{"id":"https://openalex.org/W2102100462","doi":"https://doi.org/10.1186/s13677-015-0034-8","title":"Attribute-based data retrieval with semantic keyword search for e-health cloud","display_name":"Attribute-based data retrieval with semantic keyword search for e-health cloud","publication_year":2015,"publication_date":"2015-05-16","ids":{"openalex":"https://openalex.org/W2102100462","doi":"https://doi.org/10.1186/s13677-015-0034-8","mag":"2102100462"},"language":"en","primary_location":{"id":"doi:10.1186/s13677-015-0034-8","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-015-0034-8","pdf_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-015-0034-8","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-015-0034-8","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100397670","display_name":"Yang Yang","orcid":"https://orcid.org/0000-0002-7891-2670"},"institutions":[{"id":"https://openalex.org/I80947539","display_name":"Fuzhou University","ror":"https://ror.org/011xvna82","country_code":"CN","type":"education","lineage":["https://openalex.org/I80947539"]},{"id":"https://openalex.org/I4210142126","display_name":"Jiangsu Provincial Key Laboratory of Network and Information Security","ror":"https://ror.org/03jan5912","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210142126"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yang Yang","raw_affiliation_strings":["College of Mathematics and Computer Science, Fuzhou University, Fuzhou 350108, China","Key Lab of Information Security of Networks Systems, Fuzhou University, Fujian Province, China 350108, China","College of Mathematics and Computer Science, Fuzhou University, Fuzhou, 350108, China"],"affiliations":[{"raw_affiliation_string":"College of Mathematics and Computer Science, Fuzhou University, Fuzhou 350108, China","institution_ids":["https://openalex.org/I80947539"]},{"raw_affiliation_string":"Key Lab of Information Security of Networks Systems, Fuzhou University, Fujian Province, China 350108, China","institution_ids":["https://openalex.org/I4210142126"]},{"raw_affiliation_string":"College of Mathematics and Computer Science, Fuzhou University, Fuzhou, 350108, China","institution_ids":["https://openalex.org/I80947539"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5100397670"],"corresponding_institution_ids":["https://openalex.org/I4210142126","https://openalex.org/I80947539"],"apc_list":{"value":990,"currency":"GBP","value_usd":1214},"apc_paid":{"value":990,"currency":"GBP","value_usd":1214},"fwci":5.3411,"has_fulltext":true,"cited_by_count":39,"citation_normalized_percentile":{"value":0.95777613,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"4","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9879000186920166,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9872999787330627,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8603776097297668},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8039505481719971},{"id":"https://openalex.org/keywords/synonym","display_name":"Synonym (taxonomy)","score":0.6788729429244995},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.5948006510734558},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5928521156311035},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.5719835162162781},{"id":"https://openalex.org/keywords/client-side-encryption","display_name":"Client-side encryption","score":0.5455346703529358},{"id":"https://openalex.org/keywords/cloud-storage","display_name":"Cloud storage","score":0.5183373689651489},{"id":"https://openalex.org/keywords/keyword-search","display_name":"Keyword search","score":0.5141142010688782},{"id":"https://openalex.org/keywords/communication-source","display_name":"Communication source","score":0.5020325183868408},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.49895453453063965},{"id":"https://openalex.org/keywords/revocation","display_name":"Revocation","score":0.47618213295936584},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.33560746908187866},{"id":"https://openalex.org/keywords/on-the-fly-encryption","display_name":"On-the-fly encryption","score":0.32949668169021606},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.24117037653923035},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.21870732307434082},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.1426256000995636},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.06932663917541504}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8603776097297668},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8039505481719971},{"id":"https://openalex.org/C173483453","wikidata":"https://www.wikidata.org/wiki/Q1040689","display_name":"Synonym (taxonomy)","level":3,"score":0.6788729429244995},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.5948006510734558},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5928521156311035},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.5719835162162781},{"id":"https://openalex.org/C166501710","wikidata":"https://www.wikidata.org/wiki/Q5132476","display_name":"Client-side