{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,12]],"date-time":"2025-07-12T01:17:06Z","timestamp":1752283026929,"version":"3.40.5"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2025,2,10]],"date-time":"2025-02-10T00:00:00Z","timestamp":1739145600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,2,10]],"date-time":"2025-02-10T00:00:00Z","timestamp":1739145600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Nature Key Research and Development Program","award":["2017YFB1400700"],"award-info":[{"award-number":["2017YFB1400700"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,3]]},"DOI":"10.1007\/s12083-025-01906-z","type":"journal-article","created":{"date-parts":[[2025,2,10]],"date-time":"2025-02-10T04:55:36Z","timestamp":1739163336000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["AccessChain: A scalable and privacy-preserving access control scheme for blockchain-based IoT"],"prefix":"10.1007","volume":"18","author":[{"given":"Guirong","family":"Piao","sequence":"first","affiliation":[]},{"given":"Jianming","family":"Zhu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,10]]},"reference":[{"issue":"5","key":"1906_CR1","doi-asserted-by":"publisher","first-page":"8076","DOI":"10.1109\/JIOT.2019.2920987","volume":"6","author":"H Dai","year":"2019","unstructured":"Dai H, Zheng Z, Zhang Y (2019) Blockchain for internet of things: a survey. IEEE Internet Things J 6(5):8076\u20138094","journal-title":"IEEE Internet Things J"},{"key":"1906_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.102481","volume":"149","author":"J Sengupta","year":"2020","unstructured":"Sengupta J, Ruj S, Bit SD (2020) A comprehensive survey on attacks, security issues and blockchain solutions for iot and iiot. J Netw Comput Appl 149:102481","journal-title":"J Netw Comput Appl"},{"issue":"2","key":"1906_CR3","doi-asserted-by":"publisher","first-page":"1508","DOI":"10.1109\/COMST.2019.2894727","volume":"21","author":"R Yang","year":"2019","unstructured":"Yang R, Yu FR, Si P, Yang Z, Zhang Y (2019) Integrated blockchain and edge computing systems: a survey, some research issues and challenges. IEEE Commun Surv Tutorials 21(2):1508\u20131532","journal-title":"IEEE Commun Surv Tutorials"},{"issue":"6","key":"1906_CR4","doi-asserted-by":"publisher","first-page":"4682","DOI":"10.1109\/JIOT.2020.2969326","volume":"7","author":"J Qiu","year":"2020","unstructured":"Qiu J, Tian Z, Du C, Zuo Q, Su S, Fang B (2020) A survey on access control in the age of internet of things. IEEE Internet Things J 7(6):4682\u20134696","journal-title":"IEEE Internet Things J"},{"issue":"1","key":"1906_CR5","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1007\/s10922-022-09700-5","volume":"31","author":"Y Ding","year":"2023","unstructured":"Ding Y, Sato H (2023) Bloccess: enabling fine-grained access control based on blockchain. J Netw Syst Manage 31(1):6","journal-title":"J Netw Syst Manage"},{"issue":"162","key":"1906_CR6","first-page":"1","volume":"800","author":"VC Hu","year":"2013","unstructured":"Hu VC, Ferraiolo D, Kuhn R, Friedman AR, Lang AJ, Cogdell MM, Schnitzer A, Sandlin K, Miller R, Scarfone K et al (2013) Guide to attribute based access control (abac) definition and considerations (draft). NIST Spec Publ 800(162):1\u201354","journal-title":"NIST Spec Publ"},{"issue":"4","key":"1906_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3007204","volume":"49","author":"D Servos","year":"2017","unstructured":"Servos D, Osborn SL (2017) Current research and open problems in attribute-based access control. ACM Comput Surv (CSUR) 49(4):1\u201345","journal-title":"ACM Comput Surv (CSUR)"},{"issue":"7","key":"1906_CR8","doi-asserted-by":"publisher","first-page":"6566","DOI":"10.1109\/JIOT.2020.2974257","volume":"7","author":"J Sun","year":"2020","unstructured":"Sun J, Xiong H, Liu X, Zhang Y, Nie X, Deng RH (2020) Lightweight and privacy-aware fine-grained access control for iot-oriented smart health. IEEE Internet Things J 