{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T06:34:52Z","timestamp":1771655692562,"version":"3.50.1"},"reference-count":26,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2018,11,4]],"date-time":"2018-11-04T00:00:00Z","timestamp":1541289600000},"content-version":"vor","delay-in-days":307,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572370"],"award-info":[{"award-number":["61572370"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572379"],"award-info":[{"award-number":["61572379"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61501333"],"award-info":[{"award-number":["61501333"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Wireless Communications and Mobile Computing"],"published-print":{"date-parts":[[2018,1]]},"abstract":"<jats:p>Internet of Things (IoT) and cloud computing are increasingly integrated, in the sense that data collected from IoT devices (generally with limited computational and storage resources) are being sent to the cloud for processing, etc., in order to inform decision making and facilitate other operational and business activities. However, the cloud may not be a fully trusted entity, like leaking user data or compromising user privacy. Thus, we propose a privacy\u2010preserving and user\u2010controlled data sharing architecture with fine\u2010grained access control, based on the blockchain model and attribute\u2010based cryptosystem. Also, the consensus algorithm in our system is the Byzantine fault tolerance mechanism, rather than Proof of Work.<\/jats:p>","DOI":"10.1155\/2018\/2783658","type":"journal-article","created":{"date-parts":[[2018,11,4]],"date-time":"2018-11-04T23:30:48Z","timestamp":1541374248000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":81,"title":["BaDS: Blockchain\u2010Based Architecture for Data Sharing with ABS and CP\u2010ABE in IoT"],"prefix":"10.1155","volume":"2018","author":[{"given":"Yunru","family":"Zhang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2446-7436","authenticated-orcid":false,"given":"Debiao","family":"He","sequence":"additional","affiliation":[]},{"given":"Kim-Kwang Raymond","family":"Choo","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2018,11,4]]},"reference":[{"key":"e_1_2_10_1_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2694844"},{"key":"e_1_2_10_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2596286"},{"key":"e_1_2_10_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2014.2355201"},{"key":"e_1_2_10_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2016.2633809"},{"key":"e_1_2_10_5_2","article-title":"Privacy-preserving data processing with flexible access control","author":"Ding W.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"e_1_2_10_6_2","doi-asserted-by":"crossref","unstructured":"YangK. JiaX. andRenK. Attribute-based fine-grained access control with efficient revocation in cloud storage systems Proceedings of the 8th ACM SIGSAC Symposium on Information Computer and Communications Security (ASIACCS \u203213) May 2013 Hangzhou China 523\u2013528 https:\/\/doi.org\/10.1145\/2484313.2484383 2-s2.0-84877948269.","DOI":"10.1145\/2484313.2484383"},{"key":"e_1_2_10_7_2","unstructured":"NakamotoS. Bitcoin: A peer-to-peer electronic cash system Consulted 2008."},{"key":"e_1_2_10_8_2","doi-asserted-by":"crossref","unstructured":"MiersI. GarmanC. GreenM. andRubinA. D. Zerocoin: Anonymous distributed e-cash from bitcoin Proceedings of the 34th IEEE Symposium on Security and Privacy SP 2013 May 2013 Berkeley Calif USA 397\u2013411 2-s2.0-84881236275.","DOI":"10.1109\/SP.2013.34"},{"key":"e_1_2_10_9_2","unstructured":"YiningH. ManzoorA. EkparinyaP. LiyanageM. ThilakarathnaK. JourjonG. SeneviratneA. andYlianttilaM. E. A delay-tolerant payment scheme based on the ethereum blockchain 2018."},{"key":"e_1_2_10_10_2","doi-asserted-by":"crossref","unstructured":"KoppH. M\u00f6dingerD. HauckF. KarglF. andB\u00f6schC. Design of a privacy-preserving decentralized file storage with financial incentives Proceedings of the 2nd IEEE European Symposium on Security and Privacy Workshops EuroS and PW 2017 April 2017 Paris France 14\u201322 2-s2.0-85027690321.","DOI":"10.1109\/EuroSPW.2017.45"},{"key":"e_1_2_10_11_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-49151-6_6"},{"key":"e_1_2_10_12_2","doi-asserted-by":"crossref","unstructured":"LiangX. ShettyS. ToshD. KamhouaC. KwiatK. andNjillaL. ProvChain: A Blockchain-Based Data Provenance Architecture in Cloud Environment with Enhanced Privacy and Availability Proceedings of the 17th IEEE\/ACM International Symposium on Cluster Cloud and Grid Computing CCGRID 2017 May 2017 Madrid Spain 468\u2013477 2-s2.0-85023758316.","DOI":"10.1109\/CCGRID.2017.8"},{"key":"e_1_2_10_13_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2017.10.006"},{"key":"e_1_2_10_14_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.05.005"},{"key":"e_1_2_10_15_2","doi-asserted-by":"crossref","unstructured":"HuhS. ChoS. andKimS. Managing IoT devices using blockchain platform Proceedings of the 19th International Conference on Advanced Communications Technology ICACT 2017 February 2017 Bongpyeong Republic of Korea 464\u2013467 2-s2.0-85018510486.","DOI":"10.23919\/ICACT.2017.7890132"},{"key":"e_1_2_10_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2847705"},{"key":"e_1_2_10_17_2","doi-asserted-by":"crossref","unstructured":"GoyalV. PandeyO. SahaiA. andWatersB. Attribute-based encryption for fine-grained access control of encrypted data Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS \u203206) November 2006 Alexandria Va USA 89\u201398 https:\/\/doi.org\/10.1145\/1180405.1180418 2-s2.0-34547273527.","DOI":"10.1145\/1180405.1180418"},{"key":"e_1_2_10_18_2","article-title":"Attribute-based signatures","volume":"2010","author":"Maji K. H.","year":"2010","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_2_10_19_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19379-8_4"},{"key":"e_1_2_10_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2573746"},{"key":"e_1_2_10_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2616861"},{"key":"e_1_2_10_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2018.2851295"},{"key":"e_1_2_10_23_2","doi-asserted-by":"crossref","unstructured":"LiJ. AuM. H. SusiloW. XieD. andRenK. Attribute-based signature and its applications Proceedings of the 5th ACM Symposium on Information Computer and Communication Security (ASIACCS \u203210) April 2010 Beijing China 60\u201369 https:\/\/doi.org\/10.1145\/1755688.1755697 2-s2.0-77954473455.","DOI":"10.1145\/1755688.1755697"},{"key":"e_1_2_10_24_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19074-2_24"},{"key":"e_1_2_10_25_2","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_27"},{"key":"e_1_2_10_26_2","article-title":"The idea of smart contracts","volume":"6","author":"Szabo N.","year":"1997","journal-title":"Nick Szabos Papers and Concise Tutorials"}],"container-title":["Wireless Communications and Mobile Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2018\/2783658.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2018\/2783658.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2018\/2783658","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T06:19:25Z","timestamp":1723011565000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2018\/2783658"}},"subtitle":[],"editor":[{"given":"Georgios","family":"Kambourakis","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2018,1]]},"references-count":26,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,1]]}},"alternative-id":["10.1155\/2018\/2783658"],"URL":"https:\/\/doi.org\/10.1155\/2018\/2783658","archive":["Portico"],"relation":{},"ISSN":["1530-8669","1530-8677"],"issn-type":[{"value":"1530-8669","type":"print"},{"value":"1530-8677","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,1]]},"assertion":[{"value":"2018-08-20","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-10-18","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-11-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"2783658"}}