{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,15]],"date-time":"2026-02-15T08:56:15Z","timestamp":1771145775966,"version":"3.50.1"},"reference-count":42,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2021,3,15]],"date-time":"2021-03-15T00:00:00Z","timestamp":1615766400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61972294, 61932016, 61822202, 62032005, 61772377, and 61841701"],"award-info":[{"award-number":["61972294, 61932016, 61822202, 62032005, 61772377, and 61841701"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Natural Science Foundation of Hubei Province of China","award":["2017CFA007"],"award-info":[{"award-number":["2017CFA007"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Internet Technol."],"published-print":{"date-parts":[[2021,6,23]]},"abstract":"<jats:p>\n            The sensing-as-a-service (SaaS) model has been explored to address the challenge of intractability of managing a large number of sensors faced by future smart cities. However, how to effectively share sensor data without compromising confidentiality, privacy protection, and fair trading without third parties is one of critical issues that must be solved in the SaaS in smart cities. While blockchain shows promise in solving these issues, the existing blockchain-based data sharing (BBDS) systems are difficult to apply to SaaS in smart cities because of many unresolved issues such as requiring a customized blockchain, huge storage, communication and computation costs, and dependence on a third party to achieve fair trading. We propose a BBDS system model with its security requirements before we present a concrete construction by combining\n            <jats:inline-formula>\n              <jats:alternatives>\n                <jats:tex-math>\n                  \n                <\/jats:tex-math>\n              <\/jats:alternatives>\n            <\/jats:inline-formula>\n            -protocol, Paillier encryption scheme, and any secure symmetrical encryption and signature schemes. To demonstrate the utility of our proposed BBDS system, we present a security analysis and compare our system with other solutions. We implement the prototype in Remix to analyze the gas cost, and we conduct experiments to evaluate the communication and computation costs of the BBDS system using symmetric encryption (advanced encryption standard (AES)) and a signature scheme (elliptic curve digital signature algorithm (ECDSA)).\n          <\/jats:p>","DOI":"10.1145\/3397202","type":"journal-article","created":{"date-parts":[[2020,7,7]],"date-time":"2020-07-07T12:39:34Z","timestamp":1594125574000},"page":"1-21","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Blockchain-based Data Sharing System for Sensing-as-a-Service in Smart Cities"],"prefix":"10.1145","volume":"21","author":[{"given":"Chao","family":"Lin","sequence":"first","affiliation":[{"name":"School of Cyber Science and Engineering, Wuhan University, China and Cyberspace Security Research Center, Peng Cheng Laboratory, China"}]},{"given":"Debiao","family":"He","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Wuhan University, China and Cyberspace Security Research Center, Peng Cheng Laboratory, China"}]},{"given":"Sherali","family":"Zeadally","sequence":"additional","affiliation":[{"name":"College of Communication and Information, University of Kentucky, USA"}]},{"given":"Xinyi","family":"Huang","sequence":"additional","affiliation":[{"name":"College of Mathematics and Informatics, Fujian Normal University, China and Fujian Provincial Key Laboratory of Network Security and Cryptology, China"}]},{"given":"Zhe","family":"Liu","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, China"}]}],"member":"320","published-online":{"date-parts":[[2021,3,15]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/IRI.2017.60"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/168588.168596"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3339252.3339279"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134060"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.07.015"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2210880"},{"key":"e_1_2_1_7_1","volume-title":"Jun Han, and Paul Sarda.","author":"Morshed Chowdhury Mohammad Jabed","year":"2018","unstructured":"Mohammad Jabed Morshed Chowdhury , Alan Colman , Muhammad Ashad Kabir , Jun Han, and Paul Sarda. 2018 . Blockchain as a notarization service for data sharing with personal data store. In Proceedings of the 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and the 12th IEEE International Conference on Big Data Science and Engineering. IEEE , 1330\u20131335. DOI:https:\/\/doi.org\/10.1109\/TrustCom\/BigDataSE.2018.00183 10.1109\/TrustCom Mohammad Jabed Morshed Chowdhury, Alan Colman, Muhammad Ashad Kabir, Jun Han, and Paul Sarda. 