{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:12:24Z","timestamp":1759133544554,"version":"3.37.3"},"reference-count":33,"publisher":"SAGE Publications","issue":"1","license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"DOI":"10.13039\/501100002338","name":"Ministry of Education of the People\u2019s Republic of China","doi-asserted-by":"publisher","award":["20120073110094","61202371","61202367","12ZR1443700","14YZ020"],"award-info":[{"award-number":["20120073110094","61202371","61202367","12ZR1443700","14YZ020"]}],"id":[{"id":"10.13039\/501100002338","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["20120073110094","61202371","61202367","12ZR1443700","14YZ020"],"award-info":[{"award-number":["20120073110094","61202371","61202367","12ZR1443700","14YZ020"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["20120073110094","61202371","61202367","12ZR1443700","14YZ020"],"award-info":[{"award-number":["20120073110094","61202371","61202367","12ZR1443700","14YZ020"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100007219","name":"Natural Science Foundation of Shanghai","doi-asserted-by":"publisher","award":["20120073110094","61202371","61202367","12ZR1443700","14YZ020"],"award-info":[{"award-number":["20120073110094","61202371","61202367","12ZR1443700","14YZ020"]}],"id":[{"id":"10.13039\/100007219","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Innovation Program of Shanghai Municipal Education Commission","award":["20120073110094","61202371","61202367","12ZR1443700","14YZ020"],"award-info":[{"award-number":["20120073110094","61202371","61202367","12ZR1443700","14YZ020"]}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2015,1,1]]},"abstract":"<jats:p> With the pervasiveness of mobile communications, MSNs have become a promising networking paradigm for users to share contents with others through mobile devices. This convenience comes at the cost of some serious security and privacy issues. In this work, we propose a novel privacy-preserving scheme for MSNs, which can efficiently solve some of the most serious security and privacy issues such as data confidentiality, fine-grained access control, and flexible revocation. In particular, we leverage the attribute based encryption technique to realize fine-grained access control over encrypted data. Moreover, we enhance this technique and design a flexible and fine-grained revocation mechanism which enables not only efficient user revocation but also efficient attribute revocation. As we show, our system can achieve both forward secrecy and backward secrecy using such mechanism. We compare our scheme with other related works and show that not only most of the previous works suffer from larger size of encrypted data but also their decryption time grows linearly with the complexity of access policies. In comparison, our scheme achieves higher efficiency and smaller computation time while consuming lesser storage space. We provide extensive analysis and performance evaluation to demonstrate the security, scalability, and efficiency of our proposed framework. <\/jats:p>","DOI":"10.1155\/2015\/857405","type":"journal-article","created":{"date-parts":[[2015,1,27]],"date-time":"2015-01-27T21:02:20Z","timestamp":1422392540000},"page":"857405","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":3,"title":["Towards Efficient, Secure, and Fine-Grained Access Control System in MSNs with Flexible Revocations"],"prefix":"10.1177","volume":"11","author":[{"given":"Shi-Feng","family":"Sun","sequence":"first","affiliation":[{"name":"Department of Computer Science & Engineering, Shanghai Jiao Tong University, Shanghai 200240, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8825-2445","authenticated-orcid":false,"given":"Chen","family":"Lyu","sequence":"additional","affiliation":[{"name":"Department of Computer Science & Engineering, Shanghai Jiao Tong University, Shanghai 200240, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0504-9538","authenticated-orcid":false,"given":"Dawu","family":"Gu","sequence":"additional","affiliation":[{"name":"Department of Computer Science & Engineering, Shanghai Jiao Tong University, Shanghai 200240, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6130-4601","authenticated-orcid":false,"given":"Yuanyuan","family":"Zhang","sequence":"additional","affiliation":[{"name":"Department of Computer Science & Engineering, Shanghai Jiao Tong University, Shanghai 200240, China"}]},{"given":"Yanli","family":"Ren","sequence":"additional","affiliation":[{"name":"School of Communication and Information Engineering, Shanghai