{"id":"https://openalex.org/W4387682089","doi":"https://doi.org/10.1109/tdsc.2023.3324640","title":"REKS: Role-Based Encrypted Keyword Search With Enhanced Access Control for Outsourced Cloud Data","display_name":"REKS: Role-Based Encrypted Keyword Search With Enhanced Access Control for Outsourced Cloud Data","publication_year":2023,"publication_date":"2023-10-16","ids":{"openalex":"https://openalex.org/W4387682089","doi":"https://doi.org/10.1109/tdsc.2023.3324640"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2023.3324640","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2023.3324640","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://ink.library.smu.edu.sg/sis_research/8268","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102885964","display_name":"Yinbin Miao","orcid":null},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yinbin Miao","raw_affiliation_strings":["School of Cyber Engineering, Xidian University, Xi&#x2019;an, China"],"raw_orcid":"https://orcid.org/0000-0001-5437-3572","affiliations":[{"raw_affiliation_string":"School of Cyber Engineering, Xidian University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102017758","display_name":"Feng Li","orcid":"https://orcid.org/0000-0002-8294-7606"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Feng Li","raw_affiliation_strings":["School of Cyber Engineering, Xidian University, Xi&#x2019;an, China"],"raw_orcid":"https://orcid.org/0000-0002-8294-7606","affiliations":[{"raw_affiliation_string":"School of Cyber Engineering, Xidian University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013643572","display_name":"Xiaohua Jia","orcid":"https://orcid.org/0000-0001-8702-8302"},"institutions":[{"id":"https://openalex.org/I168719708","display_name":"City University of Hong Kong","ror":"https://ror.org/03q8dnn23","country_code":"HK","type":"education","lineage":["https://openalex.org/I168719708"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Xiaohua Jia","raw_affiliation_strings":["Department of Computer Science, City University of Hong Kong, Hong Kong, China"],"raw_orcid":"https://orcid.org/0000-0001-8702-8302","affiliations":[{"raw_affiliation_string":"Department of Computer Science, City University of Hong Kong, Hong Kong, China","institution_ids":["https://openalex.org/I168719708"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090841998","display_name":"Huaxiong Wang","orcid":"https://orcid.org/0000-0002-7669-8922"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Huaxiong Wang","raw_affiliation_strings":["Division of Mathematical Sciences, School of Physical and Mathematical Sciences, Nanyang Technological University, Singapore"],"raw_orcid":"https://orcid.org/0000-0002-7669-8922","affiliations":[{"raw_affiliation_string":"Division of Mathematical Sciences, School of Physical and Mathematical Sciences, Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058120371","display_name":"Ximeng Liu","orcid":"https://orcid.org/0000-0002-4238-3295"},"institutions":[{"id":"https://openalex.org/I80947539","display_name":"Fuzhou University","ror":"https://ror.org/011xvna82","country_code":"CN","type":"education","lineage":["https://openalex.org/I80947539"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ximeng Liu","raw_affiliation_strings":["Key Laboratory of Information Security of Network Systems, College of Mathematics and Computer Science, Fuzhou University, Fuzhou, China"],"raw_orcid":"https://orcid.org/0000-0002-4238-3295","affiliations":[{"raw_affiliation_string":"Key Laboratory of Information Security of Network Systems, College of Mathematics and Computer Science, Fuzhou University, Fuzhou, China","institution_ids":["https://openalex.org/I80947539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001746807","display_name":"Kim\u2010Kwang Raymond Choo","orcid":"https://orcid.org/0000-0001-9208-5336"},"institutions":[{"id":"https://openalex.org/I45438204","display_name":"The University of Texas at San Antonio","ror":"https://ror.org/01kd65564","country_code":"US","type":"education","lineage":["https://openalex.org/I45438204"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kim-Kwang Raymond Choo","raw_affiliation_strings":["Department of Information Systems and Cyber Security, University of Texas at San Antonio, San Antonio, USA","Department of Information Systems and Cyber Security, University of Texas at San Antonio, San Antonio, TX, USA"],"raw_orcid":"https://orcid.org/0000-0001-9208-5336","affiliations":[{"raw_affiliation_string":"Department of Information Systems and Cyber Security, University of Texas at San Antonio, San Antonio, USA","institution_ids":["https://openalex.org/I45438204"]},{"raw_affiliation_string":"Department of Information Systems and Cyber