{"id":"https://openalex.org/W2904723460","doi":"https://doi.org/10.1504/ijhpsa.2016.10001573","title":"A secure access and associate deleting scheme for multi-replica in multi-cloud environment","display_name":"A secure access and associate deleting scheme for multi-replica in multi-cloud environment","publication_year":2016,"publication_date":"2016-01-01","ids":{"openalex":"https://openalex.org/W2904723460","doi":"https://doi.org/10.1504/ijhpsa.2016.10001573","mag":"2904723460"},"language":"en","primary_location":{"id":"doi:10.1504/ijhpsa.2016.10001573","is_oa":false,"landing_page_url":"https://doi.org/10.1504/ijhpsa.2016.10001573","pdf_url":null,"source":{"id":"https://openalex.org/S174117138","display_name":"International Journal of High Performance Systems Architecture","issn_l":"1751-6528","issn":["1751-6528","1751-6536"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310317825","host_organization_name":"Inderscience Publishers","host_organization_lineage":["https://openalex.org/P4310317825"],"host_organization_lineage_names":["Inderscience Publishers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of High Performance Systems Architecture","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5060659901","display_name":"Jinbo Xiong","orcid":"https://orcid.org/0000-0001-9985-1953"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jinbo Xiong","raw_affiliation_strings":["Faculty of Software, Fujian Normal University, Fuzhou, China; Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, China","Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, China","Faculty of Software, Fujian Normal University, Fuzhou, China"],"affiliations":[{"raw_affiliation_string":"Faculty of Software, Fujian Normal University, Fuzhou, China; Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"Faculty of Software, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018642252","display_name":"Biao Jin","orcid":"https://orcid.org/0000-0003-3401-1691"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Biao Jin","raw_affiliation_strings":["Fujian Engineering Research Center of Public Service Big Data Mining and Application, Fuzhou, China"],"affiliations":[{"raw_affiliation_string":"Fujian Engineering Research Center of Public Service Big Data Mining and Application, Fuzhou, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100362337","display_name":"Xuan Li","orcid":"https://orcid.org/0000-0002-8941-2575"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xuan Li","raw_affiliation_strings":["Fujian Engineering Research Center of Public Service Big Data Mining and Application, Fuzhou, China"],"affiliations":[{"raw_affiliation_string":"Fujian Engineering Research Center of Public Service Big Data Mining and Application, Fuzhou, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100320635","display_name":"Yuanyuan Zhang","orcid":"https://orcid.org/0000-0001-9738-604X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yuanyuan Zhang","raw_affiliation_strings":["Fujian Engineering Research Center of Public Service Big Data Mining and Application, Fuzhou, China"],"affiliations":[{"raw_affiliation_string":"Fujian Engineering Research Center of Public Service Big Data Mining and Application, Fuzhou, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100630566","display_name":"Suping Li","orcid":"https://orcid.org/0000-0002-0294-8861"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Suping Li","raw_affiliation_strings":["Faculty of Software, Fujian Normal University, Fuzhou, China; Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, China","Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, China","Faculty of Software, Fujian Normal University, Fuzhou, China"],"affiliations":[{"raw_affiliation_string":"Faculty of Software, Fujian Normal University, Fuzhou, China; Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"Faculty of Software, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5060659901"],"corresponding_institution_ids":["https://openalex.org/I111753288"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.41735623,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"6","issue":"3","first_page":"143","last_page":"143"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9940000176429749,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9940000176429749,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9593999981880188,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/replica","display_name":"Replica","score":0.9070166945457458},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8785378336906433},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7796457409858704},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6827974915504456},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5873286128044128},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.5651729106903076},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.5137296915054321},{"id":"https://openalex.org/keywords/tree","display_name":"Tree (set theory)","score":0.48047155141830444},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.47579798102378845},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.4509560167789459},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.44792860746383667},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4410875141620636},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4330659806728363},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.14388373494148254}],"concepts":[{"id":"https://openalex.org/C2775937380","wikidata":"https://www.wikidata.org/wiki/Q1232589","display_name":"Replica","level":2,"score":0.9070166945457458},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8785378336906433},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7796457409858704},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6827974915504456},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5873286128044128},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.5651729106903076},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5137296915054321},{"id":"https://openalex.org/C113174947","wikidata":"https://www.wikidata.org/wiki/Q2859736","display_name":"Tree (set theory)","level":2,"score":0.48047155141830444},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.47579798102378845},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.4509560167789459},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.44792860746383667},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4410875141620636},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4330659806728363},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.14388373494148254},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1504/ijhpsa.2016.10001573","is_oa":false,"landing_page_url":"https://doi.org/10.1504/ijhpsa.2016.10001573","pdf_url":null,"source":{"id":"https://openalex.org/S174117138","display_name":"International Journal of High Performance Systems Architecture","issn_l":"1751-6528","issn":["1751-6528","1751-6536"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310317825","host_organization_name":"Inderscience Publishers","host_organization_lineage":["https://openalex.org/P4310317825"],"host_organization_lineage_names":["Inderscience Publishers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of High Performance Systems Architecture","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W3013979739","https://openalex.org/W2655578171","https://openalex.org/W2577913821","https://openalex.org/W2953070151","https://openalex.org/W4296976839","https://openalex.org/W2460131733","https://openalex.org/W2372946558","https://openalex.org/W2086477304","https://openalex.org/W4285552821","https://openalex.org/W2170039103"],"abstract_inverted_index":{"With":[0],"the":[1,24,39,68,124,131,170],"rapid":[2],"development":[3],"of":[4],"cloud":[5],"services":[6],"in":[7,20,71,86,160],"multi-cloud":[8,21,87,161],"environment,":[9,88],"it":[10,42],"is":[11,28,90,127,152,174],"convenient":[12],"to":[13,30,46,54,66,129,154],"generate":[14],"multi-replica":[15,27,84],"for":[16,58,83],"user's":[17,59],"data":[18,32,49,60,125,147,158],"stored":[19],"servers.":[22],"On":[23],"one":[25],"hand,":[26,41],"able":[29,128,153],"improve":[31],"availability":[33],"and":[34,50,56,61,79,98,134,165,176],"users'":[35],"experience.":[36],"But":[37],"on":[38,92],"other":[40,136],"becomes":[43],"increasingly":[44],"easy":[45],"disclose":[47],"sensitive":[48],"brings":[51],"serious":[52],"challenges":[53],"security":[55,166],"privacy":[57],"its":[62],"multi-replica.":[63],"In":[64],"order":[65],"tackle":[67],"above":[69],"issues,":[70],"this":[72],"paper,":[73],"we":[74],"propose":[75,145],"a":[76,104,146],"secure":[77],"access":[78],"associate":[80,155],"deleting":[81],"scheme":[82,173],"(MADS)":[85],"which":[89,151],"based":[91],"symmetric":[93],"encryption":[94,97],"algorithm,":[95],"attribute-based":[96],"replica":[99,148],"location":[100],"technology.":[101],"We":[102,143],"construct":[103],"novel":[105],"multi-layered":[106],"key":[107,112,118,133],"structure,":[108],"called":[109],"multi-way":[110],"search":[111],"tree":[113,141],"(MSKT)":[114],"that":[115,169],"ensures":[116],"no":[117],"material":[119],"will":[120],"be":[121],"revealed,":[122],"yet":[123],"owner":[126],"control":[130],"master":[132],"manage":[135],"keys":[137],"by":[138],"performing":[139],"some":[140],"operations.":[142],"also":[144],"associated":[149],"model,":[150],"all":[156],"he":[157],"replicas":[159],"environment.":[162],"Comprehensive":[163],"comparison":[164],"analysis":[167],"demonstrate":[168],"proposed":[171],"MADS":[172],"effective":[175],"secure.":[177]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
