{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:30:44Z","timestamp":1775745044879,"version":"3.50.1"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,10,6]],"date-time":"2021-10-06T00:00:00Z","timestamp":1633478400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,10,6]],"date-time":"2021-10-06T00:00:00Z","timestamp":1633478400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"the National Key Research and Development Program of China","award":["No. 2019YFC1709200"],"award-info":[{"award-number":["No. 2019YFC1709200"]}]},{"name":"the National Key Research and Development Program of China","award":["No. 2019YFC1709202"],"award-info":[{"award-number":["No. 2019YFC1709202"]}]},{"name":"the National Science Foundation of China","award":["No. 61571065"],"award-info":[{"award-number":["No. 61571065"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2022,1]]},"DOI":"10.1007\/s12083-021-01238-8","type":"journal-article","created":{"date-parts":[[2021,10,6]],"date-time":"2021-10-06T13:20:40Z","timestamp":1633526440000},"page":"369-385","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["MPLDS: An integration of CP-ABE and local differential privacy for achieving multiple privacy levels data sharing"],"prefix":"10.1007","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6973-2267","authenticated-orcid":false,"given":"Haina","family":"Song","sequence":"first","affiliation":[]},{"given":"Xinyu","family":"Han","sequence":"additional","affiliation":[]},{"given":"Jie","family":"Lv","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4870-5942","authenticated-orcid":false,"given":"Tao","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Jianfeng","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,10,6]]},"reference":[{"issue":"7","key":"1238_CR1","doi-asserted-by":"publisher","first-page":"1214","DOI":"10.1109\/TPDS.2010.203","volume":"22","author":"J Hur","year":"2011","unstructured":"Hur J, Noh DK (2011) Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Trans Parallel Distrib Syst 22(7):1214\u20131221","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"1238_CR2","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1016\/j.future.2016.07.019","volume":"67","author":"YS Rao","year":"2017","unstructured":"Rao YS (2017) A secure and efficient ciphertext-policy attribute-based signcryption for personal health records sharing in cloud computing. Futur Gener Comput Syst 67:133\u2013151","journal-title":"Futur Gener Comput Syst"},{"issue":"3","key":"1238_CR3","doi-asserted-by":"publisher","first-page":"2130","DOI":"10.1109\/JIOT.2018.2825289","volume":"5","author":"Y Zhang","year":"2018","unstructured":"Zhang Y, Zheng D, Deng RH (2018) Security and privacy in smart health: Efficient policy-hiding attribute-based access control. IEEE Internet Things J 5(3):2130\u20132145","journal-title":"IEEE Internet Things J"},{"key":"1238_CR4","unstructured":"Ghane S, Jolfaei A et al (2020) Preserving privacy in the internet of connected vehicles. IEEE Trans Intell Transp Syst\u00a0e3952:1-10, Early Access"},{"issue":"6","key":"1238_CR5","doi-asserted-by":"publisher","first-page":"4778","DOI":"10.1109\/JIOT.2018.2820039","volume":"5","author":"P Asuquo","year":"2018","unstructured":"Asuquo P, Cruickshank H, Morley J (2018) Security and privacy in location-based services for vehicular and mobile communications: An overview, challenges, and countermeasures. IEEE Internet Things J 5(6):4778\u20134802","journal-title":"IEEE Internet Things J"},{"issue":"4","key":"1238_CR6","doi-asserted-by":"crossref","first-page":"850","DOI":"10.1109\/TIFS.2015.2512533","volume":"11","author":"A Castiglione","year":"2016","unstructured":"Castiglione A et al (2016) Hierarchical and shared access control. IEEE Trans Inf Forensics Secur 11(4):850\u2013865","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"1238_CR7","doi-asserted-by":"publisher","unstructured":"Alderman J, Farley N, Crampton J (2017) Tree-based cryptographic access control. in: European Symposium on Research in Computer Security, Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-319-66402-6_5","DOI":"10.1007\/978-3-319-66402-6_5"},{"key":"1238_CR8","doi-asserted-by":"crossref","unstructured":"Castiglione A, Santis AD, Masucci B (2014) Hierarchical and shared key assignment. In: International Conference on Network-based Information Systems. IEEE: 263-270","DOI":"10.1109\/NBiS.2014.106"},{"key":"1238_CR9","doi-asserted-by":"publisher","unstructured":"Crampton J, Farley N, Gutin G et al (2015) Cryptographic enforcement of information flow policies without public information. in: International Conference on Applied Cryptography and Network Security, Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-319-28166-7_19","DOI":"10.1007\/978-3-319-28166-7_19"},{"key":"1238_CR10","doi-asserted-by":"crossref","unstructured":"Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. in: 2006 13th ACM Conference on Computer and Communications Security (CCS), ACM: 89-98","DOI":"10.1145\/1180405.1180418"},{"key":"1238_CR11","doi-asserted-by":"crossref","unstructured":"Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security & Privacy, IEEE: 321-334","DOI":"10.1109\/SP.2007.11"},{"key":"1238_CR12","first-page":"1","volume-title":"Information Security Practice and Experience","author":"L Ibraimi","year":"2009","unstructured":"Ibraimi L, Tang Q et al (2009) Efficient and provable secure ciphertext-policy attribute-based encryption schemes. Information Security Practice and Experience. Springer, Berlin Heidelberg, pp 1\u201312"},{"key":"1238_CR13","doi-asserted-by":"publisher","unstructured":"Zhang L, Gao X, Kang L, Liang P, Mu Y (2021) Distributed ciphertext-policy attribute-based encryption with enhanced collusion resilience and privacy preservation. IEEE Syst J\u00a0(Early Access). https:\/\/doi.org\/10.1109\/JSYST.2021.3072793","DOI":"10.1109\/JSYST.2021.3072793"},{"key":"1238_CR14","doi-asserted-by":"publisher","unstructured":"Chen N, Li J, Zhang Y, Guo Y (2020) Efficient CP-ABE scheme with shared decryption in cloud storage. IEEE Trans Comput (Early Access). https:\/\/doi.org\/10.1109\/TC.2020.3043950","DOI":"10.1109\/TC.2020.3043950"},{"issue":"6","key":"1238_CR15","doi-asserted-by":"publisher","first-page":"1265","DOI":"10.1109\/TIFS.2016.2523941","volume":"11","author":"S Wang","year":"2016","unstructured":"Wang S, Zhou J, Joseph K (2016) An efficient file hierarchy attribute-based encryption scheme in cloud computing. IEEE Trans Inf Forensics Secur 11(6):1265\u20131277","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"1238_CR16","doi-asserted-by":"publisher","unstructured":"Kim I, Susilo W, Baek J, Kim J (2020) Harnessing policy authenticity for hidden ciphertext policy attribute based encryption. IEEE Trans Dependable Secure Comput\u00a0(Early Access). https:\/\/doi.org\/10.1109\/TDSC.2020.3040712","DOI":"10.1109\/TDSC.2020.3040712"},{"issue":"2","key":"1238_CR17","doi-asserted-by":"publisher","first-page":"1767","DOI":"10.1109\/JSYST.2017.2667679","volume":"12","author":"J Li","year":"2018","unstructured":"Li J, Yao W et al (2018) User collusion avoidance CP-ABE with efficient attribute revocation for cloud storage. IEEE Syst J 12(2):1767\u20131777","journal-title":"IEEE Syst J"},{"issue":"4","key":"1238_CR18","doi-asserted-by":"publisher","first-page":"617","DOI":"10.1109\/TCC.2015.2440247","volume":"5","author":"W Teng","year":"2017","unstructured":"Teng W, Yang G et al (2017) Attribute-based access control with constant-size ciphertext in cloud computing. IEEE Transactions on Cloud Computing 5(4):617\u2013627","journal-title":"IEEE Transactions on Cloud Computing"},{"issue":"1","key":"1238_CR19","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1109\/TC.2013.200","volume":"64","author":"Z Zhou","year":"2015","unstructured":"Zhou Z, Huang D, Wang Z (2015) Efficient privacy-preserving ciphertext-policy attribute based-encryption and broadcast encryption. IEEE Trans Comput 64(1):126\u2013138","journal-title":"IEEE Trans Comput"},{"key":"1238_CR20","unstructured":"Yang Z, Xing Z et al (2019) A verifiable hidden policy CP-ABE with decryption testing scheme and its application in VANET. Trans Emerg Telecommun Technol\u00a0e3785, Early Access"},{"issue":"1","key":"1238_CR21","first-page":"814","volume":"2","author":"X Xiao","year":"2019","unstructured":"Xiao X, Tao Y et al (2019) Optimal random perturbation at multiple privacy levels. Very Large Data Bases 2(1):814\u2013825","journal-title":"Very Large Data