{"id":"https://openalex.org/W2615919710","doi":"https://doi.org/10.1109/tbdata.2017.2705048","title":"Secure Authentication in Cloud Big Data with Hierarchical Attribute Authorization Structure","display_name":"Secure Authentication in Cloud Big Data with Hierarchical Attribute Authorization Structure","publication_year":2017,"publication_date":"2017-01-01","ids":{"openalex":"https://openalex.org/W2615919710","doi":"https://doi.org/10.1109/tbdata.2017.2705048","mag":"2615919710"},"language":"en","primary_location":{"id":"doi:10.1109/tbdata.2017.2705048","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tbdata.2017.2705048","pdf_url":null,"source":{"id":"https://openalex.org/S2491400915","display_name":"IEEE Transactions on Big Data","issn_l":"2332-7790","issn":["2332-7790","2372-2096"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Big Data","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100766011","display_name":"Jian Shen","orcid":"https://orcid.org/0000-0003-0519-9058"},"institutions":[{"id":"https://openalex.org/I200845125","display_name":"Nanjing University of Information Science and Technology","ror":"https://ror.org/02y0rxk19","country_code":"CN","type":"education","lineage":["https://openalex.org/I200845125"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jian Shen","raw_affiliation_strings":["Jiangsu Engineering Center of Network Monitoring, Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology, Nanjing University of Information Science & Technology, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Jiangsu Engineering Center of Network Monitoring, Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology, Nanjing University of Information Science & Technology, Nanjing, China","institution_ids":["https://openalex.org/I200845125"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054744314","display_name":"Dengzhi Liu","orcid":"https://orcid.org/0000-0001-9206-7680"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dengzhi Liu","raw_affiliation_strings":["State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100453158","display_name":"Qi Liu","orcid":"https://orcid.org/0000-0001-7062-831X"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qi Liu","raw_affiliation_strings":["State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100388504","display_name":"Xingming Sun","orcid":"https://orcid.org/0000-0001-7982-726X"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xingming Sun","raw_affiliation_strings":["State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100456327","display_name":"Yan Zhang","orcid":"https://orcid.org/0000-0002-8561-5092"},"institutions":[{"id":"https://openalex.org/I200845125","display_name":"Nanjing University of Information Science and Technology","ror":"https://ror.org/02y0rxk19","country_code":"CN","type":"education","lineage":["https://openalex.org/I200845125"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yan Zhang","raw_affiliation_strings":["School of Computer and Software, Nanjing University of Information Science & Technology, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Software, Nanjing University of Information Science & Technology, Nanjing, China","institution_ids":["https://openalex.org/I200845125"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100766011"],"corresponding_institution_ids":["https://openalex.org/I200845125"],"apc_list":null,"apc_paid":null,"fwci":4.6804,"has_fulltext":false,"cited_by_count":44,"citation_normalized_percentile":{"value":0.9583893,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"1"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8491343259811401},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7363476157188416},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6607985496520996},{"id":"https://openalex.org/keywords/replay-attack","display_name":"Replay attack","score":0.6287239789962769},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6194004416465759},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.5769463181495667},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.5477270483970642},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5191878080368042},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.516096293926239},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4394468665122986},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.43506503105163574},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.4309093654155731},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3085175156593323},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.10659706592559814},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.06925544142723083}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8491343259811401},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7363476157188416},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6607985496520996},{"id":"https://openalex.org/C11560541","wikidata":"https://www.wikidata.org/wiki/Q1756025","display_name":"Replay