{"id":"https://openalex.org/W4399373561","doi":"https://doi.org/10.1109/tce.2024.3409885","title":"Toward Security of Consumer Electronic Devices: An Advanced Attribute-Based Encryption Approach for Multimodal Fog Computing","display_name":"Toward Security of Consumer Electronic Devices: An Advanced Attribute-Based Encryption Approach for Multimodal Fog Computing","publication_year":2024,"publication_date":"2024-06-05","ids":{"openalex":"https://openalex.org/W4399373561","doi":"https://doi.org/10.1109/tce.2024.3409885"},"language":"en","primary_location":{"id":"doi:10.1109/tce.2024.3409885","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tce.2024.3409885","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101529024","display_name":"Shruti","orcid":null},"institutions":[{"id":"https://openalex.org/I74319210","display_name":"Chitkara University","ror":"https://ror.org/057d6z539","country_code":"IN","type":"education","lineage":["https://openalex.org/I74319210"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Shruti","raw_affiliation_strings":["Chitkara University Institute of Engineering and Technology, Chitkara University, Rajpura, Punjab, India","Chitkara University Institute of Engineering and Technology, Chitkara University, Rajpura-, Punjab, India"],"affiliations":[{"raw_affiliation_string":"Chitkara University Institute of Engineering and Technology, Chitkara University, Rajpura, Punjab, India","institution_ids":["https://openalex.org/I74319210"]},{"raw_affiliation_string":"Chitkara University Institute of Engineering and Technology, Chitkara University, Rajpura-, Punjab, India","institution_ids":["https://openalex.org/I74319210"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5004251248","display_name":"Shalli Rani","orcid":"https://orcid.org/0000-0002-8474-9435"},"institutions":[{"id":"https://openalex.org/I74319210","display_name":"Chitkara University","ror":"https://ror.org/057d6z539","country_code":"IN","type":"education","lineage":["https://openalex.org/I74319210"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Shalli Rani","raw_affiliation_strings":["Chitkara University Institute of Engineering and Technology, Chitkara University, Rajpura, Punjab, India","Chitkara University Institute of Engineering and Technology, Chitkara University, Rajpura-, Punjab, India"],"affiliations":[{"raw_affiliation_string":"Chitkara University Institute of Engineering and Technology, Chitkara University, Rajpura, Punjab, India","institution_ids":["https://openalex.org/I74319210"]},{"raw_affiliation_string":"Chitkara University Institute of Engineering and Technology, Chitkara University, Rajpura-, Punjab, India","institution_ids":["https://openalex.org/I74319210"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5101529024"],"corresponding_institution_ids":["https://openalex.org/I74319210"],"apc_list":null,"apc_paid":null,"fwci":2.5383,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.90441483,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":"71","issue":"2","first_page":"5792","last_page":"5800"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9829000234603882,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9829000234603882,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9818999767303467,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9760000109672546,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7562376856803894},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6237787008285522},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.49185919761657715},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4637627601623535},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4158177971839905},{"id":"https://openalex.org/keywords/electronics","display_name":"Electronics","score":0.4101823568344116},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.19836002588272095},{"id":"https://openalex.org/keywords/electrical-engineering","display_name":"Electrical