{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:33:27Z","timestamp":1772120007955,"version":"3.50.1"},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,12,20]],"date-time":"2023-12-20T00:00:00Z","timestamp":1703030400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,12,20]],"date-time":"2023-12-20T00:00:00Z","timestamp":1703030400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2024,1]]},"DOI":"10.1007\/s12083-023-01601-x","type":"journal-article","created":{"date-parts":[[2023,12,20]],"date-time":"2023-12-20T02:02:21Z","timestamp":1703037741000},"page":"410-431","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Verifiable and privacy-preserving fine-grained data management in vehicular fog computing: A game theory-based approach"],"prefix":"10.1007","volume":"17","author":[{"given":"Zahra","family":"Seyedi","sequence":"first","affiliation":[]},{"given":"Farhad","family":"Rahmati","sequence":"additional","affiliation":[]},{"given":"Mohammad","family":"Ali","sequence":"additional","affiliation":[]},{"given":"Ximeng","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,12,20]]},"reference":[{"issue":"5","key":"1601_CR1","doi-asserted-by":"publisher","first-page":"3701","DOI":"10.1109\/JIOT.2017.2690902","volume":"5","author":"J Contreras-Castillo","year":"2017","unstructured":"Contreras-Castillo J, Zeadally S, Guerrero-Iba\u00f1ez JA (2017) Internet of vehicles: architecture, protocols, and security. IEEE Internet Things J 5(5):3701\u20133709","journal-title":"IEEE Internet Things J"},{"key":"1601_CR2","doi-asserted-by":"publisher","first-page":"108205","DOI":"10.1016\/j.compeleceng.2022.108205","volume":"102","author":"MS Rathore","year":"2022","unstructured":"Rathore MS, Poongodi M, Saurabh P, Lilhore UK, Bourouis S, Alhakami W, Osamor J, Hamdi M (2022) A novel trust-based security and privacy model for internet of vehicles using encryption and steganography. Comput Electr Eng 102:108205","journal-title":"Comput Electr Eng"},{"key":"1601_CR3","doi-asserted-by":"publisher","first-page":"108558","DOI":"10.1016\/j.comnet.2021.108558","volume":"203","author":"A Hbaieb","year":"2022","unstructured":"Hbaieb A, Ayed S, Chaari L (2022) A survey of trust management in the internet of vehicles. Comput Netw 203:108558","journal-title":"Comput Netw"},{"issue":"1","key":"1601_CR4","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1109\/TGCN.2021.3127923","volume":"6","author":"J Wang","year":"2021","unstructured":"Wang J, Zhu K, Hossain E (2021) Green internet of vehicles (IOV) in the 6G era: toward sustainable vehicular communications and networking. IEEE Trans Green Commun Netw 6(1):391\u2013423","journal-title":"IEEE Trans Green Commun Netw"},{"issue":"15","key":"1601_CR5","doi-asserted-by":"publisher","first-page":"13179","DOI":"10.1109\/JIOT.2022.3143872","volume":"9","author":"W Mao","year":"2022","unstructured":"Mao W, Akgul OU, Mehrabi A, Cho B, Xiao Y, Yl\u00e4-J\u00e4\u00e4ski A (2022) Data-driven capacity planning for vehicular fog computing. IEEE Internet Things J 9(15):13179\u201313194","journal-title":"IEEE Internet Things J"},{"key":"1601_CR6","doi-asserted-by":"crossref","unstructured":"Hamdi AMA, Hussain FK, Hussain OK (2022) Task offloading in vehicular fog computing: state-of-the-art and open issues. Futur Gener Comput Syst","DOI":"10.1016\/j.future.2022.03.019"},{"key":"1601_CR7","first-page":"103101","volume":"65","author":"M Ali","year":"2022","unstructured":"Ali M, Sadeghi M-R, Liu X, Miao Y, Vasilakos AV (2022) Verifiable online\/offline multi-keyword search for cloud-assisted industrial internet of things. J Inf Secur Appl 65:103101","journal-title":"J Inf