Secured Data Storage and Retrieval using Elliptic Curve Cryptography in Cloud Article Swipe
YOU?
·
· 2020
· Open Access
·
· DOI: https://doi.org/10.34028/iajit/18/1/7
Security of data stored in the cloud databases is a challenging and complex issue to be addressed due to the presence of malicious attacks, data breaches and unsecured access points. In the past, many researchers proposed security mechanisms including access control, intrusion detection and prevention models, Encryption based storage methods and key management schemes. However, the role based access control policies that were developed to provide security for the data stored in cloud databases based on the sensitivity of the information are compromised by the attackers through the misuse of privileges gained by them from multiple roles. Therefore, it is necessary to propose more efficient mechanisms for securing the sensitive information through attribute based encryption by analyzing the association between the various attributes. For handling the security issue related to the large volume of cloud data effectively, the association rule mining algorithm has been extended with temporal constraints in this work in order to find the association among the attributes so that it is possible to form groups among the attributes as public attributes with insensitive data, group attributes with medium sensitive data and owner with highly sensitive attributes and data for enhancing the strength of attribute based encryption scheme. Based on the associations among the attributes and temporal constraints, it is possible to encrypt the sensitive data with stronger keys and algorithms. Hence, a new key generation and encryption algorithm is proposed in this paper by combining the Greatest common divisor and the Least common multiple between the primary key value and the first numeric non key attribute that is medium sensitive attributes and data present in the cloud database for providing secured storage through effective attribute based encryption. Moreover, a new intelligent algorithm called Elliptic Curve Cryptography with Base100 Table algorithm is also proposed in this paper for performing encryption and decryption operations over the most sensitive data for the data owners. From the experiments conducted in this work, it is observed that the proposed model enhances the data security by more than 5% when it is compared with other existing secured storage models available for cloud
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.34028/iajit/18/1/7
- https://doi.org/10.34028/iajit/18/1/7
- OA Status
- diamond
- Cited By
- 12
- References
- 37
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W3134881567
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W3134881567Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.34028/iajit/18/1/7Digital Object Identifier
- Title
-
Secured Data Storage and Retrieval using Elliptic Curve Cryptography in CloudWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2020Year of publication
- Publication date
-
2020-12-14Full publication date if available
- Authors
-
Pradeep Suthanthiramani, S. Muthurajkumar, Sannasi Ganapathy, A. KannanList of authors in order
- Landing page
-
https://doi.org/10.34028/iajit/18/1/7Publisher landing page
- PDF URL
-
https://doi.org/10.34028/iajit/18/1/7Direct link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
diamondOpen access status per OpenAlex
- OA URL
-
https://doi.org/10.34028/iajit/18/1/7Direct OA link when available
- Concepts
-
Computer science, Encryption, Cloud computing, Access control, Key (lock), Information sensitivity, Computer security, Database, Cloud storage, Data security, Data mining, Operating systemTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
12Total citation count in OpenAlex
- Citations by year (recent)
-
2025: 1, 2024: 2, 2023: 2, 2022: 4, 2021: 3Per-year citation counts (last 5 years)
- References (count)
-
37Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W3134881567 |
