{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T15:44:36Z","timestamp":1761752676841,"version":"build-2065373602"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2025,9,24]],"date-time":"2025-09-24T00:00:00Z","timestamp":1758672000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,9,24]],"date-time":"2025-09-24T00:00:00Z","timestamp":1758672000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["3282023012","3282025041"],"award-info":[{"award-number":["3282023012","3282025041"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J. King Saud Univ. Comput. Inf. Sci."],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1007\/s44443-025-00254-5","type":"journal-article","created":{"date-parts":[[2025,9,24]],"date-time":"2025-09-24T16:23:08Z","timestamp":1758730988000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A fine-grained bilateral access control scheme under policy and attribute hiding for cloud-fog-assisted IoT"],"prefix":"10.1007","volume":"37","author":[{"given":"Kejun","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Xinying","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Wenbin","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Pengcheng","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Duo","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Ying","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,24]]},"reference":[{"issue":"21","key":"254_CR1","doi-asserted-by":"publisher","first-page":"6440","DOI":"10.1002\/cpe.6440","volume":"33","author":"N Agrawal","year":"2021","unstructured":"Agrawal N (2021) Dynamic load balancing assisted optimized access control mechanism for edge-fog-cloud network in internet of things environment. Concurren Comput Pract Exper 33(21):6440","journal-title":"Concurren Comput Pract Exper"},{"issue":"4","key":"254_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/IJEHMC.2019100101","volume":"10","author":"N Alassaf","year":"2019","unstructured":"Alassaf N, Gutub A (2019) Simulating light-weight-cryptography implementation for iot healthcare data security applications. Intern J E-Health Med Commun 10(4):1\u201315","journal-title":"Intern J E-Health Med Commun"},{"key":"254_CR3","doi-asserted-by":"crossref","unstructured":"Ateniese G, Francati D, Nu\u00f1ez D, Venturi D (2019) Match me if you can: Matchmaking encryption and its applications. In: Advances in Cryptology\u2013CRYPTO 2019: 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18\u201322, 2019, Proceedings, Part II 39, pp 701\u2013731. Springer","DOI":"10.1007\/978-3-030-26951-7_24"},{"key":"254_CR4","doi-asserted-by":"crossref","unstructured":"Attrapadung N, Imai H (2009) Dual-policy attribute based encryption. In: Applied Cryptography and Network Security: 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings 7, pp 168\u2013185. Springer","DOI":"10.1007\/978-3-642-01957-9_11"},{"key":"254_CR5","doi-asserted-by":"crossref","unstructured":"Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy (SP\u201907), pp 321\u2013334. IEEE","DOI":"10.1109\/SP.2007.11"},{"issue":"1","key":"254_CR6","doi-asserted-by":"publisher","first-page":"821","DOI":"10.1109\/TII.2022.3167842","volume":"19","author":"S Das","year":"2022","unstructured":"Das S, Namasudra S (2022) Multiauthority cp-abe-based access control model for iot-enabled healthcare infrastructure. IEEE Trans Industr Inf 19(1):821\u2013829","journal-title":"IEEE Trans Industr Inf"},{"issue":"6","key":"254_CR7","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1145\/3592835","volume":"66","author":"LD Feo","year":"2023","unstructured":"Feo LD, Poettering B, Sorniotti A (2023) On the (in)security of elgamal in openpgp. Commun ACM 66(6):107\u2013115","journal-title":"Commun ACM"},{"key":"254_CR8","doi-asserted-by":"crossref","unstructured":"Gagn\u00e9 M, Narayan S, Safavi-Naini R (2010) Threshold attribute-based signcryption. In: International Conference on Security and Cryptography for Networks, pp 154\u2013171. Springer","DOI":"10.1007\/978-3-642-15317-4_11"},{"issue":"6","key":"254_CR9","doi-asserted-by":"publisher","first-page":"5784","DOI":"10.1109\/TVT.2020.2967099","volume":"69","author":"S