{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T14:04:01Z","timestamp":1774533841829,"version":"3.50.1"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,8,2]],"date-time":"2023-08-02T00:00:00Z","timestamp":1690934400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,8,2]],"date-time":"2023-08-02T00:00:00Z","timestamp":1690934400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Implementing a trust and secure immunity or vaccine passport verification system is now crucial for many countries. The system typically aims to enable the secure access control and verification of vaccination records which will be used by trusted parties. However, the issues related to the system scalability in supporting a large number of data access requests, the enforcement of the user consent for data sharing, and the flexibility in delegating the access capability to trusted parties have not been resolved by existing works. In this paper, we propose a Universal Vaccine Passport Verification System (UniVAC) to support a decentralized, scalable, secure, and fine-grained, access control for Covid-19 vaccine passport data sharing and verification. At a core of our scheme, we employ the ciphertext policy attribute-based encryption (CP-ABE) to support secure and fine-grained access control and use the blockchain to record access transactions and provide data indexing. Furthermore, we propose a ciphertext retrieval method based on regional blockchain segmentation and introduce the outsourced CP-ABE decryption as a part of the proxy re-encryption (PRE) process to enable scalable and secure ciphertext delivery of the encrypted vaccine passport under the requestor\u2019s public key. Finally, we conducted the extensive experiments in real cloud environment and the results showed that our proposed scheme is more efficient and scalable than related works.<\/jats:p>","DOI":"10.1186\/s13677-023-00486-8","type":"journal-article","created":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T23:05:24Z","timestamp":1690931124000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["An efficient and scalable vaccine passport verification system based on ciphertext policy attribute-based encryption and blockchain"],"prefix":"10.1186","volume":"12","author":[{"given":"Somchart","family":"Fugkeaw","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,8,2]]},"reference":[{"key":"486_CR1","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1109\/ICEDEG52154.2021.9530954","volume":"2021","author":"EB Jackson","year":"2021","unstructured":"Jackson EB, Dreyling R, Pappel I (2021) Challenges and Implications of the WHO\u2019s Digital Cross-Border COVID-19 Vaccine Passport Recognition Pilot. Eighth Int Conference eDemocracy eGovernment (ICEDEG) 2021:88\u201394. https:\/\/doi.org\/10.1109\/ICEDEG52154.2021.9530954","journal-title":"Eighth Int Conference eDemocracy eGovernment (ICEDEG)"},{"key":"486_CR2","doi-asserted-by":"publisher","first-page":"49028","DOI":"10.1109\/ACCESS.2022.3172973","volume":"10","author":"S Fugkeaw","year":"2022","unstructured":"Fugkeaw S (2022) Enabling Trust and Privacy-Preserving e-KYC System Using Blockchain. IEEE Access 10:49028\u201349039","journal-title":"IEEE Access"},{"key":"486_CR3","doi-asserted-by":"publisher","first-page":"222093","DOI":"10.1109\/ACCESS.2020.3043350","volume":"8","author":"HR Hasan","year":"2020","unstructured":"Hasan HR, Salah K, Jayaraman R et al (2020) Blockchain-based solution for COVID-19 digital medical passports and immunity certificates. IEEE Access 8:222093\u2013222108","journal-title":"IEEE Access"},{"key":"486_CR4","doi-asserted-by":"crossref","unstructured":"Chaudhari S, Clear M, Bradish P, Tewari H (2021) Framework for a DLT based COVID-19 passport. Intelligent Computing 108\u2013123","DOI":"10.1007\/978-3-030-80129-8_9"},{"key":"486_CR5","doi-asserted-by":"crossref","unstructured":"Khan D, Hashmani MA, Jung LT, Junejo AZ (2022) Blockchain Enabled Track-and-Trace Framework for Covid-19 Immunity Certificate. 2022 2nd International Conference on Computing and Information Technology (ICCIT) 2022:248\u2013253, 2022.","DOI":"10.1109\/ICCIT52419.2022.9711597"},{"key":"486_CR6","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.11","volume-title":"Ciphertext-policy Attribute-based Encryption","author":"J Bethencourt","year":"2007","unstructured":"Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy Attribute-based Encryption. IEEE Symposium of Security and privacy, Oakland, CA, USA"},{"key":"486_CR7","doi-asserted-by":"publisher","unstructured":"Fugkeaw S, Sato H (2015) An Extended CP-ABE Based Access Control Model for Data Outsourced in the Cloud. 