{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T17:09:14Z","timestamp":1758820154690},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2021,4,29]],"date-time":"2021-04-29T00:00:00Z","timestamp":1619654400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,4,29]],"date-time":"2021-04-29T00:00:00Z","timestamp":1619654400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Front. Comput. Sci."],"published-print":{"date-parts":[[2021,10]]},"DOI":"10.1007\/s11704-020-9472-7","type":"journal-article","created":{"date-parts":[[2021,4,29]],"date-time":"2021-04-29T17:02:26Z","timestamp":1619715746000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["ABDKS: attribute-based encryption with dynamic keyword search in fog computing"],"prefix":"10.1007","volume":"15","author":[{"given":"Fei","family":"Meng","sequence":"first","affiliation":[]},{"given":"Leixiao","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Mingqiang","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,4,29]]},"reference":[{"key":"9472_CR1","doi-asserted-by":"crossref","unstructured":"Bonomi F, Milito R A, Zhu J, Addepalli S. Fog computing and its role in the internet of things. In: Proceedings of the 1st Edition of the MCC Workshop on Mobile Cloud Computing. 2012, 13\u201316","DOI":"10.1145\/2342509.2342513"},{"key":"9472_CR2","unstructured":"Ivan S, Wen S. The fog computing paradigm: scenarios and security issues. In: Proceedings of Federated Conference on Computer Science and Information Systems. 2014, 1\u20138"},{"key":"9472_CR3","doi-asserted-by":"crossref","unstructured":"Yi S, Li C, Li Q. A survey of fog computing: concepts, applications and issues. In: Proceedings of Workshop on Mobile Big Data. 2015, 37\u201342","DOI":"10.1145\/2757384.2757397"},{"issue":"10","key":"9472_CR4","doi-asserted-by":"publisher","first-page":"2991","DOI":"10.1002\/cpe.3485","volume":"28","author":"I Stojmenovic","year":"2016","unstructured":"Stojmenovic I, Wen S, Huang X, Luan H. An overview of fog computing and its security issues. Concurrency and Computation: Practice and Experience, 2016, 28(10): 2991\u20133005","journal-title":"Concurrency and Computation: Practice and Experience"},{"key":"9472_CR5","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1007\/11426639_27","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 2005, Annual International Conference on the Theory and Applications of Cryptographic Techniques","author":"A Sahai","year":"2005","unstructured":"Sahai A, Waters B. Fuzzy identity-based encryption. In: Cramer R, eds. Advances in Cryptology \u2014 EUROCRYPT 2005, Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, Berlin, Heidelberg, 2005, 457\u2013473"},{"key":"9472_CR6","doi-asserted-by":"crossref","unstructured":"Zheng Q, Xu S, Ateniese G. VABKS: verifiable attribute-based keyword search over outsourced encrypted data. In: Proceedings of IEEE Conference on Computer Communications. 2014, 522\u2013530","DOI":"10.1109\/INFOCOM.2014.6847976"},{"issue":"4","key":"9472_CR7","doi-asserted-by":"publisher","first-page":"1187","DOI":"10.1109\/TPDS.2014.2355202","volume":"27","author":"W Sun","year":"2016","unstructured":"Sun W, Yu S, Lou W, Hou Y T, Li H. Protecting your right: verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. IEEE Transactions on Parallel and Distributed Systems, 2016, 27(4): 1187\u20131198","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"9472_CR8","unstructured":"Green M, Hohenberger S, Waters B. Outsourcing the decryption of ABE ciphertexts. In: Proceedings of USENIX Security Symposium. 2011"},{"issue":"6","key":"9472_CR9","doi-asserted-by":"publisher","first-page":"1423","DOI":"10.3390\/s17061423","volume":"17","author":"M Xiao","year":"2017","unstructured":"Xiao M, Zhou J, Liu X, Jiang M. A hybrid scheme for fine-grained search and access authorization in fog computing environment. Sensors, 2017, 17(6): 1423","journal-title":"Sensors"},{"issue":"5","key":"9472_CR10","doi-asserted-by":"publisher","first-page":"772","DOI":"10.1109\/TSC.2018.2823309","volume":"12","author":"Y Miao","year":"2019","unstructured":"Miao Y, Ma J, Liu X, Weng J, Li H, Li H. Lightweight fine-grained search over encrypted data in fog computing. IEEE Transactions on Services Computing, 2019, 12(5): 772\u2013785","journal-title":"IEEE Transactions on Services Computing"},{"issue":"1","key":"9472_CR11","doi-asserted-by":"publisher","first-page":"e2942","DOI":"10.1002\/dac.2942","volume":"30","author":"J Li","year":"2017","unstructured":"Li J, Shi Y, Zhang Y. Searchable ciphertext-policy attribute-based encryption with revocation in cloud storage. International Journal of Communication Systems, 2017, 30(1): e2942","journal-title":"International Journal of Communication Systems"},{"key":"9472_CR12","doi-asserted-by":"crossref","unstructured":"Goyal V, Pandey O, Sahai A, Waters B. Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of ACM Conference on Computer and Communications Security. 2006, 89\u201398","DOI":"10.1145\/1180405.1180418"},{"key":"9472_CR13","doi-asserted-by":"crossref","unstructured":"Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based encryption. In: Proceedings of IEEE Symposium on Security and Privacy. 2007, 321\u2013334","DOI":"10.1109\/SP.2007.11"},{"key":"9472_CR14","doi-asserted-by":"crossref","unstructured":"Cheung L, Newport C C. Provably secure ciphertext policy ABE. In: Proceedings of ACM Conference on Computer and Communications Security. 2007, 456\u2013465","DOI":"10.1145\/1315245.1315302"},{"key":"9472_CR15","doi-asserted-by":"publisher","first-page":"566","DOI":"10.1007\/978-3-662-46078-8_47","volume-title":"SOFSEM 2015: Theory and Practice of Computer Science","author":"M Horv\u00e1th","year":"2015","unstructured":"Horv\u00e1th M. Attribute-based encryption optimized for cloud computing. In: Margaria-Steffen T, Pokorn\u00fd J, Quisquater J J, Wattenhofer R, eds. SOFSEM 2015: Theory and Practice of Computer Science. Springer, Berlin, Heidelberg, 2015, 566\u2013577"},{"issue":"6","key":"9472_CR16","doi-asserted-by":"publisher","first-page":"1265","DOI":"10.1109\/TIFS.2016.2523941","volume":"11","author":"S Wang","year":"2016","unstructured":"Wang S, Zhou J, Liu J K, Yu J, Chen J, Xie W. An efficient file hierarchy attribute-based encryption scheme in cloud computing. IEEE Transactions on Information Forensics and Security, 2016, 11(6): 1265\u20131277","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"9472_CR17","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/j.ins.2019.01.052","volume":"484","author":"J Li","year":"2019","unstructured":"Li J, Yu Q, Zhang Y. Hierarchical attribute based encryption with continuous leakage-resilience. Information Sciences, 2019, 484: 113\u2013134","journal-title":"Information Sciences"},{"key":"9472_CR18","doi-asserted-by":"crossref","unstructured":"Cheng L, Meng F, Meng X, Zhang Q. Akc-based revocable ABE schemes from LWE assumption. Security and Communication Networks, 2020","DOI":"10.1155\/2020\/8834872"},{"issue":"8","key":"9472_CR19","doi-asserted-by":"publisher","first-page":"2201","DOI":"10.1109\/TPDS.2013.271","volume":"25","author":"J Li","year":"2014","unstructured":"Li J, Huang X, Li J, Chen X, Xiang Y. Securely outsourcing attribute-based encryption with checkability. IEEE Transactions on Parallel and Distributed Systems, 2014, 25(8): 2201\u20132210","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"9472_CR20","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1016\/j.jss.2016.12.018","volume":"125","author":"R Zhang","year":"2017","unstructured":"Zhang R, Ma H, Lu Y. Fine-grained access control system based on fully outsourced attribute-based encryption. Journal of Systems and Software, 2017, 125: 344\u2013353","journal-title":"Journal of Systems and Software"},{"issue":"5","key":"9472_CR21","doi-asserted-by":"publisher","first-page":"785","DOI":"10.1109\/TSC.2016.2520932","volume":"10","author":"J Li","year":"2017","unstructured":"Li J, Yao W, Zhang Y, Qian H, Han J. Flexible and fine-grained attribute-based data storage in cloud computing. IEEE Transactions on Services Computing, 2017, 10(5): 785\u2013796","journal-title":"IEEE Transactions on Services Computing"},{"issue":"3","key":"9472_CR22","doi-asserted-by":"publisher","first-page":"478","DOI":"10.1109\/TSC.2017.2710190","volume":"13","author":"J Li","year":"2017","unstructured":"Li J, Wang Y, Zhang Y, Han J. Full verifiability for outsourced decryption in attribute based encryption. IEEE Transactions on Services Computing, 2017, 13(3): 478\u2013487","journal-title":"IEEE Transactions on Services Computing"},{"key":"9472_CR23","doi-asserted-by":"publisher","first-page":"730","DOI":"10.1016\/j.future.2016.10.028","volume":"78","author":"C Zuo","year":"2018","unstructured":"Zuo C, Shao J, Wei G, Xie M, Ji M. CCA-secure ABE with outsourced decryption for fog computing. Future Generation Computer Systems, 2018, 78: 730\u2013738","journal-title":"Future Generation Computer Systems"},{"key":"9472_CR24","doi-asserted-by":"publisher","first-page":"753","DOI":"10.1016\/j.future.2016.12.015","volume":"78","author":"P Zhang","year":"2018","unstructured":"Zhang P, Chen Z, Liu J K, Liang K, Liu H. An efficient access control scheme with outsourcing capability and attribute update for fog computing. Future Generation Computer Systems, 2018, 78: 753\u2013762","journal-title":"Future Generation Computer Systems"},{"key":"9472_CR25","unstructured":"Song D X, Wagner D A, Perrig A. Practical techniques for searches on encrypted data. In: Proceedings of IEEE Symposium on Security and Privacy. 