{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T10:38:09Z","timestamp":1772102289237,"version":"3.50.1"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2012,1,7]],"date-time":"2012-01-07T00:00:00Z","timestamp":1325894400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2012,10]]},"DOI":"10.1007\/s11227-011-0727-9","type":"journal-article","created":{"date-parts":[[2012,1,6]],"date-time":"2012-01-06T17:08:03Z","timestamp":1325869683000},"page":"431-460","source":"Crossref","is-referenced-by-count":15,"title":["SAPDS: self-healing attribute-based privacy aware data sharing in cloud"],"prefix":"10.1007","volume":"62","author":[{"given":"Zeeshan","family":"Pervez","sequence":"first","affiliation":[]},{"given":"Asad Masood","family":"Khattak","sequence":"additional","affiliation":[]},{"given":"Sungyoung","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Young-Koo","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,1,7]]},"reference":[{"key":"727_CR1","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1145\/1721654.1721672","volume":"53","author":"M Armbrust","year":"2010","unstructured":"Armbrust M et al (2010) A view of cloud computing. Commun ACM 53:50\u201358","journal-title":"Commun ACM"},{"key":"727_CR2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/IPDPS.2009.5160911","volume-title":"Proceedings of the 2009 IEEE international symposium on parallel&distributed processing","author":"D Kondo","year":"2009","unstructured":"Kondo D, Javadi B, Malecot P, Cappello F, Anderson DP (2009) Cost-benefit analysis of cloud computing versus desktop grids. In: Proceedings of the 2009 IEEE international symposium on parallel&distributed processing. IEEE Computer Society, Washington, DC, pp 1\u201312"},{"key":"727_CR3","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1007\/s10586-010-0131-x","volume":"13","author":"MD Assun\u00e7\u00e3o","year":"2010","unstructured":"Assun\u00e7\u00e3o MD, Costanzo A, Buyya R (2010) A cost-benefit analysis of using cloud computing to extend the capacity of clusters. Clust Comput 13:335\u2013347","journal-title":"Clust Comput"},{"key":"727_CR4","unstructured":"Amazon Web Services LLC, Amazon Simple Storage Service (2009). http:\/\/aws.amazon.com\/s3\/"},{"key":"727_CR5","unstructured":"Amazon Web Services LLC, Amazon Elastic Compute Cloud (2009). http:\/\/aws.amazon.com\/ec2\/"},{"key":"727_CR6","unstructured":"Wood T, Gerber A, Ramakrishnan KK, Shenoy P, Van\u00a0der Merwe J (2009) The case for enterprise-ready virtual private clouds. In: Proceedings of the 2009 conference on Hot topics in cloud computing, Berkeley, CA, USA, HotCloud\u201909, USENIX Association, p 4"},{"key":"727_CR7","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1109\/CLOUD.2010.12","volume-title":"Proceedings of the 2010 IEEE 3rd international conference on cloud computing, CLOUD \u201910","author":"MR Head","year":"2010","unstructured":"Head MR, Sailer A, Shaikh H, Shea DG (2010) Towards self-assisted troubleshooting for the deployment of private clouds. In: Proceedings of the 2010 IEEE 3rd international conference on cloud computing, CLOUD \u201910. IEEE Computer Society, Washington, DC, pp 156\u2013163"},{"key":"727_CR8","doi-asserted-by":"crossref","unstructured":"Gartner Rating 2011. http:\/\/www.gartner.com\/it\/page.jsp?id=1454221","DOI":"10.7767\/sus.2011.2011.1.383"},{"key":"727_CR9","doi-asserted-by":"crossref","first-page":"499","DOI":"10.1147\/JRD.2009.5429055","volume":"53","author":"M Naghshineh","year":"2009","unstructured":"Naghshineh M et al (2009) Ibm research division cloud computing initiative. IBM J Res Dev 53:499\u2013508","journal-title":"IBM J Res Dev"},{"key":"727_CR10","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1109\/CLOUD.2009.5071532","volume-title":"Proceedings of the 2009 ICSE workshop on software engineering challenges of cloud computing, CLOUD \u201909","author":"S Pearson","year":"2009","unstructured":"Pearson S (2009) Taking account of privacy when designing cloud computing services. In: Proceedings of the 2009 ICSE workshop on software engineering challenges of cloud computing, CLOUD \u201909. IEEE Computer Society, Washington, DC, pp 44\u201352"},{"key":"727_CR11","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1109\/MSP.2010.45","volume":"8","author":"T Jaeger","year":"2010","unstructured":"Jaeger T, Schiffman J (2010) Outlook: Cloudy with a chance of security challenges and improvements. IEEE Secur Priv 8:77\u201380","journal-title":"IEEE Secur Priv"},{"key":"727_CR12","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1145\/1653662.1653687","volume-title":"Proceedings of the 16th ACM conference on computer and communications security, CCS \u201909","author":"T