{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T02:30:51Z","timestamp":1775788251438,"version":"3.50.1"},"reference-count":54,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2021,9,13]],"date-time":"2021-09-13T00:00:00Z","timestamp":1631491200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,9,13]],"date-time":"2021-09-13T00:00:00Z","timestamp":1631491200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2022,6]]},"DOI":"10.1007\/s10207-021-00565-4","type":"journal-article","created":{"date-parts":[[2021,9,13]],"date-time":"2021-09-13T20:02:32Z","timestamp":1631563352000},"page":"489-508","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":21,"title":["Accountable privacy preserving attribute-based access control for cloud services enforced using blockchain"],"prefix":"10.1007","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1475-9942","authenticated-orcid":false,"given":"Amal","family":"Ghorbel","sequence":"first","affiliation":[]},{"given":"Mahmoud","family":"Ghorbel","sequence":"additional","affiliation":[]},{"given":"Mohamed","family":"Jmaiel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,13]]},"reference":[{"key":"565_CR1","unstructured":"Index, Cisco Global Cloud: Forecast and methodology, 2016\u20132020 white paper (2018)"},{"key":"565_CR2","unstructured":"Xorlogics.: 2017. Survey: Is Cloud Security Still a Concern in 2017. http:\/\/www.xorlogics.com\/2017\/07\/16\/survey-is-cloudsecurity-still-a-concern-in-2017\/"},{"key":"565_CR3","unstructured":"2017 Internet Crime Report.: pp. 17\u201325. https:\/\/pdf.ic3.gov\/2017_IC3Report.pdf (2017)"},{"issue":"9","key":"565_CR4","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/35.312842","volume":"32","author":"RS Sandhu","year":"1994","unstructured":"Sandhu, R.S., Samarati, P.: Access control: principle and practice. IEEE Commun. Mag. 32(9), 40\u201348 (1994)","journal-title":"IEEE Commun. Mag."},{"issue":"2","key":"565_CR5","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"RS Sandhu","year":"1996","unstructured":"Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. Computer 29(2), 38\u201347 (1996)","journal-title":"Computer"},{"issue":"1","key":"565_CR6","first-page":"77","volume":"3","author":"N Meghanathan","year":"2013","unstructured":"Meghanathan, N.: Review of access control models for cloud computing. Comput. Sci. Inf. Sci. 3(1), 77\u201385 (2013)","journal-title":"Comput. Sci. Inf. Sci."},{"issue":"5","key":"565_CR7","first-page":"613","volume":"7","author":"AR Khan","year":"2012","unstructured":"Khan, A.R.: Access control in cloud computing environment. ARPN J. Eng. Appl. Sci. 7(5), 613\u2013615 (2012)","journal-title":"ARPN J. Eng. Appl. Sci."},{"key":"565_CR8","doi-asserted-by":"crossref","unstructured":"Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 457\u2013473. Springer, Berlin (2005)","DOI":"10.1007\/11426639_27"},{"key":"565_CR9","doi-asserted-by":"crossref","unstructured":"Maji, H. K., Prabhakaran, M., Rosulek, M.: Attribute-based signatures. In: Cryptographers\u2019 Track at the RSA Conference, pp. 376\u2013392. Springer, Berlin (2011)","DOI":"10.1007\/978-3-642-19074-2_24"},{"key":"565_CR10","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1016\/j.comnet.2018.01.036","volume":"133","author":"S Belguith","year":"2018","unstructured":"Belguith, S., Kaaniche, N., Laurent, M., Jemai, A., Attia, R.: Phoabe: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted iot. Comput. Netw. 133, 141\u2013156 (2018)","journal-title":"Comput. Netw."},{"key":"565_CR11","unstructured":"Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system. Decent. Bus. Rev. 21260 (2008)"},{"key":"565_CR12","doi-asserted-by":"publisher","first-page":"976","DOI":"10.1016\/j.procs.2012.06.133","volume":"10","author":"SD Bruda","year":"2012","unstructured":"Bruda, S.D., Salehi, F., Malik, Y., Abdulrazak, B.: A peer-to-peer architecture for remote service discovery. Procedia Comput. Sci. 10, 976\u2013983 (2012)","journal-title":"Procedia Comput. Sci."