7(7):6566\u20136575","journal-title":"IEEE Internet Things J"},{"key":"1906_CR9","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1016\/j.future.2019.04.003","volume":"99","author":"K Fan","year":"2019","unstructured":"Fan K, Xu H, Gao L, Li H, Yang Y (2019) Efficient and privacy preserving access control scheme for fog-enabled iot. Futur Gener Comput Syst 99:134\u2013142","journal-title":"Futur Gener Comput Syst"},{"issue":"4","key":"1906_CR10","doi-asserted-by":"publisher","first-page":"2914","DOI":"10.1109\/JIOT.2020.2963899","volume":"7","author":"S Xiong","year":"2020","unstructured":"Xiong S, Ni Q, Wang L, Wang Q (2020) Sem-acsit: secure and efficient multiauthority access control for iot cloud storage. IEEE Internet Things J 7(4):2914\u20132927","journal-title":"IEEE Internet Things J"},{"issue":"13","key":"1906_CR11","doi-asserted-by":"publisher","first-page":"10873","DOI":"10.1109\/JIOT.2021.3050802","volume":"8","author":"J Ma","year":"2021","unstructured":"Ma J, Li T, Cui J, Ying Z, Cheng J (2021) Attribute-based secure announcement sharing among vehicles using blockchain. IEEE Internet Things J 8(13):10873\u201310883","journal-title":"IEEE Internet Things J"},{"key":"1906_CR12","doi-asserted-by":"crossref","unstructured":"Xu R, Chen Y, Blasch E, Chen G (2018) Blendcac: a blockchain-enabled decentralized capability-based access control for IoTs. Paper presented at the 2018 IEEE international conference on iThings and IEEE CreenCom and IEEE CPSCom and IEEE SmartData, 1027\u20131034","DOI":"10.1109\/Cybermatics_2018.2018.00191"},{"issue":"8","key":"1906_CR13","doi-asserted-by":"publisher","first-page":"6372","DOI":"10.1109\/JIOT.2020.3033434","volume":"8","author":"Y Zhang","year":"2020","unstructured":"Zhang Y, Yutaka M, Sasabe M, Kasahara S (2020) Attribute-based access control for smart cities: a smart-contract-driven framework. IEEE Internet Things J 8(8):6372\u20136384","journal-title":"IEEE Internet Things J"},{"key":"1906_CR14","doi-asserted-by":"crossref","unstructured":"Islam MA, Madria S (2019) A permissioned blockchain based access control system for IOT. Paper presented at the 2019 IEEE international conference on blockchain, 469\u2013476","DOI":"10.1109\/Blockchain.2019.00071"},{"issue":"1","key":"1906_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3372136","volume":"53","author":"L Lao","year":"2020","unstructured":"Lao L, Li Z, Hou S, Xiao B, Guo S, Yang Y (2020) A survey of iot applications in blockchain systems: Architecture, consensus, and traffic modeling. ACM Comput Surv (CSUR) 53(1):1\u201332","journal-title":"ACM Comput Surv (CSUR)"},{"key":"1906_CR16","first-page":"2007","volume":"179\u2013192","author":"A Kapadia","year":"2007","unstructured":"Kapadia A, Tsang PP, Smith SW (2007) Attribute-Based Publishing with Hidden Credentials and Hidden Policies. Pap presented NDSS 179\u2013192:2007","journal-title":"Pap presented NDSS"},{"issue":"3","key":"1906_CR17","doi-asserted-by":"publisher","first-page":"2130","DOI":"10.1109\/JIOT.2018.2825289","volume":"5","author":"Y Zhang","year":"2018","unstructured":"Zhang Y, Zheng D, Deng RH (2018) Security and privacy in smart health: efficient policy-hiding attribute-based access control. IEEE Internet Things J 5(3):2130\u20132145","journal-title":"IEEE Internet Things J"},{"key":"1906_CR18","doi-asserted-by":"crossref","unstructured":"Gao S, Piao G, Zhu J, Ma X, Ma J (2020) Trustaccess: a trustworthy secure ciphertext-policy and attribute hiding access control scheme based on blockchain. IEEE Trans Veh Technol 69(6):5784\u20135798","DOI":"10.1109\/TVT.2020.2967099"},{"key":"1906_CR19","doi-asserted-by":"crossref","unstructured":"Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. Paper presented at the 2007 IEEE symposium on security and privacy (SP\u201907), 321\u2013334","DOI":"10.1109\/SP.2007.11"},{"key":"1906_CR20","unstructured":"Benet J (2014) IPFS-Content addressed, versioned, P2P file system. Preprint at