Ristenpart","year":"2009","unstructured":"Ristenpart T, Tromer E, Shacham H, Savage S (2009) Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In: Proceedings of the 16th ACM conference on computer and communications security, CCS \u201909. ACM, New York, pp 199\u2013212"},{"key":"727_CR13","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1109\/MSP.2009.124","volume":"7","author":"B Michael","year":"2009","unstructured":"Michael B (2009) In clouds shall we trust? IEEE Secur Priv 7:3","journal-title":"IEEE Secur Priv"},{"key":"727_CR14","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1109\/MSP.2009.87","volume":"7","author":"LM Kaufman","year":"2009","unstructured":"Kaufman LM (2009) Data security in the world of cloud computing. IEEE Secur Priv 7:61\u201364","journal-title":"IEEE Secur Priv"},{"key":"727_CR15","first-page":"131","volume-title":"Proceedings of the 1st international conference on cloud computing, CloudCom \u201909","author":"S Pearson","year":"2009","unstructured":"Pearson S, Charlesworth A (2009) Accountability as a way forward for privacy protection in the cloud. In: Proceedings of the 1st international conference on cloud computing, CloudCom \u201909. Springer, Berlin, pp 131\u2013144"},{"key":"727_CR16","unstructured":"U.S. Department of Health and Human Services, http:\/\/www.hhs.gov\/ocr\/privacy\/ (2003) Protecting Personal Health Information in Research: Understanding the HIPAA Privacy Rule"},{"key":"727_CR17","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1145\/1721654.1721674","volume":"53","author":"S Yekhanin","year":"2010","unstructured":"Yekhanin S (2010) Private information retrieval. Commun ACM 53:68\u201373","journal-title":"Commun ACM"},{"key":"727_CR18","volume-title":"Proceedings of the fifth workshop on the economics of information security (WEIS 2006)","author":"E-J Goh","year":"2006","unstructured":"Goh E-J, Shacham H, Modadugu N, Boneh D (2006) Sirius: Securing remote untrusted storage. In: Proceedings of the fifth workshop on the economics of information security (WEIS 2006)"},{"key":"727_CR19","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1007\/s10207-009-0081-6","volume":"8","author":"E Geron","year":"2009","unstructured":"Geron E, Wool A (2009) Crust: cryptographic remote untrusted storage without public keys. Int J Inf Secur 8:357\u2013377","journal-title":"Int J Inf Secur"},{"key":"727_CR20","volume-title":"Proc. network and distributed systems security symposium (NDSS)","author":"K Fu","year":"2006","unstructured":"Fu K, Kamara S, Kohno T (2006) Key regression: Enabling efficient key distribution for secure distributed storage. In: Proc. network and distributed systems security symposium (NDSS)"},{"key":"727_CR21","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/SISW.2005.7","volume-title":"Proceedings of the third IEEE international security in storage workshop","author":"M Backes","year":"2005","unstructured":"Backes M, Oprea A (2005) Lazy revocation in cryptographic file systems. In: Proceedings of the third IEEE international security in storage workshop. IEEE Computer Society, Washington, DC, pp 1\u201311"},{"key":"727_CR22","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1145\/1655008.1655024","volume-title":"Proceedings of the 2009 ACM workshop on cloud computing security, CCSW \u201909","author":"J Benaloh","year":"2009","unstructured":"Benaloh J, Chase M, Horvitz E, Lauter K (2009) Patient controlled encryption: ensuring privacy of electronic medical records. In: Proceedings of the 2009 ACM workshop on cloud computing security, CCSW \u201909. ACM, New York, pp 103\u2013114"},{"key":"727_CR23","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1109\/SP.2007.11","volume-title":"Proceedings of the 2007 IEEE symposium on security and privacy, SP \u201907","author":"J Bethencourt","year":"2007","unstructured":"Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: Proceedings of the 2007 IEEE symposium on security and privacy, SP \u201907. IEEE Computer Society, Washington, DC, pp 321\u2013334"},{"key":"727_CR24","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1127345.1127346","volume":"9","author":"G Ateniese","year":"2006","unstructured":"Ateniese G, Fu K, Green M, Hohenberger S (2006) Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans Inf Syst Secur 9:1\u201330","journal-title":"ACM Trans Inf Syst Secur"},{"key":"727_CR25","first-page":"534","volume-title":"Proceedings of the 29th conference on information communications, INFOCOM\u201910","author":"S Yu","year":"2010","unstructured":"Yu S, Wang C, Ren K, Lou W (2010) Achieving secure, scalable, and fine-grained data access control in cloud computing. In: Proceedings of the 29th conference on information