{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T04:29:38Z","timestamp":1772166578833,"version":"3.50.1"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,5,10]],"date-time":"2021-05-10T00:00:00Z","timestamp":1620604800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2021,5,10]],"date-time":"2021-05-10T00:00:00Z","timestamp":1620604800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"EU Horizon 2020 DOMINOES Project","award":["771066"],"award-info":[{"award-number":["771066"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2021,12]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>With increasing application of cloud computing and big data technologies, a large amount of personal information is stored on the Internet, which raises the issue of privacy leakage. To protect people\u2019s data privacy, this paper firstly presents a new anonymous Identify-Based Encryption (IBE) scheme and gives the proof of its security under the Bilinear Diffie\u2013Hellman Security Assumption. Then, by introducing the anonymous IBE scheme into anonymous communication fields, this paper introduces a new lightweight anonymous communication model for cloud computing, which guarantees the anonymity of system users and the security of messages in small groups. Our analysis shows that, the proposed communication model cannot only reduce memory consumption and improve message transmission efficiency, but also effectively resist traffic-analysis attacks, node eavesdropping, and finally achieve secure anonymous communication in cloud computing.<\/jats:p>","DOI":"10.1186\/s13638-021-01953-z","type":"journal-article","created":{"date-parts":[[2021,5,10]],"date-time":"2021-05-10T04:03:56Z","timestamp":1620619436000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["LacminCC: lightweight anonymous communication model in cloud computing"],"prefix":"10.1186","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5730-3315","authenticated-orcid":false,"given":"Fengyin","family":"Li","sequence":"first","affiliation":[]},{"given":"Yanli","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Hongwei","family":"Ju","sequence":"additional","affiliation":[]},{"given":"Xinying","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Zhaojie","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Huiyu","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,5,10]]},"reference":[{"key":"1953_CR1","first-page":"2085638","volume":"2020","author":"H Liu","year":"2020","unstructured":"H. Liu, H. Kou, C. Yan, L. Qi, Keywords-driven and popularity-aware paper recommendation based on undirected paper citation graph. Complexity 2020, 2085638\u20131208563815 (2020)","journal-title":"Complexity"},{"key":"1953_CR2","doi-asserted-by":"publisher","first-page":"101522","DOI":"10.1016\/j.scs.2019.101522","volume":"49","author":"S Jegadeesan","year":"2019","unstructured":"S. Jegadeesan, M. Azees, P.M. Kumar, G. Manogaran, N. Chilamkurti, R. Varatharajan, C.-H. Hsu, An efficient anonymous mutual authentication technique for providing secure communication in mobile cloud computing for smart city applications. Sustain. Cities Soc. 49, 101522 (2019)","journal-title":"Sustain. Cities Soc."},{"key":"1953_CR3","doi-asserted-by":"publisher","first-page":"812","DOI":"10.1016\/j.future.2019.09.010","volume":"110","author":"H Wang","year":"2020","unstructured":"H. Wang, S. Ma, H.-N. Dai, M. Imran, T. Wang, Blockchain-based data privacy management with nudge theory in open banking. Future Gener. Comput. Syst. 110, 812\u2013823 (2020)","journal-title":"Future Gener. Comput. Syst."