https:\/\/github.com\/ipfs\/ipfs\/blob\/master\/papers\/ipfs-cap2pfs\/ipfs-p2p-file-system.pdf"},{"key":"1906_CR21","doi-asserted-by":"publisher","first-page":"567","DOI":"10.1016\/j.ins.2018.02.005","volume":"479","author":"Y Yang","year":"2019","unstructured":"Yang Y, Zheng X, Guo W, Liu X, Chang V (2019) Privacy-preserving smart iot-based healthcare big data storage and self-adaptive access control system. Inf Sci 479:567\u2013592","journal-title":"Inf Sci"},{"key":"1906_CR22","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1016\/j.future.2019.02.020","volume":"96","author":"SF Aghili","year":"2019","unstructured":"Aghili SF, Mala H, Shojafar M, Peris-Lopez P (2019) Laco: lightweight three-factor authentication, access control and ownership transfer scheme for e-health systems in iot. Futur Gener Comput Syst 96:410\u2013424","journal-title":"Futur Gener Comput Syst"},{"issue":"6","key":"1906_CR23","doi-asserted-by":"publisher","first-page":"9762","DOI":"10.1109\/JIOT.2019.2931372","volume":"6","author":"S Malani","year":"2019","unstructured":"Malani S, Srinivas J, Das AK, Srinathan K, Jo M (2019) Certificate-based anonymous device access control scheme for iot environment. IEEE Internet Things J 6(6):9762\u20139773","journal-title":"IEEE Internet Things J"},{"issue":"4","key":"1906_CR24","doi-asserted-by":"publisher","first-page":"3184","DOI":"10.1109\/JIOT.2020.2966242","volume":"7","author":"S Mandal","year":"2020","unstructured":"Mandal S, Bera B, Sutrala AK, Das AK, Choo K-KR, Park Y (2020) Certificateless-signcryption-based three-factor user access control scheme for iot environment. IEEE Internet Things J 7(4):3184\u20133197","journal-title":"IEEE Internet Things J"},{"key":"1906_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102633","volume":"160","author":"K Riad","year":"2020","unstructured":"Riad K, Huang T, Ke L (2020) A dynamic and hierarchical access control for iot in multi-authority cloud storage. J Netw Comput Appl 160:102633","journal-title":"J Netw Comput Appl"},{"key":"1906_CR26","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1016\/j.comcom.2020.01.011","volume":"151","author":"M Amoon","year":"2020","unstructured":"Amoon M, Altameem T, Altameem A (2020) Rrac: role based reputed access control method for mitigating malicious impact in intelligent iot platforms. Comput Commun 151:238\u2013246","journal-title":"Comput Commun"},{"issue":"2","key":"1906_CR27","doi-asserted-by":"publisher","first-page":"1594","DOI":"10.1109\/JIOT.2018.2847705","volume":"6","author":"Y Zhang","year":"2018","unstructured":"Zhang Y, Kasahara S, Shen Y, Jiang X, Wan J (2018) Smart contract-based access control for the internet of things. IEEE Internet Things J 6(2):1594\u20131605","journal-title":"IEEE Internet Things J"},{"key":"1906_CR28","doi-asserted-by":"publisher","first-page":"106315","DOI":"10.1109\/ACCESS.2023.3318487","volume":"11","author":"T Zaidi","year":"2023","unstructured":"Zaidi T, Usman M, Aftab MU, Aljuaid H, Ghadi YY (2023) Fabrication of flexible role-based access control based on blockchain for internet of things use cases. IEEE Access. 11:106315\u2013106333","journal-title":"IEEE Access."},{"key":"1906_CR29","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1016\/j.comcom.2020.02.011","volume":"153","author":"B Bera","year":"2020","unstructured":"Bera B, Chattaraj D, Das AK (2020) Designing secure blockchain-based access control scheme in iot-enabled internet of drones deployment. Comput Commun 153:229\u2013249","journal-title":"Comput Commun"},{"issue":"11","key":"1906_CR30","doi-asserted-by":"publisher","first-page":"3517","DOI":"10.1109\/JSAC.2023.3310061","volume":"41","author":"S Qi","year":"2023","unstructured":"Qi S, Yang X, Yu J, Qi Y (2023) Blockchain-aware rollbackable data access control for iot-enabled digital twin. IEEE J Sel Areas Commun 41(11):3517\u20133532","journal-title":"IEEE J Sel Areas Commun"},{"issue":"4","key":"1906_CR31","doi-asserted-by":"publisher","first-page":"1213","DOI":"10.1109\/TEM.2020.2966643","volume":"67","author":"G