Bases"},{"key":"1238_CR22","doi-asserted-by":"publisher","first-page":"109910","DOI":"10.1109\/ACCESS.2019.2933542","volume":"7","author":"JM Kim","year":"2019","unstructured":"Kim JM, Edemacu K, Jang B (2019) MPPDS: Multilevel privacy-preserving data sharing in a collaborative eHealth system. IEEE Access 7:109910\u2013109923","journal-title":"IEEE Access"},{"key":"1238_CR23","doi-asserted-by":"crossref","unstructured":"Erlingsson \u00da, Pihur V, Korolova A (2014) Rappor: Randomized aggregatable privacy-preserving ordinal response. In: 2014 ACM SIGSAC conference on computer and communications security, ACM: 1054-1067","DOI":"10.1145\/2660267.2660348"},{"issue":"7","key":"1238_CR24","first-page":"1981","volume":"29","author":"Q Ye","year":"2018","unstructured":"Ye Q, Meng X et al (2018) Survey on local differential privacy. Journal of Software 29(7):1981\u20132005","journal-title":"Journal of Software"},{"key":"1238_CR25","doi-asserted-by":"publisher","first-page":"1097","DOI":"10.1007\/s12083-019-00774-8","volume":"12","author":"J Wang","year":"2019","unstructured":"Wang J, Wang Y, Zhao G et al (2019) Location protection method for mobile crowd sensing based on local differential privacy preference. Peer-to-Peer Networking and Applications 12:1097\u20131109","journal-title":"Peer-to-Peer Networking and Applications"},{"key":"1238_CR26","doi-asserted-by":"publisher","first-page":"16964","DOI":"10.1109\/ACCESS.2019.2893407","volume":"7","author":"H Song","year":"2019","unstructured":"Song H, Luo T, Li J (2019) Common criterion of privacy metrics and parameters analysis based on error probability for randomized response. IEEE Access 7:16964\u201316978","journal-title":"IEEE Access"},{"key":"1238_CR27","doi-asserted-by":"publisher","first-page":"2209","DOI":"10.1109\/TIFS.2019.2959911","volume":"15","author":"H Song","year":"2020","unstructured":"Song H, Luo T, Wang X, Li J (2020) Multiple sensitive values-oriented personalized privacy preservation based on randomized response. IEEE Trans Inf Forensics Secur 15:2209\u20132224","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"3","key":"1238_CR28","doi-asserted-by":"publisher","first-page":"960","DOI":"10.1109\/LCOMM.2020.3042200","volume":"25","author":"H Huang","year":"2021","unstructured":"Huang H, Chen D, Li Y (2021) IM-LDP: Incentive mechanism for mobile crowd-sensing based on local differential privacy. IEEE Commun Lett 25(3):960\u2013964","journal-title":"IEEE Commun Lett"},{"key":"1238_CR29","doi-asserted-by":"publisher","unstructured":"Zhao Y et al (2020) Local differential privacy based federated learning for Internet of things. IEEE Internet Things J. https:\/\/doi.org\/10.1109\/JIOT.2020.3037194","DOI":"10.1109\/JIOT.2020.3037194"},{"key":"1238_CR30","unstructured":"Kairouz P, Oh S, Viswanath P (2014) Extremal mechanisms for local differential privacy. In: 2014 28th Conference on Neural Information Processing Systems (NIPS)\u00a0pp 2879-2887"},{"key":"1238_CR31","unstructured":"Newman D J, Hettich S, Blake C L, Merz C J (1998) UCI repository of machine learning databases. Dept. Inf. Comput. Sci., Univ. California, Irvine, CA, USA, 1998. [Online].\u00a0http:\/\/www.ics.uci.edu\/mlearn\/MLRepository.html"},{"key":"1238_CR32","unstructured":"Ben L (2013) The java pairing-based cryptography (JPBC) Library. [Online].\u00a0http:\/\/gas.dia.unisa.it\/projects\/jpbc\/#.XyzzqzMpWTA"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-021-01238-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-021-01238-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-021-01238-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,10]],"date-time":"2023-11-10T04:59:53Z","timestamp":1699592393000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-021-01238-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,6]]},"references-count":32,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,1]]}},"alternative-id":["1238"],"URL":"https:\/\/doi.org\/10.1007\/s12083-021-01238-8","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,10,6]]},"assertion":[{"value":"16 December 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 August 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 October 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}