{"id":"https://openalex.org/W2788049089","doi":"https://doi.org/10.1142/s0129054117500289","title":"Cost-Effective and Scalable Data Sharing in Cloud Storage Using Hierarchical Attribute-Based Encryption with Forward Security","display_name":"Cost-Effective and Scalable Data Sharing in Cloud Storage Using Hierarchical Attribute-Based Encryption with Forward Security","publication_year":2017,"publication_date":"2017-11-01","ids":{"openalex":"https://openalex.org/W2788049089","doi":"https://doi.org/10.1142/s0129054117500289","mag":"2788049089"},"language":"en","primary_location":{"id":"doi:10.1142/s0129054117500289","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0129054117500289","pdf_url":null,"source":{"id":"https://openalex.org/S68047077","display_name":"International Journal of Foundations of Computer Science","issn_l":"0129-0541","issn":["0129-0541","1793-6373"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Foundations of Computer Science","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5002582574","display_name":"Jianghong Wei","orcid":"https://orcid.org/0000-0002-0286-7973"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jianghong Wei","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450002, P. R. China","State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100088, P. R. China","State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450002, P. R. China; State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100088, P. R. China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450002, P. R. China","institution_ids":[]},{"raw_affiliation_string":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100088, P. R. China","institution_ids":["https://openalex.org/I139759216"]},{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450002, P. R. China; State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100088, P. R. China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031931063","display_name":"Xinyi Huang","orcid":"https://orcid.org/0000-0003-0070-1707"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xinyi Huang","raw_affiliation_strings":["School of Mathematics and Computer Science, Fujian Normal University, Fuzhou 350108, P. R. China"],"affiliations":[{"raw_affiliation_string":"School of Mathematics and Computer Science, Fujian Normal University, Fuzhou 350108, P. R. China","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091311315","display_name":"Wenfen Liu","orcid":"https://orcid.org/0000-0001-5601-8347"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Wenfen Liu","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450002, P. R. China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450002, P. R. China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5082517684","display_name":"Xuexian Hu","orcid":"https://orcid.org/0000-0001-9778-9463"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xuexian Hu","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450002, P. R. China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450002, P. R. China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5002582574"],"corresponding_institution_ids":["https://openalex.org/I139759216"],"apc_list":null,"apc_paid":null,"fwci":0.8315,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.8180776,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"28","issue":"07","first_page":"843","last_page":"868"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.98580002784729,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.982200026512146,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.801350474357605},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.6903163194656372},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6465051174163818},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6342414021492004},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.5760736465454102},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5639324188232422},{"id":"https://openalex.org/keywords/data-sharing","display_name":"Data sharing","score":0.5385144352912903},{"id":"https://openalex.org/keywords/delegation","display_name":"Delegation","score":0.5321376323699951},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5151206851005554},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5089221000671387},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.4930364787578583},{"id":"https://openalex.org/keywords/client-side-encryption","display_name":"Client-side encryption","score":0.4641353487968445},{"id":"https://openalex.org/keywords/outsourcing","display_name":"Outsourcing","score":0.45039597153663635},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.43076109886169434},{"id":"https://openalex.org/keywords/cloud-storage","display_name":"Cloud storage","score":0.4193660318851471},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.28485530614852905},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.24497810006141663},{"id":"https://openalex.org/keywords/on-the-fly-encryption","display_name":"On-the-fly