Yu","year":"2020","unstructured":"Yu G, Zha X, Wang X, Ni W, Yu K, Yu P, Zhang JA, Liu RP, Guo YJ (2020) Enabling attribute revocation for fine-grained access control in blockchain-iot systems. IEEE Trans Eng Manage 67(4):1213\u20131230","journal-title":"IEEE Trans Eng Manage"},{"issue":"7","key":"1906_CR32","doi-asserted-by":"publisher","first-page":"5744","DOI":"10.1109\/JIOT.2020.3030308","volume":"8","author":"B Bera","year":"2020","unstructured":"Bera B, Saha S, Das AK, Vasilakos AV (2020) Designing blockchain-based access control protocol in iot-enabled smart-grid system. IEEE Internet Things J 8(7):5744\u20135761","journal-title":"IEEE Internet Things J"},{"key":"1906_CR33","doi-asserted-by":"crossref","unstructured":"Zahoor A, Mahmood K, Shamshad S, Saleem MA, Ayub MF, Conti M, Das AK (2023) An access control scheme in iot-enabled smart-grid systems using blockchain and puf. Internet Things 22:100708\u2013100721","DOI":"10.1016\/j.iot.2023.100708"},{"key":"1906_CR34","doi-asserted-by":"crossref","unstructured":"Saha S, Sutrala AK, Das AK, Kumar N, Rodrigues JJ (2020) On the design of blockchain-based access control protocol for IoT-enabled healthcare applications. Paper presented at the 2020 IEEE ICC, 1\u20136","DOI":"10.1109\/ICC40277.2020.9148915"},{"issue":"18","key":"1906_CR35","doi-asserted-by":"publisher","first-page":"15980","DOI":"10.1109\/JIOT.2023.3268278","volume":"10","author":"J Li","year":"2023","unstructured":"Li J, Li D, Zhang X (2023) A secure blockchain-assisted access control scheme for smart healthcare system in fog computing. IEEE Internet Things J 10(18):15980\u201315989","journal-title":"IEEE Internet Things J"},{"key":"1906_CR36","first-page":"2016","volume":"79\u201394","author":"K Delmolino","year":"2016","unstructured":"Delmolino K, Arnett M, Kosba A, Miller A, Shi E (2016) Step by step towards creating a safe smart contract: lessons and insights from a cryptocurrency lab. Pap presented Int Conf Financ Cryptography Data Secur Berlin Heidelberg 79\u201394:2016","journal-title":"Pap presented Int Conf Financ Cryptography Data Secur Berlin Heidelberg"},{"key":"1906_CR37","doi-asserted-by":"crossref","unstructured":"ElGamal T (1985) A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans Inf Theory 31(4):469\u2013472","DOI":"10.1109\/TIT.1985.1057074"},{"key":"1906_CR38","first-page":"2004","volume":"182\u2013197","author":"DH Phan","year":"2004","unstructured":"Phan DH, Pointcheval D (2004) About the security of ciphers (semantic security and pseudo-random permutations). Pap presented Int Works Select Areas Cryptography 182\u2013197:2004","journal-title":"Pap presented Int Works Select Areas Cryptography"},{"key":"1906_CR39","unstructured":"Caliper H (2023) Hyperledger caliper documentation. Preprint at https:\/\/github.com\/hyperledger\/caliper"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-01906-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-01906-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-01906-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,17]],"date-time":"2025-05-17T09:35:52Z","timestamp":1747474552000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-01906-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,10]]},"references-count":39,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,3]]}},"alternative-id":["1906"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-01906-z","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2025,2,10]]},"assertion":[{"value":"8 March 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 January 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 February 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics Approval"}},{"value":"The authors declare no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"Guirong Piao and Jianming Zhu have given their consent for the publication of this manuscript.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to Publish"}}],"article-number":"92"}}