{"id":"https://openalex.org/W2607754875","doi":"https://doi.org/10.1109/pst.2016.7906969","title":"CloudEFS: Efficient and secure file system for cloud storage","display_name":"CloudEFS: Efficient and secure file system for cloud storage","publication_year":2016,"publication_date":"2016-12-01","ids":{"openalex":"https://openalex.org/W2607754875","doi":"https://doi.org/10.1109/pst.2016.7906969","mag":"2607754875"},"language":"en","primary_location":{"id":"doi:10.1109/pst.2016.7906969","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pst.2016.7906969","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 14th Annual Conference on Privacy, Security and Trust (PST)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5041979356","display_name":"Clemens Zeidler","orcid":null},"institutions":[{"id":"https://openalex.org/I154130895","display_name":"University of Auckland","ror":"https://ror.org/03b94tp07","country_code":"NZ","type":"education","lineage":["https://openalex.org/I154130895"]}],"countries":["NZ"],"is_corresponding":true,"raw_author_name":"Clemens Zeidler","raw_affiliation_strings":["Department of Computer Science, The University of Auckland, Auckland, New Zealand"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, The University of Auckland, Auckland, New Zealand","institution_ids":["https://openalex.org/I154130895"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5074245801","display_name":"Muhammad Rizwan Asghar","orcid":"https://orcid.org/0000-0002-9607-376X"},"institutions":[{"id":"https://openalex.org/I154130895","display_name":"University of Auckland","ror":"https://ror.org/03b94tp07","country_code":"NZ","type":"education","lineage":["https://openalex.org/I154130895"]}],"countries":["NZ"],"is_corresponding":false,"raw_author_name":"Muhammad Rizwan Asghar","raw_affiliation_strings":["Department of Computer Science, The University of Auckland, Auckland, New Zealand"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, The University of Auckland, Auckland, New Zealand","institution_ids":["https://openalex.org/I154130895"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5041979356"],"corresponding_institution_ids":["https://openalex.org/I154130895"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.28905912,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"35","issue":null,"first_page":"239","last_page":"246"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9951000213623047,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.9919999837875366,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8516398072242737},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6270013451576233},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5509291887283325},{"id":"https://openalex.org/keywords/metadata","display_name":"Metadata","score":0.5484148859977722},{"id":"https://openalex.org/keywords/cloud-storage","display_name":"Cloud storage","score":0.49652940034866333},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.49012741446495056},{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.44134849309921265},{"id":"https://openalex.org/keywords/file-system","display_name":"File system","score":0.4374575912952423},{"id":"https://openalex.org/keywords/cache","display_name":"Cache","score":0.4310770630836487},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.42527443170547485},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3413015902042389},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3168843388557434},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.3059900999069214}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8516398072242737},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6270013451576233},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5509291887283325},{"id":"https://openalex.org/C93518851","wikidata":"https://www.wikidata.org/wiki/Q180160","display_name":"Metadata","level":2,"score":0.5484148859977722},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.49652940034866333},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.49012741446495056},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.44134849309921265},{"id":"https://openalex.org/C2780940931","wikidata":"https://www.wikidata.org/wiki/Q174989","display_name":"File system","level":2,"score":0.4374575912952423},{"id":"https://openalex.org/C115537543","wikidata":"https://www.wikidata.org/wiki/Q165596","display_name":"Cache","level":2,"score":0.4310770630836487},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.42527443170547485},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3413015902042389},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3168843388557434},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3059900999069214}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/pst.2016.7906969","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pst.2016.7906969","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 14th Annual Conference on Privacy, Security and Trust (PST)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W1445823765","https://openalex.org/W1486522249","https://openalex.org/W1574533905","https://openalex.org/W1576397915","https://openalex.org/W1600255172","https://openalex.org/W1969126835","https://openalex.org/W1985943827","https://openalex.org/W2009191935","https://openalex.org/W2011212169","https://openalex.org/W2011243607","https://openalex.org/W2016841547","https://openalex.org/W2020928798","https://openalex.org/W2039895627","https://openalex.org/W2056980397","https://openalex.org/W2061194392","https://openalex.org/W2063421119","https://openalex.org/W2077719093","https://openalex.org/W2078152492","https://openalex.org/W2098431880","https://openalex.org/W2104210894","https://openalex.org/W2128147193","https://openalex.org/W2130971042","https://openalex.org/W2135348622","https://openalex.org/W2157240622","https://openalex.org/W2161253190","https://openalex.org/W2165257856","https://openalex.org/W2169660680","https://openalex.org/W2354643924","https://openalex.org/W2362491743","https://openalex.org/W2369093464","https://openalex.org/W2534234407","https://openalex.org/W2561140674","https://openalex.org/W2998583855","https://openalex.org/W6628236356","https://openalex.org/W6634463810","https://openalex.org/W6679037172","https://openalex.org/W6683777285"],"related_works":["https://openalex.org/W1852630156","https://openalex.org/W2625231702","https://openalex.org/W4311223005","https://openalex.org/W2370840345","https://openalex.org/W2602423869","https://openalex.org/W2605525988","https://openalex.org/W2187109955","https://openalex.org/W2599115144","https://openalex.org/W2736386444","https://openalex.org/W3093925660"],"abstract_inverted_index":{"Although":[0],"outsourcing":[1],"data":[2,19,26,44,56,59,115,134],"to":[3,48,54,73,98],"the":[4,64],"cloud":[5,9],"has":[6],"many":[7],"advantages,":[8],"computing":[10],"introduces":[11],"new":[12,107],"privacy":[13,123],"and":[14,22,50,53,58,75,85,101,117,140],"security":[15],"requirements":[16],"on":[17],"how":[18],"is":[20,31,40],"stored":[21],"accessed.":[23],"To":[24],"ensure":[25,55],"confidentiality,":[27],"use":[28],"of":[29,114],"encryption":[30],"a":[32,94],"common":[33],"strategy.":[34],"A":[35,106],"problem":[36,67],"with":[37,82],"this":[38,89],"strategy":[39],"that":[41],"for":[42],"large":[43,77,103],"it":[45,71],"becomes":[46,68],"difficult":[47],"access":[49,100],"update":[51,102],"data,":[52],"integrity":[57,116],"provenance":[60,118],"without":[61],"decrypting":[62],"all":[63],"data.":[65,105],"The":[66],"severe":[69],"when":[70],"comes":[72],"accessing":[74],"modifying":[76],"files":[78],"using":[79],"mobile":[80],"devices":[81],"limited":[83],"processing":[84],"bandwidth":[86],"capabilities.":[87],"In":[88],"paper,":[90],"we":[91],"present":[92],"CloudEFS,":[93],"novel":[95],"storage":[96],"framework":[97],"efficiently":[99],"encrypted":[104],"cached":[108],"hash":[109],"algorithm":[110],"enables":[111],"efficient":[112],"updates":[113],"information.":[119],"CloudEFS":[120],"provides":[121],"improved":[122],"by":[124],"hiding":[125],"not":[126],"only":[127],"content":[128],"but":[129],"also":[130],"metadata":[131],"such":[132],"as":[133],"size,":[135],"file":[136,138,141],"count,":[137],"structure":[139],"history.":[142]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
