{"id":"https://openalex.org/W4241893311","doi":"https://doi.org/10.1504/ijwmc.2019.097424","title":"An efficient access control scheme based on CP-ABE with supporting attribute change in cloud storage systems","display_name":"An efficient access control scheme based on CP-ABE with supporting attribute change in cloud storage systems","publication_year":2019,"publication_date":"2019-01-01","ids":{"openalex":"https://openalex.org/W4241893311","doi":"https://doi.org/10.1504/ijwmc.2019.097424"},"language":"en","primary_location":{"id":"doi:10.1504/ijwmc.2019.097424","is_oa":true,"landing_page_url":"http://doi.org/10.1504/ijwmc.2019.097424","pdf_url":"https://doi.org/10.1504/ijwmc.2019.097424","source":{"id":"https://openalex.org/S168395412","display_name":"International Journal of Wireless and Mobile Computing","issn_l":"1741-1084","issn":["1741-1084","1741-1092"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310317825","host_organization_name":"Inderscience Publishers","host_organization_lineage":["https://openalex.org/P4310317825"],"host_organization_lineage_names":["Inderscience Publishers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Wireless and Mobile Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://doi.org/10.1504/ijwmc.2019.097424","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100419650","display_name":"Tao Ye","orcid":"https://orcid.org/0000-0002-1814-530X"},"institutions":[{"id":"https://openalex.org/I290007724","display_name":"Qinghai University for Nationalities","ror":"https://ror.org/01e7csr82","country_code":"CN","type":"education","lineage":["https://openalex.org/I290007724"]},{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Tao Ye","raw_affiliation_strings":["Faculty of Information Technology, Beijing University of Technology, Beijing, China","College of Computer, Qinghai Nationalities University, Xining, China"],"affiliations":[{"raw_affiliation_string":"Faculty of Information Technology, Beijing University of Technology, Beijing, China","institution_ids":["https://openalex.org/I37796252"]},{"raw_affiliation_string":"College of Computer, Qinghai Nationalities University, Xining, China","institution_ids":["https://openalex.org/I290007724"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014366115","display_name":"Yongquan Cai","orcid":"https://orcid.org/0000-0002-7528-0364"},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yongquan Cai","raw_affiliation_strings":["Faculty of Information Technology, Beijing University of Technology, Beijing Key Laboratory of Trusted Computing, National Engineering Laboratory for Critical Technologies of Information, Security Classified Protection, Beijing 100124, China"],"affiliations":[{"raw_affiliation_string":"Faculty of Information Technology, Beijing University of Technology, Beijing Key Laboratory of Trusted Computing, National Engineering Laboratory for Critical Technologies of Information, Security Classified Protection, Beijing 100124, China","institution_ids":["https://openalex.org/I37796252"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100700870","display_name":"Xu Zhao","orcid":"https://orcid.org/0000-0002-1712-6588"},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xu Zhao","raw_affiliation_strings":["College of Applied Sciences, Beijing University of Technology, Beijing 100124, China"],"affiliations":[{"raw_affiliation_string":"College of Applied Sciences, Beijing University of Technology, Beijing 100124, China","institution_ids":["https://openalex.org/I37796252"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078313753","display_name":"Yongli Yang","orcid":"https://orcid.org/0000-0001-8260-3611"},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yongli Yang","raw_affiliation_strings":["Faculty of Information Technology, Beijing University of Technology, Beijing Key Laboratory of Trusted Computing, National Engineering Laboratory for Critical Technologies of Information, Security Classified Protection, Beijing 100124, China"],"affiliations":[{"raw_affiliation_string":"Faculty of Information Technology, Beijing University of Technology, Beijing Key Laboratory of Trusted Computing, National Engineering Laboratory for Critical Technologies of Information, Security Classified Protection, Beijing 100124, China","institution_ids":["https://openalex.org/I37796252"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100392305","display_name":"Wei Wang","orcid":"https://orcid.org/0000-0003-4457-6709"},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Wang","raw_affiliation_strings":["Faculty of Information Technology, Beijing University of Technology, Beijing Key Laboratory of Trusted Computing, National Engineering Laboratory for Critical Technologies of Information, Security Classified Protection, Beijing 100124, China"],"affiliations":[{"raw_affiliation_string":"Faculty of Information Technology, Beijing University of Technology, Beijing Key Laboratory of Trusted Computing, National Engineering Laboratory for Critical Technologies of Information, Security Classified Protection, Beijing 100124, China","institution_ids":["https://openalex.org/I37796252"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5009184834","display_name":"Yi Zhu","orcid":"https://orcid.org/0000-0003-3045-2588"},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yi Zhu","raw_affiliation_strings":["Faculty of Information Technology, Beijing University of Technology, Beijing Key Laboratory of Trusted Computing, National Engineering Laboratory for Critical Technologies of Information, Security Classified Protection, Beijing 100124, China"],"affiliations":[{"raw_affiliation_string":"Faculty of Information Technology, Beijing University of Technology, Beijing Key Laboratory of Trusted Computing, National Engineering Laboratory for Critical Technologies of Information, Security Classified Protection, Beijing 100124, China","institution_ids":["https://openalex.org/I37796252"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5100419650"],"corresponding_institution_ids":["https://openalex.org/I290007724","https://openalex.org/I37796252"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.31454685,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"16","issue":"1","first_page":"41","last_page":"41"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9865999817848206,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9865999817848206,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9767000079154968,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9757999777793884,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8950841426849365},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.7918342351913452},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.7708796262741089},{"id":"https://openalex.org/keywords/revocation","display_name":"Revocation","score":0.7279419898986816},{"id":"https://openalex.org/keywords/cloud-storage","display_name":"Cloud