{"id":"https://openalex.org/W3011569712","doi":"https://doi.org/10.1109/jsyst.2020.2978015","title":"SFEEC: Provably Secure Signcryption-Based Big Data Security Framework for Energy-Efficient Computing Environment","display_name":"SFEEC: Provably Secure Signcryption-Based Big Data Security Framework for Energy-Efficient Computing Environment","publication_year":2020,"publication_date":"2020-03-17","ids":{"openalex":"https://openalex.org/W3011569712","doi":"https://doi.org/10.1109/jsyst.2020.2978015","mag":"3011569712"},"language":"en","primary_location":{"id":"doi:10.1109/jsyst.2020.2978015","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jsyst.2020.2978015","pdf_url":null,"source":{"id":"https://openalex.org/S95999327","display_name":"IEEE Systems Journal","issn_l":"1932-8184","issn":["1932-8184","1937-9234","2373-7816"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Systems Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5070784613","display_name":"Dharminder Dharminder","orcid":"https://orcid.org/0000-0002-4478-5706"},"institutions":[{"id":"https://openalex.org/I33552525","display_name":"LNM Institute of Information Technology","ror":"https://ror.org/03jp7rg16","country_code":"IN","type":"education","lineage":["https://openalex.org/I33552525"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Dharminder Dharminder","raw_affiliation_strings":["Department of Mathematics, The LNM Institute of Information Technology, Jaipur, India"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics, The LNM Institute of Information Technology, Jaipur, India","institution_ids":["https://openalex.org/I33552525"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051195514","display_name":"Mohammad S. Obaidat","orcid":"https://orcid.org/0000-0002-1569-9657"},"institutions":[{"id":"https://openalex.org/I92403157","display_name":"University of Science and Technology Beijing","ror":"https://ror.org/02egmk993","country_code":"CN","type":"education","lineage":["https://openalex.org/I92403157"]},{"id":"https://openalex.org/I114972647","display_name":"University of Jordan","ror":"https://ror.org/05k89ew48","country_code":"JO","type":"education","lineage":["https://openalex.org/I114972647"]},{"id":"https://openalex.org/I29891158","display_name":"University of Sharjah","ror":"https://ror.org/00engpz63","country_code":"AE","type":"education","lineage":["https://openalex.org/I29891158"]}],"countries":["AE","CN","JO"],"is_corresponding":false,"raw_author_name":"Mohammad S. Obaidat","raw_affiliation_strings":["College of Computing and Informatics, University of Sharjah, Sharjah, United Arab Emirates","King Abdullah II School of Information Technology, The University of Jordan, Amman, Jordan","University of Science and Technology Beijing, Beijing, China"],"affiliations":[{"raw_affiliation_string":"College of Computing and Informatics, University of Sharjah, Sharjah, United Arab Emirates","institution_ids":["https://openalex.org/I29891158"]},{"raw_affiliation_string":"King Abdullah II School of Information Technology, The University of Jordan, Amman, Jordan","institution_ids":["https://openalex.org/I114972647"]},{"raw_affiliation_string":"University of Science and Technology Beijing, Beijing, China","institution_ids":["https://openalex.org/I92403157"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010912349","display_name":"Dheerendra Mishra","orcid":"https://orcid.org/0000-0001-8115-6397"},"institutions":[{"id":"https://openalex.org/I33552525","display_name":"LNM Institute of Information Technology","ror":"https://ror.org/03jp7rg16","country_code":"IN","type":"education","lineage":["https://openalex.org/I33552525"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Dheerendra Mishra","raw_affiliation_strings":["Department of Mathematics, The LNM Institute of Information Technology, Jaipur, India"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics, The LNM Institute of Information Technology, Jaipur, India","institution_ids":["https://openalex.org/I33552525"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5011213078","display_name":"Ashok Kumar Das","orcid":"https://orcid.org/0000-0002-5196-9589"},"institutions":[{"id":"https://openalex.org/I64189192","display_name":"International Institute of Information Technology, Hyderabad","ror":"https://ror.org/05f11g639","country_code":"IN","type":"education","lineage":["https://openalex.org/I64189192"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Ashok Kumar Das","raw_affiliation_strings":["Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad, India"],"affiliations":[{"raw_affiliation_string":"Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad, India","institution_ids":["https://openalex.org/I64189192"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5070784613"],"corresponding_institution_ids":["https://openalex.org/I33552525"],"apc_list":null,"apc_paid":null,"fwci":1.2345,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.83705814,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"15","issue":"1","first_page":"598","last_page":"606"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/signcryption","display_name":"Signcryption","score":0.9213358759880066},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7853425145149231},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.46663957834243774},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.45423147082328796},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.43909311294555664},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4303257465362549},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4252709448337555},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.41291964054107666},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4086242616176605},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