{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:48:26Z","timestamp":1762004906335,"version":"3.37.3"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2017,5,6]],"date-time":"2017-05-06T00:00:00Z","timestamp":1494028800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2018,7]]},"DOI":"10.1007\/s12083-017-0562-8","type":"journal-article","created":{"date-parts":[[2017,5,5]],"date-time":"2017-05-05T23:50:22Z","timestamp":1494028222000},"page":"766-777","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":25,"title":["Secure, efficient and revocable data sharing scheme for vehicular fogs"],"prefix":"10.1007","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6870-6657","authenticated-orcid":false,"given":"Kai","family":"Fan","sequence":"first","affiliation":[]},{"given":"Junxiong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xin","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Hui","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yintang","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,6]]},"reference":[{"key":"562_CR1","first-page":"123","volume":"2016","author":"H Zhu","year":"2016","unstructured":"Zhu H, Chang S, Lu L, Zhang W (2016) RUPS: fixing relative distances among urban vehicles with context-aware trajectories. Proceedings of IPDPS 2016:123\u2013131","journal-title":"Proceedings of IPDPS"},{"key":"562_CR2","first-page":"2192","volume":"2011","author":"H Zhu","year":"2011","unstructured":"Zhu H, Chang S, Li M, Naik K, Shen S (2011) Exploiting temporal dependency for opportunistic forwarding in urban vehicular networks. Proceedings of INFOCOM 2011:2192\u20132200","journal-title":"Proceedings of INFOCOM"},{"issue":"2","key":"562_CR3","doi-asserted-by":"crossref","first-page":"457","DOI":"10.1016\/j.comnet.2010.10.015","volume":"55","author":"M Gerla","year":"2011","unstructured":"Gerla M, Kleinrock L (2011) Vehicular networks and the future of the mobile internet. Comput Netw 55(2):457\u2013469","journal-title":"Comput Netw"},{"key":"562_CR4","doi-asserted-by":"crossref","unstructured":"Luan T, Shen X, Bai F (2013, 2013) Integrity-oriented content transmission in highway vehicular ad hoc networks. Proceedings of INFOCOM:2562\u20132570","DOI":"10.1109\/INFCOM.2013.6567063"},{"issue":"1","key":"562_CR5","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1016\/j.future.2012.05.023","volume":"29","author":"N Fernando","year":"2013","unstructured":"Fernando N, Loke S, Rahayu W (2013) Mobile cloud computing: a survey. Futur Gener Comput Syst 29(1):84\u2013106","journal-title":"Futur Gener Comput Syst"},{"key":"562_CR6","first-page":"496","volume":"2013","author":"A Tuli","year":"2013","unstructured":"Tuli A, Hasteer N, Sharma M, Bansal A (2013) Exploring challenges in mobile cloud computing: An overview. Proceedings of Next Generation Information Technology Summit 2013:496\u2013501","journal-title":"Proceedings of Next Generation Information Technology Summit"},{"key":"562_CR7","first-page":"13","volume":"2011","author":"F Bonomi","year":"2011","unstructured":"Bonomi F (2011) Connected vehicles, the internet of things, and fog computing. VANET 2011:13\u201315","journal-title":"VANET"},{"key":"562_CR8","doi-asserted-by":"crossref","unstructured":"Bonomi F, Milito R, Zhu J, Addepalli S (2012, 2012) Fog computing and its role in the internet of things. Proceedings of MCC:13\u201316","DOI":"10.1145\/2342509.2342513"},{"key":"562_CR9","first-page":"464","volume":"2014","author":"M Aazam","year":"2014","unstructured":"Aazam M, Huh E (2014) Fog computing and smart gateway based communication for cloud of things. Proceedings of FiCloud 2014:464\u2013470","journal-title":"Proceedings of FiCloud"},{"key":"562_CR10","first-page":"518","volume":"2015","author":"M Aazam","year":"2015","unstructured":"Aazam M, Huh