{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T02:28:05Z","timestamp":1771468085642,"version":"3.50.1"},"reference-count":29,"publisher":"SAGE Publications","issue":"3","license":[{"start":{"date-parts":[[2021,3,1]],"date-time":"2021-03-01T00:00:00Z","timestamp":1614556800000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100015956","name":"special project for research and development in key areas of guangdong province","doi-asserted-by":"publisher","award":["2019B010137002"],"award-info":[{"award-number":["2019B010137002"]}],"id":[{"id":"10.13039\/501100015956","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003392","name":"natural science foundation of fujian province","doi-asserted-by":"publisher","award":["2020J01171"],"award-info":[{"award-number":["2020J01171"]}],"id":[{"id":"10.13039\/501100003392","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2021,3]]},"abstract":"<jats:p> It is the most important and challenging problem to share the data safely in cloud computing. Some so-called trusted third parties may also infringe users\u2019 data privacy. It is an urgent problem for data owners to share data safely with the designated users rather than the third party or other users. Traditional encryption schemes utilize different keys to produce multiple encrypted copies of the same data for users. It is no longer applicable for cloud data sharing security. Attribute-based encryption can solve above problems, but it needs to rely on trusted third parties to protect the users\u2019 privacy. In this article, in order to address the above problems, we propose a blockchain-based ciphertext-policy attribute-based encryption scheme for cloud data secure sharing without relying on any trusted third parties. Blockchain-based ciphertext-policy attribute-based encryption scheme can protect the rights and security of data owner. Compared with existing cloud security schemes, the proposed scheme has more advantages in terms of the six aspects: (1) data owners have the authority to decide who can decrypt the data; (2) the operations of users are retained permanently, and all records are tamper-proof; (3) our proposed scheme has the characteristic of \u201cone-to-many\u201d encryption, and data is encrypted only once; (4) our scheme does not rely on any trusted third party; (5) in terms of the discrete logarithm problem and decisional q parallel-bilinear Diffie\u2013Hellman exponent problem, we prove that our proposed scheme is secure; and (6) experiment shows that our proposed scheme is more efficient than the comparative scheme. <\/jats:p>","DOI":"10.1177\/1550147721999616","type":"journal-article","created":{"date-parts":[[2021,3,10]],"date-time":"2021-03-10T05:08:16Z","timestamp":1615352896000},"page":"155014772199961","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":40,"title":["BCAS: A blockchain-based ciphertext-policy attribute-based encryption scheme for cloud data security sharing"],"prefix":"10.1177","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2783-8351","authenticated-orcid":false,"given":"Yuting","family":"Zuo","sequence":"first","affiliation":[{"name":"Fujian Normal University, Fuzhou, China"}]},{"given":"Zhaozhe","family":"Kang","sequence":"additional","affiliation":[{"name":"Fujian Normal University, Fuzhou, China"}]},{"given":"Jian","family":"Xu","sequence":"additional","affiliation":[{"name":"Fujian Normal University, Fuzhou, China"}]},{"given":"Zhide","family":"Chen","sequence":"additional","affiliation":[{"name":"Fujian Normal University, Fuzhou, China"}]}],"member":"179","published-online":{"date-parts":[[2021,3,9]]},"reference":[{"key":"bibr1-1550147721999616","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2015.01.025"},{"key":"bibr2-1550147721999616","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2017.07.007"},{"key":"bibr3-1550147721999616","doi-asserted-by":"publisher","DOI":"10.1007\/s13198-016-0525-0"},{"key":"bibr4-1550147721999616","doi-asserted-by":"publisher","DOI":"10.9756\/BIJSESC.9012"},{"key":"bibr5-1550147721999616","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-5225-8295-3.ch004"},{"key":"bibr6-1550147721999616","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.04.072"},{"key":"bibr7-1550147721999616","first-page":"157","volume-title":"Proceedings of the IEEE international conference on cloud computing in emerging markets (CCEM)","author":"Hegde N"},{"key":"bibr8-1550147721999616","first-page":"47","volume-title":"Proceedings of the IEEE 5th international conference on future Internet of Things and cloud (FiCloud)","author":"Ethelbert O"},{"key":"bibr9-1550147721999616","doi-asserted-by":"publisher","DOI":"10.17485\/ijst\/2016\/v9i4\/87040"},{"key":"bibr10-1550147721999616","first-page":"457","volume-title":"Proceedings of the 24th annual international conference on the theory and applications of cryptographic techniques","volume":"3494","author":"Sahai A"},{"key":"bibr11-1550147721999616","first-page":"321","volume-title":"Proceedings of the IEEE symposium on security and privacy (SP\u201907)","author":"Bethencourt J"},{"key":"bibr13-1550147721999616","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0163477"},{"key":"bibr14-1550147721999616","first-page":"173","volume-title":"Proceedings of the 1st IEEE international conference on hot information-centric networking (HotICN)","author":"Kan J"},{"key":"bibr15-1550147721999616","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2989392"},{"key":"bibr16-1550147721999616","first-page":"618","volume-title":"Proceedings of the IEEE 4th international conference on data science in cyberspace (DSC)","author":"Xu H"},{"key":"bibr17-1550147721999616","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-2523-6_4"},{"key":"bibr18-1550147721999616","first-page":"43","volume-title":"Proceedings of the international conference on machine learning, big data and business intelligence (MLBDBI)","author":"Lv J"},{"key":"bibr19-1550147721999616","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-018-1060-9"},{"key":"bibr20-1550147721999616","first-page":"516","volume-title":"Proceedings of the international conference on artificial intelligence and security","author":"Taylor ME"},{"key":"bibr21-1550147721999616","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2916673"},{"key":"bibr22-1550147721999616","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.12.023"},{"issue":"11","key":"bibr23-1550147721999616","first-page":"1582","volume":"60","author":"Harn L","year":"2017","journal-title":"Comput J"},{"key":"bibr24-1550147721999616","first-page":"581","volume-title":"Proceedings of the IEEE conference on communications and network security (CNS)","author":"Bicakci K"},{"key":"bibr25-1550147721999616","first-page":"336","volume-title":"Proceedings of the international conference on ICT convergence (ICTC)","author":"Kumar A"},{"key":"bibr26-1550147721999616","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/9852472"},{"key":"bibr27-1550147721999616","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.09.028"},{"key":"bibr28-1550147721999616","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.06.071"},{"key":"bibr29-1550147721999616","first-page":"89","volume-title":"Proceedings of the 13th ACM conference on computer and communications security","author":"Goyal V"},{"key":"bibr30-1550147721999616","doi-asserted-by":"publisher","DOI":"10.1177\/1550147719841276"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1550147721999616","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/1550147721999616","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1550147721999616","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,10]],"date-time":"2021-03-10T05:08:34Z","timestamp":1615352914000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1177\/1550147721999616"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3]]},"references-count":29,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2021,3]]}},"alternative-id":["10.1177\/1550147721999616"],"URL":"https:\/\/doi.org\/10.1177\/1550147721999616","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"value":"1550-1477","type":"print"},{"value":"1550-1477","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3]]}}}