{"id":"https://openalex.org/W3157591219","doi":"https://doi.org/10.4018/ijcac.2021070101","title":"Secure Healthcare Monitoring Sensor Cloud With Attribute-Based Elliptical Curve Cryptography","display_name":"Secure Healthcare Monitoring Sensor Cloud With Attribute-Based Elliptical Curve Cryptography","publication_year":2021,"publication_date":"2021-05-03","ids":{"openalex":"https://openalex.org/W3157591219","doi":"https://doi.org/10.4018/ijcac.2021070101","mag":"3157591219"},"language":"en","primary_location":{"id":"doi:10.4018/ijcac.2021070101","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijcac.2021070101","pdf_url":null,"source":{"id":"https://openalex.org/S4210173373","display_name":"International Journal of Cloud Applications and Computing","issn_l":"2156-1826","issn":["2156-1826","2156-1834"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Cloud Applications and Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5026243933","display_name":"Rajendra Kumar Dwivedi","orcid":"https://orcid.org/0000-0001-6682-1942"},"institutions":[{"id":"https://openalex.org/I2799532815","display_name":"Madan Mohan Malaviya University of Technology","ror":"https://ror.org/04h1w2j35","country_code":"IN","type":"education","lineage":["https://openalex.org/I2799532815"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Rajendra Kumar Dwivedi","raw_affiliation_strings":["Madan Mohan Malaviya University of Technology, Gorakhpur, India"],"affiliations":[{"raw_affiliation_string":"Madan Mohan Malaviya University of Technology, Gorakhpur, India","institution_ids":["https://openalex.org/I2799532815"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103728262","display_name":"Rakesh Kumar","orcid":"https://orcid.org/0000-0003-1125-0331"},"institutions":[{"id":"https://openalex.org/I2799532815","display_name":"Madan Mohan Malaviya University of Technology","ror":"https://ror.org/04h1w2j35","country_code":"IN","type":"education","lineage":["https://openalex.org/I2799532815"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Rakesh Kumar","raw_affiliation_strings":["Madan Mohan Malaviya University of Technology, Gorakhpur, India"],"affiliations":[{"raw_affiliation_string":"Madan Mohan Malaviya University of Technology, Gorakhpur, India","institution_ids":["https://openalex.org/I2799532815"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5014716105","display_name":"Rajkumar Buyya","orcid":"https://orcid.org/0000-0001-9754-6496"},"institutions":[{"id":"https://openalex.org/I165779595","display_name":"University of Melbourne","ror":"https://ror.org/01ej9dk98","country_code":"AU","type":"education","lineage":["https://openalex.org/I165779595"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Rajkumar Buyya","raw_affiliation_strings":["The University of Melbourne, Melbourne, Australia"],"affiliations":[{"raw_affiliation_string":"The University of Melbourne, Melbourne, Australia","institution_ids":["https://openalex.org/I165779595"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5026243933"],"corresponding_institution_ids":["https://openalex.org/I2799532815"],"apc_list":null,"apc_paid":null,"fwci":2.5834,"has_fulltext":false,"cited_by_count":20,"citation_normalized_percentile":{"value":0.91194955,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":"11","issue":"3","first_page":"1","last_page":"18"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7402487993240356},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7241454124450684},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.7165014743804932},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7092628479003906},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.633672833442688},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5879669189453125},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.5653690099716187},{"id":"https://openalex.org/keywords/elliptic-curve-cryptography","display_name":"Elliptic curve cryptography","score":0.5230273008346558},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4789372384548187},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.36982059478759766},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.32253432273864746},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.32243263721466064},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.0929337739944458}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7402487993240356},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7241454124450684},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.7165014743804932},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7092628479003906},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.633672833442688},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5879669189453125},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.5653690099716187},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.5230273008346558},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4789372384548187},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.36982059478759766},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.32253432273864746},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.32243263721466064},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0929337739944458}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.4018/ijcac.2021070101","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijcac.2021070101","pdf_url":null,"source":{"id":"https://openalex.org/S4210173373","display_name":"International Journal of Cloud Applications and Computing","issn_l":"2156-1826","issn":["2156-1826","2156-1834"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Cloud Applications and Computing","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:igg:jcac00:v:11:y:2021:i:3:p:1-18","is_oa":false,"landing_page_url":"https://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/IJCAC.2021070101","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1973388526","https://openalex.org/W2090767179","https://openalex.org/W2118875948","https://openalex.org/W2251418013","https://openalex.org/W2419244432","https://openalex.org/W2421552959","https://openalex.org/W2517343931","https://openalex.org/W2562005987","https://openalex.org/W2765485672","https://openalex.org/W2765593350","https://openalex.org/W2798746525","https://openalex.org/W2804074543","https://openalex.org/W2807860888","https://openalex.org/W2901679130","https://openalex.org/W2903075551","https://openalex.org/W2920030036"],"related_works":["https://openalex.org/W2131846073","https://openalex.org/W4372269058","https://openalex.org/W114534093","https://openalex.org/W2383331906","https://openalex.org/W361351722","https://openalex.org/W4223919663","https://openalex.org/W1513098086","https://openalex.org/W1976157784","https://openalex.org/W2743419166","https://openalex.org/W2963348623"],"abstract_inverted_index":{"Sensor":[0],"networks":[1],"are":[2],"integrated":[3],"with":[4],"cloud":[5,19,38,53],"in":[6,109,118],"many":[7],"internet":[8],"of":[9,22,113,148],"things":[10],"(IoT)":[11],"applications":[12],"for":[13],"various":[14],"benefits.":[15],"Healthcare":[16],"monitoring":[17],"sensor":[18],"is":[20,88,107,134,138],"one":[21],"the":[23,28,41,103,121,126,145],"application":[24],"that":[25,90,136],"allows":[26],"storing":[27],"patients'":[29],"health":[30],"data":[31,51,92,94],"generated":[32],"by":[33],"their":[34],"wearable":[35],"sensors":[36],"at":[37,52],"and":[39,46,66,96,129,140,150],"facilitates":[40],"authorized":[42],"doctors":[43],"to":[44],"monitor":[45],"advise":[47],"them":[48],"remotely.":[49],"Patients'":[50],"must":[54],"be":[55],"secure.":[56],"Existing":[57],"security":[58,80],"schemes":[59],"(e.g.,":[60],"key":[61,122,130],"policy":[62,68],"attribute-based":[63,69,83],"encryption":[64,70],"[KP-ABE]":[65],"ciphertext":[67],"[CP-ABE])":[71],"have":[72],"higher":[73],"computational":[74,104],"overheads.":[75,105],"In":[76],"this":[77],"paper,":[78],"a":[79],"mechanism":[81],"called":[82],"elliptical":[84,114],"curve":[85,115],"cryptography":[86,116],"(ABECC)":[87],"proposed":[89],"guarantees":[91],"integrity,":[93],"confidentiality,":[95],"fine-grained":[97],"access":[98],"control.":[99],"It":[100,133],"also":[101],"reduces":[102,120],"ABECC":[106,119,137],"implemented":[108],".NET":[110],"framework.":[111],"Use":[112],"(ECC)":[117],"length,":[123],"thereby":[124],"improving":[125],"encryption,":[127],"decryption,":[128],"generation":[131],"time.":[132],"observed":[135],"1.7":[139],"1.4":[141],"times":[142],"faster":[143],"than":[144],"existing":[146],"approaches":[147],"KP-ABE":[149],"CP-ABE,":[151],"respectively.":[152]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":11},{"year":2021,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
