{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T06:22:28Z","timestamp":1775802148285,"version":"3.50.1"},"reference-count":34,"publisher":"Tech Science Press","issue":"3","license":[{"start":{"date-parts":[[2025,5,25]],"date-time":"2025-05-25T00:00:00Z","timestamp":1748131200000},"content-version":"vor","delay-in-days":144,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.060297","type":"journal-article","created":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T02:40:46Z","timestamp":1745289646000},"page":"5539-5559","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":2,"title":["A Lightweight IoT Data Security Sharing Scheme Based on Attribute-Based Encryption and Blockchain"],"prefix":"10.32604","volume":"83","author":[{"given":"Hongliang","family":"Tian","sequence":"first","affiliation":[]},{"given":"Meiruo","family":"Li","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"9478","DOI":"10.1109\/JIOT.2022.3144400","article-title":"A review of IoT-enabled mobile healthcare: technologies, challenges, and future trends","volume":"9","author":"Yang","year":"2022","journal-title":"IEEE Internet Things J"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"4794","DOI":"10.1109\/ACCESS.2022.3140595","article-title":"Integrating artificial intelligence internet of things and 5G for next-generation smartgrid: a survey of trends challenges and prospect","volume":"10","author":"Esenogho","year":"2022","journal-title":"IEEE Access"},{"key":"ref3","first-page":"2351","article-title":"FADSF: a data sharing model for intelligent connected vehicles based on blockchain technology","volume":"80","author":"Sun","year":"2024","journal-title":"Comput Mater Contin"},{"key":"ref4","series-title":"2020 Workshop on Emerging Technologies for Security in IoT (ETSecIoT)","first-page":"22","article-title":"IoT threat detection advances, challenges and future directions","author":"Karie","year":"2020"},{"key":"ref5","series-title":"2022 IEEE 2nd International Symposium on Sustainable Energy, Signal Processing and Cyber Security (iSSSC)","first-page":"1","article-title":"Secure framework for data leakage detection and prevention in iot application","author":"Nayak","year":"2022"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"36218","DOI":"10.1109\/ACCESS.2019.2905346","article-title":"A practical attribute-based document collection hierarchical encryption scheme in cloud computing","volume":"7","author":"Fu","year":"2019","journal-title":"IEEE Access"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"1242","DOI":"10.1109\/JSAC.2020.2986620","article-title":"Key-policy attribute-based encryption with keyword search in virtualized environments","volume":"38","author":"Yu","year":"2020","journal-title":"IEEE J Sel Areas Commun"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"316","DOI":"10.1109\/TDSC.2020.2977646","article-title":"A traceable and revocable ciphertext-policy attribute-based encryption scheme based on privacy protection","volume":"19","author":"Han","year":"2022","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"2914","DOI":"10.1109\/JIOT.2020.2963899","article-title":"SEM-ACSIT: secure and efficient multiauthority access control for IoT cloud storage","volume":"7","author":"Xiong","year":"2020","journal-title":"IEEE Internet Things J"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"635","DOI":"10.1109\/TDSC.2020.2987903","article-title":"Efficient and secure attribute-based access control with identical sub-policies frequently used in cloud storage","volume":"19","author":"Xue","year":"2022","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"8077","DOI":"10.1109\/JIOT.2020.2997389","volume":"7","author":"Pu","year":"2020","journal-title":"IEEE Internet Things J"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"134422","DOI":"10.1109\/ACCESS.2019.2941905","article-title":"NutBaaS: a Blockchain-as-a-service platform","volume":"7","author":"Zheng","year":"2019","journal-title":"IEEE Access"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"66707","DOI":"10.1109\/ACCESS.2021.3076235","article-title":"TDRB: an efficient tamper-proof detection middleware for relational database based on blockchain technology","volume":"9","author":"Lian","year":"2021","journal-title":"IEEE Access"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1016\/j.cose.2019.03.016","article-title":"A blockchain based approach for the definition of auditable access control systems","volume":"84","author":"Maesa","year":"2019","journal-title":"Comput Secur"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"53698","DOI":"10.1109\/ACCESS.2024.3387715","article-title":"A blockchain consensus mechanism to optimize reputation-based distributed energy trading in urban energy system","volume":"12","author":"Zhao","year":"2024","journal-title":"IEEE Access"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"3884","DOI":"10.1109\/TNSM.2022.3193707","article-title":"Attribute-based