{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,18]],"date-time":"2026-05-18T11:57:36Z","timestamp":1779105456207,"version":"3.51.4"},"reference-count":56,"publisher":"Wiley","license":[{"start":{"date-parts":[[2021,3,27]],"date-time":"2021-03-27T00:00:00Z","timestamp":1616803200000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Key R&D Program of China","award":["2018YFC1604000"],"award-info":[{"award-number":["2018YFC1604000"]}]},{"name":"National Key R&D Program of China","award":["61572374"],"award-info":[{"award-number":["61572374"]}]},{"name":"National Key R&D Program of China","award":["U163620068"],"award-info":[{"award-number":["U163620068"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2018YFC1604000"],"award-info":[{"award-number":["2018YFC1604000"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572374"],"award-info":[{"award-number":["61572374"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U163620068"],"award-info":[{"award-number":["U163620068"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2021,3,27]]},"abstract":"<jats:p>The barriers of food enterprises and departments caused information asymmetry, which is the root cause of food safety incidents. Simultaneously, it is challenging to solve the information asymmetry by the existing cloud-based food supply-chain regulation system. Establishing a secure and reliable data sharing environment is an effective solution to the information island. Blockchain can construct a security network based on mathematical algorithms, eliminating the third party\u2019s potential security risk, and realize transparently share data. In this paper, on the principle of metadata remaining in the food enterprises, we propose a blockchain-cloud fusion scheme based on Decentralized Attribute-Based Signature (DABS) to realize secure data sharing between departments. It constructs a decentralized and trusting environment for data owners to share data and achieves social co-governance of food safety based on the smart contract. It can also preserve the existing system architecture and complement the performance disadvantage of blockchain and cloud storage. The result achieved from security analysis shows that our scheme supports unconditional full anonymity and can resist collusion attacks of N-1 out of N corrupted attribute authorities.<\/jats:p>","DOI":"10.1155\/2021\/6668339","type":"journal-article","created":{"date-parts":[[2021,3,27]],"date-time":"2021-03-27T18:35:09Z","timestamp":1616870109000},"page":"1-18","source":"Crossref","is-referenced-by-count":15,"title":["Cross-Department Secures Data Sharing in Food Industry via Blockchain-Cloud Fusion Scheme"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8715-6969","authenticated-orcid":true,"given":"Q.","family":"Tao","sequence":"first","affiliation":[{"name":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan 430072, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Q.","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Remote Sensing and Information, Wuhan University, Wuhan 430072, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"H.","family":"Ding","sequence":"additional","affiliation":[{"name":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan 430072, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8249-6876","authenticated-orcid":true,"given":"I.","family":"Adnan","sequence":"additional","affiliation":[{"name":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan 430072, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"X.","family":"Huang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Southwest University of Science and Technology, Mianyang 621002, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6079-009X","authenticated-orcid":true,"given":"X.","family":"Cui","sequence":"additional","affiliation":[{"name":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan 430072, China"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-05764-0_18"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/mitp.2019.2906761"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.31585\/jbba-1-1-(10)2018"},{"issue":"4","key":"4","first-page":"1247","article-title":"Traceability system of olive oil: a case study based on the performance of a new software cloud","volume":"14","author":"L. M. Abenavoli","year":"2016","journal-title":"Agronomy Research"},{"key":"5","article-title":"Cisco global cloud index: forecast and methodology, 2015-2020","author":"C. V. Networking","year":"2016"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.2306\/scienceasia1513-1874.2016.42s.056"},{"issue":"1","key":"7","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1109\/TST.2015.7040510","article-title":"I-sieve: an inline high performance deduplication system used in cloud storage","volume":"20","author":"J. Wang","year":"2015","journal-title":"Tsinghua Science and Technology"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/access.2018.2851956"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.11.006"},{"key":"10","article-title":"Bitcoin: a peer-to-peer electronic cash system","author":"S. Nakamoto","year":"2008"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2018.10.004"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1080\/10408398.2016.1257481"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.5555\/2093889.2093944"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_27"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.5555\/1964621.1964655"},{"key":"16","first-page":"394","article-title":"Attribute-based ring signatures","author":"J. Li","year":"2012"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45708-9_30"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2015.7288431"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70936-7_28"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2012.42"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23822-2_16"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1145\/3087801.3087809"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.3390\/fi9030025"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1038\/d41586-018-02641-7"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2018.02.014"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2801266"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2018.8487349"},{"key":"28","doi-asserted-by":"crossref","DOI":"10.1016\/j.sysarc.2019.101653","article-title":"A blockchain-based attribute-based signcryption scheme to secure data sharing in the cloud","volume":"102","author":"A. N. Eltayieb","year":"2020","journal-title":"Journal of Systems Architecture"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2018.10.014"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1016\/j.foodcont.2013.02.004"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijpe.2015.01.003"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.3390\/environments4030050"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2911265"},{"issue":"3","key":"34","first-page":"1","article-title":"Leveraging blockchain technology to enhance supply chain management in healthcare: an exploration of challenges and opportunities in the health supply chain","volume":"1","author":"K. A. Clauson","year":"2018","journal-title":"Blockchain in Healthcare Today"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2942389"},{"key":"36","first-page":"1","article-title":"Blockchain-based traceability in agri-food supply chain management: a practical implementation","author":"M. P. Caro"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1002\/jsfa.9912"},{"key":"38","unstructured":"AmosB.Secure schemes for secret sharing and key distribution1996Haifa, IsraelIsral institute of technologyPhD Thesis"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1145\/571637.571640"},{"key":"40","first-page":"568","article-title":"Decentralizing attribute-based encryption","author":"A. Lewko"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00862-7_21"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_21"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_26"},{"key":"44","article-title":"Blockchain data protection law | deloitte legal Deutschland [DB\/OL], 2020-07-15","author":"L. Germany","year":"2020"},{"issue":"11","key":"45","first-page":"3528","article-title":"Multi-Authority attribute-based alterable threshold ring signature without central authority","volume":"29","author":"X. D. Liu","year":"2018","journal-title":"Journal of Software"},{"key":"46","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44647-8_13"},{"key":"47","doi-asserted-by":"publisher","DOI":"10.1109\/tpds.2013.253"},{"key":"48","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516672"},{"key":"49","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.11"},{"key":"50","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02384-2_13"},{"key":"51","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"key":"52","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19379-8_4"},{"key":"53","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00730-9_2"},{"key":"54","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2015.27"},{"key":"55","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.36"},{"key":"56","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2019.2902380"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/6668339.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/6668339.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/6668339.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,13]],"date-time":"2021-04-13T03:57:21Z","timestamp":1618286241000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2021\/6668339\/"}},"subtitle":[],"editor":[{"given":"Leandros","family":"Maglaras","sequence":"additional","affiliation":[],"role":[{"role":"editor","vocabulary":"crossref"}]}],"short-title":[],"issued":{"date-parts":[[2021,3,27]]},"references-count":56,"alternative-id":["6668339","6668339"],"URL":"https:\/\/doi.org\/10.1155\/2021\/6668339","relation":{},"ISSN":["1939-0122","1939-0114"],"issn-type":[{"value":"1939-0122","type":"electronic"},{"value":"1939-0114","type":"print"}],"subject":[],"published":{"date-parts":[[2021,3,27]]}}}