{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T16:07:35Z","timestamp":1774541255148,"version":"3.50.1"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2021,9,18]],"date-time":"2021-09-18T00:00:00Z","timestamp":1631923200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,9,18]],"date-time":"2021-09-18T00:00:00Z","timestamp":1631923200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Comput Virol Hack Tech"],"published-print":{"date-parts":[[2022,9]]},"DOI":"10.1007\/s11416-021-00402-1","type":"journal-article","created":{"date-parts":[[2021,9,18]],"date-time":"2021-09-18T15:02:15Z","timestamp":1631977335000},"page":"171-182","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["Role based access control using identity and broadcast based encryption for securing cloud data"],"prefix":"10.1007","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0419-4530","authenticated-orcid":false,"given":"Urvashi Rahul","family":"Saxena","sequence":"first","affiliation":[]},{"given":"Taj","family":"Alam","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,18]]},"reference":[{"key":"402_CR1","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1016\/j.jnca.2014.07.001","volume":"59","author":"Z Liu","year":"2016","unstructured":"Liu, Z., Chen Yang, J., et al.: New order preserving encryption model for outsourced databases in cloud environments. J. Netw. Comput. Appl. 59, 198\u2013207 (2016)","journal-title":"J. Netw. Comput. Appl."},{"key":"402_CR2","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/j.jnca.2018.01.014","volume":"107","author":"J Xu","year":"2018","unstructured":"Xu, J., Wei, L., Zhang, Y., et al.: Dynamic fully homomorphic encryption-based Merkle tree for lightweight streaming authenticated data structures. J. Netw. Comput. Appl. 107, 113\u2013124 (2018)","journal-title":"J. Netw. Comput. Appl."},{"key":"402_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ins.2018.02.071","volume":"447","author":"Z Liu","year":"2018","unstructured":"Liu, Z., Huang, Y., et al.: DivORAM: towards a practical oblivious RAM with variable block size. Inf. Sci. 447, 1\u201311 (2018)","journal-title":"Inf. Sci."},{"key":"402_CR4","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2019.2891581","author":"Z Liu","year":"2019","unstructured":"Liu, Z., Li, B., Huang, Y., et al.: NewMCOS: towards a practical multi-cloud oblivious storage scheme. IEEE Trans. Knowl. Data Eng. (2019). https:\/\/doi.org\/10.1109\/TKDE.2019.2891581","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"402_CR5","doi-asserted-by":"publisher","first-page":"62584","DOI":"10.1109\/ACCESS.2018.2876126","volume":"6","author":"X Yue","year":"2018","unstructured":"Yue, X., Chen, B., Wang, X., et al.: An efficient and secure anonymous authentication scheme for VANETs based on the framework of group signatures. IEEE Access 6, 62584\u201362600 (2018)","journal-title":"IEEE Access"},{"key":"402_CR6","unstructured":"Meyers, C.: https:\/\/lacework.com\/top-cloud-breaches\/ (2019)"},{"key":"402_CR7","first-page":"217","volume":"2007","author":"R Sakai","year":"2007","unstructured":"Sakai, R., Furukawa, J.: Identity-based broadcast encryption. IACR Cryptol. ePrint Arch. 2007, 217 (2007)","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"402_CR8","doi-asserted-by":"crossref","unstructured":"Delerabl\u00e9e, C.: Identity-based broadcast encryption with constant size ciphertexts and private keys. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 200\u2013215. Springer, Berlin (2007)","DOI":"10.1007\/978-3-540-76900-2_12"},{"issue":"4","key":"402_CR9","doi-asserted-by":"publisher","first-page":"697","DOI":"10.1007\/s11390-011-1169-9","volume":"26","author":"Y Zhu","year":"2011","unstructured":"Zhu, Y., Hu, H.X., Ahn, G.J., Wang, H.X., Wang, S.B.: Provably secure role-based encryption with revocation mechanism. J. Comput. Sci. Technol. 26(4), 697\u2013710 (2011)","journal-title":"J. Comput. Sci. Technol."},{"issue":"10","key":"402_CR10","doi-asserted-by":"publisher","first-page":"1675","DOI":"10.1093\/comjnl\/bxr080","volume":"54","author":"L Zhou","year":"2011","unstructured":"Zhou, L., Varadharajan, V., Hitchens, M.: Enforcing role-based access control for secure data storage in the cloud. Comput. J. 54(10), 1675\u20131687 (2011)","journal-title":"Comput. J."},{"issue":"3","key":"402_CR11","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1145\/357369.357372","volume":"1","author":"SG Akl","year":"1983","unstructured":"Akl, S.G., Taylor, P.D.: Cryptographic solution to a problem of access control in a hierarchy. ACM Trans. Comput. Syst. (TOCS) 1(3), 239\u2013248 (1983)","journal-title":"ACM Trans. Comput. Syst. (TOCS)"},{"issue":"3","key":"402_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1455526.1455531","volume":"12","author":"MJ Atallah","year":"2009","unstructured":"Atallah, M.J., Blanton, M., Fazio, N., Frikken, K.B.: Dynamic and efficient key management for access hierarchies. ACM Trans. Inf. Syst. Secur. (TISSEC) 12(3), 1\u201343 (2009)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"issue":"11","key":"402_CR13","doi-asserted-by":"publisher","first-page":"3197","DOI":"10.1016\/j.comnet.2006.12.011","volume":"51","author":"HR Hassen","year":"2007","unstructured":"Hassen, H.R., Bouabdallah, A., Bettahar, H., Challal, Y.: Key management for content access control in a hierarchy. Comput. Netw. 51(11), 3197\u20133219 (2007)","journal-title":"Comput. Netw."