{"id":"https://openalex.org/W4379932668","doi":"https://doi.org/10.1145/3590837.3590904","title":"Effective and light weight security system for highly confidential cloud data such as PHR","display_name":"Effective and light weight security system for highly confidential cloud data such as PHR","publication_year":2022,"publication_date":"2022-12-23","ids":{"openalex":"https://openalex.org/W4379932668","doi":"https://doi.org/10.1145/3590837.3590904"},"language":"en","primary_location":{"id":"doi:10.1145/3590837.3590904","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3590837.3590904","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th International Conference on Information Management &amp; Machine Intelligence","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5092120492","display_name":"E V Sandeepkumar","orcid":null},"institutions":[{"id":"https://openalex.org/I4210131147","display_name":"SRM University","ror":"https://ror.org/037skf023","country_code":"IN","type":"education","lineage":["https://openalex.org/I145286018","https://openalex.org/I4210131147"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Sandeepkumar E V","raw_affiliation_strings":["Networking and Communications, SRM University, India"],"raw_orcid":"https://orcid.org/0009-0004-3670-7769","affiliations":[{"raw_affiliation_string":"Networking and Communications, SRM University, India","institution_ids":["https://openalex.org/I4210131147"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5064981494","display_name":"Kayalvizhi Jayavel","orcid":"https://orcid.org/0000-0002-6160-1374"},"institutions":[{"id":"https://openalex.org/I4210131147","display_name":"SRM University","ror":"https://ror.org/037skf023","country_code":"IN","type":"education","lineage":["https://openalex.org/I145286018","https://openalex.org/I4210131147"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Kayalvizhi Jayavel","raw_affiliation_strings":["Department of Networks and Communications, School of Computing, SRM University, India"],"raw_orcid":"https://orcid.org/0000-0002-6160-1374","affiliations":[{"raw_affiliation_string":"Department of Networks and Communications, School of Computing, SRM University, India","institution_ids":["https://openalex.org/I4210131147"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5092120492"],"corresponding_institution_ids":["https://openalex.org/I4210131147"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.19192794,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7928956747055054},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7316158413887024},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6791467070579529},{"id":"https://openalex.org/keywords/client-side-encryption","display_name":"Client-side encryption","score":0.5904863476753235},{"id":"https://openalex.org/keywords/on-the-fly-encryption","display_name":"On-the-fly encryption","score":0.5900813341140747},{"id":"https://openalex.org/keywords/cloud-storage","display_name":"Cloud storage","score":0.5868673920631409},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5861515998840332},{"id":"https://openalex.org/keywords/proxy-re-encryption","display_name":"Proxy re-encryption","score":0.5833398699760437},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.5592054128646851},{"id":"https://openalex.org/keywords/filesystem-level-encryption","display_name":"Filesystem-level encryption","score":0.5433886051177979},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5143781304359436},{"id":"https://openalex.org/keywords/40-bit-encryption","display_name":"40-bit encryption","score":0.48878857493400574},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.4765903651714325},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4187990427017212},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.34909552335739136},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.21665352582931519}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7928956747055054},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7316158413887024},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6791467070579529},{"id":"https://openalex.org/C166501710","wikidata":"https://www.wikidata.org/wiki/Q5132476","display_name":"Client-side encryption","level":4,"score":0.5904863476753235},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.5900813341140747},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.5868673920631409},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5861515998840332},{"id":"https://openalex.org/C2776861820","wikidata":"https://www.wikidata.org/wiki/Q7252899","display_name":"Proxy re-encryption","level":4,"score":0.5833398699760437},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.5592054128646851},{"id":"https://openalex.org/C18319499","wikidata":"https://www.wikidata.org/wiki/Q5448402","display_name":"Filesystem-level encryption","level":4,"score":0.5433886051177979},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5143781304359436},{"id":"https://openalex.org/C158215988","wikidata":"https://www.wikidata.org/wiki/Q4637271","display_name":"40-bit