"https://openalex.org/keywords/semantic-security","display_name":"Semantic security","score":0.5170999765396118},{"id":"https://openalex.org/keywords/on-the-fly-encryption","display_name":"On-the-fly encryption","score":0.49889999628067017},{"id":"https://openalex.org/keywords/ciphertext-indistinguishability","display_name":"Ciphertext indistinguishability","score":0.4941999912261963},{"id":"https://openalex.org/keywords/outsourcing","display_name":"Outsourcing","score":0.48019999265670776},{"id":"https://openalex.org/keywords/functional-encryption","display_name":"Functional encryption","score":0.4325000047683716},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.42660000920295715}],"concepts":[{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.8216000199317932},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7985000014305115},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7172999978065491},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.7077000141143799},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.5705999732017517},{"id":"https://openalex.org/C204806902","wikidata":"https://www.wikidata.org/wiki/Q2333581","display_name":"Semantic security","level":5,"score":0.5170999765396118},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5080999732017517},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.49889999628067017},{"id":"https://openalex.org/C182776695","wikidata":"https://www.wikidata.org/wiki/Q840661","display_name":"Ciphertext indistinguishability","level":5,"score":0.4941999912261963},{"id":"https://openalex.org/C46934059","wikidata":"https://www.wikidata.org/wiki/Q61515","display_name":"Outsourcing","level":2,"score":0.48019999265670776},{"id":"https://openalex.org/C2780746774","wikidata":"https://www.wikidata.org/wiki/Q17014981","display_name":"Functional encryption","level":4,"score":0.4325000047683716},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.42660000920295715},{"id":"https://openalex.org/C119133118","wikidata":"https://www.wikidata.org/wiki/Q7200761","display_name":"Plaintext-aware encryption","level":5,"score":0.4058000147342682},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.3986000120639801},{"id":"https://openalex.org/C18319499","wikidata":"https://www.wikidata.org/wiki/Q5448402","display_name":"Filesystem-level encryption","level":4,"score":0.3919999897480011},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.37380000948905945},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3720000088214874},{"id":"https://openalex.org/C100980136","wikidata":"https://www.wikidata.org/wiki/Q4668956","display_name":"Malleability","level":4,"score":0.35839998722076416},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.35749998688697815},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.35569998621940613},{"id":"https://openalex.org/C166501710","wikidata":"https://www.wikidata.org/wiki/Q5132476","display_name":"Client-side encryption","level":4,"score":0.34950000047683716},{"id":"https://openalex.org/C2778950925","wikidata":"https://www.wikidata.org/wiki/Q4672474","display_name":"Access structure","level":4,"score":0.3452000021934509},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3418000042438507},{"id":"https://openalex.org/C54569210","wikidata":"https://www.wikidata.org/wiki/Q7246854","display_name":"Probabilistic encryption","level":3,"score":0.3278999924659729},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.31040000915527344},{"id":"https://openalex.org/C57795399","wikidata":"https://www.wikidata.org/wiki/Q5265706","display_name":"Deterministic encryption","level":4,"score":0.30379998683929443},{"id":"https://openalex.org/C184685986","wikidata":"https://www.wikidata.org/wiki/Q3505167","display_name":"Multiple encryption","level":3,"score":0.28209999203681946},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2800000011920929},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.2757999897003174},{"id":"https://openalex.org/C158215988","wikidata":"https://www.wikidata.org/wiki/Q4637271","display_name":"40-bit