.31259602308273315},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.17524290084838867},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.16303220391273499}],"concepts":[{"id":"https://openalex.org/C155527597","wikidata":"https://www.wikidata.org/wiki/Q1727777","display_name":"Signcryption","level":4,"score":0.9213358759880066},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7853425145149231},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.46663957834243774},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.45423147082328796},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.43909311294555664},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4303257465362549},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4252709448337555},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.41291964054107666},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4086242616176605},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.31259602308273315},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.17524290084838867},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.16303220391273499}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jsyst.2020.2978015","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jsyst.2020.2978015","pdf_url":null,"source":{"id":"https://openalex.org/S95999327","display_name":"IEEE Systems Journal","issn_l":"1932-8184","issn":["1932-8184","1937-9234","2373-7816"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Systems Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Affordable and clean energy","id":"https://metadata.un.org/sdg/7","score":0.8199999928474426}],"awards":[],"funders":[{"id":"https://openalex.org/F4320334771","display_name":"Science and Engineering Research Board","ror":"https://ror.org/03ffdsr55"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W109292442","https://openalex.org/W626692671","https://openalex.org/W1510433380","https://openalex.org/W1516634197","https://openalex.org/W1569083856","https://openalex.org/W1592092778","https://openalex.org/W1701399517","https://openalex.org/W1805290670","https://openalex.org/W1969394015","https://openalex.org/W1979072497","https://openalex.org/W1990220158","https://openalex.org/W1999307975","https://openalex.org/W2010879711","https://openalex.org/W2030969900","https://openalex.org/W2034962434","https://openalex.org/W2055376915","https://openalex.org/W2084295561","https://openalex.org/W2096629291","https://openalex.org/W2109137451","https://openalex.org/W2113840257","https://openalex.org/W2131307433","https://openalex.org/W2152924492","https://openalex.org/W2161229593","https://openalex.org/W2231773762","https://openalex.org/W2244448351","https://openalex.org/W2385921128","https://openalex.org/W2419340670","https://openalex.org/W2498693885","https://openalex.org/W2546898965","https://openalex.org/W2748568982","https://openalex.org/W2766115904","https://openalex.org/W2929545370","https://openalex.org/W3031434724","https://openalex.org/W3133596308","https://openalex.org/W4285719527","https://openalex.org/W6630785188","https://openalex.org/W6671828919","https://openalex.org/W6717614930"],"related_works":["https://openalex.org/W2077461987","https://openalex.org/W1891552123","https://openalex.org/W1499103434","https://openalex.org/W1810303253","https://openalex.org/W2915550258","https://openalex.org/W2662454373","https://openalex.org/W1490519238","https://openalex.org/W3210507754","https://openalex.org/W2149350464","https://openalex.org/W2370270697"],"abstract_inverted_index":{"Digital":[0],"networks":[1],"connect":[2],"an":[3,57,74,103,115],"increasing":[4],"number":[5],"of":[6,20,151],"users,":[7],"sensors,":[8],"and":[9,15,47,70,86,132,154,175],"devices,":[10],"which":[11,126],"communicate,":[12],"access,":[13],"share,":[14],"analyze":[16],"data.":[17,28],"This":[18,94,112],"phenomenon":[19],"diverse":[21],"data":[22,48,52,81,138],"generation":[23],"is":[24,53,98,166],"recognized":[25],"as":[26,122,124],"Big":[27,38,51,137],"While":[29],"people":[30],"are":[31,90],"benefiting":[32],"from":[33],"the":[34,136,149,162,170,182],"convenience":[35],"added":[36],"by":[37,119,157],"data,":[39],"they":[40],"also":[41,167],"meet":[42],"direct":[43],"threats":[44,79],"to":[45,72,80,101],"privacy":[46],"security.":[49],"As":[50],"massive,":[54],"it":[55,97],"needs":[56],"effective":[58],"security":[59,85,89],"framework":[60,105,143],"with":[61],"energy-efficient":[62,145],"computing":[63],"environment.":[64],"Signcryption":[65],"technique":[66,118],"combines":[67],"both":[68],"encryption":[69,121],"signature":[71],"present":[73],"efficient":[75,104],"solution.":[76],"To":[77],"address":[78,109],"security,":[82],"chosen":[83,87,173,178],"cipher":[84],"message":[88],"two":[91],"important":[92,100],"attributes.":[93],"means":[95],"that":[96],"very":[99],"design":[102],"where":[106],"we":[107],"can":[108],"these":[110],"issues.":[111],"article":[113],"introduces":[114],"identity-based":[116],"signcryption":[117],"combining":[120],"well":[123],"signature,":[125],"provides":[127],"a":[128],"solution":[129],"for":[130,144],"secure":[131],"authenticated":[133],"communication":[134,155],"in":[135,181],"environment,":[139],"called":[140],"SFEEC":[141,147,165],"(security":[142],"computing).":[146],"fulfills":[148],"requirements":[150],"less":[152],"computation":[153,160],"overheads":[156],"offering":[158],"pairing-free":[159],"at":[161],"user":[163],"end.":[164],"proven":[168],"under":[169],"\u201cindistinguishable":[171],"against":[172,177],"ciphertext\u201d":[174],"\u201csecure":[176],"message\u201d":[179],"attacks":[180],"standard":[183],"model.":[184]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":1}],"updated_date":"2026-03-13T16:22:10.518609","created_date":"2025-10-10T00:00:00"}
