{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T14:03:54Z","timestamp":1765807434532,"version":"3.37.3"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2017,4,29]],"date-time":"2017-04-29T00:00:00Z","timestamp":1493424000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572379","61501333"],"award-info":[{"award-number":["61572379","61501333"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1007\/s00500-017-2616-5","type":"journal-article","created":{"date-parts":[[2017,4,28]],"date-time":"2017-04-28T23:51:26Z","timestamp":1493423486000},"page":"4071-4082","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Attribute-based fuzzy identity access control in multicloud computing environments"],"prefix":"10.1007","volume":"22","author":[{"given":"Wenmin","family":"Li","sequence":"first","affiliation":[]},{"given":"Qiaoyan","family":"Wen","sequence":"additional","affiliation":[]},{"given":"Xuelei","family":"Li","sequence":"additional","affiliation":[]},{"given":"Debiao","family":"He","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,4,29]]},"reference":[{"key":"2616_CR1","doi-asserted-by":"crossref","unstructured":"Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: IEEE symposium on security and privacy, pp 321\u2013334","DOI":"10.1109\/SP.2007.11"},{"key":"2616_CR2","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1090\/conm\/324\/05731","volume":"324","author":"D Boneh","year":"2002","unstructured":"Boneh D, Silverberg A (2002) Applications of multilinear forms to cryptography. Contemp Math 324:71\u201390","journal-title":"Contemp Math"},{"key":"2616_CR3","doi-asserted-by":"crossref","unstructured":"Chase M (2007) Multi-authority attribute based encryption. In: proceedings of theory of cryptography, theory of cryptography conference, TCC 2007, Amsterdam, The Netherlands, 21\u201324 Feb 2007, pp 515\u2013534","DOI":"10.1007\/978-3-540-70936-7_28"},{"key":"2616_CR4","doi-asserted-by":"crossref","unstructured":"Chase M, Chow SSM (2009) Improving privacy and security in multi-authority attribute-based encryption. In: ACM conference on computer and communications security, CCS 2009. Chicago, Illinois, USA, Nov, pp 121\u2013130","DOI":"10.1145\/1653662.1653678"},{"key":"2616_CR5","volume-title":"Practical multilinear maps over the integers","author":"JS Coron","year":"2013","unstructured":"Coron JS, Lepoint T, Tibouchi M (2013) Practical multilinear maps over the integers. Springer, Berlin Heidelberg"},{"issue":"1","key":"2616_CR6","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1587\/transcom.E98.B.190","volume":"98","author":"Z Fu","year":"2015","unstructured":"Fu Z, Sun X, Liu Q, Zhou L, Shu J (2015) Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans Commun 98(1):190\u2013200","journal-title":"IEICE Trans Commun"},{"key":"2616_CR7","doi-asserted-by":"crossref","unstructured":"Fu Z, Huang F, Sun X, Vasilakos A, Yang CN (2016a) Enabling semantic search based on conceptual graphs over encrypted outsourced data. IEEE Trans Serv Comput","DOI":"10.1109\/TSC.2016.2622697"},{"issue":"12","key":"2616_CR8","doi-asserted-by":"crossref","first-page":"2706","DOI":"10.1109\/TIFS.2016.2596138","volume":"11","author":"Z Fu","year":"2016","unstructured":"Fu Z, Wu X, Guan C, Sun X, Ren K (2016b) Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Trans Inf Forensics Secur 11(12):2706\u20132716","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"2616_CR9","volume-title":"Candidate multilinear maps from ideal lattices","author":"S Garg","year":"2013","unstructured":"Garg S, Gentry C, Halevi S (2013) Candidate multilinear maps from ideal lattices. Springer, Berlin Heidelberg"},{"key":"2616_CR10","first-page":"89","volume":"89\u201398","author":"V Goyal","year":"2006","unstructured":"Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. Proc Acmccs 89\u201398:89\u201398","journal-title":"Proc Acmccs"},{"key":"2616_CR11","unstructured":"Green M, Hohenberger S, Waters B (2011) Outsourcing the decryption of abe ciphertexts. In: usenix conference on security, pp 34\u201334"},{"issue":"7","key":"2616_CR12","doi-asserted-by":"crossref","first-page":"1214","DOI":"10.1109\/TPDS.2010.203","volume":"22","author":"J Hur","year":"2011","unstructured":"Hur J, Dong KN (2011) Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Trans Parallel Distrib Syst 22(7):1214\u20131221","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"8","key":"2616_CR13","doi-asserted-by":"crossref","first-page":"1343","DOI":"10.1109\/TIFS.2013.2271848","volume":"8","author":"J Lai","year":"2013","unstructured":"Lai J, Deng RH, Guan C, Weng J (2013) Attribute-based encryption with verifiable outsourced decryption. IEEE Trans Inf Forensics Secur 8(8):1343\u20131354","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"5","key":"2616_CR14","doi-asserted-by":"crossref","first-page":"1484","DOI":"10.1109\/TPDS.2015.2448095","volume":"27","author":"W Li","year":"2016","unstructured":"Li W, Xue K, Xue Y, Hong J (2016) Tmacs: a robust and verifiable threshold multi-authority access control system in public cloud storage. IEEE Trans Parallel Distrib Syst 