encryption","level":3,"score":0.27000001072883606},{"id":"https://openalex.org/C73468433","wikidata":"https://www.wikidata.org/wiki/Q1639918","display_name":"Hybrid cryptosystem","level":4,"score":0.26649999618530273},{"id":"https://openalex.org/C69254412","wikidata":"https://www.wikidata.org/wiki/Q6554302","display_name":"Link encryption","level":4,"score":0.2612999975681305},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.25360000133514404}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2025.3646729","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3646729","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W97295072","https://openalex.org/W1487683390","https://openalex.org/W1490394993","https://openalex.org/W1498316612","https://openalex.org/W1510795740","https://openalex.org/W1763482972","https://openalex.org/W1898753656","https://openalex.org/W1970209803","https://openalex.org/W2078590992","https://openalex.org/W2108072891","https://openalex.org/W2116556172","https://openalex.org/W2138001464","https://openalex.org/W2164988972","https://openalex.org/W2231711433","https://openalex.org/W2419438983","https://openalex.org/W2438407744","https://openalex.org/W2765635759","https://openalex.org/W2767083252","https://openalex.org/W2889003703","https://openalex.org/W3128174515","https://openalex.org/W3184943777","https://openalex.org/W3202239499","https://openalex.org/W3210239242","https://openalex.org/W4211008561","https://openalex.org/W4223971349","https://openalex.org/W4226059379","https://openalex.org/W4308642907","https://openalex.org/W4313010978","https://openalex.org/W4365807184"],"related_works":[],"abstract_inverted_index":{"Attribute-Based":[0],"Encryption":[1],"(ABE)":[2],"is":[3,58,104,113,151],"an":[4,86,133,170],"advanced":[5],"public-key":[6],"encryption":[7,62,102],"paradigm":[8],"that":[9,59],"enforces":[10],"fine-grained":[11],"access":[12,49,73],"control":[13],"over":[14,169],"encrypted":[15],"data.":[16],"For":[17],"instance,":[18],"the":[19,24,69,72,76,95,107,117,123,128,142,146,161],"data":[20,43,177],"owner":[21],"can":[22,37,163],"generate":[23],"ciphertext":[25,60,112,131,135],"associated":[26],"with":[27,68],"((\u201dCardiology\u201d":[28],"OR":[29],"\u201dCritical":[30],"Care":[31],"Medicine\u201d)":[32],"AND":[33],"\u201dConsultant":[34],"Physician\u201d),":[35],"which":[36],"only":[38],"be":[39],"decrypted":[40],"by":[41],"other":[42],"users":[44],"whose":[45],"attributes":[46],"satisfy":[47],"this":[48,82],"policy.":[50],"However,":[51],"a":[52,137],"major":[53],"efficiency":[54],"drawback":[55],"of":[56,71,78,101],"ABE":[57,92,111,130],"size,":[61],"time,":[63],"and":[64,75,90,153,166],"decryption":[65],"time":[66],"grow":[67],"complexity":[70],"policy":[74],"number":[77],"attributes.":[79],"To":[80],"address":[81],"issue,":[83],"we":[84],"propose":[85],"adaptively":[87],"secure,":[88],"offline/online":[89],"outsourcing":[91,121],"scheme":[93],"under":[94],"Generic":[96],"Group":[97],"Model.":[98],"The":[99],"majority":[100],"operation":[103],"performed":[105],"during":[106,116],"offline":[108],"phase,":[109],"while":[110],"quickly":[114],"assembled":[115],"online":[118],"phase.":[119],"Decryption":[120],"enables":[122],"edge":[124,147],"node":[125],"to":[126,145],"convert":[127],"original":[129],"into":[132],"ElGamal-style":[134],"using":[136],"transformation":[138],"key":[139],"without":[140],"revealing":[141],"plaintext":[143],"message":[144],"node.":[148],"Our":[149],"approach":[150],"efficient":[152],"suitable":[154],"for":[155],"mobile":[156],"devices.":[157],"Performance":[158],"evaluation":[159],"demonstrates":[160],"system":[162],"balance":[164],"computation":[165],"power":[167],"consumption":[168],"extended":[171],"period,":[172],"effectively":[173],"addressing":[174],"challenges":[175],"in":[176],"sharing.":[178]},"counts_by_year":[],"updated_date":"2026-05-05T08:41:31.759640","created_date":"2025-12-22T00:00:00"}
