{"id":"https://openalex.org/W3007218738","doi":"https://doi.org/10.1109/tcc.2020.2975184","title":"Attribute Based Encryption with Privacy Protection and Accountability for CloudIoT","display_name":"Attribute Based Encryption with Privacy Protection and Accountability for CloudIoT","publication_year":2020,"publication_date":"2020-02-19","ids":{"openalex":"https://openalex.org/W3007218738","doi":"https://doi.org/10.1109/tcc.2020.2975184","mag":"3007218738"},"language":"en","primary_location":{"id":"doi:10.1109/tcc.2020.2975184","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcc.2020.2975184","pdf_url":null,"source":{"id":"https://openalex.org/S2492498579","display_name":"IEEE Transactions on Cloud Computing","issn_l":"2168-7161","issn":["2168-7161","2372-0018"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Cloud Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5074149291","display_name":"Jiguo Li","orcid":"https://orcid.org/0000-0002-6532-2081"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jiguo Li","raw_affiliation_strings":["College of Mathematics and Informatics, Fujian Normal University, Fuzhou, Fujian, China","State Key Laboratory of Cryptology, Beijing, China","Fujian Provincial Key Laboratory of Network Security and Cryptology, Fuzhou, Fujian, China"],"raw_orcid":"https://orcid.org/0000-0002-6532-2081","affiliations":[{"raw_affiliation_string":"College of Mathematics and Informatics, Fujian Normal University, Fuzhou, Fujian, China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"State Key Laboratory of Cryptology, Beijing, China","institution_ids":["https://openalex.org/I4210132990"]},{"raw_affiliation_string":"Fujian Provincial Key Laboratory of Network Security and Cryptology, Fuzhou, Fujian, China","institution_ids":["https://openalex.org/I4210132990"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100341419","display_name":"Yichen Zhang","orcid":"https://orcid.org/0000-0002-6925-0775"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yichen Zhang","raw_affiliation_strings":["College of Mathematics and Informatics, Fujian Normal University, Fuzhou, Fujian, China","Fujian Provincial Key Laboratory of Network Security and Cryptology, Fuzhou, Fujian, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Mathematics and Informatics, Fujian Normal University, Fuzhou, Fujian, China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"Fujian Provincial Key Laboratory of Network Security and Cryptology, Fuzhou, Fujian, China","institution_ids":["https://openalex.org/I4210132990"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081596329","display_name":"Jianting Ning","orcid":"https://orcid.org/0000-0001-7165-398X"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianting Ning","raw_affiliation_strings":["College of Mathematics and Informatics, Fujian Normal University, Fuzhou, Fujian, China"],"raw_orcid":"https://orcid.org/0000-0001-7165-398X","affiliations":[{"raw_affiliation_string":"College of Mathematics and Informatics, Fujian Normal University, Fuzhou, Fujian, China","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031931063","display_name":"Xinyi Huang","orcid":"https://orcid.org/0000-0003-0070-1707"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xinyi Huang","raw_affiliation_strings":["College of Mathematics and Informatics, Fujian Normal University, Fuzhou, Fujian, China","Fujian Provincial Key Laboratory of Network Security and Cryptology, Fuzhou, Fujian, China"],"raw_orcid":"https://orcid.org/0000-0003-0070-1707","affiliations":[{"raw_affiliation_string":"College of Mathematics and Informatics, Fujian Normal University, Fuzhou, Fujian, China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"Fujian Provincial Key Laboratory of Network Security and Cryptology, Fuzhou, Fujian, China","institution_ids":["https://openalex.org/I4210132990"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082048245","display_name":"Geong Sen Poh","orcid":"https://orcid.org/0000-0002-2905-688X"},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"education","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Geong Sen Poh","raw_affiliation_strings":["Department of Computer Science, National University of Singapore, Singapore, Singapore"],"raw_orcid":"https://orcid.org/0000-0002-2905-688X","affiliations":[{"raw_affiliation_string":"Department of Computer Science, National University of Singapore, Singapore, Singapore","institution_ids":["https://openalex.org/I165932596"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5065407475","display_name":"Debang Wang","orcid":"https://orcid.org/0000-0002-4635-0861"},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"education","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Debang Wang","raw_affiliation_strings":["Department of Computer Science, National University of Singapore, Singapore, Singapore"],"raw_orcid":"https://orcid.org/0000-0002-4635-0861","affiliations":[{"raw_affiliation_string":"Department of Computer Science, National University of Singapore, Singapore, Singapore","institution_ids":["https://openalex.org/I165932596"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5074149291"],"corresponding_institution_ids":["https://openalex.org/I111753288","https://openalex.org/I4210132990"],"apc_list":null,"apc_paid":null,"fwci":16.5912,"has_fulltext":false,"cited_by_count":248,"citation_normalized_percentile":{"value":0.9932546,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"10","issue":"2","first_page":"762","last_page":"773"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7946208715438843},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7937806844711304},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.7750970125198364},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.7545905113220215},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.7293297052383423},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7105984687805176},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.593413233757019},{"id":"https://openalex.org/keywords/construct","display_name":"Construct (python