{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T15:43:32Z","timestamp":1767109412080},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2020,1,2]],"date-time":"2020-01-02T00:00:00Z","timestamp":1577923200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,2]],"date-time":"2020-01-02T00:00:00Z","timestamp":1577923200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2020,8]]},"DOI":"10.1007\/s11227-019-03119-7","type":"journal-article","created":{"date-parts":[[2020,1,2]],"date-time":"2020-01-02T23:03:02Z","timestamp":1578006182000},"page":"6040-6064","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["An attribute-based lightweight cloud data access control using hypergraph structure"],"prefix":"10.1007","volume":"76","author":[{"given":"R.","family":"Mythili","sequence":"first","affiliation":[]},{"given":"Revathi","family":"Venkataraman","sequence":"additional","affiliation":[]},{"given":"T.","family":"Sai Raj","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,2]]},"reference":[{"key":"3119_CR1","doi-asserted-by":"crossref","unstructured":"Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Advances in Cryptology\u2014EUROCRYPT 2005. Springer, Berlin, pp 457\u2013473. ISBN 978-3-540-32055-5","DOI":"10.1007\/11426639_27"},{"key":"3119_CR2","doi-asserted-by":"publisher","unstructured":"Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS\u201906, New York, NY, USA, 2006. ACM, pp 89\u201398. ISBN 1-59593-518-5. https:\/\/doi.org\/10.1145\/1180405.1180418","DOI":"10.1145\/1180405.1180418"},{"key":"3119_CR3","doi-asserted-by":"publisher","unstructured":"Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy (SP\u201907), pp. 321\u2013334. https:\/\/doi.org\/10.1109\/sp.2007.11","DOI":"10.1109\/sp.2007.11"},{"key":"3119_CR4","doi-asserted-by":"crossref","unstructured":"Chase M (2007) Multi-authority attribute-based encryption. In: Theory of Cryptography. Springer, Berlin, pp 515\u2013534. ISBN 978-3-540-70936-7","DOI":"10.1007\/978-3-540-70936-7_28"},{"issue":"5","key":"3119_CR5","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1016\/j.cose.2011.05.006","volume":"30","author":"G Wang","year":"2011","unstructured":"Wang G, Liu Q, Wu J, Guo M (2011) Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers. Comput Secur 30(5):320\u2013331. https:\/\/doi.org\/10.1016\/j.cose.2011.05.006","journal-title":"Comput Secur"},{"key":"3119_CR6","doi-asserted-by":"crossref","unstructured":"Attrapadung N, Imai H (2009) Conjunctive broadcast and attribute-based encryption. In: Shacham H, Waters B (eds) Pairing-Based Cryptography\u2014Pairing 2009. Springer, Berlin, pp 248\u2013265. ISBN 978-3-642-03298-1","DOI":"10.1007\/978-3-642-03298-1_16"},{"key":"3119_CR7","doi-asserted-by":"crossref","unstructured":"Pandit T, Pandey SK, Barua R (2014) Attribute-based signcryption: signer privacy, strong unforgeability and IND-CCA2 security in adaptive-predicates attack. In: Chow SSM, Liu JK, Hui LCK, Yiu SM (eds) Provable Security. Springer International Publishing, Cham, pp 274\u2013290. ISBN 978-3-319-12475-9","DOI":"10.1007\/978-3-319-12475-9_19"},{"issue":"1","key":"3119_CR8","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1109\/TIFS.2012.2223683","volume":"8","author":"Z Liu","year":"2013","unstructured":"Liu Z, Cao Z, Wong DS (2013) White-box traceable ciphertext-policy attribute-based encryption supporting any monotone access structures. IEEE Trans Inf Forensics Secur 8(1):76\u201388. https:\/\/doi.org\/10.1109\/TIFS.2012.2223683","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"3119_CR9","doi-asserted-by":"publisher","unstructured":"Zhang Y, Zheng D (2017) Anonymous attribute-based encryption with large universe and threshold access structures. In: 2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), vol 1, pp 870\u2013874. https:\/\/doi.org\/10.1109\/cse-euc.2017.175","DOI":"10.1109\/cse-euc.2017.175"},{"key":"3119_CR10","doi-asserted-by":"publisher","unstructured":"Wolf MM, Klinvex AM, Dunlavy DM (2016). Advantages to modeling relational data using hypergraphs versus graphs. In 2016 IEEE High Performance Extreme Computing Conference (HPEC), pp 