{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T14:17:46Z","timestamp":1726064266654},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030222765"},{"type":"electronic","value":"9783030222772"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-22277-2_4","type":"book-chapter","created":{"date-parts":[[2019,12,31]],"date-time":"2019-12-31T07:02:28Z","timestamp":1577775748000},"page":"91-110","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Novel AckIBE-Based Secure Cloud Data Management Framework"],"prefix":"10.1007","author":[{"given":"Dharavath","family":"Ramesh","sequence":"first","affiliation":[]},{"given":"Syam Kumar","family":"Pasupuleti","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,1]]},"reference":[{"issue":"1","key":"4_CR1","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/MPE.2009.934876","volume":"8","author":"H Farhangi","year":"2010","unstructured":"Farhangi, H. (2010). The path of the smart grid. IEEE Power and Energy Magazine, 8(1), 18.","journal-title":"IEEE Power and Energy Magazine"},{"key":"4_CR2","unstructured":"Bojkovic, Z., & Bakmaz, B. (2012). Smart grid communications architecture: a survey and challenges. In Proceedings of the 11th International Conference on Applied Computer and Applied Computational Science (ACACOS) (pp. 83\u201389)."},{"issue":"3","key":"4_CR3","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1109\/MSP.2009.76","volume":"7","author":"P McDaniel","year":"2009","unstructured":"McDaniel, P., & McLaughlin, S. (2009). Security and privacy challenges in the smart grid. IEEE Security and Privacy, 7(3), 75\u201377.","journal-title":"IEEE Security and Privacy"},{"issue":"1","key":"4_CR4","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/SURV.2011.122211.00021","volume":"15","author":"Z Fan","year":"2013","unstructured":"Fan, Z., Kulkarni, P., Gormus, S., Efthymiou, C., Kalogridis, G., Sooriyabandara, M., et al. (2013). Smart grid communications: overview of research challenges, solutions, and standardization activities. IEEE Communications Surveys and Tutorials, 15(1), 21\u201338.","journal-title":"IEEE Communications Surveys and Tutorials"},{"key":"4_CR5","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-145","volume-title":"The NIST definition of cloud computing","author":"P Mell","year":"2011","unstructured":"Mell, P., & Grance, T. (2011). The NIST definition of cloud computing."},{"key":"4_CR6","unstructured":"Rusitschka, S., Eger, K., & Gerdes, C. (2010). Smart grid data cloud: a model for utilizing cloud computing in the smart grid domain. In: Smart Grid Communications (SmartGridComm), 2010 First IEEE International Conference on (pp. 483\u2013488). IEEE."},{"key":"4_CR7","unstructured":"Boneh, D., & Franklin, M. (2001). Identity-based encryption from the Weil pairing. In Annual International Cryptology Conference (pp. 213\u2013229). Berlin: Springer."},{"key":"4_CR8","first-page":"47","volume-title":"Workshop on the theory and application of cryptographic techniques","author":"A Shamir","year":"1984","unstructured":"Shamir, A. (1984). Identity-based cryptosystems and signature schemes. In Workshop on the theory and application of cryptographic techniques (pp. 47\u201353). Berlin: Springer."},{"key":"4_CR9","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1007\/978-3-540-72738-5_19","volume-title":"Applied cryptography and network security","author":"M Green","year":"2007","unstructured":"Green, M., & Ateniese, G. (2007). Identity-based proxy re-encryption. In Applied cryptography and network security (pp. 288\u2013306). Berlin: Springer."