{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T19:52:29Z","timestamp":1774122749732,"version":"3.50.1"},"reference-count":32,"publisher":"Elsevier BV","issue":"3","license":[{"start":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T00:00:00Z","timestamp":1725148800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T00:00:00Z","timestamp":1725148800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2024,1,3]],"date-time":"2024-01-03T00:00:00Z","timestamp":1704240000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["High-Confidence Computing"],"published-print":{"date-parts":[[2024,9]]},"DOI":"10.1016\/j.hcc.2024.100199","type":"journal-article","created":{"date-parts":[[2024,4,9]],"date-time":"2024-04-09T15:50:38Z","timestamp":1712677838000},"page":"100199","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":22,"title":["An attribute-based access control scheme using blockchain technology for IoT data protection"],"prefix":"10.1016","volume":"4","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9189-3224","authenticated-orcid":false,"given":"Zenghui","family":"Yang","sequence":"first","affiliation":[]},{"given":"Xiubo","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Yunfeng","family":"He","sequence":"additional","affiliation":[]},{"given":"Luxi","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yinmei","family":"Che","sequence":"additional","affiliation":[]},{"given":"Xiao","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Ke","family":"Xiao","sequence":"additional","affiliation":[]},{"given":"Gang","family":"Xu","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"15","key":"10.1016\/j.hcc.2024.100199_b1","doi-asserted-by":"crossref","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","article-title":"The internet of things: A survey","volume":"54","author":"Atzori","year":"2010","journal-title":"Comput. Netw."},{"key":"10.1016\/j.hcc.2024.100199_b2","series-title":"The NIST Definition of Cloud Computing","author":"Mell","year":"2011"},{"issue":"4","key":"10.1016\/j.hcc.2024.100199_b3","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1109\/MNET.2014.6863131","article-title":"Toward efficient and privacy-preserving computing in big data era","volume":"28","author":"Lu","year":"2014","journal-title":"IEEE Netw."},{"key":"10.1016\/j.hcc.2024.100199_b4","series-title":"Advances in Cryptology\u2013EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22\u201326, 2005. Proceedings 24","first-page":"457","article-title":"Fuzzy identity-based encryption","author":"Sahai","year":"2005"},{"key":"10.1016\/j.hcc.2024.100199_b5","doi-asserted-by":"crossref","unstructured":"V. Goyal, O. Pandey, A. Sahai, B. Waters, Attribute-based encryption for fine-grained access control of encrypted data, in: Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006, pp. 89\u201398.","DOI":"10.1145\/1180405.1180418"},{"key":"10.1016\/j.hcc.2024.100199_b6","series-title":"2007 IEEE Symposium on Security and Privacy","first-page":"321","article-title":"Ciphertext-policy attribute-based encryption","author":"Bethencourt","year":"2007"},{"key":"10.1016\/j.hcc.2024.100199_b7","series-title":"A peer-to-peer electronic cash system","first-page":"15","author":"Nakamoto","year":"2008"},{"key":"10.1016\/j.hcc.2024.100199_b8","doi-asserted-by":"crossref","unstructured":"L. Cheung, C. Newport, Provably secure ciphertext policy ABE, in: Proceedings of the 14th ACM Conference on Computer and Communications Security, 2007, pp. 456\u2013465.","DOI":"10.1145\/1315245.1315302"},{"key":"10.1016\/j.hcc.2024.100199_b9","series-title":"International Workshop on Public Key Cryptography","first-page":"53","article-title":"Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization","author":"Waters","year":"2011"},{"key":"10.1016\/j.hcc.2024.100199_b10","article-title":"Efficient generation of linear secret sharing scheme matrices from threshold access trees","author":"Liu","year":"2010","journal-title":"Cryptol. ePrint Arch."},{"key":"10.1016\/j.hcc.2024.100199_b11","series-title":"Annual International Conference on the Theory and Applications of Cryptographic Techniques","first-page":"568","article-title":"Decentralizing attribute-based encryption","author":"Lewko","year":"2011"},{"key":"10.1016\/j.hcc.2024.100199_b12","series-title":"Applied Cryptography and Network Security: 6th International Conference, ACNS 2008, New York, NY, USA, June 3\u20136, 2008. Proceedings 6","first-page":"111","article-title":"Attribute-based encryption with partially hidden encryptor-specified access structures","author":"Nishide","year":"2008"},{"key":"10.1016\/j.hcc.2024.100199_b13","series-title":"Information Security Practice and Experience: 7th International Conference, ISPEC 2011, Guangzhou, China, May 30\u2013June 1, 2011. Proceedings 7","first-page":"24","article-title":"Fully secure cipertext-policy hiding CP-ABE","author":"Lai","year":"2011"},{"key":"10.1016\/j.hcc.2024.100199_b14","series-title":"Advances in Cryptology\u2013EUROCRYPT 2008: 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13\u201317, 2008. Proceedings 27","first-page":"146","article-title":"Predicate encryption supporting disjunctions, polynomial equations, and inner products","author":"Katz","year":"2008"},{"key":"10.1016\/j.hcc.2024.100199_b15","doi-asserted-by":"crossref","unstructured":"J. Lai, R.H. Deng, Y. Li, Expressive CP-ABE with partially hidden access structures, in: Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, 2012, pp. 18\u201319.","DOI":"10.1145\/2414456.2414465"},{"issue":"2","key":"10.1016\/j.hcc.2024.100199_b16","doi-asserted-by":"crossref","first-page":"563","DOI":"10.1109\/JIOT.2016.2571718","article-title":"An efficient and fine-grained big data access control scheme with privacy-preserving policy","volume":"4","author":"Yang","year":"2016","journal-title":"IEEE Internet Things J."