{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T14:57:53Z","timestamp":1773413873087,"version":"3.50.1"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2016,9,1]],"date-time":"2016-09-01T00:00:00Z","timestamp":1472688000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Data Sci. Eng."],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1007\/s41019-016-0014-0","type":"journal-article","created":{"date-parts":[[2016,9,6]],"date-time":"2016-09-06T04:59:33Z","timestamp":1473137973000},"page":"149-160","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["A Cryptographically Enforced Access Control with a Flexible User Revocation on Untrusted Cloud Storage"],"prefix":"10.1007","volume":"1","author":[{"given":"Jongkil","family":"Kim","sequence":"first","affiliation":[]},{"given":"Surya","family":"Nepal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,6]]},"reference":[{"key":"14_CR1","unstructured":"https:\/\/gmplib.org\/ . Accessed 07 June 2016"},{"key":"14_CR2","unstructured":"https:\/\/www.virtualbox.org\/ . Accessed: 07 June 2016"},{"key":"14_CR3","unstructured":"DropBox. http:\/\/www.dropbox.com . Accessed: 04 June 2016"},{"key":"14_CR4","unstructured":"Google Drive. https:\/\/www.google.com.au\/drive . Accessed: 04 June 2016"},{"key":"14_CR5","unstructured":"OneDrive. https:\/\/onedrive.live.com . Accessed: 04 June 2016"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Attrapadung N, Hideki I (2009) Conjunctive broadcast and attribute-based encryption. In: Shacham H, Waters B (eds) Pairing, volume 5671 of LNCS. Springer, pp 248\u2013265","DOI":"10.1007\/978-3-642-03298-1_16"},{"issue":"2","key":"14_CR7","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1515\/jmc.2011.009","volume":"5","author":"N Attrapadung","year":"2012","unstructured":"Attrapadung N, Libert B (2012) Functional encryption for public-attribute inner products: achieving constant-size ciphertexts with adaptive security or support for negation. J Math Cryptol 5(2):115\u2013158","journal-title":"J Math Cryptol"},{"key":"14_CR8","doi-asserted-by":"crossref","unstructured":"Baden R, Bender A, Spring N, Bhattacharjee B, Starin D (2009) Persona: an online social network with user-defined privacy. In: Rodriguez P, Biersack EW, Papagiannaki K, Rizzo L (eds) ACM SIGCOMM. ACM, pp 135\u2013146","DOI":"10.1145\/1592568.1592585"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"Baek J, Safavi-Naini R, Susilo W (2005) Efficient multi-receiver identity-based encryption and its application to broadcast encryption. In: Public key cryptography. pp 380\u2013397","DOI":"10.1007\/978-3-540-30580-4_26"},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Boneh D, Lewi K, Montgomery HW, Raghunathan A (2013) Key homomorphic prfs and their applications. In: Canetti R, Garay JA (eds) CRYPTO, volume 8042 of LNCS. Springer, pp 410\u2013428","DOI":"10.1007\/978-3-642-40041-4_23"},{"key":"14_CR11","unstructured":"Fiat A, Naor M (1993) Broadcast encryption. In: CRYPTO. pp 480\u2013491"},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"Gentry C, Waters B (2009) Adaptive security in broadcast encryption systems (with short ciphertexts). In: EUROCRYPT. pp 171\u2013188","DOI":"10.1007\/978-3-642-01001-9_10"},{"key":"14_CR13","doi-asserted-by":"crossref","unstructured":"Goodrich MT, Sun JZ, Tamassia R (2004) Efficient tree-based revocation in groups of low-state devices. In: CRYPTO. pp 511\u2013527","DOI":"10.1007\/978-3-540-28628-8_31"},{"key":"14_CR14","doi-asserted-by":"crossref","unstructured":"Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Juels A, Wright RN, De Capitani di Vimercati S (eds) ACM conference on computer and communications security. ACM, pp 89\u201398","DOI":"10.1145\/1180405.1180418"},{"key":"14_CR15","unstructured":"Hardt D (2012) The oauth 2.0 authorization framework. RFC 6749"},{"key":"14_CR16","unstructured":"Hess F (2002) Efficient identity based signature schemes based on pairings. In: Nyberg K, Heys HM (eds) SAC. pp 310\u2013324"},{"key":"14_CR17","doi-asserted-by":"crossref","unstructured":"Horv\u00e1th M (2015) Attribute-based encryption optimized for cloud computing. In: Italiano GF, Margaria-Steffen