{"id":"https://openalex.org/W3045040944","doi":"https://doi.org/10.1109/tdsc.2020.3011525","title":"Dual Access Control for Cloud-Based Data Storage and Sharing","display_name":"Dual Access Control for Cloud-Based Data Storage and Sharing","publication_year":2020,"publication_date":"2020-01-01","ids":{"openalex":"https://openalex.org/W3045040944","doi":"https://doi.org/10.1109/tdsc.2020.3011525","mag":"3045040944"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2020.3011525","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2020.3011525","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5081596329","display_name":"Jianting Ning","orcid":"https://orcid.org/0000-0001-7165-398X"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]},{"id":"https://openalex.org/I79891267","display_name":"Singapore Management University","ror":"https://ror.org/050qmg959","country_code":"SG","type":"education","lineage":["https://openalex.org/I79891267"]}],"countries":["CN","SG"],"is_corresponding":true,"raw_author_name":"Jianting Ning","raw_affiliation_strings":["Fujian Provincial Key Laboratory of Network Security and Cryptology, College of Mathematics and Informatics, Fujian Normal University, Fujian, China","School of Information Systems, Singapore Management University, Singapore"],"affiliations":[{"raw_affiliation_string":"Fujian Provincial Key Laboratory of Network Security and Cryptology, College of Mathematics and Informatics, Fujian Normal University, Fujian, China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"School of Information Systems, Singapore Management University, Singapore","institution_ids":["https://openalex.org/I79891267"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031931063","display_name":"Xinyi Huang","orcid":"https://orcid.org/0000-0003-0070-1707"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xinyi Huang","raw_affiliation_strings":["Fujian Provincial Key Laboratory of Network Security and Cryptology, College of Mathematics and Informatics, Fujian Normal University, Fujian, China"],"affiliations":[{"raw_affiliation_string":"Fujian Provincial Key Laboratory of Network Security and Cryptology, College of Mathematics and Informatics, Fujian Normal University, Fujian, China","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054741725","display_name":"Willy Susilo","orcid":"https://orcid.org/0000-0002-1562-5105"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Willy Susilo","raw_affiliation_strings":["Institute of Cybersecurity and Cryptology, University of Wollongong, Wollongong, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"Institute of Cybersecurity and Cryptology, University of Wollongong, Wollongong, NSW, Australia","institution_ids":["https://openalex.org/I204824540"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001485404","display_name":"Kaitai Liang","orcid":"https://orcid.org/0000-0003-0262-7678"},"institutions":[{"id":"https://openalex.org/I98358874","display_name":"Delft University of Technology","ror":"https://ror.org/02e2c7k09","country_code":"NL","type":"education","lineage":["https://openalex.org/I98358874"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Kaitai Liang","raw_affiliation_strings":["Faculty of Electrical Engineering, Mathematics and Computer Science, Delft University of Technology, CD Delft, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Faculty of Electrical Engineering, Mathematics and Computer Science, Delft University of Technology, CD Delft, The Netherlands","institution_ids":["https://openalex.org/I98358874"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058120371","display_name":"Ximeng Liu","orcid":"https://orcid.org/0000-0002-4238-3295"},"institutions":[{"id":"https://openalex.org/I80947539","display_name":"Fuzhou University","ror":"https://ror.org/011xvna82","country_code":"CN","type":"education","lineage":["https://openalex.org/I80947539"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ximeng Liu","raw_affiliation_strings":["College of Mathematics and Computer Science, Fuzhou University, Fuzhou, Fujian, China"],"affiliations":[{"raw_affiliation_string":"College of Mathematics and Computer Science, Fuzhou University, Fuzhou, Fujian, China","institution_ids":["https://openalex.org/I80947539"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100629240","display_name":"Yinghui Zhang","orcid":"https://orcid.org/0000-0002-5764-3272"},"institutions":[{"id":"https://openalex.org/I4210136859","display_name":"Xi\u2019an University of Posts and Telecommunications","ror":"https://ror.org/04jn0td46","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210136859"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yinghui Zhang","raw_affiliation_strings":["School of Cyberspace Security, Xi'an University of Posts and Telecommunications, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Security, Xi'an University of Posts and Telecommunications, Xi'an, China","institution_ids":["https://openalex.org/I4210136859"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5081596329"],"corresponding_institution_ids":["https://openalex.org/I111753288","https://openalex.org/I79891267"],"apc_list":null,"apc_paid":null,"fwci":5.0062,"has_fulltext":false,"cited_by_count":70,"citation_normalized_percentile":{"value":0.96119487,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"1"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7767388820648193},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.6392350196838379},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6374126076698303},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6048437356948853},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5990451574325562},{"id":"https://openalex.org/keywords/cloud-storage","display_name":"Cloud