},{"issue":"3","key":"565_CR13","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/s12599-017-0467-3","volume":"59","author":"M Nofer","year":"2017","unstructured":"Nofer, M., Gomber, P., Hinz, O., Schiereck, D.: Blockchain. Bus. Inf. Syst. Eng. 59(3), 183\u2013187 (2017)","journal-title":"Bus. Inf. Syst. Eng."},{"key":"565_CR14","unstructured":"Thakur, M.: Authentication, authorization and accounting with Ethereum blockchain. Helsingfors universitet (2017)"},{"key":"565_CR15","doi-asserted-by":"publisher","unstructured":"Amritanand, C., Vipin, P.: A survey on blockchain based access control for IoT. In: Proceedings of International Conference on Recent Trends in Computing, Communication & Networking Technologies (ICRTCCNT) 2019, Available at SSRN: https:\/\/ssrn.com\/abstract=3431137 or https:\/\/doi.org\/10.2139\/ssrn.3431137(2019)","DOI":"10.2139\/ssrn.3431137"},{"key":"565_CR16","doi-asserted-by":"crossref","unstructured":"Stahnke, S., Shumaiev, K., Cuellar, J., Kasinathan, P.: Enforcing a cross-organizational workflow: an experience report. In: Enterprise, Business-Process and Information Systems Modeling, pp. 85\u201398. Springer, Cham (2020)","DOI":"10.1007\/978-3-030-49418-6_6"},{"key":"565_CR17","doi-asserted-by":"crossref","unstructured":"Rouhani, S., Deters, R.: Blockchain based access control systems: state of the art and challenges. In: IEEE\/WIC\/ACM International Conference on Web Intelligence, pp. 423\u2013428 (2019)","DOI":"10.1145\/3350546.3352561"},{"key":"565_CR18","unstructured":"Buterin, V.: A next-generation smart contract and decentralized application platform. White Paper (2014)"},{"key":"565_CR19","unstructured":"Istanbul BFT. https:\/\/github.com\/ethereum\/EIPs\/issues\/650. Accessed, 2018 (2018)"},{"key":"565_CR20","unstructured":"Raft-based consensus for Ethereum\/Quorum. https:\/\/github.com\/jpmorganchase\/quorum\/blob\/master\/raft\/doc.md. Accessed (2018)"},{"key":"565_CR21","unstructured":"Morgan Chase, J.P.: A permissioned implementation of Ethereum supporting data privacy. https:\/\/github.com\/jpmorganchase\/quorum\/tree\/v2.1.0. Accessed (2018)"},{"key":"565_CR22","doi-asserted-by":"crossref","unstructured":"Androulaki, E., Barger, A., Bortnikov, V., Cachin, C., Christidis, K., De Caro, A., Muralidharan, S.: Hyperledger fabric: a distributed operating system for permissioned blockchains. In: Proceedings of the Thirteenth EuroSys Conference, p. 30. ACM (2018)","DOI":"10.1145\/3190508.3190538"},{"key":"565_CR23","unstructured":"Chase, J.M.: Quorum white paper. https:\/\/github.com\/ConsenSys\/quorum\/blob\/master\/docs\/Quorum%20Whitepaper%20v0.2.pdf. Accessed 20 Feb 2019 (2018)"},{"key":"565_CR24","doi-asserted-by":"publisher","first-page":"12240","DOI":"10.1109\/ACCESS.2018.2812844","volume":"6","author":"JP Cruz","year":"2018","unstructured":"Cruz, J.P., Kaji, Y., Yanai, N.: RBAC-SC: role-based access control using smart contract. IEEE Access 6, 12240\u201312251 (2018)","journal-title":"IEEE Access"},{"key":"565_CR25","unstructured":"Kaaniche, N.: Cloud data storage security based on cryptographic mechanisms. Doctoral dissertation, Institut National des T\u00e9l\u00e9communications (2014)"},{"key":"565_CR26","unstructured":"Private Transaction Processing in Quorum. https:\/\/github.com\/jpmorganchase\/quorum\/wiki\/Transaction-Processing#private-transaction-process-flow. Accessed (2018)"},{"key":"565_CR27","doi-asserted-by":"crossref","unstructured":"Ghorbel, A., Ghorbel, M., Jmaiel, M.: PRIARMOR: An IaaS solution for low-level privacy enforcement in the cloud. In: 2017 IEEE 26th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), pp. 119\u2013124. IEEE (2017)","DOI":"10.1109\/WETICE.2017.64"},{"key":"565_CR28","unstructured":"Downloads: Go Ethereum. https:\/\/geth.ethereum.org\/downloads (2019)"},{"key":"565_CR29","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1007\/978-1-4842-2535-6","volume-title":"Introducing Ethereum and Solidity","author":"C Dannen","year":"2017","unstructured":"Dannen, C.: Introducing Ethereum and Solidity, p. 185. Apress, Berkeley (2017)"},{"key":"565_CR30","unstructured":"Truffle Suite: Sweet Tools for Smart