{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T10:43:22Z","timestamp":1758278602898,"version":"3.37.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030051709"},{"type":"electronic","value":"9783030051716"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-05171-6_13","type":"book-chapter","created":{"date-parts":[[2018,12,5]],"date-time":"2018-12-05T10:52:06Z","timestamp":1544007126000},"page":"251-271","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Proxy Re-Encryption Scheme for Access Control Enforcement Delegation on Outsourced Data in Public Cloud"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7241-7778","authenticated-orcid":false,"given":"Gaurav","family":"Pareek","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6252-2416","authenticated-orcid":false,"given":"B. R.","family":"Purushothama","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,5]]},"reference":[{"issue":"2","key":"13_CR1","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1109\/JSYST.2014.2379646","volume":"11","author":"M Ali","year":"2017","unstructured":"Ali, M., et al.: SeDaSC: secure data sharing in clouds. IEEE Syst. J. 11(2), 395\u2013404 (2017)","journal-title":"IEEE Syst. J."},{"issue":"1","key":"13_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1127345.1127346","volume":"9","author":"G Ateniese","year":"2006","unstructured":"Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9(1), 1\u201330 (2006)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"13_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/BFb0054122","volume-title":"Advances in Cryptology\u2014EUROCRYPT 1998","author":"M Blaze","year":"1998","unstructured":"Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127\u2013144. Springer, Heidelberg (1998). \nhttps:\/\/doi.org\/10.1007\/BFb0054122"},{"issue":"12","key":"13_CR4","doi-asserted-by":"publisher","first-page":"2293","DOI":"10.1016\/j.jss.2011.06.045","volume":"84","author":"L Fang","year":"2011","unstructured":"Fang, L., Susilo, W., Ge, C., Wang, J.: Interactive conditional proxy re-encryption with fine grain policy. J. Syst. Softw. 84(12), 2293\u20132302 (2011)","journal-title":"J. Syst. Softw."},{"key":"13_CR5","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1016\/j.tcs.2012.08.017","volume":"462","author":"L Fang","year":"2012","unstructured":"Fang, L., Susilo, W., Ge, C., Wang, J.: Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search. Theor. Comput. Sci. 462, 39\u201358 (2012)","journal-title":"Theor. Comput. Sci."},{"issue":"5","key":"13_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11432-012-4623-6","volume":"56","author":"L Fang","year":"2013","unstructured":"Fang, L., Wang, J., Ge, C., Ren, Y.: Fuzzy conditional proxy re-encryption. Sci. China Inf. Sci. 56(5), 1\u201313 (2013)","journal-title":"Sci. China Inf. Sci."},{"issue":"21","key":"13_CR7","doi-asserted-by":"publisher","first-page":"13995","DOI":"10.1007\/s11042-015-2929-2","volume":"75","author":"W Feng","year":"2016","unstructured":"Feng, W., Zhang, Z., Wang, J., Han, L.: A novel authorization delegation scheme for multimedia social networks by using proxy re-encryption. Multimed. Tools Appl. 75(21), 13995\u201314014 (2016)","journal-title":"Multimed. Tools Appl."},{"unstructured":"Goh, E.J., Shacham, H., Modadugu, N., Boneh, D.: SiRiUS: securing remote untrusted storage. In: NDSS, pp. 131\u2013145 (2003)","key":"13_CR8"},{"doi-asserted-by":"publisher","unstructured":"Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security. CCS 2006, pp. 89\u201398. ACM (2006). \nhttps:\/\/doi.org\/10.1145\/1180405.1180418","key":"13_CR9","DOI":"10.1145\/1180405.1180418"},{"doi-asserted-by":"publisher","unstructured":"Jia, W., Zhu, H., Cao, Z., Wei, L., Lin, X.: SDSM: a secure data service mechanism in mobile cloud computing. In: 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 1060\u20131065, April 