{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T06:53:13Z","timestamp":1743144793851,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":11,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789811972416"},{"type":"electronic","value":"9789811972423"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-981-19-7242-3_4","type":"book-chapter","created":{"date-parts":[[2022,10,8]],"date-time":"2022-10-08T23:02:22Z","timestamp":1665270142000},"page":"52-64","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Efficient Attribute-Based Proxy Re-encryption for\u00a0Secure Deduplication"],"prefix":"10.1007","author":[{"given":"Tao","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Chen","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Mulmediyage Imantha Udana","family":"Chandrasena","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,10,9]]},"reference":[{"issue":"03","key":"4_CR1","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1109\/TBDATA.2017.2656120","volume":"5","author":"H Cui","year":"2019","unstructured":"Cui, H., Deng, R.H., Li, Y., Wu, G.: Attribute-based storage supporting secure deduplication of encrypted data in cloud. IEEE Trans. Big Data 5(03), 330\u2013342 (2019)","journal-title":"IEEE Trans. Big Data"},{"issue":"6","key":"4_CR2","doi-asserted-by":"publisher","first-page":"5784","DOI":"10.1109\/TVT.2020.2967099","volume":"69","author":"S Gao","year":"2020","unstructured":"Gao, S., Piao, G., Zhu, J., Ma, X., Ma, J.: Trustaccess: a trustworthy secure ciphertext-policy and attribute hiding access control scheme based on blockchain. IEEE Trans. Veh. Technol. 69(6), 5784\u20135798 (2020)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"4_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cose.2017.08.007","volume":"72","author":"J Li","year":"2018","unstructured":"Li, J., Zhang, Y., Chen, X., Xiang, Y.: Secure attribute-based data sharing for resource-limited users in cloud computing. Comput. Secur. 72, 1\u201312 (2018)","journal-title":"Comput. Secur."},{"issue":"7","key":"4_CR4","doi-asserted-by":"publisher","first-page":"1384","DOI":"10.1109\/TIFS.2015.2410137","volume":"10","author":"B Qin","year":"2015","unstructured":"Qin, B., Deng, R.H., Liu, S., Ma, S.: Attribute-based encryption with efficient verifiable outsourced decryption. IEEE Trans. Inf. Forensics Secur. 10(7), 1384\u20131393 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Rahulamathavan, Y., Phan, R.C.W., Rajarajan, M., Misra, S., Kondoz, A.: Privacy-preserving blockchain based IoT ecosystem using attribute-based encryption. In: 2017 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), pp. 1\u20136. IEEE (2017)","DOI":"10.1109\/ANTS.2017.8384164"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Rouselakis, Y., Waters, B.: Practical constructions and new proof methods for large universe attribute-based encryption. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, pp. 463\u2013474 (2013)","DOI":"10.1145\/2508859.2516672"},{"key":"4_CR7","doi-asserted-by":"publisher","unstructured":"Shen, J., Yang, H., Vijayakumar, P., Kumar, N.: A privacy-preserving and untraceable group data sharing scheme in cloud computing. IEEE Trans. Dependable Secure Comput. (2021). https:\/\/doi.org\/10.1109\/TDSC.2021.3050517","DOI":"10.1109\/TDSC.2021.3050517"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Tian, G., Hu, Y., Wei, J., Liu, Z., Huang, X., Chen, X., Susilo, W.: Blockchain-based secure deduplication and shared auditing in decentralized storage. IEEE Trans. Dependable Secure Comput. (2021)","DOI":"10.1109\/TDSC.2021.3114160"},{"issue":"2","key":"4_CR9","doi-asserted-by":"publisher","first-page":"706","DOI":"10.1109\/TDSC.2019.2946073","volume":"18","author":"R Xu","year":"2019","unstructured":"Xu, R., Joshi, J., Krishnamurthy, P.: An integrated privacy preserving attribute-based access control framework supporting secure deduplication. IEEE Trans. Dependable Secure Comput. 18(2), 706\u2013721 (2019)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"2","key":"4_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3425708","volume":"22","author":"H Yang","year":"2021","unstructured":"Yang, H., Shen, J., Zhou, T., Ji, S., Vijayakumar, P.: A flexible and privacy-preserving collaborative filtering scheme in cloud computing for VANETs. ACM Trans. Internet Technol. (TOIT) 22(2), 1\u201319 (2021)","journal-title":"ACM Trans. Internet Technol. (TOIT)"},{"key":"4_CR11","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1016\/j.ins.2020.07.005","volume":"541","author":"H Yuan","year":"2020","unstructured":"Yuan, H., Chen, X., Wang, J., Yuan, J., Yan, H., Susilo, W.: Blockchain-based public auditing and secure deduplication with fair arbitration. Inf. Sci. 541, 409\u2013425 (2020)","journal-title":"Inf. Sci."}],"container-title":["Communications in Computer and Information Science","Security and Privacy in Social Networks and Big Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-19-7242-3_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,8]],"date-time":"2022-10-08T23:03:07Z","timestamp":1665270187000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-19-7242-3_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9789811972416","9789811972423"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-981-19-7242-3_4","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"9 October 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SocialSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Security and Privacy in Social Networks and Big Data","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xi'an","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 October 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 October 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"socialsec2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/socialsec2022.xidian.edu.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"103","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"23","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}