Security, University of Texas at San Antonio, San Antonio, TX, USA","institution_ids":["https://openalex.org/I45438204"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001712801","display_name":"Robert H. Deng","orcid":"https://orcid.org/0000-0003-3491-8146"},"institutions":[{"id":"https://openalex.org/I79891267","display_name":"Singapore Management University","ror":"https://ror.org/050qmg959","country_code":"SG","type":"education","lineage":["https://openalex.org/I79891267"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Robert H. Deng","raw_affiliation_strings":["School of Information Systems, Singapore Management University, Singapore"],"raw_orcid":"https://orcid.org/0000-0003-3491-8146","affiliations":[{"raw_affiliation_string":"School of Information Systems, Singapore Management University, Singapore","institution_ids":["https://openalex.org/I79891267"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5102885964"],"corresponding_institution_ids":["https://openalex.org/I149594827"],"apc_list":null,"apc_paid":null,"fwci":2.3408,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.90833376,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"21","issue":"4","first_page":"3247","last_page":"3261"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.860466718673706},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8313758373260498},{"id":"https://openalex.org/keywords/security-token","display_name":"Security token","score":0.7151398658752441},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.6809039115905762},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6044846773147583},{"id":"https://openalex.org/keywords/outsourcing","display_name":"Outsourcing","score":0.5002479553222656},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3697032332420349},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.36798131465911865},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.35762646794319153},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08879676461219788}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.860466718673706},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8313758373260498},{"id":"https://openalex.org/C48145219","wikidata":"https://www.wikidata.org/wiki/Q1335365","display_name":"Security token","level":2,"score":0.7151398658752441},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.6809039115905762},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6044846773147583},{"id":"https://openalex.org/C46934059","wikidata":"https://www.wikidata.org/wiki/Q61515","display_name":"Outsourcing","level":2,"score":0.5002479553222656},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3697032332420349},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.36798131465911865},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.35762646794319153},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08879676461219788},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tdsc.2023.3324640","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2023.3324640","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},{"id":"pmh:oai:ink.library.smu.edu.sg:sis_research-9271","is_oa":true,"landing_page_url":"https://ink.library.smu.edu.sg/sis_research/8268","pdf_url":null,"source":{"id":"https://openalex.org/S4306401925","display_name":"Singapore Management University Institutional Knowledge (InK) (Singapore Management University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I79891267","host_organization_name":"Singapore Management University","host_organization_lineage":["https://openalex.org/I79891267"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"https://doi.org/10.1109/TDSC.2023.3324640","raw_type":"Journal Article"}],"best_oa_location":{"id":"pmh:oai:ink.library.smu.edu.sg:sis_research-9271","is_oa":true,"landing_page_url":"https://ink.library.smu.edu.sg/sis_research/8268","pdf_url":null,"source":{"id":"https://openalex.org/S4306401925","display_name":"Singapore Management University Institutional Knowledge (InK) (Singapore Management University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I79891267","host_organization_name":"Singapore Management University","host_organization_lineage":["https://openalex.org/I79891267"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"https://doi.org/10.1109/TDSC.2023.3324640","raw_type":"Journal Article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1819083007","display_name":null,"funder_award_id":"62125205","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3313943221","display_name":null,"funder_award_id":"QTZX23091","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"},{"id":"https://openalex.org/G564380355","display_name":null,"funder_award_id":"62072361","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6921191723","display_name":null,"funder_award_id":"2022GY-019","funder_id":"https://openalex.org/F4320336350","funder_display_name":"Key