{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T07:40:05Z","timestamp":1750318805576,"version":"3.41.0"},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2025,4,20]],"date-time":"2025-04-20T00:00:00Z","timestamp":1745107200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,4,20]],"date-time":"2025-04-20T00:00:00Z","timestamp":1745107200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Innovations Syst Softw Eng"],"published-print":{"date-parts":[[2025,6]]},"DOI":"10.1007\/s11334-025-00608-2","type":"journal-article","created":{"date-parts":[[2025,4,20]],"date-time":"2025-04-20T03:42:11Z","timestamp":1745120531000},"page":"355-379","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Lightweight blockchain-based access control with efficient revocation for fog-enabled IoT"],"prefix":"10.1007","volume":"21","author":[{"given":"Fatma","family":"Ellouze","sequence":"first","affiliation":[]},{"given":"Ghofrane","family":"Fersi","sequence":"additional","affiliation":[]},{"given":"Mohamed","family":"Jmaiel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,20]]},"reference":[{"issue":"11","key":"608_CR1","doi-asserted-by":"publisher","first-page":"19046","DOI":"10.1109\/JIOT.2024.3360289","volume":"11","author":"M Adil","year":"2024","unstructured":"Adil M, Khan MK, Kumar N, Attique M, Farouk A, Guizani M, Jin Z (2024) Healthcare internet of things: security threats, challenges and future research directions. IEEE Internet Things Journal 11(11):19046\u201319069. https:\/\/doi.org\/10.1109\/JIOT.2024.3360289","journal-title":"IEEE Internet Things Journal"},{"issue":"1","key":"608_CR2","doi-asserted-by":"publisher","first-page":"1304","DOI":"10.30574\/ijsra.2024.11.1.0217","volume":"11","author":"OO Amoo","year":"2024","unstructured":"Amoo OO, Osasona F, Atadoga A, Ayinla BS, Farayola OA, Abrahams TO et al (2024) Cybersecurity threats in the age of iot: a review of protective measures. Int J Sci Res Arch 11(1):1304\u20131310","journal-title":"Int J Sci Res Arch"},{"key":"608_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103472","volume":"135","author":"R Trabelsi","year":"2023","unstructured":"Trabelsi R, Fersi G, Jmaiel M (2023) Access control in internet of things: a survey. Comput Secur 135:103472. https:\/\/doi.org\/10.1016\/j.cose.2023.103472","journal-title":"Comput Secur"},{"key":"608_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2023.100759","volume":"22","author":"F Thabit","year":"2023","unstructured":"Thabit F, Can O, Aljahdali AO, Al-Gaphari GH, Alkhzaimi HA (2023) Cryptography algorithms for enhancing iot security. Internet Things 22:100759. https:\/\/doi.org\/10.1016\/j.iot.2023.100759","journal-title":"Internet Things"},{"key":"608_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2023.108666","volume":"108","author":"S Deng","year":"2023","unstructured":"Deng S, Hu Q, Wu D, He Y (2023) Bctc-ksm: a blockchain-assisted threshold cryptography for key security management in power iot data sharing. Comput Electr Eng 108:108666. https:\/\/doi.org\/10.1016\/j.compeleceng.2023.108666","journal-title":"Comput Electr Eng"},{"issue":"5","key":"608_CR6","doi-asserted-by":"publisher","first-page":"2415","DOI":"10.1007\/s12083-023-01529-2","volume":"16","author":"J-T Lou","year":"2023","unstructured":"Lou J-T, Bhat SA, Huang N-F (2023) Blockchain-based privacy-preserving data-sharing framework using proxy re-encryption scheme and interplanetary file system. Peer-to-Peer Netw Appl 16(5):2415\u20132437","journal-title":"Peer-to-Peer Netw Appl"},{"key":"608_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2023.100827","volume":"23","author":"A Pe\u00f1uelas-Angulo","year":"2023","unstructured":"Pe\u00f1uelas-Angulo A, Feregrino-Uribe C, Morales-Sandoval M (2023) Revocation in attribute-based encryption for fog-enabled internet of things: a systematic survey. Internet