engineering","score":0.14443650841712952}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7562376856803894},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6237787008285522},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.49185919761657715},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4637627601623535},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4158177971839905},{"id":"https://openalex.org/C138331895","wikidata":"https://www.wikidata.org/wiki/Q11650","display_name":"Electronics","level":2,"score":0.4101823568344116},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.19836002588272095},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.14443650841712952}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tce.2024.3409885","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tce.2024.3409885","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W29928525","https://openalex.org/W86792954","https://openalex.org/W1504512712","https://openalex.org/W1974267799","https://openalex.org/W2021256553","https://openalex.org/W2039074122","https://openalex.org/W2044772384","https://openalex.org/W2083533476","https://openalex.org/W2085148027","https://openalex.org/W2245189809","https://openalex.org/W2322315143","https://openalex.org/W2335146458","https://openalex.org/W2515960448","https://openalex.org/W2520793837","https://openalex.org/W2545401907","https://openalex.org/W2614052420","https://openalex.org/W2804197098","https://openalex.org/W2996632881","https://openalex.org/W3029046628","https://openalex.org/W3088642747","https://openalex.org/W3131181397","https://openalex.org/W3171756682","https://openalex.org/W3191301848","https://openalex.org/W4223915263","https://openalex.org/W4225649910","https://openalex.org/W4303981186","https://openalex.org/W4321487879","https://openalex.org/W4366827667","https://openalex.org/W4379382257","https://openalex.org/W4381302977","https://openalex.org/W4385837730","https://openalex.org/W4390152039"],"related_works":["https://openalex.org/W2100090372","https://openalex.org/W4361205702","https://openalex.org/W2385965183","https://openalex.org/W4289281780","https://openalex.org/W2013342653","https://openalex.org/W2901818815","https://openalex.org/W4237598585","https://openalex.org/W2359552542","https://openalex.org/W2060145807","https://openalex.org/W4248806346"],"abstract_inverted_index":{"In":[0,114],"order":[1,115],"to":[2,48,67,83,116,157,206],"overcome":[3],"the":[4,41,62,69,89,102,109,118,134,147,149,169,180,189,195,208,211],"constraints":[5],"of":[6,45,93,97,104,111,120,137,171,188,210],"security":[7,24,92,119,174],"for":[8,22],"consumer":[9],"devices,":[10],"authors":[11],"put":[12],"forward":[13],"a":[14,81,165,199],"specialized":[15],"Attribute-Based":[16],"Encryption":[17],"(ABE)":[18],"framework":[19],"designed":[20],"specifically":[21],"enhancing":[23],"in":[25,31],"fog":[26,138,172],"communications.":[27],"The":[28,95,176],"approach":[29,151],"presented":[30],"this":[32],"study":[33],"incorporates":[34],"attribute-based":[35,50],"fine-grained":[36],"access":[37,63,68,85],"control,":[38],"which":[39],"facilitates":[40],"encryption":[42,184],"and":[43,73,91,143,161,185],"decryption":[44,186],"data":[46,112,121],"according":[47],"specified":[49],"criteria.":[51],"This":[52],"system":[53],"guarantees":[54],"that":[55,179],"just":[56],"authorized":[57],"entities,":[58],"whose":[59],"characteristics":[60,106,136],"satisfy":[61],"policy,":[64],"are":[65,78,127],"able":[66],"data.":[70,94],"Bilinear":[71],"pairings":[72],"Decisional":[74],"Diffie-Hellman":[75],"key":[76,181],"exchange":[77],"used":[79],"as":[80],"means":[82],"enforce":[84],"regulations,":[86],"therefore":[87],"guaranteeing":[88],"confidentiality":[90],"inclusion":[96],"attribute":[98],"revocation":[99],"procedures":[100],"enables":[101],"alteration":[103],"user":[105],"while":[107,129],"preserving":[108],"integrity":[110],"security.":[113],"ensure":[117],"during":[122],"transmission,":[123],"secure":[124],"communication":[125],"protocols":[126],"used,":[128],"also":[130,204],"taking":[131],"into":[132],"account":[133],"dynamic":[135],"situations":[139],"by":[140],"considering":[141],"scalability":[142],"performance":[144],"optimization.":[145],"At":[146],"end,":[148],"proposed":[150,190,212],"has":[152],"undergone":[153],"thorough":[154],"validation":[155],"procedure":[156],"verify":[158],"its":[159],"durability":[160],"effectiveness,":[162],"making":[163],"it":[164],"significant":[166],"asset":[167],"within":[168],"realm":[170],"computing":[173],"solutions.":[175],"results":[177],"shows":[178],"generation":[182],"time,":[183],"time":[187],"scheme":[191],"is":[192,203],"better":[193],"than":[194],"existing":[196],"approaches.":[197],"Moreover,":[198],"mathematical":[200],"comparative":[201],"analysis":[202],"done":[205],"prove":[207],"effectiveness":[209],"approach.":[213]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":1}],"updated_date":"2025-12-23T23:11:35.936235","created_date":"2024-06-06T00:00:00"}