Secur Appl"},{"issue":"9","key":"1601_CR8","doi-asserted-by":"publisher","first-page":"9364","DOI":"10.1109\/TVT.2020.2970763","volume":"69","author":"C Tang","year":"2020","unstructured":"Tang C, Wei X, Zhu C, Wang Y, Jia W (2020) Mobile vehicles as fog nodes for latency optimization in smart cities. IEEE Trans Veh Technol 69(9):9364\u20139375","journal-title":"IEEE Trans Veh Technol"},{"issue":"1","key":"1601_CR9","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1109\/MWC.2019.1700441","volume":"26","author":"Z Ning","year":"2019","unstructured":"Ning Z, Huang J, Wang X (2019) Vehicular fog computing: Enabling real-time traffic management for smart cities. IEEE Wirel Commun 26(1):87\u201393","journal-title":"IEEE Wirel Commun"},{"issue":"12","key":"1601_CR10","doi-asserted-by":"publisher","first-page":"10660","DOI":"10.1109\/TVT.2017.2714704","volume":"66","author":"J Feng","year":"2017","unstructured":"Feng J, Liu Z, Wu C, Ji Y (2017) Ave: Autonomous vehicular edge computing framework with aco-based scheduling. IEEE Trans Veh Technol 66(12):10660\u201310675","journal-title":"IEEE Trans Veh Technol"},{"issue":"1","key":"1601_CR11","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1109\/TCC.2016.2551747","volume":"7","author":"M Shojafar","year":"2016","unstructured":"Shojafar M, Cordeschi N, Baccarelli E (2016) Energy-efficient adaptive resource management for real-time vehicular cloud services. IEEE Trans Cloud Comput 7(1):196\u2013209","journal-title":"IEEE Trans Cloud Comput"},{"issue":"4","key":"1601_CR12","doi-asserted-by":"publisher","first-page":"3094","DOI":"10.1109\/JIOT.2020.2965009","volume":"7","author":"X Peng","year":"2020","unstructured":"Peng X, Ota K, Dong M (2020) Multiattribute-based double auction toward resource allocation in vehicular fog computing. IEEE Internet Things J 7(4):3094\u20133103","journal-title":"IEEE Internet Things J"},{"issue":"10","key":"1601_CR13","doi-asserted-by":"publisher","first-page":"10450","DOI":"10.1109\/JIOT.2020.2996213","volume":"7","author":"S-S Lee","year":"2020","unstructured":"Lee S-S, Lee S (2020) Resource allocation for vehicular fog computing using reinforcement learning combined with heuristic information. IEEE Internet Things J 7(10):10450\u201310464","journal-title":"IEEE Internet Things J"},{"issue":"1","key":"1601_CR14","doi-asserted-by":"publisher","first-page":"773","DOI":"10.1109\/JIOT.2019.2953047","volume":"7","author":"Q Wu","year":"2019","unstructured":"Wu Q, Liu H, Wang R, Fan P, Fan Q, Li Z (2019) Delay-sensitive task offloading in the 802.11 p- based vehicular fog computing systems. IEEE Internet Things J 7(1):773\u2013785","journal-title":"IEEE Internet Things J"},{"issue":"4","key":"1601_CR15","doi-asserted-by":"publisher","first-page":"3094","DOI":"10.1109\/JIOT.2020.2965009","volume":"7","author":"X Peng","year":"2020","unstructured":"Peng X, Ota K, Dong M (2020) Multiattribute-based double auction toward resource allocation in vehicular fog computing. IEEE Internet Things J 7(4):3094\u20133103","journal-title":"IEEE Internet Things J"},{"key":"1601_CR16","doi-asserted-by":"crossref","unstructured":"Chai Q, Gong G (2012) Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers. In: 2012 IEEE International Conference on Communications (ICC). IEEE, pp 917\u2013922","DOI":"10.1109\/ICC.2012.6364125"},{"key":"1601_CR17","doi-asserted-by":"crossref","unstructured":"Benabbas S, Gennaro R, Vahlis Y (2011) Verifiable delegation of computation over large datasets. In: Advances in Cryptology\u2013CRYPTO 2011: 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14\u201318, 2011. Proceedings 31. Springer, pp 111\u2013131","DOI":"10.1007\/978-3-642-22792-9_7"},{"key":"1601_CR18","doi-asserted-by":"crossref","unstructured":"Fiore D, Gennaro R (2012) Publicly verifiable delegation of large polynomials and matrix computations, with applications. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security. pp 501\u2013512","DOI":"10.1145\/2382196.2382250"},{"key":"1601_CR19","doi-asserted-by":"crossref","unstructured":"Zheng Q, Xu S, Ateniese G (2014) Vabks: verifiable attribute-based keyword search over outsourced encrypted data. In: IEEE INFOCOM 2014-IEEE Conference on Computer Communications. IEEE, pp 522\u2013530","DOI":"10.1109\/INFOCOM.2014.6847976"},{"issue":"12","key":"1601_CR20","doi-asserted-by":"publisher","first-page":"4397","DOI":"10.1109\/TMC.2021.3077508","volume":"21","author":"Y Lu","year":"2021","unstructured":"Lu Y, Li J (2021) Lightweight public key authenticated encryption with keyword search against adaptively-chosen-targets adversaries for mobile devices. IEEE Trans Mob Comput 21(12):4397\u20134409","journal-title":"IEEE Trans Mob Comput"},{"issue":"4","key":"1601_CR21","first-page":"1804","volume":"18","author":"Y Miao","year":"2019","unstructured":"Miao Y, Deng RH, Choo K-KR, Liu X, Ning J, Li H (2019) Optimized verifiable fine-grained keyword search in dynamic multi-owner settings. IEEE Trans Dependable Secure Comput 18(4):1804\u20131820","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"1601_CR22","doi-asserted-by":"publisher","first-page":"94453","DOI":"10.1109\/ACCESS.2020.2995797","volume":"8","author":"C Tang","year":"2020","unstructured":"Tang C, Zhu C, Wei X, Wu H, Li Q, Rodrigues JJ (2020) Intelligent resource allocation for utility optimization in rsu-empowered vehicular network. IEEE Access 8:94453\u201394462","journal-title":"IEEE Access"},{"key":"1601_CR23","doi-asserted-by":"crossref","unstructured":"Xiao Y, Zhu C (2017) Vehicular fog computing: vision and challenges. In: 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops). IEEE, pp 6\u20139","DOI":"10.1109\/PERCOMW.2017.7917508"},{"issue":"6","key":"1601_CR24","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1109\/MCOM.2017.1600679","volume":"55","author":"J Ni","year":"2017","unstructured":"Ni J, Zhang A, Lin X, Shen XS (2017) Security, privacy, and fairness in fog-based vehicular crowdsensing. IEEE Commun Mag 55(6):146\u2013152","journal-title":"IEEE Commun Mag"},{"issue":"10","key":"1601_CR25","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1109\/MCOM.2018.1800116","volume":"56","author":"C Zhu","year":"2018","unstructured":"Zhu C, Pastor G, Xiao Y, Ylajaaski A (2018) Vehicular fog computing for video crowdsourcing: Applications, feasibility, and challenges. IEEE Commun Mag 56(10):58\u201363","journal-title":"IEEE Commun Mag"},{"key":"1601_CR26","doi-asserted-by":"crossref","unstructured":"Tang C, Zhu C, Wei X, Chen W, Rodrigues JJ (2020) RSU-empowered resource pooling for task scheduling in vehicular fog computing. In: 2020 International Wireless Communications and Mobile Computing (IWCMC). IEEE, pp 1758\u20131763","DOI":"10.1109\/IWCMC48107.2020.9148290"},{"key":"1601_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13677-021-00233-x","volume":"10","author":"C Tang","year":"2021","unstructured":"Tang C, Xia S, Li Q, Chen W, Fang W (2021) Resource pooling in vehicular fog computing. J Cloud Comput 10:1\u201314","journal-title":"J Cloud Comput"},{"key":"1601_CR28","doi-asserted-by":"crossref","unstructured":"Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Advances in Cryptology\u2013EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22\u201326, 2005. Proceedings 24. Springer, pp 