communications, INFOCOM\u201910. IEEE Press, Piscataway, pp 534\u2013542"},{"key":"727_CR26","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1145\/1180405.1180418","volume-title":"Proceedings of the 13th ACM conference on computer and communications security, CCS \u201906","author":"V Goyal","year":"2006","unstructured":"Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM conference on computer and communications security, CCS \u201906. ACM, New York, pp 89\u201398"},{"key":"727_CR27","first-page":"29","volume-title":"Proceedings of the 2nd USENIX conference on file and storage technologies","author":"M Kallahalla","year":"2003","unstructured":"Kallahalla M, Riedel E, Swaminathan R, Wang Q, Fu K (2003) Plutus: Scalable secure file sharing on untrusted storage. In: Proceedings of the 2nd USENIX conference on file and storage technologies. USENIX Association, Berkeley, pp 29\u201342"},{"key":"727_CR28","unstructured":"di Vimercati SDC, Foresti S, Jajodia S, Paraboschi S, Samarati P (2007) Over-encryption: management of access control evolution on outsourced data. In: Proceedings of the 33rd international conference on very large data bases, VLDB Endowment, VLDB \u201907, pp. 123\u2013134"},{"key":"727_CR29","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1145\/1755688.1755720","volume-title":"Proceedings of the 5th ACM symposium on information, computer and communications security, ASIACCS \u201910","author":"S Yu","year":"2010","unstructured":"Yu S, Wang C, Ren K, Lou W (2010) Attribute based data sharing with attribute revocation. In: Proceedings of the 5th ACM symposium on information, computer and communications security, ASIACCS \u201910. ACM, New York, pp 261\u2013270"},{"key":"727_CR30","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1145\/1314333.1314337","volume-title":"Proceedings of the 2007 ACM workshop on privacy in electronic society, WPES \u201907","author":"E Brickell","year":"2007","unstructured":"Brickell E, Li J (2007) Enhanced privacy id: a direct anonymous attestation scheme with enhanced revocation capabilities. In: Proceedings of the 2007 ACM workshop on privacy in electronic society, WPES \u201907. ACM, New York, pp 21\u201330"},{"key":"727_CR31","first-page":"273","volume-title":"Proceedings of the 2001 international symposium on database engineering & applications","author":"MW Jingmin\u00a0He","year":"2001","unstructured":"Jingmin\u00a0He MW (2001) Cryptography and relational database management systems. In: Proceedings of the 2001 international symposium on database engineering & applications. IEEE Computer Society, Washington, DC, pp 273\u2013284"},{"key":"727_CR32","unstructured":"Bethencourt J, Waters B, Sahai A Ciphertext-policy attribute-based encryption. http:\/\/acsc.cs.utexas.edu\/cpabe\/ , accessed on Dec 10, 2010"},{"key":"727_CR33","volume-title":"Handbook of applied cryptography","author":"AJ Menezes","year":"1997","unstructured":"Menezes AJ, Oorschot PCV, Vanstone SA, Rivest RL (1997) Handbook of applied cryptography"},{"key":"727_CR34","unstructured":"Google App Engine\u2014Run your web applications on Google\u2019s infrastructure. http:\/\/code.google.com\/appengine\/"},{"key":"727_CR35","doi-asserted-by":"crossref","unstructured":"Adams C, Farrell S (1999) Internet x.509 public key infrastructure certificate management protocols","DOI":"10.17487\/rfc2510"},{"key":"727_CR36","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir A (1979) How to share a secret. Commun ACM 22:612\u2013613","journal-title":"Commun ACM"},{"key":"727_CR37","unstructured":"Interpolating Polynomial The Wolfram Demonstrations Project. http:\/\/demonstrations.wolfram.com\/InterpolatingPolynomial\/"},{"issue":"3","key":"727_CR38","doi-asserted-by":"crossref","first-page":"183","DOI":"10.5626\/JCSE.2011.5.3.183","volume":"5","author":"H Guo","year":"2011","unstructured":"Guo H, Viktor H, Paquet E (2011) Privacy disclosure and preservation in learning with multi-relational databases. J Comput Sci Eng 5(3):183\u2013196","journal-title":"J Comput Sci Eng"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-011-0727-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11227-011-0727-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-011-0727-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,22]],"date-time":"2019-06-22T05:23:24Z","timestamp":1561181004000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11227-011-0727-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,1,7]]},"references-count":38,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2012,10]]}},"alternative-id":["727"],"URL":"https:\/\/doi.org\/10.1007\/s11227-011-0727-9","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,1,7]]}}}