2000, 44\u201355"},{"key":"9472_CR26","doi-asserted-by":"publisher","first-page":"506","DOI":"10.1007\/978-3-540-24676-3_30","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 2004","author":"D Boneh","year":"2004","unstructured":"Boneh D, Crescenzo G D, Ostrovsky R, Persiano G. Public key encryption with keyword search. In: Cachin C, Camenisch J L, eds. Advances in Cryptology \u2014 EUROCRYPT 2004. Springer, Berlin, Heidelbery, 2004, 506\u2013522"},{"issue":"8","key":"9472_CR27","doi-asserted-by":"publisher","first-page":"1133","DOI":"10.1093\/comjnl\/bxy031","volume":"61","author":"H Wang","year":"2018","unstructured":"Wang H, Dong X, Cao Z, Li D. Secure and efficient attribute-based encryption with keyword search. The Computer Journal, 2018, 61(8): 1133\u20131142","journal-title":"The Computer Journal"},{"key":"9472_CR28","doi-asserted-by":"crossref","unstructured":"Cao N, Wang C, Li M, Ren K, Lou W. Privacy-preserving multi-keyword ranked search over encrypted cloud data. In: Proceedings of IEEE International Conference on Computer Communications. 2011, 829\u2013837","DOI":"10.1109\/INFCOM.2011.5935306"},{"key":"9472_CR29","unstructured":"Lu Y, Li J, Zhang Y. Secure channel free certificate-based searchable encryption withstanding outside and inside keyword guessing attacks. IEEE Transactions on Services Computing, 2019"},{"issue":"3","key":"9472_CR30","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1109\/TDSC.2015.2406704","volume":"13","author":"H Li","year":"2016","unstructured":"Li H, Yang Y, Luan T H, Liang X, Zhou L, Shen X S. Enabling finegrained multi-keyword search supporting classified sub-dictionaries over encrypted cloud data. IEEE Transactions on Dependable and Secure Computing, 2016, 13(3): 312\u2013325","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"issue":"11","key":"9472_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-016-0617-z","volume":"40","author":"Y Miao","year":"2016","unstructured":"Miao Y, Ma J, Liu X, Wei F, Liu Z, Wang X A. m2-abks: attribute-based multi-keyword search over encrypted personal health records in multi-owner setting. Journal of Medical Systems, 2016, 40(11): 1\u201312","journal-title":"Journal of Medical Systems"},{"key":"9472_CR32","doi-asserted-by":"crossref","unstructured":"Cui H, Deng R H, Liu J K, Li Y. Attribute-based encryption with expressive and authorized keyword search. In: Proceedings of Australasian Conference on Information Security and Privacy. 2017, 106\u2013126","DOI":"10.1007\/978-3-319-60055-0_6"},{"issue":"5","key":"9472_CR33","doi-asserted-by":"publisher","first-page":"715","DOI":"10.1109\/TSC.2016.2542813","volume":"10","author":"J Li","year":"2017","unstructured":"Li J, Lin X, Zhang Y, Han J. KSF-OABE: outsourced attribute-based encryption with keyword search function for cloud storage. IEEE Transactions on Services Computing, 2017, 10(5): 715\u2013725","journal-title":"IEEE Transactions on Services Computing"}],"container-title":["Frontiers of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-020-9472-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11704-020-9472-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-020-9472-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,19]],"date-time":"2022-11-19T21:52:22Z","timestamp":1668894742000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11704-020-9472-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,29]]},"references-count":33,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2021,10]]}},"alternative-id":["9472"],"URL":"https:\/\/doi.org\/10.1007\/s11704-020-9472-7","relation":{},"ISSN":["2095-2228","2095-2236"],"issn-type":[{"value":"2095-2228","type":"print"},{"value":"2095-2236","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,4,29]]},"assertion":[{"value":"28 November 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 March 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 April 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"155810"}}