{"id":"https://openalex.org/W3089626165","doi":"https://doi.org/10.1109/tdsc.2020.3027579","title":"Enabling Efficient, Secure and Privacy-Preserving Mobile Cloud Storage","display_name":"Enabling Efficient, Secure and Privacy-Preserving Mobile Cloud Storage","publication_year":2020,"publication_date":"2020-09-29","ids":{"openalex":"https://openalex.org/W3089626165","doi":"https://doi.org/10.1109/tdsc.2020.3027579","mag":"3089626165"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2020.3027579","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2020.3027579","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5000372510","display_name":"Jia-Nan Liu","orcid":"https://orcid.org/0000-0003-3140-2320"},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jia-Nan Liu","raw_affiliation_strings":["College of Cyber Security, National Joint Engineering Research Center of Network Security Detection and Protection Technology, Guangzhou, Guangdong, China","Guangdong Key Laboratory of Data Security and Privacy Preserving, Jinan University, Guangzhou, Guangdong, China"],"raw_orcid":"https://orcid.org/0000-0003-3140-2320","affiliations":[{"raw_affiliation_string":"College of Cyber Security, National Joint Engineering Research Center of Network Security Detection and Protection Technology, Guangzhou, Guangdong, China","institution_ids":[]},{"raw_affiliation_string":"Guangdong Key Laboratory of Data Security and Privacy Preserving, Jinan University, Guangzhou, Guangdong, China","institution_ids":["https://openalex.org/I159948400"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066189295","display_name":"Xizhao Luo","orcid":"https://orcid.org/0000-0002-4294-1365"},"institutions":[{"id":"https://openalex.org/I3923682","display_name":"Soochow University","ror":"https://ror.org/05t8y2r12","country_code":"CN","type":"education","lineage":["https://openalex.org/I3923682"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xizhao Luo","raw_affiliation_strings":["School of Computer Science and Technology, Soochow University, Suzhou, Jiangsu, China"],"raw_orcid":"https://orcid.org/0000-0002-4294-1365","affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Soochow University, Suzhou, Jiangsu, China","institution_ids":["https://openalex.org/I3923682"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082041657","display_name":"Jian Weng","orcid":null},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jian Weng","raw_affiliation_strings":["College of Cyber Security, National Joint Engineering Research Center of Network Security Detection and Protection Technology, Guangzhou, Guangdong, China","Guangdong Key Laboratory of Data Security and Privacy Preserving, Jinan University, Guangzhou, Guangdong, China"],"raw_orcid":"https://orcid.org/0000-0003-4067-8230","affiliations":[{"raw_affiliation_string":"College of Cyber Security, National Joint Engineering Research Center of Network Security Detection and Protection Technology, Guangzhou, Guangdong, China","institution_ids":[]},{"raw_affiliation_string":"Guangdong Key Laboratory of Data Security and Privacy Preserving, Jinan University, Guangzhou, Guangdong, China","institution_ids":["https://openalex.org/I159948400"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025910280","display_name":"Anjia Yang","orcid":"https://orcid.org/0000-0002-7958-6571"},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Anjia Yang","raw_affiliation_strings":["College of Cyber Security, National Joint Engineering Research Center of Network Security Detection and Protection Technology, Guangzhou, Guangdong, China","Guangdong Key Laboratory of Data Security and Privacy Preserving, Jinan University, Guangzhou, Guangdong, China"],"raw_orcid":"https://orcid.org/0000-0002-7958-6571","affiliations":[{"raw_affiliation_string":"College of Cyber Security, National Joint Engineering Research Center of Network Security Detection and Protection Technology, Guangzhou, Guangdong, China","institution_ids":[]},{"raw_affiliation_string":"Guangdong Key Laboratory of Data Security and Privacy Preserving, Jinan University, Guangzhou, Guangdong, China","institution_ids":["https://openalex.org/I159948400"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049151787","display_name":"Xu An Wang","orcid":"https://orcid.org/0000-0003-2070-4913"},"institutions":[{"id":"https://openalex.org/I4210134428","display_name":"Chinese People's Armed Police Force Engineering University","ror":"https://ror.org/031jzbb03","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210134428"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xu An Wang","raw_affiliation_strings":["Engineering University of Chinese Armed Police Force, Xi&#x2018;an, Shaanxi, China"],"raw_orcid":"https://orcid.org/0000-0003-2070-4913","affiliations":[{"raw_affiliation_string":"Engineering University of Chinese Armed Police