library)","score":0.4848552942276001},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4845258593559265},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.45721790194511414},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3410522937774658},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.28585705161094666},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.06335613131523132}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7946208715438843},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7937806844711304},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.7750970125198364},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.7545905113220215},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.7293297052383423},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7105984687805176},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.593413233757019},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.4848552942276001},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4845258593559265},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.45721790194511414},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3410522937774658},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.28585705161094666},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.06335613131523132}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tcc.2020.2975184","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcc.2020.2975184","pdf_url":null,"source":{"id":"https://openalex.org/S2492498579","display_name":"IEEE Transactions on Cloud Computing","issn_l":"2168-7161","issn":["2168-7161","2372-0018"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Cloud Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.800000011920929,"id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G3041179666","display_name":null,"funder_award_id":"61872089","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3289934160","display_name":null,"funder_award_id":"61972095","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4218693513","display_name":null,"funder_award_id":"61672207","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5043465742","display_name":null,"funder_award_id":"61972094","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5270768167","display_name":null,"funder_award_id":"61822202","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5522573248","display_name":null,"funder_award_id":"61772009","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7160647132","display_name":null,"funder_award_id":"61902070","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7244731676","display_name":null,"funder_award_id":"U1736112","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":57,"referenced_works":["https://openalex.org/W18899444","https://openalex.org/W123374098","https://openalex.org/W165895243","https://openalex.org/W1496030291","https://openalex.org/W1498316612","https://openalex.org/W1510795740","https://openalex.org/W1513551553","https://openalex.org/W1558439324","https://openalex.org/W1584348354","https://openalex.org/W1588309063","https://openalex.org/W1759101531","https://openalex.org/W1837982953","https://openalex.org/W1904620209","https://openalex.org/W1982946433","https://openalex.org/W1990413350","https://openalex.org/W1998436947","https://openalex.org/W2009497894","https://openalex.org/W2010109924","https://openalex.org/W2071178901","https://openalex.org/W2086298846","https://openalex.org/W2101709669","https://openalex.org/W2108072891","https://openalex.org/W2119137917","https://openalex.org/W2125974812","https://openalex.org/W2138001464","https://openalex.org/W2147419555","https://openalex.org/W2207495662","https://openalex.org/W2295756227","https://openalex.org/W2314118214","https://openalex.org/W2343895449","https://openalex.org/W2517605205","https://openalex.org/W2518462489","https://openalex.org/W2519246174","https://openalex.org/W2520342609","https://openalex.org/W2548207196","https://openalex.org/W2570611729","https://openalex.org/W2593472119","https://openalex.org/W2606537796","https://openalex.org/W2621249842","https://openalex.org/W2735595011","https://openalex.org/W2745062479","https://openalex.org/W2782900518","https://openalex.org/W2783590514","https://openalex.org/W2789659149","https://openalex.org/W2803255421","https://openalex.org/W2888094362","https://openalex.org/W2890595448","https://openalex.org/W2897017942","https://openalex.org/W2898455119","https://openalex.org/W2899511011","https://openalex.org/W2911261396","https://openalex.org/W2913048961","https://openalex.org/W2948230089","https://openalex.org/W2961017266","https://openalex.org/W2970213526","https://openalex.org/W2977014769","https://openalex.org/W2991120477"],"related_works":["https://openalex.org/W2131846073","https://openalex.org/W4372269058","https://openalex.org/W114534093","https://openalex.org/W2383331906","https://openalex.org/W361351722","https://openalex.org/W4223919663","https://openalex.org/W1513098086","https://openalex.org/W2743419166","https://openalex.org/W2963348623","https://openalex.org/W2921225894"],"abstract_inverted_index":{"The":[0],"pervasive,":[1],"ubiquitous,":[2],"and":[3,20,52,90,156],"heterogeneous":[4],"properties":[5],"of":[6,73,112,135],"IoT":[7,10,27,29,75,102],"make":[8],"securing":[9],"systems":[11,165],"a":[12,25,62,83,126,141],"very":[13],"challenging":[14],"task.":[15],"More":[16],"so":[17],"when":[18],"access":[19,51,71,92,108],"storage":[21],"are":[22,166],"performed":[23],"through":[24],"cloud-based":[26],"system.":[28],"data":[30,39,76],"stored":[31],"on":[32,77,116,119],"cloud":[33,100],"should":[34],"be":[35],"encrypted":[36,55,74],"to":[37,45,50,87,98,150],"ensure":[38],"privacy.":[40],"It":[41],"is":[42,80,95],"also":[43],"crucial":[44],"allow":[46],"only":[47],"authorized":[48],"entities":[49],"decrypt":[53],"the":[54,120,133,136,152,163],"data.":[56],"In":[57],"this":[58],"article,":[59],"we":[60,124],"propose":[61],"ciphertext-policy":[63,127],"attribute-based":[64],"encryption":[65],"(CP-ABE)":[66],"scheme":[67,145],"that":[68],"enables":[69],"fine-grained":[70,91],"control":[72,109],"cloud.":[78],"CP-ABE":[79,129,144],"regarded":[81],"as":[82],"highly":[84],"promising":[85],"approach":[86],"provide":[88],"flexible":[89],"control,":[93],"which":[94,131],"quite":[96],"suited":[97],"secure":[99],"based":[101,115],"systems.":[103],"We":[104,138],"first":[105],"present":[106],"an":[107],"system":[110,122],"model":[111],"CloudIoT":[113],"platform":[114],"ABE.":[117],"Based":[118],"presented":[121],"model,":[123],"construct":[125,140],"hiding":[128],"scheme,":[130],"guarantees":[132],"privacy":[134],"users.":[137],"further":[139],"white-box":[142],"traceable":[143],"with":[146],"accountability":[147],"in":[148],"order":[149],"address":[151],"user":[153],"key":[154,159],"abuse":[155],"authorization":[157],"center":[158],"abuse.":[160],"Experiment":[161],"illustrates":[162],"proposed":[164],"efficient.":[167]},"counts_by_year":[{"year":2026,"cited_by_count":8},{"year":2025,"cited_by_count":51},{"year":2024,"cited_by_count":67},{"year":2023,"cited_by_count":41},{"year":2022,"cited_by_count":31},{"year":2021,"cited_by_count":33},{"year":2020,"cited_by_count":17}],"updated_date":"2026-05-05T08:41:31.759640","created_date":"2025-10-10T00:00:00"}