Contracts. https:\/\/www.trufflesuite.com. (2019)"},{"key":"565_CR31","unstructured":"Baliga, A., Subhod, I., Kamat, P., Chatterjee, S.: Performance evaluation of the quorum blockchain platform. https:\/\/arxiv.org\/pdf\/1809.03421.pdf (2018)"},{"key":"565_CR32","doi-asserted-by":"crossref","unstructured":"Horvath, M.: Attribute-based encryption optimized for cloud computing. In: International Conference on Current Trends in Theory and Practice of Informatics, pp. 566\u2013577. Springer, Berlin (2015)","DOI":"10.1007\/978-3-662-46078-8_47"},{"key":"565_CR33","doi-asserted-by":"crossref","unstructured":"Belguith, S., Kaaniche, N., Jemai, A., Laurent, M., Attia, R.: Pabac: a privacy preserving attribute based framework for fine grained access control in clouds. In: SECRYPT 2016: 13th International Conference on Security and Cryptography (vol. 4, pp. 133\u2013146). SciTePress (2016)","DOI":"10.5220\/0005968201330146"},{"key":"565_CR34","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1016\/j.jnca.2018.03.006","volume":"112","author":"J Li","year":"2018","unstructured":"Li, J., Chen, X., Chow, S.S., Huang, Q., Wong, D.S., Liu, Z.: Multi-authority fine-grained access control with accountability and its application in cloud. J. Netw. Comput. Appl. 112, 89\u201396 (2018)","journal-title":"J. Netw. Comput. Appl."},{"issue":"8","key":"565_CR35","doi-asserted-by":"publisher","first-page":"1210","DOI":"10.1093\/comjnl\/bxx017","volume":"60","author":"J Zhou","year":"2017","unstructured":"Zhou, J., Duan, H., Liang, K., Yan, Q., Chen, F., Yu, F.R., Chen, J.: Securing outsourced data in the multi-authority cloud with fine-grained access control and efficient attribute revocation. Comput. J. 60(8), 1210\u20131222 (2017)","journal-title":"Comput. J."},{"key":"565_CR36","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1016\/j.future.2016.01.006","volume":"80","author":"M Qiu","year":"2018","unstructured":"Qiu, M., Gai, K., Thuraisingham, B., Tao, L., Zhao, H.: Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financial industry. Futur. Gener. Comput. Syst. 80, 421\u2013429 (2018)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"4","key":"565_CR37","doi-asserted-by":"publisher","first-page":"2914","DOI":"10.1109\/JIOT.2020.2963899","volume":"7","author":"S Xiong","year":"2020","unstructured":"Xiong, S., Ni, Q., Wang, L., Wang, Q.: SEM-ACSIT: secure and efficient multiauthority access control for IoT cloud storage. IEEE Internet Things J. 7(4), 2914\u20132927 (2020)","journal-title":"IEEE Internet Things J."},{"key":"565_CR38","unstructured":"Daniel, K.: Nameid: Your crypto-openid (2013)"},{"key":"565_CR39","unstructured":"Larcheveque, E.: Bitcoin address authentication protocol (BitID) (2016)"},{"key":"565_CR40","unstructured":"Lundkvist, C., Heck, R., Torstensson, J., Mitton, Z., Sena, M.: Uport: A platform for self-sovereign identity. https:\/\/whitepaper.uport.me\/uPort_ whitepaper_DRAFT20170221.pdf (2017)"},{"issue":"18","key":"565_CR41","doi-asserted-by":"publisher","first-page":"5943","DOI":"10.1002\/sec.1748","volume":"9","author":"A Ouaddah","year":"2016","unstructured":"Ouaddah, A., Abou Elkalam, A., Ait Ouahman, A.: FairAccess: a new Blockchain-based access control framework for the Internet of Things. Security Commun. Netw. 9(18), 5943\u20135964 (2016)","journal-title":"Security Commun. Netw."},{"key":"565_CR42","doi-asserted-by":"crossref","unstructured":"Azaria, A., Ekblaw, A., Vieira, T., Lippman, A.: Medrec: Using blockchain for medical data access and permission management. In: International Conference on Open and Big Data (OBD), pp. 25\u201330. IEEE (2016)","DOI":"10.1109\/OBD.2016.11"},{"issue":"2","key":"565_CR43","doi-asserted-by":"publisher","first-page":"44","DOI":"10.3390\/info8020044","volume":"8","author":"Q Xia","year":"2017","unstructured":"Xia, Q., Sifah, E.B., Smahi, A., Amofa, S., Zhang, X.: BBDS: Blockchain-based data sharing for electronic medical records in cloud environments. Information 8(2), 44 (2017)","journal-title":"Information"},{"key":"565_CR44","unstructured":"Hardjono, T., Pentland, A.S.: Verifiable Anonymous Identities and Access