{"id":"https://openalex.org/W2019683598","doi":"https://doi.org/10.1145/2430475.2430493","title":"Protecting data confidentiality in cloud systems","display_name":"Protecting data confidentiality in cloud systems","publication_year":2012,"publication_date":"2012-10-30","ids":{"openalex":"https://openalex.org/W2019683598","doi":"https://doi.org/10.1145/2430475.2430493","mag":"2019683598"},"language":"en","primary_location":{"id":"doi:10.1145/2430475.2430493","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2430475.2430493","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Fourth Asia-Pacific Symposium on Internetware","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5012896021","display_name":"Tao Li","orcid":"https://orcid.org/0000-0003-3353-4618"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Li Tao","raw_affiliation_strings":["Tsinghua University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101655873","display_name":"Xiaojun Ye","orcid":"https://orcid.org/0000-0002-9780-4827"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ye Xiaojun","raw_affiliation_strings":["Tsinghua University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100373517","display_name":"Jianmin Wang","orcid":"https://orcid.org/0000-0001-6841-7943"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wang Jianmin","raw_affiliation_strings":["Tsinghua University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5012896021"],"corresponding_institution_ids":["https://openalex.org/I99065089"],"apc_list":null,"apc_paid":null,"fwci":0.4281,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.7103805,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"12"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.994700014591217,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9811999797821045,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.7543925046920776},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7381687760353088},{"id":"https://openalex.org/keywords/homomorphic-secret-sharing","display_name":"Homomorphic secret sharing","score":0.7016953229904175},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6197664141654968},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6096160411834717},{"id":"https://openalex.org/keywords/filesystem-level-encryption","display_name":"Filesystem-level encryption","score":0.5269661545753479},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5121316909790039},{"id":"https://openalex.org/keywords/probabilistic-encryption","display_name":"Probabilistic encryption","score":0.45356082916259766},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.43137413263320923},{"id":"https://openalex.org/keywords/client-side-encryption","display_name":"Client-side encryption","score":0.415979266166687},{"id":"https://openalex.org/keywords/on-the-fly-encryption","display_name":"On-the-fly encryption","score":0.37533634901046753},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.28072768449783325},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.28014129400253296},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.22137963771820068},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08276262879371643}],"concepts":[{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.7543925046920776},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7381687760353088},{"id":"https://openalex.org/C132161212","wikidata":"https://www.wikidata.org/wiki/Q5891458","display_name":"Homomorphic secret sharing","level":4,"score":0.7016953229904175},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6197664141654968},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6096160411834717},{"id":"https://openalex.org/C18319499","wikidata":"https://www.wikidata.org/wiki/Q5448402","display_name":"Filesystem-level encryption","level":4,"score":0.5269661545753479},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5121316909790039},{"id":"https://openalex.org/C54569210","wikidata":"https://www.wikidata.org/wiki/Q7246854","display_name":"Probabilistic encryption","level":3,"score":0.45356082916259766},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.43137413263320923},{"id":"https://openalex.org/C166501710","wikidata":"https://www.wikidata.org/wiki/Q5132476","display_name":"Client-side encryption","level":4,"score":0.415979266166687},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.37533634901046753},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.28072768449783325},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.28014129400253296},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.22137963771820068},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08276262879371643}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2430475.2430493","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2430475.2430493","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Fourth