{"id":"https://openalex.org/W2792501016","doi":"https://doi.org/10.1109/spac.2017.8304356","title":"SafeBox: A scheme for searching and sharing encrypted data in cloud applications","display_name":"SafeBox: A scheme for searching and sharing encrypted data in cloud applications","publication_year":2017,"publication_date":"2017-12-01","ids":{"openalex":"https://openalex.org/W2792501016","doi":"https://doi.org/10.1109/spac.2017.8304356","mag":"2792501016"},"language":"en","primary_location":{"id":"doi:10.1109/spac.2017.8304356","is_oa":false,"landing_page_url":"https://doi.org/10.1109/spac.2017.8304356","pdf_url":null,"source":{"id":"https://openalex.org/S4306498208","display_name":"2017 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100389623","display_name":"Guofeng Wang","orcid":"https://orcid.org/0000-0002-3956-2022"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Guofeng Wang","raw_affiliation_strings":["School of Computer Science, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103171964","display_name":"Chuanyi Liu","orcid":"https://orcid.org/0000-0002-9846-9709"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]},{"id":"https://openalex.org/I158809036","display_name":"Shenzhen Institute of Information Technology","ror":"https://ror.org/03wrf9427","country_code":"CN","type":"education","lineage":["https://openalex.org/I158809036"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chuanyi Liu","raw_affiliation_strings":["School of Computer and Technology, Harbin Institute of Technology (Shenzhen), Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Technology, Harbin Institute of Technology (Shenzhen), Shenzhen, China","institution_ids":["https://openalex.org/I158809036","https://openalex.org/I204983213"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100432280","display_name":"Yingfei Dong","orcid":"https://orcid.org/0000-0003-2371-1043"},"institutions":[{"id":"https://openalex.org/I1331384533","display_name":"University of Hawaii System","ror":"https://ror.org/03tzaeb71","country_code":"US","type":"education","lineage":["https://openalex.org/I1331384533"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yingfei Dong","raw_affiliation_strings":["Dept. of Electrical and Computer Engineering, University of Hawaii, Honolulu, USA"],"affiliations":[{"raw_affiliation_string":"Dept. of Electrical and Computer Engineering, University of Hawaii, Honolulu, USA","institution_ids":["https://openalex.org/I1331384533"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023954747","display_name":"Hezhong Pan","orcid":"https://orcid.org/0000-0003-3364-6855"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hezhong Pan","raw_affiliation_strings":["School of Computer Science, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101992266","display_name":"Peiyi Han","orcid":"https://orcid.org/0000-0003-0417-4473"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Peiyi Han","raw_affiliation_strings":["School of Computer Science, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5113587199","display_name":"Binxing Fang","orcid":null},"institutions":[{"id":"https://openalex.org/I1331384533","display_name":"University of Hawaii System","ror":"https://ror.org/03tzaeb71","country_code":"US","type":"education","lineage":["https://openalex.org/I1331384533"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Binxing Fang","raw_affiliation_strings":["Dept. of Electrical and Computer Engineering, University of Hawaii, Honolulu, USA"],"affiliations":[{"raw_affiliation_string":"Dept. of Electrical and Computer Engineering, University of Hawaii, Honolulu, USA","institution_ids":["https://openalex.org/I1331384533"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5100389623"],"corresponding_institution_ids":["https://openalex.org/I139759216"],"apc_list":null,"apc_paid":null,"fwci":0.3115,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.65426399,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"648","last_page":"653"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.8569663166999817},{"id":"https://openalex.org/keywords/upload","display_name":"Upload","score":0.8509851098060608},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8475808501243591},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8243104815483093},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.7476551532745361},{"id":"https://openalex.org/keywords/cloud-server","display_name":"Cloud server","score":0.6068411469459534},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.5590813159942627},{"id":"https://openalex.org/keywords/data-sharing","display_name":"Data