{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T12:13:06Z","timestamp":1767183186285,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":15,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811904677"},{"type":"electronic","value":"9789811904684"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-981-19-0468-4_17","type":"book-chapter","created":{"date-parts":[[2022,2,25]],"date-time":"2022-02-25T14:02:47Z","timestamp":1645797767000},"page":"229-240","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["Reliable and Controllable Data Sharing Based on Blockchain"],"prefix":"10.1007","author":[{"given":"Yipeng","family":"Zou","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1653-4501","authenticated-orcid":false,"given":"Tao","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Wentao","family":"Zhong","sequence":"additional","affiliation":[]},{"given":"Kejian","family":"Guan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9875-4182","authenticated-orcid":false,"given":"Guojun","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,2,26]]},"reference":[{"key":"17_CR1","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1016\/j.future.2021.05.023","volume":"124","author":"Z Chen","year":"2021","unstructured":"Chen, Z., Xu, W., Wang, B., Yu, H.: A blockchain-based preserving and sharing system for medical data privacy. Future Gener. Comput. Syst. 124, 338\u2013350 (2021)","journal-title":"Future Gener. Comput. Syst."},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"Danzi, P., Kalor, A.E., Stefanovic, C., Popovski, P.: Analysis of the communication traffic for blockchain synchronization of IoT devices. In: 2018 IEEE International Conference on Communications (ICC), pp. 1\u20137 (2018)","DOI":"10.1109\/ICC.2018.8422485"},{"key":"17_CR3","doi-asserted-by":"publisher","first-page":"101728","DOI":"10.1016\/j.sysarc.2020.101728","volume":"107","author":"C Ge","year":"2020","unstructured":"Ge, C., Ma, X., Liu, Z.: A semi-autonomous distributed blockchain-based framework for UAVs system. J. Syst. Archit. 107, 101728 (2020)","journal-title":"J. Syst. Archit."},{"issue":"1","key":"17_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13638-021-02041-y","volume":"2021","author":"Yu Guo","year":"2021","unstructured":"Guo, Yu., Wang, S., Huang, J.: A blockchain-assisted framework for secure and reliable data sharing in distributed systems. EURASIP J. Wirel. Commun. Netw. 2021(1), 1\u201319 (2021). https:\/\/doi.org\/10.1186\/s13638-021-02041-y","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"issue":"7","key":"17_CR5","first-page":"6266","volume":"7","author":"M Li","year":"2020","unstructured":"Li, M., Sun, Y., Lu, H., Maharjan, S., Tian, Z.: Deep reinforcement learning for partially observable data poisoning attack in crowdsensing systems. IEEE IoT J. 7(7), 6266\u20136278 (2020)","journal-title":"IEEE IoT J."},{"key":"17_CR6","unstructured":"Lu, H., et al.: Research on intelligent detection of command level stack pollution for binary program analysis. Mob. Netw. Appl. 1\u201310 (2020)"},{"key":"17_CR7","doi-asserted-by":"publisher","first-page":"102444","DOI":"10.1016\/j.jnca.2019.102444","volume":"149","author":"Q Lyu","year":"2020","unstructured":"Lyu, Q., Qi, Y., Zhang, X., Liu, H., Wang, Q., Zheng, N.: SBAC: a secure blockchain-based access control framework for information-centric networking. J. Netw. Comput. Appl. 149, 102444 (2020)","journal-title":"J. Netw. Comput. Appl."},{"key":"17_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1007\/11426639_27","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"A Sahai","year":"2005","unstructured":"Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457\u2013473. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11426639_27"},{"issue":"1","key":"17_CR9","doi-asserted-by":"publisher","first-page":"858","DOI":"10.1109\/COMST.2018.2863956","volume":"21","author":"T Salman","year":"2018","unstructured":"Salman, T., Zolanvari, M., Erbad, A., Jain, R., Samaka, M.: Security services using blockchains: a state of the art survey. IEEE Commun. Surv. Tutor. 21(1), 858\u2013880 (2018)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"1","key":"17_CR10","first-page":"199","volume":"6","author":"N Szabo","year":"1997","unstructured":"Szabo, N.: The idea of smart contracts. Nick Szabo\u2019s Pap. Concise Tutor. 6(1), 199 (1997)","journal-title":"Nick Szabo\u2019s Pap. Concise Tutor."},{"issue":"2","key":"17_CR11","first-page":"1584","volume":"6","author":"Q Tan","year":"2018","unstructured":"Tan, Q., Gao, Y., Shi, J., Wang, X., Fang, B., Tian, Z.: Toward a comprehensive insight into the eclipse attacks of tor hidden services. IEEE IoT J. 6(2), 1584\u20131593 (2018)","journal-title":"IEEE IoT J."},{"issue":"3","key":"17_CR12","doi-asserted-by":"publisher","first-page":"1963","DOI":"10.1109\/TII.2019.2938778","volume":"16","author":"Z Tian","year":"2019","unstructured":"Tian, Z., Luo, C., Qiu, J., Du, X., Guizani, M.: A distributed deep learning system for web attack detection on edge devices. IEEE Trans. Indust. Inf. 16(3), 1963\u20131971 (2019)","journal-title":"IEEE Trans. Indust. Inf."},{"key":"17_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/978-3-642-19379-8_4","volume-title":"Public Key Cryptography \u2013 PKC 2011","author":"B Waters","year":"2011","unstructured":"Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 53\u201370. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-19379-8_4"},{"key":"17_CR14","doi-asserted-by":"publisher","first-page":"870","DOI":"10.1109\/TPDS.2018.2871449","volume":"30","author":"C Xu","year":"2018","unstructured":"Xu, C., et al.: Making big data open in edges: a resource-efficient blockchain-based approach. IEEE Trans. Parallel Distrib. Syst. 30, 870\u2013882 (2018)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"11","key":"17_CR15","doi-asserted-by":"publisher","first-page":"2927","DOI":"10.1109\/TIFS.2019.2911166","volume":"14","author":"Y Xue","year":"2019","unstructured":"Xue, Y., Xue, K., Gai, N., Hong, J., Wei, D.S., Hong, P.: An attribute-based controlled collaborative access control scheme for public cloud storage. IEEE Trans. Inf. Forensics Secur. 14(11), 2927\u20132942 (2019)","journal-title":"IEEE Trans. Inf. Forensics Secur."}],"container-title":["Communications in Computer and Information Science","Ubiquitous Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-19-0468-4_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,25]],"date-time":"2022-02-25T14:17:06Z","timestamp":1645798626000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-19-0468-4_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9789811904677","9789811904684"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-981-19-0468-4_17","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"26 February 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"UbiSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Inernational Conference on Ubiquitous Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 December 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 December 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ubisec2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/ubisecurity.org\/2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"96","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"27% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}