{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T17:58:36Z","timestamp":1775066316848,"version":"3.50.1"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,1,22]],"date-time":"2024-01-22T00:00:00Z","timestamp":1705881600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,1,22]],"date-time":"2024-01-22T00:00:00Z","timestamp":1705881600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Web3.0 represents the ongoing evolution of blockchain technology, placing a strong emphasis on establishing a decentralized and user-controlled Internet. Current data delegation solutions for Web3.0 predominantly rely on attribute-based encryption algorithms (ABE) but lack the essential capabilities for processing ciphertext. Additionally, the attribute-based ciphertext transformation algorithm (ABCT) falls short when it comes to verifying the transformed ciphertext provided by data proxies. The primary objective of this article is to design a fine-grained and supervised attribute-based data delegating solution tailored specifically for Web3.0. This scheme aims to enhance the ciphertext processing capabilities of existing data delegation solutions based on blockchain and ABE. Additionally, it addresses the current limitations of ABCT technology. This includes its inability to verify re-encrypted ciphertext and ensure non-repudiation of transformation results. We leverage smart contracts to ensure the automatic execution of the data delegation process and to store permanent records on the blockchain for auditing and traceability. This approach guarantees a fair distribution of interests among all stakeholders. Furthermore, we employ a commitment mechanism and digital signature to enhance the regulatory compliance of existing ABCT technology. We present a secure access control and supervised data delegation scheme for Web3.0 with blockchain along with its instantiation, emphasizing its fine-grained nature and verifiability. Finally, the evaluation results demonstrate its practicality and effectiveness.<\/jats:p>","DOI":"10.1186\/s13677-023-00575-8","type":"journal-article","created":{"date-parts":[[2024,1,22]],"date-time":"2024-01-22T12:02:20Z","timestamp":1705924940000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Blockchain-enabled supervised secure data sharing and delegation scheme in Web3.0"],"prefix":"10.1186","volume":"13","author":[{"given":"Hongmin","family":"Gao","sequence":"first","affiliation":[]},{"given":"Pengfei","family":"Duan","sequence":"additional","affiliation":[]},{"given":"Xiaofeng","family":"Pan","sequence":"additional","affiliation":[]},{"given":"Xiaojing","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Keke","family":"Ye","sequence":"additional","affiliation":[]},{"given":"Ziyuan","family":"Zhong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,22]]},"reference":[{"issue":"1","key":"575_CR1","first-page":"29","volume":"62","author":"H Hannila","year":"2022","unstructured":"Hannila H, Silvola R, Harkonen J, Haapasalo H (2022) Data-driven begins with data; potential of data assets. J Comput Inf Syst 62(1):29\u201338","journal-title":"J Comput Inf Syst"},{"key":"575_CR2","doi-asserted-by":"crossref","unstructured":"Zhao L, Zhong L, Liu J, Zeng X, Zhang J (2023) A regulatable mechanism for transacting data assets. IEEE Internet Things J 10(24):21615-21632","DOI":"10.1109\/JIOT.2023.3306030"},{"issue":"1","key":"575_CR3","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/MNET.2023.10110018","volume":"37","author":"S Yang","year":"2023","unstructured":"Yang S, Li M (2023) Web3. 0 data infrastructure: Challenges and opportunities. IEEE Netw 37(1):4\u20135","journal-title":"IEEE Netw"},{"issue":"1","key":"575_CR4","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1108\/JEBDE-10-2022-0039","volume":"2","author":"C Guan","year":"2023","unstructured":"Guan C, Ding D, Guo J, Teng Y (2023) An ecosystem approach to web3. 