},{"issue":"15","key":"4_CR10","doi-asserted-by":"publisher","first-page":"3604","DOI":"10.1016\/j.comnet.2011.07.010","volume":"55","author":"W Wang","year":"2011","unstructured":"Wang, W., Xu, Y., & Khanna, M. (2011). A survey on the communication architectures in smart grid. Computer Networks, 55(15), 3604\u20133629.","journal-title":"Computer Networks"},{"issue":"18","key":"4_CR11","doi-asserted-by":"publisher","first-page":"1587","DOI":"10.1002\/wcm.1203","volume":"13","author":"HT Dinh","year":"2013","unstructured":"Dinh, H. T., Lee, C., Niyato, D., & Wang, P. (2013). A survey of mobile cloud computing: architecture, applications, and approaches. Wireless Communications and Mobile Computing, 13(18), 1587\u20131611.","journal-title":"Wireless Communications and Mobile Computing"},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Efthymiou, C., & Kalogridis, G. (2010). Smart grid privacy via anonymization of smart metering data. In Smart Grid Communications (SmartGridComm), 2010 First IEEE International Conference on (pp. 238\u2013243). IEEE.","DOI":"10.1109\/SMARTGRID.2010.5622050"},{"key":"4_CR13","unstructured":"Kalogridis, G., Efthymiou, C., Denic, S. Z., Lewis, T. A., & Cepeda, R. (2010). Privacy for smart meters: towards undetectable appliance load signatures. In: Smart Grid Communications (SmartGridComm), 2010 First IEEE International Conference on (pp. 232\u2013237). IEEE."},{"key":"4_CR14","unstructured":"Li, H., Mao, R., Lai, L., & Qiu, R. C. (2010). Compressed meter reading for delay-sensitive and secure load report in smart grid. In: Smart Grid Communications (SmartGridComm), 2010 First IEEE International Conference on (pp. 114\u2013119). IEEE."},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Chu, C. K., Liu, J. K., Wong, J. W., Zhao, Y., & Zhou, J. (2013). Privacy-preserving smart metering with regional statistics and personal enquiry services. In Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security (pp. 369\u2013380). ACM.","DOI":"10.1145\/2484313.2484362"},{"key":"4_CR16","doi-asserted-by":"crossref","unstructured":"Zhang, T., Lin, W., Wang, Y., Deng, S., Shi, C., & Chen, L. (2010). The design of information security protection framework to support smart grid. In Power System Technology (POWERCON), 2010 International Conference on (pp. 1\u20135), IEEE.","DOI":"10.1109\/POWERCON.2010.5666681"},{"key":"4_CR17","unstructured":"Wei, D., Lu, Y., Jafari, M., Skare, P., & Rohde, K. (2010). An integrated security system of protecting smart grid against cyber-attacks. In Innovative smart grid technologies (ISGT), 2010 (pp. 1\u20137). IEEE."},{"issue":"1","key":"4_CR18","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/TSG.2010.2044816","volume":"1","author":"KM Rogers","year":"2010","unstructured":"Rogers, K. M., Klump, R., Khurana, H., Aquino-Lugo, A. A., & Overbye, T. J. (2010). An authenticated control framework for distributed voltage support on the smart grid. IEEE Transactions on Smart Grid, 1(1), 40\u201347.","journal-title":"IEEE Transactions on Smart Grid"},{"key":"4_CR19","first-page":"257","volume-title":"European symposium on research in computer security","author":"K Liang","year":"2014","unstructured":"Liang, K., Liu, J. K., Wong, D. S., & Susilo, W. (2014). An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing. In European symposium on research in computer security (pp. 257\u2013272). Cham: Springer."},{"issue":"1","key":"4_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1127345.1127346","volume":"9","author":"G Ateniese","year":"2006","unstructured":"Ateniese, G., Fu, K., Green, M., & Hohenberger, S. (2006). Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Transactions on Information and System Security (TISSEC), 9(1), 1\u201330.","journal-title":"ACM Transactions on Information and System Security (TISSEC)"},{"issue":"2","key":"4_CR21","doi-asserted-by":"publisher","first-page":"873","DOI":"10.1007\/s13369-016-2357-2","volume":"42","author":"D Ramesh","year":"2017","unstructured":"Ramesh, D., Mishra, R., & Edla, D. R. (2017). Secure data storage in cloud: an e-stream cipher-based secure and dynamic updation policy. Arabian Journal for Science and Engineering, 42(2), 873\u2013883.","journal-title":"Arabian Journal for Science and Engineering"},{"issue":"2","key":"4_CR22","doi-asserted-by":"publisher","first-page":"639","DOI":"10.1007\/s13369-016-2280-6","volume":"42","author":"X Hu","year":"2017","unstructured":"Hu, X., Zhang, X., Wang, J., Xu, H., Tan, W., & Yang, Y. (2017). Secure and efficient identity-based proxy signature scheme in the standard model based on computational Diffie\u2013Hellman problem. Arabian Journal for Science and Engineering, 42(2), 639\u2013649.","journal-title":"Arabian Journal for Science and Engineering"},{"key":"4_CR23","first-page":"548","volume-title":"International conference on the theory and application of cryptology and information security","author":"C Gentry","year":"2002","unstructured":"Gentry, C., & Silverberg, A. (2002). Hierarchical ID-based cryptography. In International conference on the theory and application of cryptology and information security (pp. 548\u2013566). Berlin, Heidelberg: Springer."},{"issue":"1","key":"4_CR24","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1109\/MSP.2010.49","volume":"8","author":"H Khurana","year":"2010","unstructured":"Khurana, H., Hadley, M., Lu, N., & Frincke, D. A. (2010). Smart-grid security issues. IEEE Security and Privacy, 8(1), 81\u201385.","journal-title":"IEEE Security and Privacy"},{"key":"4_CR25","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/978-3-642-10665-1_14","volume-title":"IEEE international conference on cloud computing","author":"H Li","year":"2009","unstructured":"Li, H., Dai, Y., Tian, L., & Yang, H. (2009). Identity-based authentication for cloud computing. In IEEE international conference on cloud computing (pp. 157\u2013166). Berlin: Springer."},{"key":"4_CR26","unstructured":"Lim, H. W., & Paterson, K. G. (2005). Identity-based cryptography for grid security. In e-Science and Grid Computing, 2005. First International Conference on (10 pp). IEEE."},{"issue":"2","key":"4_CR27","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1109\/TCC.2014.2359460","volume":"3","author":"J Baek","year":"2015","unstructured":"Baek, J., Vu, Q. H., Liu, J. K., Huang, X., & Xiang, Y. (2015). A secure cloud computing based framework for big data information management of smart grid. IEEE Transactions on Cloud Computing, 3(2), 233\u2013244.","journal-title":"IEEE Transactions on Cloud Computing"},{"key":"4_CR28","doi-asserted-by":"crossref","unstructured":"Ramesh, D., Mishra, R., & Pandit, A. K. (2018). An efficient stream cipher based secure and dynamic updation method for cloud data centre. In International Conference on Soft Computing Systems (pp. 505\u2013516). Springer, Singapore.","DOI":"10.1007\/978-981-13-1936-5_53"},{"key":"4_CR29","doi-asserted-by":"crossref","unstructured":"Ramesh, D., Mishra, R., & Nayak, B. S. (2016). Cha-Cha 20: stream cipher based encryption for cloud data centre. In Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies, ACM, 40","DOI":"10.1145\/2905055.2905098"},{"key":"4_CR30","doi-asserted-by":"crossref","unstructured":"Ramesh, D., & Priya, R. (2016). Multi-authority scheme based CP-ABE with attribute revocation for cloud data storage. In Microelectronics, Computing and Communications (MicroCom), 2016 International Conference on (pp. 1\u20134). IEEE","DOI":"10.1109\/MicroCom.2016.7522518"}],"container-title":["Handbook of Computer Networks and Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-22277-2_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,31]],"date-time":"2019-12-31T07:03:25Z","timestamp":1577775805000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-22277-2_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030222765","9783030222772"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-22277-2_4","relation":{},"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"1 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}