{"id":"https://openalex.org/W2069727724","doi":"https://doi.org/10.1109/trustcom.2013.69","title":"Integrating Trust with Cryptographic Role-Based Access Control for Secure Cloud Data Storage","display_name":"Integrating Trust with Cryptographic Role-Based Access Control for Secure Cloud Data Storage","publication_year":2013,"publication_date":"2013-07-01","ids":{"openalex":"https://openalex.org/W2069727724","doi":"https://doi.org/10.1109/trustcom.2013.69","mag":"2069727724"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/trustcom.2013.69","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103201041","display_name":"Lan Zhou","orcid":"https://orcid.org/0000-0001-7469-3274"},"institutions":[{"id":"https://openalex.org/I99043593","display_name":"Macquarie University","ror":"https://ror.org/01sf06y89","country_code":"AU","type":"education","lineage":["https://openalex.org/I99043593"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Lan Zhou","raw_affiliation_strings":["Information and Networked Systems Security Research, Department of Computing, Macquarie University, North Ryde, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"Information and Networked Systems Security Research, Department of Computing, Macquarie University, North Ryde, NSW, Australia","institution_ids":["https://openalex.org/I99043593"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029458848","display_name":"Vijay Varadharajan","orcid":"https://orcid.org/0000-0002-3621-9114"},"institutions":[{"id":"https://openalex.org/I99043593","display_name":"Macquarie University","ror":"https://ror.org/01sf06y89","country_code":"AU","type":"education","lineage":["https://openalex.org/I99043593"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Vijay Varadharajan","raw_affiliation_strings":["Information and Networked Systems Security Research, Department of Computing, Macquarie University, North Ryde, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"Information and Networked Systems Security Research, Department of Computing, Macquarie University, North Ryde, NSW, Australia","institution_ids":["https://openalex.org/I99043593"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5069661409","display_name":"Michael Hitchens","orcid":"https://orcid.org/0000-0001-6320-9184"},"institutions":[{"id":"https://openalex.org/I99043593","display_name":"Macquarie University","ror":"https://ror.org/01sf06y89","country_code":"AU","type":"education","lineage":["https://openalex.org/I99043593"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Michael Hitchens","raw_affiliation_strings":["Information and Networked Systems Security Research, Department of Computing, Macquarie University, North Ryde, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"Information and Networked Systems Security Research, Department of Computing, Macquarie University, North Ryde, NSW, Australia","institution_ids":["https://openalex.org/I99043593"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.294,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":24,"citation_normalized_percentile":{"value":0.869354,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":92},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Advanced Cryptographic Schemes and Protocols","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Advanced Cryptographic Schemes and Protocols","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Security Challenges in Cloud Computing","score":0.9995,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Trust and Reputation Systems in Online Environments","score":0.9994,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/remote-data-checking","display_name":"Remote Data Checking","score":0.547004},{"id":"https://openalex.org/keywords/data-storage","display_name":"Data Storage","score":0.543488},{"id":"https://openalex.org/keywords/role-based-authorization","display_name":"Role-Based Authorization","score":0.541011},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-Based Encryption","score":0.537834},{"id":"https://openalex.org/keywords/access-control","display_name":"Access Control","score":0.528052},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.46748728},{"id":"https://openalex.org/keywords/data-access","display_name":"Data access","score":0.43496776}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.77692807},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7619511},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.71466756},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.7093855},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6596786},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.64697313},{"id":"https://openalex.org/C45567728","wikidata":"https://www.wikidata.org/wiki/Q1702839","display_name":"Role-based access control","level":3,"score":0.62509423},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.6200138},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5845463},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.46748728},{"id":"https://openalex.org/C47487241","wikidata":"https://www.wikidata.org/wiki/Q5227230","display_name":"Data access","level":2,"score":0.43496776},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.43283254},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.26546744},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/trustcom.2013.69","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, justice, and strong institutions","score":0.56}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":22,"referenced_works":["https://openalex.org/W1499220070","https://openalex.org/W1528231922","https://openalex.org/W1547131737","https://openalex.org/W1604936042","https://openalex.org/W183881431","https://openalex.org/W1994118561","https://openalex.org/W1998525443","https://openalex.org/W2007468111","https://openalex.org/W2022036778","https://openalex.org/W2029030698","https://openalex.org/W2031338211","https://openalex.org/W2054356884","https://openalex.org/W2060690494","https://openalex.org/W2071940270","https://openalex.org/W2111460681","https://openalex.org/W2118469945","https://openalex.org/W2120239604","https://openalex.org/W2134641111","https://openalex.org/W2145921607","https://openalex.org/W2163942291","https://openalex.org/W2166602595","https://openalex.org/W3102845218"],"related_works":["https://openalex.org/W57958781","https://openalex.org/W4205636420","https://openalex.org/W2904818008","https://openalex.org/W2904314268","https://openalex.org/W2361781577","https://openalex.org/W2141019415","https://openalex.org/W2126560026","https://openalex.org/W1971522943","https://openalex.org/W1554274402","https://openalex.org/W1488313539"],"abstract_inverted_index":{"There":[0],"has":[1],"been":[2,60],"a":[3,33,94,106,168,177,185,247,272,275,290],"recent":[4],"trend":[5],"in":[6,9,45,53,76,92,139,146,167,176,198,223,243,261],"storing":[7],"data":[8,18,37,44,75,87,91,145,197,228,242,334],"cloud":[10,140,148,199,245,277,337],"due":[11],"to":[12,39,69,188,216,235,238,322],"the":[13,49,54,71,74,84,90,98,115,124,130,143,147,152,164,193,214,218,224,232,244,262,283,301,304,316,324,328],"increasing":[14],"amount":[15],"of":[16,73,86,126,135,220,264,266,274,303,330,336],"users'":[17],"and":[19,26,41,66,113,171,191,259,313,326],"associated":[20],"benefits":[21],"such":[22,93],"as":[23,103],"on-demand":[24],"access":[25,29,50,67,108,131],"scalability.":[27],"Role-based":[28],"control":[30,51,68,109],"(RBAC)":[31],"provides":[32,210],"flexible":[34],"way":[35,95],"for":[36,195,213,246],"owners":[38,215,229,335],"manage":[40,163],"share":[42],"their":[43,240],"cloud.":[46],"To":[47],"enforce":[48],"policies":[52],"cloud,":[55],"cryptographic":[56,64,82,119,204,294],"RBAC":[57,205,225,295],"schemes":[58],"have":[59,298],"developed,":[61],"which":[62,280],"combine":[63],"techniques":[65],"protect":[70],"privacy":[72],"an":[77,211],"outsourced":[78],"environment.":[79],"Using":[80],"these":[81,118],"schemes,":[83],"owner":[85],"can":[88,111,230,286,319],"encrypt":[89],"that":[96,154,202,292],"only":[97],"users":[99,173],"with":[100],"appropriate":[101],"roles":[102,155,162,222],"specified":[104],"by":[105,159,308,333],"role-based":[107],"policy":[110],"decrypt":[112],"view":[114],"data.":[116],"However":[117],"approaches":[120],"do":[121],"not":[122],"address":[123],"issues":[125],"trust":[127,136,186,208,233,252,284,306,317],"when":[128],"enforcing":[129],"policies.":[132],"The":[133,207,227,250],"issue":[134],"is":[137,149],"critical":[138],"storage":[141,200,278,338],"systems,":[142],"stored":[144,196],"secure":[150],"under":[151],"assumptions":[153],"are":[156],"properly":[157],"administered":[158],"trusted":[160,169,178],"authorities,":[161],"user":[165],"membership":[166],"manner":[170],"qualified":[172],"also":[174,299],"behave":[175],"manner.":[179],"In":[180,268],"this":[181],"paper,":[182],"we":[183,270],"propose":[184],"model":[187,209,253,285,307],"reason":[189],"about":[190],"improve":[192],"security":[194],"systems":[201],"use":[203,231],"schemes.":[206,296],"approach":[212],"determine":[217],"trustworthiness":[219,265],"individual":[221],"system.":[226],"models":[234],"decide":[236],"whether":[237],"store":[239],"encrypted":[241],"particular":[248],"role.":[249],"proposed":[251,305],"takes":[254],"into":[255,289],"account":[256],"role":[257],"inheritance":[258],"hierarchy":[260],"evaluation":[263],"roles.":[267],"addition,":[269],"present":[271],"design":[273],"trust-based":[276],"system":[279,291],"shows":[281],"how":[282,315],"be":[287,320],"integrated":[288],"uses":[293],"We":[297],"described":[300],"relevance":[302],"considering":[309],"practical":[310],"application":[311],"scenarios":[312],"illustrated":[314],"evaluations":[318],"used":[321],"reduce":[323],"risks":[325],"enhance":[327],"quality":[329],"decision":[331],"making":[332],"service.":[339]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2069727724","counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":8},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":2},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":6},{"year":2014,"cited_by_count":2}],"updated_date":"2024-11-27T12:46:08.317247","created_date":"2016-06-24"}