T, Pokorn\u00fd J, Quisquater J-J, Wattenhofer R (eds) SOFSEM, volume 8939 of LNCS. Springer, pp 566\u2013577","DOI":"10.1007\/978-3-662-46078-8_47"},{"key":"14_CR18","doi-asserted-by":"crossref","unstructured":"Katz J, Sahai A, Waters B (2008) Predicate encryption supporting disjunctions, polynomial equations, and inner products. In: EUROCRYPT. pp 146\u2013162","DOI":"10.1007\/978-3-540-78967-3_9"},{"key":"14_CR19","unstructured":"Kim J, Susilo W, Au MH, Seberry J (2013) Efficient semi-static secure broadcast encryption scheme. In: Cao Z, Zhang F (eds) Pairing, volume 8365 of LNCS. Springer, pp 62\u201376"},{"key":"14_CR20","doi-asserted-by":"crossref","unstructured":"Lewko AB, Sahai A, Waters B (2010) Revocation systems with very small private keys. In: IEEE symposium on security and privacy. pp 273\u2013285","DOI":"10.1109\/SP.2010.23"},{"issue":"1","key":"14_CR21","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1109\/TPDS.2012.97","volume":"24","author":"M Li","year":"2013","unstructured":"Li M, Shucheng Y, Zheng Y, Ren K, Lou W (2013) Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans. Parallel Distrib. Syst. 24(1):131\u2013143","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"14_CR22","unstructured":"Litzenberger D (2014) PyCrypto: the python cryptography toolkit. https:\/\/www.dlitz.net\/software\/pycrypto\/"},{"key":"14_CR23","doi-asserted-by":"crossref","unstructured":"Liu Z, Wong DS (2015) Practical ciphertext-policy attribute-based encryption: traitor tracing, revocation, and large universe. In: Malkin T, Kolesnikov V, Lewko AB, Polychronakis M (eds) ACNS, volume 9092 of LNCS. Springer, pp 127\u2013146","DOI":"10.1007\/978-3-319-28166-7_7"},{"key":"14_CR24","unstructured":"Lynn B (2007) On the implementation of pairing-based cryptosystems, Ph.D. thesis, Ph.D. thesis, Stanford University"},{"key":"14_CR25","doi-asserted-by":"crossref","unstructured":"Maffei M, Malavolta G, Reinert M, Schr\u00f6der D (2015) Privacy and access control for outsourced personal records. In: IEEE symposium on security and privacy. IEEE Computer Society, pp 341\u2013358","DOI":"10.1109\/SP.2015.28"},{"key":"14_CR26","doi-asserted-by":"crossref","unstructured":"Naor D, Naor M, Lotspiech J (2001) Revocation and tracing schemes for stateless receivers. In: CRYPTO. pp 41\u201362","DOI":"10.1007\/3-540-44647-8_3"},{"key":"14_CR27","doi-asserted-by":"crossref","unstructured":"Narayan S, Gagn\u00e9 M, Safavi-Naini R (2010) Privacy preserving EHR system using attribute-based infrastructure. In: Perrig A, Sion R (eds) ACM CCSW. ACM, pp 47\u201352","DOI":"10.1145\/1866835.1866845"},{"issue":"99","key":"14_CR28","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TCC.2015.2489638","volume":"PP","author":"S Nepal","year":"2015","unstructured":"Nepal S, Sinnott R, Friedrich C, Wise C, Chen S, Kanwal S, Yao J, Lonie A (2015) Truxy: trusted storage cloud for scientific workflows. IEEE Trans Cloud Comput PP(99):1","journal-title":"IEEE Trans Cloud Comput"},{"key":"14_CR29","doi-asserted-by":"crossref","unstructured":"Nilizadeh S, Jahid S, Mittal P, Borisov N, Kapadia A (2012) Cachet: a decentralized architecture for privacy preserving social networking with caching. In: Barakat C, Teixeira R, Ramakrishnan KK, Thiran P (eds) CoNEXT. ACM, pp 337\u2013348","DOI":"10.1145\/2413176.2413215"},{"key":"14_CR30","doi-asserted-by":"crossref","unstructured":"Ostrovsky R, Sahai A, Waters B (2007) Attribute-based encryption with non-monotonic access structures. In: Ning P, De\u00a0Capitani di\u00a0Vimercati S, Syverson PF (eds) ACM conference on computer and communications security. ACM, pp 195\u2013203","DOI":"10.1145\/1315245.1315270"},{"key":"14_CR31","first-page":"4","volume":"2002","author":"KG Paterson","year":"2002","unstructured":"Paterson KG (2002) Id-based signatures from pairings on elliptic curves. IACR Cryptol ePrint Arch 2002:4","journal-title":"IACR Cryptol ePrint Arch"},{"key":"14_CR32","doi-asserted-by":"crossref","unstructured":"Paterson KG, Schuldt JCN (2006) Efficient identity-based signatures secure in the standard model. In: Batten LM, Safavi-Naini R (eds) ACISP, volume 4058 of LNCS. Springer, pp 