|---|---|
| doi | https://doi.org/10.34028/iajit/18/1/7 |
| ids.doi | https://doi.org/10.34028/iajit/18/1/7 |
| ids.mag | 3134881567 |
| ids.openalex | https://openalex.org/W3134881567 |
| fwci | 1.32173594 |
| type | article |
| title | Secured Data Storage and Retrieval using Elliptic Curve Cryptography in Cloud |
| biblio.issue | 1 |
| biblio.volume | 18 |
| biblio.last_page | |
| biblio.first_page | |
| topics[0].id | https://openalex.org/T10237 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9976000189781189 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1702 |
| topics[0].subfield.display_name | Artificial Intelligence |
| topics[0].display_name | Cryptography and Data Security |
| topics[1].id | https://openalex.org/T10764 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9969000220298767 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1702 |
| topics[1].subfield.display_name | Artificial Intelligence |
| topics[1].display_name | Privacy-Preserving Technologies in Data |
| topics[2].id | https://openalex.org/T11614 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9965000152587891 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1710 |
| topics[2].subfield.display_name | Information Systems |
| topics[2].display_name | Cloud Data Security Solutions |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C41008148 |
| concepts[0].level | 0 |
| concepts[0].score | 0.8649475574493408 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[0].display_name | Computer science |
| concepts[1].id | https://openalex.org/C148730421 |
| concepts[1].level | 2 |
| concepts[1].score | 0.712554931640625 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q141090 |
| concepts[1].display_name | Encryption |
| concepts[2].id | https://openalex.org/C79974875 |
| concepts[2].level | 2 |
| concepts[2].score | 0.6389901638031006 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q483639 |
| concepts[2].display_name | Cloud computing |
| concepts[3].id | https://openalex.org/C527821871 |
| concepts[3].level | 2 |
| concepts[3].score | 0.5245233774185181 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q228502 |
| concepts[3].display_name | Access control |
| concepts[4].id | https://openalex.org/C26517878 |
| concepts[4].level | 2 |
| concepts[4].score | 0.5206896066665649 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q228039 |
| concepts[4].display_name | Key (lock) |
| concepts[5].id | https://openalex.org/C137822555 |
| concepts[5].level | 2 |
| concepts[5].score | 0.47417962551116943 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q2587068 |
| concepts[5].display_name | Information sensitivity |
| concepts[6].id | https://openalex.org/C38652104 |
| concepts[6].level | 1 |
| concepts[6].score | 0.4608141779899597 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[6].display_name | Computer security |
| concepts[7].id | https://openalex.org/C77088390 |
| concepts[7].level | 1 |
| concepts[7].score | 0.4152871370315552 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q8513 |
| concepts[7].display_name | Database |
| concepts[8].id | https://openalex.org/C2777059624 |
| concepts[8].level | 3 |
| concepts[8].score | 0.4136904180049896 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q914359 |
| concepts[8].display_name | Cloud storage |
| concepts[9].id | https://openalex.org/C10511746 |
| concepts[9].level | 3 |
| concepts[9].score | 0.41307663917541504 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q899388 |
| concepts[9].display_name | Data security |
| concepts[10].id | https://openalex.org/C124101348 |
| concepts[10].level | 1 |
| concepts[10].score | 0.40146803855895996 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q172491 |
| concepts[10].display_name | Data mining |
| concepts[11].id | https://openalex.org/C111919701 |
| concepts[11].level | 1 |
| concepts[11].score | 0.0 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q9135 |
| concepts[11].display_name | Operating system |