E (2015) E-HAMC: leveraging fog computing for emergency alert service. Proceedings of PerCom 2015:518\u2013523","journal-title":"Proceedings of PerCom"},{"key":"562_CR11","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1145\/2491266.2491270","volume":"2013","author":"K Hong","year":"2013","unstructured":"Hong K, Lillethun D, Ramachandran U, Ottenw\u00e4lder B, Koldehofe B (2013) Mobile fog: a programming model for large-scale applicationson the internet of things. Proceedings of MCC 2013:15\u201320","journal-title":"Proceedings of MCC"},{"key":"562_CR12","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1145\/2488222.2488265","volume":"2013","author":"B Ottenwalder","year":"2013","unstructured":"Ottenwalder B, Koldehofe B, Rothermel K, Ramachandran U (2013) Migcep: Operator migration for mobility driven distributed complexevent processing. Proceedings of DEBS 2013:183\u2013194","journal-title":"Proceedings of DEBS"},{"key":"562_CR13","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1145\/2492348.2492354","volume":"2013","author":"T Nishio","year":"2013","unstructured":"Nishio T, Shinkuma R, Takahashi T, Mandayam N (2013) Service oriented heterogeneous resource sharing for optimizing service latency in mobile cloud. Proceedings of MobileCloud 2013:19\u201326","journal-title":"Proceedings of MobileCloud"},{"issue":"4","key":"562_CR14","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/MWC.2015.7224727","volume":"22","author":"M Dong","year":"2015","unstructured":"Dong M, Liu X, Qian Z, Liu A, Wang T (2015) QoE-ensured price competition model for emerging mobile networks. IEEE Wirel Commun 22(4):50\u201357","journal-title":"IEEE Wirel Commun"},{"issue":"8","key":"562_CR15","doi-asserted-by":"crossref","first-page":"2178","DOI":"10.1109\/TPDS.2014.2346212","volume":"26","author":"K Wei","year":"2015","unstructured":"Wei K, Dong M, Ota K et al (2015) CAMF. Context-aware message forwarding in mobile social networks. IEEE Transactions on Parallel and Distributed Systems 26(8):2178\u20132187","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"issue":"12","key":"562_CR16","doi-asserted-by":"crossref","first-page":"31843","DOI":"10.3390\/s151229887","volume":"15","author":"S Luo","year":"2015","unstructured":"Luo S, Dong M, Ota K et al (2015) A security assessment mechanism for software-defined networking-based mobile networks. Sensors 15(12):31843\u201331858","journal-title":"Sensors"},{"issue":"1","key":"562_CR17","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1109\/TETC.2014.2371245","volume":"3","author":"K Ota","year":"2015","unstructured":"Ota K, Dong M, Chang S et al (2015) MMCD: cooperative downloading for highway VANETs. IEEE Trans Emerging Topics Comput 3(1):34\u201343","journal-title":"IEEE Trans Emerging Topics Comput"},{"key":"562_CR18","doi-asserted-by":"crossref","unstructured":"Ostrovsky R, Sahai A, Waters B (2007, 2007) Attribute-based encryption with non-monotonic access structures. Proceedings of CCS:195\u2013203","DOI":"10.1145\/1315245.1315270"},{"issue":"3","key":"562_CR19","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1145\/937503.937506","volume":"35","author":"S Rafaeli","year":"2003","unstructured":"Rafaeli S, Hutchison D (2003) A survey of key management for secure group communication. ACM Comput Surv 35(3):309\u2013329","journal-title":"ACM Comput Surv"},{"key":"562_CR20","doi-asserted-by":"crossref","unstructured":"Boyen X, Waters B (2007, 2007) Full-domain subgroup hiding and constant-size group signatures. Proceedings of PKC:1\u201315","DOI":"10.1007\/978-3-540-71677-8_1"},{"key":"562_CR21","unstructured":"Liang X, Lu R, Lin X, Shen X (2010) Ciphertext policy attribute-based encryption with efficient revocation. IEEE symposium on security and privacy. Pp 