storage","score":0.7129108905792236},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6755210757255554},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.6689562797546387},{"id":"https://openalex.org/keywords/flexibility","display_name":"Flexibility (engineering)","score":0.6439003944396973},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6335685849189758},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5751839876174927},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.530709445476532},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4961887001991272},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4703175127506256},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.43129995465278625},{"id":"https://openalex.org/keywords/tree","display_name":"Tree (set theory)","score":0.419608473777771},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3247067928314209},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.2455078661441803},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1684117317199707}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8950841426849365},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.7918342351913452},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.7708796262741089},{"id":"https://openalex.org/C2775892892","wikidata":"https://www.wikidata.org/wiki/Q6509517","display_name":"Revocation","level":3,"score":0.7279419898986816},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.7129108905792236},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6755210757255554},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.6689562797546387},{"id":"https://openalex.org/C2780598303","wikidata":"https://www.wikidata.org/wiki/Q65921492","display_name":"Flexibility (engineering)","level":2,"score":0.6439003944396973},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6335685849189758},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5751839876174927},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.530709445476532},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4961887001991272},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4703175127506256},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.43129995465278625},{"id":"https://openalex.org/C113174947","wikidata":"https://www.wikidata.org/wiki/Q2859736","display_name":"Tree (set theory)","level":2,"score":0.419608473777771},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3247067928314209},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2455078661441803},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1684117317199707},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1504/ijwmc.2019.097424","is_oa":true,"landing_page_url":"http://doi.org/10.1504/ijwmc.2019.097424","pdf_url":"https://doi.org/10.1504/ijwmc.2019.097424","source":{"id":"https://openalex.org/S168395412","display_name":"International Journal of Wireless and Mobile Computing","issn_l":"1741-1084","issn":["1741-1084","1741-1092"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310317825","host_organization_name":"Inderscience Publishers","host_organization_lineage":["https://openalex.org/P4310317825"],"host_organization_lineage_names":["Inderscience Publishers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Wireless and Mobile Computing","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1504/ijwmc.2019.097424","is_oa":true,"landing_page_url":"http://doi.org/10.1504/ijwmc.2019.097424","pdf_url":"https://doi.org/10.1504/ijwmc.2019.097424","source":{"id":"https://openalex.org/S168395412","display_name":"International Journal of Wireless and Mobile Computing","issn_l":"1741-1084","issn":["1741-1084","1741-1092"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310317825","host_organization_name":"Inderscience Publishers","host_organization_lineage":["https://openalex.org/P4310317825"],"host_organization_lineage_names":["Inderscience Publishers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Wireless and Mobile Computing","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4241893311.pdf","grobid_xml":"https://content.openalex.org/works/W4241893311.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2744624421","https://openalex.org/W4248847356","https://openalex.org/W777049646","https://openalex.org/W2131846073","https://openalex.org/W2174969786","https://openalex.org/W2620043489","https://openalex.org/W4292493860","https://openalex.org/W2767823571","https://openalex.org/W4235894667","https://openalex.org/W2984622284"],"abstract_inverted_index":{"The":[0,61,101],"CP-ABE-based":[1],"access":[2,10,47,63,85],"control":[3,11,48,64],"scheme,":[4],"which":[5,71],"can":[6,65],"better":[7],"realise":[8],"the":[9,16,23,26,33,73,84,105,109,114,123],"of":[12,104,113],"many-to-multi-ciphertext":[13],"shared":[14,75],"in":[15,57],"cloud":[17,58],"storage":[18,59],"architecture,":[19],"is":[20,29,39,88,117,126],"still":[21],"facing":[22],"problems":[24],"that":[25,108],"system":[27,124],"cost":[28,125],"too":[30],"large,":[31],"and":[32,111],"policy":[34,79],"attribute":[35,55,80,95,115],"revocation":[36],"or":[37],"restore":[38],"not":[40,118],"flexible.":[41],"This":[42],"paper":[43],"proposes":[44],"an":[45],"efficient":[46,110],"scheme":[49,106],"based":[50],"on":[51],"CP-ABE":[52],"with":[53],"supporting":[54],"change":[56,116],"system.":[60],"fine-grained":[62],"be":[66],"achieved":[67],"by":[68,90],"re-encryption":[69,76],"mechanism":[70],"takes":[72],"minimum":[74],"key":[77],"for":[78,96],"set.":[81],"And":[82],"then":[83],"structure":[86],"tree":[87],"expanded":[89],"creating":[91],"a":[92],"corresponding":[93],"virtual":[94],"each":[97],"leaf":[98],"node":[99],"attribute.":[100],"analysis":[102],"results":[103],"indicate":[107],"flexibility":[112],"only":[119],"improved,":[120],"but":[121],"also":[122],"reduced.":[127]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
