{"id":"https://openalex.org/W2485127987","doi":"https://doi.org/10.1109/tpds.2015.2486772","title":"Eavesdropping Prevention for Network Coding Encrypted Cloud Storage Systems","display_name":"Eavesdropping Prevention for Network Coding Encrypted Cloud Storage Systems","publication_year":2015,"publication_date":"2015-10-05","ids":{"openalex":"https://openalex.org/W2485127987","doi":"https://doi.org/10.1109/tpds.2015.2486772","mag":"2485127987"},"language":"en","primary_location":{"id":"doi:10.1109/tpds.2015.2486772","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tpds.2015.2486772","pdf_url":null,"source":{"id":"https://openalex.org/S97130795","display_name":"IEEE Transactions on Parallel and Distributed Systems","issn_l":"1045-9219","issn":["1045-9219","1558-2183","2161-9883"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Parallel and Distributed Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079096928","display_name":"Yu\u2010Jia Chen","orcid":"https://orcid.org/0000-0001-7563-4073"},"institutions":[{"id":"https://openalex.org/I148366613","display_name":"National Yang Ming Chiao Tung University","ror":"https://ror.org/00se2k293","country_code":"TW","type":"education","lineage":["https://openalex.org/I148366613"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Yu-Jia Chen","raw_affiliation_strings":["Department of Electrical and Computer Engineering, National Chiao Tung University, Hsinchu, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, National Chiao Tung University, Hsinchu, Taiwan","institution_ids":["https://openalex.org/I148366613"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100661626","display_name":"Li\u2010Chun Wang","orcid":"https://orcid.org/0000-0002-7883-6217"},"institutions":[{"id":"https://openalex.org/I148366613","display_name":"National Yang Ming Chiao Tung University","ror":"https://ror.org/00se2k293","country_code":"TW","type":"education","lineage":["https://openalex.org/I148366613"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Li-Chun Wang","raw_affiliation_strings":["Department of Electrical and Computer Engineering, National Chiao Tung University, Hsinchu, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, National Chiao Tung University, Hsinchu, Taiwan","institution_ids":["https://openalex.org/I148366613"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5073681915","display_name":"Chen-Hung Liao","orcid":"https://orcid.org/0000-0001-7643-5631"},"institutions":[{"id":"https://openalex.org/I148366613","display_name":"National Yang Ming Chiao Tung University","ror":"https://ror.org/00se2k293","country_code":"TW","type":"education","lineage":["https://openalex.org/I148366613"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Chen-Hung Liao","raw_affiliation_strings":["Department of Electrical and Computer Engineering, National Chiao Tung University, Hsinchu, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, National Chiao Tung University, Hsinchu, Taiwan","institution_ids":["https://openalex.org/I148366613"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5079096928"],"corresponding_institution_ids":["https://openalex.org/I148366613"],"apc_list":null,"apc_paid":null,"fwci":2.6626,"has_fulltext":false,"cited_by_count":22,"citation_normalized_percentile":{"value":0.91473313,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"27","issue":"8","first_page":"2261","last_page":"2273"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8429839611053467},{"id":"https://openalex.org/keywords/backup","display_name":"Backup","score":0.7877233028411865},{"id":"https://openalex.org/keywords/erasure-code","display_name":"Erasure code","score":0.782668948173523},{"id":"https://openalex.org/keywords/cloud-storage","display_name":"Cloud storage","score":0.702121913433075},{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.6399887800216675},{"id":"https://openalex.org/keywords/linear-network-coding","display_name":"Linear network coding","score":0.6395318508148193},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6341364979743958},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.630483865737915},{"id":"https://openalex.org/keywords/distributed-data-store","display_name":"Distributed data store","score":0.5560516119003296},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4747985899448395},{"id":"https://openalex.org/keywords/computer-data-storage","display_name":"Computer data storage","score":0.4646655321121216},{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.42759138345718384},{"id":"https://openalex.org/keywords/data-loss","display_name":"Data loss","score":0.42000335454940796},{"id":"https://openalex.org/keywords/data-recovery","display_name":"Data recovery","score":0.4159410297870636},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3903902769088745},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2452593743801117},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.1952674686908722},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.172175794839859},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1586373746395111},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.12683996558189392},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.09818193316459656}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8429839611053467},{"id":"https://openalex.org/C2780945871","wikidata":"https://www.wikidata.org/wiki/Q194274","display_name":"Backup","level":2,"score":0.7877233028411865},{"id":"https://openalex.org/C137529215","wikidata":"https://www.wikidata.org/wiki/Q5385031","display_name":"Erasure code","level":3,"score":0.782668948173523},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.702121913433075},{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.6399887800216675},{"id":"https://openalex.org/C138293262","wikidata":"https://www.wikidata.org/wiki/Q1089578","display_name":"Linear network coding","level":3,"score":0.6395318508148193},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6341364979743958},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.630483865737915},{"id":"https://openalex.org/C24885549","wikidata":"https://www.wikidata.org/wiki/Q339678","display_name":"Distributed