{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,23]],"date-time":"2024-06-23T15:09:04Z","timestamp":1719155344413},"reference-count":21,"publisher":"Walter de Gruyter GmbH","issue":"1","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,12,10]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>Under the background of the rapid development of information technology, people\u2019s data and information security problems are becoming increasingly serious. Data and information can be leaked in daily Internet access or communications. When doing data sharing, the security mechanism of the data sharing platform should be analyzed. This article aims to study how to analyze the security mechanism of cloud computing-based data sharing platforms in the Internet of Things era. This article presented an attribute-based encryption (ABE) algorithm, a detailed interpretation of the attribute-based encryption algorithm, and analyzed security problems in data sharing in cloud computing. The experimental results showed that the ABE algorithm takes an average of 11\u2009s with five trials, while the other two methods take 51.8 and 31.6\u2009s. ABEs take less time for different encryption numbers under the same data than the other two methods and are more efficient than the other two methods. Thus, attribute-based encryption algorithms should have more advantages.<\/jats:p>","DOI":"10.1515\/comp-2022-0256","type":"journal-article","created":{"date-parts":[[2022,12,10]],"date-time":"2022-12-10T12:47:41Z","timestamp":1670676461000},"page":"403-415","source":"Crossref","is-referenced-by-count":1,"title":["Data sharing platform and security mechanism based on cloud computing under the Internet of Things"],"prefix":"10.1515","volume":"12","author":[{"given":"Jie","family":"Cai","sequence":"first","affiliation":[{"name":"School of Intelligent Engineering, NanJing City Vocational College , Nanjing 211200 , Jiangsu , China"}]},{"given":"Jun","family":"Wang","sequence":"additional","affiliation":[{"name":"Software Development Department, BDStar Intelligent & Connected Vehicle Technology Co., Ltd. (BICV) , Nanjing 211100 , Jiangsu , China"}]}],"member":"374","published-online":{"date-parts":[[2022,12,10]]},"reference":[{"key":"2022121012473471054_j_comp-2022-0256_ref_001","doi-asserted-by":"crossref","unstructured":"L. Jin, Y. Zhang, X. Chen, and X. Yang, \u201cSecure attribute-based data sharing for resource-limited users in cloud computing,\u201d Comput. Sec., vol. 72, no. JAN, pp. 1\u201312, 2018.","DOI":"10.1016\/j.cose.2017.08.007"},{"key":"2022121012473471054_j_comp-2022-0256_ref_002","unstructured":"T. F. Xue, Q. C. Fu, C. Wang, and X. Y. Wang, \u201cA medical data sharing model via blockchain,\u201d Zidonghua Xuebao\/Acta Auto Sin., vol. 43, no. 9, pp. 1555\u20131562, 2017."},{"key":"2022121012473471054_j_comp-2022-0256_ref_003","doi-asserted-by":"crossref","unstructured":"Z. Liu, T. Li, P. Li, C. F. Jia, and J. Li, \u201cVerifiable searchable encryption with aggregate keys for data sharing system,\u201d Future Gener. Comput. Syst., vol. 78, no. PT.2, pp. 778\u2013788, 2017.","DOI":"10.1016\/j.future.2017.02.024"},{"key":"2022121012473471054_j_comp-2022-0256_ref_004","doi-asserted-by":"crossref","unstructured":"C. Jiang, L. Gao, L. Duan, and J. Huang, \u201cScalable mobile