457\u2013473","DOI":"10.1007\/11426639_27"},{"key":"1601_CR29","doi-asserted-by":"crossref","unstructured":"Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy (SP\u201907). IEEE, pp 321\u2013334","DOI":"10.1109\/SP.2007.11"},{"key":"1601_CR30","doi-asserted-by":"crossref","unstructured":"Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security. pp 89\u201398","DOI":"10.1145\/1180405.1180418"},{"key":"1601_CR31","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.future.2020.04.011","volume":"110","author":"H Nasiraee","year":"2020","unstructured":"Nasiraee H, Ashouri-Talouki M (2020) Anonymous decentralized attribute-based access control for cloud-assisted iot. Futur Gener Comput Syst 110:45\u201356","journal-title":"Futur Gener Comput Syst"},{"key":"1601_CR32","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/j.tcs.2020.02.030","volume":"815","author":"M Ali","year":"2020","unstructured":"Ali M, Mohajeri J, Sadeghi M-R, Liu X (2020) A fully distributed hierarchical attribute-based encryption scheme. Theoret Comput Sci 815:25\u201346","journal-title":"Theoret Comput Sci"},{"issue":"2","key":"1601_CR33","doi-asserted-by":"publisher","first-page":"532","DOI":"10.1109\/TCC.2015.2485199","volume":"6","author":"L-Y Yeh","year":"2015","unstructured":"Yeh L-Y, Chiang P-Y, Tsai Y-L, Huang J-L (2015) Cloud-based fine-grained health information access control framework for lightweight Iot devices with dynamic auditing andattribute revocation. IEEE Trans Cloud Comput 6(2):532\u2013544","journal-title":"IEEE Trans Cloud Comput"},{"issue":"12","key":"1601_CR34","doi-asserted-by":"publisher","first-page":"6500","DOI":"10.1109\/TII.2019.2931156","volume":"15","author":"J Li","year":"2019","unstructured":"Li J, Wang S, Li Y, Wang H, Wang H, Wang H, Chen J, You Z (2019) An efficient attribute-based encryption scheme with policy update and file update in cloud computing. IEEE Trans Industr Inf 15(12):6500\u20136509","journal-title":"IEEE Trans Industr Inf"},{"issue":"10","key":"1601_CR35","doi-asserted-by":"publisher","first-page":"2119","DOI":"10.1109\/TIFS.2015.2449264","volume":"10","author":"S Lin","year":"2015","unstructured":"Lin S, Zhang R, Ma H, Wang M (2015) Revisiting attribute-based encryption with verifiable outsourced decryption. IEEE Trans Inf Forensics Secur 10(10):2119\u20132130","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"4","key":"1601_CR36","doi-asserted-by":"publisher","first-page":"1187","DOI":"10.1109\/TPDS.2014.2355202","volume":"27","author":"W Sun","year":"2014","unstructured":"Sun W, Yu S, Lou W, Hou YT, Li H (2014) Protecting your right: Verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. IEEE Trans Parallel Distrib Syst 27(4):1187\u20131198","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"3","key":"1601_CR37","doi-asserted-by":"publisher","first-page":"1080","DOI":"10.1109\/TDSC.2019.2897675","volume":"18","author":"Y Miao","year":"2021","unstructured":"Miao Y, Liu X, Choo K-KR, Deng RH, Li J, Li H, Ma J (2021) Privacy-preserving attribute-based keyword search in shared multi-owner setting. IEEE Trans Dependable Secure Comput 18(3):1080\u20131094","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"4","key":"1601_CR38","first-page":"1804","volume":"18","author":"Y Miao","year":"2021","unstructured":"Miao Y, Deng RH, Choo K-KR, Liu X, Ning J, Li H (2021) Optimized verifiable fine-grained keyword search in dynamic multi-owner settings. IEEE Trans Dependable Secure Comput 18(4):1804\u20131820","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"1601_CR39","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1016\/j.ins.2020.05.041","volume":"536","author":"M