Things 23:100827","journal-title":"Internet Things"},{"issue":"11","key":"608_CR8","doi-asserted-by":"publisher","first-page":"8269","DOI":"10.1109\/JIOT.2022.3154039","volume":"9","author":"M Rasori","year":"2022","unstructured":"Rasori M, La Manna M, Perazzo P, Dini G (2022) A survey on attribute-based encryption schemes suitable for the internet of things. IEEE Internet Things J 9(11):8269\u20138290","journal-title":"IEEE Internet Things J"},{"issue":"5","key":"608_CR9","doi-asserted-by":"publisher","first-page":"2041","DOI":"10.1109\/JBHI.2021.3100871","volume":"26","author":"Y Bao","year":"2021","unstructured":"Bao Y, Qiu W, Tang P, Cheng X (2021) Efficient, revocable, and privacy-preserving fine-grained data sharing with keyword search for the cloud-assisted medical iot system. IEEE J Biomed Health Inform 26(5):2041\u20132051","journal-title":"IEEE J Biomed Health Inform"},{"key":"608_CR10","doi-asserted-by":"crossref","unstructured":"Amara M, Siad A (2011) Elliptic curve cryptography and its applications. In: International workshop on systems, signal processing and their applications, WOSSPA. IEEE, pp 247\u2013250","DOI":"10.1109\/WOSSPA.2011.5931464"},{"key":"608_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2022.100530","volume":"47","author":"S Ullah","year":"2023","unstructured":"Ullah S, Zheng J, Din N, Hussain MT, Ullah F, Yousaf M (2023) Elliptic curve cryptography; applications, challenges, recent advances, and future trends: a comprehensive survey. Comput Sci Rev 47:100530","journal-title":"Comput Sci Rev"},{"issue":"5","key":"608_CR12","doi-asserted-by":"publisher","first-page":"2686","DOI":"10.3390\/s23052686","volume":"23","author":"A Tidrea","year":"2023","unstructured":"Tidrea A, Korodi A, Silea I (2023) Elliptic curve cryptography considerations for securing automation and scada systems. Sensors 23(5):2686","journal-title":"Sensors"},{"key":"608_CR13","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1090\/conm\/477\/09303","volume":"477","author":"A Menezes","year":"2009","unstructured":"Menezes A (2009) An introduction to pairing-based cryptography. Recent Trends Cryptogr 477:47\u201365","journal-title":"Recent Trends Cryptogr"},{"issue":"1","key":"608_CR14","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/s10623-004-3808-4","volume":"37","author":"F Brezing","year":"2005","unstructured":"Brezing F, Weng A (2005) Elliptic curves suitable for pairing based cryptography. Des Codes Cryptogr 37(1):133\u2013141","journal-title":"Des Codes Cryptogr"},{"key":"608_CR15","unstructured":"Egorov M, Nu\u00f1ez D, Wilkison M (2018) Nucypher: a proxy re-encryption network to empower privacy in decentralized systems. NuCypher whitepaper"},{"issue":"9","key":"608_CR16","doi-asserted-by":"publisher","first-page":"4507","DOI":"10.1002\/ett.4507","volume":"33","author":"J Kaur","year":"2022","unstructured":"Kaur J, Rani R, Kalra N (2022) A blockchain-based framework for privacy preservation of electronic health records (ehrs). Trans Emerg Telecommun Technol 33(9):4507","journal-title":"Trans Emerg Telecommun Technol"},{"issue":"2","key":"608_CR17","doi-asserted-by":"publisher","first-page":"129","DOI":"10.3390\/info14020129","volume":"14","author":"SM Awan","year":"2023","unstructured":"Awan SM, Azad MA, Arshad J, Waheed U, Sharif T (2023) A blockchain-inspired attribute-based zero-trust access control model for iot. Information 14(2):129","journal-title":"Information"},{"key":"608_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2024.101080","volume":"25","author":"V Bakhtiary","year":"2024","unstructured":"Bakhtiary V, Mirabi M, Salajegheh A, Erfani SH (2024) Combo-chain: towards a hierarchical attribute-based access control system for iot with smart contract and sharding technique. Internet Things 25:101080","journal-title":"Internet