207\u2013222","DOI":"10.1007\/11780656_18"},{"key":"14_CR33","doi-asserted-by":"crossref","unstructured":"Sahai A, Seyalioglu H, Waters B (2012) Dynamic credentials and ciphertext delegation for attribute-based encryption. In: Safavi-Naini R, Canetti R (eds) Advances in cryptology\u2014CRYPTO 2012\u201432nd annual cryptology conference, Santa Barbara, CA, USA, August 19\u201323, 2012. Proceedings, volume 7417 of LNCS. Springer, pp 199\u2013217","DOI":"10.1007\/978-3-642-32009-5_13"},{"key":"14_CR34","doi-asserted-by":"crossref","unstructured":"Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: EUROCRYPT. pp 457\u2013473","DOI":"10.1007\/11426639_27"},{"key":"14_CR35","unstructured":"Shamir A (1984) Identity-based cryptosystems and signature schemes. In: CRYPTO. pp 47\u201353"},{"key":"14_CR36","doi-asserted-by":"crossref","unstructured":"Shen E, Shi E, Waters B (2009) Predicate privacy in encryption systems. In: Reingold O (ed) TCC, volume 5444. Springer, pp 457\u2013473","DOI":"10.1007\/978-3-642-00457-5_27"},{"key":"14_CR37","doi-asserted-by":"crossref","unstructured":"Takashima K (2014) Expressive attribute-based encryption with constant-size ciphertexts from the decisional linear assumption. In: Abdalla M, De Prisco R (eds) SCN, volume 8642 of LNCS. Springer, pp 298\u2013317","DOI":"10.1007\/978-3-319-10879-7_17"},{"key":"14_CR38","doi-asserted-by":"crossref","unstructured":"Tassanaviboon A, Gong G (2011) Oauth and abe based authorization in semi-trusted cloud computing: aauth. In: Proceedings of the second international workshop on data intensive computing in the clouds, DataCloud-SC \u201911. ACM, pp 41\u201350","DOI":"10.1145\/2087522.2087531"},{"key":"14_CR39","unstructured":"Wang F, Mickens J, Zeldovich N, Vaikuntanathan V (2016) Sieve: cryptographically enforced access control for user data in untrusted clouds. In: NSDI, Santa Clara, CA, March 2016. USENIX Association. pp 611\u2013626"},{"key":"14_CR40","doi-asserted-by":"crossref","unstructured":"Wise C, Friedrich C, Nepal S, Chen S, Sinnott RO (2015) Cloud docs: secure scalable document sharing on public clouds. In: Pu C, Mohindra A (eds) IEEE CLOUD. IEEE, pp 532\u2013539","DOI":"10.1109\/CLOUD.2015.77"},{"key":"14_CR41","doi-asserted-by":"crossref","unstructured":"Xu Z, Martin KM (2012) Dynamic user revocation and key refreshing for attribute-based encryption in cloud storage. In: Min G, Wu Y, Liu L, Jin X, Jarvis SA, Al-Dubai AY (eds) TrustCom. IEEE Computer Society, pp 844\u2013849","DOI":"10.1109\/TrustCom.2012.136"},{"key":"14_CR42","doi-asserted-by":"crossref","unstructured":"Yamada S, Attrapadung N, Hanaoka G, Kunihiro N (2014) A framework and compact constructions for non-monotonic attribute-based encryption. In: Krawczyk H (ed), PKC, volume 8383 of LNCS. Springer, pp 275\u2013292","DOI":"10.1007\/978-3-642-54631-0_16"},{"key":"14_CR43","doi-asserted-by":"crossref","unstructured":"Yao J, Chen S, Nepal S, Levy D, Zic J (2010) Truststore: making amazon S3 trustworthy with services composition. In: IEEE\/ACM CCGrid. IEEE Computer Society, pp 600\u2013605","DOI":"10.1109\/CCGRID.2010.17"},{"key":"14_CR44","doi-asserted-by":"crossref","unstructured":"Zhang L, Mislove A (2013) Building confederated web-based services with priv.io. In: Muthu MS, Abbadi AE, Krishnamurthy B (eds) COSN. ACM, pp 189\u2013200","DOI":"10.1145\/2512938.2512943"}],"container-title":["Data Science and Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s41019-016-0014-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s41019-016-0014-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s41019-016-0014-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T18:04:01Z","timestamp":1498327441000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s41019-016-0014-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9]]},"references-count":44,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2016,9]]}},"alternative-id":["14"],"URL":"https:\/\/doi.org\/10.1007\/s41019-016-0014-0","relation":{},"ISSN":["2364-1185","2364-1541"],"issn-type":[{"value":"2364-1185","type":"print"},{"value":"2364-1541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,9]]}}}