{"id":"https://openalex.org/W2922172203","doi":"https://doi.org/10.1145/3301551.3301608","title":"Sustainable Data Management Strategies and Systems in Untrust Cloud Environments","display_name":"Sustainable Data Management Strategies and Systems in Untrust Cloud Environments","publication_year":2018,"publication_date":"2018-12-29","ids":{"openalex":"https://openalex.org/W2922172203","doi":"https://doi.org/10.1145/3301551.3301608","mag":"2922172203"},"language":"en","primary_location":{"id":"doi:10.1145/3301551.3301608","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3301551.3301608","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 6th International Conference on Information Technology: IoT and Smart City","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5019480182","display_name":"Huafei Zhu","orcid":"https://orcid.org/0000-0001-5306-0646"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":true,"raw_author_name":"Huafei Zhu","raw_affiliation_strings":["Cyber Security Lab, School of Computer Science and Engineering, Nanyang Technology University, Singapore"],"affiliations":[{"raw_affiliation_string":"Cyber Security Lab, School of Computer Science and Engineering, Nanyang Technology University, Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5008926869","display_name":"Wee Keong Ng","orcid":"https://orcid.org/0000-0001-7106-2768"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Ng Wee Keong","raw_affiliation_strings":["Cyber Security Lab, School of Computer Science and Engineering, Nanyang Technology University, Singapore"],"affiliations":[{"raw_affiliation_string":"Cyber Security Lab, School of Computer Science and Engineering, Nanyang Technology University, Singapore","institution_ids":["https://openalex.org/I172675005"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5019480182"],"corresponding_institution_ids":["https://openalex.org/I172675005"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.26182317,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"6","issue":null,"first_page":"163","last_page":"167"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7634029388427734},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6557453870773315},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.33234870433807373},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.07699424028396606}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7634029388427734},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6557453870773315},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.33234870433807373},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.07699424028396606}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3301551.3301608","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3301551.3301608","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 6th International Conference on Information Technology: IoT and Smart City","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1853639762","https://openalex.org/W1981455414","https://openalex.org/W2013623332","https://openalex.org/W2159915142","https://openalex.org/W2233233025","https://openalex.org/W2485230193","https://openalex.org/W2586386487","https://openalex.org/W2605719376","https://openalex.org/W2726996586","https://openalex.org/W2745309961","https://openalex.org/W2746463367","https://openalex.org/W2783592405","https://openalex.org/W2785539754","https://openalex.org/W2799154389","https://openalex.org/W2886707668","https://openalex.org/W2889358372"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W4244478748","https://openalex.org/W4223488648","https://openalex.org/W2134969820","https://openalex.org/W2251605416","https://openalex.org/W4389340727","https://openalex.org/W4205786897","https://openalex.org/W3150465815","https://openalex.org/W1997222214","https://openalex.org/W2802581102"],"abstract_inverted_index":{"The":[0],"state-of-the-art":[1],"strategies":[2],"for":[3,68],"the":[4,32,41,95,104],"data":[5,12,26,66],"privacy":[6],"(e.g.,":[7],"personal":[8],"information,":[9],"user":[10,81],"key,":[11],"sharing":[13],"and":[14,35,45,87],"exchanging":[15],"management)":[16],"are":[17,29,89],"far":[18],"from":[19],"satisfied;":[20],"Worse,":[21],"a":[22,50,73,116],"large":[23],"number":[24],"of":[25,75,128],"service":[27,55,61,85],"providers":[28,62,86],"running":[30],"in":[31,120],"\"both":[33,43],"athletes":[34,44],"referees\"":[36,46],"business":[37],"model.":[38],"We":[39,70],"break":[40],"unfair":[42],"rule":[47],"by":[48],"introducing":[49],"distributed":[51],"homomorphic":[52,76,106,130],"key":[53,77,107,131],"management":[54,67,108,132],"provider":[56],"who":[57],"collaborates":[58],"with":[59],"cloud":[60,84,121],"to":[63,79,83,91],"provide":[64,72],"fair":[65],"users.":[69],"then":[71,103],"construction":[74],"protocol":[78,109],"dispense":[80],"keys":[82],"we":[88],"able":[90],"show":[92],"that":[93],"if":[94],"underlying":[96],"El":[97],"Gamal":[98],"encryption":[99],"is":[100,110,122],"semantically":[101],"secure":[102,111],"proposed":[105],"against":[112],"semi-honest":[113],"adversary.":[114],"Finally,":[115],"multi-tenant":[117],"keyword":[118],"search":[119],"presented":[123],"as":[124],"an":[125],"immediate":[126],"application":[127],"our":[129],"protocol.":[133]},"counts_by_year":[{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