encryption","score":0.22745978832244873},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.21876129508018494},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.10931730270385742}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.801350474357605},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.6903163194656372},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6465051174163818},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6342414021492004},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.5760736465454102},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5639324188232422},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.5385144352912903},{"id":"https://openalex.org/C86532276","wikidata":"https://www.wikidata.org/wiki/Q1184065","display_name":"Delegation","level":2,"score":0.5321376323699951},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5151206851005554},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5089221000671387},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.4930364787578583},{"id":"https://openalex.org/C166501710","wikidata":"https://www.wikidata.org/wiki/Q5132476","display_name":"Client-side encryption","level":4,"score":0.4641353487968445},{"id":"https://openalex.org/C46934059","wikidata":"https://www.wikidata.org/wiki/Q61515","display_name":"Outsourcing","level":2,"score":0.45039597153663635},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.43076109886169434},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.4193660318851471},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.28485530614852905},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.24497810006141663},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.22745978832244873},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.21876129508018494},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.10931730270385742},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1142/s0129054117500289","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0129054117500289","pdf_url":null,"source":{"id":"https://openalex.org/S68047077","display_name":"International Journal of Foundations of Computer Science","issn_l":"0129-0541","issn":["0129-0541","1793-6373"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Foundations of Computer Science","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3743595112","display_name":null,"funder_award_id":"61379150","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5356833002","display_name":null,"funder_award_id":"U1405255","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6267210694","display_name":null,"funder_award_id":"61502527","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W1968170223","https://openalex.org/W1979080041","https://openalex.org/W1981977156","https://openalex.org/W1993341076","https://openalex.org/W2021371127","https://openalex.org/W2048543827","https://openalex.org/W2078590992","https://openalex.org/W2088645726","https://openalex.org/W2131725908","https://openalex.org/W2160262242","https://openalex.org/W2169046918","https://openalex.org/W3128663643","https://openalex.org/W3148814938"],"related_works":["https://openalex.org/W2131846073","https://openalex.org/W4372269058","https://openalex.org/W114534093","https://openalex.org/W2383331906","https://openalex.org/W361351722","https://openalex.org/W4223919663","https://openalex.org/W1513098086","https://openalex.org/W3161937915","https://openalex.org/W4386262237","https://openalex.org/W2030246973"],"abstract_inverted_index":{"Cloud":[0],"storage":[1],"greatly":[2],"facilitates":[3],"both":[4],"individuals":[5],"and":[6,39,46,73,95,126,135,149,204],"organizations":[7,146],"to":[8,22,30,58,89,200],"share":[9],"data":[10,93,182],"over":[11],"the":[12,52,77,81,100,112,120,123,139,151,154,188,194],"Internet.":[13],"However,":[14],"there":[15],"are":[16,64],"several":[17],"security":[18,129,186],"issues":[19],"that":[20],"impede":[21],"outsource":[23],"their":[24],"data.":[25,114],"Among":[26],"various":[27],"approaches":[28],"introduced":[29],"overcome":[31],"these":[32],"issues,":[33],"attribute-based":[34,168,181],"encryption":[35,169],"(ABE)":[36],"provides":[37],"secure":[38],"flexible":[40],"access":[41,91],"control":[42],"on":[43],"shared":[44,92,113],"data,":[45],"thus":[47],"is":[48,55,191],"rather":[49],"promising.":[50],"But":[51],"original":[53,124],"ABE":[54,125,141],"not":[56],"adaptable":[57],"some":[59],"special":[60],"circumstances,":[61],"where":[62],"attributes":[63],"organized":[65],"in":[66,153,171,193],"a":[67,164,177],"hierarchical":[68,167],"structure,":[69],"such":[70],"as":[71,176],"enterprises":[72],"official":[74],"institutions.":[75],"On":[76],"other":[78],"hand,":[79],"although":[80],"wide":[82],"use":[83],"of":[84,102,111,122,144,156,180,187],"mobile":[85],"devices":[86],"enables":[87],"users":[88],"conveniently":[90],"anywhere":[94],"anytime,":[96],"this":[97,116],"also":[98],"increases":[99],"risk":[101],"key":[103,132,158],"exposure,":[104],"which":[105],"will":[106],"result":[107],"into":[108],"unwanted":[109],"exposure":[110],"In":[115],"paper,":[117],"we":[118,162],"extend":[119],"functionality":[121],"enhance":[127],"its":[128,202],"by":[130],"providing":[131],"generation":[133],"delegation":[134],"forward":[136],"security.":[137],"Consequently,":[138],"enhanced":[140],"meets":[142],"applications":[143],"large":[145],"with":[147],"hierarchies":[148],"minimizes":[150],"damage":[152],"case":[155],"unexpected":[157],"exposures.":[159],"Specifically":[160],"speaking,":[161],"present":[163],"forward-secure":[165],"ciphertext-policy":[166],"scheme":[170,190],"prime":[172],"order":[173],"bilinear":[174],"groups,":[175],"core":[178],"building":[179],"sharing":[183],"scheme.":[184],"The":[185],"proposed":[189],"proven":[192],"standard":[195],"model.":[196],"We":[197],"conduct":[198],"experiments":[199],"demonstrate":[201],"efficiency":[203],"practicability.":[205]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":3}],"updated_date":"2026-04-22T08:38:42.863108","created_date":"2025-10-10T00:00:00"}
