{"id":"https://openalex.org/W7117781240","doi":"https://doi.org/10.48550/arxiv.2512.23216","title":"Multiparty Authorization for Secure Data Storage in Cloud Environments using Improved Attribute-Based Encryption","display_name":"Multiparty Authorization for Secure Data Storage in Cloud Environments using Improved Attribute-Based Encryption","publication_year":2025,"publication_date":"2025-12-29","ids":{"openalex":"https://openalex.org/W7117781240","doi":"https://doi.org/10.48550/arxiv.2512.23216"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2512.23216","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2512.23216","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2512.23216","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5121669680","display_name":"Partha Paul","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Paul, Partha","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5063962412","display_name":"Keshav Sinha","orcid":"https://orcid.org/0000-0003-1053-3911"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Sinha, Keshav","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5121669680"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9373000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9373000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.033799998462200165,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.0052999998442828655,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7081000208854675},{"id":"https://openalex.org/keywords/cloud-storage","display_name":"Cloud storage","score":0.5605000257492065},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5486000180244446},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.5034000277519226},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.5016000270843506},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.4706000089645386},{"id":"https://openalex.org/keywords/on-the-fly-encryption","display_name":"On-the-fly encryption","score":0.438400000333786},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.4359999895095825},{"id":"https://openalex.org/keywords/forward-secrecy","display_name":"Forward secrecy","score":0.4138000011444092},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.400299996137619}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7577999830245972},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7081000208854675},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.5605000257492065},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5486000180244446},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.5034000277519226},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.5016000270843506},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.4706000089645386},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4417000114917755},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.438400000333786},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.4359999895095825},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.41679999232292175},{"id":"https://openalex.org/C205009425","wikidata":"https://www.wikidata.org/wiki/Q935662","display_name":"Forward secrecy","level":4,"score":0.4138000011444092},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.400299996137619},{"id":"https://openalex.org/C166501710","wikidata":"https://www.wikidata.org/wiki/Q5132476","display_name":"Client-side encryption","level":4,"score":0.399399995803833},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.392300009727478},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.3889999985694885},{"id":"https://openalex.org/C158215988","wikidata":"https://www.wikidata.org/wiki/Q4637271","display_name":"40-bit encryption","level":3,"score":0.3416000008583069},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.3370000123977661},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3278000056743622},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.3246999979019165},{"id":"https://openalex.org/C18319499","wikidata":"https://www.wikidata.org/wiki/Q5448402","display_name":"Filesystem-level encryption","level":4,"score":0.3009999990463257},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.29910001158714294},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.29409998655319214},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.2915000021457672},{"id":"https://openalex.org/C184685986","wikidata":"https://www.wikidata.org/wiki/Q3505167","display_name":"Multiple encryption","level":3,"score":0.2858000099658966},{"id":"https://openalex.org/C2780221543","wikidata":"https://www.wikidata.org/wiki/Q4681865","display_name":"Cipher","level":3,"score":0.2793999910354614},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.2759999930858612},{"id":"https://openalex.org/C47487241","wikidata":"https://www.wikidata.org/wiki/Q5227230","display_name":"Data access","level":2,"score":0.27230000495910645},{"id":"https://openalex.org/C132161212","wikidata":"https://www.wikidata.org/wiki/Q5891458","display_name":"Homomorphic secret sharing","level":4,"score":0.27090001106262207},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.26820001006126404},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.26179999113082886},{"id":"https://openalex.org/C54569210","wikidata":"https://www.wikidata.org/wiki/Q7246854","display_name":"Probabilistic encryption","level":3,"score":0.25679999589920044},{"id":"https://openalex.org/C182776695","wikidata":"https://www.wikidata.org/wiki/Q840661","display_name":"Ciphertext indistinguishability","level":5,"score":0.25429999828338623},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.2524999976158142},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2522999942302704},{"id":"https://openalex.org/C205203396","wikidata":"https://www.wikidata.org/wiki/Q612143","display_name":"Bilinear interpolation","level":2,"score":0.25220000743865967}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2512.23216","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2512.23216","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2512.23216","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2512.23216","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.5334533452987671}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"In":[0],"todays":[1],"scenario,":[2],"various":[3],"organizations":[4],"store":[5],"their":[6],"sensitive":[7],"data":[8,30,40,64,84,102,174],"in":[9,86,208],"the":[10,27,33,37,55,128,137,147,158,166,209,214,219,231,251],"cloud":[11,88],"environment.":[12,89],"Multiple":[13],"problems":[14],"are":[15,122,200],"present":[16],"while":[17,42],"retrieving":[18],"and":[19,39,58,66,81,124,140,186,198,245,257],"storing":[20],"vast":[21],"amounts":[22],"of":[23,29,36,54,173,211,230],"data,":[24],"such":[25],"as":[26],"frequency":[28],"requests":[31],"(increasing":[32],"computational":[34],"overhead":[35],"server)":[38],"leakage":[41],"storing.":[43],"To":[44],"cope":[45],"with":[46,127],"said":[47],"problem,":[48],"Attribute-Based":[49],"Encryption":[50],"(ABE)":[51],"is":[52,99,143,175,254],"one":[53],"potential":[56],"security":[57,235,244],"access":[59,77],"control":[60],"techniques":[61],"for":[62,101,169,202,213],"secure":[63,83],"storage":[65,85,227],"authorization.":[67,118],"The":[68,90,104,119,131,153,171,194,222,234,243],"proposed":[69,100,105,154,223,252],"work":[70],"divides":[71],"into":[72],"two":[73],"objectives:":[74],"(i)":[75],"provide":[76,116],"to":[78,115,145,164,189],"authorized":[79,129,162],"users":[80,163,232],"(ii)":[82],"a":[87,112],"improved":[91],"ABE":[92],"using":[93,177],"Functional":[94],"Based":[95],"Stream":[96],"Cipher":[97],"(FBSE)":[98],"storage.":[103],"technique":[106,135],"uses":[107],"simple":[108],"scalar":[109],"points":[110,121,139,149],"over":[111],"parabolic":[113],"curve":[114],"multiparty":[117],"authorization":[120,138,215],"generated":[123],"share":[125],"only":[126],"recipients.":[130],"Shamir":[132],"secret":[133,148],"sharing":[134],"generate":[136],"2D-Lagrange":[141],"Interpolation":[142],"used":[144,201],"reconstruct":[146,165],"from":[150],"regular":[151],"parabola.":[152],"scheme":[155,224,253],"has":[156],"specified":[157],"threshold":[159],"(Ts&gt;3)":[160],"legally":[161],"attribute-associated":[167],"keys":[168],"decryption.":[170],"encryption":[172,197,220],"evaluated":[176],"Statistical":[178,181],"analysis":[179,236,247],"(NIST":[180],"Test":[182],"Suite,":[183],"Correlation":[184],"Coefficient,":[185],"Histogram)":[187],"test":[188],"investigate":[190],"image":[191],"pixel":[192],"deviation.":[193],"parameters":[195],"like":[196],"decryption":[199],"performance":[203,246],"analysis,":[204],"where":[205],"an":[206],"increase":[207,218],"number":[210],"attributes":[212],"policy":[216],"will":[217],"time.":[221],"imposes":[225],"minimal":[226],"overhead,":[228],"irrespective":[229],"identity.":[233],"evidence":[237],"that":[238,250],"it":[239],"resists":[240],"collision":[241],"attacks.":[242],"results":[248],"demonstrate":[249],"more":[255],"robust":[256],"secure.":[258]},"counts_by_year":[],"updated_date":"2025-12-31T23:15:30.938425","created_date":"2025-12-31T00:00:00"}