Force, Xi&#x2018;an, Shaanxi, China","institution_ids":["https://openalex.org/I4210134428"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100351377","display_name":"Ming Li","orcid":"https://orcid.org/0000-0002-0874-5010"},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ming Li","raw_affiliation_strings":["College of Cyber Security, National Joint Engineering Research Center of Network Security Detection and Protection Technology, Guangzhou, Guangdong, China","Guangdong Key Laboratory of Data Security and Privacy Preserving, Jinan University, Guangzhou, Guangdong, China"],"raw_orcid":"https://orcid.org/0000-0002-0874-5010","affiliations":[{"raw_affiliation_string":"College of Cyber Security, National Joint Engineering Research Center of Network Security Detection and Protection Technology, Guangzhou, Guangdong, China","institution_ids":[]},{"raw_affiliation_string":"Guangdong Key Laboratory of Data Security and Privacy Preserving, Jinan University, Guangzhou, Guangdong, China","institution_ids":["https://openalex.org/I159948400"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5083787204","display_name":"Xiaodong Lin","orcid":"https://orcid.org/0000-0001-8916-6645"},"institutions":[{"id":"https://openalex.org/I79817857","display_name":"University of Guelph","ror":"https://ror.org/01r7awg59","country_code":"CA","type":"education","lineage":["https://openalex.org/I79817857"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Xiaodong Lin","raw_affiliation_strings":["School of Computer Science, University of Guelph, Guelph, ON, Canada"],"raw_orcid":"https://orcid.org/0000-0001-8916-6645","affiliations":[{"raw_affiliation_string":"School of Computer Science, University of Guelph, Guelph, ON, Canada","institution_ids":["https://openalex.org/I79817857"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5000372510"],"corresponding_institution_ids":["https://openalex.org/I159948400"],"apc_list":null,"apc_paid":null,"fwci":1.6307,"has_fulltext":false,"cited_by_count":23,"citation_normalized_percentile":{"value":0.8747301,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"19","issue":"3","first_page":"1518","last_page":"1531"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9919999837875366,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8515002131462097},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.8291735649108887},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7842166423797607},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7198973894119263},{"id":"https://openalex.org/keywords/cloud-storage","display_name":"Cloud storage","score":0.6174491047859192},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5915764570236206},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5424694418907166},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.4993431568145752},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4567292034626007},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.4315909743309021},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3578241169452667},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3391929268836975},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.15750426054000854}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8515002131462097},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.8291735649108887},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7842166423797607},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7198973894119263},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.6174491047859192},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5915764570236206},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5424694418907166},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.4993431568145752},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4567292034626007},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.4315909743309021},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3578241169452667},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3391929268836975},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.15750426054000854},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2020.3027579","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2020.3027579","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1055558454","display_name":null,"funder_award_id":"61877029","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1427926582","display_name":null,"funder_award_id":"U1736203","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4940029293","display_name":null,"funder_award_id":"62072215","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G499067518","display_name":null,"funder_award_id":"61802145","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5300435278","display_name":null,"funder_award_id":"61872153","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5797141846","display_name":null,"funder_award_id":"61732021","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5801589591","display_name":null,"funder_award_id":"61972454","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6220089879","display_name":null,"funder_award_id":"61825203","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6989210334","display_name":null,"funder_award_id":"61702222","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320334593","display_name":"Natural