{"id":"https://openalex.org/W4399144493","doi":"https://doi.org/10.1145/3654823.3654836","title":"Ensuring Efficient and Secure Updatable Encryption in Cloud Storage","display_name":"Ensuring Efficient and Secure Updatable Encryption in Cloud Storage","publication_year":2024,"publication_date":"2024-03-22","ids":{"openalex":"https://openalex.org/W4399144493","doi":"https://doi.org/10.1145/3654823.3654836"},"language":"en","primary_location":{"id":"doi:10.1145/3654823.3654836","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3654823.3654836","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 3rd Asia Conference on Algorithms, Computing and Machine Learning","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5037724499","display_name":"Peixin Liu","orcid":"https://orcid.org/0009-0001-5393-4494"},"institutions":[{"id":"https://openalex.org/I66867065","display_name":"East China Normal University","ror":"https://ror.org/02n96ep67","country_code":"CN","type":"education","lineage":["https://openalex.org/I66867065"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Peixin Liu","raw_affiliation_strings":["Software Engineering Institute, East China Normal University, Shanghai, China, China"],"raw_orcid":"https://orcid.org/0009-0001-5393-4494","affiliations":[{"raw_affiliation_string":"Software Engineering Institute, East China Normal University, Shanghai, China, China","institution_ids":["https://openalex.org/I66867065"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5037724499"],"corresponding_institution_ids":["https://openalex.org/I66867065"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.05770022,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"67","last_page":"70"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.993399977684021,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.816474437713623},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.7725100517272949},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7339134216308594},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6224696040153503},{"id":"https://openalex.org/keywords/upload","display_name":"Upload","score":0.6096464991569519},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.5931497812271118},{"id":"https://openalex.org/keywords/proxy-re-encryption","display_name":"Proxy re-encryption","score":0.5264970660209656},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5102245807647705},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5010850429534912},{"id":"https://openalex.org/keywords/cloud-storage","display_name":"Cloud storage","score":0.4724445939064026},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.4702426791191101},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.2699657082557678},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.16889405250549316}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.816474437713623},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.7725100517272949},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7339134216308594},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6224696040153503},{"id":"https://openalex.org/C71901391","wikidata":"https://www.wikidata.org/wiki/Q7126699","display_name":"Upload","level":2,"score":0.6096464991569519},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.5931497812271118},{"id":"https://openalex.org/C2776861820","wikidata":"https://www.wikidata.org/wiki/Q7252899","display_name":"Proxy re-encryption","level":4,"score":0.5264970660209656},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5102245807647705},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5010850429534912},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.4724445939064026},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.4702426791191101},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2699657082557678},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.16889405250549316}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3654823.3654836","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3654823.3654836","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 3rd Asia Conference on Algorithms, Computing and Machine Learning","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":1,"referenced_works":["https://openalex.org/W2565863608"],"related_works":["https://openalex.org/W2792978874","https://openalex.org/W4223919663","https://openalex.org/W1582239555","https://openalex.org/W1574326402","https://openalex.org/W2982130125","https://openalex.org/W4285255193","https://openalex.org/W4225688985","https://openalex.org/W3031006976","https://openalex.org/W1905687471","https://openalex.org/W2042220809"],"abstract_inverted_index":{"With":[0],"the":[1,21,32,45,48,55,68,74,94,111,125,135,144],"widespread":[2],"adoption":[3],"of":[4,24,34,47,137,146],"cloud":[5,18],"computing,":[6],"individuals":[7],"and":[8,54,128,134],"companies":[9],"are":[10],"increasingly":[11],"storing":[12],"data":[13,72],"in":[14,42,93,119],"encrypted":[15],"form":[16],"on":[17,124],"servers.":[19],"However,":[20],"continuous":[22],"evolution":[23],"attack":[25],"methods":[26],"poses":[27],"a":[28,40,59,86],"persistent":[29],"threat":[30],"to":[31,61,70,73],"security":[33],"user":[35],"keys.":[36],"This":[37,65],"paper":[38],"proposes":[39],"model":[41],"which,":[43],"with":[44,143],"involvement":[46],"server,":[49],"users":[50],"periodically":[51],"rotate":[52],"keys,":[53],"server":[56],"acts":[57],"as":[58],"proxy":[60],"facilitate":[62],"ciphertext":[63,103,139],"updates.":[64],"approach":[66],"eliminates":[67],"need":[69],"download":[71],"local":[75],"environment":[76],"for":[77,102],"updates":[78,104],"before":[79],"re-uploading,":[80],"thereby":[81],"saving":[82],"bandwidth.":[83],"We":[84],"present":[85],"specific":[87],"encryption":[88],"scheme":[89],"that":[90],"ensures":[91],"even":[92],"transmission":[95],"through":[96],"an":[97],"insecure":[98],"channel,":[99],"tokens":[100],"used":[101,127],"do":[105],"not":[106,141],"disclose":[107],"key":[108],"information":[109],"from":[110],"previous":[112],"or":[113],"subsequent":[114],"epochs\u2014a":[115],"concept":[116],"previously":[117],"unrealizable":[118],"practice.":[120],"Our":[121],"solution":[122],"relies":[123],"widely":[126],"simple":[129],"DDH":[130],"(Decisional":[131],"Diffie-Hellman)":[132],"assumption,":[133],"length":[136],"our":[138],"does":[140],"increase":[142],"progression":[145],"epochs.":[147]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