2018. Blockchain as a notarization service for data sharing with personal data store. In Proceedings of the 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and the 12th IEEE International Conference on Big Data Science and Engineering. IEEE, 1330\u20131335. DOI:https:\/\/doi.org\/10.1109\/TrustCom\/BigDataSE.2018.00183"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-010-0119-9"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1210263.1210265"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243857"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2013.63"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/36664.36676"},{"key":"e_1_2_1_13_1","volume-title":"McClean","author":"Gaur Aditya","year":"2015","unstructured":"Aditya Gaur , Bryan W. Scotney , Gerard P. Parr , and Sally I . McClean . 2015 . Smart city architecture and its applications based on IoT. In Proceedings of the 6th International Conference on Ambient Systems, Networks and Technologies and the 5th International Conference on Sustainable Energy Information Technology (Procedia Computer Science), Elhadi M. Shakshuki (Ed.), Vol. 52 . Elsevier , 1089\u20131094. DOI:https:\/\/doi.org\/10.1016\/j.procs.2015.05.122 10.1016\/j.procs.2015.05.122 Aditya Gaur, Bryan W. Scotney, Gerard P. Parr, and Sally I. McClean. 2015. Smart city architecture and its applications based on IoT. In Proceedings of the 6th International Conference on Ambient Systems, Networks and Technologies and the 5th International Conference on Sustainable Energy Information Technology (Procedia Computer Science), Elhadi M. Shakshuki (Ed.), Vol. 52. Elsevier, 1089\u20131094. DOI:https:\/\/doi.org\/10.1016\/j.procs.2015.05.122"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-net.2017.0163"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.3390\/s18041212"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36095-4_18"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2875542"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858789"},{"key":"e_1_2_1_19_1","volume-title":"Proceedings of the International Conference on Information and Communication Technology. IEEE, 1031\u20131033","author":"Lim Jae-Deok","year":"2015","unstructured":"Yun-kyung Lee, Jae-Deok Lim , Yong-seong Jeon, and Jeong-Nyeo Kim . 2015 . Technology trends of access control in IoT and requirements analysis . In Proceedings of the International Conference on Information and Communication Technology. IEEE, 1031\u20131033 . DOI:https:\/\/doi.org\/10.1109\/ICTC.2015.7354730 10.1109\/ICTC.2015.7354730 Yun-kyung Lee, Jae-Deok Lim, Yong-seong Jeon, and Jeong-Nyeo Kim. 2015. Technology trends of access control in IoT and requirements analysis. In Proceedings of the International Conference on Information and Communication Technology. IEEE, 1031\u20131033. DOI:https:\/\/doi.org\/10.1109\/ICTC.2015.7354730"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/INCoS.2013.103"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.05.005"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/BLOC.2019.8751336"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2812239"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2017.05.025"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1002\/ett.2704"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9013372"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3140649.3140656"},{"key":"e_1_2_1_28_1","volume-title":"Sidechain technologies in blockchain networks: An examination and state-of-the-art review. J. Netw. Comput. Applic. 149","author":"Singh Amritraj","year":"2020","unstructured":"Amritraj Singh , Kelly Click , Reza M. Parizi , Qi Zhang , Ali Dehghantanha , and Kim-Kwang Raymond Choo . 2020. Sidechain technologies in blockchain networks: An examination and state-of-the-art review. J. Netw. Comput. Applic. 149 ( 2020 ). DOI:https:\/\/doi.org\/10.1016\/j.jnca.2019.102471 10.1016\/j.jnca.2019.102471 Amritraj Singh, Kelly Click, Reza M. Parizi, Qi Zhang, Ali Dehghantanha, and Kim-Kwang Raymond Choo. 2020. Sidechain technologies in blockchain networks: An examination and state-of-the-art review. J. Netw. Comput. Applic. 149 (2020). DOI:https:\/\/doi.org\/10.1016\/j.jnca.2019.102471"},{"key":"e_1_2_1_29_1","volume-title":"Kim-Kwang Raymond Choo, and Ali Dehghantanha","author":"Singh Amritraj","year":"2020","unstructured":"Amritraj Singh , Reza M. Parizi , Qi Zhang , Kim-Kwang Raymond Choo, and Ali Dehghantanha . 2020 . Blockchain smart contracts formalization: Approaches and challenges to address vulnerabilities. Comput. Sec . 88 (2020). DOI:https:\/\/doi.org\/10.1016\/j.cose.2019.101654 10.1016\/j.cose.2019.101654 Amritraj Singh, Reza M. Parizi, Qi Zhang, Kim-Kwang Raymond Choo, and Ali Dehghantanha. 2020. Blockchain smart contracts formalization: Approaches and challenges to address vulnerabilities. Comput. Sec. 88 (2020). DOI:https:\/\/doi.org\/10.1016\/j.cose.2019.101654"},{"key":"e_1_2_1_30_1","volume-title":"Blockchain based intelligent vehicle data sharing framework. CoRR abs\/1708.09721","author":"Singh Madhusudan","year":"2017","unstructured":"Madhusudan Singh and Shiho Kim . 2017. Blockchain based intelligent vehicle data sharing framework. CoRR abs\/1708.09721 ( 2017 ). Madhusudan Singh and Shiho Kim. 2017. Blockchain based intelligent vehicle data sharing framework. CoRR abs\/1708.09721 (2017)."