attack","level":3,"score":0.6287239789962769},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6194004416465759},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.5769463181495667},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.5477270483970642},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5191878080368042},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.516096293926239},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4394468665122986},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.43506503105163574},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.4309093654155731},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3085175156593323},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.10659706592559814},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.06925544142723083},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tbdata.2017.2705048","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tbdata.2017.2705048","pdf_url":null,"source":{"id":"https://openalex.org/S2491400915","display_name":"IEEE Transactions on Big Data","issn_l":"2332-7790","issn":["2332-7790","2372-2096"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Big Data","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7799999713897705,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":50,"referenced_works":["https://openalex.org/W68013446","https://openalex.org/W123899820","https://openalex.org/W320829365","https://openalex.org/W1487615702","https://openalex.org/W1513535488","https://openalex.org/W1590262417","https://openalex.org/W1965916170","https://openalex.org/W1984462474","https://openalex.org/W1991318406","https://openalex.org/W1993341076","https://openalex.org/W2010302109","https://openalex.org/W2036260704","https://openalex.org/W2039074122","https://openalex.org/W2048543827","https://openalex.org/W2049495124","https://openalex.org/W2058477688","https://openalex.org/W2077523495","https://openalex.org/W2093355488","https://openalex.org/W2108072891","https://openalex.org/W2128476487","https://openalex.org/W2131725908","https://openalex.org/W2138001464","https://openalex.org/W2152924492","https://openalex.org/W2166445532","https://openalex.org/W2209768828","https://openalex.org/W2262017117","https://openalex.org/W2263562411","https://openalex.org/W2264699053","https://openalex.org/W2287868114","https://openalex.org/W2314565986","https://openalex.org/W2337833343","https://openalex.org/W2342783452","https://openalex.org/W2343459945","https://openalex.org/W2344670370","https://openalex.org/W2427517674","https://openalex.org/W2463724383","https://openalex.org/W2469486851","https://openalex.org/W2474001793","https://openalex.org/W2483379036","https://openalex.org/W2487238101","https://openalex.org/W2532324861","https://openalex.org/W2560195950","https://openalex.org/W2560243933","https://openalex.org/W2574134800","https://openalex.org/W2590682321","https://openalex.org/W6602586656","https://openalex.org/W6602787189","https://openalex.org/W6693027903","https://openalex.org/W6720368936","https://openalex.org/W6721764238"],"related_works":["https://openalex.org/W2355452447","https://openalex.org/W2034419863","https://openalex.org/W1536503377","https://openalex.org/W2466913372","https://openalex.org/W2406792259","https://openalex.org/W2785513402","https://openalex.org/W3007106793","https://openalex.org/W2546448679","https://openalex.org/W2362358462","https://openalex.org/W2296396257"],"abstract_inverted_index":{"With":[0],"the":[1,6,15,19,22,36,39,68,74,81,87,96,109,121,126],"fast":[2],"growing":[3],"demands":[4],"for":[5,53],"big":[7,16,55,82],"data,":[8],"we":[9,47,85,129],"need":[10],"to":[11,67,71,91],"manage":[12],"and":[13,28,112,138],"store":[14],"data":[17,37,56,83],"in":[18,38,95],"cloud.":[20],"Since":[21],"cloud":[23,40,54],"is":[24],"not":[25],"fully":[26],"trusted":[27],"it":[29],"can":[30,107,119,130],"be":[31],"accessed":[32],"by":[33],"any":[34],"users,":[35],"may":[41],"face":[42],"threats.":[43],"In":[44,115],"this":[45],"paper,":[46],"propose":[48],"a":[49,58],"secure":[50],"authentication":[51,89],"protocol":[52,65,90,106,118,134],"with":[57,125],"hierarchical":[59,97],"attribute":[60,77,98],"authorization":[61,99],"structure.":[62,100],"Our":[63],"proposed":[64,88],"resorts":[66],"tree-based":[69],"signature":[70],"significantly":[72],"improve":[73],"security":[75],"of":[76],"authorization.":[78],"To":[79],"satisfy":[80],"requirements,":[84],"extend":[86],"support":[92],"multiple":[93],"levels":[94],"Security":[101],"analysis":[102],"shows":[103],"that":[104,132],"our":[105,117,133],"resist":[108],"forgery":[110],"attack":[111],"replay":[113],"attack.":[114],"addition,":[116],"preserve":[120],"entities":[122],"privacy.":[123],"Comparing":[124],"previous":[127],"studies,":[128],"show":[131],"has":[135],"lower":[136],"computational":[137],"communication":[139],"overhead.":[140]},"counts_by_year":[{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":6},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":8},{"year":2017,"cited_by_count":6}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
