{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T22:14:06Z","timestamp":1771539246031,"version":"3.50.1"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2020,4,6]],"date-time":"2020-04-06T00:00:00Z","timestamp":1586131200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,4,6]],"date-time":"2020-04-06T00:00:00Z","timestamp":1586131200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572263"],"award-info":[{"award-number":["61572263"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61272084"],"award-info":[{"award-number":["61272084"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61972209"],"award-info":[{"award-number":["61972209"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100010023","name":"Natural Science Research of Jiangsu Higher Education Institutions of China","doi-asserted-by":"publisher","award":["11KJA520002"],"award-info":[{"award-number":["11KJA520002"]}],"id":[{"id":"10.13039\/501100010023","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2021,3]]},"DOI":"10.1007\/s10586-020-03101-6","type":"journal-article","created":{"date-parts":[[2020,4,6]],"date-time":"2020-04-06T21:02:31Z","timestamp":1586206951000},"page":"225-247","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["A secure, efficient and verifiable multimedia data sharing scheme in fog networking system"],"prefix":"10.1007","volume":"24","author":[{"given":"Yuanfei","family":"Tu","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Geng","family":"Yang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jing","family":"Wang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Qingjian","family":"Su","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2020,4,6]]},"reference":[{"issue":"2","key":"3101_CR1","first-page":"487","volume":"4","author":"W Wang","year":"2017","unstructured":"Wang, W., Wang, Q., Sohraby, K.: Multimedia Sensing as a Service (MSaaS): exploring resource saving potentials of at cloud-edge IoT and fogs. IEEE Int. Things J. 4(2), 487\u2013495 (2017)","journal-title":"IEEE Int. Things J."},{"issue":"5","key":"3101_CR2","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/MCOM.2018.1700907","volume":"56","author":"M Rahman","year":"2018","unstructured":"Rahman, M., Hossain, M., Hassanain, E., Muhammad, G.: Semantic multimedia fog computing and IoT environment: sustainability perspective. IEEE Commun. Mag. 56(5), 80\u201387 (2018)","journal-title":"IEEE Commun. Mag."},{"issue":"1","key":"3101_CR3","doi-asserted-by":"publisher","first-page":"601","DOI":"10.1109\/COMST.2017.2762345","volume":"20","author":"J Ni","year":"2018","unstructured":"Ni, J., Zhang, K., Lin, X., Shen, X.: Securing fog computing for internet of things applications: challenges and solutions. IEEE Commun. Surv. Tutorials 20(1), 601\u2013628 (2018)","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"1","key":"3101_CR4","first-page":"16","volume":"88","author":"P Zhang","year":"2018","unstructured":"Zhang, P., Zhou, M., Fortino, G.: Security and trust issues in Fog computing: A survey. Future Generation Computer Systems 88(1), 16\u201327 (2018)","journal-title":"Future Generation Computer Systems"},{"key":"3101_CR5","doi-asserted-by":"publisher","first-page":"146322","DOI":"10.1109\/ACCESS.2019.2946202","volume":"7","author":"A Hassan","year":"2019","unstructured":"Hassan, A., Hamza, R., Yan, H., Li, P.: An efficient outsourced privacy preserving machine learning scheme with public verifiability. IEEE Access 7, 146322\u2013146330 (2019)","journal-title":"IEEE Access"},{"key":"3101_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.01.070","author":"R Hamza","year":"2019","unstructured":"Hamza, R., Yan, Z., Muhammad, K., Bellavista, P., Titouna, F.: A privacy-preserving cryptosystem for IoT E-healthcare. Inf. Sci. (2019). https:\/\/doi.org\/10.1016\/j.ins.2019.01.070","journal-title":"Inf. Sci."},{"key":"3101_CR7","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1007\/978-3-030-30619-9_19","volume":"2019","author":"R Hamza","year":"2019","unstructured":"Hamza, R., Hassan, A., Patil, A.S.: A lightweight secure IoT surveillance framework based on DCT-DFRT algorithms. Int. Conf. Mach. Learn. Cyber Secur. 2019, 271\u2013278 (2019)","journal-title":"Int. Conf. Mach. Learn. Cyber Secur."},{"key":"3101_CR8","first-page":"305","volume":"2009","author":"B Malek","year":"2009","unstructured":"Malek, B., Miri, A.: Combining attribute-based and access systems. Proc. Comput. Sci. Eng. 2009, 305\u2013312 (2009)","journal-title":"Proc. Comput. Sci. Eng."},{"issue":"2","key":"3101_CR9","doi-asserted-by":"publisher","first-page":"743","DOI":"10.1109\/TIFS.2011.2172209","volume":"7","author":"Z Wan","year":"2012","unstructured":"Wan, Z., Liu, J., Deng, R.: HASBE: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE Trans. Inf. Forensics Secur. 