{"id":"https://openalex.org/W2259824353","doi":"https://doi.org/10.1145/2833312.2849559","title":"A cloud security framework for a data centric WSN application","display_name":"A cloud security framework for a data centric WSN application","publication_year":2016,"publication_date":"2016-01-04","ids":{"openalex":"https://openalex.org/W2259824353","doi":"https://doi.org/10.1145/2833312.2849559","mag":"2259824353"},"language":"en","primary_location":{"id":"doi:10.1145/2833312.2849559","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2833312.2849559","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 17th International Conference on Distributed Computing and Networking","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5029814572","display_name":"Sayantani Saha","orcid":"https://orcid.org/0000-0002-2091-6310"},"institutions":[{"id":"https://openalex.org/I170979836","display_name":"Jadavpur University","ror":"https://ror.org/02af4h012","country_code":"IN","type":"education","lineage":["https://openalex.org/I170979836"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Sayantani Saha","raw_affiliation_strings":["Jadavpur University, Kolkata, India"],"affiliations":[{"raw_affiliation_string":"Jadavpur University, Kolkata, India","institution_ids":["https://openalex.org/I170979836"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071662142","display_name":"Rounak Das","orcid":null},"institutions":[{"id":"https://openalex.org/I170979836","display_name":"Jadavpur University","ror":"https://ror.org/02af4h012","country_code":"IN","type":"education","lineage":["https://openalex.org/I170979836"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Rounak Das","raw_affiliation_strings":["Jadavpur University, Kolkata, India"],"affiliations":[{"raw_affiliation_string":"Jadavpur University, Kolkata, India","institution_ids":["https://openalex.org/I170979836"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036105393","display_name":"Suman Datta","orcid":"https://orcid.org/0000-0001-6044-5173"},"institutions":[{"id":"https://openalex.org/I170979836","display_name":"Jadavpur University","ror":"https://ror.org/02af4h012","country_code":"IN","type":"education","lineage":["https://openalex.org/I170979836"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Suman Datta","raw_affiliation_strings":["Jadavpur University, Kolkata, India"],"affiliations":[{"raw_affiliation_string":"Jadavpur University, Kolkata, India","institution_ids":["https://openalex.org/I170979836"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5007628003","display_name":"Sarmistha Neogy","orcid":"https://orcid.org/0000-0003-1497-671X"},"institutions":[{"id":"https://openalex.org/I170979836","display_name":"Jadavpur University","ror":"https://ror.org/02af4h012","country_code":"IN","type":"education","lineage":["https://openalex.org/I170979836"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Sarmistha Neogy","raw_affiliation_strings":["Jadavpur University, Kolkata, India"],"affiliations":[{"raw_affiliation_string":"Jadavpur University, Kolkata, India","institution_ids":["https://openalex.org/I170979836"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5029814572"],"corresponding_institution_ids":["https://openalex.org/I170979836"],"apc_list":null,"apc_paid":null,"fwci":7.2984,"has_fulltext":false,"cited_by_count":17,"citation_normalized_percentile":{"value":0.96847627,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8239980936050415},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7785588502883911},{"id":"https://openalex.org/keywords/interoperability","display_name":"Interoperability","score":0.642836332321167},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.5921556353569031},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.536644697189331},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.52139812707901},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.5128688812255859},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.5102324485778809},{"id":"https://openalex.org/keywords/data-access","display_name":"Data access","score":0.48516422510147095},{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.44123023748397827},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.3208163380622864},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.2868892550468445},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.1580176055431366},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.12353909015655518}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8239980936050415},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7785588502883911},{"id":"https://openalex.org/C20136886","wikidata":"https://www.wikidata.org/wiki/Q749647","display_name":"Interoperability","level":2,"score":0.642836332321167},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.5921556353569031},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.536644697189331},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.52139812707901},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.5128688812255859},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.5102324485778809},{"id":"https://openalex.org/C47487241","wikidata":"https://www.wikidata.org/wiki/Q5227230","display_name":"Data access","level":2,"score":0.48516422510147095},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.44123023748397827},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.3208163380622864},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.2868892550468445},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.1580176055431366},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.12353909015655518}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2833312.2849559","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2833312.2849559","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 17th International Conference on Distributed Computing and Networking","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W104209573","https://openalex.org/W171567834","https://openalex.org/W1526000324","https://openalex.org/W1598571272","https://openalex.org/W1616329586","https://openalex.org/W1966161093","https://openalex.org/W1971445561","https://openalex.org/W1972305587","https://openalex.org/W1977222363","https://openalex.org/W1984738100","https://openalex.org/W2014528312","https://openalex.org/W2019672983","https://openalex.org/W2031533839","https://openalex.org/W2068091235","https://openalex.org/W2086896575","https://openalex.org/W2119047901","https://openalex.org/W2138001464","https://openalex.org/W2143116126","https://openalex.org/W2145152409","https://openalex.org/W2152091451","https://openalex.org/W2170111093","https://openalex.org/W4252858030","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2992381278","https://openalex.org/W4385451241","https://openalex.org/W2753722581","https://openalex.org/W4243003508","https://openalex.org/W3168678114","https://openalex.org/W2884784869","https://openalex.org/W4303201737","https://openalex.org/W2256977401","https://openalex.org/W121432690","https://openalex.org/W2117972680"],"abstract_inverted_index":{"Data":[0],"centric":[1,70],"applications":[2,71],"like":[3],"remote":[4,109],"healthcare":[5],"application":[6,92],"designed":[7],"on":[8],"a":[9,30,63,102],"WSN-Cloud":[10],"computing":[11,74],"integrated":[12],"architecture":[13],"requires":[14],"attention":[15],"to":[16,36,90,100,105],"its":[17],"secure":[18,103],"data":[19,26,45,69,81,83],"management":[20],"mechanism.":[21],"A":[22],"huge":[23],"amount":[24],"of":[25,96],"is":[27,99],"generated":[28],"in":[29,72],"health":[31],"care":[32],"application,":[33],"which":[34],"needs":[35],"be":[37],"managed":[38],"efficiently":[39],"so":[40],"that":[41],"fast":[42],"and":[43,47,85],"reliable":[44],"communication":[46],"access":[48,88],"can":[49],"take":[50],"place":[51],"among":[52,115],"the":[53,91,113],"end":[54],"users.":[55],"In":[56],"this":[57,97],"research":[58],"work":[59,98],"we":[60],"have":[61],"proposed":[62],"flexible":[64],"security":[65,78,117],"model":[66,79],"especially":[67],"for":[68],"cloud":[73],"based":[75],"scenario.":[76],"This":[77],"ensures":[80],"confidentiality,":[82],"integrity":[84],"fine":[86],"grained":[87],"control":[89],"data.":[93],"The":[94],"objective":[95],"propose":[101],"framework":[104],"assist":[106],"users":[107],"at":[108],"locations":[110],"by":[111],"considering":[112],"interoperability":[114],"different":[116],"solutions.":[118]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":2}],"updated_date":"2026-02-24T06:16:03.338239","created_date":"2025-10-10T00:00:00"}
