{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:40:08Z","timestamp":1750297208329,"version":"3.41.0"},"reference-count":26,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T00:00:00Z","timestamp":1747785600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Sen. Netw."],"published-print":{"date-parts":[[2025,5,31]]},"abstract":"<jats:p>As Internet of Things (IoT) technology continues to advance swiftly, a growing array of IoT devices is being assimilated into the industrial IoT framework. However, ensuring secure and efficient transmission of data from IoT devices has become a key technological focus in current research on the development of industrial IoT. Attribute encryption technology is an effective encryption technique that ensures data security; meanwhile, proxy re-encryption technology allows proxies to encrypt original ciphertext into new ciphertext without accessing any plaintext information. The combination of these two technologies enables secure transmission of data among users with different attributes. However, the high computational overhead remains a significant factor limiting the development of this solution. IoT data needs to be shared not only among different units within the same domain but also across units in different domains. Securing shared data has emerged as a pivotal area of focus in contemporary research. In this article, we propose an improved fine-grained proxy re-encryption scheme for cross-attribute domains, which not only facilitates simple cross-domain data sharing but also enhances encryption efficiency. Security proofs demonstrate the adequacy of our proposed scheme, and performance analysis indicates its superiority over other solutions in certain aspects.<\/jats:p>","DOI":"10.1145\/3728643","type":"journal-article","created":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T10:12:01Z","timestamp":1744193521000},"page":"1-21","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["An Efficient Cross-Domain Fine Grain Proxy Re-encryption Scheme for Secure Transmission in IIOT"],"prefix":"10.1145","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-0855-9634","authenticated-orcid":false,"given":"Yurui","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Electric and Electronic Engineering, Shanghai University of Engineering Science, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3770-3554","authenticated-orcid":false,"given":"Dongmei","family":"Li","sequence":"additional","affiliation":[{"name":"School of Electric and Electronic Engineering, Shanghai University of Engineering Science, Shanghai, China and Shanghai Key Laboratory of Integrated Administration Technologies for Information Security, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7767-0553","authenticated-orcid":false,"given":"Xiaomei","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Electric and Electronic Engineering, Shanghai University of Engineering Science, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1243-7982","authenticated-orcid":false,"given":"Wenjing","family":"Lv","sequence":"additional","affiliation":[{"name":"School of Electric and Electronic Engineering, Shanghai University of Engineering Science, Shanghai, China"}]}],"member":"320","published-online":{"date-parts":[[2025,5,21]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1145\/1127345.1127346"},{"key":"e_1_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2020.101957"},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.11"},{"key":"e_1_3_1_5_2","first-page":"127","volume-title":"Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques","author":"Blaze Matt","year":"1998","unstructured":"Matt Blaze, Gerrit Bleumer, and Martin Strauss. 1998. Divertible protocols and atomic proxy cryptography. In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 127\u2013144."},{"key":"e_1_3_1_6_2","first-page":"1","volume-title":"Proceedings of the 2023 5th International Conference on Industrial Artificial Intelligence (IAI)","author":"Chenhao Zhang","year":"2023","unstructured":"Zhang Chenhao, Zhang Hongwei, and Liu Guiwang. 2023. Secure data sharing on the industrial Internet: A decentralized scheme based on CP-ABE. In Proceedings of the 2023 5th International Conference on Industrial Artificial Intelligence (IAI). IEEE, 1\u20136."},{"key":"e_1_3_1_7_2","first-page":"698","volume-title":"Proceedings of the 2023 IEEE International Conference on Web Services (ICWS)","author":"Cui Jiasheng","year":"2023","unstructured":"Jiasheng Cui, Li Duan, Wei Ni, and Chao Li. 2023. Secure cross-domain medical data sharing based on distributed cloud and blockchain services. In Proceedings of the 2023 IEEE International Conference on Web Services (ICWS). IEEE, 698\u2013700."},{"key":"e_1_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.09.052"},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.3390\/info14050281"},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2021.3064356"},{"key":"e_1_3_1_11_2","doi-asserted-by":"crossref","unstructured":"M. Elnadi and Y. O. Abdallah. 