{"id":"https://openalex.org/W3108011610","doi":"https://doi.org/10.1515/comp-2020-0206","title":"A novel homomorphic RASD framework for secured data access and storage in cloud computing","display_name":"A novel homomorphic RASD framework for secured data access and storage in cloud computing","publication_year":2020,"publication_date":"2020-11-18","ids":{"openalex":"https://openalex.org/W3108011610","doi":"https://doi.org/10.1515/comp-2020-0206","mag":"3108011610"},"language":"en","primary_location":{"id":"doi:10.1515/comp-2020-0206","is_oa":true,"landing_page_url":"https://doi.org/10.1515/comp-2020-0206","pdf_url":null,"source":{"id":"https://openalex.org/S4210177004","display_name":"Open Computer Science","issn_l":"2299-1093","issn":["2299-1093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310313990","host_organization_name":"De Gruyter","host_organization_lineage":["https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Open Computer Science","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1515/comp-2020-0206","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100652974","display_name":"Rachna Jain","orcid":"https://orcid.org/0000-0002-1819-550X"},"institutions":[{"id":"https://openalex.org/I887998513","display_name":"Bharati Vidyapeeth Deemed University","ror":"https://ror.org/0052mmx10","country_code":"IN","type":"education","lineage":["https://openalex.org/I887998513"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Rachna Jain","raw_affiliation_strings":["Bharati Vidyapeeth\u2019s College of Engineering, Delhi, India"],"affiliations":[{"raw_affiliation_string":"Bharati Vidyapeeth\u2019s College of Engineering, Delhi, India","institution_ids":["https://openalex.org/I887998513"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5091880648","display_name":"Anand Nayyar","orcid":"https://orcid.org/0000-0002-9821-6146"},"institutions":[{"id":"https://openalex.org/I170238339","display_name":"Duy Tan University","ror":"https://ror.org/05ezss144","country_code":"VN","type":"education","lineage":["https://openalex.org/I170238339"]}],"countries":["VN"],"is_corresponding":true,"raw_author_name":"Anand Nayyar","raw_affiliation_strings":["Duy Tan University, Da Nang, Vietnam"],"affiliations":[{"raw_affiliation_string":"Duy Tan University, Da Nang, Vietnam","institution_ids":["https://openalex.org/I170238339"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5091880648"],"corresponding_institution_ids":["https://openalex.org/I170238339"],"apc_list":{"value":1000,"currency":"EUR","value_usd":1078},"apc_paid":{"value":1000,"currency":"EUR","value_usd":1078},"fwci":2.669,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.92230652,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"10","issue":"1","first_page":"431","last_page":"443"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9538000226020813,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.8427509665489197},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7325707077980042},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7201976180076599},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.6688462495803833},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.45946455001831055},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4458405375480652},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.44111597537994385},{"id":"https://openalex.org/keywords/cloud-storage","display_name":"Cloud storage","score":0.43896228075027466},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.43556082248687744},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.24858993291854858},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2320094108581543},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.10789355635643005}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.8427509665489197},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7325707077980042},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7201976180076599},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.6688462495803833},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.45946455001831055},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4458405375480652},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.44111597537994385},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.43896228075027466},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.43556082248687744},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.24858993291854858},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2320094108581543},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10789355635643005}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1515/comp-2020-0206","is_oa":true,"landing_page_url":"https://doi.org/10.1515/comp-2020-0206","pdf_url":null,"source":{"id":"https://openalex.org/S4210177004","display_name":"Open Computer Science","issn_l":"2299-1093","issn":["2299-1093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310313990","host_organization_name":"De Gruyter","host_organization_lineage":["https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Open Computer Science","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:94eb65b86b2347ea82c45338db64db20","is_oa":true,"landing_page_url":"https://doaj.org/article/94eb65b86b2347ea82c45338db64db20","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Open Computer Science, Vol 10, Iss 1, Pp 431-443 (2020)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1515/comp-2020-0206","is_oa":true,"landing_page_url":"https://doi.org/10.1515/comp-2020-0206","pdf_url":null,"source":{"id":"https://openalex.org/S4210177004","display_name":"Open Computer Science","issn_l":"2299-1093","issn":["2299-1093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310313990","host_organization_name":"De Gruyter","host_organization_lineage":["https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Open Computer