| keywords[0].id | https://openalex.org/keywords/computer-science |
| keywords[0].score | 0.8649475574493408 |
| keywords[0].display_name | Computer science |
| keywords[1].id | https://openalex.org/keywords/encryption |
| keywords[1].score | 0.712554931640625 |
| keywords[1].display_name | Encryption |
| keywords[2].id | https://openalex.org/keywords/cloud-computing |
| keywords[2].score | 0.6389901638031006 |
| keywords[2].display_name | Cloud computing |
| keywords[3].id | https://openalex.org/keywords/access-control |
| keywords[3].score | 0.5245233774185181 |
| keywords[3].display_name | Access control |
| keywords[4].id | https://openalex.org/keywords/key |
| keywords[4].score | 0.5206896066665649 |
| keywords[4].display_name | Key (lock) |
| keywords[5].id | https://openalex.org/keywords/information-sensitivity |
| keywords[5].score | 0.47417962551116943 |
| keywords[5].display_name | Information sensitivity |
| keywords[6].id | https://openalex.org/keywords/computer-security |
| keywords[6].score | 0.4608141779899597 |
| keywords[6].display_name | Computer security |
| keywords[7].id | https://openalex.org/keywords/database |
| keywords[7].score | 0.4152871370315552 |
| keywords[7].display_name | Database |
| keywords[8].id | https://openalex.org/keywords/cloud-storage |
| keywords[8].score | 0.4136904180049896 |
| keywords[8].display_name | Cloud storage |
| keywords[9].id | https://openalex.org/keywords/data-security |
| keywords[9].score | 0.41307663917541504 |
| keywords[9].display_name | Data security |
| keywords[10].id | https://openalex.org/keywords/data-mining |
| keywords[10].score | 0.40146803855895996 |
| keywords[10].display_name | Data mining |
| language | en |
| locations[0].id | doi:10.34028/iajit/18/1/7 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S100666833 |
| locations[0].source.issn | 1683-3198, 2309-4524 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | 1683-3198 |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | The International Arab Journal of Information Technology |
| locations[0].source.host_organization | https://openalex.org/P4362726017 |
| locations[0].source.host_organization_name | Zarqa University |
| locations[0].source.host_organization_lineage | https://openalex.org/P4362726017 |
| locations[0].source.host_organization_lineage_names | Zarqa University |
| locations[0].license | |
| locations[0].pdf_url | https://doi.org/10.34028/iajit/18/1/7 |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | The International Arab Journal of Information Technology |
| locations[0].landing_page_url | https://doi.org/10.34028/iajit/18/1/7 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5053230711 |
| authorships[0].author.orcid | |
| authorships[0].author.display_name | Pradeep Suthanthiramani |
| authorships[0].countries | IN |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I33585257 |
| authorships[0].affiliations[0].raw_affiliation_string | Department of Information Science and Technology, Anna University, India |
| authorships[0].institutions[0].id | https://openalex.org/I33585257 |
| authorships[0].institutions[0].ror | https://ror.org/01qhf1r47 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I33585257 |
| authorships[0].institutions[0].country_code | IN |
| authorships[0].institutions[0].display_name | Anna University, Chennai |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Pradeep Suthanthiramani |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | Department of Information Science and Technology, Anna University, India |
| authorships[1].author.id | https://openalex.org/A5015813317 |
| authorships[1].author.orcid | |
| authorships[1].author.display_name | S. Muthurajkumar |
| authorships[1].countries | IN |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I33585257 |
| authorships[1].affiliations[0].raw_affiliation_string | Department of Computer Technology, Anna University, India |
| authorships[1].institutions[0].id | https://openalex.org/I33585257 |