Research and Development Projects of Shaanxi Province"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null},{"id":"https://openalex.org/F4320336350","display_name":"Key Research and Development Projects of Shaanxi Province","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":56,"referenced_works":["https://openalex.org/W38646293","https://openalex.org/W1569795755","https://openalex.org/W1592092778","https://openalex.org/W1601035152","https://openalex.org/W1752398301","https://openalex.org/W1988169383","https://openalex.org/W1998586673","https://openalex.org/W2023222015","https://openalex.org/W2053368181","https://openalex.org/W2080574324","https://openalex.org/W2081633547","https://openalex.org/W2087223825","https://openalex.org/W2108072891","https://openalex.org/W2116556172","https://openalex.org/W2144754501","https://openalex.org/W2161214567","https://openalex.org/W2293178884","https://openalex.org/W2314118214","https://openalex.org/W2400145589","https://openalex.org/W2464131141","https://openalex.org/W2508855287","https://openalex.org/W2605117098","https://openalex.org/W2620198726","https://openalex.org/W2740607986","https://openalex.org/W2759564290","https://openalex.org/W2767989137","https://openalex.org/W2768869846","https://openalex.org/W2774471028","https://openalex.org/W2784296252","https://openalex.org/W2790515622","https://openalex.org/W2797246528","https://openalex.org/W2886749079","https://openalex.org/W2894885909","https://openalex.org/W2908345802","https://openalex.org/W2913048961","https://openalex.org/W2922477787","https://openalex.org/W2941569673","https://openalex.org/W2945857063","https://openalex.org/W2952941057","https://openalex.org/W2953213487","https://openalex.org/W2963108924","https://openalex.org/W2972535651","https://openalex.org/W2993938324","https://openalex.org/W3014625547","https://openalex.org/W3014632882","https://openalex.org/W3014946465","https://openalex.org/W3033487065","https://openalex.org/W3042301533","https://openalex.org/W3084544689","https://openalex.org/W3090998361","https://openalex.org/W3092354014","https://openalex.org/W3140526655","https://openalex.org/W3213496527","https://openalex.org/W4385076288","https://openalex.org/W6713071010","https://openalex.org/W6736640274"],"related_works":["https://openalex.org/W2358200898","https://openalex.org/W2325765407","https://openalex.org/W618293728","https://openalex.org/W2291845669","https://openalex.org/W2788012436","https://openalex.org/W200604156","https://openalex.org/W4231184955","https://openalex.org/W2374784346","https://openalex.org/W4286615217","https://openalex.org/W3154723744"],"abstract_inverted_index":{"Keyword-based":[0],"search":[1],"over":[2],"encrypted":[3],"data":[4,12],"is":[5,117,136],"an":[6],"important":[7],"technique":[8],"to":[9,68,79],"achieve":[10],"both":[11],"confidentiality":[13],"and":[14,30,61,94,106,122,127,138],"utilization":[15],"in":[16],"cloud":[17],"outsourcing":[18],"services.":[19],"While":[20],"commonly":[21],"used":[22],"access":[23,40,59,71,81],"control":[24,60,72],"mechanisms,":[25],"such":[26],"as":[27],"identity-based":[28],"encryption":[29],"attribute-based":[31],"encryption,":[32],"do":[33],"not":[34],"generally":[35],"scale":[36],"well":[37],"for":[38],"hierarchical":[39,70],"permissions.":[41],"To":[42],"solve":[43],"this":[44],"problem,":[45],"we":[46,88],"propose":[47],"a":[48],"Role-based":[49],"Encrypted":[50],"Keyword":[51],"Search":[52],"(REKS)":[53],"scheme":[54],"by":[55,73],"using":[56],"the":[57,101,130],"role-based":[58],"broadcast":[62],"encryption.":[63],"Specifically,":[64],"REKS":[65,116,135],"allows":[66],"owners":[67],"deploy":[69],"allowing":[74],"users":[75],"with":[76],"parent":[77],"roles":[78],"have":[80],"permissions":[82],"from":[83,129],"child":[84],"roles.":[85],"Using":[86],"REKS,":[87],"further":[89],"facilitate":[90],"token":[91,104],"generation":[92,105],"preprocessing":[93],"efficient":[95,137],"user":[96],"management,":[97],"thereby":[98],"significantly":[99],"reducing":[100],"users'":[102],"final":[103],"index":[107],"update":[108],"overheads,":[109],"respectively.":[110],"Formal":[111],"security":[112],"analysis":[113],"proves":[114],"that":[115,134],"secure":[118],"against":[119],"chosen":[120],"keyword":[121,124],"internal":[123],"guessing":[125],"attacks,":[126],"findings":[128],"empirical":[131],"evaluations":[132],"demonstrate":[133],"practical.":[139]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":10},{"year":2024,"cited_by_count":3}],"updated_date":"2026-05-13T08:25:38.343686","created_date":"2025-10-10T00:00:00"}
