{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T09:01:42Z","timestamp":1768813302196,"version":"3.49.0"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2022,5,18]],"date-time":"2022-05-18T00:00:00Z","timestamp":1652832000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,5,18]],"date-time":"2022-05-18T00:00:00Z","timestamp":1652832000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772001"],"award-info":[{"award-number":["61772001"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1007\/s10586-022-03616-0","type":"journal-article","created":{"date-parts":[[2022,5,18]],"date-time":"2022-05-18T11:02:55Z","timestamp":1652871775000},"page":"3899-3913","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Attribute-based data access control scheme with secure revocation in fog computing for smart grid"],"prefix":"10.1007","volume":"25","author":[{"given":"Zhiwei","family":"Wu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4513-1306","authenticated-orcid":false,"given":"Run-hua","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Kunchang","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yifan","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,5,18]]},"reference":[{"issue":"1","key":"3616_CR1","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/s11390-019-1903-2","volume":"34","author":"F Boucenna","year":"2019","unstructured":"Boucenna, F., Nouali, O., Kechid, S., et al.: Secure inverted index based search over encrypted cloud data with user access rights management. J. Comput. Sci. Technol. 34(1), 133\u2013154 (2019)","journal-title":"J. Comput. Sci. Technol."},{"issue":"3","key":"3616_CR2","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1007\/s11390-018-1840-5","volume":"33","author":"Z Bao-Kun","year":"2018","unstructured":"Bao-Kun, Z., Lie-Huang, Z., Shen, M., et al.: Scalable and privacy-preserving data sharing based on blockchain. J. Comput. Sci. Technol. 33(3), 557\u2013567 (2018)","journal-title":"J. Comput. Sci. Technol."},{"key":"3616_CR3","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2020.3038641","author":"J Leng","year":"2020","unstructured":"Leng, J., Zhou, M., Zhao, J.L., et al.: Blockchain security: a survey of techniques and research directions. IEEE Trans. Serv. Comput. (2020). https:\/\/doi.org\/10.1109\/TSC.2020.3038641","journal-title":"IEEE Trans. Serv. Comput."},{"key":"3616_CR4","doi-asserted-by":"publisher","first-page":"110112","DOI":"10.1016\/j.rser.2020.110112","volume":"132","author":"J Leng","year":"2020","unstructured":"Leng, J., Ruan, G., Jiang, P., et al.: Blockchain-empowered sustainable manufacturing and product lifecycle management in industry 4.0: a survey. Renew. Sustain. Energy Rev. 132, 110112\u2013110119 (2020)","journal-title":"Renew. Sustain. Energy Rev."},{"issue":"1","key":"3616_CR5","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1109\/TSMC.2020.3040789","volume":"51","author":"J Leng","year":"2020","unstructured":"Leng, J., Ye, S., Zhou, M., et al.: Blockchain-secured smart manufacturing in industry 4.0: A survey. IEEE Trans. Syst. Man Cybern. 51(1), 237\u2013252 (2020)","journal-title":"IEEE Trans. Syst. Man Cybern."},{"key":"3616_CR6","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1016\/j.jclepro.2019.06.265","volume":"234","author":"J Leng","year":"2019","unstructured":"Leng, J., Jiang, P., Xu, K., et al.: Makerchain: A blockchain with chemical signature for self-organizing process in social manufacturing. J. Clean. Prod. 234, 767\u2013778 (2019)","journal-title":"J. Clean. Prod."},{"key":"3616_CR7","first-page":"457","volume-title":"Annual international conference on the theory and applications of cryptographic techniques","author":"A Sahai","year":"2005","unstructured":"Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Annual international conference on the theory and applications of cryptographic techniques, pp. 457\u2013473. Springer, Berlin (2005)"},{"key":"3616_CR8","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1109\/SP.2007.11","volume":"2007","author":"J Bethencourt","year":"2007","unstructured":"Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. IEEE symposium on security and privacy (SP\u201907) IEEE 2007, 321\u2013334 (2007)","journal-title":"IEEE symposium on security and privacy (SP'07) IEEE"},{"key":"3616_CR9","doi-asserted-by":"crossref","unstructured":"Goyal, V., Pandey, O., Sahai, A., et al.: Attribute-based encryption for fine-grained access control of encrypted data. Proceedings of the 13th ACM Conference on Computer and Communications Security. 2006, pp. 89\u201398","DOI":"10.1145\/1180405.1180418"},{"key":"3616_CR10","doi-asserted-by":"crossref","unstructured":"Chase, M., Chow, S.S.M.: Improving privacy and security in multi-authority attribute-based encryption. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, 2009, pp. 121\u2013130","DOI":"10.1145\/1653662.1653678"},{"key":"3616_CR11","unstructured":"Green, M., Hohenberger, S., Waters, B.: Outsourcing the decryption of abe ciphertexts. USENIX security symposium, 2011, 3"},{"issue":"7","key":"3616_CR12","doi-asserted-by":"publisher","first-page":"1384","DOI":"10.1109\/TIFS.2015.2410137","volume":"10","author":"B Qin","year":"2015","unstructured":"Qin, B., Deng, R.H., Liu, S., et al.: Attribute-based encryption with efficient verifiable outsourced decryption. IEEE Trans. Inf. Forensics Secur. 