{"id":"https://openalex.org/W2799386686","doi":"https://doi.org/10.1109/tetc.2018.2830368","title":"A Searchable and Verifiable Data Protection Scheme for Scholarly Big Data","display_name":"A Searchable and Verifiable Data Protection Scheme for Scholarly Big Data","publication_year":2018,"publication_date":"2018-04-26","ids":{"openalex":"https://openalex.org/W2799386686","doi":"https://doi.org/10.1109/tetc.2018.2830368","mag":"2799386686"},"language":"en","primary_location":{"id":"doi:10.1109/tetc.2018.2830368","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tetc.2018.2830368","pdf_url":null,"source":{"id":"https://openalex.org/S2496326734","display_name":"IEEE Transactions on Emerging Topics in Computing","issn_l":"2168-6750","issn":["2168-6750","2376-4562"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Emerging Topics in Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100766011","display_name":"Jian Shen","orcid":"https://orcid.org/0000-0003-0519-9058"},"institutions":[{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]},{"id":"https://openalex.org/I200845125","display_name":"Nanjing University of Information Science and Technology","ror":"https://ror.org/02y0rxk19","country_code":"CN","type":"education","lineage":["https://openalex.org/I200845125"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jian Shen","raw_affiliation_strings":["Guangxi Key Laboratory of Cryptography and Information Security, Guilin, China","Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science & Technology, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Guangxi Key Laboratory of Cryptography and Information Security, Guilin, China","institution_ids":["https://openalex.org/I4210132990"]},{"raw_affiliation_string":"Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science & Technology, Nanjing, China","institution_ids":["https://openalex.org/I200845125"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100337572","display_name":"Chen Wang","orcid":"https://orcid.org/0000-0002-3951-3159"},"institutions":[{"id":"https://openalex.org/I200845125","display_name":"Nanjing University of Information Science and Technology","ror":"https://ror.org/02y0rxk19","country_code":"CN","type":"education","lineage":["https://openalex.org/I200845125"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chen Wang","raw_affiliation_strings":["School of Computer and Software, Nanjing University of Information Science & Technology, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Software, Nanjing University of Information Science & Technology, Nanjing, China","institution_ids":["https://openalex.org/I200845125"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102799459","display_name":"Anxi Wang","orcid":"https://orcid.org/0000-0003-2585-1963"},"institutions":[{"id":"https://openalex.org/I200845125","display_name":"Nanjing University of Information Science and Technology","ror":"https://ror.org/02y0rxk19","country_code":"CN","type":"education","lineage":["https://openalex.org/I200845125"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Anxi Wang","raw_affiliation_strings":["School of Computer and Software, Nanjing University of Information Science & Technology, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Software, Nanjing University of Information Science & Technology, Nanjing, China","institution_ids":["https://openalex.org/I200845125"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059620494","display_name":"Sai Ji","orcid":"https://orcid.org/0000-0002-9737-3975"},"institutions":[{"id":"https://openalex.org/I200845125","display_name":"Nanjing University of Information Science and Technology","ror":"https://ror.org/02y0rxk19","country_code":"CN","type":"education","lineage":["https://openalex.org/I200845125"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Sai Ji","raw_affiliation_strings":["School of Computer and Software, Nanjing University of Information Science & Technology, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Software, Nanjing University of Information Science & Technology, Nanjing, China","institution_ids":["https://openalex.org/I200845125"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100456327","display_name":"Yan Zhang","orcid":"https://orcid.org/0000-0002-8561-5092"},"institutions":[{"id":"https://openalex.org/I184942183","display_name":"University of Oslo","ror":"https://ror.org/01xtthb56","country_code":"NO","type":"education","lineage":["https://openalex.org/I184942183"]}],"countries":["NO"],"is_corresponding":false,"raw_author_name":"Yan Zhang","raw_affiliation_strings":["Department of Informatics, University of Oslo, Norway"],"affiliations":[{"raw_affiliation_string":"Department of Informatics, University of Oslo, Norway","institution_ids":["https://openalex.org/I184942183"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100766011"],"corresponding_institution_ids":["https://openalex.org/I200845125","https://openalex.org/I4210132990"],"apc_list":null,"apc_paid":null,"fwci":2.1175,"has_fulltext":false,"cited_by_count":19,"citation_normalized_percentile":{"value":0.90066345,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"9","issue":"1","first_page":"216","last_page":"225"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8436812162399292},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.7555841207504272},{"id":"https://openalex.org/keywords/upload","display_name":"Upload","score":0.7313190698623657},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.6768689751625061},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.603422999382019},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5390291810035706},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.536914050579071},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4796222150325775},{"id":"https://openalex.org/keywords/reputation","display_name":"Reputation","score":0.4287590980529785},{"id":"https://openalex.org/keywords/data-sharing","display_name":"Data