{"id":"https://openalex.org/W2058120900","doi":"https://doi.org/10.1109/tce.2014.6937320","title":"SC-DVR: a secure cloud computing based framework for DVR service","display_name":"SC-DVR: a secure cloud computing based framework for DVR service","publication_year":2014,"publication_date":"2014-08-01","ids":{"openalex":"https://openalex.org/W2058120900","doi":"https://doi.org/10.1109/tce.2014.6937320","mag":"2058120900"},"language":"en","primary_location":{"id":"doi:10.1109/tce.2014.6937320","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tce.2014.6937320","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079998325","display_name":"Junggab Son","orcid":"https://orcid.org/0000-0002-6206-083X"},"institutions":[{"id":"https://openalex.org/I4575257","display_name":"Hanyang University","ror":"https://ror.org/046865y68","country_code":"KR","type":"education","lineage":["https://openalex.org/I4575257"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Junggab Son","raw_affiliation_strings":["Department of Computer Science and Engineering, Hanyang University, Ansan, Korea","Department of Computer Science and Engineering, Hanyang University, Ansan, Korea#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Hanyang University, Ansan, Korea","institution_ids":["https://openalex.org/I4575257"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, Hanyang University, Ansan, Korea#TAB#","institution_ids":["https://openalex.org/I4575257"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090705977","display_name":"Rasheed Hussain","orcid":"https://orcid.org/0000-0002-3771-7537"},"institutions":[{"id":"https://openalex.org/I4575257","display_name":"Hanyang University","ror":"https://ror.org/046865y68","country_code":"KR","type":"education","lineage":["https://openalex.org/I4575257"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Rasheed Hussain","raw_affiliation_strings":["Department of Computer Science and Engineering, Hanyang University, Ansan, Korea","Department of Computer Science and Engineering, Hanyang University, Ansan, Korea#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Hanyang University, Ansan, Korea","institution_ids":["https://openalex.org/I4575257"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, Hanyang University, Ansan, Korea#TAB#","institution_ids":["https://openalex.org/I4575257"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012273541","display_name":"Hunmin Kim","orcid":"https://orcid.org/0000-0001-6689-3495"},"institutions":[{"id":"https://openalex.org/I4575257","display_name":"Hanyang University","ror":"https://ror.org/046865y68","country_code":"KR","type":"education","lineage":["https://openalex.org/I4575257"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Hunmin Kim","raw_affiliation_strings":["Department of Computer Science and Engineering, Hanyang University, Ansan, Korea","Department of Computer Science and Engineering, Hanyang University, Ansan, Korea#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Hanyang University, Ansan, Korea","institution_ids":["https://openalex.org/I4575257"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, Hanyang University, Ansan, Korea#TAB#","institution_ids":["https://openalex.org/I4575257"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102887306","display_name":"Heekuck Oh","orcid":"https://orcid.org/0000-0002-2989-8737"},"institutions":[{"id":"https://openalex.org/I4575257","display_name":"Hanyang University","ror":"https://ror.org/046865y68","country_code":"KR","type":"education","lineage":["https://openalex.org/I4575257"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Heekuck Oh","raw_affiliation_strings":["Department of Computer Science and Engineering, Hanyang University, Ansan, Korea","Department of Computer Science and Engineering, Hanyang University, Ansan, Korea#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Hanyang University, Ansan, Korea","institution_ids":["https://openalex.org/I4575257"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, Hanyang University, Ansan, Korea#TAB#","institution_ids":["https://openalex.org/I4575257"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5079998325"],"corresponding_institution_ids":["https://openalex.org/I4575257"],"apc_list":null,"apc_paid":null,"fwci":0.9882,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.80544272,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":"60","issue":"3","first_page":"368","last_page":"374"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.8506582975387573},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8321548700332642},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6263253092765808},{"id":"https://openalex.org/keywords/virtualization","display_name":"Virtualization","score":0.5170881748199463},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.46467500925064087},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.44920599460601807},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4254322648048401},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3386666178703308},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.32093188166618347}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.8506582975387573},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8321548700332642},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6263253092765808},{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.5170881748199463},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.46467500925064087},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.44920599460601807},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4254322648048401},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3386666178703308},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.32093188166618347},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1109/tce.2014.6937320","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tce.2014.6937320","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"},{"id":"pmh:oai:repository.hanyang.ac.kr:20.500.11754/92046","is_oa":false,"landing_page_url":"http://repository.hanyang.ac.kr/handle/20.500.11754/92046","pdf_url":null,"source":{"id":"https://openalex.org/S4306401328","display_name":"The