1\u20137. https:\/\/doi.org\/10.1109\/hpec.2016.7761624","DOI":"10.1109\/hpec.2016.7761624"},{"key":"3119_CR11","doi-asserted-by":"publisher","first-page":"39473","DOI":"10.1109\/ACCESS.2018.2843778","volume":"6","author":"F Deng","year":"2018","unstructured":"Deng F, Wang Y, Peng L, Xiong H, Geng J, Qin Z (2018) Ciphertext-policy attribute-based signcryption with verifiable outsourced designcryption for sharing personal health records. IEEE Access 6:39473\u201339486. https:\/\/doi.org\/10.1109\/ACCESS.2018.2843778","journal-title":"IEEE Access"},{"key":"3119_CR12","doi-asserted-by":"publisher","first-page":"34051","DOI":"10.1109\/ACCESS.2018.2844829","volume":"6","author":"Q Xu","year":"2018","unstructured":"Xu Q, Tan C, Fan Z, Zhu W, Xiao Y, Cheng F (2018) Secure multi-authority data access control scheme in cloud storage system based on attribute-based signcryption. IEEE Access 6:34051\u201334074. https:\/\/doi.org\/10.1109\/ACCESS.2018.2844829","journal-title":"IEEE Access"},{"issue":"8","key":"3119_CR13","doi-asserted-by":"publisher","first-page":"2062","DOI":"10.1109\/TIFS.2018.2809679","volume":"13","author":"K Xue","year":"2018","unstructured":"Xue K, Chen W, Li W, Hong J, Hong P (2018) Combining data owner-side and cloud-side access control for encrypted cloud storage. IEEE Trans Inf Forensics Secur 13(8):2062\u20132074. https:\/\/doi.org\/10.1109\/TIFS.2018.2809679","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"3119_CR14","doi-asserted-by":"publisher","unstructured":"Agrawal S, Chase M (2017) FAME: fast attribute-based message encryption. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS\u201917. ACM, pp 665\u2013682. ISBN 978-1-4503-4946-8. https:\/\/doi.org\/10.1145\/3133956.3134014","DOI":"10.1145\/3133956.3134014"},{"issue":"4","key":"3119_CR15","doi-asserted-by":"publisher","first-page":"231","DOI":"10.6633\/IJNS.201307.15(4).01","volume":"15","author":"C-C Lee","year":"2013","unstructured":"Lee C-C, Chung P-S, Hwang M-S (2013) A survey on attribute-based encryption schemes of access control in cloud environments. Int J Netw Secur 15(4):231\u2013240. https:\/\/doi.org\/10.6633\/IJNS.201307.15(4).01","journal-title":"Int J Netw Secur"},{"key":"3119_CR16","doi-asserted-by":"publisher","first-page":"76381","DOI":"10.1109\/ACCESS.2018.2878527","volume":"6","author":"Z Liu","year":"2018","unstructured":"Liu Z, Liu Y, Fan Y (2018) Searchable attribute-based signcryption scheme for electronic personal health record. IEEE Access 6:76381\u201376394. https:\/\/doi.org\/10.1109\/ACCESS.2018.2878527","journal-title":"IEEE Access"},{"key":"3119_CR17","doi-asserted-by":"crossref","unstructured":"Debnath S, Nunsanga MVL, Bhuyan B (2019) Study and scope of signcryption for cloud data access control. In: Advances in computer, communication and control. Springer Singapore, pp 113\u2013126. ISBN 978-981-13-3122-0","DOI":"10.1007\/978-981-13-3122-0_12"},{"key":"3119_CR18","doi-asserted-by":"publisher","unstructured":"Ruj S (2014) Attribute based access control in clouds: a survey. In: 2014 International Conference on Signal Processing and Communications (SPCOM), pp 1\u20136. https:\/\/doi.org\/10.1109\/spcom.2014.6983992","DOI":"10.1109\/spcom.2014.6983992"},{"key":"3119_CR19","doi-asserted-by":"publisher","unstructured":"Li Q, Zhu H (2017) Multi-authority attribute-based access control scheme in mhealth cloud with unbounded attribute universe and decryption outsourcing. In: 2017 9th International Conference on Wireless Communications and Signal Processing (WCSP), pp 1\u20137. https:\/\/doi.org\/10.1109\/wcsp.2017.8171106","DOI":"10.1109\/wcsp.2017.8171106"},{"key":"3119_CR20","doi-asserted-by":"publisher","unstructured":"Yundong F, Xiaoping W, Jiasheng W (2017) Multi-authority attribute-based encryption access control scheme with hidden policy and constant length ciphertext for cloud storage. In: 2017 IEEE Second International Conference on Data Science in Cyberspace (DSC), pp 205\u2013212. https:\/\/doi.org\/10.1109\/dsc.2017.10","DOI":"10.1109\/dsc.2017.10"},{"key":"3119_CR21","doi-asserted-by":"publisher","unstructured":"Yang K, Jia X (2012) Attributed-based access control for multi-authority systems in cloud storage. In: 2012 IEEE 32nd International Conference on