{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:03:47Z","timestamp":1773615827701,"version":"3.50.1"},"reference-count":15,"publisher":"Allerton Press","issue":"4","license":[{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2019,7]]},"DOI":"10.3103\/s0146411619040114","type":"journal-article","created":{"date-parts":[[2019,9,16]],"date-time":"2019-09-16T06:04:57Z","timestamp":1568613897000},"page":"342-350","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Security Protection of System Sharing Data with Improved CP-ABE Encryption Algorithm under Cloud Computing Environment"],"prefix":"10.3103","volume":"53","author":[{"family":"Shumin Xue","sequence":"first","affiliation":[]},{"family":"Chengjuan Ren","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2019,9,16]]},"reference":[{"key":"7136_CR1","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1016\/j.is.2014.07.006","volume":"47","author":"I.A.T. Hashem","year":"2015","unstructured":"Hashem, I.A.T., Yaqoob, I., Anuar, N.B., Mokhtar, S., Gani, A., and Khan, S.U., The rise of \u201cbig data\u201d on cloud computing, Inf. Syst., 2015, vol. 47, no. C, pp. 98\u2013115.","journal-title":"Inf. Syst."},{"key":"7136_CR2","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1016\/j.ins.2015.01.025","volume":"305","author":"M. Ali","year":"2015","unstructured":"Ali, M., Khan, S.U., and Vasilakos, A.V., Security in cloud computing: Opportunities and challenges, Inf. Sci., 2015, vol. 305, pp. 357\u2013383.","journal-title":"Inf. Sci."},{"key":"7136_CR3","doi-asserted-by":"crossref","unstructured":"Ennajjar, I., Tabii, Y., and Benkaddour, A., Security in cloud computing approaches and solutions, Inf. Sci. Technol., 2015, pp. 57\u201361.","DOI":"10.1109\/CIST.2014.7016594"},{"key":"7136_CR4","doi-asserted-by":"crossref","unstructured":"Chauhan, K.K., Sanger, A.K.S., and Verma, A., Homomorphic encryption for data security in cloud computing, International Conference on Information Technology, 2016, pp. 206\u2013209.","DOI":"10.1109\/ICIT.2015.39"},{"key":"7136_CR5","doi-asserted-by":"crossref","unstructured":"Zhu, H., Wang, L., Ahmad, H., and Niu, X., Key-policy attribute-based encryption with equality test in cloud computing, IEEE Access, 2017, no. 99, p. 1.","DOI":"10.1109\/ACCESS.2017.2756070"},{"key":"7136_CR6","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1016\/j.ins.2015.08.053","volume":"328","author":"S. Ma","year":"2016","unstructured":"Ma, S., Identity-based encryption with outsourced equality test in cloud computing, Inf. Sci., 2016, vol. 328, pp.\u00a0389\u2013402.","journal-title":"Inf. Sci."},{"key":"7136_CR7","doi-asserted-by":"publisher","first-page":"1265","DOI":"10.1109\/TIFS.2016.2523941","volume":"11","author":"S. Wang","year":"2016","unstructured":"Wang, S., Zhou, J., Liu, J.K., Yu, J.P., Chen, J.Y., and Xie, W.X., An efficient file hierarchy attribute-based encryption scheme in cloud computing, IEEE Trans. Inf. Forensics Secur., 2016, vol. 11, no. 6, pp. 1265\u20131277.","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"7136_CR8","unstructured":"Wei, J., Liu, W., and Hu, X., Secure data sharing in cloud computing using revocable-storage identity-based encryption, IEEE Trans. Cloud Comput., 2016, no. 99, p. 1."},{"key":"7136_CR9","unstructured":"Moghaddam, F.F., Ahmadi, M., Sarvari, S., Eslami, M., and Golkar, A., Cloud computing challenges and opportunities: A survey, International Conference on Telematics and Future Generation Networks, 2015."},{"key":"7136_CR10","doi-asserted-by":"crossref","unstructured":"Mohamed, B., Youness, K.I., and Mohamed, M., Taking account of trust when adopting cloud computing architecture, International Conference on Cloud Computing Technologies and Applications, 2017, pp. 101\u2013106.","DOI":"10.1109\/CloudTech.2016.7847685"},{"key":"7136_CR11","unstructured":"Doshi, N. and Jinwala, D., Constant Ciphertext Length in CP-ABE, arXiv:1208.5991, 2012."},{"key":"7136_CR12","doi-asserted-by":"publisher","first-page":"763","DOI":"10.1109\/TIFS.2014.2309858","volume":"9","author":"F. Guo","year":"2014","unstructured":"Guo, F., Mu, Y., Susilo, W., and Wong, D.S., CP-ABE with constant-size keys for lightweight devices, IEEE Trans. Inf. Forensics Secur., 2014, vol. 9, no. 5, pp. 763\u2013771.","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"7136_CR13","doi-asserted-by":"publisher","first-page":"2763","DOI":"10.1007\/s11227-016-1953-y","volume":"73","author":"A. Ghorbel","year":"2017","unstructured":"Ghorbel, A., Ghorbel, M., and Jmaiel, M., Privacy in cloud computing environments: A survey and research challenges, J. Supercomput., 2017, vol. 73, no. 6, pp. 2763\u20132800.","journal-title":"J. Supercomput."},{"key":"7136_CR14","doi-asserted-by":"crossref","unstructured":"Medhioub, M., Hamdi, M., and Kim, T.H., Adaptive risk management framework for cloud computing, IEEE International Conference on Advanced Information Networking and Applications, 2017, pp. 1154\u20131161.","DOI":"10.1109\/AINA.2017.143"},{"key":"7136_CR15","volume-title":"A multi-layered access policy engine for reliable cloud computing","author":"F.F. Moghaddam","year":"2018","unstructured":"Moghaddam, F.F., Wieder, P., and Yahyapour, R., A multi-layered access policy engine for reliable cloud computing, Network Future, 2018, pp. 99\u2013105."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411619040114.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411619040114","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411619040114.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:05:12Z","timestamp":1773612312000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411619040114"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7]]},"references-count":15,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2019,7]]}},"alternative-id":["7136"],"URL":"https:\/\/doi.org\/10.3103\/s0146411619040114","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,7]]},"assertion":[{"value":"22 October 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 December 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 January 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 September 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflict of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}