{"id":"https://openalex.org/W3134889135","doi":"https://doi.org/10.1109/tcbb.2021.3063388","title":"P2GT: Fine-Grained Genomic Data Access Control With Privacy-Preserving Testing in Cloud Computing","display_name":"P2GT: Fine-Grained Genomic Data Access Control With Privacy-Preserving Testing in Cloud Computing","publication_year":2021,"publication_date":"2021-03-03","ids":{"openalex":"https://openalex.org/W3134889135","doi":"https://doi.org/10.1109/tcbb.2021.3063388","mag":"3134889135","pmid":"https://pubmed.ncbi.nlm.nih.gov/33656996"},"language":"en","primary_location":{"id":"doi:10.1109/tcbb.2021.3063388","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcbb.2021.3063388","pdf_url":null,"source":{"id":"https://openalex.org/S36029991","display_name":"IEEE/ACM Transactions on Computational Biology and Bioinformatics","issn_l":"1545-5963","issn":["1545-5963","1557-9964","2374-0043"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE/ACM Transactions on Computational Biology and Bioinformatics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","pubmed"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5052193415","display_name":"Qinlong Huang","orcid":"https://orcid.org/0000-0002-0378-0941"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Qinlong Huang","raw_affiliation_strings":["School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101976202","display_name":"Wei Yue","orcid":"https://orcid.org/0000-0003-3169-0828"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Yue","raw_affiliation_strings":["School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071134614","display_name":"Yixian Yang","orcid":"https://orcid.org/0000-0001-8067-4774"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yixian Yang","raw_affiliation_strings":["School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5028255327","display_name":"Lixuan Chen","orcid":"https://orcid.org/0000-0002-8695-8062"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lixuan Chen","raw_affiliation_strings":["School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5052193415"],"corresponding_institution_ids":["https://openalex.org/I139759216"],"apc_list":null,"apc_paid":null,"fwci":0.6998,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.75305447,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"19","issue":"4","first_page":"2385","last_page":"2398"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7684009075164795},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6244332790374756},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.6061651706695557},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.46867045760154724},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.37382495403289795},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.35319656133651733},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.10075825452804565},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.052377521991729736}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7684009075164795},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6244332790374756},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.6061651706695557},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.46867045760154724},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.37382495403289795},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.35319656133651733},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10075825452804565},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.052377521991729736}],"mesh":[{"descriptor_ui":"D000067917","descriptor_name":"Cloud Computing","qualifier_ui":null,"qualifier_name":null,"is_major_topic":true},{"descriptor_ui":"D000067917","descriptor_name":"Cloud Computing","qualifier_ui":null,"qualifier_name":null,"is_major_topic":true},{"descriptor_ui":"D000067917","descriptor_name":"Cloud Computing","qualifier_ui":null,"qualifier_name":null,"is_major_topic":true},{"descriptor_ui":"D000465","descriptor_name":"Algorithms","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D000465","descriptor_name":"Algorithms","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D000465","descriptor_name":"Algorithms","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D016494","descriptor_name":"Computer Security","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D016494","descriptor_name":"Computer Security","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D016494","descriptor_name":"Computer Security","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D018907","descriptor_name":"Privacy","qualifier_ui":null,"qualifier_name":null,"is_major_topic":true},{"descriptor_ui":"D018907","descriptor_name":"Privacy","qualifier_ui":null,"qualifier_name":null,"is_major_topic":true},{"descriptor_ui":"D018907","descriptor_name":"Privacy","qualifier_ui":null,"qualifier_name":null,"is_major_topic":true},{"descriptor_ui":"D023281","descriptor_name":"Genomics","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D023281","descriptor_name":"Genomics","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D023281","descriptor_name":"Genomics","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false}],"locations_count":2,"locations":[{"id":"doi:10.1109/tcbb.2021.3063388","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcbb.2021.3063388","pdf_url":null,"source":{"id":"https://openalex.org/S36029991","display_name":"IEEE/ACM