{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T20:17:27Z","timestamp":1771705047245,"version":"3.50.1"},"reference-count":33,"publisher":"Zhejiang University Press","issue":"2","license":[{"start":{"date-parts":[[2013,2,1]],"date-time":"2013-02-01T00:00:00Z","timestamp":1359676800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J. Zhejiang Univ. - Sci. C"],"published-print":{"date-parts":[[2013,2]]},"DOI":"10.1631\/jzus.c1200240","type":"journal-article","created":{"date-parts":[[2013,2,7]],"date-time":"2013-02-07T08:40:37Z","timestamp":1360226437000},"page":"85-97","source":"Crossref","is-referenced-by-count":34,"title":["Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage"],"prefix":"10.1631","volume":"14","author":[{"given":"Yong","family":"Cheng","sequence":"first","affiliation":[]},{"given":"Zhi-ying","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Jiang-jiang","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Song-zhu","family":"Mei","sequence":"additional","affiliation":[]},{"given":"Jiang-chun","family":"Ren","sequence":"additional","affiliation":[]}],"member":"635","published-online":{"date-parts":[[2013,2,8]]},"reference":[{"key":"ref1","volume-title":"Amazon Simple Storage Service","year":"2012"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/sisw.2005.7"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/sp.2007.11"},{"key":"ref4","volume-title":"Ciphertext-Policy Attribute-Based Encryption","author":"Bethencourt","year":"2012"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/sp.2008.12"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/bfb0054122"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/11535218_16"},{"key":"ref8","first-page":"123","article-title":"Over-Encryption: Management of Access Control Evolution on Outsourced Data","volume-title":"Proc. 33rd Int. Conf. on Very Large Data Bases","author":"di Vimercati","year":"2007"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-7659-8"},{"key":"ref10","first-page":"299","article-title":"Vanish: Increasing Data Privacy with Self-Destructing Data","volume-title":"Proc. 18th USENIX Security Symp.","author":"Geambasu","year":"2009"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"key":"ref12","volume-title":"HDFS Architecture Guide","year":"2012"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966970"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14992-4_13"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2087522.2087530"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/sp.2010.23"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1533057.1533094"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2104470"},{"key":"ref19","volume-title":"OpenSSL: Cryptography and SSL\/TLS Toolkit","year":"2012"},{"key":"ref20","volume-title":"Jerasure: a Library in C\/C++ Facilitating Erasure Coding for Storage Applications, Version 1.2","author":"Plank","year":"2008"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/62044.62050"},{"key":"ref22","first-page":"191","article-title":"AONT-RS: Blending Security and Performance in Dispersed Storage Systems","volume-title":"Proc. 9th Usenix Conf. on File and Storage Technologies","author":"Resch","year":"2011"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/bfb0052348"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_27"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1755688.1755690"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"ref27","first-page":"1","article-title":"Potshards: Secure Long-Term Storage without Encryption","volume-title":"Proc. USENIX Annual Technical Conf.","author":"Storer","year":"2007"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2012.49"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19379-8_4"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2414456.2414507"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/trustcom.2012.136"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/infcom.2010.5462174"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1755688.1755720"}],"container-title":["Journal of Zhejiang University SCIENCE C"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1631\/jzus.C1200240.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1631\/jzus.C1200240\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1631\/jzus.C1200240","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T07:12:56Z","timestamp":1771657976000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1631\/jzus.C1200240"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,2]]},"references-count":33,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2013,2]]}},"alternative-id":["1378"],"URL":"https:\/\/doi.org\/10.1631\/jzus.c1200240","relation":{},"ISSN":["1869-1951","1869-196X"],"issn-type":[{"value":"1869-1951","type":"print"},{"value":"1869-196X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,2]]}}}