2011. \nhttps:\/\/doi.org\/10.1109\/INFCOMW.2011.5928784","key":"13_CR10","DOI":"10.1109\/INFCOMW.2011.5928784"},{"doi-asserted-by":"publisher","unstructured":"Jung, T., Li, X., Wan, Z., Wan, M.: Privacy preserving cloud data access with multi-authorities. In: 2013 Proceedings of the IEEE INFOCOM, pp. 2625\u20132633, April 2013. \nhttps:\/\/doi.org\/10.1109\/INFCOM.2013.6567070","key":"13_CR11","DOI":"10.1109\/INFCOM.2013.6567070"},{"issue":"4","key":"13_CR12","doi-asserted-by":"publisher","first-page":"651","DOI":"10.1007\/s10723-015-9352-9","volume":"13","author":"Abdul Nasir Khan","year":"2015","unstructured":"Khan, A.N., Mat Kiah, M.L., Ali, M., Shamshirband, S., Khan, A.u.R.: A cloud-manager-based re-encryption scheme for mobile users in cloud environment: a hybrid approach. J. Grid Comput. 13(4), 651\u2013675 (2015)","journal-title":"Journal of Grid Computing"},{"unstructured":"Library, P.: The pairing-based cryptography library. \nhttps:\/\/crypto.stanford.edu\/pbc\/\n\n. Accessed on 02 Feb 2018","key":"13_CR13"},{"issue":"1","key":"13_CR14","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1109\/MIC.2012.14","volume":"16","author":"K Ren","year":"2012","unstructured":"Ren, K., Wang, C., Wang, Q.: Security challenges for the public cloud. IEEE Internet Comput. 16(1), 69\u201373 (2012)","journal-title":"IEEE Internet Comput."},{"unstructured":"RFC2315: Pkcs #7: Cryptographic message syntax (version 1.5). \nhttp:\/\/www.ietf.org\/rfc\/rfc2315.txt\n\n. Accessed on 28 Apr 2016","key":"13_CR15"},{"key":"13_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1007\/11426639_27","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"A Sahai","year":"2005","unstructured":"Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457\u2013473. Springer, Heidelberg (2005). \nhttps:\/\/doi.org\/10.1007\/11426639_27"},{"issue":"1","key":"13_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2010.07.006","volume":"34","author":"S Subashini","year":"2011","unstructured":"Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1\u201311 (2011)","journal-title":"J. Netw. Comput. Appl."},{"issue":"6","key":"13_CR18","doi-asserted-by":"publisher","first-page":"903","DOI":"10.1109\/TDSC.2012.49","volume":"9","author":"Y Tang","year":"2012","unstructured":"Tang, Y., Lee, P.P.C., Lui, J.C.S., Perlman, R.J.: Secure overlay cloud storage with access control and assured deletion. IEEE Trans. Dependable Secure Comput. 9(6), 903\u2013916 (2012)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"doi-asserted-by":"publisher","unstructured":"Tran, D.H., Nguyen, H., Zha, W., Ng, W.K.: Towards security in sharing data on cloud-based social networks. In: 2011 8th International Conference on Information, Communications Signal Processing, pp. 1\u20135, December 2011. \nhttps:\/\/doi.org\/10.1109\/ICICS.2011.6173582","key":"13_CR19","DOI":"10.1109\/ICICS.2011.6173582"},{"unstructured":"Tysowski, P.K., Hasan, M.A.: Re-encryption-based key management towards secure and scalable mobile applications in clouds. IACR Cryptology ePrint Archive, 668 (2011)","key":"13_CR20"},{"issue":"3","key":"13_CR21","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1016\/j.jss.2011.09.035","volume":"85","author":"XA Wang","year":"2012","unstructured":"Wang, X.A., Huang, X., Yang, X., Liu, L., Wu, X.: Further observation on proxy re-encryption with keyword search. J. Syst. Softw. 85(3), 643\u2013654 (2012). Novel approaches in the design and implementation of systems\/software architecture","journal-title":"J. Syst. Softw."},{"issue":"4","key":"13_CR22","doi-asserted-by":"publisher","first-page":"940","DOI":"10.1109\/TIFS.2016.2646913","volume":"12","author":"Y Wang","year":"2017","unstructured":"Wang, Y., Wu, Q., Qin, B., Shi, W., Deng, R.H., Hu, J.: Identity-based data outsourcing with comprehensive auditing in clouds. IEEE Trans. Inf. Forensics Secur. 