{"id":"https://openalex.org/W2737190311","doi":"https://doi.org/10.1109/iwcmc.2017.7986325","title":"A secure data storage based on revocation game-theoretic approaches in cloud computing environments","display_name":"A secure data storage based on revocation game-theoretic approaches in cloud computing environments","publication_year":2017,"publication_date":"2017-06-01","ids":{"openalex":"https://openalex.org/W2737190311","doi":"https://doi.org/10.1109/iwcmc.2017.7986325","mag":"2737190311"},"language":"en","primary_location":{"id":"doi:10.1109/iwcmc.2017.7986325","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc.2017.7986325","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5082427604","display_name":"Maha Jebalia","orcid":null},"institutions":[{"id":"https://openalex.org/I179097149","display_name":"University of Carthage","ror":"https://ror.org/057x6za15","country_code":"TN","type":"education","lineage":["https://openalex.org/I179097149"]},{"id":"https://openalex.org/I4210120884","display_name":"Institut Sup\u00e9rieur des \u00c9tudes Technologiques en Communications de Tunis","ror":"https://ror.org/02rfbsc53","country_code":"TN","type":"education","lineage":["https://openalex.org/I4210120884"]},{"id":"https://openalex.org/I68916915","display_name":"University of Gab\u00e8s","ror":"https://ror.org/022efad20","country_code":"TN","type":"education","lineage":["https://openalex.org/I68916915"]}],"countries":["TN"],"is_corresponding":true,"raw_author_name":"Maha Jebalia","raw_affiliation_strings":["Higher School of Communications of Tunis, Tunisia","Institut Sup\u00e9rieur de l'lnformatique de Medenine, University of Gabes, Tunisia","MEDIATRON. University of Carthage, Tunisia"],"affiliations":[{"raw_affiliation_string":"Higher School of Communications of Tunis, Tunisia","institution_ids":["https://openalex.org/I4210120884"]},{"raw_affiliation_string":"Institut Sup\u00e9rieur de l'lnformatique de Medenine, University of Gabes, Tunisia","institution_ids":["https://openalex.org/I68916915"]},{"raw_affiliation_string":"MEDIATRON. University of Carthage, Tunisia","institution_ids":["https://openalex.org/I179097149"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004525092","display_name":"Asma Ben Leta\u00effa","orcid":"https://orcid.org/0000-0002-1527-2557"},"institutions":[{"id":"https://openalex.org/I179097149","display_name":"University of Carthage","ror":"https://ror.org/057x6za15","country_code":"TN","type":"education","lineage":["https://openalex.org/I179097149"]},{"id":"https://openalex.org/I4210120884","display_name":"Institut Sup\u00e9rieur des \u00c9tudes Technologiques en Communications de Tunis","ror":"https://ror.org/02rfbsc53","country_code":"TN","type":"education","lineage":["https://openalex.org/I4210120884"]}],"countries":["TN"],"is_corresponding":false,"raw_author_name":"Asma Ben Letaifa","raw_affiliation_strings":["Higher School of Communications of Tunis, Tunisia","MEDIATRON. University of Carthage, Tunisia"],"affiliations":[{"raw_affiliation_string":"Higher School of Communications of Tunis, Tunisia","institution_ids":["https://openalex.org/I4210120884"]},{"raw_affiliation_string":"MEDIATRON. University of Carthage, Tunisia","institution_ids":["https://openalex.org/I179097149"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038440594","display_name":"Mohamed Hamdi","orcid":"https://orcid.org/0000-0002-8867-2340"},"institutions":[{"id":"https://openalex.org/I4210120884","display_name":"Institut Sup\u00e9rieur des \u00c9tudes Technologiques en Communications de Tunis","ror":"https://ror.org/02rfbsc53","country_code":"TN","type":"education","lineage":["https://openalex.org/I4210120884"]}],"countries":["TN"],"is_corresponding":false,"raw_author_name":"Mohamed Hamdi","raw_affiliation_strings":["Higher School of Communications of Tunis, Tunisia"],"affiliations":[{"raw_affiliation_string":"Higher School of Communications of Tunis, Tunisia","institution_ids":["https://openalex.org/I4210120884"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001993673","display_name":"Sami Tabbane","orcid":null},"institutions":[{"id":"https://openalex.org/I179097149","display_name":"University of Carthage","ror":"https://ror.org/057x6za15","country_code":"TN","type":"education","lineage":["https://openalex.org/I179097149"]},{"id":"https://openalex.org/I4210120884","display_name":"Institut Sup\u00e9rieur des \u00c9tudes Technologiques en Communications de Tunis","ror":"https://ror.org/02rfbsc53","country_code":"TN","type":"education","lineage":["https://openalex.org/I4210120884"]}],"countries":["TN"],"is_corresponding":false,"raw_author_name":"Sami Tabbane","raw_affiliation_strings":["Higher School of Communications of Tunis, Tunisia","MEDIATRON. University of Carthage, Tunisia"],"affiliations":[{"raw_affiliation_string":"Higher School of Communications of Tunis, Tunisia","institution_ids":["https://openalex.org/I4210120884"]},{"raw_affiliation_string":"MEDIATRON. University of Carthage, Tunisia","institution_ids":["https://openalex.org/I179097149"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5082427604"],"corresponding_institution_ids":["https://openalex.org/I179097149","https://openalex.org/I4210120884","https://openalex.org/I68916915"],"apc_list":null,"apc_paid":null,"fwci":0.2077,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.63483146,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"435","last_page":"440"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7976968884468079},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7898330092430115},{"id":"https://openalex.org/keywords/provisioning","display_name":"Provisioning","score":0.7292324900627136},{"id":"https://openalex.org/keywords/revocation","display_name":"Revocation","score":0.6477712392807007},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6342521905899048},{"id":"https://openalex.org/keywords/outsourcing","display_name":"Outsourcing","score":0.5828620791435242},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.540981650352478},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.5077939629554749},{"id":"https://openalex.org/keywords/cloud-storage","display_name":"Cloud