| authorships[1].institutions[0].ror | https://ror.org/01qhf1r47 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I33585257 |
| authorships[1].institutions[0].country_code | IN |
| authorships[1].institutions[0].display_name | Anna University, Chennai |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Muthurajkumar Sannasy |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | Department of Computer Technology, Anna University, India |
| authorships[2].author.id | https://openalex.org/A5066618434 |
| authorships[2].author.orcid | https://orcid.org/0000-0001-9177-5378 |
| authorships[2].author.display_name | Sannasi Ganapathy |
| authorships[2].countries | IN |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I876193797 |
| authorships[2].affiliations[0].raw_affiliation_string | Research Centre for Cyber-Physical Systems and School of Computer Science and Engineering, Vellore Institute of Technology, India |
| authorships[2].institutions[0].id | https://openalex.org/I876193797 |
| authorships[2].institutions[0].ror | https://ror.org/00qzypv28 |
| authorships[2].institutions[0].type | education |
| authorships[2].institutions[0].lineage | https://openalex.org/I876193797 |
| authorships[2].institutions[0].country_code | IN |
| authorships[2].institutions[0].display_name | Vellore Institute of Technology University |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Ganapathy Sannasi |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | Research Centre for Cyber-Physical Systems and School of Computer Science and Engineering, Vellore Institute of Technology, India |
| authorships[3].author.id | https://openalex.org/A5017525339 |
| authorships[3].author.orcid | https://orcid.org/0000-0002-3564-395X |
| authorships[3].author.display_name | A. Kannan |
| authorships[3].countries | IN |
| authorships[3].affiliations[0].institution_ids | https://openalex.org/I33585257 |
| authorships[3].affiliations[0].raw_affiliation_string | Department of Information Science and Technology, Anna University, India |
| authorships[3].institutions[0].id | https://openalex.org/I33585257 |
| authorships[3].institutions[0].ror | https://ror.org/01qhf1r47 |
| authorships[3].institutions[0].type | education |
| authorships[3].institutions[0].lineage | https://openalex.org/I33585257 |
| authorships[3].institutions[0].country_code | IN |
| authorships[3].institutions[0].display_name | Anna University, Chennai |
| authorships[3].author_position | last |
| authorships[3].raw_author_name | Kannan Arputharaj |
| authorships[3].is_corresponding | False |
| authorships[3].raw_affiliation_strings | Department of Information Science and Technology, Anna University, India |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://doi.org/10.34028/iajit/18/1/7 |
| open_access.oa_status | diamond |
| open_access.any_repository_has_fulltext | False |
| created_date | 2021-03-15T00:00:00 |
| display_name | Secured Data Storage and Retrieval using Elliptic Curve Cryptography in Cloud |
| has_fulltext | True |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T10237 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9976000189781189 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1702 |
| primary_topic.subfield.display_name | Artificial Intelligence |
| primary_topic.display_name | Cryptography and Data Security |
| related_works | https://openalex.org/W2800638116, https://openalex.org/W2318336165, https://openalex.org/W1905179302, https://openalex.org/W3210166343, https://openalex.org/W3026246079, https://openalex.org/W2469042420, https://openalex.org/W2625891802, https://openalex.org/W4210919582, https://openalex.org/W2954486536, https://openalex.org/W3093854617 |
| cited_by_count | 12 |
| counts_by_year[0].year | 2025 |
| counts_by_year[0].cited_by_count | 1 |
| counts_by_year[1].year | 2024 |
| counts_by_year[1].cited_by_count | 2 |
| counts_by_year[2].year | 2023 |
| counts_by_year[2].cited_by_count | 2 |
| counts_by_year[3].year | 2022 |