Gao","year":"2020","unstructured":"Gao S, Piao G, Zhu J, Ma X, Ma J (2020) Trustaccess: A trustworthy secure ciphertext-policy and attribute hiding access control scheme based on blockchain. IEEE Trans Veh Technol 69(6):5784\u20135798","journal-title":"IEEE Trans Veh Technol"},{"key":"254_CR10","doi-asserted-by":"crossref","unstructured":"Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp 89\u201398","DOI":"10.1145\/1180405.1180418"},{"key":"254_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11432-020-2957-5","volume":"64","author":"Z Guan","year":"2021","unstructured":"Guan Z, Yang W, Zhu L, Wu L, Wang R (2021) Achieving adaptively secure data access control with privacy protection for lightweight iot devices. Sci China Inf Sci 64:1\u201314","journal-title":"Sci China Inf Sci"},{"issue":"01","key":"254_CR12","first-page":"49","volume":"12","author":"R Guo","year":"2025","unstructured":"Guo R, Yang X, Jia C, Wang J (2025) A searchable attribute-based encryption scheme supporting policy hiding in cloud-assisted internet of medical things. J Cryptolog Res 12(01):49\u201368","journal-title":"J Cryptolog Res"},{"issue":"1","key":"254_CR13","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/j.jer.2023.09.014","volume":"12","author":"A Gutub","year":"2024","unstructured":"Gutub A (2024) Adjusting counting-based secret-sharing via personalized passwords and email-authentic reliability. J Eng Res 12(1):107\u2013121","journal-title":"J Eng Res"},{"key":"254_CR14","first-page":"36748","volume":"11","author":"X Hu","year":"2024","unstructured":"Hu X, Wang L, Gu L, Ning Y (2024) A bilateral access control data sharing scheme for internet of vehicles. IEEE Int Things J 11:36748\u201336762","journal-title":"IEEE Int Things J"},{"issue":"8","key":"254_CR15","doi-asserted-by":"publisher","first-page":"10333","DOI":"10.1109\/JIOT.2024.3513326","volume":"12","author":"Q-A Huang","year":"2025","unstructured":"Huang Q-A, Si Y-W (2025) Certificateless and revocable bilateral access control for privacy-preserving edge-cloud computing. IEEE Intern Things J 12(8):10333\u201310348","journal-title":"IEEE Intern Things J"},{"key":"254_CR16","doi-asserted-by":"crossref","unstructured":"Jiang Y, Zhang K, Qian Y, Zhou L (2020) An optimization framework for privacy-preserving access control in cloud-fog computing systems. In: 2020 IEEE 92nd Vehicular Technology Conference (VTC2020-Fall), pp 1\u20135. IEEE","DOI":"10.1109\/VTC2020-Fall49728.2020.9348516"},{"issue":"2","key":"254_CR17","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/s00145-012-9119-4","volume":"26","author":"J Katz","year":"2013","unstructured":"Katz J, Sahai A, Waters B (2013) Predicate encryption supporting disjunctions, polynomial equations, and inner products. J Cryptol 26(2):191\u2013224","journal-title":"J Cryptol"},{"key":"254_CR18","doi-asserted-by":"crossref","unstructured":"Lai J, Deng RH, Li Y (2012) Expressive cp-abe with partially hidden access structures. In: Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, pp 18\u201319","DOI":"10.1145\/2414456.2414465"},{"key":"254_CR19","doi-asserted-by":"crossref","unstructured":"Lai J, Deng RH, Li Y (2011) Fully secure cipertext-policy hiding cp-abe. In: Information Security Practice and Experience: 7th International Conference, ISPEC 2011, Guangzhou, China, May 30\u2013June 1, 2011. Proceedings 7, pp 24\u201339. Springer","DOI":"10.1007\/978-3-642-21031-0_3"},{"issue":"5","key":"254_CR20","doi-asserted-by":"publisher","first-page":"3437","DOI":"10.1109\/TII.2021.3109090","volume":"18","author":"Q Li","year":"2021","unstructured":"Li Q, Xia B, Huang H, Zhang Y, Zhang T (2021) Trac: traceable and revocable access control scheme for mhealth in 5g-enabled iiot. IEEE Trans Industr Inf 18(5):3437\u20133448","journal-title":"IEEE Trans Industr Inf"},{"issue":"18","key":"254_CR21","doi-asserted-by":"publisher","first-page":"16917","DOI":"10.1109\/JIOT.2022.3146197","volume":"9","author":"Q Li","year":"2022","unstructured":"Li Q, Zhang Q, Huang H, Zhang W, Chen W, Wang H (2022) Secure, efficient, and weighted