7(2), 743\u2013754 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"4","key":"3101_CR10","doi-asserted-by":"publisher","first-page":"617","DOI":"10.1109\/TCC.2015.2440247","volume":"5","author":"W Teng","year":"2017","unstructured":"Teng, W., Yang, G., Xiang, Y., Zhang, T., Wang, D.: Attribute-based access control with constant-size ciphertext in cloud computing. IEEE Trans. Cloud Comput. 5(4), 617\u2013627 (2017)","journal-title":"IEEE Trans. Cloud Comput."},{"key":"3101_CR11","doi-asserted-by":"crossref","unstructured":"Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Proceedings of the 14th International Conference on Practice and Theory in Public Key Cryptography, pp. 53\u201370 (2011)","DOI":"10.1007\/978-3-642-19379-8_4"},{"key":"3101_CR12","doi-asserted-by":"publisher","first-page":"86384","DOI":"10.1109\/ACCESS.2019.2926354","volume":"7","author":"K Riad","year":"2019","unstructured":"Riad, K., Hamza, R., Yan, H.: Sensitive and energetic IoT access control for managing cloud electronic health records. IEEE Access 7, 86384\u201386393 (2019)","journal-title":"IEEE Access"},{"key":"3101_CR13","first-page":"15","volume":"2015","author":"S Salonikias","year":"2015","unstructured":"Salonikias, S., Mavridis, I., Gritzalis, D.: Access control issues in utilizing fog computing for transport infrastructure. Proc. Crit. Inf. Infrastruct. Secur. 2015, 15\u201326 (2015)","journal-title":"Proc. Crit. Inf. Infrastruct. Secur."},{"key":"3101_CR14","doi-asserted-by":"publisher","first-page":"400","DOI":"10.1007\/978-3-319-48965-0_24","volume":"2016","author":"B Zaghdoudi","year":"2016","unstructured":"Zaghdoudi, B., Ayed, H., Harizi, W.: Generic access control system for ad hoc MCC and fog computing. Proc. Cryptol. Netw. Secur. 2016, 400\u2013415 (2016)","journal-title":"Proc. Cryptol. Netw. Secur."},{"key":"3101_CR15","first-page":"2013","volume":"2014","author":"K Yang","year":"2014","unstructured":"Yang, K., Jia, X., Ren, K., Xie, R., Huang, L.: Enabling efficient access control with dynamic policy updating for big data in the cloud. IEEE INFOCOM 2014, 2013\u20132021 (2014)","journal-title":"IEEE INFOCOM"},{"key":"3101_CR16","doi-asserted-by":"publisher","first-page":"9131","DOI":"10.1109\/ACCESS.2017.2705076","volume":"5","author":"A Alrawais","year":"2018","unstructured":"Alrawais, A., Alhothaily, A., Hu, C., Xing, X., Cheng, X.: An attribute-based encryption scheme to secure fog communications. IEEE Access 5, 9131\u20139138 (2018)","journal-title":"IEEE Access"},{"key":"3101_CR17","unstructured":"Green, M., Hohenberger, S., Waters, B.: Outsourcing the decryption of ABE ciphertexts. In: Proceedings of the 20th USENIX conference on Security, pp. 34\u201350 (2011)"},{"issue":"10","key":"3101_CR18","doi-asserted-by":"publisher","first-page":"2629","DOI":"10.1109\/TITS.2017.2653103","volume":"18","author":"Y Xia","year":"2017","unstructured":"Xia, Y., Chen, W., Liu, X., Zhang, L., Li, X., Xiang, Y.: Adaptive multimedia data forwarding for privacy preservation in vehicular ad-hoc networks. IEEE Trans. Intell. Transp. Syst. 18(10), 2629\u20132641 (2017)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"4","key":"3101_CR19","doi-asserted-by":"publisher","first-page":"766","DOI":"10.1007\/s12083-017-0562-8","volume":"11","author":"K Fan","year":"2018","unstructured":"Fan, K., Wang, J., Wang, X., Li, H., Yang, Y.: Secure, efficient and revocable data sharing scheme for vehicular fogs. Peer-to-Peer Netw. Appl. 11(4), 766\u2013777 (2018)","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"3101_CR20","doi-asserted-by":"crossref","unstructured":"Hohenberger, S., Waters, B.: Online\/offline attribute-based encryption. In: Proceedings of the 17th International Conference on Practice and Theory in Public-Key Cryptography, pp. 293\u2013310 (2014)","DOI":"10.1007\/978-3-642-54631-0_17"},{"issue":"2","key":"3101_CR21","doi-asserted-by":"publisher","first-page":"753","DOI":"10.1016\/j.future.2016.12.015","volume":"78","author":"P Zhang","year":"2018","unstructured":"Zhang, P., Liu, J., Liang, K., Liu, H.: An efficient access control scheme with outsourcing capability and attribute update for fog computing. Fut. Gener. Comput. Syst. 78(2), 753\u2013762 (2018)","journal-title":"Fut. Gener. Comput. Syst."