Things"},{"issue":"3","key":"608_CR19","doi-asserted-by":"publisher","first-page":"1918","DOI":"10.1109\/TII.2021.3097131","volume":"18","author":"Y Tian","year":"2021","unstructured":"Tian Y, Li T, Xiong J, Bhuiyan MZA, Ma J, Peng C (2021) A blockchain-based machine learning framework for edge services in iiot. IEEE Trans Ind Inf 18(3):1918\u20131929","journal-title":"IEEE Trans Ind Inf"},{"key":"608_CR20","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1016\/j.csbj.2023.11.038","volume":"23","author":"A Hennebelle","year":"2024","unstructured":"Hennebelle A, Ismail L, Materwala H, Al Kaabi J, Ranjan P, Janardhanan R (2024) Secure and privacy-preserving automated machine learning operations into end-to-end integrated iot-edge-artificial intelligence-blockchain monitoring system for diabetes mellitus prediction. Comput Struct Biotechnol J 23:212\u2013233","journal-title":"Comput Struct Biotechnol J"},{"issue":"6","key":"608_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3640344","volume":"20","author":"Q Liu","year":"2024","unstructured":"Liu Q, Huang Y, Jin C, Zhou X, Mao Y, Catal C, Cheng L (2024) Privacy and integrity protection for iot multimodal data using machine learning and blockchain. ACM Trans Multimed Comput Commun Appl 20(6):1\u201318","journal-title":"ACM Trans Multimed Comput Commun Appl"},{"key":"608_CR22","doi-asserted-by":"crossref","unstructured":"Yen I-L, Tiwari A, Bastani F (2023) Access control in dynamic iot scenarios. In: 2023 IEEE 15th international symposium on autonomous decentralized system (ISADS). IEEE, pp 1\u20138","DOI":"10.1109\/ISADS56919.2023.10092159"},{"key":"608_CR23","doi-asserted-by":"crossref","unstructured":"Zeng X, Peng H, Li A (2023) Effective and stable role-based multi-agent collaboration by structural information principles. In: Proceedings of the AAAI conference on artificial intelligence, vol 37, pp 11772\u201311780","DOI":"10.1609\/aaai.v37i10.26390"},{"key":"608_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2024.106129","volume":"174","author":"D Wang","year":"2024","unstructured":"Wang D, Zhong F, Li M, Wen M, Peng Y, Li T, Yang A (2024) Romat: role-based multi-agent transformer for generalizable heterogeneous cooperation. Neural Netw 174:106129. https:\/\/doi.org\/10.1016\/j.neunet.2024.106129","journal-title":"Neural Netw"},{"key":"608_CR25","doi-asserted-by":"crossref","unstructured":"Ghazal R, Qadeer N, Raza H, Malik AK (2024) Automated semantic role mining using intelligent role based access control in globally distributed banking environment. In: International conference on information technology-new generations. Springer, pp 51\u201355","DOI":"10.1007\/978-3-031-56599-1_7"},{"issue":"13","key":"608_CR26","doi-asserted-by":"publisher","first-page":"10446","DOI":"10.1109\/JIOT.2021.3122949","volume":"9","author":"J Zhang","year":"2021","unstructured":"Zhang J, Ma J, Yang Y, Liu X, Xiong NN (2021) Revocable and privacy-preserving decentralized data sharing framework for fog-assisted internet of things. IEEE Internet Things J 9(13):10446\u201310463","journal-title":"IEEE Internet Things J"},{"key":"608_CR27","doi-asserted-by":"crossref","unstructured":"Xiang A, Gao H, Tian Y, Wang L, Xiong J (2021) Attribute-based key management for patient-centric and trusted data access in blockchain-enabled iomt. Available at SSRN: https:\/\/ssrn.com\/abstract=4605211 or http:\/\/dx.doi.org\/10.2139\/ssrn.4605211","DOI":"10.2139\/ssrn.4605211"},{"issue":"6","key":"608_CR28","doi-asserted-by":"publisher","first-page":"4815","DOI":"10.1109\/JIOT.2022.3220980","volume":"10","author":"J Feng","year":"2022","unstructured":"Feng J, Xiong H, Chen J, Xiang Y, Yeh K-H (2022) Scalable and revocable attribute-based data sharing with short revocation list for iiot. IEEE Internet Things J 10(6):4815\u20134829","journal-title":"IEEE Internet Things