| counts_by_year[3].cited_by_count | 4 |
| counts_by_year[4].year | 2021 |
| counts_by_year[4].cited_by_count | 3 |
| locations_count | 1 |
| best_oa_location.id | doi:10.34028/iajit/18/1/7 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S100666833 |
| best_oa_location.source.issn | 1683-3198, 2309-4524 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | 1683-3198 |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | The International Arab Journal of Information Technology |
| best_oa_location.source.host_organization | https://openalex.org/P4362726017 |
| best_oa_location.source.host_organization_name | Zarqa University |
| best_oa_location.source.host_organization_lineage | https://openalex.org/P4362726017 |
| best_oa_location.source.host_organization_lineage_names | Zarqa University |
| best_oa_location.license | |
| best_oa_location.pdf_url | https://doi.org/10.34028/iajit/18/1/7 |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | The International Arab Journal of Information Technology |
| best_oa_location.landing_page_url | https://doi.org/10.34028/iajit/18/1/7 |
| primary_location.id | doi:10.34028/iajit/18/1/7 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S100666833 |
| primary_location.source.issn | 1683-3198, 2309-4524 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | 1683-3198 |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | The International Arab Journal of Information Technology |
| primary_location.source.host_organization | https://openalex.org/P4362726017 |
| primary_location.source.host_organization_name | Zarqa University |
| primary_location.source.host_organization_lineage | https://openalex.org/P4362726017 |
| primary_location.source.host_organization_lineage_names | Zarqa University |
| primary_location.license | |
| primary_location.pdf_url | https://doi.org/10.34028/iajit/18/1/7 |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | The International Arab Journal of Information Technology |
| primary_location.landing_page_url | https://doi.org/10.34028/iajit/18/1/7 |
| publication_date | 2020-12-14 |
| publication_year | 2020 |
| referenced_works | https://openalex.org/W168953860, https://openalex.org/W1482263867, https://openalex.org/W2562025978, https://openalex.org/W1514757139, https://openalex.org/W7024564426, https://openalex.org/W3036961407, https://openalex.org/W2095263124, https://openalex.org/W2345464210, https://openalex.org/W2998533495, https://openalex.org/W2615108092, https://openalex.org/W2596492958, https://openalex.org/W593722068, https://openalex.org/W2330801733, https://openalex.org/W2043954599, https://openalex.org/W2507729583, https://openalex.org/W4246236388, https://openalex.org/W2001899238, https://openalex.org/W2606329158, https://openalex.org/W1966378737, https://openalex.org/W1684613771, https://openalex.org/W2610106120, https://openalex.org/W1520890006, https://openalex.org/W773504527, https://openalex.org/W6674671283, https://openalex.org/W2507635762, https://openalex.org/W2571385502, https://openalex.org/W6675090924, https://openalex.org/W2752243939, https://openalex.org/W2345068994, https://openalex.org/W2043417095, https://openalex.org/W4234815162, https://openalex.org/W1726003012, https://openalex.org/W2112022568, https://openalex.org/W2096337497, https://openalex.org/W2284318220, https://openalex.org/W2099404336, https://openalex.org/W2983170364 |
| referenced_works_count | 37 |
| abstract_inverted_index.a | 9, 224, 281 |
| abstract_inverted_index.5% | 335 |
| abstract_inverted_index.In | 30 |
| abstract_inverted_index.as | 171 |
| abstract_inverted_index.be | 15 |
| abstract_inverted_index.by | 83, 92, 115, 236, 332 |
| abstract_inverted_index.in | 4, 71, 148, 151, 233, 267, 296, 318 |
| abstract_inverted_index.is | 8, 99, 163, 211, 231, 260, 293, 322, 338 |
| abstract_inverted_index.it | 98, 162, 210, 321, 337 |
| abstract_inverted_index.of | 1, 21, 78, 89, 133, 195 |
| abstract_inverted_index.on | 75, 201 |
| abstract_inverted_index.so | 160 |