storage","score":0.5812917351722717},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.43872037529945374},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.42402949929237366},{"id":"https://openalex.org/keywords/data-sharing","display_name":"Data sharing","score":0.42390885949134827},{"id":"https://openalex.org/keywords/service-provider","display_name":"Service provider","score":0.42189860343933105},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.4200728237628937},{"id":"https://openalex.org/keywords/data-access","display_name":"Data access","score":0.41171523928642273},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4085521101951599},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.39848852157592773},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.35471856594085693},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2596368193626404},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.16411739587783813},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.13048338890075684}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7767388820648193},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.6392350196838379},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6374126076698303},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6048437356948853},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5990451574325562},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.5812917351722717},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.43872037529945374},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.42402949929237366},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.42390885949134827},{"id":"https://openalex.org/C116537","wikidata":"https://www.wikidata.org/wiki/Q2169973","display_name":"Service provider","level":3,"score":0.42189860343933105},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.4200728237628937},{"id":"https://openalex.org/C47487241","wikidata":"https://www.wikidata.org/wiki/Q5227230","display_name":"Data access","level":2,"score":0.41171523928642273},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4085521101951599},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.39848852157592773},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.35471856594085693},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2596368193626404},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.16411739587783813},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.13048338890075684},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C136264566","wikidata":"https://www.wikidata.org/wiki/Q159810","display_name":"Economy","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1109/tdsc.2020.3011525","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2020.3011525","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},{"id":"pmh:oai:ink.library.smu.edu.sg:sis_research-8244","is_oa":false,"landing_page_url":"https://ink.library.smu.edu.sg/sis_research/7241","pdf_url":null,"source":{"id":"https://openalex.org/S4377196871","display_name":"Institutional Knowledge (InK) - Institutional Knowledge at Singapore Management University (Singapore Management University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I79891267","host_organization_name":"Singapore Management University","host_organization_lineage":["https://openalex.org/I79891267"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"https://doi.org/10.1109/TDSC.2020.3011525","raw_type":"Journal Article"},{"id":"pmh:oai:ro.uow.edu.au:test2021-10533","is_oa":false,"landing_page_url":"https://ro.uow.edu.au/test2021/4986","pdf_url":null,"source":{"id":"https://openalex.org/S4306400510","display_name":"Research Online (University of Wollongong)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I204824540","host_organization_name":"University of Wollongong","host_organization_lineage":["https://openalex.org/I204824540"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Test Series for Scopus Harvesting 2021","raw_type":"text"},{"id":"pmh:oai:tudelft.nl:uuid:a9df5797-1aa5-49b5-81b9-970b0887212b","is_oa":false,"landing_page_url":"http://resolver.tudelft.nl/uuid:a9df5797-1aa5-49b5-81b9-970b0887212b","pdf_url":null,"source":{"id":"https://openalex.org/S4306400906","display_name":"Research Repository (Delft University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I98358874","host_organization_name":"Delft University of Technology","host_organization_lineage":["https://openalex.org/I98358874"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"journal article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4699999988079071,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[{"id":"https://openalex.org/G1121271761","display_name":null,"funder_award_id":"Program","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2180518259","display_name":null,"funder_award_id":"2020ZDLGY08-04","funder_id":"https://openalex.org/F4320336350","funder_display_name":"Key Research and Development Projects of Shaanxi Province"},{"id":"https://openalex.org/G3041179666","display_name":null,"funder_award_id":"61872089","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3085993365","display_name":null,"funder_award_id":"(Grant No.","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3481745233","display_name":null,"funder_award_id":"2020KJXX-052","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3564481383","display_name":null,"funder_award_id":"2019KW-053","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G391238517","display_name":null,"funder_award_id":", and","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4755198475","display_name":null,"funder_award_id":"NRF2018NCR-NSOE004-0001","funder_id":"https://openalex.org/F4320320671","funder_display_name":"National Research