},{"key":"3101_CR22","doi-asserted-by":"publisher","first-page":"12941","DOI":"10.1109\/ACCESS.2017.2727054","volume":"5","author":"Q Huang","year":"2017","unstructured":"Huang, Q., Yang, Y., Wang, L.: Secure data access control with ciphertext update and computation outsourcing in fog computing for Internet of Things. IEEE Access 5, 12941\u201312950 (2017)","journal-title":"IEEE Access"},{"key":"3101_CR23","doi-asserted-by":"publisher","first-page":"1695","DOI":"10.3390\/s17071695","volume":"17","author":"K Fan","year":"2017","unstructured":"Fan, K., Wang, J., Wang, X.: A secure and verifiable outsourced access control scheme in fog-cloud computing. Sensors 17, 1695 (2017)","journal-title":"Sensors"},{"key":"3101_CR24","first-page":"345","volume":"2019","author":"Z Cheng","year":"2019","unstructured":"Cheng, Z., Zhang, J., Qian, H., Xiang, M., Wu, D.: A privacy-preserving access control scheme with verifiable and outsourcing capabilities in fog-cloud computing. Proc. Intl. Conf. Algorithms Arch Parallel Process. 2019, 345\u2013358 (2019)","journal-title":"Proc. Intl. Conf. Algorithms Arch Parallel Process."},{"issue":"3","key":"3101_CR25","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1109\/MNET.2018.1700341","volume":"32","author":"K Xue","year":"2018","unstructured":"Xue, K., Hong, J., Ma, Y., Wei, D., Hong, P., Yu, N.: Fog-aided verifiable privacy preserving access control for latency-sensitive data sharing in vehicular cloud computing. IEEE Netw. 32(3), 7\u201313 (2018)","journal-title":"IEEE Netw."},{"key":"3101_CR26","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1016\/j.jpdc.2019.09.008","volume":"135","author":"K Fan","year":"2020","unstructured":"Fan, K., Liu, T., Zhang, K.: A secure and efficient outsourced computation on data sharing scheme for privacy computing. J. Parallel Distrib. Comput. 135, 169\u2013176 (2020)","journal-title":"J. Parallel Distrib. Comput."},{"issue":"5","key":"3101_CR27","doi-asserted-by":"publisher","first-page":"799","DOI":"10.3233\/JCS-2009-0383","volume":"18","author":"M Pirretti","year":"2010","unstructured":"Pirretti, M., Traynor, P., Mcdaniel, P., Waters, B.: Secure attribute-based systems. J. Comput. Secur. 18(5), 799\u2013837 (2010)","journal-title":"J. Comput. Secur."},{"key":"3101_CR28","doi-asserted-by":"crossref","unstructured":"Yu, S., Wang, C., Ren, K., Lou, W. Attribute based data sharing with attribute revocation. In: Proceedings of the 5th ACM Symposium on Information, pp. 261\u2013270 (2010)","DOI":"10.1145\/1755688.1755720"},{"key":"3101_CR29","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1007\/978-3-030-00009-7_38","volume":"2018","author":"H Wang","year":"2018","unstructured":"Wang, H., Peng, Y.: A CP-ABE access control scheme based on proxy re-encryption in cloud storage. Proc. Cloud Comput. Secur. 2018, 413\u2013425 (2018)","journal-title":"Proc. Cloud Comput. Secur."},{"issue":"8","key":"3101_CR30","first-page":"1","volume":"5","author":"T Naruse","year":"2015","unstructured":"Naruse, T., Mohri, M., Shiraishi, Y.: Provably secure attribute-based encryption with attribute revocation and grant function using proxy re-encryption and attribute key for updating. Human-Centric Comput. Inf. Sci. 5(8), 1\u201313 (2015)","journal-title":"Human-Centric Comput. Inf. Sci."},{"key":"3101_CR31","unstructured":"Cao, Z., Tarasov, V., Raman, H.P., Hildebrand, D., Zadok, E.: On the performance variation in modern storage stacks. In: Proceedings of the 15th Usenix Conference on File and Storage Technologies, pp. 329\u2013343 (2017)"},{"key":"3101_CR32","doi-asserted-by":"crossref","unstructured":"Hiremath, S., Kunte, S. A novel data auditing approach to achieve data privacy and data integrity in cloud computing. In: Proceedings of the 2017 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques, pp. 306\u2013310 (2017)","DOI":"10.1109\/ICEECCOT.2017.8284517"},{"key":"3101_CR33","unstructured":"The pairing-based cryptography library. https:\/\/crypto.stanford.edu\/pbc\/. Accessed 13 March 2018"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-020-03101-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10586-020-03101-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-020-03101-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,5]],"date-time":"2021-04-05T23:49:27Z","timestamp":1617666567000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10586-020-03101-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,6]]},"references-count":33,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,3]]}},"alternative-id":["3101"],"URL":"https:\/\/doi.org\/10.1007\/s10586-020-03101-6","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,4,6]]},"assertion":[{"value":"29 May 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 February 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 March 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 April 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that there is no conflict of interest regarding the publication of this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}