10(7), 1384\u20131393 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"3616_CR13","doi-asserted-by":"publisher","first-page":"484","DOI":"10.1109\/TIFS.2015.2493983","volume":"11","author":"JK Liu","year":"2015","unstructured":"Liu, J.K., Au, M.H., Huang, X., et al.: Fine-grained two-factor access control for web-based cloud computing services. IEEE Trans. Inf. Forensics Secur. 11(3), 484\u2013497 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"5","key":"3616_CR14","doi-asserted-by":"publisher","first-page":"715","DOI":"10.1109\/TSC.2016.2542813","volume":"10","author":"J Li","year":"2016","unstructured":"Li, J., Lin, X., Zhang, Y., et al.: KSF-OABE: Outsourced attribute-based encryption with keyword search function for cloud storage. IEEE Trans. Serv. Comput. 10(5), 715\u2013725 (2016)","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"3","key":"3616_CR15","doi-asserted-by":"publisher","first-page":"478","DOI":"10.1109\/TSC.2017.2710190","volume":"13","author":"J Li","year":"2017","unstructured":"Li, J., Wang, Y., Zhang, Y., et al.: Full verifiability for outsourced decryption in attribute based encryption. IEEE Trans. Serv. Comput. 13(3), 478\u2013487 (2017)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"3616_CR16","doi-asserted-by":"crossref","unstructured":"Li, J., Sha, F., Zhang, Y., et al.: Verifiable outsourced decryption of attribute-based encryption with constant ciphertext length. In: Security and Communication Networks, 2017, 2017","DOI":"10.1155\/2017\/3596205"},{"key":"3616_CR17","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1016\/j.future.2019.04.003","volume":"99","author":"K Fan","year":"2019","unstructured":"Fan, K., Xu, H., Gao, L., et al.: Efficient and privacy preserving access control scheme for fog-enabled IoT. Futur. Gener. Comput. Syst. 99, 134\u2013142 (2019)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"3616_CR18","doi-asserted-by":"publisher","first-page":"486","DOI":"10.1016\/j.future.2020.09.021","volume":"115","author":"H Zhong","year":"2021","unstructured":"Zhong, H., Zhou, Y., Zhang, Q., et al.: An efficient and outsourcing-supported attribute-based access control scheme for edge-enabled smart healthcare. Futur. Gener. Comput. Syst. 115, 486\u2013496 (2021)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"5","key":"3616_CR19","doi-asserted-by":"publisher","first-page":"974","DOI":"10.1007\/s11390-017-1776-1","volume":"32","author":"WM Li","year":"2017","unstructured":"Li, W.M., Li, X.L., Wen, Q.Y., et al.: Flexible CP-ABE based access control on encrypted data for mobile users in hybrid cloud system. J. Comput. Sci. Technol. 32(5), 974\u2013990 (2017)","journal-title":"J. Comput. Sci. Technol."},{"key":"3616_CR20","doi-asserted-by":"crossref","unstructured":"Ostrovsky, R., Sahai, A., Waters, B.: Attribute-based encryption with non-monotonic access structures. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, 2007, pp. 195\u2013203","DOI":"10.1145\/1315245.1315270"},{"key":"3616_CR21","first-page":"199","volume-title":"Annual Cryptology Conference","author":"A Sahai","year":"2012","unstructured":"Sahai, A., Seyalioglu, H., Waters, B.: Dynamic credentials and ciphertext delegation for attribute-based encryption. In: Annual Cryptology Conference, pp. 199\u2013217. Springer, Berlin (2012)"},{"key":"3616_CR22","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1016\/j.ins.2012.09.034","volume":"258","author":"Q Liu","year":"2014","unstructured":"Liu, Q., Wang, G., Wu, J.: Time-based proxy re-encryption scheme for secure data sharing in a cloud environment. Inf. Sci. 258, 355\u2013370 (2014)","journal-title":"Inf. Sci."},{"key":"3616_CR23","unstructured":"Jahid, S., Borisov, N.: Piratte: Proxy-based immediate revocation of attribute-based encryption. arXiv preprint arXiv:1208.4877, 2012"},{"issue":"10","key":"3616_CR24","doi-asserted-by":"publisher","first-page":"2271","DOI":"10.1109\/TKDE.2011.78","volume":"25","author":"J Hur","year":"2011","unstructured":"Hur, J.: Improving security and efficiency in attribute-based data sharing. IEEE Trans. Knowl. Data Eng. 25(10), 2271\u20132282 (2011)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"3616_CR25","first-page":"172","volume-title":"International Conference on Information and Communications Security","author":"G Yu","year":"2017","unstructured":"Yu, G., Ma, X., Cao, Z., et al.: Server-aided directly revocable ciphertext-policy attribute-based encryption with verifiable delegation. In: International Conference on Information and Communications Security, pp. 172\u2013179. Springer, Cham (2017)"},{"key":"3616_CR26","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1016\/j.ins.2019.03.053","volume":"490","author":"B Qin","year":"2019","unstructured":"Qin, B., Zhao, Q., Zheng, D., et al.: (Dual) server-aided revocable attribute-based encryption with decryption key exposure resistance. Inf. Sci. 490, 74\u201392 (2019)","journal-title":"Inf. Sci."