{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T10:08:28Z","timestamp":1777889308639,"version":"3.51.4"},"reference-count":24,"publisher":"SAGE Publications","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["KES"],"published-print":{"date-parts":[[2020,7,20]]},"DOI":"10.3233\/kes-200037","type":"journal-article","created":{"date-parts":[[2020,7,21]],"date-time":"2020-07-21T14:33:45Z","timestamp":1595342025000},"page":"145-156","source":"Crossref","is-referenced-by-count":11,"title":["An improved dynamic polynomial integrity based QCP-ABE framework on large cloud data security"],"prefix":"10.1177","volume":"24","author":[{"given":"Kranthi Kumar","family":"Singamaneni","sequence":"first","affiliation":[]},{"given":"Sanyasi Naidu","family":"Pasala","sequence":"additional","affiliation":[]}],"member":"179","reference":[{"issue":"4","key":"10.3233\/KES-200037_ref1","doi-asserted-by":"crossref","first-page":"789","DOI":"10.1109\/TIFS.2015.2510822","article-title":"Dual-server public-key encryption with keyword search for secure cloud storage","volume":"11","author":"Chen","year":"2016","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"10.3233\/KES-200037_ref2","first-page":"452","article-title":"iPEKS: Fast and secure cloud data retrieval from the public-key encryption with keyword search","author":"Tseng","year":"2013","journal-title":"12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications"},{"issue":"99","key":"10.3233\/KES-200037_ref3","first-page":"1","article-title":"Improving privacy and security in decentralizing multi-authority attribute-based encryption in cloud computing","volume":"PP","author":"Yang","year":"2011","journal-title":"IEEE Access"},{"key":"10.3233\/KES-200037_ref4","first-page":"2450","article-title":"Homomorphic cloud computing scheme based on hybrid homomorphic encryption","author":"Song","year":"2017","journal-title":"3rd IEEE International Conference on Computer and Communications (ICCC)"},{"key":"10.3233\/KES-200037_ref5","first-page":"390","article-title":"A new biometric-based security framework for cloud storage","author":"Hamdi","year":"2017","journal-title":"13th International Wireless Communications and Mobile Computing Conference (IWCMC)"},{"key":"10.3233\/KES-200037_ref6","first-page":"672","article-title":"Biometrics template security on cloud computing","author":"Sabri","year":"2014","journal-title":"International Conference on Advances in Computing, Communications and Informatics (ICACCI)"},{"key":"10.3233\/KES-200037_ref7","doi-asserted-by":"crossref","first-page":"4587","DOI":"10.1109\/ACCESS.2017.2780323","article-title":"A novel secure data transmission scheme using chaotic compressed sensing","volume":"6","author":"Gan","year":"2018","journal-title":"IEEE Access"},{"issue":"6","key":"10.3233\/KES-200037_ref8","doi-asserted-by":"crossref","first-page":"926","DOI":"10.1109\/TITB.2009.2033055","article-title":"IBE-lite: A lightweight identity-based cryptography for body sensor networks","volume":"13","author":"Tan","year":"2009","journal-title":"IEEE Transactions on Information Technology in Biomedicine"},{"key":"10.3233\/KES-200037_ref9","first-page":"468","article-title":"Solving the problem of replay in biometrics-an electronic commerce example","author":"Von Solms","year":"2005","journal-title":"Proceedings of 5th IFIP Conference on Challenges of Expanding Internet: E-commerce, E-business, and E-government (I3E 2005)"},{"key":"10.3233\/KES-200037_ref10","first-page":"355","article-title":"Enabling public verifiability and data dynamics for storage security in cloud computing","author":"Wang","year":"2009","journal-title":"Proc 14th European Symp Research in Computer Security (ESORICS \u201909)"},{"key":"10.3233\/KES-200037_ref11","first-page":"598","article-title":"Provable data possession at untrusted stores","author":"Ateniese","year":"2007","journal-title":"Proc 14th ACM Conf Computer and Comm Security (CCS 07)"},{"key":"10.3233\/KES-200037_ref12","first-page":"584","article-title":"Pors: Proofs of retrievability for large files","author":"Juels","year":"2007","journal-title":"Proc 14th ACM Conf Computer and Comm Security (CCS\u201907)"},{"key":"10.3233\/KES-200037_ref13","first-page":"90","article-title":"Compact proofs of retrievability","author":"Shacham","year":"2008","journal-title":"Proc 14th Int\u2019l Conf Theory and Application of Cryptology and Information Security: Advances in Cryptology (ASIACRYPT \u201908)"},{"key":"10.3233\/KES-200037_ref14","unstructured":"K.D. Bowers, A. Juels and A. Oprea, Proofs of retrievability: Theory and implementation, Report (2008)\/175, Cryptology ePrint Archive (2008)."},{"key":"10.3233\/KES-200037_ref15","doi-asserted-by":"crossref","first-page":"573","DOI":"10.1109\/SFCS.2005.71","article-title":"The complexity of online memory checking","author":"Naor","year":"2005","journal-title":"Proc 46th Ann IEEE Symp Foundations of Computer Science (FOCS \u201905)"},{"key":"10.3233\/KES-200037_ref16","first-page":"223","article-title":"Remote integrity check with dishonest storage server","author":"Chang","year":"2008","journal-title":"Proc 13th European Symp Research in Computer Security (ESORICS \u201908)"},{"key":"10.3233\/KES-200037_ref17","unstructured":"M.A. Shah, R. Swaminathan and M. Baker, Privacy-preserving audit and extraction of digital contents, Report (2008)\/186, Cryptology ePrint Archive (2008)."},{"key":"10.3233\/KES-200037_ref18","unstructured":"A. Oprea, M.K. Reiter and K. Yang, Space-efficient block storage integrity, Proc 12th Ann Network and Distributed System SecuritySymp (NDSS \u201905) (2005)."},{"key":"10.3233\/KES-200037_ref19","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1109\/ICDCS.2006.80","article-title":"Store, forget, and check: Using algebraic signatures to check remotely administered storage","author":"Schwarz","year":"2006","journal-title":"Proc 26th IEEE Int\u2019l Conf Distributed Computing Systems (ICDCS \u201906)"},{"key":"10.3233\/KES-200037_ref20","first-page":"954","article-title":"Dependable and secure sensor data storage with dynamic integrity assurance","author":"Wang","year":"2009","journal-title":"Proc IEEE INFOCOM"},{"issue":"5","key":"10.3233\/KES-200037_ref21","first-page":"213","article-title":"Secure key management in cloud environment using quantum cryptography","volume":"23","author":"Kumar","year":"2018","journal-title":"Ingenierie des Systemes d\u2019Information"},{"issue":"11","key":"10.3233\/KES-200037_ref22","first-page":"372","article-title":"A novel integrity-verification based secured ABE model for cloud computing","volume":"5","author":"Kumar","year":"2018","journal-title":"International Journal of Research"},{"issue":"1","key":"10.3233\/KES-200037_ref23","doi-asserted-by":"crossref","first-page":"33","DOI":"10.18280\/ria.330106","article-title":"IBLIND quantum computing and HASBE for secure cloud data storage and accessing","volume":"33","author":"Kumar","year":"2019","journal-title":"Revue d\u2019Intelligence Artificielle"},{"issue":"4-6","key":"10.3233\/KES-200037_ref24","doi-asserted-by":"crossref","first-page":"283","DOI":"10.3166\/jesa.51.283-293","article-title":"Efficient quantum cryptography technique for key distribution","volume":"51","author":"Kumar","year":"2018","journal-title":"Journal Europeen des Systemes Automatises"}],"container-title":["International Journal of Knowledge-based and Intelligent Engineering Systems"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/KES-200037","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T05:11:09Z","timestamp":1777612269000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/KES-200037"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,20]]},"references-count":24,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.3233\/kes-200037","relation":{},"ISSN":["1327-2314","1875-8827"],"issn-type":[{"value":"1327-2314","type":"print"},{"value":"1875-8827","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,7,20]]}}}