{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T11:35:37Z","timestamp":1742988937120,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":17,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819615414"},{"type":"electronic","value":"9789819615421"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-1542-1_15","type":"book-chapter","created":{"date-parts":[[2025,2,14]],"date-time":"2025-02-14T17:17:44Z","timestamp":1739553464000},"page":"242-262","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Blockchain-Assisted Anonymous Data Sharing Scheme with\u00a0Full Accountability for\u00a0CloudIoT"],"prefix":"10.1007","author":[{"given":"Chuntang","family":"Yu","sequence":"first","affiliation":[]},{"given":"Xia","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Yongzhao","family":"Zhan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,15]]},"reference":[{"key":"15_CR1","doi-asserted-by":"publisher","first-page":"684","DOI":"10.1016\/j.future.2015.09.021","volume":"56","author":"A Botta","year":"2016","unstructured":"Botta, A., de Donato, W., Persico, V., Pescap\u00e9, A.: Integration of cloud computing and internet of things: a survey. Futur. Gener. Comp. Syst. 56, 684\u2013700 (2016)","journal-title":"Futur. Gener. Comp. Syst."},{"issue":"12","key":"15_CR2","doi-asserted-by":"publisher","first-page":"11601","DOI":"10.1109\/JIOT.2020.2999350","volume":"7","author":"H Deng","year":"2020","unstructured":"Deng, H., Qin, Z., Sha, L., Yin, H.: A flexible privacy-preserving data sharing scheme in cloud-assisted IoT. IEEE Internet Things J. 7(12), 11601\u201311611 (2020)","journal-title":"IEEE Internet Things J."},{"issue":"4","key":"15_CR3","doi-asserted-by":"publisher","first-page":"2513","DOI":"10.1109\/JIOT.2021.3063846","volume":"9","author":"Y Bao","year":"2022","unstructured":"Bao, Y., Qiu, W., Cheng, X.: Secure and lightweight fine-grained searchable data sharing for IoT-oriented and cloud-assisted smart healthcare system. IEEE Internet Things J. 9(4), 2513\u20132526 (2022)","journal-title":"IEEE Internet Things J."},{"key":"15_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jpdc.2019.08.014","volume":"135","author":"S Belguith","year":"2020","unstructured":"Belguith, S., Kaaniche, N., Laurent, M., Jemai, A., Attia, R.: Accountable privacy preserving attribute based framework for authenticated encrypted access in clouds. J. Parallel Distrib. Comput. 135, 1\u201320 (2020)","journal-title":"J. Parallel Distrib. Comput."},{"key":"15_CR5","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1109\/TIFS.2022.3220030","volume":"18","author":"X Zhou","year":"2023","unstructured":"Zhou, X., He, D., Ning, J., Luo, M., Huang, X.: AADEC: anonymous and auditable distributed access control for edge computing services. IEEE Trans. Inf. Forensic Secur. 18, 290\u2013303 (2023)","journal-title":"IEEE Trans. Inf. Forensic Secur."},{"issue":"6","key":"15_CR6","doi-asserted-by":"publisher","first-page":"5461","DOI":"10.1109\/JIOT.2022.3222453","volume":"10","author":"T Wu","year":"2023","unstructured":"Wu, T., et al.: Blockchain-based anonymous data sharing with accountability for internet of things. IEEE Internet Things J. 10(6), 5461\u20135475 (2023)","journal-title":"IEEE Internet Things J."},{"issue":"10","key":"15_CR7","doi-asserted-by":"publisher","first-page":"8632","DOI":"10.1109\/JIOT.2020.3047640","volume":"8","author":"W Yang","year":"2021","unstructured":"Yang, W., Guan, Z., Wu, L., Du, X., Guizani, M.: Secure data access control with fair accountability in smart grid data sharing: an edge blockchain approach. IEEE Internet Things J. 8(10), 8632\u20138643 (2021)","journal-title":"IEEE Internet Things J."},{"key":"15_CR8","first-page":"1818","volume":"20","author":"C Lin","year":"2022","unstructured":"Lin, C., Huang, X., He, D.: EBCPA: efficient blockchain-based conditional privacy-preserving authentication for VANETs. IEEE Trans. Dependable Secur. Comput. 