storage","score":0.4596312940120697},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.4244529902935028},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.22411611676216125},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.19737255573272705},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.12471118569374084}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7976968884468079},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7898330092430115},{"id":"https://openalex.org/C172191483","wikidata":"https://www.wikidata.org/wiki/Q1071806","display_name":"Provisioning","level":2,"score":0.7292324900627136},{"id":"https://openalex.org/C2775892892","wikidata":"https://www.wikidata.org/wiki/Q6509517","display_name":"Revocation","level":3,"score":0.6477712392807007},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6342521905899048},{"id":"https://openalex.org/C46934059","wikidata":"https://www.wikidata.org/wiki/Q61515","display_name":"Outsourcing","level":2,"score":0.5828620791435242},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.540981650352478},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.5077939629554749},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.4596312940120697},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.4244529902935028},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.22411611676216125},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.19737255573272705},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.12471118569374084},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iwcmc.2017.7986325","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc.2017.7986325","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4399999976158142,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W1567265449","https://openalex.org/W1977765379","https://openalex.org/W1992825361","https://openalex.org/W2005945323","https://openalex.org/W2006736518","https://openalex.org/W2068617013","https://openalex.org/W2071874999","https://openalex.org/W2073396175","https://openalex.org/W2078558644","https://openalex.org/W2090700544","https://openalex.org/W2101673977","https://openalex.org/W2109971856","https://openalex.org/W2119989619","https://openalex.org/W2125212367","https://openalex.org/W2132152972","https://openalex.org/W2134458998","https://openalex.org/W2137695402","https://openalex.org/W2154107289","https://openalex.org/W2154464007","https://openalex.org/W2157994894","https://openalex.org/W2404967725","https://openalex.org/W3149099640","https://openalex.org/W4285719527","https://openalex.org/W6633969696","https://openalex.org/W6668574952","https://openalex.org/W6676368770"],"related_works":["https://openalex.org/W788458511","https://openalex.org/W2957021483","https://openalex.org/W2008702788","https://openalex.org/W2794162233","https://openalex.org/W2350964805","https://openalex.org/W4200386038","https://openalex.org/W3026478233","https://openalex.org/W4309713563","https://openalex.org/W2734469389","https://openalex.org/W2389620320"],"abstract_inverted_index":{"Cloud":[0],"computing":[1,44,129],"is":[2,7],"an":[3,135],"innovative":[4],"model":[5,154],"that":[6,75,164],"gaining":[8],"attention":[9],"and":[10,16,38,57,64,69,97,105,109,192],"wide":[11],"popularity":[12],"among":[13],"IT":[14,26],"professionals":[15],"users.":[17,162],"It":[18],"provides":[19],"a":[20,32,152,169,183],"new":[21,72],"mode":[22],"of":[23,25,92,137,185,210],"use":[24],"resources":[27,40],"by":[28],"offering":[29],"everything":[30],"as":[31],"service":[33],"(storage,":[34],"servers,":[35],"network,":[36],"etc.)":[37],"provisioning":[39],"on-demand.":[41],"In":[42,80],"cloud":[43,56,59,128,174],"environments,":[45],"users":[46,175],"outsource":[47],"their":[48,93,199],"data":[49,52,67,85,107,125,159],"to":[50,77,155,177,190],"distributed":[51],"centers":[53],"in":[54,116,126,143,188],"the":[55,90,138,144,157,179,194,202,207,214],"entrust":[58],"providers":[60],"with":[61,122],"its":[62],"storage":[63,96],"processing.":[65],"However,":[66],"outsourcing":[68],"multi-tenants":[70],"introduce":[71],"security":[73,140],"issues":[74,141],"have":[76,167,176],"be":[78,102,112],"addressed.":[79],"fact,":[81],"being":[82],"stored":[83,124,158],"externally,":[84],"are":[86],"no":[87],"longer":[88],"under":[89],"control":[91],"owners.":[94],"The":[95],"processing":[98],"mechanisms":[99],"may":[100,111],"not":[101],"fully":[103],"trustworthy":[104],"thus":[106],"confidentiality":[108],"privacy":[110],"at":[113],"risk.":[114],"Therefore,":[115],"this":[117,211],"paper,":[118],"we":[119,132,147,166,204],"will":[120,133,148,205],"deal":[121],"securing":[123],"shared":[127],"environment.":[130],"First,":[131],"present":[134],"overview":[136],"main":[139],"addressed":[142],"literature.":[145],"Then":[146],"focus":[149],"on":[150],"providing":[151],"game-theoretic":[153],"secure":[156],"from":[160,182],"malicious":[161,195],"To":[163],"purpose,":[165],"proposed":[168],"sequential":[170],"revocation":[171],"game":[172,212],"where":[173],"choose":[178],"best":[180],"strategy":[181],"set":[184],"three":[186],"strategies":[187],"order":[189],"revoke":[191],"eliminate":[193],"user":[196],"while":[197],"minimizing":[198],"costs.":[200],"At":[201],"end,":[203],"discuss":[206],"different":[208],"outcomes":[209],"using":[213],"subgame":[215],"perfect":[216],"Nash":[217],"equilibrium":[218],"concept.":[219]},"counts_by_year":[{"year":2019,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
