{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T14:53:46Z","timestamp":1774450426932,"version":"3.50.1"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T00:00:00Z","timestamp":1643155200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T00:00:00Z","timestamp":1643155200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2022,5]]},"DOI":"10.1007\/s11227-021-04293-3","type":"journal-article","created":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T10:02:42Z","timestamp":1643191362000},"page":"10772-10798","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":29,"title":["Auditable attribute-based data access control using blockchain in cloud storage"],"prefix":"10.1007","volume":"78","author":[{"given":"V.","family":"Ezhil Arasi","sequence":"first","affiliation":[]},{"given":"K.","family":"Indra Gandhi","sequence":"additional","affiliation":[]},{"given":"K.","family":"Kulothungan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,26]]},"reference":[{"key":"4293_CR1","doi-asserted-by":"crossref","unstructured":"Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: 2007 IEEE symposium on security and privacy (SP'07). IEEE, pp 321\u2013334","DOI":"10.1109\/SP.2007.11"},{"issue":"10","key":"4293_CR2","doi-asserted-by":"publisher","first-page":"2271","DOI":"10.1109\/TKDE.2011.78","volume":"25","author":"J Hur","year":"2011","unstructured":"Hur J (2011) Improving security and efficiency in attribute-based data sharing. IEEE Trans Knowl Data Eng 25(10):2271\u20132282","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"2","key":"4293_CR3","doi-asserted-by":"publisher","first-page":"1731","DOI":"10.1109\/JSYST.2016.2633559","volume":"12","author":"J Wei","year":"2016","unstructured":"Wei J, Liu W, Xuexian Hu (2016) Secure and efficient attribute-based access control for multiauthority cloud storage. IEEE Syst J 12(2):1731\u20131742","journal-title":"IEEE Syst J"},{"issue":"1","key":"4293_CR4","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1109\/CC.2017.7839758","volume":"14","author":"K Fan","year":"2017","unstructured":"Fan K, Tian Q, Wang J, Li H, Yang Y (2017) Privacy protection based access control scheme in cloud-based services. China Commun 14(1):61\u201371","journal-title":"China Commun"},{"key":"4293_CR5","first-page":"43","volume":"55","author":"P Pawar","year":"2016","unstructured":"Pawar P, Sheikh R (2016) Implementation of secure authentication scheme and access control in cloud computing. Proc Int Conf ICT Bus Ind Gov 55:43\u201345","journal-title":"Proc Int Conf ICT Bus Ind Gov"},{"key":"4293_CR6","doi-asserted-by":"crossref","unstructured":"Ruj S, Nayak A, Stojmenovic I (2011) DACC: distributed access control in clouds. In: Proceedings of the 10th IEEE International Conference, pp 91\u201398","DOI":"10.1109\/TrustCom.2011.15"},{"issue":"2","key":"4293_CR7","doi-asserted-by":"publisher","first-page":"743","DOI":"10.1109\/TIFS.2011.2172209","volume":"7","author":"Z Wan","year":"2011","unstructured":"Wan Z, Deng RH (2011) HASBE: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE Trans Inf Forensics Secur 7(2):743\u2013754","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"2","key":"4293_CR8","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1109\/TSC.2015.2441698","volume":"10","author":"X Wu","year":"2015","unstructured":"Wu X, Jiang R, Bhargava B (2015) On the security of data access control for multiauthority cloud storage systems. IEEE Trans Serv Comput 10(2):258\u2013272","journal-title":"IEEE Trans Serv Comput"},{"issue":"7","key":"4293_CR9","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1109\/TPDS.2013.253","volume":"25","author":"K Yang","year":"2013","unstructured":"Yang K, Jia X (2013) Expressive, efficient, and revocable data access control for multi-authority cloud storage. IEEE Trans Parallel Distrib Syst 25(7):1735\u20131744","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"4293_CR10","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1016\/j.jnca.2017.11.011","volume":"103","author":"C Yang","year":"2018","unstructured":"Yang C, Chen X, Xiang Y (2018) Blockchain-based publicly verifiable data deletion scheme for cloud storage. J Netw Comput Appl 103:185\u2013193","journal-title":"J Netw Comput Appl"},{"key":"4293_CR11","doi-asserted-by":"publisher","first-page":"850","DOI":"10.1016\/j.future.2016.12.016","volume":"78","author":"H Huang","year":"2018","unstructured":"Huang H, Chen X, Qianhong Wu, Huang X, Shen J (2018) Bitcoin-based fair payments for outsourcing computations of fog devices. Futur Gener Comput Syst 78:850\u2013858","journal-title":"Futur Gener Comput Syst"},{"issue":"4","key":"4293_CR12","doi-asserted-by":"publisher","first-page":"831","DOI":"10.1093\/comjnl\/bxt138","volume":"58","author":"A