Asia-Pacific Symposium on Internetware","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G8276001706","display_name":null,"funder_award_id":"2009CB320706","funder_id":"https://openalex.org/F4320321540","funder_display_name":"Ministry of Science and Technology of the People's Republic of China"}],"funders":[{"id":"https://openalex.org/F4320321540","display_name":"Ministry of Science and Technology of the People's Republic of China","ror":"https://ror.org/027s68j25"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W17575016","https://openalex.org/W36745501","https://openalex.org/W104209573","https://openalex.org/W150223756","https://openalex.org/W1485489906","https://openalex.org/W1494049356","https://openalex.org/W1509320652","https://openalex.org/W1549588538","https://openalex.org/W1568804695","https://openalex.org/W1724472458","https://openalex.org/W1886646278","https://openalex.org/W1971286892","https://openalex.org/W1973079148","https://openalex.org/W1992282993","https://openalex.org/W2029176461","https://openalex.org/W2031533839","https://openalex.org/W2070423893","https://openalex.org/W2085933309","https://openalex.org/W2129580084","https://openalex.org/W2140430935","https://openalex.org/W2156030242","https://openalex.org/W2159915142","https://openalex.org/W2398715209"],"related_works":["https://openalex.org/W3118757263","https://openalex.org/W4309584611","https://openalex.org/W4308784203","https://openalex.org/W2361619969","https://openalex.org/W1025240641","https://openalex.org/W2380438667","https://openalex.org/W4313339305","https://openalex.org/W4360994575","https://openalex.org/W1995178318","https://openalex.org/W4239572594"],"abstract_inverted_index":{"To":[0],"achieve":[1,172],"a":[2,9,18,82,96,116,121,129,195],"trustworthy":[3],"cloud":[4,37,55,207,230],"data":[5,50,73],"service,":[6],"there":[7],"is":[8,142],"need":[10],"to":[11,25,31,46,52,128,162,202],"both":[12],"provide":[13],"the":[14,68,103,113,125,133,140,152,159,176,190,213,222],"right":[15],"services":[16],"from":[17,189],"security":[19],"engineering":[20],"perspective,":[21],"as":[22,24],"well":[23],"allows":[26],"specific":[27],"types":[28],"of":[29,105,165,215,224],"computations":[30],"be":[32,44],"carried":[33],"out":[34],"on":[35,102],"encrypted":[36,49,72],"data.":[38],"However,":[39],"traditional":[40],"encryption":[41,59,64,89,99,200,227,249],"solutions":[42],"can't":[43],"used":[45],"process":[47],"outsourcing":[48],"hosting":[51],"an":[53,137,163,198],"untrusted":[54],"provider.":[56],"A":[57],"novel":[58],"scheme,":[60],"called":[61],"fully":[62,87,186,225,247],"homomorphic":[63,88,98,187,226,248],"(FHE),":[65],"could":[66,155,171],"afford":[67],"circuit":[69],"ability":[70],"over":[71],"without":[74],"decrypting":[75],"it.":[76],"In":[77],"this":[78,93,148,166,169],"paper,":[79],"we":[80,211],"deliver":[81],"universal":[83],"construction":[84,191],"framework":[85,94,170],"for":[86,245],"schemes.":[90],"At":[91,209],"first,":[92],"initializes":[95],"somewhat":[97],"scheme":[100,177],"based":[101],"concept":[104],"metric":[106,134,153],"space":[107,154],"in":[108,132,179,206],"abstract":[109,149],"algebra":[110,150],"which":[111],"encodes":[112],"plaintext":[114],"into":[115],"offset":[117,126],"vector":[118,127],"and":[119,146,158,193,220,243],"generates":[120],"ciphertext":[122],"by":[123,174],"adding":[124],"random":[130],"eigenvector":[131],"space.":[135],"As":[136],"abelian":[138],"group,":[139],"ring":[141,157],"closed":[143],"under":[144],"addition":[145],"multiplication,":[147],"assume":[151],"forma":[156],"eigenvectors":[160],"belong":[161],"ideal":[164],"ring,":[167],"then":[168],"homomorphism":[173],"having":[175],"live":[178],"rings.":[180],"We":[181,237],"also":[182,238],"deduce":[183],"some":[184,218,240],"well-known":[185],"schemes":[188],"framework,":[192],"propose":[194],"prototype":[196],"with":[197,217,229],"FHE":[199,216],"proxy":[201],"solve":[203],"confidentiality":[204],"problems":[205],"systems.":[208],"last,":[210],"show":[212],"performance":[214,223],"experiments,":[219],"speed":[221],"up":[228],"computing":[231],"(parallel":[232],"computing,":[233,235],"distribute":[234],"etc.).":[236],"discuss":[239],"opening":[241],"issues":[242],"directions":[244],"future":[246],"researches.":[250]},"counts_by_year":[{"year":2016,"cited_by_count":1},{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