},{"key":"402_CR14","unstructured":"Di Vimercati, S.D.C., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Over-encryption: management of access control evolution on outsourced data. In: Proceedings of the 33rd International Conference on Very Large Data Bases, pp. 123\u2013134 (2007)"},{"key":"402_CR15","doi-asserted-by":"crossref","unstructured":"Blundo, C., Cimato, S., di Vimercati, S.D.C., De Santis, A., Foresti, S., Paraboschi, S., Samarati, P.: Efficient key management for enforcing access control in outsourced scenarios. In: IFIP International Information Security Conference, pp. 364\u2013375. Springer, Berlin (2009)","DOI":"10.1007\/978-3-642-01244-0_32"},{"key":"402_CR16","doi-asserted-by":"crossref","unstructured":"Samarati, P., Di Vimercati, S.D.C.: Data protection in outsourcing scenarios: issues and directions. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, pp. 1\u201314 (2010)","DOI":"10.1145\/1755688.1755690"},{"key":"402_CR17","doi-asserted-by":"crossref","unstructured":"Gentry, C., Silverberg, A.: Hierarchical ID-based cryptography. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 548\u2013566. Springer, Berlin (2002)","DOI":"10.1007\/3-540-36178-2_34"},{"key":"402_CR18","doi-asserted-by":"crossref","unstructured":"Boneh, D., Boyen, X., Goh, E.J.: Hierarchical identity based encryption with constant size ciphertext. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 440\u2013456. Springer, Berlin (2005)","DOI":"10.1007\/11426639_26"},{"key":"402_CR19","doi-asserted-by":"crossref","unstructured":"Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89\u201398 (2006)","DOI":"10.1145\/1180405.1180418"},{"key":"402_CR20","doi-asserted-by":"crossref","unstructured":"Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 457\u2013473. Springer, Berlin (2005)","DOI":"10.1007\/11426639_27"},{"key":"402_CR21","doi-asserted-by":"crossref","unstructured":"Yu, S., Wang, C., Ren, K., Lou, W.: Achieving secure, scalable, and fine-grained data access control in cloud computing. In: 2010 Proceedings IEEE INFOCOM, pp. 1\u20139. IEEE (2010)","DOI":"10.1109\/INFCOM.2010.5462174"},{"key":"402_CR22","doi-asserted-by":"crossref","unstructured":"Zhu, Y., Ma, D., Hu, C.J., Huang, D.: How to use attribute-based encryption to implement role-based access control in the cloud. In: Proceedings of the 2013 International Workshop on Security in Cloud Computing, pp. 33\u201340 (2013)","DOI":"10.1145\/2484402.2484411"},{"key":"402_CR23","unstructured":"Goh, E.J., Shacham, H., Modadugu, N., Boneh, D.: SiRiUS: securing remote untrusted storage. In: NDSS, vol. 3, pp. 131\u2013145 (2003)."},{"issue":"1","key":"402_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1127345.1127346","volume":"9","author":"G Ateniese","year":"2006","unstructured":"Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. (TISSEC) 9(1), 1\u201330 (2006)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"key":"402_CR25","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-019-01484-4","author":"J Xu","year":"2020","unstructured":"Xu, J., Yu, Y., Meng, Q., Wu, Q., Zhou, F.: Role-based access control model for cloud storage using identity-based cryptosystem. Mob. Netw. Appl. (2020). https:\/\/doi.org\/10.1007\/s11036-019-01484-4","journal-title":"Mob. Netw. Appl."}],"container-title":["Journal of Computer Virology and Hacking Techniques"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-021-00402-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11416-021-00402-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-021-00402-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,9]],"date-time":"2023-01-09T17:02:27Z","timestamp":1673283747000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11416-021-00402-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,18]]},"references-count":25,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,9]]}},"alternative-id":["402"],"URL":"https:\/\/doi.org\/10.1007\/s11416-021-00402-1","relation":{},"ISSN":["2263-8733"],"issn-type":[{"value":"2263-8733","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,9,18]]},"assertion":[{"value":"8 May 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 September 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 September 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"On behalf of all authors, the corresponding author states that there is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}