},{"key":"3616_CR27","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1016\/j.future.2019.03.008","volume":"97","author":"H Xiong","year":"2019","unstructured":"Xiong, H., Zhao, Y., Peng, L., et al.: Partially policy-hidden attribute-based broadcast encryption with secure delegation in edge computing. Futur. Gener. Comput. Syst. 97, 453\u2013461 (2019)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"14","key":"3616_CR28","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.5680","volume":"32","author":"H Cui","year":"2020","unstructured":"Cui, H., Hon Yuen, T., Deng, R.H., et al.: Server-aided revocable attribute-based encryption for cloud computing services. Concurr. Comput. 32(14), e5680 (2020)","journal-title":"Concurr. Comput."},{"issue":"1","key":"3616_CR29","first-page":"111","volume":"14","author":"J Ning","year":"2018","unstructured":"Ning, J., Cao, Z., Dong, X., et al.: CryptCloud +: secure and expressive data access control for cloud storage. IEEE Trans. Serv. Comput. 14(1), 111\u2013124 (2018)","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"5","key":"3616_CR30","doi-asserted-by":"publisher","first-page":"785","DOI":"10.1109\/TSC.2016.2520932","volume":"10","author":"J Li","year":"2016","unstructured":"Li, J., Yao, W., Zhang, Y., et al.: Flexible and fine-grained attribute-based data storage in cloud computing. IEEE Trans. Serv. Comput. 10(5), 785\u2013796 (2016)","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"2","key":"3616_CR31","doi-asserted-by":"publisher","first-page":"1767","DOI":"10.1109\/JSYST.2017.2667679","volume":"12","author":"J Li","year":"2017","unstructured":"Li, J., Yao, W., Han, J., et al.: User collusion avoidance CP-ABE with efficient attribute revocation for cloud storage. IEEE Syst. J. 12(2), 1767\u20131777 (2017)","journal-title":"IEEE Syst. J."},{"issue":"1","key":"3616_CR32","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2942","volume":"30","author":"J Li","year":"2017","unstructured":"Li, J., Shi, Y., Zhang, Y.: Searchable ciphertext-policy attribute-based encryption with revocation in cloud storage. Int. J. Commun Syst 30(1), e2942 (2017)","journal-title":"Int. J. Commun Syst"},{"issue":"3","key":"3616_CR33","doi-asserted-by":"publisher","first-page":"2385","DOI":"10.1007\/s10586-016-0701-7","volume":"20","author":"H Wang","year":"2017","unstructured":"Wang, H., Zheng, Z., Wu, L., et al.: New directly revocable attribute-based encryption scheme and its application in cloud storage environment. Clust. Comput. 20(3), 2385\u20132392 (2017)","journal-title":"Clust. Comput."},{"key":"3616_CR34","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1109\/Trustcom\/BigDataSE\/ICESS.2017.259","volume":"2017","author":"R Zhang","year":"2017","unstructured":"Zhang, R., Hui, L., Yiu, S., et al.: A traceable outsourcing cp-abe scheme with attribute revocation. IEEE Trustcom\/BigDataSE\/ICESS IEEE 2017, 363\u2013370 (2017)","journal-title":"IEEE Trustcom\/BigDataSE\/ICESS IEEE"},{"issue":"7","key":"3616_CR35","doi-asserted-by":"publisher","first-page":"1214","DOI":"10.1109\/TPDS.2010.203","volume":"22","author":"J Hur","year":"2010","unstructured":"Hur, J., Noh, D.K.: Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Trans. Parallel Distrib. Syst. 22(7), 1214\u20131221 (2010)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"3616_CR36","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2020.3038836","author":"MA Islam","year":"2020","unstructured":"Islam, M.A., Madria, S.: Attribute-based encryption scheme for secure multi-group data sharing in cloud. IEEE Trans. Serv. Comput. (2020). https:\/\/doi.org\/10.1109\/TSC.2020.3038836","journal-title":"IEEE Trans. Serv. Comput."},{"key":"3616_CR37","first-page":"295","volume-title":"International Conference on the Theory and Applications of Cryptographic Techniques","author":"R Gennaro","year":"1999","unstructured":"Gennaro, R., Jarecki, S., Krawczyk, H., et al.: Secure distributed key generation for discrete-log based cryptosystems. In: International Conference on the Theory and Applications of Cryptographic Techniques, pp. 295\u2013310. Springer, Berlin (1999)"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-022-03616-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-022-03616-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-022-03616-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,27]],"date-time":"2022-10-27T14:19:47Z","timestamp":1666880387000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-022-03616-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,18]]},"references-count":37,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["3616"],"URL":"https:\/\/doi.org\/10.1007\/s10586-022-03616-0","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,5,18]]},"assertion":[{"value":"3 November 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 March 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 April 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 May 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"The conducted research did not include humans or animal participants.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Research involving human and animal participants"}}]}}