Foundation"},{"id":"https://openalex.org/G5043465742","display_name":null,"funder_award_id":"61972094","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5090146069","display_name":null,"funder_award_id":"2020ZDLGY08-04","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5137579441","display_name":null,"funder_award_id":"NRF2018NCR-NSOE004-0001","funder_id":"https://openalex.org/F4320320709","funder_display_name":"National Research Foundation Singapore"},{"id":"https://openalex.org/G5270768167","display_name":null,"funder_award_id":"61822202","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7160647132","display_name":null,"funder_award_id":"61902070","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7608752429","display_name":null,"funder_award_id":"Talent","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7685140319","display_name":null,"funder_award_id":"2020ZDLGY","funder_id":"https://openalex.org/F4320336350","funder_display_name":"Key Research and Development Projects of Shaanxi Province"},{"id":"https://openalex.org/G7726157001","display_name":null,"funder_award_id":"Grant No.","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8756898953","display_name":null,"funder_award_id":"1972094","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320320671","display_name":"National Research Foundation","ror":"https://ror.org/05s0g1g46"},{"id":"https://openalex.org/F4320320709","display_name":"National Research Foundation Singapore","ror":"https://ror.org/03cpyc314"},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321048","display_name":"AXA Research Fund","ror":"https://ror.org/02zxqxw53"},{"id":"https://openalex.org/F4320336350","display_name":"Key Research and Development Projects of Shaanxi Province","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W123374098","https://openalex.org/W1498316612","https://openalex.org/W1510795740","https://openalex.org/W1548107066","https://openalex.org/W1585524716","https://openalex.org/W1607264302","https://openalex.org/W1996182770","https://openalex.org/W1998436947","https://openalex.org/W2008251713","https://openalex.org/W2012185189","https://openalex.org/W2036329595","https://openalex.org/W2078590992","https://openalex.org/W2095867842","https://openalex.org/W2108072891","https://openalex.org/W2119137917","https://openalex.org/W2138001464","https://openalex.org/W2150620897","https://openalex.org/W2154350082","https://openalex.org/W2295756227","https://openalex.org/W2314118214","https://openalex.org/W2316967260","https://openalex.org/W2520342609","https://openalex.org/W2612997195","https://openalex.org/W2621249842","https://openalex.org/W2734245281","https://openalex.org/W2742523794","https://openalex.org/W2745062479","https://openalex.org/W2765706244","https://openalex.org/W2790515622","https://openalex.org/W2914281983","https://openalex.org/W2955476130","https://openalex.org/W3128663643","https://openalex.org/W6634971019","https://openalex.org/W6712237015","https://openalex.org/W6718865826","https://openalex.org/W6729667700","https://openalex.org/W6790131382"],"related_works":["https://openalex.org/W2414507368","https://openalex.org/W2166798126","https://openalex.org/W2794162233","https://openalex.org/W2350964805","https://openalex.org/W3026478233","https://openalex.org/W2892967114","https://openalex.org/W2421443948","https://openalex.org/W2798863465","https://openalex.org/W1590351499","https://openalex.org/W2724546762"],"abstract_inverted_index":{"Cloud-based":[0],"data":[1,44,51,60,74,85,146],"storage":[2,45],"service":[3,37,54],"has":[4],"drawn":[5],"increasing":[6],"interests":[7],"from":[8,61,114],"both":[9,145],"academic":[10],"and":[11,21,46,53,148,155,179],"industry":[12],"in":[13,29,129,135,164],"the":[14,64,81,122,130,136,183],"recent":[15],"years":[16],"due":[17],"to":[18,39,49,97,111],"its":[19],"efficient":[20],"low":[22],"cost":[23],"management.":[24,86],"Since":[25],"it":[26,33],"provides":[27],"services":[28],"an":[30,88],"open":[31],"network,":[32],"is":[34,69,171],"urgent":[35],"for":[36,172,182],"providers":[38],"make":[40],"use":[41],"of":[42,84,104,132,153,169],"secure":[43],"sharing":[47],"mechanism":[48,143],"ensure":[50],"confidentiality":[52],"user":[55],"privacy.":[56],"To":[57],"protect":[58],"sensitive":[59],"being":[62],"compromised,":[63],"most":[65],"widely":[66],"used":[67],"method":[68],"encryption.":[70],"However,":[71],"simply":[72],"encrypting":[73],"(e.g.,":[75],"via":[76],"AES)":[77],"cannot":[78,108],"fully":[79],"address":[80],"practical":[82],"need":[83],"Besides,":[87],"effective":[89],"access":[90,126,147,159],"control":[91,142,160],"over":[92,144],"download":[93,149],"request":[94,150],"also":[95,186],"needs":[96],"be":[98,109],"considered":[99],"so":[100],"that":[101,138],"Economic":[102],"Denial":[103],"Sustainability":[105],"(EDoS)":[106],"attacks":[107],"launched":[110],"hinder":[112],"users":[113],"enjoying":[115],"service.":[116],"In":[117],"this":[118,165],"article,":[119,166],"we":[120,139],"consider":[121],"<italic":[123],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[124],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">dual":[125],"control</i>":[127],",":[128],"context":[131],"cloud-based":[133],"storage,":[134],"sense":[137],"design":[140],"a":[141,173],"without":[151],"loss":[152],"security":[154,178],"efficiency.":[156],"Two":[157],"dual":[158],"systems":[161,184],"are":[162,185],"designed":[163,175],"where":[167],"each":[168],"them":[170],"distinct":[174],"setting.":[176],"The":[177],"experimental":[180],"analysis":[181],"presented.":[187]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":12},{"year":2024,"cited_by_count":17},{"year":2023,"cited_by_count":13},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":14},{"year":2020,"cited_by_count":3}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