data store","level":2,"score":0.5560516119003296},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4747985899448395},{"id":"https://openalex.org/C194739806","wikidata":"https://www.wikidata.org/wiki/Q66221","display_name":"Computer data storage","level":2,"score":0.4646655321121216},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.42759138345718384},{"id":"https://openalex.org/C193519340","wikidata":"https://www.wikidata.org/wiki/Q891179","display_name":"Data loss","level":2,"score":0.42000335454940796},{"id":"https://openalex.org/C529754248","wikidata":"https://www.wikidata.org/wiki/Q1054772","display_name":"Data recovery","level":2,"score":0.4159410297870636},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3903902769088745},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2452593743801117},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.1952674686908722},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.172175794839859},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1586373746395111},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.12683996558189392},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.09818193316459656}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tpds.2015.2486772","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tpds.2015.2486772","pdf_url":null,"source":{"id":"https://openalex.org/S97130795","display_name":"IEEE Transactions on Parallel and Distributed Systems","issn_l":"1045-9219","issn":["1045-9219","1558-2183","2161-9883"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Parallel and Distributed Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G5724268774","display_name":null,"funder_award_id":"NSC-102-2221-E-009-012-MY3","funder_id":"https://openalex.org/F4320321040","funder_display_name":"National Science Council"}],"funders":[{"id":"https://openalex.org/F4320321040","display_name":"National Science Council","ror":"https://ror.org/02kv4zf79"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":51,"referenced_works":["https://openalex.org/W41204052","https://openalex.org/W1494215701","https://openalex.org/W1562699268","https://openalex.org/W1822772607","https://openalex.org/W1836955865","https://openalex.org/W1916470990","https://openalex.org/W1966612101","https://openalex.org/W1970080388","https://openalex.org/W1979205928","https://openalex.org/W1982339082","https://openalex.org/W2006947308","https://openalex.org/W2014149071","https://openalex.org/W2016718129","https://openalex.org/W2017643135","https://openalex.org/W2026288260","https://openalex.org/W2030792561","https://openalex.org/W2036841092","https://openalex.org/W2036920793","https://openalex.org/W2058863419","https://openalex.org/W2076572416","https://openalex.org/W2077710941","https://openalex.org/W2096296858","https://openalex.org/W2105185344","https://openalex.org/W2111915261","https://openalex.org/W2112034660","https://openalex.org/W2112924098","https://openalex.org/W2116047956","https://openalex.org/W2118925326","https://openalex.org/W2124342778","https://openalex.org/W2124944367","https://openalex.org/W2136237463","https://openalex.org/W2138928022","https://openalex.org/W2146033465","https://openalex.org/W2151916064","https://openalex.org/W2155861865","https://openalex.org/W2156345730","https://openalex.org/W2164571150","https://openalex.org/W2164586990","https://openalex.org/W2534491645","https://openalex.org/W2762198510","https://openalex.org/W2964275527","https://openalex.org/W3100282565","https://openalex.org/W3103122537","https://openalex.org/W3105050322","https://openalex.org/W6601658435","https://openalex.org/W6629402156","https://openalex.org/W6638656391","https://openalex.org/W6670047251","https://openalex.org/W6676693377","https://openalex.org/W6681588593","https://openalex.org/W6728374566"],"related_works":["https://openalex.org/W2963163039","https://openalex.org/W4320061053","https://openalex.org/W4285613674","https://openalex.org/W2161993886","https://openalex.org/W3015360867","https://openalex.org/W2205290344","https://openalex.org/W2949392093","https://openalex.org/W1968818878","https://openalex.org/W2508352418","https://openalex.org/W2730908095"],"abstract_inverted_index":{"Network":[0],"coding":[1,24],"is":[2,35,71],"an":[3],"important":[4,94,127],"cloud":[5,44,82],"storage":[6,45,83,141],"technique,":[7],"which":[8,31],"can":[9,154],"recover":[10],"data":[11,32,39,95,122,134],"with":[12],"small":[13],"repair":[14,115],"bandwidth":[15,116],"and":[16,25,60,117,143,150],"high":[17],"reliability":[18],"compared":[19],"to":[20,49,91,111],"the":[21,37,53,57,93,108,113,118,126,138,144,148,151],"existing":[22],"erasure":[23],"replication":[26],"methods.":[27],"However,":[28],"regardless":[29],"of":[30,67,120,130,140],"recovery":[33,96,135],"technique":[34],"used,":[36],"repaired":[38],"in":[40,75],"a":[41,79,87,131],"geographically":[42],"distributed":[43],"system":[46,97,128],"are":[47],"easy":[48],"be":[50,155],"eavesdropped":[51],"at":[52],"transmission":[54],"link":[55,73,145],"between":[56,147],"local":[58],"datacenter":[59,149],"its":[61],"remote":[62,114],"backup":[63,152],"site.":[64],"This":[65],"kind":[66],"network":[68,80,132],"security":[69,102,161],"issue":[70],"called":[72],"eavesdropping":[74],"this":[76],"paper.":[77],"For":[78],"coded":[81,121,133],"system,":[84,136],"we":[85,106],"propose":[86],"systematic":[88],"design":[89],"methodology":[90],"determine":[92],"parameters":[98,129],"for":[99,158],"any":[100],"specified":[101],"level.":[103],"Through":[104],"analysis,":[105],"present":[107],"performance":[109],"curves":[110],"relate":[112],"number":[119,139],"fragments.":[123],"Consequently,":[124],"all":[125],"including":[137],"nodes":[142],"capacity":[146],"site,":[153],"precisely":[156],"designed":[157],"satisfying":[159],"different":[160],"level":[162],"requirements.":[163]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":6},{"year":2018,"cited_by_count":6},{"year":2017,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