},{"issue":"6","key":"10.1016\/j.hcc.2024.100199_b17","doi-asserted-by":"crossref","first-page":"5784","DOI":"10.1109\/TVT.2020.2967099","article-title":"Trustaccess: A trustworthy secure ciphertext-policy and attribute hiding access control scheme based on blockchain","volume":"69","author":"Gao","year":"2020","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"3","key":"10.1016\/j.hcc.2024.100199_b18","doi-asserted-by":"crossref","first-page":"2130","DOI":"10.1109\/JIOT.2018.2825289","article-title":"Security and privacy in smart health: Efficient policy-hiding attribute-based access control","volume":"5","author":"Zhang","year":"2018","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.hcc.2024.100199_b19","doi-asserted-by":"crossref","first-page":"12240","DOI":"10.1109\/ACCESS.2018.2812844","article-title":"RBAC-SC: Role-based access control using smart contract","volume":"6","author":"Cruz","year":"2018","journal-title":"IEEE Access"},{"issue":"2","key":"10.1016\/j.hcc.2024.100199_b20","doi-asserted-by":"crossref","first-page":"1184","DOI":"10.1109\/JIOT.2018.2812239","article-title":"Blockchain meets IoT: An architecture for scalable access management in IoT","volume":"5","author":"Novo","year":"2018","journal-title":"IEEE Internet Things J."},{"issue":"5","key":"10.1016\/j.hcc.2024.100199_b21","doi-asserted-by":"crossref","first-page":"762","DOI":"10.1109\/TSC.2018.2853167","article-title":"Blockchain for large-scale internet of things data storage and protection","volume":"12","author":"Li","year":"2018","journal-title":"IEEE Trans. Serv. Comput."},{"key":"10.1016\/j.hcc.2024.100199_b22","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1016\/j.scs.2018.02.014","article-title":"Ancile: Privacy-preserving framework for access control and interoperability of electronic health records using blockchain technology","volume":"39","author":"Dagher","year":"2018","journal-title":"Sustain. Cities Soc."},{"issue":"4","key":"10.1016\/j.hcc.2024.100199_b23","doi-asserted-by":"crossref","first-page":"5521","DOI":"10.1109\/JSYST.2022.3173538","article-title":"Efficient medical big data management with keyword-searchable encryption in healthchain","volume":"16","author":"Li","year":"2022","journal-title":"IEEE Syst. J."},{"key":"10.1016\/j.hcc.2024.100199_b24","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11227-021-04257-7","article-title":"Blockchain-based cloud storage system with CP-ABE-based access control and revocation process","author":"Sharma","year":"2022","journal-title":"J. Supercomput."},{"key":"10.1016\/j.hcc.2024.100199_b25","article-title":"Cloud storage data access control scheme based on blockchain and attribute-based encryption","volume":"2022","author":"Yang","year":"2022","journal-title":"Secur. Commun. Netw."},{"key":"10.1016\/j.hcc.2024.100199_b26","series-title":"2021 IEEE 18th International Conference on Mobile Ad Hoc and Smart Systems","first-page":"269","article-title":"Blockchain meets COVID-19: A framework for contact information sharing and risk notification system","author":"Song","year":"2021"},{"issue":"3","key":"10.1016\/j.hcc.2024.100199_b27","doi-asserted-by":"crossref","first-page":"2869","DOI":"10.1109\/TNSM.2023.3237685","article-title":"FingerChain: Copyrighted multi-owner media sharing by introducing asymmetric fingerprinting into blockchain","volume":"20","author":"Xiao","year":"2023","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"10.1016\/j.hcc.2024.100199_b28","first-page":"1","article-title":"Smart contract assisted privacy-preserving data aggregation and management scheme for smart grid","author":"Hu","year":"2023","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"10.1016\/j.hcc.2024.100199_b29","series-title":"Secure Schemes for Secret Sharing and Key Distribution","author":"Beimel","year":"1996"},{"key":"10.1016\/j.hcc.2024.100199_b30","series-title":"2011 IEEE Symposium on Computers and Communications","first-page":"850","article-title":"jPBC: Java pairing based cryptography","author":"De Caro","year":"2011"},{"key":"10.1016\/j.hcc.2024.100199_b31","doi-asserted-by":"crossref","DOI":"10.1016\/j.csi.2022.103696","article-title":"Ciphertext-policy attribute-based encryption supporting policy-hiding and cloud auditing in smart health","volume":"84","author":"Wang","year":"2023","journal-title":"Comput. Stand. Interfaces"},{"issue":"7","key":"10.1016\/j.hcc.2024.100199_b32","doi-asserted-by":"crossref","first-page":"6566","DOI":"10.1109\/JIOT.2020.2974257","article-title":"Lightweight and privacy-aware fine-grained access control for IoT-oriented smart health","volume":"7","author":"Sun","year":"2020","journal-title":"IEEE Internet Things J."}],"container-title":["High-Confidence Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2667295224000023?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2667295224000023?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,9,24]],"date-time":"2024-09-24T16:19:18Z","timestamp":1727194758000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2667295224000023"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9]]},"references-count":32,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,9]]}},"alternative-id":["S2667295224000023"],"URL":"https:\/\/doi.org\/10.1016\/j.hcc.2024.100199","relation":{},"ISSN":["2667-2952"],"issn-type":[{"value":"2667-2952","type":"print"}],"subject":[],"published":{"date-parts":[[2024,9]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"An attribute-based access control scheme using blockchain technology for IoT data protection","name":"articletitle","label":"Article Title"},{"value":"High-Confidence Computing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.hcc.2024.100199","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2024 The Author(s). Published by Elsevier B.V. on behalf of Shandong University.","name":"copyright","label":"Copyright"}],"article-number":"100199"}}