{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T12:00:26Z","timestamp":1764331226463,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031490989"},{"type":"electronic","value":"9783031490996"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-49099-6_17","type":"book-chapter","created":{"date-parts":[[2023,12,8]],"date-time":"2023-12-08T06:02:34Z","timestamp":1702015354000},"page":"275-294","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Secured Collaboration with\u00a0Ciphertext Policy Attribute Based Signcryption in\u00a0a\u00a0Distributed Fog Environment for\u00a0Medical Data Sharing"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7134-5642","authenticated-orcid":false,"given":"G. A.","family":"Thushara","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8509-4461","authenticated-orcid":false,"given":"S. Mary Saira","family":"Bhanu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2023,12,9]]},"reference":[{"key":"17_CR1","series-title":"Lecture Notes in Networks and Systems","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/978-981-13-3122-0_12","volume-title":"Advances in Computer, Communication and Control","author":"S Debnath","year":"2019","unstructured":"Debnath, S., Nunsanga, M.V.L., Bhuyan, B.: Study and scope of signcryption for cloud data access control. In: Biswas, U., Banerjee, A., Pal, S., Biswas, A., Sarkar, D., Haldar, S. (eds.) Advances in Computer, Communication and Control. LNNS, vol. 41, pp. 113\u2013126. Springer, Singapore (2019). https:\/\/doi.org\/10.1007\/978-981-13-3122-0_12"},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"Iqbal, J., Umar, A.I., Amin, N., Waheed, A.: Efficient and secure attribute-based heterogeneous online\/offline signcryption for body sensor networks based on blockchain. Int. J. Distrib. Sens. Netw. 15(9) (2019)","DOI":"10.1177\/1550147719875654"},{"key":"17_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2020.102139","volume":"59","author":"H Zahmatkesh","year":"2020","unstructured":"Zahmatkesh, H., Al-Turjman, F.: Fog computing for sustainable smart cities in the IoT era: caching techniques and enabling technologies-an overview. Sustain. Cities Soc. 59, 102139 (2020)","journal-title":"Sustain. Cities Soc."},{"key":"17_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2020.100177","volume":"9","author":"AA Alli","year":"2020","unstructured":"Alli, A.A., Alam, M.M.: The Fog cloud of things: a survey on concepts, architecture, standards, tools, and applications. Internet Things 9, 100177 (2020)","journal-title":"Internet Things"},{"issue":"5","key":"17_CR5","doi-asserted-by":"publisher","first-page":"1728","DOI":"10.1109\/JSAC.2016.2545559","volume":"34","author":"F Jalali","year":"2016","unstructured":"Jalali, F., Hinton, K., Ayre, R., Alpcan, T., Tucker, R.S.: Fog computing may help to save energy in cloud computing. IEEE J. Sel. Areas Commun. 34(5), 1728\u20131739 (2016)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Bao, Y., Qiu, W., Cheng, X.: Secure and lightweight fine-grained searchable data sharing for IoT-oriented and cloud-assisted smart healthcare system. IEEE Internet Things J. 9(4), 2513\u20132526 (2021)","DOI":"10.1109\/JIOT.2021.3063846"},{"key":"17_CR7","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.ins.2019.03.039","volume":"490","author":"Y Wang","year":"2019","unstructured":"Wang, Y., Pang, H., Deng, R.H., Ding, Y., Wu, Q., Qin, B.: Securing messaging services through efficient signcryption with designated equality test. Inf. Sci. 490, 146\u2013165 (2019)","journal-title":"Inf. Sci."},{"key":"17_CR8","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1016\/j.ins.2018.04.035","volume":"453","author":"XJ Lin","year":"2018","unstructured":"Lin, X.J., Sun, L., Qu, H.: Generic construction of public key encryption, identity-based encryption and signcryption with equality test. Inf. Sci. 453, 111\u2013126 (2018)","journal-title":"Inf. Sci."},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"Zhang, R., Wang, J., Song, Z., Wang, X.: An enhanced searchable encryption scheme for secure data outsourcing. Sci. China Inf. Sci. 63(3) (2020)","DOI":"10.1007\/s11432-019-1509-7"},{"key":"17_CR10","doi-asserted-by":"publisher","first-page":"170713","DOI":"10.1109\/ACCESS.2020.3025060","volume":"8","author":"X Yang","year":"2020","unstructured":"Yang, X., Li, T., Xi, W., Chen, A., Wang, C.: A blockchain-assisted verifiable outsourced attribute based signcryption scheme for EHRs sharing in the cloud. IEEE Access 8, 170713\u2013170731 (2020)","journal-title":"IEEE Access"},{"key":"17_CR11","doi-asserted-by":"publisher","first-page":"120950","DOI":"10.1109\/ACCESS.2019.2933636","volume":"7","author":"F Deng","year":"2019","unstructured":"Deng, F., Wang, Y., Peng, L., Lai, M., Geng, J.: Revocable cloud-assisted attribute-based signcryption in personal health system. IEEE Access 7, 120950\u2013120960 (2019)","journal-title":"IEEE Access"},{"issue":"9","key":"17_CR12","doi-asserted-by":"publisher","first-page":"7949","DOI":"10.1109\/JIOT.2020.2992288","volume":"7","author":"J Yu","year":"2020","unstructured":"Yu, J., Liu, S., Wang, S., Xiao, Y., Yan, B.: LHABSC: a lightweight hybrid attribute-based signcryption scheme for cloud-fog assisted IoT. IEEE Internet Things J. 7(9), 7949\u20137966 (2020)","journal-title":"IEEE Internet Things J."