{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T22:11:37Z","timestamp":1757542297043,"version":"3.41.2"},"reference-count":56,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2021,7,14]],"date-time":"2021-07-14T00:00:00Z","timestamp":1626220800000},"content-version":"vor","delay-in-days":194,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100013066","name":"Key Scientific Research Project of Colleges and Universities in Henan Province","doi-asserted-by":"publisher","award":["21A110005"],"award-info":[{"award-number":["21A110005"]}],"id":[{"id":"10.13039\/501100013066","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1704122","61701170"],"award-info":[{"award-number":["U1704122","61701170"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Wireless Communications and Mobile Computing"],"published-print":{"date-parts":[[2021,1]]},"abstract":"<jats:p>Various applications of the Internet of Things assisted by deep learning such as autonomous driving and smart furniture have gradually penetrated people\u2019s social life. These applications not only provide people with great convenience but also promote the progress and development of society. However, how to ensure that the important personal privacy information in the big data of the Internet of Things will not be leaked when it is stored and shared on the cloud is a challenging issue. The main challenges include (1) the changes in access rights caused by the flow of manufacturers or company personnel while sharing and (2) the lack of limitation on time and frequency. We propose a data privacy protection scheme based on time and decryption frequency limitation that can be applied in the Internet of Things. Legitimate users can obtain the original data, while users without a homomorphic encryption key can perform operation training on the homomorphic ciphertext. On the one hand, this scheme does not affect the training of the neural network model, on the other hand, it improves the confidentiality of data. Besides that, this scheme introduces a secure two\u2010party agreement to improve security while generating keys. While revoking, each attribute is specified for the validity period in advance. Once the validity period expires, the attribute will be revoked. By using storage lists and setting tokens to limit the number of user accesses, it effectively solves the problem of data leakage that may be caused by multiple accesses in a long time. The theoretical analysis demonstrates that the proposed scheme can not only ensure safety but also improve efficiency.<\/jats:p>","DOI":"10.1155\/2021\/5545648","type":"journal-article","created":{"date-parts":[[2021,7,14]],"date-time":"2021-07-14T21:05:07Z","timestamp":1626296707000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["A Privacy Protection Scheme for IoT Big Data Based on Time and Frequency Limitation"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8092-3459","authenticated-orcid":false,"given":"Lei","family":"Zhang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2399-3039","authenticated-orcid":false,"given":"Yu","family":"Huo","sequence":"additional","affiliation":[]},{"given":"Qiang","family":"Ge","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6131-2599","authenticated-orcid":false,"given":"Yuxiang","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Qiqi","family":"Liu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3991-1541","authenticated-orcid":false,"given":"Wenlei","family":"Ouyang","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2021,7,14]]},"reference":[{"key":"e_1_2_10_1_2","doi-asserted-by":"publisher","DOI":"10.1109\/LGRS.2019.2930645"},{"key":"e_1_2_10_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSTARS.2020.3014492"},{"key":"e_1_2_10_3_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-018-2253-5"},{"key":"e_1_2_10_4_2","doi-asserted-by":"publisher","DOI":"10.1002\/acs.3027"},{"key":"e_1_2_10_5_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jfranklin.2018.01.011"},{"key":"e_1_2_10_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2018.1700374"},{"key":"e_1_2_10_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2750765"},{"key":"e_1_2_10_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2306328"},{"key":"e_1_2_10_9_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.06.023"},{"key":"e_1_2_10_10_2","doi-asserted-by":"crossref","unstructured":"TianY. PeiK. JanaS. andRayB. DeepTest: automated testing of deep-neural-network-driven autonomous cars Proceedings of the 40th International Conference on Software Engineering May 2018 Gothenburg Sweden 303\u2013314 https:\/\/doi.org\/10.1145\/3180155.3180220 2-s2.0-85069772253.","DOI":"10.1145\/3180155.3180220"},{"key":"e_1_2_10_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2962914"},{"key":"e_1_2_10_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3038761"},{"key":"e_1_2_10_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2969326"},{"key":"e_1_2_10_14_2","doi-asserted-by":"publisher","DOI":"10.1038\/s41551-018-0195-0"},{"key":"e_1_2_10_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2406704"},{"key":"e_1_2_10_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2017.2783902"},{"key":"e_1_2_10_17_2","doi-asserted-by":"crossref","unstructured":"RachediA.andBenslimaneA. Multi-objective optimization for security and QoS adaptation in wireless sensor networks 2016 IEEE International Conference on Communications (ICC) May 2016 Kuala Lumpur Malaysia https:\/\/doi.org\/10.1109\/icc.2016.7510879 2-s2.0-84959307306.","DOI":"10.1109\/ICC.2016.7510879"},{"key":"e_1_2_10_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2018.2847733"},{"key":"e_1_2_10_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7120028"},{"key":"e_1_2_10_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2020.3002255"},{"key":"e_1_2_10_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2019.2929409"},{"key":"e_1_2_10_22_2","unstructured":"JiangL. LouX. TanR. andZhaoJ. Differentially private collaborative learning for the IoT edge In Proceedings of the 2019 International Conference on Embedded Wireless Systems and Networks (EWSN \u203219) 2019 Junction Publishing USA."},{"key":"e_1_2_10_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2945367"},{"key":"e_1_2_10_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2868162"},{"key":"e_1_2_10_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2015.2511457"},{"key":"e_1_2_10_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2018.2874473"},{"key":"e_1_2_10_27_2","unstructured":"PapernotN. SongS. MironovI. RaghunathanA. TalwarK. andErlingssonU. Scalable Private Learning with PATE 2018."},{"key":"e_1_2_10_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2897005"},{"key":"e_1_2_10_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2011.78"},{"key":"e_1_2_10_30_2","doi-asserted-by":"publisher","DOI":"10.19678\/j.issn.1000-3428.0058105"},{"key":"e_1_2_10_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2020.3044576"},{"key":"e_1_2_10_32_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.01.065"},{"key":"e_1_2_10_33_2","doi-asserted-by":"crossref","unstructured":"RavindranathV. RamasamyS. SomulaR. SahooK. S. andGandomiA. H. Swarm intelligence based feature selection for intrusion and detection system in cloud infrastructure 2020 IEEE Congress on Evolutionary Computation (CEC) July 2020 Glasgow UK 1\u20136 https:\/\/doi.org\/10.1109\/cec48606.2020.9185887.","DOI":"10.1109\/CEC48606.2020.9185887"},{"key":"e_1_2_10_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2017.2782847"},{"key":"e_1_2_10_35_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2021.102792"},{"key":"e_1_2_10_36_2","doi-asserted-by":"crossref","unstructured":"LindellY.andPinkasB. Privacy preserving data mining Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology 2000 Springer Berlin Heidelberg.","DOI":"10.1007\/3-540-44598-6_3"},{"key":"e_1_2_10_37_2","doi-asserted-by":"crossref","unstructured":"AgrawalR.andSrikantR. Privacy-preserving data mining Proceedings of the 2000 ACM SIGMOD international conference on Management of data - SIGMOD \u203200 2000 Dallas Texas USA https:\/\/doi.org\/10.1145\/342009.335438.","DOI":"10.1145\/342009.335438"},{"key":"e_1_2_10_38_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2287732"},{"key":"e_1_2_10_39_2","doi-asserted-by":"publisher","DOI":"10.1186\/1687-417X-2007-037343"},{"key":"e_1_2_10_40_2","unstructured":"DowlinN. RanG. B. LaineK. LauterK. NaehrigM. andWernsingJ. CryptoNets: applying neural networks to encrypted data with high throughput and accuracy International Conference on Machine Learning 2016 NY USA 201\u2013210."},{"key":"e_1_2_10_41_2","doi-asserted-by":"crossref","unstructured":"HesamifardE. TakabiH. andGhasemiM. Privacy-Preserving Machine Learning in Cloud Proceedings of the 2017 on cloud computing security workshop 2017 39\u201343.","DOI":"10.1145\/3140649.3140655"},{"key":"e_1_2_10_42_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70936-7_28"},{"key":"e_1_2_10_43_2","doi-asserted-by":"publisher","DOI":"10.1049\/cje.2018.10.002"},{"key":"e_1_2_10_44_2","doi-asserted-by":"publisher","DOI":"10.1109\/jsyst.2017.2667679"},{"key":"e_1_2_10_45_2","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0203225"},{"key":"e_1_2_10_46_2","first-page":"324","article-title":"Time-based user revocation CP-ABE scheme","volume":"36","author":"Dilxat G.","year":"2019","journal-title":"Journal of Xinjiang University(Natural Science Edition)"},{"key":"e_1_2_10_47_2","doi-asserted-by":"crossref","unstructured":"QinX. HuangY. YangZ. andLiX. An access control scheme with fine-grained time constrained attributes based on smart contract and trapdoor 2019 26th International Conference on Telecommunications (ICT) April 2019 Hanoi Vietnam https:\/\/doi.org\/10.1109\/ict.2019.8798859 2-s2.0-85071416404.","DOI":"10.1109\/ICT.2019.8798859"},{"key":"e_1_2_10_48_2","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2017.2738601"},{"key":"e_1_2_10_49_2","first-page":"115","article-title":"Ciphertext-policy attribute encryption scheme based on homomorphic encryption","volume":"55","author":"Tan Y.","year":"2019","journal-title":"Computer Engineering and Applications"},{"key":"e_1_2_10_50_2","doi-asserted-by":"publisher","DOI":"10.1109\/tsc.2017.2710190"},{"key":"e_1_2_10_51_2","first-page":"52","article-title":"A secure two-party computation problem based on the convolution","volume":"33","author":"Tang Y.","year":"2016","journal-title":"Journal of Guizhou University(Natural Ences)"},{"key":"e_1_2_10_52_2","doi-asserted-by":"crossref","unstructured":"ChaseM.andChowS. S. M. Improving privacy and security in multi-authority attribute-based encryption Proceedings of the 16th ACM conference on Computer and communications security - CCS \u203209 2009 Chicago Illinois USA 121\u2013130 https:\/\/doi.org\/10.1145\/1653662.1653678 2-s2.0-74049163235.","DOI":"10.1145\/1653662.1653678"},{"key":"e_1_2_10_53_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00468-1_15"},{"key":"e_1_2_10_54_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30580-4_28"},{"key":"e_1_2_10_55_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2016.2609884"},{"key":"e_1_2_10_56_2","first-page":"114","article-title":"Fully-outsourcing CP-ABE scheme with revocation in cloud computing","volume":"46","author":"Jiang Z. T.","year":"2019","journal-title":"Computer Science"}],"container-title":["Wireless Communications and Mobile Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2021\/5545648.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2021\/5545648.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2021\/5545648","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T13:45:22Z","timestamp":1723038322000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2021\/5545648"}},"subtitle":[],"editor":[{"given":"Lihua","family":"Yin","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,1]]},"references-count":56,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["10.1155\/2021\/5545648"],"URL":"https:\/\/doi.org\/10.1155\/2021\/5545648","archive":["Portico"],"relation":{},"ISSN":["1530-8669","1530-8677"],"issn-type":[{"type":"print","value":"1530-8669"},{"type":"electronic","value":"1530-8677"}],"subject":[],"published":{"date-parts":[[2021,1]]},"assertion":[{"value":"2021-03-03","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-06-16","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-07-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"5545648"}}