Distributed Computing Systems, pp 536\u2013545. https:\/\/doi.org\/10.1109\/icdcs.2012.42","DOI":"10.1109\/icdcs.2012.42"},{"key":"3119_CR22","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1016\/j.future.2016.07.019","volume":"67","author":"Y Sreenivasa Rao","year":"2017","unstructured":"Sreenivasa Rao Y (2017) A secure and efficient ciphertext-policy attribute-based signcryption for personal health records sharing in cloud computing. Future Gener Comput Syst 67:133\u2013151. https:\/\/doi.org\/10.1016\/j.future.2016.07.019","journal-title":"Future Gener Comput Syst"},{"key":"3119_CR23","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2864186","author":"K He","year":"2018","unstructured":"He K, Guo J, Weng J, Weng J, Liu JK, Yi X (2018) Attribute-based hybrid Boolean keyword search over outsourced encrypted data. IEEE Trans Dependable Secure Comput. https:\/\/doi.org\/10.1109\/TDSC.2018.2864186","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"3119_CR24","doi-asserted-by":"publisher","unstructured":"Nikam R, Potey M (2016) Cloud storage security using multi-factor authentication. In: 2016 International Conference on Recent Advances and Innovations in Engineering (ICRAIE), pp 1\u20137. https:\/\/doi.org\/10.1109\/icraie.2016.7939528","DOI":"10.1109\/icraie.2016.7939528"},{"key":"3119_CR25","doi-asserted-by":"publisher","unstructured":"Jemel M, Serhrouchni A (2017) Decentralized access control mechanism with temporal dimension based on blockchain. In: 2017 IEEE 14th International Conference on e-Business Engineering (ICEBE), pp 177\u2013182. https:\/\/doi.org\/10.1109\/icebe.2017.35","DOI":"10.1109\/icebe.2017.35"},{"key":"3119_CR26","unstructured":"Zhou D, Huang J, Sch\u00f6lkopf B (2006) Learning with hypergraphs: clustering, classification, and embedding. In: Proceedings of the 19th International Conference on Neural Information Processing Systems, NIPS\u201906, pp 1601\u20131608. MIT Press, Cambridge. http:\/\/dl.acm.org\/citation.cfm?id=2976456.2976657"},{"key":"3119_CR27","unstructured":"Rich. Human resources data set (Version 3) - Version 13 of dataset. https:\/\/www.kaggle.com\/rhuebner\/human-resources-data-set"},{"key":"3119_CR28","unstructured":"Bethencourt J, Sahai A, Waters B (2011) Advanced crypto software collection: the cpabe toolkit. http:\/\/acsc.cs.utexas.edu\/cpabe. Accessed 24 Mar 2011"},{"key":"3119_CR29","unstructured":"PKCS1-PSS sign method. https:\/\/www.dlitz.net\/software\/pycrypto\/api\/current\/Crypto.Signature.PKCS1_PSS-module.html. Accessed 24 Mar 2012"},{"key":"3119_CR30","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1016\/j.future.2014.10.014","volume":"52","author":"J Liu","year":"2015","unstructured":"Liu J, Huang X, Liu JK (2015) Secure sharing of personal health records in cloud computing: ciphertext-policy attribute-based signcryption. Future Gener Comput Syst 52:67\u201376. https:\/\/doi.org\/10.1016\/j.future.2014.10.014(Special Section: Cloud Computing: Security, Privacy and Practice)","journal-title":"Future Gener Comput Syst"},{"issue":"8","key":"3119_CR31","doi-asserted-by":"publisher","first-page":"2201","DOI":"10.1109\/TPDS.2013.271","volume":"25","author":"J Li","year":"2014","unstructured":"Li J, Huang X, Li J, Chen X, Xiang Y (2014) Securely outsourcing attribute-based encryption with checkability. IEEE Trans Parallel Distrib Syst 25(8):2201\u20132210. https:\/\/doi.org\/10.1109\/TPDS.2013.271","journal-title":"IEEE Trans Parallel Distrib Syst"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-019-03119-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11227-019-03119-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-019-03119-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:33:02Z","timestamp":1609461182000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11227-019-03119-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,2]]},"references-count":31,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2020,8]]}},"alternative-id":["3119"],"URL":"https:\/\/doi.org\/10.1007\/s11227-019-03119-7","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,1,2]]},"assertion":[{"value":"2 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}