20, 1818\u20131832 (2022)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"issue":"4","key":"15_CR9","doi-asserted-by":"publisher","first-page":"912","DOI":"10.1109\/TIFS.2017.2774439","volume":"13","author":"J Shen","year":"2018","unstructured":"Shen, J., Zhou, T., Chen, X., Li, J., Susilo, W.: Anonymous and traceable group data sharing in cloud computing. IEEE Trans. Inf. Forensic Secur. 13(4), 912\u2013925 (2018)","journal-title":"IEEE Trans. Inf. Forensic Secur."},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"Wang, Y., et al.: A cloud-based IoMT data sharing scheme with conditional anonymous source authentication. In: GLOBECOM 2022 - 2022 IEEE Global Communications Conference, pp. 2915\u20132920","DOI":"10.1109\/GLOBECOM48099.2022.10000912"},{"key":"15_CR11","volume":"74","author":"Y Chang","year":"2023","unstructured":"Chang, Y., Li, J.L., Li, W.J.: 2D2PS: a demand-driven privacy-preserving scheme for anonymous data sharing in smart grids. J. Inf. Secur. Appl. 74, 103466 (2023)","journal-title":"J. Inf. Secur. Appl."},{"key":"15_CR12","doi-asserted-by":"crossref","unstructured":"Kouicem, D.E., Bouabdallah, A., Lakhlef, H.: An efficient and anonymous blockchain-based data sharing scheme for vehicular networks. In: 2020 IEEE Symposium on Computers and Communications (ISCC), pp.\u00a01\u20136","DOI":"10.1109\/ISCC50000.2020.9219641"},{"issue":"2","key":"15_CR13","doi-asserted-by":"publisher","first-page":"1416","DOI":"10.1109\/TII.2020.2982942","volume":"17","author":"C Huang","year":"2021","unstructured":"Huang, C., Liu, D., Ni, J., Lu, R., Shen, X.: Achieving accountable and efficient data sharing in industrial internet of things. IEEE Trans. Ind. Inform. 17(2), 1416\u20131427 (2021)","journal-title":"IEEE Trans. Ind. Inform."},{"key":"15_CR14","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1016\/j.jnca.2018.03.006","volume":"112","author":"J Li","year":"2018","unstructured":"Li, J., Chen, X., Chow, S.S.M., Huang, Q., Wong, D.S., Liu, Z.: Multi-authority fine-grained access control with accountability and its application in cloud. J. Netw. Comput. Appl. 112, 89\u201396 (2018)","journal-title":"J. Netw. Comput. Appl."},{"key":"15_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2022.102436","volume":"124","author":"Q Li","year":"2022","unstructured":"Li, Q., Yang, Z., Qin, X., Tao, D., Pan, H., Huang, Y.: CBFF: a cloud-blockchain fusion framework ensuring data accountability for multi-cloud environments. J. Syst. Architect. 124, 102436 (2022)","journal-title":"J. Syst. Architect."},{"issue":"2","key":"15_CR16","doi-asserted-by":"publisher","first-page":"762","DOI":"10.1109\/TCC.2020.2975184","volume":"10","author":"J Li","year":"2022","unstructured":"Li, J., Zhang, Y., Ning, J., Huang, X., Poh, G., Wang, D.: Attribute based encryption with privacy protection and accountability for CloudIoT. IEEE Trans. Cloud Comput. 10(2), 762\u2013773 (2022)","journal-title":"IEEE Trans. Cloud Comput."},{"issue":"6","key":"15_CR17","doi-asserted-by":"publisher","first-page":"1274","DOI":"10.1109\/TIFS.2015.2405905","volume":"10","author":"JT Ning","year":"2015","unstructured":"Ning, J.T., Dong, X.L., Cao, Z.F., Wei, L.F., Lin, X.D.: White-box traceable ciphertext-policy attribute-based encryption supporting flexible attributes. IEEE Trans. Inf. Forensic Secur. 10(6), 1274\u20131288 (2015)","journal-title":"IEEE Trans. Inf. Forensic Secur."}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-1542-1_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,14]],"date-time":"2025-02-14T17:17:51Z","timestamp":1739553471000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-1542-1_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819615414","9789819615421"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-1542-1_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"15 February 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICA3PP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Algorithms and Architectures for Parallel Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Macau","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ica3pp2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ica3pp2024.scimeeting.cn\/en\/web\/index\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}