},{"key":"1953_CR4","first-page":"102362","volume":"48","author":"M Alloghani","year":"2019","unstructured":"M. Alloghani, M.M. Alani, D. Al-Jumeily, T. Baker, J. Mustafina, A. Hussain, A.J. Aljaaf, A systematic review on the status and progress of homomorphic encryption technologies. J. Inf. Secur. Appl. 48, 102362 (2019)","journal-title":"J. Inf. Secur. Appl."},{"key":"1953_CR5","doi-asserted-by":"crossref","unstructured":"A. Bahramali, R. Soltani, A. Houmansadr, D. Goeckel, D. Towsley, Practical traffic analysis attacks on secure messaging applications (2020). arXiv preprint arXiv:2005.00508","DOI":"10.14722\/ndss.2020.24347"},{"issue":"2","key":"1953_CR6","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"DL Chaum","year":"1981","unstructured":"D.L. Chaum, Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84\u201390 (1981)","journal-title":"Commun. ACM"},{"issue":"4","key":"1953_CR7","doi-asserted-by":"publisher","first-page":"482","DOI":"10.1109\/49.668972","volume":"16","author":"MG Reed","year":"1998","unstructured":"M.G. Reed, P.F. Syverson, D.M. Goldschlag, Anonymous connections and onion routing. IEEE J. Select. Areas Commun. 16(4), 482\u2013494 (1998)","journal-title":"IEEE J. Select. Areas Commun."},{"key":"1953_CR8","doi-asserted-by":"crossref","unstructured":"J. Hiller, J. Pennekamp, M. Dahlmanns, M. Henze, A. Panchenko, K. Wehrle, Tailoring onion routing to the internet of things: Security and privacy in untrusted environments. in 2019 IEEE 27th International Conference on Network Protocols (ICNP), pp. 1\u201312 (2019). IEEE","DOI":"10.1109\/ICNP.2019.8888033"},{"key":"1953_CR9","doi-asserted-by":"publisher","first-page":"43001","DOI":"10.1109\/ACCESS.2020.2977884","volume":"8","author":"A Raza","year":"2020","unstructured":"A. Raza, K. Han, S.O. Hwang, A framework for privacy preserving, distributed search engine using topology of DLT and onion routing. IEEE Access 8, 43001\u201343012 (2020)","journal-title":"IEEE Access"},{"issue":"4","key":"1953_CR10","doi-asserted-by":"publisher","first-page":"2582","DOI":"10.1109\/JIOT.2019.2948315","volume":"7","author":"MS Haghighi","year":"2019","unstructured":"M.S. Haghighi, Z. Aziminejad, Highly anonymous mobility-tolerant location-based onion routing for VANETs. IEEE Internet Things J. 7(4), 2582\u20132590 (2019)","journal-title":"IEEE Internet Things J."},{"key":"1953_CR11","unstructured":"M. Ando, A. Lysyanskaya, E. Upfal, Practical and provably secure onion routing (2017). arXiv preprint arXiv:1706.05367"},{"key":"1953_CR12","doi-asserted-by":"crossref","unstructured":"J. Pennekamp, J. Hiller, S. Reuter, W. la De\u00a0Cadena, A. Mitseva, M. Henze, T. Engel, K. Wehrle, A. Panchenko, Multipathing traffic to reduce entry node exposure in onion routing. in 2019 IEEE 27th International Conference on Network Protocols (ICNP), pp. 1\u20132 (2019). IEEE","DOI":"10.1109\/ICNP.2019.8888029"},{"issue":"2","key":"1953_CR13","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1515\/popets-2018-0011","volume":"2018","author":"F Rochet","year":"2018","unstructured":"F. Rochet, O. Pereira, Dropping on the edge: flexibility and traffic confirmation in onion routing protocols. Proc. Privacy Enhancing Technol. 2018(2), 27\u201346 (2018)","journal-title":"Proc. Privacy Enhancing Technol."},{"key":"1953_CR14","unstructured":"E. Cambiaso, I. Vaccari, L. Patti, M. Aiello, Darknet security: a categorization of attacks to the tor network. in ITASEC (2019)"},{"key":"1953_CR15","unstructured":"A. Iacovazzi, D. Frassinelli, Y. Elovici, The {DUSTER} attack: Tor onion service attribution based on flow watermarking with track hiding. in 22nd International Symposium on Research in Attacks, Intrusions and Defenses ({RAID} 2019), pp. 213\u2013225 (2019)"},{"issue":"1","key":"1953_CR16","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/BF00206326","volume":"1","author":"C David","year":"1988","unstructured":"C. David, The dining cryptographers problem: unconditional sender and recipient untraceability. J. Cryptol. 