{"id":"https://openalex.org/W2981739817","doi":"https://doi.org/10.4018/ijcac.2020010103","title":"Efficient Escrow-free CP-ABE with Constant Size Ciphertext and Secret Key for Big Data Storage in Cloud","display_name":"Efficient Escrow-free CP-ABE with Constant Size Ciphertext and Secret Key for Big Data Storage in Cloud","publication_year":2019,"publication_date":"2019-10-22","ids":{"openalex":"https://openalex.org/W2981739817","doi":"https://doi.org/10.4018/ijcac.2020010103","mag":"2981739817"},"language":"en","primary_location":{"id":"doi:10.4018/ijcac.2020010103","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijcac.2020010103","pdf_url":null,"source":{"id":"https://openalex.org/S4210173373","display_name":"International Journal of Cloud Applications and Computing","issn_l":"2156-1826","issn":["2156-1826","2156-1834"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Cloud Applications and Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5041575405","display_name":"Praveen Kumar Premkamal","orcid":"https://orcid.org/0000-0003-4348-1150"},"institutions":[{"id":"https://openalex.org/I122964287","display_name":"National Institute of Technology Tiruchirappalli","ror":"https://ror.org/047x65e68","country_code":"IN","type":"education","lineage":["https://openalex.org/I122964287"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Praveen Kumar Premkamal","raw_affiliation_strings":["National Institute of Technology Tiruchirappalli, Tiruchirappalli, India"],"raw_orcid":"https://orcid.org/0000-0003-4348-1150","affiliations":[{"raw_affiliation_string":"National Institute of Technology Tiruchirappalli, Tiruchirappalli, India","institution_ids":["https://openalex.org/I122964287"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017895118","display_name":"Syam Kumar Pasupuleti","orcid":"https://orcid.org/0000-0003-3777-3245"},"institutions":[{"id":"https://openalex.org/I150312865","display_name":"Institute for Development and Research in Banking Technology","ror":"https://ror.org/00ta0g865","country_code":"IN","type":"government","lineage":["https://openalex.org/I150312865"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Syam Kumar Pasupuleti","raw_affiliation_strings":["Institute for Development and Research in Banking Technology, Hyderabad, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Institute for Development and Research in Banking Technology, Hyderabad, India","institution_ids":["https://openalex.org/I150312865"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5021987310","display_name":"Alphonse PJA","orcid":null},"institutions":[{"id":"https://openalex.org/I122964287","display_name":"National Institute of Technology Tiruchirappalli","ror":"https://ror.org/047x65e68","country_code":"IN","type":"education","lineage":["https://openalex.org/I122964287"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Alphonse PJA","raw_affiliation_strings":["National Institute of Technology Tiruchirappalli, Tiruchirappalli, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"National Institute of Technology Tiruchirappalli, Tiruchirappalli, India","institution_ids":["https://openalex.org/I122964287"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5041575405"],"corresponding_institution_ids":["https://openalex.org/I122964287"],"apc_list":null,"apc_paid":null,"fwci":3.4679,"has_fulltext":false,"cited_by_count":30,"citation_normalized_percentile":{"value":0.94239803,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"10","issue":"1","first_page":"28","last_page":"45"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9900000095367432,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/key-escrow","display_name":"Key escrow","score":0.8845999240875244},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.8299310207366943},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6727620363235474},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6429295539855957},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.5675710439682007},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5458285808563232},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5285415053367615},{"id":"https://openalex.org/keywords/cloud-storage","display_name":"Cloud storage","score":0.5191459059715271},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.47729575634002686},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.47670668363571167},{"id":"https://openalex.org/keywords/key-generation","display_name":"Key generation","score":0.4195362329483032},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.38025137782096863},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.34508782625198364},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.053583621978759766}],"concepts":[{"id":"https://openalex.org/C205533965","wikidata":"https://www.wikidata.org/wiki/Q1367345","display_name":"Key