12(4), 940\u2013952 (2017). \nhttps:\/\/doi.org\/10.1109\/TIFS.2016.2646913","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"13_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/978-3-642-04474-8_13","volume-title":"Information Security","author":"J Weng","year":"2009","unstructured":"Weng, J., Yang, Y., Tang, Q., Deng, R.H., Bao, F.: Efficient conditional proxy re-encryption with chosen-ciphertext security. In: Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. LNCS, vol. 5735, pp. 151\u2013166. Springer, Heidelberg (2009). \nhttps:\/\/doi.org\/10.1007\/978-3-642-04474-8_13"},{"doi-asserted-by":"publisher","unstructured":"Xu, L., Wu, X., Zhang, X.: CL-PRE: a certificateless proxy re-encryption scheme for secure data sharing with public cloud. In: Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security. ASIACCS 2012, pp. 87\u201388. ACM, New York (2012). \nhttps:\/\/doi.org\/10.1145\/2414456.2414507","key":"13_CR24","DOI":"10.1145\/2414456.2414507"},{"issue":"4","key":"13_CR25","doi-asserted-by":"publisher","first-page":"459","DOI":"10.1109\/TCC.2014.2366152","volume":"2","author":"K Xue","year":"2014","unstructured":"Xue, K., Hong, P.: A dynamic secure group sharing framework in public cloud computing. IEEE Trans. Cloud Comput. 2(4), 459\u2013470 (2014)","journal-title":"IEEE Trans. Cloud Comput."},{"issue":"11","key":"13_CR26","doi-asserted-by":"publisher","first-page":"1790","DOI":"10.1109\/TIFS.2013.2279531","volume":"8","author":"Kan Yang","year":"2013","unstructured":"Yang, K., Jia, X., Ren, K., Zhang, B.: DAC-MACS: effective data access control for multi-authority cloud storage systems. In: 2013 Proceedings IEEE INFOCOM, pp. 2895\u20132903, April 2013. \nhttps:\/\/doi.org\/10.1109\/TIFS.2013.2279531","journal-title":"IEEE Transactions on Information Forensics and Security"},{"doi-asserted-by":"publisher","unstructured":"Yu, S., Wang, C., Ren, K., Lou, W.: Achieving secure, scalable, and fine-grained data access control in cloud computing. In: Proceedings of the IEEE INFOCOM 2010, pp. 1\u20139. IEEE (2010). \nhttps:\/\/doi.org\/10.1109\/INFCOM.2010.5462174","key":"13_CR27","DOI":"10.1109\/INFCOM.2010.5462174"},{"issue":"3","key":"13_CR28","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1109\/TDSC.2007.1006","volume":"4","author":"W Yu","year":"2007","unstructured":"Yu, W., Sun, Y., Liu, K.J.R.: Optimizing rekeying cost for contributory group key agreement schemes. IEEE Trans. Dependable Secure Comput. 4(3), 228\u2013242 (2007)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"4","key":"13_CR29","doi-asserted-by":"publisher","first-page":"1367","DOI":"10.1016\/j.jnca.2012.01.022","volume":"35","author":"M Zhou","year":"2012","unstructured":"Zhou, M., Mu, Y., Susilo, W., Yan, J., Dong, L.: Privacy enhanced data outsourcing in the cloud. J. Netw. Comput. Appl. 35(4), 1367\u20131373 (2012). Intelligent Algorithms for Data-Centric Sensor Networks","journal-title":"J. Netw. Comput. Appl."}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-05171-6_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,12,5]],"date-time":"2018-12-05T11:00:35Z","timestamp":1544007635000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-05171-6_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030051709","9783030051716"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-05171-6_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ICISS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Systems Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bangalore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 December 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 December 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iciss2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.iciss.org.in","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"51","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"23","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"45% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}