sharing","score":0.5100863575935364},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.49893784523010254},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.47663888335227966},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4641733169555664},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.437975138425827},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3924769163131714},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.22529873251914978},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.16287299990653992}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.8569663166999817},{"id":"https://openalex.org/C71901391","wikidata":"https://www.wikidata.org/wiki/Q7126699","display_name":"Upload","level":2,"score":0.8509851098060608},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8475808501243591},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8243104815483093},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.7476551532745361},{"id":"https://openalex.org/C2987335383","wikidata":"https://www.wikidata.org/wiki/Q878048","display_name":"Cloud server","level":3,"score":0.6068411469459534},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.5590813159942627},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.5100863575935364},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.49893784523010254},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.47663888335227966},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4641733169555664},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.437975138425827},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3924769163131714},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.22529873251914978},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.16287299990653992},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/spac.2017.8304356","is_oa":false,"landing_page_url":"https://doi.org/10.1109/spac.2017.8304356","pdf_url":null,"source":{"id":"https://openalex.org/S4306498208","display_name":"2017 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6200000047683716,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W1542057243","https://openalex.org/W1988374166","https://openalex.org/W2033165262","https://openalex.org/W2039244047","https://openalex.org/W2040102554","https://openalex.org/W2145426052","https://openalex.org/W2147929033","https://openalex.org/W2159915142","https://openalex.org/W2161214567","https://openalex.org/W6683799570"],"related_works":["https://openalex.org/W4284991629","https://openalex.org/W3216741011","https://openalex.org/W1993094537","https://openalex.org/W2883724699","https://openalex.org/W1982578217","https://openalex.org/W3134579980","https://openalex.org/W4385640303","https://openalex.org/W3129498338","https://openalex.org/W3000558130","https://openalex.org/W4226154350"],"abstract_inverted_index":{"Confidential":[0],"data":[1,59,87,119],"is":[2,7],"often":[3,15],"encrypted":[4,58,102,118],"before":[5],"it":[6,93,116],"uploaded":[8,90],"to":[9,54,97,142],"cloud":[10,25,49,79,110,130],"servers.":[11],"However,":[12],"client-controlled":[13],"encryption":[14],"poses":[16],"a":[17,31,95],"major":[18],"barrier":[19],"towards":[20],"the":[21,63,108],"full":[22,46],"functionalities":[23,73],"of":[24,48,72],"services.":[26],"This":[27],"paper":[28],"presents":[29],"SafeBox,":[30],"new":[32],"Cloud":[33],"Access":[34],"Security":[35],"Broker":[36],"(CASB)-based":[37],"approach":[38],"that":[39,133],"protects":[40],"sensitive":[41,76],"information":[42,77],"against":[43],"attackers":[44],"with":[45],"control":[47],"servers,":[50],"and":[51,56,104,138],"allows":[52,94],"clients":[53],"search":[55],"share":[57],"transparently.":[60],"It":[61,81],"addresses":[62],"following":[64],"challenges:":[65],"First,":[66],"SafeBox":[67,134],"brings":[68],"almost":[69],"no":[70],"loss":[71],"for":[74],"protecting":[75],"in":[78],"applications.":[80],"safeguards":[82],"not":[83,106],"only":[84],"textual":[85],"input":[86],"but":[88],"also":[89],"files.":[91],"Second,":[92],"server":[96],"perform":[98],"keyword-based":[99],"searching":[100],"over":[101],"contents,":[103],"does":[105],"modify":[107],"current":[109],"interfaces":[111],"or":[112],"users'":[113],"habits.":[114],"Finally,":[115],"enables":[117],"sharing":[120],"between":[121],"different":[122],"brokers":[123],"efficiently.":[124],"Our":[125],"experimental":[126],"evaluations":[127],"on":[128],"multiple":[129],"applications":[131],"show":[132],"has":[135],"modest":[136],"overheads":[137],"can":[139],"be":[140],"applied":[141],"practical":[143],"use.":[144]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
