{"id":"https://openalex.org/W2415071891","doi":"https://doi.org/10.1145/2909827.2930795","title":"Practical and Scalable Sharing of Encrypted Data in Cloud Storage with Key Aggregation","display_name":"Practical and Scalable Sharing of Encrypted Data in Cloud Storage with Key Aggregation","publication_year":2016,"publication_date":"2016-06-10","ids":{"openalex":"https://openalex.org/W2415071891","doi":"https://doi.org/10.1145/2909827.2930795","mag":"2415071891"},"language":"en","primary_location":{"id":"doi:10.1145/2909827.2930795","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2909827.2930795","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5013241108","display_name":"Hung Dang","orcid":null},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"education","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":true,"raw_author_name":"Hung Dang","raw_affiliation_strings":["National University of Singapore, Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"National University of Singapore, Singapore, Singapore","institution_ids":["https://openalex.org/I165932596"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018703065","display_name":"Yun Long Chong","orcid":null},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"education","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Yun Long Chong","raw_affiliation_strings":["National University of Singapore, Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"National University of Singapore, Singapore, Singapore","institution_ids":["https://openalex.org/I165932596"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5107947425","display_name":"Francois Brun","orcid":null},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"education","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Francois Brun","raw_affiliation_strings":["National University of Singapore, Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"National University of Singapore, Singapore, Singapore","institution_ids":["https://openalex.org/I165932596"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5105408906","display_name":"Ee\u2010Chien Chang","orcid":"https://orcid.org/0000-0003-4613-0866"},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"education","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Ee-Chien Chang","raw_affiliation_strings":["National University of Singapore, Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"National University of Singapore, Singapore, Singapore","institution_ids":["https://openalex.org/I165932596"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5013241108"],"corresponding_institution_ids":["https://openalex.org/I165932596"],"apc_list":null,"apc_paid":null,"fwci":0.4285,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.77834674,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"69","last_page":"80"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9944999814033508,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9937000274658203,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8280067443847656},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.7802255153656006},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7361797094345093},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.6612684726715088},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6520804166793823},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5970665216445923},{"id":"https://openalex.org/keywords/cloud-storage","display_name":"Cloud storage","score":0.5954594612121582},{"id":"https://openalex.org/keywords/heuristics","display_name":"Heuristics","score":0.5456942915916443},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.481682151556015},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.45403003692626953},{"id":"https://openalex.org/keywords/sampling","display_name":"Sampling (signal processing)","score":0.4441399872303009},{"id":"https://openalex.org/keywords/computer-data-storage","display_name":"Computer data storage","score":0.4155842959880829},{"id":"https://openalex.org/keywords/data-sharing","display_name":"Data sharing","score":0.41298162937164307},{"id":"https://openalex.org/keywords/range","display_name":"Range (aeronautics)","score":0.41296103596687317},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.38977834582328796},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.37513089179992676},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.33922797441482544},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.31112203001976013},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.19822418689727783},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.10262462496757507}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8280067443847656},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.7802255153656006},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7361797094345093},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.6612684726715088},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6520804166793823},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5970665216445923},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.5954594612121582},{"id":"https://openalex.org/C127705205","wikidata":"https://www.wikidata.org/wiki/Q5748245","display_name":"Heuristics","level":2,"score":0.5456942915916443},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.481682151556015},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.45403003692626953},{"id":"https://openalex.org/C140779682","wikidata":"https://www.wikidata.org/wiki/Q210868","display_name":"Sampling (signal processing)","level":3,"score":0.4441399872303009},{"id":"https://openalex.org/C194739806","wikidata":"https://www.wikidata.org/wiki/Q66221","display_name":"Computer data storage","level":2,"score":0.4155842959880829},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.41298162937164307},{"id":"https://openalex.org/C204323151","wikidata":"https://www.wikidata.org/wiki/Q905424","display_name":"Range (aeronautics)","level":2,"score":0.41296103596687317},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.38977834582328796},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.37513089179992676},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.33922797441482544},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.31112203001976013},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.19822418689727783},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.10262462496757507},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C106131492","wikidata":"https://www.wikidata.org/wiki/Q3072260","display_name":"Filter (signal processing)","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C192562407","wikidata":"https://www.wikidata.org/wiki/Q228736","display_name":"Materials science","level":0,"score":0.0},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.0},{"id":"https://openalex.org/C159985019","wikidata":"https://www.wikidata.org/wiki/Q181790","display_name":"Composite material","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2909827.2930795","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2909827.2930795","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320320709","display_name":"National Research Foundation Singapore","ror":"https://ror.org/03cpyc314"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W66767074","https://openalex.org/W1493718049","https://openalex.org/W1501004420","https://openalex.org/W1589843374","https://openalex.org/W1635413415","https://openalex.org/W1905774212","https://openalex.org/W1976420017","https://openalex.org/W1988615825","https://openalex.org/W2011652244","https://openalex.org/W2013833881","https://openalex.org/W2021328268","https://openalex.org/W2025968023","https://openalex.org/W2042590602","https://openalex.org/W2083594286","https://openalex.org/W2087000693","https://openalex.org/W2087064593","https://openalex.org/W2090189056","https://openalex.org/W2092335398","https://openalex.org/W2100979877","https://openalex.org/W2120636855","https://openalex.org/W2134894205","https://openalex.org/W2136328862","https://openalex.org/W2138001464","https://openalex.org/W2154448764","https://openalex.org/W2913066018","https://openalex.org/W4299402001","https://openalex.org/W6636721252"],"related_works":["https://openalex.org/W2414747139","https://openalex.org/W1802397081","https://openalex.org/W2086770216","https://openalex.org/W2100244348","https://openalex.org/W807354026","https://openalex.org/W2157130609","https://openalex.org/W2077900604","https://openalex.org/W1553510179","https://openalex.org/W2348283597","https://openalex.org/W3022042262"],"abstract_inverted_index":{"We":[0,78],"study":[1,119],"a":[2,18,63],"sensor":[3,200],"network":[4],"setting":[5],"in":[6,195],"which":[7],"samples":[8,31,38],"are":[9,67],"encrypted":[10,37],"individually":[11],"using":[12],"different":[13,175],"keys":[14],"and":[15,48,71,83,104,144,147,169],"maintained":[16],"on":[17,142,151],"cloud":[19],"storage.":[20],"For":[21],"large":[22],"systems,":[23],"e.g.":[24],"those":[25],"that":[26,121,158,172],"generate":[27],"several":[28],"millions":[29],"of":[30,36,124,162,174,205],"per":[32],"day,":[33],"fine-grained":[34],"sharing":[35],"is":[39,99],"challenging.":[40],"Existing":[41],"solutions,":[42],"such":[43,198],"as":[44,199],"Attribute-Based":[45],"Encryption":[46],"(ABE)":[47],"Key":[49],"Aggregation":[50],"Cryptosystem":[51],"(KAC),":[52],"can":[53,180],"be":[54,181],"utilized":[55],"to":[56,62,74,86,114],"address":[57],"the":[58,109,128,134,160,164,188,203],"challenge,":[59],"but":[60],"only":[61],"certain":[64],"extent.":[65],"They":[66],"often":[68],"computationally":[69],"expensive":[70],"thus":[72],"unlikely":[73],"operate":[75],"at":[76,138,159],"scale.":[77],"propose":[79],"an":[80],"algorithmic":[81],"enhancement":[82],"two":[84],"heuristics":[85],"improve":[87],"KAC's":[88],"key":[89],"reconstruction":[90,110,131,178],"cost,":[91],"while":[92],"preserving":[93],"its":[94],"provable":[95],"security.":[96],"The":[97],"improvement":[98],"particularly":[100],"significant":[101],"for":[102,122],"range":[103,143],"down-sampling":[105,145],"queries":[106,123],"--":[107],"accelerating":[108],"cost":[111],"from":[112],"quadratic":[113],"linear":[115],"running":[116],"time.":[117],"Experimental":[118],"shows":[120,157],"size":[125],"32k":[126],"samples,":[127],"proposed":[129,189],"fast":[130],"techniques":[132,190],"speed-up":[133],"original":[135],"KAC":[136,192],"by":[137,148,183],"least":[139],"90":[140],"times":[141,150],"queries,":[146],"eight":[149],"general":[152],"(arbitrary)":[153],"queries.":[154],"It":[155],"also":[156],"expense":[161],"splitting":[163],"query":[165],"into":[166],"16":[167],"sub-queries":[168],"correspondingly":[170],"issuing":[171],"number":[173],"aggregated":[176],"keys,":[177],"time":[179],"reduced":[182],"19":[184],"times.":[185],"As":[186],"such,":[187],"make":[191],"more":[193],"applicable":[194],"practical":[196],"scenarios":[197],"networks":[201],"or":[202],"Internet":[204],"Things.":[206]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