access control for cloud-assisted industrial iot. IEEE Intern Things J 9(18):16917\u201316927","journal-title":"IEEE Intern Things J"},{"issue":"4","key":"254_CR22","first-page":"128","volume":"45","author":"Q Li","year":"2024","unstructured":"Li Q, Fan H, Chen W, Xiong J, Han L, Li R (2024) Attribute-based bilateral access control scheme for cloud storage. J Commun 45(4):128\u2013136","journal-title":"J Commun"},{"issue":"10","key":"254_CR23","first-page":"2190","volume":"59","author":"Q Liu","year":"2022","unstructured":"Liu Q, Jin Z, Chen C, Gao X, Zheng N, Fang Y, Feng Y (2022) Survey on internet of things access control security. J Comput Res Dev 59(10):2190\u20132211","journal-title":"J Comput Res Dev"},{"key":"254_CR24","doi-asserted-by":"publisher","first-page":"4444","DOI":"10.1109\/TSC.2023.3324736","volume":"16","author":"J Ma","year":"2023","unstructured":"Ma J, Xu S, Ning J, Huang X, Deng RH (2023) Catch me if you can: A secure bilateral access control system with anonymous credentials. IEEE Trans Serv Comput 16:4444\u20134455","journal-title":"IEEE Trans Serv Comput"},{"issue":"10","key":"254_CR25","doi-asserted-by":"publisher","first-page":"3520","DOI":"10.3390\/s18103520","volume":"18","author":"Y Ming","year":"2018","unstructured":"Ming Y, Zhang T (2018) Efficient privacy-preserving access control scheme in electronic health records system. Sensors 18(10):3520","journal-title":"Sensors"},{"key":"254_CR26","doi-asserted-by":"crossref","unstructured":"Nishide T, Yoneyama K, Ohta K (2008) Attribute-based encryption with partially hidden encryptor-specified access\u00a0structures. In: Applied Cryptography and Network Security: 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings 6, pp 111\u2013129. Springer","DOI":"10.1007\/978-3-540-68914-0_7"},{"issue":"5","key":"254_CR27","doi-asserted-by":"publisher","first-page":"529","DOI":"10.1007\/s40009-023-01383-z","volume":"47","author":"A Raj","year":"2024","unstructured":"Raj A, Prakash S (2024) A secure blockchain-based access control architecture for iot-healthcare applications. Nat Acad Sci Lett 47(5):529\u2013537","journal-title":"Nat Acad Sci Lett"},{"key":"254_CR28","unstructured":"Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Advances in Cryptology\u2013EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005. Proceedings 24, pp 457\u2013473. Springer"},{"key":"254_CR29","unstructured":"Shoup V, Beguelin SZ (2004) Sequences of games: a tool for taming complexity in security proofs 2004:332\u2013365"},{"issue":"8","key":"254_CR30","doi-asserted-by":"publisher","first-page":"9801","DOI":"10.1007\/s13369-021-06348-2","volume":"47","author":"A Singh","year":"2022","unstructured":"Singh A, Satapathy SC, Roy A, Gutub A (2022) Ai-based mobile edge computing for iot: Applications, challenges, and future scope. Arab J Sci Eng 47(8):9801\u20139831","journal-title":"Arab J Sci Eng"},{"issue":"9","key":"254_CR31","doi-asserted-by":"publisher","first-page":"6483","DOI":"10.1109\/TII.2021.3133345","volume":"18","author":"J Sun","year":"2022","unstructured":"Sun J, Yuan Y, Tang M, Cheng X, Nie X, Aftab MU (2022) Privacy-preserving bilateral fine-grained access control for cloud-enabled industrial iot healthcare. IEEE Trans Industr Inf 18(9):6483\u20136493","journal-title":"IEEE Trans Industr Inf"},{"key":"254_CR32","doi-asserted-by":"publisher","first-page":"14814","DOI":"10.1109\/JIOT.2023.3344577","volume":"11","author":"T Wu","year":"2024","unstructured":"Wu T, Ma X, Zhang C, Liu X, Yang G, Zhu L (2024) Toward fine-grained task allocation with bilateral access control for intelligent transportation systems. IEEE Internet Things J 11:14814\u201314828","journal-title":"IEEE Internet Things J"},{"key":"254_CR33","doi-asserted-by":"publisher","first-page":"659","DOI":"10.1109\/TCC.2024.3386126","volume":"12","author":"A Wu","year":"2024","unstructured":"Wu A, Zhang Y, Zhu J, Zhao Q, Zhang Y (2024) Hierarchal bilateral access control with constant size ciphertexts for mobile cloud computing. IEEE Trans Cloud Comput 12:659\u2013670","journal-title":"IEEE Trans Cloud