},{"key":"17_CR13","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1016\/j.future.2016.07.019","volume":"67","author":"YS Rao","year":"2017","unstructured":"Rao, Y.S.: A secure and efficient ciphertext-policy attribute-based signcryption for personal health records sharing in cloud computing. Future Gener. Comput. Syst. 67, 133\u2013151 (2017)","journal-title":"Future Gener. Comput. Syst."},{"key":"17_CR14","doi-asserted-by":"publisher","first-page":"39473","DOI":"10.1109\/ACCESS.2018.2843778","volume":"6","author":"F Deng","year":"2018","unstructured":"Deng, F., Wang, Y., Li Peng, H., Xiong, J.G., Qin, Z.: Ciphertext-policy attribute-based signcryption with verifiable outsourced designcryption for sharing personal health records. IEEE Access 6, 39473\u201339486 (2018)","journal-title":"IEEE Access"},{"issue":"1","key":"17_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40064-016-2286-2","volume":"5","author":"H Hong","year":"2016","unstructured":"Hong, H., Sun, Z.: An efficient and secure attribute based signcryption scheme with LSSS access structure. Springerplus 5(1), 1\u201310 (2016)","journal-title":"Springerplus"},{"issue":"9","key":"17_CR16","doi-asserted-by":"publisher","first-page":"7949","DOI":"10.1109\/JIOT.2020.2992288","volume":"7","author":"J Yu","year":"2020","unstructured":"Yu, J., Liu, S., Wang, S., Xiao, Y., Yan, B.: LH-ABSC: a lightweight hybrid attribute-based signcryption scheme for cloud-fog-assisted IoT. IEEE Internet Things J. 7(9), 7949\u20137966 (2020)","journal-title":"IEEE Internet Things J."},{"key":"17_CR17","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1016\/j.future.2014.10.014","volume":"52","author":"J Liu","year":"2015","unstructured":"Liu, J., Huang, X., Liu, J.K.: Secure sharing of personal health records in cloud computing: ciphertext-policy attribute-based signcryption. Futur. Gener. Comput. Syst. 52, 67\u201376 (2015)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"17_CR18","doi-asserted-by":"crossref","unstructured":"Belguith, S., Kaaniche, N., Mohamed, M., Russello, G.: C-ABSC: cooperative attribute based signcryption scheme for internet of things applications. In: IEEE International Conference on Services Computing (SCC), pp. 245\u2013248. IEEE (2018)","DOI":"10.1109\/SCC.2018.00040"},{"key":"17_CR19","doi-asserted-by":"crossref","unstructured":"Alsharif, A., Shafee, A., Nabil, M., Mahmoud, M., Alasmary, W.: A multi-authority attribute-based signcryption scheme with efficient revocation for smart grid downlink communication. In: International Conference on Internet of Things and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), pp. 1025\u20131032. IEEE (2019)","DOI":"10.1109\/iThings\/GreenCom\/CPSCom\/SmartData.2019.00178"},{"issue":"8","key":"17_CR20","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4102","volume":"32","author":"S Khasawneh","year":"2021","unstructured":"Khasawneh, S., Kadoch, M.: ECS-CP-ABE: a lightweight elliptic curve signcryption scheme based on ciphertext-policy attribute-based encryption to secure downlink multicast communication in edge envisioned advanced metering infrastructure networks. Trans. Emerg. Telecommun. Technol. 32(8), e4102 (2021)","journal-title":"Trans. Emerg. Telecommun. Technol."},{"issue":"5","key":"17_CR21","doi-asserted-by":"publisher","first-page":"2041","DOI":"10.1109\/JBHI.2021.3100871","volume":"26","author":"Y Bao","year":"2021","unstructured":"Bao, Y., Qiu, W., Tang, P., Cheng, X.: Efficient, revocable, and privacy-preserving fine-grained data sharing with keyword search for the cloud-assisted medical IoT system. IEEE J. Biomed. Health Inf. 26(5), 2041\u20132051 (2021)","journal-title":"IEEE J. Biomed. Health Inf."},{"issue":"1","key":"17_CR22","doi-asserted-by":"publisher","first-page":"857","DOI":"10.1109\/TII.2022.3192037","volume":"19","author":"H Liu","year":"2022","unstructured":"Liu, H., Gu, T., Shojafar, M., Alazab, M., Liu, Y.: OPERA: optional dimensional privacy-preserving data aggregation for smart healthcare systems. IEEE Trans. Ind. Inform. 19(1), 857\u2013866 (2022)","journal-title":"IEEE Trans. Ind. Inform."},{"issue":"10","key":"17_CR23","doi-asserted-by":"publisher","first-page":"7338","DOI":"10.1109\/JIOT.2021.3103635","volume":"9","author":"H Elayan","year":"2021","unstructured":"Elayan, H., Aloqaily, M., Guizani, M.: Sustainability of healthcare data analysis IoT-based systems using deep federated learning. IEEE Internet Things J. 9(10), 7338\u20137346 (2021)","journal-title":"IEEE Internet Things J."}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-49099-6_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,8]],"date-time":"2023-12-08T06:09:08Z","timestamp":1702015748000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-49099-6_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031490989","9783031490996"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-49099-6_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"9 December 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICISS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Systems Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Raipur","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 December 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 December 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iciss2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/iciss.isrdc.in\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}