Transactions on Computational Biology and Bioinformatics","issn_l":"1545-5963","issn":["1545-5963","1557-9964","2374-0043"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE/ACM Transactions on Computational Biology and Bioinformatics","raw_type":"journal-article"},{"id":"pmid:33656996","is_oa":false,"landing_page_url":"https://pubmed.ncbi.nlm.nih.gov/33656996","pdf_url":null,"source":{"id":"https://openalex.org/S4306525036","display_name":"PubMed","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1299303238","host_organization_name":"National Institutes of Health","host_organization_lineage":["https://openalex.org/I1299303238"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE/ACM transactions on computational biology and bioinformatics","raw_type":null}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1001311788","display_name":null,"funder_award_id":"U1736212","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G376825405","display_name":null,"funder_award_id":"61572080","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W1442181477","https://openalex.org/W1506469476","https://openalex.org/W1581001589","https://openalex.org/W1582659671","https://openalex.org/W1714926069","https://openalex.org/W2047984110","https://openalex.org/W2073122665","https://openalex.org/W2086298846","https://openalex.org/W2087135382","https://openalex.org/W2089607820","https://openalex.org/W2103806120","https://openalex.org/W2108072891","https://openalex.org/W2118875948","https://openalex.org/W2125259267","https://openalex.org/W2127458553","https://openalex.org/W2138001464","https://openalex.org/W2314118214","https://openalex.org/W2403036368","https://openalex.org/W2515960448","https://openalex.org/W2588583715","https://openalex.org/W2601755223","https://openalex.org/W2759944294","https://openalex.org/W2761844358","https://openalex.org/W2762497841","https://openalex.org/W2807957402","https://openalex.org/W2883720833","https://openalex.org/W2902609404","https://openalex.org/W2913667878","https://openalex.org/W2915050524","https://openalex.org/W3006601897","https://openalex.org/W3020407551","https://openalex.org/W6634915617","https://openalex.org/W6678707656","https://openalex.org/W6712419705","https://openalex.org/W7070821928"],"related_works":["https://openalex.org/W4244478748","https://openalex.org/W4223488648","https://openalex.org/W2134969820","https://openalex.org/W2251605416","https://openalex.org/W1997222214","https://openalex.org/W2560439919","https://openalex.org/W4389340727","https://openalex.org/W3150465815","https://openalex.org/W2802581102","https://openalex.org/W4205786897"],"abstract_inverted_index":{"With":[0],"the":[1,7,37,41,48,54,96,134,141,151,169],"rapid":[2,31],"development":[3],"of":[4,9,43,50,56,143],"bioinformatics":[5],"and":[6,30,53,77,129,146,160,164,171],"availability":[8],"genetic":[10,126,173],"sequencing":[11],"technologies,":[12],"genomic":[13,45,57,70],"data":[14,71],"has":[15],"been":[16],"used":[17],"to":[18,36,68,82,121,167],"facilitate":[19],"personalized":[20,84],"medicine.":[21],"Cloud":[22],"computing,":[23],"features":[24],"as":[25],"low":[26],"cost,":[27],"rich":[28],"storage":[29],"processing":[32],"can":[33],"precisely":[34],"respond":[35],"challenges":[38],"brought":[39],"by":[40,87],"emergence":[42],"massive":[44],"data.":[46],"Considering":[47],"security":[49,142],"cloud":[51,177],"platform":[52],"privacy":[55],"data,":[58],"we":[59],"first":[60],"introduce":[61],"P2GT":[62,159],"which":[63,110],"utilizes":[64],"key-policy":[65],"attribute-based":[66],"encryption":[67,113],"realize":[69,122],"access":[72],"control":[73],"with":[74,114,137,150],"unbounded":[75],"attributes,":[76],"employs":[78],"equality":[79,115],"test":[80,86,116,128,132],"algorithm":[81],"achieve":[83],"medicine":[85],"matching":[88],"digitized":[89],"single":[90],"nucleotide":[91],"polymorphisms":[92],"(SNPs)":[93],"directly":[94],"on":[95],"users'":[97],"ciphertext":[98],"without":[99],"encrypting":[100],"multiple":[101],"times.":[102],"We":[103,139],"then":[104],"propose":[105],"an":[106],"enhanced":[107],"scheme":[108],"P2GT+,":[109],"adopts":[111],"identity-based":[112],"supporting":[117],"flexible":[118],"joint":[119],"authorization":[120],"privacy-preserving":[123,170],"paternity":[124],"test,":[125],"compatibility":[127],"disease":[130],"susceptibility":[131],"over":[133],"encrypted":[135],"SNPs":[136],"P2GT.":[138],"prove":[140],"proposed":[144],"schemes":[145],"conduct":[147],"extensive":[148],"experiments":[149],"1,000":[152],"Genomes":[153],"dataset.":[154],"The":[155],"results":[156],"show":[157],"that":[158],"P2GT+":[161],"are":[162],"practical":[163],"scalable":[165],"enough":[166],"meet":[168],"authorized":[172],"testing":[174],"requirements":[175],"in":[176],"computing.":[178]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