Comput"},{"key":"254_CR34","doi-asserted-by":"crossref","unstructured":"Xu S, Ning J, Ma J, Huang X, Pang HH, Deng RH (2021) Expressive bilateral access control for internet-of-things in cloud-fog computing. In: Proceedings of the 26th ACM Symposium on Access Control Models and Technologies, pp 143\u2013154","DOI":"10.1145\/3450569.3463561"},{"issue":"2","key":"254_CR35","first-page":"1064","volume":"19","author":"S Xu","year":"2020","unstructured":"Xu S, Ning J, Li Y, Zhang Y, Xu G, Huang X, Deng RH (2020) Match in my way: Fine-grained bilateral access control for secure cloud-fog computing. IEEE Trans Dependable Secure Comput 19(2):1064\u20131077","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"2","key":"254_CR36","doi-asserted-by":"publisher","first-page":"563","DOI":"10.1109\/JIOT.2016.2571718","volume":"4","author":"K Yang","year":"2017","unstructured":"Yang K, Han Q, Li H, Zheng K, Su Z, Shen X (2017) An efficient and fine-grained big data access control scheme with privacy-preserving policy. IEEE Internet Things J 4(2):563\u2013571","journal-title":"IEEE Internet Things J"},{"issue":"8","key":"254_CR37","first-page":"188","volume":"42","author":"Y Yang","year":"2021","unstructured":"Yang Y, Zhou W, Zhao S, Liu C, Zhang Y, Wang H, Wang W, Zhang Y (2021) Survey of iot security research: threats, detection and defense. J Commun 42(8):188\u2013205","journal-title":"J Commun"},{"key":"254_CR38","doi-asserted-by":"publisher","first-page":"53698","DOI":"10.1109\/ACCESS.2018.2871170","volume":"6","author":"Z Ying","year":"2018","unstructured":"Ying Z, Wei L, Li Q, Liu X, Cui J (2018) A lightweight policy preserving ehr sharing scheme in the cloud. IEEE Access 6:53698\u201353708","journal-title":"IEEE Access"},{"issue":"6","key":"254_CR39","doi-asserted-by":"publisher","first-page":"3485","DOI":"10.1109\/TSC.2021.3096177","volume":"15","author":"Z Ying","year":"2022","unstructured":"Ying Z, Jiang W, Liu X, Xu S, Deng RH (2022) Reliable policy updating under efficient policy hidden fine-grained access control framework for cloud data sharing. IEEE Trans Serv Comput 15(6):3485\u20133498","journal-title":"IEEE Trans Serv Comput"},{"issue":"3","key":"254_CR40","doi-asserted-by":"publisher","first-page":"2130","DOI":"10.1109\/JIOT.2018.2825289","volume":"5","author":"Y Zhang","year":"2018","unstructured":"Zhang Y, Zheng D, Deng RH (2018) Security and privacy in smart health: Efficient policy-hiding attribute-based access control. IEEE Inter Things J 5(3):2130\u20132145","journal-title":"IEEE Inter Things J"},{"key":"254_CR41","doi-asserted-by":"publisher","first-page":"5286","DOI":"10.1109\/TIFS.2023.3303720","volume":"18","author":"K Zhang","year":"2023","unstructured":"Zhang K, Wang X, Ning J, Gong J, Huang X (2023) Secure cloud-assisted data pub\/sub service with fine-grained bilateral access control. IEEE Trans Inf Forensics Secur 18:5286\u20135301","journal-title":"IEEE Trans Inf Forensics Secur"}],"container-title":["Journal of King Saud University Computer and Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44443-025-00254-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s44443-025-00254-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44443-025-00254-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T15:41:06Z","timestamp":1761752466000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s44443-025-00254-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,24]]},"references-count":41,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2025,10]]}},"alternative-id":["254"],"URL":"https:\/\/doi.org\/10.1007\/s44443-025-00254-5","relation":{},"ISSN":["1319-1578","2213-1248"],"issn-type":[{"type":"print","value":"1319-1578"},{"type":"electronic","value":"2213-1248"}],"subject":[],"published":{"date-parts":[[2025,9,24]]},"assertion":[{"value":"7 May 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 August 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 September 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no relevant financial or non-financial interests to disclose.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}}],"article-number":"240"}}