Sciences and Engineering Research Council of Canada","ror":"https://ror.org/01h531d29"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":46,"referenced_works":["https://openalex.org/W44164607","https://openalex.org/W1494049356","https://openalex.org/W1545698365","https://openalex.org/W1565007622","https://openalex.org/W1782876448","https://openalex.org/W1794210664","https://openalex.org/W1988374166","https://openalex.org/W1993131747","https://openalex.org/W2014465787","https://openalex.org/W2016443801","https://openalex.org/W2051576234","https://openalex.org/W2052971399","https://openalex.org/W2096379058","https://openalex.org/W2111446139","https://openalex.org/W2114579918","https://openalex.org/W2120202298","https://openalex.org/W2120802076","https://openalex.org/W2122507142","https://openalex.org/W2139829638","https://openalex.org/W2155720185","https://openalex.org/W2167394920","https://openalex.org/W2170993700","https://openalex.org/W2259030728","https://openalex.org/W2293128137","https://openalex.org/W2294070790","https://openalex.org/W2295522738","https://openalex.org/W2401589979","https://openalex.org/W2481158741","https://openalex.org/W2510843581","https://openalex.org/W2624859524","https://openalex.org/W2739395436","https://openalex.org/W2762487167","https://openalex.org/W2765962063","https://openalex.org/W2794801659","https://openalex.org/W2809795430","https://openalex.org/W2809996417","https://openalex.org/W2945387244","https://openalex.org/W2947435413","https://openalex.org/W3029492007","https://openalex.org/W3105582513","https://openalex.org/W6637411694","https://openalex.org/W6638133902","https://openalex.org/W6713078379","https://openalex.org/W6713547331","https://openalex.org/W6750079537","https://openalex.org/W6778333306"],"related_works":["https://openalex.org/W2355730523","https://openalex.org/W152021879","https://openalex.org/W2323391421","https://openalex.org/W2072918937","https://openalex.org/W2365629437","https://openalex.org/W2023935927","https://openalex.org/W2348330439","https://openalex.org/W2350372928","https://openalex.org/W2377292126","https://openalex.org/W2128900334"],"abstract_inverted_index":{"Mobile":[0],"cloud":[1,8,22,55,83,186],"storage":[2,9,23,56,178],"(MCS)":[3],"provides":[4],"clients":[5],"with":[6,66,87,110,180],"convenient":[7],"service.":[10],"In":[11],"this":[12],"article,":[13],"we":[14,38],"propose":[15,39],"an":[16,40,77],"efficient,":[17],"secure":[18],"and":[19,30,43,70,84,136,166,185],"privacy-preserving":[20],"mobile":[21,54],"scheme,":[24],"which":[25,97,140],"protects":[26],"the":[27,34,48,52,72,82,100,106,151,181],"data":[28,79,122],"confidentiality":[29],"privacy":[31],"simultaneously,":[32],"especially":[33],"access":[35],"pattern.":[36],"Specifically,":[37],"oblivious":[41,177],"selection":[42],"update":[44,85],"(OSU)":[45],"protocol":[46],"as":[47,103,105,120],"underlying":[49],"primitive":[50],"of":[51,132,183],"proposed":[53],"scheme.":[57],"OSU":[58],"is":[59,172],"based":[60],"on":[61],"onion":[62],"additively":[63,133],"homomorphic":[64,134],"encryption":[65,68],"constant":[67,137],"layers":[69],"enables":[71],"client":[73,184],"to":[74,160],"obliviously":[75],"retrieve":[76],"encrypted":[78,95],"item":[80,125],"from":[81],"it":[86,142],"a":[88,93],"fresh":[89],"value":[90],"by":[91,149],"generating":[92],"small":[94],"vector,":[96],"significantly":[98],"reduces":[99],"client\u2019s":[101],"computation":[102,129],"well":[104],"communication":[107,138],"overheads.":[108],"Compared":[109],"previous":[111],"works,":[112],"our":[113,155,170],"presented":[114],"work":[115],"has":[116],"valuable":[117],"properties,":[118],"such":[119],"fine-grained":[121],"structure":[123],"(small":[124],"size),":[126],"lightweight":[127],"client-side":[128],"(a":[130],"few":[131],"operations)":[135],"overhead,":[139],"make":[141],"more":[143,173],"suitable":[144],"for":[145],"MCS":[146],"scenario.":[147],"Moreover,":[148],"employing":[150],"\u201cverification":[152],"chunks\u201d":[153],"method,":[154],"scheme":[156,171],"can":[157],"be":[158],"verifiable":[159],"resist":[161],"malicious":[162],"cloud.":[163],"The":[164],"comparison":[165],"evaluation":[167],"indicate":[168],"that":[169],"efficient":[174],"than":[175],"existing":[176],"solutions":[179],"aspects":[182],"workloads,":[187],"respectively.":[188]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":8},{"year":2022,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