1(1), 65\u201375 (1988)","journal-title":"J. Cryptol."},{"issue":"3","key":"1953_CR17","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1007\/s10207-016-0318-0","volume":"16","author":"P Kotzanikolaou","year":"2017","unstructured":"P. Kotzanikolaou, G. Chatzisofroniou, M. Burmester, Broadcast anonymous routing (BAR): scalable real-time anonymous communication. Int. J. Inf. Secur. 16(3), 313\u2013326 (2017)","journal-title":"Int. J. Inf. Secur."},{"key":"1953_CR18","doi-asserted-by":"crossref","unstructured":"L. Barman, I. Dacosta, M. Zamani, E. Zhai, B. Ford, J.-P. Hubaux, J. Feigenbaum, Prifi: A low-latency local-area anonymous communication network (2017). arXiv: 1710.10237","DOI":"10.1145\/2994620.2994623"},{"issue":"3","key":"1953_CR19","first-page":"1","volume":"51","author":"S Fatemeh","year":"2018","unstructured":"S. Fatemeh, S. Milivoj, A.M. Rizwan, B. Michael, D. Claudia, A survey on routing in anonymous communication protocols. ACM Comput. Surv. (CSUR) 51(3), 1\u201339 (2018)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"1953_CR20","doi-asserted-by":"crossref","unstructured":"Z. Liu, Y. Liu, P. Winter, P. Mittal, Y.-C. Hu, Torpolice: Towards enforcing service-defined access policies for anonymous communication in the tor network. in 2017 IEEE 25th International Conference on Network Protocols (ICNP), pp. 1\u201310 (2017). IEEE","DOI":"10.1109\/ICNP.2017.8117564"},{"issue":"08","key":"1953_CR21","first-page":"1563","volume":"05","author":"S Chimkode","year":"2018","unstructured":"S. Chimkode, R. Sherikar, Privacy enhancing routing algorithm using backbone flooding schemes. Int. Res. J. Eng. Technol. (IRJET) 05(08), 1563\u20131566 (2018)","journal-title":"Int. Res. J. Eng. Technol. (IRJET)"},{"issue":"5","key":"1953_CR22","first-page":"155","volume":"28","author":"P Xie","year":"2017","unstructured":"P. Xie, T. Fu, J. Guo, Q. Wang, LBS privacy preserving model and security analysis based on expanded anonymous server. J. Comput. 28(5), 155\u2013161 (2017)","journal-title":"J. Comput."},{"key":"1953_CR23","doi-asserted-by":"crossref","unstructured":"A. Gupta, M. Hussain, Distributed cooperative algorithm to mitigate hello flood attack in cognitive radio ad hoc networks (CRAHNS). in Proceedings of the First International Conference on Computational Intelligence and Informatics, pp. 255\u2013263 (2017)","DOI":"10.1007\/978-981-10-2471-9_25"},{"issue":"6","key":"1953_CR24","doi-asserted-by":"publisher","first-page":"4187","DOI":"10.1109\/TII.2019.2936869","volume":"16","author":"X Xu","year":"2020","unstructured":"X. Xu, X. Zhang, H. Gao, Y. Xue, L. Qi, W. Dou, Become: blockchain-enabled computation offloading for IOT in mobile edge computing. IEEE Trans. Ind. Inf. 16(6), 4187\u20134195 (2020)","journal-title":"IEEE Trans. Ind. Inf."},{"key":"1953_CR25","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1109\/OJCS.2020.2990458","volume":"1","author":"P Zheng","year":"2020","unstructured":"P. Zheng, Z. Zheng, H. Dai, Xblock-ETH: Extracting and exploring blockchain data from Ethereum. IEEE Open J. Comput. Soc. 1, 95\u2013106 (2020)","journal-title":"IEEE Open J. Comput. Soc."},{"key":"1953_CR26","doi-asserted-by":"crossref","unstructured":"W. Wang, J. Song, G. Xu, Y. Li, H. Wang, C. Su, Contractward: Automated vulnerability detection models for Ethereum smart contracts. IEEE Trans. Netw. Sci. Eng. (2020)","DOI":"10.1109\/TNSE.2020.2968505"},{"key":"1953_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2018\/6809796","volume":"2018","author":"L Jiang","year":"2018","unstructured":"L. Jiang, T. Li, X. Li, M. Atiquzzaman, H. Ahmad, X. Wang, Anonymous communication via anonymous identity-based encryption and its application in IOT. Wirel. Commun. Mobile Comput. 