crowdsensing via peer-to-peer data sharing,\u201d IEEE Trans. Mob. Comput., vol. 17, no. 4, pp. 898\u2013912, 2017.","DOI":"10.1109\/TMC.2017.2743718"},{"key":"2022121012473471054_j_comp-2022-0256_ref_005","doi-asserted-by":"crossref","unstructured":"K. Xue, J. Hong, Y. Ma, D. S. L. Wei, P. Hong, and N. Yu, \u201cFog-aided verifiable privacy preserving access control for latency-sensitive data sharing in vehicular cloud computing,\u201d IEEE Netw., vol. 32, no. 3, pp. 7\u201313, 2018.","DOI":"10.1109\/MNET.2018.1700341"},{"key":"2022121012473471054_j_comp-2022-0256_ref_006","doi-asserted-by":"crossref","unstructured":"G. A. Ascoli, P. Maraver, S. Nanda, S. Polavaram, and R. Arma, \u201cWin-win data sharing in neuroscience,\u201d Nat. Methods, vol. 14, no. 2, pp. 112\u2013116, 2017.","DOI":"10.1038\/nmeth.4152"},{"key":"2022121012473471054_j_comp-2022-0256_ref_007","unstructured":"L. Liu, W. Kong, Z. Cao, and J. Wang, \u201cAnalysis of one certificateless encryption for secure data sharing in public clouds,\u201d Int. J. Electron. Inf. Eng., vol. 6, no. 2, pp. 110\u2013115, 2017."},{"key":"2022121012473471054_j_comp-2022-0256_ref_008","doi-asserted-by":"crossref","unstructured":"B. Marwick and S. Birch, \u201cA standard for the scholarly citation of archaeological data as an incentive to data sharing,\u201d Adv. Archaeolog Pract., vol. 6, no. 2, pp. 1\u201319, 2018.","DOI":"10.1017\/aap.2018.3"},{"key":"2022121012473471054_j_comp-2022-0256_ref_009","doi-asserted-by":"crossref","unstructured":"H. Zhao and D. Nan, \u201cDynamic analysis of stochastic Cohen\u2013Grossberg neural networks with time delays,\u201d Appl. Math. Comput., vol. 183, no. 1, pp. 464\u2013470, 2017.","DOI":"10.1016\/j.amc.2006.05.087"},{"key":"2022121012473471054_j_comp-2022-0256_ref_010","doi-asserted-by":"crossref","unstructured":"P. Mark, \u201cInternational data-sharing norms: from the OECD to the general data protection regulation (GDPR),\u201d Hum. Genet., vol. 137, no. 8, pp. 575\u2013582, 2018.","DOI":"10.1007\/s00439-018-1919-7"},{"key":"2022121012473471054_j_comp-2022-0256_ref_011","doi-asserted-by":"crossref","unstructured":"M. Segler, T. Kogej, C. Tyrchan, and M. P. Waller, \u201cGenerating focused molecule libraries for drug discovery with recurrent neural networks,\u201d Acs Cent. Sci., vol. 4, no. 1, pp. 120\u2013131, 2018.","DOI":"10.1021\/acscentsci.7b00512"},{"key":"2022121012473471054_j_comp-2022-0256_ref_012","doi-asserted-by":"crossref","unstructured":"B. M.Knoppers and Y.Joly, \u201cIntroduction: the why and whither of genomic data sharing,\u201d Hum. Genet., vol. 137, no. 8, pp. 569\u2013574, 2018.","DOI":"10.1007\/s00439-018-1923-y"},{"key":"2022121012473471054_j_comp-2022-0256_ref_013","doi-asserted-by":"crossref","unstructured":"M. Sepehri, A. Trombetta, and M. Sepehri, \u201cSecure Data Sharing in Cloud Using an Efficient Inner-Product Proxy Re-Encryption Scheme,\u201d J. Cyber Secur. Mobil., vol. 6, no. 3, pp. 339\u2013378, 2018.","DOI":"10.13052\/jcsm2245-1439.635"},{"key":"2022121012473471054_j_comp-2022-0256_ref_014","doi-asserted-by":"crossref","unstructured":"A. Thorogood and B. M. Knoppers, \u201cCan research ethics committees enable clinical trial data sharing? Ethics Med. Public. Health, vol. 3, no. 1, pp. 56\u201363, 