{"id":"https://openalex.org/W2543408143","doi":"https://doi.org/10.1504/ijcc.2016.10000907","title":"Homomorphic encryption applied to secure storage and treatments of data in cloud","display_name":"Homomorphic encryption applied to secure storage and treatments of data in cloud","publication_year":2016,"publication_date":"2016-01-01","ids":{"openalex":"https://openalex.org/W2543408143","doi":"https://doi.org/10.1504/ijcc.2016.10000907","mag":"2543408143"},"language":"en","primary_location":{"id":"doi:10.1504/ijcc.2016.10000907","is_oa":false,"landing_page_url":"https://doi.org/10.1504/ijcc.2016.10000907","pdf_url":null,"source":{"id":"https://openalex.org/S4210172516","display_name":"International Journal of Cloud Computing","issn_l":"2043-9989","issn":["2043-9989","2043-9997"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Cloud Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5113679130","display_name":"Abderrahim Beni Hssane","orcid":null},"institutions":[{"id":"https://openalex.org/I4210125507","display_name":"Chouaib Doukkali University","ror":"https://ror.org/036kgyt43","country_code":"MA","type":"education","lineage":["https://openalex.org/I4210125507"]}],"countries":["MA"],"is_corresponding":true,"raw_author_name":"Abderrahim Beni Hssane","raw_affiliation_strings":["Computer Science Department, Sciences Faculty, Choua\u00c1\u00afb Doukkali University, LAROSERI Laboratory, El Jadida, Morocco"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, Sciences Faculty, Choua\u00c1\u00afb Doukkali University, LAROSERI Laboratory, El Jadida, Morocco","institution_ids":["https://openalex.org/I4210125507"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001534531","display_name":"Khalid El Makkaoui","orcid":"https://orcid.org/0000-0002-9569-9162"},"institutions":[{"id":"https://openalex.org/I4210145365","display_name":"Universit\u00e9 Hassan 1er","ror":"https://ror.org/03cdvht47","country_code":"MA","type":"education","lineage":["https://openalex.org/I4210145365"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Khalid El Makkaoui","raw_affiliation_strings":["Mathematics and Computer Science Department, Sciences and Techniques Faculty, Hassan 1st University, LAVETE Laboratory, Settat, Morocco"],"affiliations":[{"raw_affiliation_string":"Mathematics and Computer Science Department, Sciences and Techniques Faculty, Hassan 1st University, LAVETE Laboratory, Settat, Morocco","institution_ids":["https://openalex.org/I4210145365"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5011832565","display_name":"Abdellah Ezzati","orcid":"https://orcid.org/0000-0002-1456-0661"},"institutions":[{"id":"https://openalex.org/I4210145365","display_name":"Universit\u00e9 Hassan 1er","ror":"https://ror.org/03cdvht47","country_code":"MA","type":"education","lineage":["https://openalex.org/I4210145365"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Abdellah Ezzati","raw_affiliation_strings":["Mathematics and Computer Science Department, Sciences and Techniques Faculty, Hassan 1st University, LAVETE Laboratory, Settat, Morocco"],"affiliations":[{"raw_affiliation_string":"Mathematics and Computer Science Department, Sciences and Techniques Faculty, Hassan 1st University, LAVETE Laboratory, Settat, Morocco","institution_ids":["https://openalex.org/I4210145365"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5113679130"],"corresponding_institution_ids":["https://openalex.org/I4210125507"],"apc_list":null,"apc_paid":null,"fwci":0.4285,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.79384455,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"5","issue":"3","first_page":"207","last_page":"207"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9728999733924866,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9711999893188477,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.8148382902145386},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7542303800582886},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.7515033483505249},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7463107109069824},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7146891355514526},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6231415271759033},{"id":"https://openalex.org/keywords/client-side-encryption","display_name":"Client-side encryption","score":0.5780895352363586},{"id":"https://openalex.org/keywords/cloud-storage","display_name":"Cloud storage","score":0.553903341293335},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.5489665269851685},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.4571135342121124},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4401698410511017},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3953242897987366},{"id":"https://openalex.org/keywords/on-the-fly-encryption","display_name":"On-the-fly encryption","score":0.21921586990356445},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08964714407920837}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.8148382902145386},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7542303800582886},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.7515033483505249},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7463107109069824},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7146891355514526},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6231415271759033},{"id":"https://openalex.org/C166501710","wikidata":"https://www.wikidata.org/wiki/Q5132476","display_name":"Client-side encryption","level":4,"score":0.5780895352363586},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.553903341293335},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.5489665269851685},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.4571135342121124},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4401698410511017},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3953242897987366},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.21921586990356445},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08964714407920837}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1504/ijcc.2016.10000907","is_oa":false,"landing_page_url":"https://doi.org/10.1504/ijcc.2016.10000907","pdf_url":null,"source":{"id":"https://openalex.org/S4210172516","display_name":"International Journal of Cloud Computing","issn_l":"2043-9989","issn":["2043-9989","2043-9997"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Cloud Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5099999904632568,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4319296593","https://openalex.org/W1964796915","https://openalex.org/W1964306602","https://openalex.org/W1702090048","https://openalex.org/W4288324285","https://openalex.org/W4313046019","https://openalex.org/W2953109828","https://openalex.org/W3045127875","https://openalex.org/W2329178507","https://openalex.org/W3116715377"],"abstract_inverted_index":{"With":[0],"the":[1,6,16,24,32,50,82,108,116,132],"emergence":[2],"of":[3,8,79,84,118],"cloud":[4,26,51,98,109],"computing,":[5],"concept":[7],"security":[9],"has":[10],"become":[11],"a":[12,39,77,93],"major":[13,94],"issue.":[14],"Indeed,":[15,81],"key":[17,133],"challenge":[18],"is":[19,38,58,70,92],"to":[20,49,124],"ensure":[21],"customers":[22],"that":[23,73],"selected":[25],"provider":[27],"may":[28],"store":[29],"and":[30,104],"process":[31],"sensitive":[33,86],"data":[34,42,56,65,87,129],"confidentially.":[35],"If":[36],"this":[37,54,71,102,112],"storage":[40],"service,":[41],"can":[43,74],"be":[44,67,75,88],"encrypted":[45,128],"before":[46,61],"sending":[47],"them":[48],"server;":[52],"in":[53,90,96,107,111],"case,":[55],"confidentiality":[57],"assured.":[59],"However,":[60],"performing":[62],"treatments,":[63],"these":[64],"must":[66],"decrypted.":[68],"It":[69],"step":[72],"considered":[76],"breach":[78],"confidentiality.":[80],"fear":[83],"seeing":[85],"processed":[89],"raw":[91],"obstacle":[95,103],"adopting":[97],"services.":[99],"To":[100],"overcome":[101],"strengthen":[105],"confidence":[106],"services,":[110],"paper":[113],"we":[114],"propose":[115],"adoption":[117],"homomorphic":[119],"encryption":[120],"technique":[121],"which":[122],"allows":[123],"perform":[125],"operations":[126],"on":[127],"without":[130],"knowing":[131],"secret.":[134]},"counts_by_year":[{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