encryption","level":3,"score":0.48878857493400574},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.4765903651714325},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4187990427017212},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.34909552335739136},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.21665352582931519}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3590837.3590904","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3590837.3590904","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th International Conference on Information Management &amp; Machine Intelligence","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6499999761581421}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W2980614633","https://openalex.org/W3007799372","https://openalex.org/W3014632882","https://openalex.org/W3118241334","https://openalex.org/W3128779213","https://openalex.org/W3134041340","https://openalex.org/W3159116648","https://openalex.org/W3163875365","https://openalex.org/W3166793278","https://openalex.org/W3170318017","https://openalex.org/W3181325133","https://openalex.org/W3190283749","https://openalex.org/W3198924380","https://openalex.org/W3214332983","https://openalex.org/W4205228394","https://openalex.org/W4210496363","https://openalex.org/W4210884937","https://openalex.org/W4212775964","https://openalex.org/W4285131750","https://openalex.org/W4285262410","https://openalex.org/W4285295442","https://openalex.org/W4285821855","https://openalex.org/W4292387385","https://openalex.org/W4293499144","https://openalex.org/W4312600318"],"related_works":["https://openalex.org/W2624091145","https://openalex.org/W4309584611","https://openalex.org/W4308784203","https://openalex.org/W1025240641","https://openalex.org/W3118757263","https://openalex.org/W2034108503","https://openalex.org/W2094124631","https://openalex.org/W2380438667","https://openalex.org/W3022099831","https://openalex.org/W2289583906"],"abstract_inverted_index":{"The":[0,21,34,274],"server":[1,291],"in":[2,95,106,126,136,139,246],"a":[3,9,30,96,107,124,127,140,160,169,251],"cloud":[4,22,46,55,65,270],"storage":[5,24,56,205],"system":[6,97],"can":[7,180],"hold":[8],"very":[10],"large":[11],"amount":[12],"of":[13,45,59,75,87,98,219,253,276,306],"Personal":[14],"health":[15],"records":[16],"(PHR)":[17],"data":[18,176,195,242,265,272,296],"or":[19,204],"information.":[20],"platform's":[23],"servers":[25,138],"provide":[26],"archival":[27],"services":[28],"for":[29,42,123,303],"lengthy":[31],"time":[32],"frame.":[33],"third":[35],"party":[36],"basically":[37],"functions":[38],"as":[39,287],"an":[40],"administrator":[41],"the":[43,60,64,81,88,117,131,143,188,193,202,225,234,262,268,277,280,304],"efficiency":[44],"storage.":[47],"This":[48],"is":[49,66,69,103,113,168,208],"why":[50],"we're":[51],"starting":[52],"up":[53],"our":[54],"service.":[57],"One":[58],"biggest":[61],"difficulties":[62],"with":[63],"that":[67,111],"it":[68,199],"vulnerable":[70],"to":[71,79,110,115,172,201,223,258],"hacking.":[72],"Ordinary":[73],"methods":[74],"encryption":[76],"are":[77,93,134,147,299],"used":[78,114],"safeguard":[80],"information":[82],"from":[83],"prying":[84],"eyes.":[85],"All":[86],"secret":[89],"messages'":[90],"code":[91,119],"words":[92],"kept":[94],"varying":[99],"symbols.":[100],"Deletion":[101],"coding":[102],"carried":[104],"out":[105],"manner":[108],"analogous":[109],"which":[112],"calculate":[116],"unequal":[118],"word":[120],"cyphers":[121],"required":[122],"communication":[125],"distributed":[128],"setting.":[129],"When":[130,183],"message":[132],"symbols":[133],"stored":[135],"different":[137],"dispersed":[141],"environment,":[142],"cryptographic":[144],"term":[145],"signs":[146],"also":[148],"calculated":[149],"independently":[150],"and":[151,158,260,294],"stored.":[152],"For":[153],"this":[154,247],"reason,":[155],"we":[156,221,249],"introduce":[157],"include":[159],"threshold":[161],"proxy":[162,189],"re-encryption":[163,190],"scheme.":[164],"Fully":[165],"Homomorphic":[166],"Encryption":[167,229],"promising":[170],"approach":[171],"securing":[173],"sensitive":[174,269],"PHR":[175,186,194,241,264,271,295],"by":[177,240],"limiting":[178],"who":[179],"view":[181],"it.":[182],"sending":[184,198],"encrypted":[185],"data,":[187],"mechanism":[191],"re-encrypts":[192],"again":[196],"before":[197],"on":[200,233],"recipient":[203],"server.":[206],"Allocation":[207],"completed":[209],"when":[210,283],"secure":[211],"access":[212,261],"control":[213,257],"has":[214],"maximised":[215],"performance.":[216],"In":[217],"light":[218],"this,":[220],"expect":[222],"see":[224],"Schmidt-Samoa":[226],"Public":[227],"Key":[228],"(SSPKE)":[230],"method":[231],"developed":[232],"Enhanced":[235],"v":[236],"Boosting":[237],"Algorithm":[238],"(EBA)":[239],"Hiding":[243],"Architecture.":[244],"Additionally,":[245],"initiative,":[248],"employ":[250],"procedure":[252],"multi-party":[254],"protocol":[255],"admission":[256],"operate":[259],"user's":[263],"without":[266],"jeopardising":[267],"privacy.":[273],"results":[275],"experiments":[278],"show":[279],"beneficial":[281],"effect":[282],"various":[284],"metrics,":[285],"such":[286],"total":[288],"processing":[289],"time,":[290,293],"response":[292],"decomposition":[297],"rate,":[298],"taken":[300],"into":[301],"account":[302],"application":[305],"PHR.":[307]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
