{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T10:18:12Z","timestamp":1740133092671,"version":"3.37.3"},"reference-count":31,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2018,5,1]],"date-time":"2018-05-01T00:00:00Z","timestamp":1525132800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Parallel Distrib. Syst."],"published-print":{"date-parts":[[2018,5,1]]},"DOI":"10.1109\/tpds.2017.2782253","type":"journal-article","created":{"date-parts":[[2017,12,11]],"date-time":"2017-12-11T19:12:54Z","timestamp":1513019574000},"page":"1131-1146","source":"Crossref","is-referenced-by-count":4,"title":["Light Weight Write Mechanism for Cloud Data"],"prefix":"10.1109","volume":"29","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8834-0242","authenticated-orcid":false,"given":"Mosarrat","family":"Jahan","sequence":"first","affiliation":[]},{"given":"Mohsen","family":"Rezvani","sequence":"additional","affiliation":[]},{"given":"Qianrui","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Partha Sarathi","family":"Roy","sequence":"additional","affiliation":[]},{"given":"Kouichi","family":"Sakurai","sequence":"additional","affiliation":[]},{"given":"Aruna","family":"Seneviratne","sequence":"additional","affiliation":[]},{"given":"Sanjay","family":"Jha","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462174"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1017\/S1047951110000363"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1007\/978-3-642-21031-0_7","article-title":"Realizing\n fine-grained and flexible access control to outsourced data with attribute-based cryptosystems","author":"zhao","year":"2011","journal-title":"Proc of Int'l Conf on Information Security Practice and Experience"},{"key":"ref11","first-page":"376","article-title":"Attribute-based signatures","author":"maji","year":"2011","journal-title":"Proc Cryptographers Track RSA Conf"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.38"},{"key":"ref13","first-page":"568","article-title":"Decentralizing attribute-based encryption","author":"lewko","year":"2011","journal-title":"Proc Int Conf Theory Appl Cryptographic Techn"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.E97.D.1790"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2015.216"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxr080"},{"key":"ref17","first-page":"71","article-title":"Design and implementation of collaborative ciphertext-policy attribute-role based encryption for\n data access control in cloud","volume":"6","author":"fugkeaw","year":"2015","journal-title":"Information Security Research"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2015.7366339"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40203-6_33"},{"year":"2000","key":"ref28","article-title":"Standards for Efficient Cryptography, SEC 2: Recommended Elliptic Curve Domain Parameters,\n Version 1.0"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s102070100002"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.11"},{"article-title":"Secure network file access control system","year":"2004","author":"pham","key":"ref6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.2196\/jmir.3371"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1007\/3-540-49244-5_2","article-title":"Symmetric-key encryption","author":"delfs","year":"2007","journal-title":"Cryptography An Introduction"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1023\/A:1019289831564"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"ref2","first-page":"34","article-title":"Outsourcing the decryption of ABE ciphertexts","author":"green","year":"2011","journal-title":"20th USENIX Security Symp"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2013.60"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2012.12.025"},{"key":"ref20","first-page":"37","article-title":"Efficient and secure data storage operations for mobile cloud computing","author":"zhou","year":"2012","journal-title":"Proc Int Conf Netw Serv Manage"},{"key":"ref22","first-page":"293","article-title":"Online\/offline attribute-based encryption","author":"hohenberger","year":"2014","journal-title":"Proc Int Workshop Public Key Cryptogr"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1007\/978-3-642-34129-8_17","article-title":"Outsourcing encryption of attribute-based encryption\n with MapReduce","author":"li","year":"2012","journal-title":"Proc 14th Int Conf Inform Commun Security"},{"article-title":"The cpabe\n toolkit.","year":"0","author":"bethencourt","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2012.2210729"},{"article-title":"The pairing-based cryptography (PBC) library.","year":"0","author":"lynn","key":"ref26"},{"article-title":"ANDRABEN\n library.","year":"0","author":"ambrosin","key":"ref25"}],"container-title":["IEEE Transactions on Parallel and Distributed Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/71\/8334163\/08186229.pdf?arnumber=8186229","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T06:55:41Z","timestamp":1643180141000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8186229\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,1]]},"references-count":31,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tpds.2017.2782253","relation":{},"ISSN":["1045-9219"],"issn-type":[{"type":"print","value":"1045-9219"}],"subject":[],"published":{"date-parts":[[2018,5,1]]}}}