J"},{"issue":"5","key":"608_CR29","doi-asserted-by":"publisher","first-page":"3437","DOI":"10.1109\/TII.2021.3109090","volume":"18","author":"Q Li","year":"2021","unstructured":"Li Q, Xia B, Huang H, Zhang Y, Zhang T (2021) Trac: traceable and revocable access control scheme for mhealth in 5g-enabled iiot. IEEE Trans Ind Inf 18(5):3437\u20133448","journal-title":"IEEE Trans Ind Inf"},{"key":"608_CR30","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1016\/j.jnca.2017.03.005","volume":"87","author":"D Nu\u00f1ez","year":"2017","unstructured":"Nu\u00f1ez D, Agudo I, Lopez J (2017) Proxy re-encryption: analysis of constructions and its application to secure access delegation. J Netw Comput Appl 87:193\u2013209","journal-title":"J Netw Comput Appl"},{"key":"608_CR31","doi-asserted-by":"publisher","first-page":"1610","DOI":"10.1007\/s12083-024-01648-4","volume":"17","author":"R Raj","year":"2024","unstructured":"Raj R, Ghosh M (2024) A blockchain based lightweight and secure access control framework for iot-enabled supply chain. Peer-to-Peer Netw Appl 17:1610\u20131630. https:\/\/doi.org\/10.1007\/s12083-024-01648-4","journal-title":"Peer-to-Peer Netw Appl"},{"issue":"3","key":"608_CR32","doi-asserted-by":"publisher","first-page":"1214","DOI":"10.1109\/TDSC.2019.2899300","volume":"18","author":"C Ge","year":"2019","unstructured":"Ge C, Liu Z, Xia J, Fang L (2019) Revocable identity-based broadcast proxy re-encryption for data sharing in clouds. IEEE Trans Depend Secure Comput 18(3):1214\u20131226","journal-title":"IEEE Trans Depend Secure Comput"},{"issue":"3","key":"608_CR33","doi-asserted-by":"publisher","first-page":"1976","DOI":"10.1109\/JIOT.2021.3091760","volume":"9","author":"W Zhang","year":"2021","unstructured":"Zhang W, Zhang H, Fang L, Liu Z, Ge C (2021) A secure revocable fine-grained access control and data sharing scheme for scada in iiot systems. IEEE Internet Things J 9(3):1976\u20131984","journal-title":"IEEE Internet Things J"},{"issue":"2","key":"608_CR34","doi-asserted-by":"publisher","first-page":"438","DOI":"10.3390\/s24020438","volume":"24","author":"S Lin","year":"2024","unstructured":"Lin S, Cui L, Ke N (2024) End-to-end encrypted message distribution system for the internet of things based on conditional proxy re-encryption. Sensors 24(2):438","journal-title":"Sensors"},{"key":"608_CR35","volume-title":"Umbral: a threshold proxy re-encryption scheme","author":"D Nunez","year":"2018","unstructured":"Nunez D (2018) Umbral: a threshold proxy re-encryption scheme. NuCypher Inc and NICS Lab, University of Malaga, Malaga"},{"issue":"2","key":"608_CR36","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1016\/j.eij.2022.02.004","volume":"23","author":"K Azbeg","year":"2022","unstructured":"Azbeg K, Ouchetto O, Jai Andaloussi S (2022) Blockmedcare: a healthcare system based on iot, blockchain and ipfs for data management security. Egypt Inform J 23(2):329\u2013343. https:\/\/doi.org\/10.1016\/j.eij.2022.02.004","journal-title":"Egypt Inform J"},{"issue":"13","key":"608_CR37","doi-asserted-by":"publisher","first-page":"14117","DOI":"10.1007\/s11227-023-05221-3","volume":"79","author":"Raghav","year":"2023","unstructured":"Raghav, Andola N, Verma K, Venkatesan S, Verma S (2023) Proactive threshold-proxy re-encryption scheme for secure data sharing on cloud. J Supercomput 79(13):14117\u201314145","journal-title":"J Supercomput"},{"issue":"19","key":"608_CR38","doi-asserted-by":"publisher","first-page":"2359","DOI":"10.3390\/electronics10192359","volume":"10","author":"Y Chen","year":"2021","unstructured":"Chen Y, Hu B, Yu H, Duan Z, Huang J (2021) A threshold proxy re-encryption scheme for secure iot data sharing based on blockchain. Electronics 10(19):2359","journal-title":"Electronics"},{"key":"608_CR39","unstructured":"IPFS: IPFS implementation in JavaScript (2023). https:\/\/github.com\/ipfs\/js-ipfs?tab=readme-ov-file"},{"key":"608_CR40","unstructured":"Ethereum: Go implementation of the Ethereum protocol (2024). https:\/\/github.com\/ethereum\/go-ethereum"},{"key":"608_CR41","doi-asserted-by":"publisher","unstructured":"Maier A, Sharp A, Vagapov Y (2017) Comparative analysis and practical implementation of the esp32 microcontroller module for the internet of things. In: 2017 Internet technologies and applications (ITA), pp 143\u2013148. https:\/\/doi.org\/10.1109\/ITECHA.2017.8101926","DOI":"10.1109\/ITECHA.2017.8101926"},{"key":"608_CR42","doi-asserted-by":"crossref","unstructured":"Ellouze F, Fersi G, Jmaiel M (2024) Lightweight web3 interface for secure iomt-blockchain integration. In: 2024 International wireless communications and mobile computing (IWCMC). IEEE, pp 1759\u20131766","DOI":"10.1109\/IWCMC61514.2024.10592337"},{"key":"608_CR43","unstructured":"Edgington B (2023) BLS12-381 for the rest of us. https:\/\/hackmd.io\/@benjaminion\/bls12-381"},{"issue":"11","key":"608_CR44","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir A (1979) How to share a secret. Commun ACM 22(11):612\u2013613","journal-title":"Commun ACM"},{"key":"608_CR45","unstructured":"Rijmen V, Daemen J (2001) Advanced encryption standard. In: Proceedings of federal information processing standards publications, national institute of standards and technology, vol 19, p 22"},{"issue":"6","key":"608_CR46","first-page":"3343","volume":"15","author":"NC Gowda","year":"2023","unstructured":"Gowda NC, Bharathi Malakreddy A (2023) Bpcpr-fc: blockchain-based privacy preservation with confidentiality using proxy reencryption and ring signature in fog computing environments. Int J Inf Technol 15(6):3343\u20133357","journal-title":"Int J Inf Technol"},{"key":"608_CR47","doi-asserted-by":"publisher","unstructured":"Kaushal RK, Kumar N (2024) Exploring hyperledger caliper benchmarking tool to measure the performance of blockchain based solutions. In: 2024 11th international conference on reliability, infocom technologies and optimization (trends and future directions) (ICRITO), pp 1\u20136. https:\/\/doi.org\/10.1109\/ICRITO61523.2024.10522188","DOI":"10.1109\/ICRITO61523.2024.10522188"},{"key":"608_CR48","unstructured":"Szil\u00e1gyi P (2017) Eip-225: clique proof-of-authority consensus protocol. Ethereum Improvement Proposals, 6(225)"},{"issue":"3","key":"608_CR49","doi-asserted-by":"publisher","first-page":"3179","DOI":"10.1109\/TNSM.2024.3371521","volume":"21","author":"L Feng","year":"2024","unstructured":"Feng L, Lin J, Qiu F, Yu B, Jin Z, Wang J, Cheng J, Yao S (2024) Sdac-bbpp: a secure dynamic access control scheme with blockchain-based privacy protection privacy for iiot. IEEE Trans Netw Serv Manag 21(3):3179\u20133193. https:\/\/doi.org\/10.1109\/TNSM.2024.3371521","journal-title":"IEEE Trans Netw Serv Manag"}],"container-title":["Innovations in Systems and Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11334-025-00608-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11334-025-00608-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11334-025-00608-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T07:05:20Z","timestamp":1750316720000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11334-025-00608-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,20]]},"references-count":49,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,6]]}},"alternative-id":["608"],"URL":"https:\/\/doi.org\/10.1007\/s11334-025-00608-2","relation":{},"ISSN":["1614-5046","1614-5054"],"issn-type":[{"type":"print","value":"1614-5046"},{"type":"electronic","value":"1614-5054"}],"subject":[],"published":{"date-parts":[[2025,4,20]]},"assertion":[{"value":"15 September 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 March 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 April 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}