27(5):1484\u20131496","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"17","key":"2616_CR15","doi-asserted-by":"crossref","first-page":"4002","DOI":"10.1002\/sec.1582","volume":"9","author":"Q Liu","year":"2016","unstructured":"Liu Q, Cai W, Shen J, Fu Z, Liu X, Linge N (2016) A speculative approach to spatial-temporal efficiency with multi-objective optimization in a heterogeneous cloud environment. Secur Commun Netw 9(17):4002\u20134012","journal-title":"Secur Commun Netw"},{"key":"2616_CR16","doi-asserted-by":"crossref","unstructured":"Rouselakis Y, Waters B (2013) Practical constructions and new proof methods for large universe attribute-based encryption. In: proceedings of the 2013 ACM SIGSAC conference on computer communications security, ACM, CCS \u201913, New York, NY, USA, pp 463\u2013474","DOI":"10.1145\/2508859.2516672"},{"key":"2616_CR17","doi-asserted-by":"crossref","first-page":"457","DOI":"10.1007\/11426639_27","volume":"3494","author":"A Sahai","year":"2005","unstructured":"Sahai A, Waters B (2005) Fuzzy identity-based encryption. Lect Notes Comput Sci 3494:457\u2013473","journal-title":"Lect Notes Comput Sci"},{"issue":"2","key":"2616_CR18","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1109\/MC.2013.46","volume":"46","author":"M Singhal","year":"2013","unstructured":"Singhal M, Chandrasekhar S, Ge T, Sandhu R, Krishnan R, Ahn GJ, Bertino E (2013) Collaboration in multicloud computing environments: framework and security issues. Computer 46(2):76\u201384","journal-title":"Computer"},{"key":"2616_CR19","first-page":"321","volume":"2008","author":"B Waters","year":"2011","unstructured":"Waters B (2011) Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. Lect Notes Comput Sci 2008:321\u2013334","journal-title":"Lect Notes Comput Sci"},{"issue":"2","key":"2616_CR20","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1109\/TPDS.2015.2401003","volume":"27","author":"Z Xia","year":"2016","unstructured":"Xia Z, Wang X, Sun X, Wang Q (2016a) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distrib Syst 27(2):340\u2013352","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"11","key":"2616_CR21","doi-asserted-by":"crossref","first-page":"2594","DOI":"10.1109\/TIFS.2016.2590944","volume":"11","author":"Z Xia","year":"2016","unstructured":"Xia Z, Wang X, Zhang L, Qin Z, Sun X, Ren K (2016b) A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans Inf Forensics Secur 11(11):2594\u20132608","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"1","key":"2616_CR22","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1109\/TPDS.2015.2392752","volume":"27","author":"J Xu","year":"2016","unstructured":"Xu J, Wen Q, Li W, Jin Z (2016) Circuit ciphertext-policy attribute-based hybrid encryption with verifiable delegation in cloud computing. IEEE Trans Parallel Distrib Syst 27(1):119\u2013129","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"7","key":"2616_CR23","doi-asserted-by":"crossref","first-page":"1735","DOI":"10.1109\/TPDS.2013.253","volume":"25","author":"K Yang","year":"2014","unstructured":"Yang K, Jia X (2014) Expressive, efficient and revocable data access control for multi-authority cloud storage. IEEE Trans Parallel Distrib Syst 25(7):1735\u20131744","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"11","key":"2616_CR24","doi-asserted-by":"crossref","first-page":"1790","DOI":"10.1109\/TIFS.2013.2279531","volume":"8","author":"K Yang","year":"2013","unstructured":"Yang K, Jia X, Ren K, Zhang B, Xie R (2013) Dac-macs: effective data access control for multi-authority cloud storage systems. IEEE Trans Inf Forensics Secur 8(11):1790\u20131801","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"12","key":"2616_CR25","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TPDS.2014.2380373","volume":"26","author":"K Yang","year":"2015","unstructured":"Yang K, Jia X, Ren K (2015) Secure and verifiable policy update outsourcing for big data access control in the cloud. IEEE Trans Parallel Distrib Syst 26(12):1\u20131","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"2616_CR26","doi-asserted-by":"crossref","unstructured":"Yu S, Wang C, Ren K, Lou W (2010) Achieving secure, scalable, and fine-grained data access control in cloud computing. In: conference on information communications, pp 1\u20139","DOI":"10.1109\/INFCOM.2010.5462174"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00500-017-2616-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-017-2616-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-017-2616-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,5,11]],"date-time":"2018-05-11T10:00:06Z","timestamp":1526032806000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00500-017-2616-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4,29]]},"references-count":26,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2018,6]]}},"alternative-id":["2616"],"URL":"https:\/\/doi.org\/10.1007\/s00500-017-2616-5","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"type":"print","value":"1432-7643"},{"type":"electronic","value":"1433-7479"}],"subject":[],"published":{"date-parts":[[2017,4,29]]}}}