2024. Industry 4.0: critical investigations and synthesis of key findings. Management Review Quarterly 74 (2024) 711\u2013744.","DOI":"10.1007\/s11301-022-00314-4"},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"key":"e_1_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.23919\/APNOMS56106.2022.9919929"},{"key":"e_1_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1145\/1533057.1533094"},{"key":"e_1_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2022.12.282"},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2020.101854"},{"key":"e_1_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.110049"},{"key":"e_1_3_1_18_2","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1016\/j.jpdc.2021.05.007","article-title":"Cross-domain secure data sharing using blockchain for industrial IoT","volume":"156","author":"Singh Parminder","year":"2021","unstructured":"Parminder Singh, Mehedi Masud, M. Shamim Hossain, and Avinash Kaur. 2021. Cross-domain secure data sharing using blockchain for industrial IoT. Journal of Parallel and Distributed Computing 156 (2021), 176\u2013184.","journal-title":"Journal of Parallel and Distributed Computing"},{"key":"e_1_3_1_19_2","doi-asserted-by":"crossref","unstructured":"Lili Wang Ye Lin Ting Yao Hu Xiong and Kaitai Liang. 2023. FABRIC: Fast and secure unbounded cross-system encrypted data sharing in cloud computing. IEEE Transactions on Dependable and Secure Computing 20 6 (2023) 5130\u20135142.","DOI":"10.1109\/TDSC.2023.3240820"},{"key":"e_1_3_1_20_2","volume-title":"Research on Attribute-based Proxy Re-encryption Schemes","author":"Wanjun Li","year":"2015","unstructured":"Li Wanjun. 2015. Research on Attribute-based Proxy Re-encryption Schemes. Master\u2019s thesis. Nanjing University of Posts and Telecommunications."},{"key":"e_1_3_1_21_2","first-page":"53","volume-title":"Proceedings of the International Workshop on Public Key Cryptography","author":"Waters Brent","year":"2011","unstructured":"Brent Waters. 2011. Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. In Proceedings of the International Workshop on Public Key Cryptography. Springer, 53\u201370."},{"key":"e_1_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3146929"},{"key":"e_1_3_1_23_2","doi-asserted-by":"crossref","unstructured":"Shulei Zeng Bin Cao Yao Sun Chen Sun Zhiguo Wan and Mugen Peng. 2024. Blockchain-assisted cross-domain data sharing in industrial IoT. IEEE Internet of Things Journal 11 16 (2024) 26778\u201326792.","DOI":"10.1109\/JIOT.2023.3329577"},{"key":"e_1_3_1_24_2","volume-title":"Research and Implementation of Medical Data Management System based on Attribute-based Proxy Re-encryption","author":"Zhan Wang","year":"2021","unstructured":"Wang Zhan. 2021. Research and Implementation of Medical Data Management System based on Attribute-based Proxy Re-encryption. Master\u2019s thesis. Guizhou University."},{"key":"e_1_3_1_25_2","first-page":"1187","volume-title":"Proceedings of the 2020 IEEE 16th International Conference on Automation Science and Engineering (CASE)","author":"Zhang Zheng","year":"2020","unstructured":"Zheng Zhang, Liang Huang, Renzhong Tang, Tao Peng, Lihang Guo, and Xingwei Xiang. 2020. Industrial blockchain of things: A solution for trustless industrial data sharing and beyond. In Proceedings of the 2020 IEEE 16th International Conference on Automation Science and Engineering (CASE). IEEE, 1187\u20131192."},{"key":"e_1_3_1_26_2","volume-title":"Research on Key Technologies of Data Sharing Based on Multi-Authority Attribute-based Proxy Re-encryption","author":"Zhongkai Fan","year":"2021","unstructured":"Fan Zhongkai. 2021. Research on Key Technologies of Data Sharing Based on Multi-Authority Attribute-based Proxy Re-encryption. Master\u2019s thesis. Beijing University of Posts and Telecommunications."},{"key":"e_1_3_1_27_2","article-title":"TRE-DSP: A traceable and revocable CP-ABE based data sharing scheme for IoV with partially hidden policy","author":"Zhou Yousheng","year":"2024","unstructured":"Yousheng Zhou, Rundong Peng, Yuanni Liu, Pandi Vijayakumar, and Brij Gupta. 2024. TRE-DSP: A traceable and revocable CP-ABE based data sharing scheme for IoV with partially hidden policy. Digital Communications and Networks (2024).","journal-title":"Digital Communications and Networks"}],"container-title":["ACM Transactions on Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3728643","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3728643","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:36Z","timestamp":1750295916000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3728643"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,21]]},"references-count":26,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,5,31]]}},"alternative-id":["10.1145\/3728643"],"URL":"https:\/\/doi.org\/10.1145\/3728643","relation":{},"ISSN":["1550-4859","1550-4867"],"issn-type":[{"type":"print","value":"1550-4859"},{"type":"electronic","value":"1550-4867"}],"subject":[],"published":{"date-parts":[[2025,5,21]]},"assertion":[{"value":"2024-08-21","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-03-23","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-05-21","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}