{"id":"https://openalex.org/W4379184389","doi":"https://doi.org/10.1186/s42400-023-00146-z","title":"Rainbow: reliable personally identifiable information retrieval across multi-cloud","display_name":"Rainbow: reliable personally identifiable information retrieval across multi-cloud","publication_year":2023,"publication_date":"2023-06-03","ids":{"openalex":"https://openalex.org/W4379184389","doi":"https://doi.org/10.1186/s42400-023-00146-z","pmid":"https://pubmed.ncbi.nlm.nih.gov/37304830"},"language":"en","primary_location":{"id":"doi:10.1186/s42400-023-00146-z","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-023-00146-z","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-023-00146-z","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj","pubmed"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-023-00146-z","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5068836080","display_name":"Zishuai Song","orcid":"https://orcid.org/0000-0001-7291-6526"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zishuai Song","raw_affiliation_strings":["School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, No. 19 Shucun Road, Haidian District, Beijing, 100084 China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, No. 19 Shucun Road, Haidian District, Beijing, 100084, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, No. 19 Shucun Road, Haidian District, Beijing, 100084 China","institution_ids":["https://openalex.org/I4210156404"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, No. 19 Shucun Road, Haidian District, Beijing, 100084, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063399027","display_name":"Hui Ma","orcid":"https://orcid.org/0000-0001-8359-5158"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hui Ma","raw_affiliation_strings":["School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, No. 19 Shucun Road, Haidian District, Beijing, 100084 China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, No. 19 Shucun Road, Haidian District, Beijing, 100084, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, No. 19 Shucun Road, Haidian District, Beijing, 100084 China","institution_ids":["https://openalex.org/I4210156404"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, No. 19 Shucun Road, Haidian District, Beijing, 100084, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065503504","display_name":"Shuzhou Sun","orcid":"https://orcid.org/0000-0002-6104-8046"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shuzhou Sun","raw_affiliation_strings":["School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, No. 19 Shucun Road, Haidian District, Beijing, 100084 China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, No. 19 Shucun Road, Haidian District, Beijing, 100084, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, No. 19 Shucun Road, Haidian District, Beijing, 100084 China","institution_ids":["https://openalex.org/I4210156404"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, No. 19 Shucun Road, Haidian District, Beijing, 100084, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101880825","display_name":"Yansen Xin","orcid":"https://orcid.org/0009-0004-8869-4533"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yansen Xin","raw_affiliation_strings":["School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, No. 19 Shucun Road, Haidian District, Beijing, 100084 China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, No. 19 Shucun Road, Haidian District, Beijing, 100084, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, No. 19 Shucun Road, Haidian District, Beijing, 100084 China","institution_ids":["https://openalex.org/I4210156404"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, No. 19 Shucun Road, Haidian District, Beijing, 100084, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100422048","display_name":"Rui Zhang","orcid":"https://orcid.org/0000-0002-4221-1311"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Rui Zhang","raw_affiliation_strings":["School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, No. 19 Shucun Road, Haidian District, Beijing, 100084 China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, No. 19 Shucun Road, Haidian District, Beijing, 100084 China","institution_ids":["https://openalex.org/I4210156404"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5068836080"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210156404","https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":1.2011,"has_fulltext":true,"cited_by_count":7,"citation_normalized_percentile":{"value":0.82774062,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"6","issue":"1","first_page":"19","last_page":"19"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.995199978351593,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8029757738113403},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.7097453474998474},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7062301635742188},{"id":"https://openalex.org/keywords/revocation","display_name":"Revocation","score":0.606372594833374},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6018438339233398},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5824254155158997},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.5627160668373108},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.5405074954032898},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.44928646087646484},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2918992042541504},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.23965799808502197},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.10281655192375183}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8029757738113403},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.7097453474998474},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7062301635742188},{"id":"https://openalex.org/C2775892892","wikidata":"https://www.wikidata.org/wiki/Q6509517","display_name":"Revocation","level":3,"score":0.606372594833374},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6018438339233398},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5824254155158997},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.5627160668373108},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.5405074954032898},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.44928646087646484},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2918992042541504},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.23965799808502197},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10281655192375183},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1186/s42400-023-00146-z","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-023-00146-z","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-023-00146-z","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},{"id":"pmid:37304830","is_oa":false,"landing_page_url":"https://pubmed.ncbi.nlm.nih.gov/37304830","pdf_url":null,"source":{"id":"https://openalex.org/S4306525036","display_name":"PubMed","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1299303238","host_organization_name":"National