encryption","level":4,"score":0.5455346703529358},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.5183373689651489},{"id":"https://openalex.org/C2988412617","wikidata":"https://www.wikidata.org/wiki/Q7441656","display_name":"Keyword search","level":2,"score":0.5141142010688782},{"id":"https://openalex.org/C198104137","wikidata":"https://www.wikidata.org/wiki/Q974688","display_name":"Communication source","level":2,"score":0.5020325183868408},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.49895453453063965},{"id":"https://openalex.org/C2775892892","wikidata":"https://www.wikidata.org/wiki/Q6509517","display_name":"Revocation","level":3,"score":0.47618213295936584},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.33560746908187866},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.32949668169021606},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.24117037653923035},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.21870732307434082},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.1426256000995636},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.06932663917541504},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C157369684","wikidata":"https://www.wikidata.org/wiki/Q34740","display_name":"Genus","level":2,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1186/s13677-015-0034-8","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-015-0034-8","pdf_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-015-0034-8","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1186/s13677-015-0034-8","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-015-0034-8","pdf_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-015-0034-8","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.5099999904632568,"id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G1206690776","display_name":null,"funder_award_id":"61472307","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2091573704","display_name":null,"funder_award_id":"61472309","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4083738836","display_name":null,"funder_award_id":"61402112","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4713543433","display_name":null,"funder_award_id":"61402","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2102100462.pdf","grobid_xml":"https://content.openalex.org/works/W2102100462.grobid-xml"},"referenced_works_count":23,"referenced_works":["https://openalex.org/W58219957","https://openalex.org/W165174946","https://openalex.org/W207863463","https://openalex.org/W1498316612","https://openalex.org/W1503404445","https://openalex.org/W1510795740","https://openalex.org/W1517223221","https://openalex.org/W1569795755","https://openalex.org/W1582777245","https://openalex.org/W1898753656","https://openalex.org/W2054701320","https://openalex.org/W2061336256","https://openalex.org/W2062903085","https://openalex.org/W2077128055","https://openalex.org/W2080574324","https://openalex.org/W2085964495","https://openalex.org/W2093175219","https://openalex.org/W2122590785","https://openalex.org/W2161214567","https://openalex.org/W3031045935","https://openalex.org/W3123406994","https://openalex.org/W4237278029","https://openalex.org/W4255763627"],"related_works":["https://openalex.org/W2094124631","https://openalex.org/W4386393431","https://openalex.org/W2739480698","https://openalex.org/W2437686555","https://openalex.org/W2995433735","https://openalex.org/W2900495477","https://openalex.org/W2940791775","https://openalex.org/W2030246973","https://openalex.org/W2549192755","https://openalex.org/W2419194711"],"abstract_inverted_index":{"Data":[0],"retrieval":[1],"on":[2,15,39,47],"encrypted":[3],"documents":[4,24],"is":[5,18,72,84,93,111],"a":[6,19,58,115],"very":[7],"important":[8],"technology":[9,71],"in":[10,86],"cloud":[11],"storage,":[12],"where":[13],"encryption":[14,36,63,69,99],"sensitive":[16],"data":[17],"necessary":[20],"operation":[21],"to":[22,30,56,74],"protect":[23],"privacy":[25],"before":[26],"they":[27],"are":[28],"outsourced":[29],"cloud.":[31],"Most":[32],"of":[33,109],"existing":[34],"searchable":[35,62,98],"schemes":[37],"concentrate":[38],"single-user":[40],"scenario.":[41],"In":[42],"this":[43],"paper,":[44],"we":[45],"focus":[46],"the":[48,80,87],"multiple":[49,52],"sender":[50],"and":[51,79],"user":[53,123],"application":[54],"scenario":[55],"provide":[57],"flexible":[59],"search":[60,83,103],"authorization":[61],"(SE)":[64],"scheme.":[65,89],"The":[66,90,106],"attribute":[67,96],"based":[68,97],"(ABE)":[70],"used":[73],"support":[75],"fine-grained":[76],"access":[77],"control":[78],"synonym":[81,101],"keyword":[82,102],"enabled":[85],"new":[88,91],"primitive":[92],"named":[94],"as":[95],"with":[100,114],"function":[104],"(SK-ABSE).":[105],"formally":[107],"definition":[108],"SK-ABSE":[110],"given":[112],"together":[113],"concrete":[116],"construction.":[117],"This":[118],"scheme":[119],"also":[120],"enables":[121],"convenient":[122],"revocation":[124],"mechanism.":[125]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":7},{"year":2019,"cited_by_count":6},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":7},{"year":2016,"cited_by_count":2}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