0: a systematic review and research agenda. J Electron Bus Digit Econ 2(1):139\u2013156","journal-title":"J Electron Bus Digit Econ"},{"issue":"11","key":"575_CR5","doi-asserted-by":"publisher","first-page":"8269","DOI":"10.1109\/JIOT.2022.3154039","volume":"9","author":"M Rasori","year":"2022","unstructured":"Rasori M, La Manna M, Perazzo P, Dini G (2022) A survey on attribute-based encryption schemes suitable for the internet of things. IEEE Internet Things J 9(11):8269\u20138290","journal-title":"IEEE Internet Things J"},{"key":"575_CR6","doi-asserted-by":"crossref","unstructured":"Ge C, Susilo W, Liu Z, Baek J, Luo X, Fang L (2023) Attribute-based proxy re-encryption with direct revocation mechanism for data sharing in clouds. IEEE Trans Dependable Secure Comput:1-12","DOI":"10.1109\/TDSC.2023.3265979"},{"key":"575_CR7","doi-asserted-by":"crossref","unstructured":"Lin Z, Zhou J, Cao Z, Dong X, Choo KKR (2023) Generalized autonomous path proxy re-encryption scheme to support branch functionality. IEEE Trans Inf Forensic Secur 18:5387-5440","DOI":"10.1109\/TIFS.2023.3306942"},{"key":"575_CR8","unstructured":"Wilkinson S, Boshevski T, Brandoff J, Buterin V (2014) Storj a peer-to-peer cloud storage network"},{"key":"575_CR9","unstructured":"Vorick D, Champine L (2014) Sia: Simple decentralized storage (2014) White paper available at https:\/\/sia.tech\/sia.pdf, Retrieved May, 2014, 8:2018"},{"key":"575_CR10","doi-asserted-by":"publisher","unstructured":"Benet J (2014) Ipfs-content addressed, versioned, p2p file system. https:\/\/doi.org\/10.48550\/arXiv.1407.3561","DOI":"10.48550\/arXiv.1407.3561"},{"key":"575_CR11","doi-asserted-by":"publisher","unstructured":"Ogden M, McKelvey K, Madsen MB, et al (2017) Dat-distributed dataset synchronization and versioning. Open Sci Framework 10(2.2) https:\/\/doi.org\/10.31219\/osf.io\/nsv2c","DOI":"10.31219\/osf.io\/nsv2c"},{"key":"575_CR12","doi-asserted-by":"crossref","unstructured":"Politou E, Alepis E, Virvou M, Patsakis C, Politou E, Alepis E, Virvou M, Patsakis C (2022) Implementing content erasure in ipfs. Priv Data Prot Challenges Distrib Era 26:151\u2013163","DOI":"10.1007\/978-3-030-85443-0_8"},{"key":"575_CR13","doi-asserted-by":"publisher","first-page":"956","DOI":"10.1016\/j.future.2020.06.037","volume":"112","author":"E Politou","year":"2020","unstructured":"Politou E, Alepis E, Patsakis C, Casino F, Alazab M (2020) Delegated content erasure in ipfs. Futur Gener Comput Syst 112:956\u2013964","journal-title":"Futur Gener Comput Syst"},{"key":"575_CR14","doi-asserted-by":"crossref","unstructured":"Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Proceedings of the Annual international conference on the theory and applications of cryptographic techniques. Springer Berlin Heidelberg, pp 457\u2013473","DOI":"10.1007\/11426639_27"},{"key":"575_CR15","doi-asserted-by":"crossref","unstructured":"Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: Proceedings of the IEEE symposium on security and privacy. IEEE, Berkeley, pp 321\u2013334","DOI":"10.1109\/SP.2007.11"},{"key":"575_CR16","doi-asserted-by":"crossref","unstructured":"Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the ACM conference on Computer and communications security. CCS, Alexandria, pp 89\u201398","DOI":"10.1145\/1180405.1180418"},{"key":"575_CR17","doi-asserted-by":"crossref","unstructured":"Ibraimi L, Asim M, Petkovi\u0107 M (2009) Secure management of personal health records by applying attribute-based encryption. In: Proceedings of the international workshop on wearable, micro, and nano technologies for personalized health. IEEE, Oslo, pp 71\u201374","DOI":"10.1109\/PHEALTH.2009.5754828"},{"issue":"13","key":"575_CR18","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1109\/CC.2014.7022535","volume":"11","author":"D Chen","year":"2014","unstructured":"Chen D, Chen L, Fan X, He L, Pan S, Hu R (2014) Securing patient-centric personal health records sharing system in cloud computing. China Commun 11(13):121\u2013127","journal-title":"China Commun"},{"key":"575_CR19","doi-asserted-by":"crossref","unstructured":"Barua M, Liang X, Lu R, Shen X (2011) Peace: An efficient and secure patient-centric access control scheme for ehealth care system. In: Proceedings of the IEEE Conference on Computer Communications Workshops. IEEE, Shanghai, pp 970\u2013975","DOI":"10.1109\/INFCOMW.2011.5928953"},{"key":"575_CR20","doi-asserted-by":"crossref","unstructured":"Blaze M, Bleumer G, Strauss M (1998) Divertible protocols and atomic proxy cryptography. In: Proceedings of the International conference on the theory and applications of cryptographic techniques. Springer, Berlin Heidelberg, pp 