{"id":"https://openalex.org/W2398247171","doi":"https://doi.org/10.1145/2898445.2898449","title":"Decentralized Secure Data Sharing with Attribute-Based Encryption","display_name":"Decentralized Secure Data Sharing with Attribute-Based Encryption","publication_year":2016,"publication_date":"2016-05-24","ids":{"openalex":"https://openalex.org/W2398247171","doi":"https://doi.org/10.1145/2898445.2898449","mag":"2398247171"},"language":"en","primary_location":{"id":"doi:10.1145/2898445.2898449","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2898445.2898449","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th ACM International Workshop on Security in Cloud Computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5022740024","display_name":"Holger Kuehner","orcid":null},"institutions":[{"id":"https://openalex.org/I102335020","display_name":"Karlsruhe Institute of Technology","ror":"https://ror.org/04t3en479","country_code":"DE","type":"education","lineage":["https://openalex.org/I102335020","https://openalex.org/I1305996414"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Holger Kuehner","raw_affiliation_strings":["Karlsruhe Institute of Technology (KIT), Karlsruhe, Germany"],"affiliations":[{"raw_affiliation_string":"Karlsruhe Institute of Technology (KIT), Karlsruhe, Germany","institution_ids":["https://openalex.org/I102335020"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5085339318","display_name":"Hannes Hartenstein","orcid":"https://orcid.org/0000-0003-3441-3180"},"institutions":[{"id":"https://openalex.org/I102335020","display_name":"Karlsruhe Institute of Technology","ror":"https://ror.org/04t3en479","country_code":"DE","type":"education","lineage":["https://openalex.org/I102335020","https://openalex.org/I1305996414"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Hannes Hartenstein","raw_affiliation_strings":["Karlsruhe Institute of Technology (KIT), Karlsruhe, Germany"],"affiliations":[{"raw_affiliation_string":"Karlsruhe Institute of Technology (KIT), Karlsruhe, Germany","institution_ids":["https://openalex.org/I102335020"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5022740024"],"corresponding_institution_ids":["https://openalex.org/I102335020"],"apc_list":null,"apc_paid":null,"fwci":1.2854,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.86488119,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"74","last_page":"81"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.988099992275238,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8120676875114441},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6727403998374939},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.6692609786987305},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.6545711159706116},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6228523254394531},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5961381196975708},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.5867409110069275},{"id":"https://openalex.org/keywords/data-sharing","display_name":"Data sharing","score":0.5746113061904907},{"id":"https://openalex.org/keywords/shared-resource","display_name":"Shared resource","score":0.48797887563705444},{"id":"https://openalex.org/keywords/permission","display_name":"Permission","score":0.4286547005176544},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3290413022041321},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.20381784439086914},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.0863032341003418}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8120676875114441},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6727403998374939},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.6692609786987305},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.6545711159706116},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6228523254394531},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5961381196975708},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.5867409110069275},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.5746113061904907},{"id":"https://openalex.org/C51332947","wikidata":"https://www.wikidata.org/wiki/Q1172305","display_name":"Shared resource","level":2,"score":0.48797887563705444},{"id":"https://openalex.org/C2779089604","wikidata":"https://www.wikidata.org/wiki/Q7169333","display_name":"Permission","level":2,"score":0.4286547005176544},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3290413022041321},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.20381784439086914},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0863032341003418},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2898445.2898449","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2898445.2898449","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th ACM International Workshop on Security in Cloud Computing","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6100000143051147,"id":"https://metadata.un.org/sdg/8","display_name":"Decent work and economic growth"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W29928525","https://openalex.org/W1498316612","https://openalex.org/W1682451491","https://openalex.org/W1763482972","https://openalex.org/W1972501964","https://openalex.org/W1976420017","https://openalex.org/W1998586673","https://openalex.org/W2018840295","https://openalex.org/W2019789301","https://openalex.org/W2039074122","https://openalex.org/W2039276185","https://openalex.org/W2048543827","https://openalex.org/W2118875948","https://openalex.org/W2125788329","https://openalex.org/W2125871822","https://openalex.org/W2187371422","https://openalex.org/W2253475325"],"related_works":["https://openalex.org/W2131846073","https://openalex.org/W4372269058","https://openalex.org/W114534093","https://openalex.org/W2383331906","https://openalex.org/W361351722","https://openalex.org/W4223919663","https://openalex.org/W1513098086","https://openalex.org/W2743419166","https://openalex.org/W2963348623","https://openalex.org/W2921225894"],"abstract_inverted_index":{"Secure":[0,84],"Data":[1,85],"Sharing":[2,86],"(SDS)":[3],"enables":[4],"users":[5,39],"to":[6,34,62,80,130,138,146],"share":[7],"data":[8],"in":[9,12,66,151,202],"the":[10,29,50,67,92,103,106,109,161,187,191,207,214],"cloud":[11],"a":[13,36,55,112,121,152,157],"confidential":[14],"and":[15,94,141,177,195,210],"integrity-preserving":[16],"manner.":[17],"Many":[18],"recent":[19,125],"SDS":[20],"approaches":[21,46,127],"are":[22],"based":[23],"on":[24,74],"Attribute-Based":[25],"Encryption":[26],"(ABE),":[27],"leveraging":[28],"advantage":[30],"that":[31,52,59,91,185],"ABE":[32,45,76,126,136,149],"allows":[33],"address":[35],"multitude":[37],"of":[38,105,111,124,160,216],"with":[40,49,128],"only":[41],"one":[42,135],"ciphertext.":[43],"However,":[44,206],"often":[47],"come":[48],"downside":[51],"they":[53],"require":[54],"central":[56],"fully-trusted":[57,113],"entity":[58],"is":[60,98],"able":[61],"decrypt":[63],"any":[64],"ciphertext":[65],"system.":[68],"In":[69],"this":[70,117,148],"paper,":[71],"we":[72,119,142,164],"investigate":[73],"whether":[75],"could":[77],"be":[78,139,200],"used":[79],"efficiently":[81],"implement":[82],"Decentralized":[83],"(D-SDS),":[87],"which":[88],"explicitly":[89],"demands":[90],"authorization":[93],"access":[95],"control":[96],"enforcement":[97],"carried":[99],"out":[100],"solely":[101],"by":[102],"owner":[104],"data,":[107],"without":[108],"help":[110],"third":[114],"party.":[115],"For":[116,156],"purpose,":[118],"did":[120],"comprehensive":[122],"analysis":[123],"regard":[129],"D-SDS":[131,154,189],"requirements.":[132],"We":[133],"found":[134],"approach":[137,150],"suitable,":[140],"show":[143],"different":[144],"alternatives":[145],"employ":[147],"group-based":[153],"scenario.":[155],"realistic":[158],"estimation":[159],"resource":[162,167],"consumption,":[163],"give":[165],"concrete":[166],"consumption":[168],"values":[169],"for":[170,186,213],"workloads":[171],"taken":[172],"from":[173],"real-world":[174],"system":[175],"traces":[176],"exemplary":[178],"up-to-date":[179],"mobile":[180,222],"devices.":[181,223],"Our":[182],"results":[183],"indicate":[184],"most":[188],"operations,":[190],"resulting":[192],"computation":[193,208],"times":[194,209],"outgoing":[196,211],"network":[197],"traffic":[198,212],"will":[199],"acceptable":[201],"many":[203],"use":[204],"cases.":[205],"management":[215],"large":[217],"groups":[218],"might":[219],"prevent":[220],"using":[221]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