sharing","score":0.41231340169906616},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.34118521213531494},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2960290312767029},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.1623293161392212},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.09633225202560425}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8436812162399292},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.7555841207504272},{"id":"https://openalex.org/C71901391","wikidata":"https://www.wikidata.org/wiki/Q7126699","display_name":"Upload","level":2,"score":0.7313190698623657},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.6768689751625061},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.603422999382019},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5390291810035706},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.536914050579071},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4796222150325775},{"id":"https://openalex.org/C48798503","wikidata":"https://www.wikidata.org/wiki/Q877546","display_name":"Reputation","level":2,"score":0.4287590980529785},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.41231340169906616},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.34118521213531494},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2960290312767029},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.1623293161392212},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.09633225202560425},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tetc.2018.2830368","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tetc.2018.2830368","pdf_url":null,"source":{"id":"https://openalex.org/S2496326734","display_name":"IEEE Transactions on Emerging Topics in Computing","issn_l":"2168-6750","issn":["2168-6750","2376-4562"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Emerging Topics in Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2596279138","display_name":null,"funder_award_id":"U1405254","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4319777421","display_name":null,"funder_award_id":"61672290","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8217645079","display_name":null,"funder_award_id":"61672295","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8802620850","display_name":null,"funder_award_id":"61772280","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320327518","display_name":"Priority Academic Program Development of Jiangsu Higher Education Institutions","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":49,"referenced_works":["https://openalex.org/W1025739532","https://openalex.org/W1643928249","https://openalex.org/W1662751975","https://openalex.org/W1968676143","https://openalex.org/W1984462474","https://openalex.org/W2052950171","https://openalex.org/W2083761388","https://openalex.org/W2114486350","https://openalex.org/W2120475852","https://openalex.org/W2124406434","https://openalex.org/W2144388841","https://openalex.org/W2152924492","https://openalex.org/W2317814600","https://openalex.org/W2322299939","https://openalex.org/W2331870320","https://openalex.org/W2344670370","https://openalex.org/W2346963607","https://openalex.org/W2461933982","https://openalex.org/W2486094321","https://openalex.org/W2524361426","https://openalex.org/W2528339895","https://openalex.org/W2528685303","https://openalex.org/W2536888212","https://openalex.org/W2539963738","https://openalex.org/W2560243933","https://openalex.org/W2570427954","https://openalex.org/W2597901792","https://openalex.org/W2601353362","https://openalex.org/W2602376617","https://openalex.org/W2602555947","https://openalex.org/W2604462068","https://openalex.org/W2606779297","https://openalex.org/W2608689243","https://openalex.org/W2611264129","https://openalex.org/W2613814461","https://openalex.org/W2616646314","https://openalex.org/W2619984247","https://openalex.org/W2734490561","https://openalex.org/W2741151486","https://openalex.org/W2752901856","https://openalex.org/W2762101885","https://openalex.org/W2762155482","https://openalex.org/W2769575004","https://openalex.org/W2776677120","https://openalex.org/W4235857705","https://openalex.org/W4241671196","https://openalex.org/W4242361954","https://openalex.org/W6636882991","https://openalex.org/W6737399140"],"related_works":["https://openalex.org/W2355730523","https://openalex.org/W152021879","https://openalex.org/W2365629437","https://openalex.org/W2072918937","https://openalex.org/W2023935927","https://openalex.org/W2348330439","https://openalex.org/W2350372928","https://openalex.org/W2377292126","https://openalex.org/W2128900334","https://openalex.org/W2139109546"],"abstract_inverted_index":{"Scientific":[0],"research":[1],"achievements":[2],"play":[3],"a":[4,47,62,72,77,131],"positive":[5],"role":[6],"in":[7],"the":[8,35,39,66,67,83,86,93,96,99,112,127],"promotion":[9],"of":[10,29,41,65,85,101],"social":[11],"development.":[12],"Scholarly":[13],"big":[14,31,138],"data":[15,32,53,79,91,106,115,139],"include":[16],"scholars'":[17],"scientific":[18],"research,":[19],"experimental":[20],"data,":[21],"and":[22,38,51,76,90,110,122,133],"their":[23,42,102],"own":[24],"identity":[25],"information.":[26],"The":[27,119],"security":[28,120],"scholarly":[30,114,137],"relates":[33],"to":[34],"authors'":[36],"reputation":[37],"copyright":[40],"works.":[43],"This":[44],"paper":[45],"proposes":[46],"trusted":[48],"third-party-aided":[49],"searchable":[50],"verifiable":[52],"protection":[54],"scheme":[55,94,129,135],"that":[56,126],"utilizes":[57],"cloud":[58],"computing":[59],"technology.":[60],"For":[61],"better":[63],"description":[64],"protocol,":[68],"we":[69],"first":[70],"present":[71],"user-differentiated":[73],"system":[74,88],"model":[75,89],"cube":[78],"storage":[80],"structure.":[81],"On":[82],"basis":[84],"novel":[87,128],"structure,":[92],"helps":[95],"users":[97],"review":[98],"integrity":[100],"uploaded":[103],"or":[104],"downloaded":[105],"at":[107],"any":[108],"time":[109],"search":[111],"online":[113],"with":[116],"encrypted":[117],"keywords.":[118],"analysis":[121],"performance":[123],"simulation":[124],"demonstrate":[125],"is":[130],"secure":[132],"efficient":[134],"for":[136],"applications.":[140]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":6},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