},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICECC.2011.6066743"},{"key":"e_1_2_1_32_1","first-page":"2754","article-title":"PreBAC: A novel access control scheme based proxy re-encryption for cloud computing","volume":"13","author":"Su Mang","year":"2019","unstructured":"Mang Su and Liangchen Wang . 2019 . PreBAC: A novel access control scheme based proxy re-encryption for cloud computing . ACM Trans. Interact. Intell. Syst. 13 , 5 (2019), 2754 \u2013 2767 . DOI:https:\/\/doi.org\/10.3837\/tiis.2019.05.028 10.3837\/tiis.2019.05.028 Mang Su and Liangchen Wang. 2019. PreBAC: A novel access control scheme based proxy re-encryption for cloud computing. ACM Trans. Interact. Intell. Syst. 13, 5 (2019), 2754\u20132767. DOI:https:\/\/doi.org\/10.3837\/tiis.2019.05.028","journal-title":"ACM Trans. Interact. Intell. Syst."},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/3051781"},{"key":"e_1_2_1_34_1","volume-title":"Margaretha Mazura, Mark Harrison, Markus Eisenhauer et\u00a0al.","author":"Vermesan Ovidiu","year":"2011","unstructured":"Ovidiu Vermesan , Peter Friess , Patrick Guillemin , Sergio Gusmeroli , Harald Sundmaeker , Alessandro Bassi , Ignacio Soler Jubert , Margaretha Mazura, Mark Harrison, Markus Eisenhauer et\u00a0al. 2011 . Internet of things strategic research roadmap. Internet Things\u2014Global Technol. Soc. Trends 1, 2011 (2011), 9\u201352. Ovidiu Vermesan, Peter Friess, Patrick Guillemin, Sergio Gusmeroli, Harald Sundmaeker, Alessandro Bassi, Ignacio Soler Jubert, Margaretha Mazura, Mark Harrison, Markus Eisenhauer et\u00a0al. 2011. Internet of things strategic research roadmap. Internet Things\u2014Global Technol. Soc. Trends 1, 2011 (2011), 9\u201352."},{"key":"e_1_2_1_35_1","first-page":"1","article-title":"Ethereum: A secure decentralised generalised transaction ledger","volume":"151","author":"\u00a0al Gavin Wood","year":"2014","unstructured":"Gavin Wood et \u00a0al . 2014 . Ethereum: A secure decentralised generalised transaction ledger . Ether. Proj. Yell. Pap. 151 , 2014 (2014), 1 \u2013 32 . Gavin Wood et\u00a0al. 2014. Ethereum: A secure decentralised generalised transaction ledger. Ether. Proj. Yell. Pap. 151, 2014 (2014), 1\u201332.","journal-title":"Ether. Proj. Yell. Pap."},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484383"},{"key":"e_1_2_1_37_1","volume-title":"P4-to-blockchain: A secure blockchain-enabled packet parser for software defined networking. Comput. Sec. 88","author":"Yazdinejad Abbas","year":"2020","unstructured":"Abbas Yazdinejad , Reza M. Parizi , Ali Dehghantanha , and Kim-Kwang Raymond Choo . 2020. P4-to-blockchain: A secure blockchain-enabled packet parser for software defined networking. Comput. Sec. 88 ( 2020 ). DOI:https:\/\/doi.org\/10.1016\/j.cose.2019.101629 10.1016\/j.cose.2019.101629 Abbas Yazdinejad, Reza M. Parizi, Ali Dehghantanha, and Kim-Kwang Raymond Choo. 2020. P4-to-blockchain: A secure blockchain-enabled packet parser for software defined networking. Comput. Sec. 88 (2020). DOI:https:\/\/doi.org\/10.1016\/j.cose.2019.101629"},{"key":"e_1_2_1_38_1","volume-title":"Sensing as a service and big data. CoRR abs\/1301.0159","author":"Zaslavsky Arkady B.","year":"2013","unstructured":"Arkady B. Zaslavsky , Charith Perera , and Dimitrios Georgakopoulos . 2013. Sensing as a service and big data. CoRR abs\/1301.0159 ( 2013 ). Arkady B. Zaslavsky, Charith Perera, and Dimitrios Georgakopoulos. 2013. Sensing as a service and big data. CoRR abs\/1301.0159 (2013)."},{"key":"#cr-split#-e_1_2_1_39_1.1","doi-asserted-by":"crossref","unstructured":"Y. Zhang R. Deng X. Liu and D. Zheng. 2018. Outsourcing service fair payment based on blockchain and its applications in cloud computing. IEEE Trans. Serv. Comput. (2018) 1-1. DOI:https:\/\/doi.org\/10.1109\/TSC.2018.2864191 10.1109\/TSC.2018.2864191","DOI":"10.1109\/TSC.2018.2864191"},{"key":"#cr-split#-e_1_2_1_39_1.2","doi-asserted-by":"crossref","unstructured":"Y. Zhang R. Deng X. Liu and D. Zheng. 2018. Outsourcing service fair payment based on blockchain and its applications in cloud computing. IEEE Trans. Serv. Comput. (2018) 1-1. DOI:https:\/\/doi.org\/10.1109\/TSC.2018.2864191","DOI":"10.1109\/TSC.2018.2864191"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.06.018"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1509"}],"container-title":["ACM Transactions on Internet Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3397202","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3397202","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:31:37Z","timestamp":1750195897000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3397202"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,15]]},"references-count":42,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2021,6,23]]}},"alternative-id":["10.1145\/3397202"],"URL":"https:\/\/doi.org\/10.1145\/3397202","relation":{},"ISSN":["1533-5399","1557-6051"],"issn-type":[{"value":"1533-5399","type":"print"},{"value":"1557-6051","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3,15]]},"assertion":[{"value":"2019-11-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-04-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-03-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}