Control in Permissioned Blockchains. Accessed on 14 (2017)"},{"key":"565_CR45","doi-asserted-by":"crossref","unstructured":"Zhu, Y., Qin, Y., Gan, G., Shuai, Y., Chu, W.C.C.: TBAC: transaction-based access control on blockchain for resource sharing with cryptographically decentralized authorization. In: 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC), Vol. 1, pp. 535\u2013544. IEEE (2018)","DOI":"10.1109\/COMPSAC.2018.00083"},{"key":"565_CR46","doi-asserted-by":"crossref","unstructured":"Alansari, S., Paci, F., Sassone, V.: A distributed access control system for cloud federations. In: 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), pp. 2131\u20132136. IEEE (2017)","DOI":"10.1109\/ICDCS.2017.241"},{"key":"565_CR47","doi-asserted-by":"crossref","unstructured":"Alansari, S., Paci, F., Margheri, A., Sassone, V.: Privacy-preserving access control in cloud federations. In: 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), pp. 757\u2013760. IEEE (2017)","DOI":"10.1109\/CLOUD.2017.108"},{"key":"565_CR48","doi-asserted-by":"crossref","unstructured":"Sohrabi, N., Yi, X., Tari, Z., Khalil, I.: BACC: Blockchain-based access control for cloud data. In: Proceedings of the Australasian Computer Science Week Multiconference, pp. 1\u201310 (2020)","DOI":"10.1145\/3373017.3373027"},{"key":"565_CR49","doi-asserted-by":"publisher","first-page":"101854","DOI":"10.1016\/j.sysarc.2020.101854","volume":"112","author":"X Qin","year":"2021","unstructured":"Qin, X., Huang, Y., Yang, Z., Li, X.: A Blockchain-based access control scheme with multiple attribute authorities for secure cloud data sharing. J. Syst. Archit. 112, 101854 (2021)","journal-title":"J. Syst. Archit."},{"key":"565_CR50","doi-asserted-by":"crossref","unstructured":"Maesa, D.D.F., Mori, P., Ricci, L.: Blockchain based access control. In: IFIP International Conference on Distributed Applications and Interoperable Systems, pp. 206\u2013220. Springer, Cham (2017)","DOI":"10.1007\/978-3-319-59665-5_15"},{"key":"565_CR51","doi-asserted-by":"crossref","unstructured":"Dorri, A., Kanhere, S.S., Jurdak, R., Gauravaram, P.: Blockchain for IoT security and privacy: The case study of a smart home. In: 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), pp. 618\u2013623. IEEE (2017)","DOI":"10.1109\/PERCOMW.2017.7917634"},{"key":"565_CR52","doi-asserted-by":"crossref","unstructured":"Zyskind, G., Nathan, O.: Decentralizing privacy: using blockchain to protect personal data. In: Security and privacy workshops (SPW), 2015 IEEE, pp. 180\u2013184. IEEE (2015)","DOI":"10.1109\/SPW.2015.27"},{"key":"565_CR53","doi-asserted-by":"crossref","unstructured":"Le, T., Mutka, M.W.: CapChain: A privacy preserving access control framework based on blockchain for pervasive environments. In: 2018 IEEE International Conference on Smart Computing (SMARTCOMP), pp. 57\u201364. IEEE (2018)","DOI":"10.1109\/SMARTCOMP.2018.00074"},{"key":"565_CR54","doi-asserted-by":"publisher","first-page":"70604","DOI":"10.1109\/ACCESS.2020.2985762","volume":"8","author":"C Yang","year":"2020","unstructured":"Yang, C., Tan, L., Shi, N., Xu, B., Cao, Y., Yu, K.: AuthPrivacyChain: a blockchain-based access control framework with privacy protection in cloud. IEEE Access 8, 70604\u201370615 (2020)","journal-title":"IEEE Access"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-021-00565-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-021-00565-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-021-00565-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,27]],"date-time":"2022-05-27T11:10:43Z","timestamp":1653649843000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-021-00565-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,13]]},"references-count":54,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,6]]}},"alternative-id":["565"],"URL":"https:\/\/doi.org\/10.1007\/s10207-021-00565-4","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,9,13]]},"assertion":[{"value":"13 September 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"All authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}