2015 IEEE 39th Annual Computer Software and Applications Conference 73\u201378, https:\/\/doi.org\/10.1109\/COMPSAC.2015.216.","DOI":"10.1109\/COMPSAC.2015.216"},{"key":"486_CR8","doi-asserted-by":"crossref","unstructured":"Liu K, Desai H, Kagal L (2018) Enforceable data sharing agreements using smart contracts. \narXiv:1804.10645. Available: https:\/\/arxiv.org\/abs\/1804.10645","DOI":"10.1109\/Cybermatics_2018.2018.00261"},{"key":"486_CR9","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.jnca.2018.05.005","volume":"116","author":"C Lin","year":"2018","unstructured":"Lin C, He D, Huang X, Choo K-KR, Vasilakos AV (2018) BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 40\u2019. J Netw Comput Appl. 116:42\u201352","journal-title":"J Netw Comput Appl."},{"key":"486_CR10","doi-asserted-by":"publisher","first-page":"112713","DOI":"10.1109\/ACCESS.2019.2929205","volume":"7","author":"S Wang","year":"2019","unstructured":"Wang S, Wang X, Zhang Y (2019) A Secure Cloud Storage Framework With Access Control Based on Blockchain. IEEE Access 7:112713\u2013112725. https:\/\/doi.org\/10.1109\/ACCESS.2019.2929205","journal-title":"IEEE Access"},{"key":"486_CR11","doi-asserted-by":"publisher","first-page":"70604","DOI":"10.1109\/ACCESS.2020.2985762","volume":"8","author":"C Yang","year":"2020","unstructured":"Yang C, Tan L, Shi N, Xu B, Cao Y, Yu K (2020) AuthPrivacyChain: A Blockchain-Based Access Control Framework With Privacy Protection in Cloud. IEEE Access 8:70604\u201370615. https:\/\/doi.org\/10.1109\/ACCESS.2020.2985762","journal-title":"IEEE Access"},{"issue":"8","key":"486_CR12","doi-asserted-by":"publisher","first-page":"2146","DOI":"10.1109\/JBHI.2020.2969648","volume":"24","author":"A Yazdinejad","year":"2020","unstructured":"Yazdinejad A, Srivastava G, Parizi RM, Dehghantanha A, Choo KKR, Aledhari M (2020) Decentralized authentication of distributed patients in hospital networks using blockchain. IEEE J Biomed Health Inform 24(8):2146\u20132156","journal-title":"IEEE J Biomed Health Inform"},{"key":"486_CR13","doi-asserted-by":"publisher","first-page":"36978","DOI":"10.1109\/ACCESS.2022.3164081","volume":"10","author":"Z Ullah","year":"2022","unstructured":"Ullah Z, Raza B, Shah H, Khan S, Waheed A (2022) Towards Blockchain-Based Secure Storage and Trusted Data Sharing Scheme for IoT Environment. IEEE Access 10:36978\u201336994. https:\/\/doi.org\/10.1109\/ACCESS.2022.3164081","journal-title":"IEEE Access"},{"issue":"5","key":"486_CR14","doi-asserted-by":"publisher","first-page":"2020","DOI":"10.1109\/JBHI.2022.3140831","volume":"26","author":"X Li","year":"2022","unstructured":"Li X, Liu S, Lu R, Khan MK, Gu K, Zhang X (2022) An Efficient Privacy-Preserving Public Auditing Protocol for Cloud-Based Medical Storage System. IEEE J Biomed Health Inform 26(5):2020\u20132031. https:\/\/doi.org\/10.1109\/JBHI.2022.3140831","journal-title":"IEEE J Biomed Health Inform"},{"key":"486_CR15","doi-asserted-by":"publisher","first-page":"25480","DOI":"10.1109\/ACCESS.2023.3255885","volume":"11","author":"S Fugkeaw","year":"2023","unstructured":"Fugkeaw S (2023) Achieving Decentralized and Dynamic SSO-Identity Access Management System for Multi-Application Outsourced in Cloud. IEEE Access 11:25480\u201325491. https:\/\/doi.org\/10.1109\/ACCESS.2023.3255885","journal-title":"IEEE Access"},{"key":"486_CR16","doi-asserted-by":"publisher","unstructured":"Fan Y, Lin X, Liang W, Wang J, Tan G, Lei X, Jing L (Accepted\/In press).\u00a0TraceChain: A blockchain-based scheme to protect data confidentiality and traceability.\u00a0Softw Pract Exp.