127\u2013144","DOI":"10.1007\/BFb0054122"},{"issue":"1","key":"575_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1127345.1127346","volume":"9","author":"G Ateniese","year":"2006","unstructured":"Ateniese G, Fu K, Green M, Hohenberger S (2006) Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans Inf Syst Secur 9(1):1\u201330","journal-title":"ACM Trans Inf Syst Secur"},{"key":"575_CR22","doi-asserted-by":"crossref","unstructured":"Liang X, Cao Z, Lin H, Shao J (2009) Attribute based proxy re-encryption with delegating capabilities. In: Proceedings of the international symposium on information, computer, and communications security. Asia CCS, Sydney, pp 276\u2013286","DOI":"10.1145\/1533057.1533094"},{"key":"575_CR23","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/j.future.2014.11.016","volume":"52","author":"K Liang","year":"2015","unstructured":"Liang K, Au MH, Liu JK, Susilo W, Wong DS, Yang G, Yu Y, Yang A (2015) A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing. Futur Gener Comput Syst 52:95\u2013108","journal-title":"Futur Gener Comput Syst"},{"issue":"9","key":"575_CR24","doi-asserted-by":"publisher","first-page":"1981","DOI":"10.1109\/TIFS.2015.2442215","volume":"10","author":"K Liang","year":"2015","unstructured":"Liang K, Susilo W (2015) Searchable attribute-based mechanism with efficient data sharing for secure cloud storage. IEEE Trans Inf Forensic Secur 10(9):1981\u20131992","journal-title":"IEEE Trans Inf Forensic Secur"},{"issue":"7","key":"575_CR25","doi-asserted-by":"publisher","first-page":"970","DOI":"10.1093\/comjnl\/bxv100","volume":"59","author":"C Ge","year":"2016","unstructured":"Ge C, Susilo W, Wang J, Huang Z, Fang L, Ren Y (2016) A key-policy attribute-based proxy re-encryption without random oracles. Comput J 59(7):970\u2013982","journal-title":"Comput J"},{"key":"575_CR26","doi-asserted-by":"crossref","unstructured":"Liang K, Au MH, Susilo W, Wong DS, Yang G, Yu Y (2014) An adaptively cca-secure ciphertext-policy attribute-based proxy re-encryption for cloud data sharing. In: Proceedings of the Information Security Practice and Experience International Conference. Springer, Fuzhou, pp 448\u2013461","DOI":"10.1007\/978-3-319-06320-1_33"},{"issue":"6","key":"575_CR27","first-page":"2787","volume":"18","author":"C Ge","year":"2020","unstructured":"Ge C, Susilo W, Liu Z, Xia J, Szalachowski P, Fang L (2020) Secure keyword search and data sharing mechanism for cloud computing. IEEE Trans Dependable Secure Comput 18(6):2787\u20132800","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"575_CR28","doi-asserted-by":"crossref","unstructured":"Rouselakis Y, Waters B (2015) Efficient statically-secure large-universe multi-authority attribute-based encryption. In: Proceedings of the Financial Cryptography and Data Security International Conference. pp 315\u2013332","DOI":"10.1007\/978-3-662-47854-7_19"},{"key":"575_CR29","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/s13389-013-0057-3","volume":"3","author":"JA Akinyele","year":"2013","unstructured":"Akinyele JA, Garman C, Miers I, Pagano MW, Rushanan M, Green M, Rubin AD (2013) Charm: a framework for rapidly prototyping cryptosystems. J Cryptographic Eng 3:111\u2013128","journal-title":"J Cryptographic Eng"}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-023-00575-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13677-023-00575-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-023-00575-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,22]],"date-time":"2024-01-22T12:03:32Z","timestamp":1705925012000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofcloudcomputing.springeropen.com\/articles\/10.1186\/s13677-023-00575-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,22]]},"references-count":29,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,12]]}},"alternative-id":["575"],"URL":"https:\/\/doi.org\/10.1186\/s13677-023-00575-8","relation":{},"ISSN":["2192-113X"],"issn-type":[{"value":"2192-113X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1,22]]},"assertion":[{"value":"20 November 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 December 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 January 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"The authors declare no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"21"}}