K\u00fcp\u00e7\u00fc","year":"2015","unstructured":"K\u00fcp\u00e7\u00fc A (2015) Official arbitration with secure cloud storage application. Comput J 58(4):831\u2013852","journal-title":"Comput J"},{"key":"4293_CR13","unstructured":"Buterin V (2014) Ethereum white paper. https:\/\/www.mendeley.com\/. Accessed 27, Sep 2019"},{"key":"4293_CR14","doi-asserted-by":"crossref","unstructured":"Zhang, Y, Lin X, Xu C (2018) Blockchain-based secure data provenance for cloud storage. In: International Conference on Information and Communications Security. Springer, Cham, pp 3\u201319","DOI":"10.1007\/978-3-030-01950-1_1"},{"key":"4293_CR15","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1016\/j.ins.2020.07.005","volume":"541","author":"H Yuan","year":"2020","unstructured":"Yuan H, Chen X, Wang J, Yuan J, Yan H, Susilo W (2020) Blockchain-based public auditing and secure deduplication with fair arbitration. Inf Sci 541:409\u2013425","journal-title":"Inf Sci"},{"key":"4293_CR16","doi-asserted-by":"publisher","first-page":"66792","DOI":"10.1109\/ACCESS.2019.2917555","volume":"7","author":"DC Nguyen","year":"2019","unstructured":"Nguyen DC, Pathirana PN, Ding M, Seneviratne A (2019) Blockchain for secure ehrs sharing of mobile cloud based e-health systems. IEEE Access 7:66792\u201366806","journal-title":"IEEE Access"},{"issue":"6","key":"4293_CR17","doi-asserted-by":"publisher","first-page":"1211","DOI":"10.1093\/jamia\/ocx068","volume":"24","author":"T-T Kuo","year":"2017","unstructured":"Kuo T-T, Kim H-E, Ohno-Machado L (2017) Blockchain distributed ledger technologies for biomedical and health care applications. J Am Med Inform Assoc 24(6):1211\u20131220","journal-title":"J Am Med Inform Assoc"},{"key":"4293_CR18","doi-asserted-by":"crossref","unstructured":"Mettler M (2016) Blockchain technology in healthcare: the revolution starts here. In: 2016 IEEE 18th International Conference on E-Health Networking, Applications and Services (Healthcom). IEEE, pp 1\u20133","DOI":"10.1109\/HealthCom.2016.7749510"},{"key":"4293_CR19","unstructured":"Hardjono T, Pentland A (2019) Verifiable anonymous identities and access control in permissioned blockchains."},{"key":"4293_CR20","doi-asserted-by":"crossref","unstructured":"Hu S, Hou L, Chen G, Weng J, Li J (2018) Reputation-based distributed knowledge sharing system in blockchain. In: Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, pp 476\u2013481","DOI":"10.1145\/3286978.3286981"},{"key":"4293_CR21","doi-asserted-by":"crossref","unstructured":"Rouhani S, Belchior R, Cruz RS, Deters R (2020) Distributed attribute-based access control system using a permissioned blockchain.","DOI":"10.1007\/s11280-021-00874-7"},{"issue":"7","key":"4293_CR22","doi-asserted-by":"publisher","first-page":"1214","DOI":"10.1109\/TPDS.2010.203","volume":"22","author":"J Hur","year":"2010","unstructured":"Hur J, Kun Noh D (2010) Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Trans Parallel Distrib Syst 22(7):1214\u20131221","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"4293_CR23","doi-asserted-by":"crossref","unstructured":"Korpela K, Hallikas J, Dahlberg T (2017) Digital supply chain transformation toward blockchain integration. In: Proceedings of the 50th Hawaii International Conference on System Sciences","DOI":"10.24251\/HICSS.2017.506"},{"key":"4293_CR24","doi-asserted-by":"crossref","unstructured":"Le T, Mutka MW (2018) CapChain: a privacy preserving access control framework based on blockchain for pervasive environments. In: 2018 IEEE International Conference on Smart Computing (SMARTCOMP). IEEE, pp 57\u201364","DOI":"10.1109\/SMARTCOMP.2018.00074"},{"key":"4293_CR25","doi-asserted-by":"crossref","unstructured":"Dukkipati C, Zhang Y, Cheng LC (2018) Decentralized, blockchain based access control framework for the heterogeneous internet of things. In: Proceedings of the third ACM workshop on attribute-based access control, pp. 61\u201369","DOI":"10.1145\/3180457.3180458"},{"key":"4293_CR26","doi-asserted-by":"crossref","unstructured":"Luu L, Chu D-H, Olickel H, Saxena P, Hobor A (2016) Making smart contracts smarter. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp 254\u2013269","DOI":"10.1145\/2976749.2978309"},{"issue":"6","key":"4293_CR27","doi-asserted-by":"publisher","first-page":"102382","DOI":"10.1016\/j.ipm.2020.102382","volume":"57","author":"J Li","year":"2020","unstructured":"Li J, Wu J, Jiang G, Srikanthan T (2020) Blockchain-based public auditing for big data in cloud storage. Inf Process Manag 57(6):102382","journal-title":"Inf Process Manag"},{"key":"4293_CR28","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1016\/j.cose.2019.03.016","volume":"84","author":"DD Maesa","year":"2019","unstructured":"Maesa DD, Francesco PM, Ricci L (2019) A blockchain based approach for the definition of auditable access control systems. Comput Secur 84:93\u2013119","journal-title":"Comput Secur"},{"key":"4293_CR29","first-page":"1","volume":"2021","author":"H Li","year":"2021","unstructured":"Li H, Guo F, Wang L, Wang J, Wang B, Wu C (2021) A Blockchain-based public auditing protocol with self-certified public keys for cloud data. Secur Commun Netw 2021:1\u201310","journal-title":"Secur Commun Netw"},{"key":"4293_CR30","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2021.3051622","author":"J Shu","year":"2021","unstructured":"Shu J, Zou X, Jia X, Zhang W, Xie R (2021) Blockchain-Based Decentralized Public Auditing for Cloud Storage. IEEE Trans Cloud Comput. https:\/\/doi.org\/10.1109\/TCC.2021.3051622","journal-title":"IEEE Trans Cloud Comput"},{"key":"4293_CR31","doi-asserted-by":"crossref","unstructured":"Lekshmi MM, Subramanian N (2020) Data auditing in cloud storage using smart contract. In: 2020 Third International Conference on Smart Systems and Inventive Technology (ICSSIT). IEEE, pp 999\u20131002","DOI":"10.1109\/ICSSIT48917.2020.9214112"},{"key":"4293_CR32","doi-asserted-by":"crossref","unstructured":"Wang C, Chen S, Feng Z, Jiang Y, Xue X (2019) Block chain-based data audit and access control mechanism in service collaboration. In: 2019 IEEE International Conference on Web Services (ICWS). IEEE, pp 214\u2013218","DOI":"10.1109\/ICWS.2019.00044"},{"issue":"8","key":"4293_CR33","doi-asserted-by":"publisher","first-page":"2386","DOI":"10.1109\/TC.2015.2389960","volume":"65","author":"J Li","year":"2015","unstructured":"Li J, Li J, Xie D, Cai Z (2015) Secure auditing and deduplicating data in cloud. IEEE Trans Comput 65(8):2386\u20132396","journal-title":"IEEE Trans Comput"},{"key":"4293_CR34","doi-asserted-by":"crossref","unstructured":"Jemel M, Serhrouchni A (2017) Decentralized access control mechanism with temporal dimension based on blockchain. In: 2017 IEEE 14th International Conference on e-Business Engineering (ICEBE). IEEE, pp 177\u2013182","DOI":"10.1109\/ICEBE.2017.35"},{"issue":"2","key":"4293_CR35","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1109\/JSYST.2014.2379646","volume":"11","author":"M Ali","year":"2015","unstructured":"Ali M, Dhamotharan R, Khan E, Khan SU, Vasilakos AV, Li K, Zomaya AY (2015) SeDaSC: secure data sharing in clouds. IEEE Syst J 11(2):395\u2013404","journal-title":"IEEE Syst J"},{"issue":"3","key":"4293_CR36","doi-asserted-by":"publisher","first-page":"155014772199961","DOI":"10.1177\/1550147721999616","volume":"17","author":"Y Zuo","year":"2021","unstructured":"Zuo Y, Kang Z, Jian Xu, Chen Z (2021) BCAS: a blockchain-based ciphertext-policy attribute-based encryption scheme for cloud data security sharing. Int J Distrib Sens Netw 17(3):1550147721999616","journal-title":"Int J Distrib Sens Netw"},{"issue":"4","key":"4293_CR37","doi-asserted-by":"crossref","first-page":"155014771984127","DOI":"10.1177\/1550147719841276","volume":"15","author":"G Yu","year":"2019","unstructured":"Yu G, Wang Y, Cao Z, Lin J, Wang X (2019) Traceable and undeniable ciphertext-policy attribute-based encryption for cloud storage service. Int J Distrib Sens Netw 15(4):1550147719841276","journal-title":"Int J Distrib Sens Netw"},{"key":"4293_CR38","doi-asserted-by":"crossref","unstructured":"Ma W, Ma J, Zhang Q, Xue H, Li Y, Dang X, Zhao M, Zhang J, Han C, Wu J (2020) Attribute revocable data sharing scheme based on blockchain and CP-ABE. In: Proceedings of the 4th International Conference on Computer Science and Application Engineering, pp 1\u20137","DOI":"10.1145\/3424978.3425019"},{"issue":"2","key":"4293_CR39","doi-asserted-by":"publisher","first-page":"362","DOI":"10.1109\/TC.2011.245","volume":"62","author":"C Wang","year":"2011","unstructured":"Wang C, Chow SSM, Wang Q, Ren K, Lou W (2011) Privacy-preserving public auditing for secure cloud storage. IEEE Trans Comput 62(2):362\u2013375","journal-title":"IEEE Trans Comput"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-021-04293-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-021-04293-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-021-04293-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T18:45:28Z","timestamp":1651862728000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-021-04293-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,26]]},"references-count":39,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2022,5]]}},"alternative-id":["4293"],"URL":"https:\/\/doi.org\/10.1007\/s11227-021-04293-3","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,26]]},"assertion":[{"value":"23 December 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 January 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}