\u00a0https:\/\/doi.org\/10.1002\/spe.2753","DOI":"10.1002\/spe.2753"},{"key":"486_CR17","doi-asserted-by":"crossref","unstructured":"Yuan C, Xu M, Si X, Li B (2017) Blockchain with accountable CP-ABE: How to effectively protect the electronic documents, in Proc. IEEE 23rd Int Conf Parallel Distrib Syst 800\u2013803.","DOI":"10.1109\/ICPADS.2017.00111"},{"issue":"7\u20138","key":"486_CR18","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1007\/s12243-018-00699-y","volume":"74","author":"A Wu","year":"2019","unstructured":"Wu A, Zhang Y, Zheng X, Guo R, Zhao Q, Zheng D (2019) Efficient and privacy-preserving traceable attribute-based encryption in blockchain. Ann Telecommun 74(7\u20138):401\u2013411","journal-title":"Ann Telecommun"},{"key":"486_CR19","doi-asserted-by":"publisher","first-page":"66792","DOI":"10.1109\/ACCESS.2019.2917555","volume":"7","author":"DC Nguyen","year":"2019","unstructured":"Nguyen DC, Pathirana PN, Ding M, Seneviratne A (2019) Blockchain for Secure EHRs Sharing of Mobile Cloud Based E-Health Systems. IEEE Access 7:66792\u201366806. https:\/\/doi.org\/10.1109\/ACCESS.2019.2917555","journal-title":"IEEE Access"},{"key":"486_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2022\/5721212","volume":"2022","author":"H Gao","year":"2022","unstructured":"Gao H, Ji H, Huang H, Xiao F, Jian L (2022) An Immunity Passport Scheme Based on the Dual-Blockchain Architecture for International Travel. Wireless Commun Mobile Comput. 2022:1\u20131. https:\/\/doi.org\/10.1155\/2022\/5721212","journal-title":"Wireless Commun Mobile Comput."},{"issue":"5","key":"486_CR21","doi-asserted-by":"publisher","first-page":"3915","DOI":"10.1109\/JIOT.2020.3025953","volume":"8","author":"H Xu","year":"2021","unstructured":"Xu H, Zhang L, Onireti O, Fang Y, Buchanan WJ, Imran MA (2021) BeepTrace: blockchain-enabled privacy-preserving contact tracing for COVID-19 pandemic and beyond. IEEE Internet Things J 8(5):3915\u20133929","journal-title":"IEEE Internet Things J"},{"key":"486_CR22","doi-asserted-by":"publisher","first-page":"159402","DOI":"10.1109\/ACCESS.2020.3020513","volume":"8","author":"L Garg","year":"2020","unstructured":"Garg L, Chukwu E, Nasser N, Chakraborty C, Garg G (2020) Anonymity preserving IoT-based COVID-19 and other infectious disease contact tracing model. IEEE Access 8:159402\u2013159414","journal-title":"IEEE Access"},{"issue":"1","key":"486_CR23","doi-asserted-by":"publisher","first-page":"560","DOI":"10.1109\/JSYST.2019.2896064","volume":"14","author":"X Jia","year":"2020","unstructured":"Jia X, He D, Kumar N, Choo K-KR (2020) Aprovably secure and efficient identity-based anonymous authentication scheme for mobile edge computing. IEEE Syst J 14(1):560\u2013571","journal-title":"IEEE Syst J"},{"issue":"1","key":"486_CR24","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1109\/COMST.2022.3143147","volume":"24","author":"E Daniel","year":"2022","unstructured":"Daniel E, Tschorsch F (2022) IPFS and Friends: A Qualitative Comparison of Next Generation Peer-to-Peer Data Networks. IEEE Commun Surv Tutorials 24(1):31\u201352. https:\/\/doi.org\/10.1109\/COMST.2022.3143147","journal-title":"IEEE Commun Surv Tutorials"},{"key":"486_CR25","unstructured":"\u201clibp2p\u2014Github,\u201d Protocol Labs. https:\/\/github.com\/libp2p. Accessed June. 2022."},{"issue":"1","key":"486_CR26","doi-asserted-by":"publisher","first-page":"575","DOI":"10.1109\/TSC.2021.3110828","volume":"16","author":"S Fugkeaw","year":"2023","unstructured":"Fugkeaw S (2023) Secure Data Sharing With Efficient Key Update for Industrial Cloud-Based Access Control. IEEE Trans Serv Comput. 16(1):575\u2013587. https:\/\/doi.org\/10.1109\/TSC.2021.3110828","journal-title":"IEEE Trans Serv Comput."},{"key":"486_CR27","doi-asserted-by":"crossref","unstructured":"Cheuung L, Newport C (2007) Provable Secure Ciphertext Policy ABE. In Proc. of ACM Conference on Computer and Communication Security. pp. 456\u2013465.","DOI":"10.1145\/1315245.1315302"},{"key":"486_CR28","unstructured":"PBC (Pairing-Based Cryptography) library. Accessed: 2 June 2022. Available: https:\/\/crypto.stanford.edu\/pbc\/"}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-023-00486-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13677-023-00486-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-023-00486-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T23:05:37Z","timestamp":1690931137000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofcloudcomputing.springeropen.com\/articles\/10.1186\/s13677-023-00486-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,2]]},"references-count":28,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2023,12]]}},"alternative-id":["486"],"URL":"https:\/\/doi.org\/10.1186\/s13677-023-00486-8","relation":{},"ISSN":["2192-113X"],"issn-type":[{"value":"2192-113X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,8,2]]},"assertion":[{"value":"27 December 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 July 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 August 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"111"}}