Institutes of Health","host_organization_lineage":["https://openalex.org/I1299303238"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":null},{"id":"pmh:oai:pubmedcentral.nih.gov:10238253","is_oa":true,"landing_page_url":"https://www.ncbi.nlm.nih.gov/pmc/articles/10238253","pdf_url":"https://pmc.ncbi.nlm.nih.gov/articles/PMC10238253/pdf/42400_2023_Article_146.pdf","source":{"id":"https://openalex.org/S2764455111","display_name":"PubMed Central","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1299303238","host_organization_name":"National Institutes of Health","host_organization_lineage":["https://openalex.org/I1299303238"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecur (Singap)","raw_type":"Text"},{"id":"pmh:oai:doaj.org/article:6138e7a5978f4f49b71f5221fa73c33e","is_oa":true,"landing_page_url":"https://doaj.org/article/6138e7a5978f4f49b71f5221fa73c33e","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecurity, Vol 6, Iss 1, Pp 1-21 (2023)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s42400-023-00146-z","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-023-00146-z","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-023-00146-z","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.6499999761581421}],"awards":[{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3252164262","display_name":null,"funder_award_id":"62172404","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5043465742","display_name":null,"funder_award_id":"61972094","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5326810415","display_name":null,"funder_award_id":"62172411","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7705646799","display_name":null,"funder_award_id":"6217241","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8756898953","display_name":null,"funder_award_id":"1972094","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4379184389.pdf"},"referenced_works_count":27,"referenced_works":["https://openalex.org/W177444027","https://openalex.org/W1498316612","https://openalex.org/W1510795740","https://openalex.org/W1529664688","https://openalex.org/W1531898543","https://openalex.org/W1553083934","https://openalex.org/W1595022482","https://openalex.org/W1610688607","https://openalex.org/W1885156594","https://openalex.org/W1974267799","https://openalex.org/W2066866752","https://openalex.org/W2076046175","https://openalex.org/W2108072891","https://openalex.org/W2116556172","https://openalex.org/W2138001464","https://openalex.org/W2161214158","https://openalex.org/W2164090669","https://openalex.org/W2290401356","https://openalex.org/W2295776812","https://openalex.org/W2322315143","https://openalex.org/W2342723683","https://openalex.org/W2461360072","https://openalex.org/W2519173433","https://openalex.org/W2899601388","https://openalex.org/W2955375055","https://openalex.org/W3109366984","https://openalex.org/W3159116648"],"related_works":["https://openalex.org/W2600062742","https://openalex.org/W2321709401","https://openalex.org/W2004104370","https://openalex.org/W2898075319","https://openalex.org/W3144137556","https://openalex.org/W2185488310","https://openalex.org/W3148042169","https://openalex.org/W2810680364","https://openalex.org/W2184014873","https://openalex.org/W1667647204"],"abstract_inverted_index":{"Personally":[0],"identifiable":[1],"information":[2,7],"(PII)":[3],"refers":[4],"to":[5,10,23,26,44,54,65,87,110,127,150,156,171,210,217],"any":[6],"that":[8,112,263],"links":[9],"an":[11,180],"individual.":[12],"Sharing":[13],"PII":[14,34,83,137,168],"is":[15,40,70,100,108,148,265],"extremely":[16],"useful":[17],"in":[18,82,227,249],"public":[19],"affairs":[20],"yet":[21],"hard":[22],"implement":[24],"due":[25],"the":[27,71,133,173,232],"worries":[28],"about":[29],"privacy":[30,72],"violations.":[31],"Building":[32],"a":[33,41,56,103,140,164],"retrieval":[35,169],"service":[36],"over":[37],"multi-cloud,":[38],"which":[39,191],"modern":[42],"strategy":[43],"make":[45],"services":[46],"stable":[47],"where":[48],"multiple":[49,207,238],"servers":[50,122,208],"are":[51,123,146],"deployed,":[52],"seems":[53],"be":[55,66,85,115],"promising":[57],"solution.":[58],"However,":[59],"three":[60],"major":[61],"technical":[62],"challenges":[63],"remain":[64],"solved.":[67],"The":[68],"first":[69],"and":[73,96,138,166,196,204,222,244,247,254,259,267],"access":[74,92,98,198],"control":[75,99],"of":[76,135],"PII.":[77],"In":[78,158,176],"fact,":[79],"each":[80],"entry":[81],"can":[84,114],"shared":[86],"different":[88,91],"users":[89,113],"with":[90,220],"rights.":[93],"Hence,":[94],"flexible":[95,195],"fine-grained":[97,197],"needed.":[101],"Second,":[102],"reliable":[104,200],"user":[105,202],"revocation":[106,203],"mechanism":[107],"required":[109],"ensure":[111],"revoked":[116],"efficiently,":[117],"even":[118],"if":[119],"few":[120],"cloud":[121,225],"compromised":[124],"or":[125],"collapse,":[126],"avoid":[128],"data":[129,145,193],"leakage.":[130],"Third,":[131],"verifying":[132],"correctness":[134],"received":[136],"locating":[139],"misbehaved":[141],"server":[142],"when":[143],"wrong":[144],"returned":[147],"crucial":[149],"guarantee":[151],"user's":[152],"privacy,":[153,194],"but":[154],"challenging":[155],"realize.":[157],"this":[159],"paper,":[160],"we":[161,178,214,234],"propose":[162],"Rainbow,":[163],"secure":[165,266],"practical":[167],"scheme":[170],"solve":[172],"above":[174],"issues.":[175],"particular,":[177],"design":[179],"important":[181],"cryptographic":[182],"tool,":[183],"called":[184],"Reliable":[185],"Outsourced":[186],"Attribute":[187],"Based":[188],"Encryption":[189],"(ROABE)":[190],"provides":[192],"control,":[199],"immediate":[201],"verification":[205],"for":[206],"simultaneously,":[209],"support":[211],"Rainbow.":[212],"Moreover,":[213],"present":[215],"how":[216],"build":[218],"Rainbow":[219,236,264],"ROABE":[221],"several":[223],"necessary":[224],"techniques":[226],"real":[228],"world.":[229],"To":[230],"evaluate":[231],"performance,":[233],"deploy":[235],"on":[237,251],"mainstream":[239],"clouds,":[240],"namely,":[241],"AWS,":[242],"GCP":[243],"Microsoft":[245],"Azure,":[246],"experiment":[248],"browsers":[250],"mobile":[252],"phones":[253],"computers.":[255],"Both":[256],"theoretical":[257],"analysis":[258],"experimental":[260],"results":[261],"indicate":[262],"practical.":[268]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1}],"updated_date":"2026-04-18T07:56:08.524223","created_date":"2025-10-10T00:00:00"}