321-334"},{"key":"562_CR22","first-page":"373","volume":"2013","author":"X Xie","year":"2013","unstructured":"Xie X, Ma H, Li J, Chen X (2013) New ciphertext-policy attribute-based access control with efficient revocation. Proceedings of ICT 2013:373\u2013382","journal-title":"Proceedings of ICT"},{"issue":"7","key":"562_CR23","doi-asserted-by":"crossref","first-page":"1214","DOI":"10.1109\/TPDS.2010.203","volume":"22","author":"J Hur","year":"2010","unstructured":"Hur J, Noh D (2010) Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Transactions on Paralleland Distributed Systems 22(7):1214\u20131221","journal-title":"IEEE Transactions on Paralleland Distributed Systems"},{"key":"562_CR24","unstructured":"Beimel A (1996) Secure schemes for secret sharing and key distribution. Technion-Israel Institute of Technology, Faculty of Computer Science. pp 22\u201328"},{"key":"562_CR25","doi-asserted-by":"crossref","unstructured":"Dong M, Zheng L, Ota K, Guo S, Guo M, Li L (2009) A trade-off approach to optimal resource allocation algorithm with cache technology in ubiquitous computing environment. Proceedings of CSE 2009. Pp 9-15","DOI":"10.1109\/CSE.2009.472"},{"issue":"6","key":"562_CR26","doi-asserted-by":"crossref","first-page":"1103","DOI":"10.1109\/TPDS.2011.263","volume":"23","author":"S Chang","year":"2012","unstructured":"Chang S, Qi Y, Zhu H et al (2012) Footprint: detecting Sybil attacks in urban vehicular networks. IEEE Transactions on Parallel & Distributed Systems 23(6):1103\u20131114","journal-title":"IEEE Transactions on Parallel & Distributed Systems"},{"key":"562_CR27","doi-asserted-by":"crossref","unstructured":"Stojmenovic I, Sheng W (2014, 2014) The fog computing paradigm: scenariosand security issues. Proceedings of FedCSIS:1\u20138","DOI":"10.15439\/2014F503"},{"key":"562_CR28","doi-asserted-by":"crossref","unstructured":"Chase M (2007) Multi-authority attribute based encryption. Proceedings of theory of cryptography. Pp 515-534","DOI":"10.1007\/978-3-540-70936-7_28"},{"key":"562_CR29","doi-asserted-by":"crossref","unstructured":"Lewko A, Waters B (2011, 2011) Decentralizing attribute-based encryption. Proceedings of advances in cryptology\u2013EUROCRYPT:568\u2013588","DOI":"10.1007\/978-3-642-20465-4_31"},{"key":"562_CR30","first-page":"91","volume":"2011","author":"S Ruj","year":"2011","unstructured":"Ruj S, Nayak A, Stojmenovic I (2011) DACC: distributed access control in clouds. Proceedings of TrustCom 2011:91\u201398","journal-title":"Proceedings of TrustCom"},{"issue":"2","key":"562_CR31","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1007\/s13389-013-0057-3","volume":"3","author":"J Akinyele","year":"2013","unstructured":"Akinyele J, Garman C, Miers I et al (2013) Charm: a framework for rapidly prototyping cryptosystems. J Cryptogr Eng 3(2):111\u2013128","journal-title":"J Cryptogr Eng"},{"key":"562_CR32","unstructured":"Lynn B. PBC Library: The pairing-based cryptography library. http:\/\/crypto.stanford.edu\/pbc . Accessed 26 Jul 2016"},{"key":"562_CR33","unstructured":"Charm: A tool for rapid cryptographic prototyping. http:\/\/www.charm-crypto.com . Accessed 26 Jul 2016"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12083-017-0562-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-017-0562-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-017-0562-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,23]],"date-time":"2019-09-23T11:37:51Z","timestamp":1569238671000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12083-017-0562-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,6]]},"references-count":33,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2018,7]]}},"alternative-id":["562"],"URL":"https:\/\/doi.org\/10.1007\/s12083-017-0562-8","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2017,5,6]]}}}