Science","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":48,"referenced_works":["https://openalex.org/W1901460","https://openalex.org/W27803667","https://openalex.org/W94784130","https://openalex.org/W122447862","https://openalex.org/W171045015","https://openalex.org/W1485408073","https://openalex.org/W1522597308","https://openalex.org/W1575598731","https://openalex.org/W1692463454","https://openalex.org/W1965725399","https://openalex.org/W1976188373","https://openalex.org/W1992298357","https://openalex.org/W1993341076","https://openalex.org/W1994201648","https://openalex.org/W2002810652","https://openalex.org/W2019672983","https://openalex.org/W2028065906","https://openalex.org/W2028919655","https://openalex.org/W2052544413","https://openalex.org/W2055735215","https://openalex.org/W2075191163","https://openalex.org/W2081713029","https://openalex.org/W2088817275","https://openalex.org/W2109026747","https://openalex.org/W2112967367","https://openalex.org/W2122589245","https://openalex.org/W2124841337","https://openalex.org/W2126772818","https://openalex.org/W2134894205","https://openalex.org/W2140585646","https://openalex.org/W2145166073","https://openalex.org/W2149140091","https://openalex.org/W2153886246","https://openalex.org/W2156030242","https://openalex.org/W2156382411","https://openalex.org/W2158070819","https://openalex.org/W2164327070","https://openalex.org/W2275530856","https://openalex.org/W2345068994","https://openalex.org/W2346827671","https://openalex.org/W2406452102","https://openalex.org/W2506735173","https://openalex.org/W2511517392","https://openalex.org/W2561560305","https://openalex.org/W2610479618","https://openalex.org/W2748620559","https://openalex.org/W2752901856","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2388464034","https://openalex.org/W2533125852","https://openalex.org/W2140460949","https://openalex.org/W2105580438","https://openalex.org/W2057435755","https://openalex.org/W2018782216","https://openalex.org/W2949620858","https://openalex.org/W2734469389","https://openalex.org/W3011402756","https://openalex.org/W2957021483"],"abstract_inverted_index":{"Abstract":[0],"In":[1],"the":[2,6,16,35,38,71,76,95,102,110,157,213,229,237,243,259,309,314,347],"distributed":[3,376],"computing":[4],"worldview,":[5],"client":[7,214],"and":[8,20,27,43,51,59,73,105,159,217,269,333,367],"association\u2019s":[9,77,96],"information":[10,49,78,98,103,180,220,223,239,335,358],"is":[11,89,231,263],"put":[12,181,240],"away":[13,182,241],"remotely":[14],"on":[15,183,225,242],"cloud":[17,32,48,63,158,184,226,234,244],"server.":[18],"Clients":[19],"associations":[21],"can":[22],"get":[23],"to":[24,93,100,130,144,178,233,251],"applications,":[25],"administrations,":[26],"foundation":[28],"on-request":[29],"from":[30,107],"a":[31,85,167,187,204,277,284,353,362],"server":[33],"through":[34],"internet,":[36],"withstanding":[37],"various":[39],"advantages,":[40],"numerous":[41],"difficulties,":[42],"issues":[44,61],"that":[45,346],"endure":[46],"verifying":[47],"access":[50,224],"capacity.":[52],"These":[53],"difficulties":[54],"have":[55,113,149],"featured":[56],"additional":[57],"security":[58,87,116,123,147,163,177,189,310],"protection":[60],"as":[62,146,222],"specialist":[64],"co-ops":[65],"are":[66],"exclusively":[67],"in":[68,91,364],"charge":[69],"of":[70,75,80,122,133,209,212,219,258],"capacity":[72],"handling":[74],"out":[79],"its":[81,264],"physical":[82],"limits.":[83],"Hence,":[84],"robust":[86],"plan":[88,281],"required":[90],"order":[92],"ensure":[94],"touchy":[97],"emerges":[99],"keep":[101],"shielded":[104],"distant":[106],"programmers.":[108],"Over":[109],"globe,":[111],"specialists":[112],"proposed":[114,260,315],"fluctuated":[115],"structures":[117,135],"having":[118],"an":[119,141],"alternate":[120],"arrangement":[121],"standards":[124,148],"with":[125,136,161,299,318,337,372],"changing":[126],"computational":[127,272,305,365],"expense.":[128,273],"Down":[129],"earth":[131],"usage":[132],"these":[134],"low":[137,304],"calculation":[138,286,295],"cost":[139],"remains":[140],"extreme":[142],"test":[143,308],"tackle,":[145],"not":[150,350],"been":[151],"characterized.":[152],"Methodology":[153],"\u2013":[154,342],"To":[155,307],"verify":[156],"deal":[160],"all":[162,236],"standards,":[164],"we":[165,275,312],"propose":[166,276],"REGISTRATION":[168],"AUTHENTICATION":[169],"STORAGE":[170],"DATA":[171],"ACCESS":[172],"(RASD)":[173],"structure":[174,262,349],"for":[175,191,356,375],"giving":[176],"authoritative":[179],"catalogs":[185],"utilizing":[186],"novel":[188],"plot,":[190],"example,":[192],"H":[193],"E":[194,195],"T":[196],"P":[197],"S":[198],".":[199,293],"A":[200,289],"RASD":[201,261,316,348],"system":[202,230,317,330],"involves":[203],"stage":[205,207],"by":[206],"process-Enlistment":[208],"clients,":[210],"Authentication":[211],"secret":[215],"key,":[216],"Capacity":[218],"just":[221,250],"registry.":[227],"When":[228],"connected":[232],"servers,":[235],"delicate":[238,357],"will":[245],"end":[246],"up":[247],"being":[248],"accessible":[249],"verified":[252,329],"clients.":[253],"The":[254],"essential":[255],"favourable":[256],"position":[257],"simple":[265],"usage,":[266],"high":[267],"security,":[268],"overall":[270],"less":[271],"Moreover,":[274],"homomorphic-private-practical":[278],"uniformity":[279],"testing-based":[280],"structured":[282],"under":[283],"schematic":[285],"C":[287],"he":[288],"et":[290],"D":[291],"Ps":[292],"This":[294],"executes":[296],"homomorphic":[297,338],"encryption":[298],"subtractive":[300],"fairness":[301],"testing,":[302],"notwithstanding":[303],"intricacy.":[306],"ability,":[311],"tried":[313],"other":[319],"existing":[320,373],"conventions":[321,374],"like":[322],"Privacy-protecting":[323],"examining":[324],"convention,":[325,328,332],"group":[326],"reviewing":[327],"coding":[331],"encoded":[334],"preparing":[336],"re-encryption":[339],"convention.":[340],"Findings":[341],"Experimentation-based":[343],"outcomes":[344],"demonstrated":[345],"only":[351],"gives":[352],"high-security":[354],"layer":[355],"but":[359],"also":[360],"enables":[361],"decrease":[363],"expense":[366],"performs":[368],"better":[369],"when":[370],"compared":[371],"computing.":[377]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
