{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,30]],"date-time":"2025-08-30T00:05:56Z","timestamp":1756512356239,"version":"3.44.0"},"reference-count":13,"publisher":"Wiley","issue":"4","license":[{"start":{"date-parts":[[2024,11,25]],"date-time":"2024-11-25T00:00:00Z","timestamp":1732492800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Internet Technology Letters"],"published-print":{"date-parts":[[2025,7]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>In the current data sharing environment of smart manufacturing systems, there is a lack of a transparent, open, and fair interaction environment, and there exists a serious imbalance in data sharing and transmission, which leads to data trust issues. To address this challenge, we propose a fine\u2010grained access control method for IoT data sharing based on blockchain technology (the Bayesian information criterion [BIC] scheme for IoT data sharing). This approach includes ex\u2010ante supervision and authentication of data sources, fine\u2010grained access control during data usage, and ex\u2010post tracking of malicious users. Firstly, a system model is built, and symmetric encryption is used to encrypt the data in order to improve computational efficiency. Subsequently, scheme design and algorithm design are carried out to encrypt the symmetric key using ciphertext\u2010policy attribute\u2010based encryption to achieve one\u2010to\u2010many data sharing, which greatly reduces the number of repeated encryptions and computational overheads. The data owner uploads the encrypted data to the cloud server, and the data user must hold the token generated by the blockchain to interact with the cloud and obtain the corresponding information. The results show that the BIC scheme not only ensures the legitimacy and security of data access but also locks up and traces malicious users who may have compromised their private keys, preventing illegal data sharing and key misuse; it offers significant advantages in terms of storage efficiency and time consumption, and also facilitates a flexible and secure data sharing process.<\/jats:p>","DOI":"10.1002\/itl2.589","type":"journal-article","created":{"date-parts":[[2024,11,25]],"date-time":"2024-11-25T20:23:49Z","timestamp":1732566229000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Blockchain\u2010based smart and secure manufacturing systems"],"prefix":"10.1002","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-9311-0915","authenticated-orcid":false,"given":"Jun","family":"Zhu","sequence":"first","affiliation":[{"name":"Harbin Engineering University  Harbin China"}]},{"given":"Guo Yin","family":"Zhang","sequence":"additional","affiliation":[{"name":"Harbin Engineering University  Harbin China"}]}],"member":"311","published-online":{"date-parts":[[2024,11,25]]},"reference":[{"key":"e_1_2_8_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.107833"},{"key":"e_1_2_8_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2024.3416418"},{"key":"e_1_2_8_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.110133"},{"key":"e_1_2_8_5_1","doi-asserted-by":"publisher","DOI":"10.1080\/0952813X.2022.2135611"},{"key":"e_1_2_8_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2023.09.032"},{"key":"e_1_2_8_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.bdr.2024.100459"},{"key":"e_1_2_8_8_1","doi-asserted-by":"crossref","first-page":"1.1","DOI":"10.1016\/j.comnet.2023.110048","article-title":"A blockchain\u2010empowered framework for decentralized trust management in internet of battlefield things","volume":"237","author":"Wang H","year":"2023","journal-title":"Comput Netw"},{"key":"e_1_2_8_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICOTEN52080.2021.9493474"},{"key":"e_1_2_8_10_1","doi-asserted-by":"publisher","DOI":"10.1061\/(ASCE)ME.1943-5479.0001029"},{"key":"e_1_2_8_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2020.2976697"},{"key":"e_1_2_8_12_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.5232"},{"key":"e_1_2_8_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2024.109343"},{"key":"e_1_2_8_14_1","first-page":"1","article-title":"Artificial neural networks training algorithm integrating invasive weed optimization with differential evolutionary model","volume":"14","author":"Movassagh AA","year":"2021","journal-title":"J Ambient Intell Humaniz Comput"}],"container-title":["Internet Technology Letters"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/itl2.589","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,29]],"date-time":"2025-08-29T13:44:30Z","timestamp":1756475070000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/itl2.589"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,25]]},"references-count":13,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,7]]}},"alternative-id":["10.1002\/itl2.589"],"URL":"https:\/\/doi.org\/10.1002\/itl2.589","archive":["Portico"],"relation":{},"ISSN":["2476-1508","2476-1508"],"issn-type":[{"type":"print","value":"2476-1508"},{"type":"electronic","value":"2476-1508"}],"subject":[],"published":{"date-parts":[[2024,11,25]]},"assertion":[{"value":"2024-06-30","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-09-13","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-11-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"e589"}}