| abstract_inverted_index.to | 14, 18, 64, 101, 129, 153, 165, 213 |
| abstract_inverted_index.For | 123 |
| abstract_inverted_index.and | 11, 26, 43, 50, 183, 189, 207, 221, 228, 242, 252, 264, 302 |
| abstract_inverted_index.are | 81 |
| abstract_inverted_index.due | 17 |
| abstract_inverted_index.for | 67, 106, 191, 271, 299, 310, 347 |
| abstract_inverted_index.has | 142 |
| abstract_inverted_index.key | 51, 226, 250, 257 |
| abstract_inverted_index.new | 225, 282 |
| abstract_inverted_index.non | 256 |
| abstract_inverted_index.the | 5, 19, 31, 55, 68, 76, 79, 84, 87, 108, 117, 120, 125, 130, 137, 155, 158, 169, 193, 202, 205, 215, 238, 243, 248, 253, 268, 306, 311, 315, 325, 329 |
| abstract_inverted_index.From | 314 |
| abstract_inverted_index.also | 294 |
| abstract_inverted_index.been | 143 |
| abstract_inverted_index.data | 2, 24, 69, 135, 182, 190, 217, 265, 309, 312, 330 |
| abstract_inverted_index.find | 154 |
| abstract_inverted_index.form | 166 |
| abstract_inverted_index.from | 94 |
| abstract_inverted_index.keys | 220 |
| abstract_inverted_index.many | 33 |
| abstract_inverted_index.more | 103, 333 |
| abstract_inverted_index.most | 307 |
| abstract_inverted_index.over | 305 |
| abstract_inverted_index.role | 56 |
| abstract_inverted_index.rule | 139 |
| abstract_inverted_index.than | 334 |
| abstract_inverted_index.that | 61, 161, 259, 324 |
| abstract_inverted_index.them | 93 |
| abstract_inverted_index.this | 149, 234, 297, 319 |
| abstract_inverted_index.were | 62 |
| abstract_inverted_index.when | 336 |
| abstract_inverted_index.with | 145, 174, 179, 185, 218, 289, 340 |
| abstract_inverted_index.work | 150 |
| abstract_inverted_index.Based | 200 |
| abstract_inverted_index.Curve | 287 |
| abstract_inverted_index.Least | 244 |
| abstract_inverted_index.Table | 291 |
| abstract_inverted_index.among | 157, 168, 204 |
| abstract_inverted_index.based | 47, 57, 74, 113, 197, 278 |
| abstract_inverted_index.cloud | 6, 72, 134, 269, 348 |
| abstract_inverted_index.data, | 176 |
| abstract_inverted_index.first | 254 |
| abstract_inverted_index.group | 177 |
| abstract_inverted_index.issue | 13, 127 |
| abstract_inverted_index.large | 131 |
| abstract_inverted_index.model | 327 |
| abstract_inverted_index.order | 152 |
| abstract_inverted_index.other | 341 |
| abstract_inverted_index.owner | 184 |
| abstract_inverted_index.paper | 235, 298 |
| abstract_inverted_index.past, | 32 |
| abstract_inverted_index.value | 251 |
| abstract_inverted_index.work, | 320 |
| abstract_inverted_index.Hence, | 223 |
| abstract_inverted_index.access | 28, 39, 58 |
| abstract_inverted_index.called | 285 |
| abstract_inverted_index.common | 240, 245 |
| abstract_inverted_index.gained | 91 |
| abstract_inverted_index.groups | 167 |
| abstract_inverted_index.highly | 186 |
| abstract_inverted_index.medium | 180, 261 |
| abstract_inverted_index.mining | 140 |
| abstract_inverted_index.misuse | 88 |
| abstract_inverted_index.models | 345 |
| abstract_inverted_index.public | 172 |
| abstract_inverted_index.roles. | 96 |
| abstract_inverted_index.stored | 3, 70 |
| abstract_inverted_index.volume | 132 |
| abstract_inverted_index.Base100 | 290 |
| abstract_inverted_index.between | 119, 247 |
| abstract_inverted_index.complex | 12 |
| abstract_inverted_index.control | 59 |
| abstract_inverted_index.divisor | 241 |
| abstract_inverted_index.encrypt | 214 |
| abstract_inverted_index.methods | 49 |
| abstract_inverted_index.models, | 45 |
| abstract_inverted_index.numeric | 255 |
| abstract_inverted_index.owners. | 313 |
| abstract_inverted_index.points. | 29 |
| abstract_inverted_index.present | 266 |
| abstract_inverted_index.primary | 249 |
| abstract_inverted_index.propose | 102 |
| abstract_inverted_index.provide | 65 |
| abstract_inverted_index.related | 128 |
| abstract_inverted_index.scheme. | 199 |
| abstract_inverted_index.secured | 273, 343 |
| abstract_inverted_index.storage | 48, 274, 344 |
| abstract_inverted_index.through | 86, 111, 275 |