escrow","level":4,"score":0.8845999240875244},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.8299310207366943},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6727620363235474},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6429295539855957},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.5675710439682007},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5458285808563232},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5285415053367615},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.5191459059715271},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.47729575634002686},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.47670668363571167},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.4195362329483032},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.38025137782096863},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.34508782625198364},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.053583621978759766}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.4018/ijcac.2020010103","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijcac.2020010103","pdf_url":null,"source":{"id":"https://openalex.org/S4210173373","display_name":"International Journal of Cloud Applications and Computing","issn_l":"2156-1826","issn":["2156-1826","2156-1834"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Cloud Applications and Computing","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:igg:jcac00:v:10:y:2020:i:1:p:28-45","is_oa":false,"landing_page_url":"https://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/IJCAC.2020010103","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.5899999737739563}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W1498316612","https://openalex.org/W1510795740","https://openalex.org/W1582962879","https://openalex.org/W2019789301","https://openalex.org/W2034382123","https://openalex.org/W2078590992","https://openalex.org/W2087280674","https://openalex.org/W2088645726","https://openalex.org/W2101709669","https://openalex.org/W2108072891","https://openalex.org/W2134894205","https://openalex.org/W2138001464","https://openalex.org/W2146985619","https://openalex.org/W2149140091","https://openalex.org/W2343459945","https://openalex.org/W2345068994","https://openalex.org/W2403036368","https://openalex.org/W2492578998","https://openalex.org/W2578953648","https://openalex.org/W2614264858","https://openalex.org/W2752901856","https://openalex.org/W2769737472","https://openalex.org/W2789790696","https://openalex.org/W2794343578","https://openalex.org/W2804274048","https://openalex.org/W2886130626","https://openalex.org/W2888560596","https://openalex.org/W2966385337","https://openalex.org/W4247998494"],"related_works":["https://openalex.org/W2131846073","https://openalex.org/W4382396878","https://openalex.org/W4372269058","https://openalex.org/W114534093","https://openalex.org/W2383331906","https://openalex.org/W361351722","https://openalex.org/W4223919663","https://openalex.org/W1513098086","https://openalex.org/W3129009230","https://openalex.org/W2744512280"],"abstract_inverted_index":{"Ciphertext-policy":[0],"attribute-based":[1],"encryption":[2,105],"(CP-ABE)":[3],"schemes":[4,24,57,63],"are":[5],"an":[6,81],"appropriate":[7],"cryptographic":[8],"technique":[9],"to":[10,122],"enable":[11],"privacy":[12],"along":[13,126],"with":[14,85,127],"access":[15],"control":[16],"in":[17,97],"the":[18,21,35,49,60,66,78,98,104,114,118,124,133,143],"cloud,":[19],"but":[20],"existing":[22,61],"CP-ABE":[23,84],"do":[25],"not":[26],"directly":[27],"apply":[28],"for":[29,93],"big":[30,94],"data":[31,95,115,125],"because":[32],"they":[33],"have":[34],"issue":[36,70],"of":[37],"long":[38,41],"ciphertext":[39,52,88],"and":[40,53,71,89,106,138,149,153],"secret":[42,54,90,129],"key":[43,55,67,91,121,130,134],"size":[44,51,87],"(LC-LS).":[45],"To":[46,74],"address":[47,75],"LC-LS,":[48],"constant":[50,86],"(CSC-S)":[56],"proposed.":[58],"However,":[59],"CSC-S":[62,157],"suffer":[64],"from":[65],"escrow":[68,135],"security":[69],"efficiency":[72],"issue.":[73,136],"both":[76],"simultaneously,":[77],"authors":[79],"propose":[80],"efficient":[82,155],"escrow-free":[83],"(EEF-CPABE)":[92],"storage":[96],"Cloud.":[99],"The":[100],"EEF-CPABE":[101,144],"scheme":[102,145],"reduces":[103],"decryption":[107,119],"computation":[108],"overhead":[109],"by":[110],"designing":[111],"CSC-S.":[112],"Further,":[113],"owner":[116],"generates":[117],"global":[120],"decrypt":[123],"user":[128],"which":[131],"solves":[132],"Security":[137],"performance":[139],"analysis":[140],"demonstrate":[141],"that":[142],"resists":[146],"against":[147],"authority,":[148],"chosen":[150],"plain-text":[151],"attacks":[152],"more":[154],"than":[156],"schemes.":[158]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":8},{"year":2021,"cited_by_count":10},{"year":2020,"cited_by_count":6}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
