{"id":"https://openalex.org/W4312833168","doi":"https://doi.org/10.1145/3565291.3565310","title":"A Secure Encrypted Data Deduplication Scheme Based on Data Popularity Supporting Dynamic Ownership Management","display_name":"A Secure Encrypted Data Deduplication Scheme Based on Data Popularity Supporting Dynamic Ownership Management","publication_year":2022,"publication_date":"2022-09-23","ids":{"openalex":"https://openalex.org/W4312833168","doi":"https://doi.org/10.1145/3565291.3565310"},"language":"en","primary_location":{"id":"doi:10.1145/3565291.3565310","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3565291.3565310","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th International Conference on Big Data Technologies","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5029413720","display_name":"Zhiqiang Wang","orcid":"https://orcid.org/0000-0002-7048-2338"},"institutions":[{"id":"https://openalex.org/I108688024","display_name":"Qingdao University","ror":"https://ror.org/021cj6z65","country_code":"CN","type":"education","lineage":["https://openalex.org/I108688024"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhiqiang Wang","raw_affiliation_strings":["Qingdao University, China"],"affiliations":[{"raw_affiliation_string":"Qingdao University, China","institution_ids":["https://openalex.org/I108688024"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5107898541","display_name":"Wenjing Gao","orcid":"https://orcid.org/0000-0002-9938-1442"},"institutions":[{"id":"https://openalex.org/I108688024","display_name":"Qingdao University","ror":"https://ror.org/021cj6z65","country_code":"CN","type":"education","lineage":["https://openalex.org/I108688024"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenjing Gao","raw_affiliation_strings":["Qingdao University, China"],"affiliations":[{"raw_affiliation_string":"Qingdao University, China","institution_ids":["https://openalex.org/I108688024"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008392593","display_name":"Xinliang Li","orcid":"https://orcid.org/0000-0001-7449-6019"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xinliang Li","raw_affiliation_strings":["China Construction Investment Data Technology (Shandong) Co., Ltd., China"],"affiliations":[{"raw_affiliation_string":"China Construction Investment Data Technology (Shandong) Co., Ltd., China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5014158729","display_name":"Rong Hao","orcid":"https://orcid.org/0000-0002-2878-6661"},"institutions":[{"id":"https://openalex.org/I108688024","display_name":"Qingdao University","ror":"https://ror.org/021cj6z65","country_code":"CN","type":"education","lineage":["https://openalex.org/I108688024"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Rong Hao","raw_affiliation_strings":["Qingdao University, China"],"affiliations":[{"raw_affiliation_string":"Qingdao University, China","institution_ids":["https://openalex.org/I108688024"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5029413720"],"corresponding_institution_ids":["https://openalex.org/I108688024"],"apc_list":null,"apc_paid":null,"fwci":0.6063,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.75092287,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"120","last_page":"124"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.992900013923645,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9386000037193298,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.7945609092712402},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7744263410568237},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7132636904716492},{"id":"https://openalex.org/keywords/data-deduplication","display_name":"Data deduplication","score":0.6984919309616089},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.694718062877655},{"id":"https://openalex.org/keywords/proxy-re-encryption","display_name":"Proxy re-encryption","score":0.5530965328216553},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.44428879022598267},{"id":"https://openalex.org/keywords/semantic-security","display_name":"Semantic security","score":0.4386865496635437},{"id":"https://openalex.org/keywords/cloud-storage","display_name":"Cloud storage","score":0.43296927213668823},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.3712668716907501},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.32745659351348877},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.23432400822639465},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.18419215083122253}],"concepts":[{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.7945609092712402},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7744263410568237},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7132636904716492},{"id":"https://openalex.org/C32587265","wikidata":"https://www.wikidata.org/wiki/Q1182260","display_name":"Data deduplication","level":2,"score":0.6984919309616089},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.694718062877655},{"id":"https://openalex.org/C2776861820","wikidata":"https://www.wikidata.org/wiki/Q7252899","display_name":"Proxy re-encryption","level":4,"score":0.5530965328216553},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.44428879022598267},{"id":"https://openalex.org/C204806902","wikidata":"https://www.wikidata.org/wiki/Q2333581","display_name":"Semantic security","level":5,"score":0.4386865496635437},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.43296927213668823},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.3712668716907501},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.32745659351348877},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.23432400822639465},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.18419215083122253}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3565291.3565310","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3565291.3565310","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th International Conference on Big Data Technologies","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W37027385","https://openalex.org/W48174705","https://openalex.org/W1519809459","https://openalex.org/W1675372141","https://openalex.org/W1835454951","https://openalex.org/W1985943827","https://openalex.org/W2020928798","https://openalex.org/W2034326924","https://openalex.org/W2063421119","https://openalex.org/W2098431880","https://openalex.org/W2148048154","https://openalex.org/W2165257856","https://openalex.org/W2441223455","https://openalex.org/W2510521379","https://openalex.org/W2532225978","https://openalex.org/W2615003995","https://openalex.org/W2763513601","https://openalex.org/W2767846115","https://openalex.org/W2800439477","https://openalex.org/W2911834949","https://openalex.org/W2980614633","https://openalex.org/W3133558527","https://openalex.org/W3213206451","https://openalex.org/W4206323677","https://openalex.org/W4236402571","https://openalex.org/W4247775601","https://openalex.org/W6600801457"],"related_works":["https://openalex.org/W1589129854","https://openalex.org/W2516093999","https://openalex.org/W2406675271","https://openalex.org/W1582239555","https://openalex.org/W4240851858","https://openalex.org/W2139343945","https://openalex.org/W2771248218","https://openalex.org/W2951141839","https://openalex.org/W2138038098","https://openalex.org/W1538523055"],"abstract_inverted_index":{"Data":[0],"deduplication":[1,19,41,58,129],"technology":[2,20,42],"can":[3,111,136],"save":[4,22],"a":[5,32,37,125,170],"lot":[6],"of":[7,51,95,106,164,172],"storage":[8,23],"space":[9,24],"for":[10],"the":[11,49,55,64,76,87,93,100,104,113,117,138,177,184,189],"cloud":[12],"server.":[13],"However,":[14,86],"how":[15],"to":[16,21,115,150,157,175,183,196],"use":[17,146],"data":[18,27,40,44,52,57,62,66,78,128,160],"while":[25],"ensuring":[26],"security":[28],"has":[29],"always":[30],"been":[31],"difficult":[33],"problem.":[34],"To":[35],"find":[36],"balance":[38],"between":[39],"and":[43,71,75],"security,":[45],"some":[46],"studies":[47],"introduce":[48],"concept":[50],"popularity.":[53],"In":[54,120,186],"encrypted":[56,68,80,127],"scheme":[59,130],"based":[60],"on":[61],"popularity,":[63],"popular":[65,107,165],"is":[67,79,155],"by":[69,81],"simple":[70],"efficient":[72],"convergent":[73,152],"encryption,":[74],"unpopular":[77],"semantically":[82],"secure":[83,126],"symmetric":[84],"encryption.":[85],"existing":[88],"schemes":[89],"do":[90],"not":[91,193],"consider":[92],"problem":[94],"dynamic":[96,132],"ownership":[97,133,173],"management.":[98],"If":[99],"revoked":[101,139,178,190],"user":[102,140,179,191],"obtains":[103],"ciphertext":[105,114,153,159],"data,":[108],"he/she":[109],"also":[110],"decrypt":[112],"obtain":[116,197],"plaintext":[118,143,198],"data.":[119,144,166,185,199],"this":[121,187],"paper,":[122],"we":[123,168],"propose":[124],"supporting":[131],"management,":[134],"which":[135,154],"prevent":[137,158,176],"from":[141,161,180],"obtaining":[142],"We":[145],"proxy":[147],"re-encryption":[148],"algorithm":[149],"encrypt":[151],"able":[156,195],"leaking":[162],"information":[163],"Besides,":[167],"design":[169],"proof":[171],"protocol":[174],"regaining":[181],"access":[182],"way,":[188],"will":[192],"be":[194]},"counts_by_year":[{"year":2024,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