| abstract_inverted_index.various | 121 |
| abstract_inverted_index.Elliptic | 286 |
| abstract_inverted_index.Greatest | 239 |
| abstract_inverted_index.However, | 54 |
| abstract_inverted_index.Security | 0 |
| abstract_inverted_index.attacks, | 23 |
| abstract_inverted_index.breaches | 25 |
| abstract_inverted_index.compared | 339 |
| abstract_inverted_index.control, | 40 |
| abstract_inverted_index.database | 270 |
| abstract_inverted_index.enhances | 328 |
| abstract_inverted_index.existing | 342 |
| abstract_inverted_index.extended | 144 |
| abstract_inverted_index.handling | 124 |
| abstract_inverted_index.multiple | 95, 246 |
| abstract_inverted_index.observed | 323 |
| abstract_inverted_index.policies | 60 |
| abstract_inverted_index.possible | 164, 212 |
| abstract_inverted_index.presence | 20 |
| abstract_inverted_index.proposed | 35, 232, 295, 326 |
| abstract_inverted_index.schemes. | 53 |
| abstract_inverted_index.securing | 107 |
| abstract_inverted_index.security | 36, 66, 126, 331 |
| abstract_inverted_index.strength | 194 |
| abstract_inverted_index.stronger | 219 |
| abstract_inverted_index.temporal | 146, 208 |
| abstract_inverted_index.Moreover, | 280 |
| abstract_inverted_index.addressed | 16 |
| abstract_inverted_index.algorithm | 141, 230, 284, 292 |
| abstract_inverted_index.analyzing | 116 |
| abstract_inverted_index.attackers | 85 |
| abstract_inverted_index.attribute | 112, 196, 258, 277 |
| abstract_inverted_index.available | 346 |
| abstract_inverted_index.combining | 237 |
| abstract_inverted_index.conducted | 317 |
| abstract_inverted_index.databases | 7, 73 |
| abstract_inverted_index.detection | 42 |
| abstract_inverted_index.developed | 63 |
| abstract_inverted_index.effective | 276 |
| abstract_inverted_index.efficient | 104 |
| abstract_inverted_index.enhancing | 192 |
| abstract_inverted_index.including | 38 |
| abstract_inverted_index.intrusion | 41 |
| abstract_inverted_index.malicious | 22 |
| abstract_inverted_index.necessary | 100 |
| abstract_inverted_index.providing | 272 |
| abstract_inverted_index.sensitive | 109, 181, 187, 216, 262, 308 |
| abstract_inverted_index.unsecured | 27 |
| abstract_inverted_index.Encryption | 46 |
| abstract_inverted_index.Therefore, | 97 |
| abstract_inverted_index.attributes | 159, 170, 173, 178, 188, 206, 263 |
| abstract_inverted_index.decryption | 303 |
| abstract_inverted_index.encryption | 114, 198, 229, 301 |
| abstract_inverted_index.generation | 227 |
| abstract_inverted_index.management | 52 |
| abstract_inverted_index.mechanisms | 37, 105 |
| abstract_inverted_index.operations | 304 |
| abstract_inverted_index.performing | 300 |
| abstract_inverted_index.prevention | 44 |
| abstract_inverted_index.privileges | 90 |
| abstract_inverted_index.algorithms. | 222 |
| abstract_inverted_index.association | 118, 138, 156 |
| abstract_inverted_index.attributes. | 122 |
| abstract_inverted_index.challenging | 10 |
| abstract_inverted_index.compromised | 82 |
| abstract_inverted_index.constraints | 147 |
| abstract_inverted_index.encryption. | 279 |
| abstract_inverted_index.experiments | 316 |
| abstract_inverted_index.information | 80, 110 |
| abstract_inverted_index.insensitive | 175 |
| abstract_inverted_index.intelligent | 283 |
| abstract_inverted_index.researchers | 34 |
| abstract_inverted_index.sensitivity | 77 |
| abstract_inverted_index.Cryptography | 288 |
| abstract_inverted_index.associations | 203 |
| abstract_inverted_index.constraints, | 209 |
| abstract_inverted_index.effectively, | 136 |
| cited_by_percentile_year.max | 97 |
| cited_by_percentile_year.min | 91 |
| countries_distinct_count | 1 |
| institutions_distinct_count | 4 |
| sustainable_development_goals[0].id | https://metadata.un.org/sdg/16 |
| sustainable_development_goals[0].score | 0.5699999928474426 |
| sustainable_development_goals[0].display_name | Peace, Justice and strong institutions |
| citation_normalized_percentile.value | 0.84709906 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |