{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T14:09:00Z","timestamp":1766066940462},"reference-count":20,"publisher":"SAGE Publications","issue":"11","license":[{"start":{"date-parts":[[2018,11,1]],"date-time":"2018-11-01T00:00:00Z","timestamp":1541030400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"name":"National Key R&D Program of China","award":["2017YFB1400700"],"award-info":[{"award-number":["2017YFB1400700"]}]},{"name":"Science and Technology Project of State Power Grid Corp","award":["52110417000G"],"award-info":[{"award-number":["52110417000G"]}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2018,11]]},"abstract":"<jats:p> Blockchain as a new technique has attracted attentions from industry and academics for sharing data across organizations. Many blockchain-based data sharing applications, such as Internet of Things devices management, need privacy-preserving access services over encrypted data with dual capabilities. On one hand, they need to keep the sensitive data private such that others cannot trace and infer sensitive data stored in the block. On the other hand, they need to support fine-grained access control both from time and users\u2019 attributes. However, to the best of our knowledge, no blockchain systems can support time-bound and attributes-based access with high efficiency. In this article, we propose a privacy-preserving Internet of Things devices management scheme based on blockchain, which provides efficient time-bound and attribute-based access and supports key automatic revocation. The analysis and experiments show that our scheme is quite efficient and deployable. <\/jats:p>","DOI":"10.1177\/1550147718808750","type":"journal-article","created":{"date-parts":[[2018,11,3]],"date-time":"2018-11-03T10:13:35Z","timestamp":1541240015000},"page":"155014771880875","update-policy":"http:\/\/dx.doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":26,"title":["A privacy-preserving Internet of Things device management scheme based on blockchain"],"prefix":"10.1177","volume":"14","author":[{"given":"Qingsu","family":"He","sequence":"first","affiliation":[{"name":"State Grid Electronic Commerce Co. Ltd. (State Grid Xiongan Financial Technology Group Co. Ltd.), Beijing, China"},{"name":"State Grid Power Finance and Electronic Commerce Lab, Beijing, China"},{"name":"State Grid Huitong Financial Information Technology Co. Ltd., Beijing, China"}]},{"given":"Yu","family":"Xu","sequence":"additional","affiliation":[{"name":"State Grid Electronic Commerce Co. Ltd. (State Grid Xiongan Financial Technology Group Co. Ltd.), Beijing, China"},{"name":"State Grid Power Finance and Electronic Commerce Lab, Beijing, China"},{"name":"State Grid Huitong Financial Information Technology Co. Ltd., Beijing, China"}]},{"given":"Zhoubin","family":"Liu","sequence":"additional","affiliation":[{"name":"State Grid Zhejiang Electric Power Co. Ltd., Hangzhou, China"}]},{"given":"Jinhong","family":"He","sequence":"additional","affiliation":[{"name":"State Grid Electronic Commerce Co. Ltd. (State Grid Xiongan Financial Technology Group Co. Ltd.), Beijing, China"},{"name":"State Grid Power Finance and Electronic Commerce Lab, Beijing, China"},{"name":"State Grid Huitong Financial Information Technology Co. Ltd., Beijing, China"}]},{"given":"You","family":"Sun","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"},{"name":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"}]},{"given":"Rui","family":"Zhang","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"},{"name":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"}]}],"member":"179","published-online":{"date-parts":[[2018,11,3]]},"reference":[{"key":"bibr2-1550147718808750","first-page":"206","volume-title":"17th IFIP WG 6.1 international conference, DAIS 2017","author":"Maesa DDF"},{"key":"bibr4-1550147718808750","first-page":"180","volume-title":"IEEE security and privacy workshops","author":"Zyskind G"},{"key":"bibr5-1550147718808750","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1748"},{"key":"bibr6-1550147718808750","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.11.007"},{"key":"bibr7-1550147718808750","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46568-5_53"},{"key":"bibr8-1550147718808750","first-page":"30","volume-title":"International conference on electrical and information technologies","author":"Ouaddah A"},{"key":"bibr9-1550147718808750","volume-title":"IEEE international conference on pervasive computing and communications workshops (PerCom Workshops)","author":"Dorri A"},{"key":"bibr10-1550147718808750","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2566339"},{"key":"bibr12-1550147718808750","first-page":"25","volume-title":"International conference on open and big data","author":"Azaria A"},{"issue":"9","key":"bibr14-1550147718808750","first-page":"1555","volume":"43","author":"Xue TF","year":"2017","journal-title":"Acta Autom Sinic"},{"issue":"7","key":"bibr15-1550147718808750","first-page":"417","volume":"8","author":"Outchakoucht A","year":"2017","journal-title":"Int J Adv Comput Sci Appl"},{"key":"bibr16-1550147718808750","first-page":"2131","volume-title":"IEEE international conference on distributed computing systems (ICDCS)","author":"Alansari S"},{"key":"bibr17-1550147718808750","first-page":"757","volume-title":"IEEE international conference on cloud computing (CLOUD)","author":"Alansari S"},{"key":"bibr18-1550147718808750","first-page":"457","volume-title":"Annual international conference on theory and application of cryptographic techniques","author":"Sahai A"},{"key":"bibr19-1550147718808750","first-page":"89","volume-title":"Proceedings of the 13Th ACM conference on computer and communications security (CCS\u201906)","author":"Goyal V"},{"key":"bibr20-1550147718808750","first-page":"321","volume-title":"Proceedings of the 2007 IEEE symposium on security and privacy (SP\u201907)","author":"Bethencourt J"},{"key":"bibr21-1550147718808750","volume-title":"IEEE international conference on advanced networks and telecommunications systems (ANTS) 2017","author":"Rahulamathavan Y"},{"key":"bibr22-1550147718808750","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2007.70241"},{"key":"bibr23-1550147718808750","volume-title":"OSDI\u201999 proceedings of the third symposium on operating systems design and implementation","author":"Castro M"},{"key":"bibr24-1550147718808750","doi-asserted-by":"publisher","DOI":"10.1007\/s102070100002"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1550147718808750","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/1550147718808750","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1550147718808750","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,7]],"date-time":"2020-12-07T04:28:23Z","timestamp":1607315303000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1177\/1550147718808750"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11]]},"references-count":20,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2018,11]]}},"alternative-id":["10.1177\/1550147718808750"],"URL":"https:\/\/doi.org\/10.1177\/1550147718808750","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"value":"1550-1477","type":"print"},{"value":"1550-1477","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,11]]}}}