2017.","DOI":"10.1016\/j.jemep.2017.02.010"},{"key":"2022121012473471054_j_comp-2022-0256_ref_015","doi-asserted-by":"crossref","unstructured":"J. Montgomery, \u201cData sharing and the idea of ownership,\u201d N. Bioeth., vol. 23, no. 1, pp. 81\u201386, 2017.","DOI":"10.1080\/20502877.2017.1314893"},{"key":"2022121012473471054_j_comp-2022-0256_ref_016","doi-asserted-by":"crossref","unstructured":"M. M. Mello, L. Van, and S. N. Goodman, \u201cClinical trial participants\u2019 views of the risks and benefits of data sharing,\u201d N. Engl. J. Med., vol. 378, no. 23, pp. 2202\u20132211, 2018.","DOI":"10.1056\/NEJMsa1713258"},{"key":"2022121012473471054_j_comp-2022-0256_ref_017","doi-asserted-by":"crossref","unstructured":"K. B. Read, L. Amos, L. M. Federer, A. Logan, and K. G. Akers, \u201c Practicing what we preach: developing a data sharing policy for the journal of the medical library association,\u201d J. Med. Lib. Assoc. JMLA, vol. 106, no. 2, pp. 155\u2013158, 2018.","DOI":"10.5195\/jmla.2018.431"},{"key":"2022121012473471054_j_comp-2022-0256_ref_018","doi-asserted-by":"crossref","unstructured":"C. H. George, S. C. Stanford, S. Alexander, G. Cirino, J. R. Docherty, and M. A. Giembycz, \u201cUpdating the guidelines for data transparency in the British Journal of Pharmacology\u2009\u2013\u2009data sharing and the use of scatter plots instead of bar charts,\u201d Br. J. Pharmacol., vol. 174, no. 17, pp. 2801\u20132804, 2017.","DOI":"10.1111\/bph.13925"},{"key":"2022121012473471054_j_comp-2022-0256_ref_019","doi-asserted-by":"crossref","unstructured":"H. Rodriguez and S. R. Pennington, \u201cRevolutionizing precision oncology through collaborative proteogenomics and data sharing,\u201d Cell, vol. 173, no. 3, pp. 535\u2013539, 2018.","DOI":"10.1016\/j.cell.2018.04.008"},{"key":"2022121012473471054_j_comp-2022-0256_ref_020","doi-asserted-by":"crossref","unstructured":"K. Bhuvaneshwar, A. Belouali, S. Rao, A. Alaoui, Y. Gusev, and R. Clarke, \u201cAbstract 2604: The Georgetown Database of Cancer (G-DOC): A web-based data sharing platform for precision medicine,\u201d Cancer Res., vol. 77, no. 13 Supplement, pp. 2604\u20132604, 2017.","DOI":"10.1158\/1538-7445.AM2017-2604"},{"key":"2022121012473471054_j_comp-2022-0256_ref_021","doi-asserted-by":"crossref","unstructured":"T. Doel, D. I. Shakir, R. Pratt, M. Aertsen, J. Moggridge, and E. Bellon, \u201cGIFT-Cloud: A data sharing and collaboration platform for medical imaging research,\u201d Comput. Methods Prog. Biomed., vol. 139, no. Complete, pp. 181\u2013190, 2017.","DOI":"10.1016\/j.cmpb.2016.11.004"}],"container-title":["Open Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/comp-2022-0256\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/comp-2022-0256\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,10]],"date-time":"2022-12-10T12:47:49Z","timestamp":1670676469000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/comp-2022-0256\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,1]]},"references-count":21,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2022,12,10]]},"published-print":{"date-parts":[[2022,12,10]]}},"alternative-id":["10.1515\/comp-2022-0256"],"URL":"https:\/\/doi.org\/10.1515\/comp-2022-0256","relation":{},"ISSN":["2299-1093"],"issn-type":[{"value":"2299-1093","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,1]]}}}