Royal Society of Chemistry\u2019s Journals, Books and Databases (The Royal Society of Chemistry)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I2751430930","host_organization_name":"Royal Society of Chemistry","host_organization_lineage":["https://openalex.org/I2751430930"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Article"},{"id":"pmh:oai:research-information.bris.ac.uk:openaire_cris_publications/721cf12d-fbe6-49ae-ae76-6d4a0829c8c7","is_oa":false,"landing_page_url":"https://research-information.bris.ac.uk/en/publications/721cf12d-fbe6-49ae-ae76-6d4a0829c8c7","pdf_url":null,"source":{"id":"https://openalex.org/S7407055359","display_name":"Explore Bristol Research","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Son, J, Hussain, R, Kim, H & Oh, H 2014, 'SC-DVR : A secure cloud computing based framework for DVR service', IEEE Transactions on Consumer Electronics, vol. 60, no. 3, 6937320, pp. 368-374. https://doi.org/10.1109/TCE.2014.6937320","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:research-information.bris.ac.uk:publications/721cf12d-fbe6-49ae-ae76-6d4a0829c8c7","is_oa":false,"landing_page_url":"https://hdl.handle.net/1983/721cf12d-fbe6-49ae-ae76-6d4a0829c8c7","pdf_url":null,"source":{"id":"https://openalex.org/S7407055359","display_name":"Explore Bristol Research","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Son, J, Hussain, R, Kim, H & Oh, H 2014, 'SC-DVR : A secure cloud computing based framework for DVR service', IEEE Transactions on Consumer Electronics, vol. 60, no. 3, 6937320, pp. 368-374. https://doi.org/10.1109/TCE.2014.6937320","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.6600000262260437}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W1978751671","https://openalex.org/W1984982980","https://openalex.org/W1985204199","https://openalex.org/W1988322479","https://openalex.org/W1996901332","https://openalex.org/W1999314592","https://openalex.org/W2017203676","https://openalex.org/W2028666874","https://openalex.org/W2031533839","https://openalex.org/W2031806437","https://openalex.org/W2055627578","https://openalex.org/W2095412053","https://openalex.org/W2124391019","https://openalex.org/W2134883636","https://openalex.org/W2140360362","https://openalex.org/W2141301638","https://openalex.org/W2143554786","https://openalex.org/W2146343589","https://openalex.org/W2168084064","https://openalex.org/W2170961388","https://openalex.org/W6649496535","https://openalex.org/W6658514009","https://openalex.org/W6685227140"],"related_works":["https://openalex.org/W1973516247","https://openalex.org/W2271326670","https://openalex.org/W2552925293","https://openalex.org/W1478590381","https://openalex.org/W3074768883","https://openalex.org/W1996880143","https://openalex.org/W2384916795","https://openalex.org/W1039201998","https://openalex.org/W2779209348","https://openalex.org/W2594055038"],"abstract_inverted_index":{"Typical":[0],"digital":[1],"video":[2],"recorders":[3],"(DVRs)":[4],"have":[5],"limited":[6],"storage":[7],"capacity,":[8],"and":[9,34,70,80,198],"it":[10,36,152],"is":[11,77,93,153,163,178],"not":[12],"easy":[13],"for":[14,105,145,155],"them":[15],"to":[16,27,59,83,120,158,191,202],"share":[17],"content":[18,33,67,74,85],"among":[19,37],"user":[20,96],"devices.":[21],"However,":[22],"if":[23,89],"DVRs":[24],"are":[25,57],"extended":[26],"the":[28,45,61,66,95,164,168,175],"cloud-based":[29],"infrastructure,":[30],"conversion":[31],"of":[32,167],"sharing":[35],"multiple":[38],"devices":[39],"can":[40,102],"be":[41,103],"made":[42],"possible":[43,179],"through":[44,125,180],"cloud's":[46],"computing":[47,53,62,99,177,190],"power.":[48],"To":[49],"provide":[50,122],"secure":[51,112,147,172],"cloud":[52,113,126,176,189,201],"service,":[54],"appropriate":[55],"measures":[56],"necessary":[58],"protect":[60,84],"processes":[63],"performed":[64],"on":[65,117],"from":[68,86,195],"inside":[69,156,196],"outside":[71],"attackers.":[72],"A":[73],"encryption":[75,91],"scheme":[76,92,130,184],"a":[78,111,199],"simple":[79],"effective":[81],"way":[82],"attackers;":[87],"however,":[88],"an":[90,132,186],"used,":[94],"cannot":[97],"use":[98],"resources":[100],"that":[101],"used":[104],"media":[106,193],"computation.":[107],"This":[108],"paper":[109],"proposes":[110],"DVR":[114],"framework":[115],"based":[116,188],"personal":[118,148],"virtualization":[119],"securely":[121],"various":[123],"functions":[124],"resources.":[127],"The":[128,182],"proposed":[129,183],"uses":[131,185],"input/output":[133],"management":[134],"unit":[135],"(IOMMU),":[136],"which":[137,160],"serves":[138],"as":[139],"direct":[140],"memory":[141,161,166],"access":[142],"(DMA)":[143],"remapping":[144],"constructing":[146],"virtualization.":[149],"Using":[150],"IOMMU,":[151],"difficult":[154],"attackers":[157],"know":[159],"area":[162],"actual":[165],"target":[169],"user.":[170],"Therefore,":[171],"computation":[173,194],"in":[174],"IOMMU.":[181],"IOMMU":[187],"hide":[192],"attacker,":[197],"public":[200],"increase":[203],"efficiency.":[204]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2022,"cited_by_count":2},{"year":2018,"cited_by_count":1},{"year":2016,"cited_by_count":4}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