2018, 1\u20138 (2018). https:\/\/doi.org\/10.1155\/2018\/6809796","journal-title":"Wirel. Commun. Mobile Comput."},{"key":"1953_CR28","unstructured":"D. Antonela, D. Roger, E. Arthur, F. M, Addressing denial of service attacks on free and open communication on the internet. The Tor Project, Tech. Rep. (2018)"},{"key":"1953_CR29","doi-asserted-by":"crossref","unstructured":"Y. Watanabe, K. Emura, J.H. Seo, New revocable ibe in prime-order groups: adaptively secure, decryption key exposure resistant, and with short public parameters. in Cryptographers Track at the RSA Conference, pp. 432\u2013449 (2017)","DOI":"10.1007\/978-3-319-52153-4_25"},{"key":"1953_CR30","doi-asserted-by":"crossref","unstructured":"B. Dan, F. Matt, Identity-based encryption from the weil pairing. in Annual International Cryptology Conference, pp. 213\u2013229 (2001)","DOI":"10.1007\/3-540-44647-8_13"},{"key":"1953_CR31","doi-asserted-by":"crossref","unstructured":"J. Antoine, A one round protocol for tripartite Diffie\u2013Hellman. in International Algorithmic Number Theory Symposium, pp. 385\u2013393 (2000). Springer","DOI":"10.1007\/10722028_23"},{"key":"1953_CR32","doi-asserted-by":"crossref","unstructured":"D. Boneh, C. Gentry, B. Waters, Collusion resistant broadcast encryption with short ciphertexts and private keys. in Annual International Cryptology Conference, vol. 3621, pp. 258\u2013275 (2005). Springer","DOI":"10.1007\/11535218_16"},{"key":"1953_CR33","doi-asserted-by":"crossref","unstructured":"B. Dan, B. Xavier, G. Eu-Jin, Hierarchical identity based encryption with constant size ciphertext. in Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 440\u2013456 (2005). Springer","DOI":"10.1007\/11426639_26"},{"key":"1953_CR34","doi-asserted-by":"crossref","unstructured":"S. Katsumata, S. Yamada, Partitioning via non-linear polynomial functions: more compact ibes from ideal lattices and bilinear maps. in International Conference on the Theory and Application of Cryptology and Information Security, pp. 682\u2013712 (2016). Springer","DOI":"10.1007\/978-3-662-53890-6_23"},{"issue":"6","key":"1953_CR35","first-page":"2003","volume":"30","author":"B Wang","year":"2014","unstructured":"B. Wang, X. Hong, An anonymous signature scheme in the standard model. J. Inf. Sci. Eng. 30(6), 2003\u20132017 (2014)","journal-title":"J. Inf. Sci. Eng."},{"issue":"17","key":"1953_CR36","first-page":"580","volume":"54","author":"K Mashal","year":"2016","unstructured":"K. Mashal, K. Mungase, Secure anonymity communication protocol for wireless sensor network. Int. J. Sci. Res. 54(17), 580\u2013585 (2016)","journal-title":"Int. J. Sci. Res."}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-021-01953-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13638-021-01953-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-021-01953-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,10]],"date-time":"2021-05-10T04:11:40Z","timestamp":1620619900000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-021-01953-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,10]]},"references-count":36,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["1953"],"URL":"https:\/\/doi.org\/10.1186\/s13638-021-01953-z","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-51852\/v2","asserted-by":"object"},{"id-type":"doi","id":"10.21203\/rs.3.rs-51852\/v1","asserted-by":"object"}]},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,5,10]]},"assertion":[{"value":"2 August 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 March 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 May 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"120"}}