Ali","year":"2020","unstructured":"Ali M, Mohajeri J, Sadeghi M-R, Liu X (2020) Attribute-based fine-grained access control for outscored private set intersection computation. Inf Sci 536:222\u2013243","journal-title":"Inf Sci"},{"key":"1601_CR40","doi-asserted-by":"crossref","unstructured":"Damgaard JB, Nielsen I (2002) Perfect hiding and perfect binding universally composable commitment schemes with constant expansion factor. Springer Berlin Heidelberg","DOI":"10.7146\/brics.v8i41.21701"},{"issue":"1","key":"1601_CR41","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1109\/TNSM.2021.3123475","volume":"19","author":"K Gu","year":"2022","unstructured":"Gu K, Zhang W, Li X, Jia W (2022) Self-verifiable attribute-based keyword search scheme for distributed data storage in fog computing with fast decryption. IEEE Trans Netw Serv Manage 19(1):271\u2013288","journal-title":"IEEE Trans Netw Serv Manage"},{"issue":"5","key":"1601_CR42","doi-asserted-by":"publisher","first-page":"772","DOI":"10.1109\/TSC.2018.2823309","volume":"12","author":"Y Miao","year":"2019","unstructured":"Miao Y, Ma J, Liu X, Weng J, Li H, Li H (2019) Lightweight fine-grained search over encrypted data in fog computing. IEEE Trans Serv Comput 12(5):772\u2013785","journal-title":"IEEE Trans Serv Comput"},{"key":"1601_CR43","unstructured":"The python pairing based cryptography library. Online: https:\/\/github.com\/debatem1\/pypbc"},{"key":"1601_CR44","unstructured":"Secure hashes and message digests library. Online: https:\/\/docs.python.org\/3\/library-hashlib.html#module-hashlib"},{"key":"1601_CR45","doi-asserted-by":"crossref","unstructured":"Lynn B (2006) PBC library manual 0.5. 11","DOI":"10.1016\/j.math.2005.08.001"},{"issue":"10","key":"1601_CR46","doi-asserted-by":"publisher","first-page":"1873","DOI":"10.1016\/j.jss.2010.05.071","volume":"83","author":"K-A Shim","year":"2010","unstructured":"Shim K-A (2010) An id-based aggregate signature scheme with constant pairing computations. J Syst Softw 83(10):1873\u20131880","journal-title":"J Syst Softw"},{"key":"1601_CR47","doi-asserted-by":"crossref","unstructured":"Katz J, Lindell Y (2014) Introduction to modern cryptography. CRC press","DOI":"10.1201\/b17668"},{"key":"1601_CR48","unstructured":"Blanchet B, Smyth B, Cheval V, Sylvestre M (2018) ProVerif 2.00: automatic cryptographic protocol verifier, user manual and tutorial, Version from"},{"issue":"2","key":"1601_CR49","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev D, Yao A (1983) On the security of public key protocols. IEEE Trans Inf Theory 29(2):198\u2013208","journal-title":"IEEE Trans Inf Theory"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-023-01601-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-023-01601-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-023-01601-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,17]],"date-time":"2024-02-17T10:23:36Z","timestamp":1708165416000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-023-01601-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,20]]},"references-count":49,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,1]]}},"alternative-id":["1601"],"URL":"https:\/\/doi.org\/10.1007\/s12083-023-01601-x","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-3165924\/v1","asserted-by":"object"}]},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,12,20]]},"assertion":[{"value":"13 July 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 November 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 December 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to publish"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}