University, Shanghai 200444, China"}]}],"member":"179","published-online":{"date-parts":[[2015,1,27]]},"reference":[{"volume-title":"Conversations about the Internet # 5: Anonymous Facebook Employee","year":"2010","author":"Wong P.","key":"B2-2015-857405"},{"key":"B3-2015-857405","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655024"},{"first-page":"135","volume-title":"Proceedings of the ACM SIGCOMM Conference on Data Communication (SIGCOMM '09)","author":"Baden R.","key":"B4-2015-857405"},{"key":"B5-2015-857405","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_27"},{"first-page":"321","volume-title":"Proceedings of the Symposium on Security and Privacy (SP '07)","author":"Bethencourt J.","key":"B6-2015-857405"},{"key":"B7-2015-857405","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315302"},{"key":"B8-2015-857405","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13190-5_4"},{"key":"B9-2015-857405","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653678"},{"key":"B10-2015-857405","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20465-4_31"},{"first-page":"53","volume-title":"Proceedings of the 14th International Conference on Practice and Theory in Public Key Cryptography (PKC '11)","author":"Waters B.","key":"B11-2015-857405"},{"key":"B12-2015-857405","doi-asserted-by":"publisher","DOI":"10.1109\/jcn.2011.6157409"},{"key":"B13-2015-857405","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2010.203"},{"key":"B14-2015-857405","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462174"},{"key":"B15-2015-857405","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966970"},{"key":"B16-2015-857405","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866414"},{"key":"B32-2015-857405","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2011.6134273"},{"key":"B36-2015-857405","doi-asserted-by":"publisher","DOI":"10.1109\/tpds.2010.130"},{"first-page":"34","volume-title":"Proceedings of the 20th USENIX Conference on Security (SEC '11)","author":"Green M.","key":"B17-2015-857405"},{"first-page":"49","volume-title":"Proceedings of the 2nd ACM Workshop on Online Social Networks (WOSN '09)","author":"Pietilainen A.","key":"B23-2015-857405"},{"key":"B24-2015-857405","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5935065"},{"key":"B25-2015-857405","doi-asserted-by":"publisher","DOI":"10.1109\/infcom.2012.6195574"},{"key":"B26-2015-857405","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"B27-2015-857405","doi-asserted-by":"publisher","DOI":"10.1109\/infcom.2011.5934958"},{"key":"B28-2015-857405","doi-asserted-by":"publisher","DOI":"10.1145\/1456403.1456405"},{"key":"B29-2015-857405","doi-asserted-by":"publisher","DOI":"10.1109\/cse.2009.387"},{"first-page":"210","volume-title":"Proceedings of the ACM 1st Workshop on Online Social Networks (WOSP '08)","author":"Guha S.","key":"B30-2015-857405"},{"key":"B31-2015-857405","doi-asserted-by":"publisher","DOI":"10.1109\/infcom.2010.5462080"},{"key":"B34-2015-857405","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48329-2_40"},{"key":"B35-2015-857405","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_30"},{"first-page":"123","volume-title":"Proceedings of the 33rd International Conference on Very Large Data Bases (VLDB '07)","author":"Vimercati S.","key":"B18-2015-857405"},{"first-page":"309","volume-title":"Proceedings of the 10th International Workshop on Information Security Applications (WISA '09)","author":"Ibraimi L.","key":"B19-2015-857405"},{"key":"B20-2015-857405","unstructured":"Beimel A.Secure schemes for secret sharing and key distribution [Ph.D. thesis]1996Haifa, IsraelTechnion: Israel Institute of Technology"},{"key":"B21-2015-857405","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-010-0121-2"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2015\/857405","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1155\/2015\/857405","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2015\/857405","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,5]],"date-time":"2021-05-05T18:04:42Z","timestamp":1620237882000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1155\/2015\/857405"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,1,1]]},"references-count":33,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,1,1]]}},"alternative-id":["10.1155\/2015\/857405"],"URL":"https:\/\/doi.org\/10.1155\/2015\/857405","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"type":"print","value":"1550-1477"},{"type":"electronic","value":"1550-1477"}],"subject":[],"published":{"date-parts":[[2015,1,1]]}}}