encryption with blockchain protection scheme for electronic health records","volume":"19","author":"Jiang","year":"2022","journal-title":"IEEE Trans Netw Serv Manag"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"87552","DOI":"10.1109\/ACCESS.2020.2992649","article-title":"BDSS-FA: a blockchain-based data security sharing platform with fine-grained access control","volume":"8","author":"Xu","year":"2020","journal-title":"IEEE Access"},{"key":"ref18","series-title":"Advances in Cryptology-EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques","first-page":"457","article-title":"Fuzzy identity-based encryption","author":"Sahai","year":"2005 May 22\u201326"},{"key":"ref19","series-title":"2007 IEEE Symp Secur Privacy (SP\u201907)","first-page":"321","article-title":"Ciphertext-policy attribute-based encryption","author":"Bethencourt","year":"2007"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1109\/TC.2020.3043950","article-title":"Efficient CP-ABE scheme with shared decryption in cloud storage","volume":"71","author":"Chen","year":"2022","journal-title":"IEEE Trans Comput"},{"key":"ref21","first-page":"2301","article-title":"RS-HABE: revocable-storage and hierarchical attribute-based access scheme for secure sharing of e-health records in public cloud","volume":"18","author":"Wei","year":"2021","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"4804","DOI":"10.1109\/JSYST.2022.3169601","article-title":"Toward secure and privacy-preserving cloud data sharing: online\/offline multiauthority CP-ABE with hidden policy","volume":"16","author":"Zhao","year":"2022","journal-title":"IEEE Syst J"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"8603","DOI":"10.1109\/JIOT.2022.3220850","article-title":"A scalable and auditable secure data sharing scheme with traceability for fog-based smart logistics","volume":"10","author":"Yang","year":"2023","journal-title":"IEEE Internet Things J"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"46362","DOI":"10.1109\/ACCESS.2024.3381509","article-title":"A multi-group-supporting policy hidden fine-grained data sharing scheme in 5G-enabled IoT with edge computing","volume":"12","author":"Cai","year":"2024","journal-title":"IEEE Access"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"8487","DOI":"10.1109\/TVT.2024.3360698","article-title":"Publicly accountable data-sharing scheme supporting privacy protection for fog-enabled VANETs","volume":"73","author":"Zhao","year":"2024","journal-title":"IEEE Trans Veh Technol"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"85190","DOI":"10.1109\/ACCESS.2020.2992203","article-title":"FADB: a fine-grained access control scheme for VANET data based on blockchain","volume":"8","author":"Li","year":"2020","journal-title":"IEEE Access"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"5771","DOI":"10.1109\/TII.2021.3136580","article-title":"A hybrid blockchain-based log management scheme with nonrepudiation for smart grids","volume":"18","author":"Le","year":"2022","journal-title":"IEEE Trans Ind Inform"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"12482","DOI":"10.1109\/JIOT.2021.3137240","article-title":"Secure decentralized attribute-based sharing of personal health records with blockchain","volume":"9","author":"Zhang","year":"2021","journal-title":"IEEE Internet Things J"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"20049","DOI":"10.1109\/JIOT.2023.3282672","article-title":"A multifactor combined data sharing scheme for vehicular fog computing using blockchain","volume":"10","author":"Guo","year":"2023","journal-title":"IEEE Internet Things J"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"82753","DOI":"10.1109\/ACCESS.2024.3412754","article-title":"Secure and fine-grained access control with optimized revocation for outsourced IoT EHRs with adaptive load-sharing in fog-assisted cloud environment","volume":"12","author":"Fugkeaw","year":"2024","journal-title":"IEEE Access"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"2012","DOI":"10.1109\/TC.2024.3398502","article-title":"Revocable and efficient blockchain-based fine-grained access control against EDoS attacks in cloud storage","volume":"73","author":"Zhang","year":"2024","journal-title":"IEEE Trans Comput"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1016\/j.future.2021.03.021","article-title":"A CP-ABE scheme based on multi-authority in hybrid clouds for mobile devices","volume":"121","author":"Xie","year":"2021","journal-title":"Fut Gener Comput Syst"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1016\/j.future.2021.04.022","article-title":"A partially hidden policy CP-ABE scheme against attribute values guessing attacks with online privacy-protective decryption testing in IoT assisted cloud computing","volume":"123","author":"Zhang","year":"2021","journal-title":"Fut Gener Comput Syst"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"108553","DOI":"10.1016\/j.comnet.2021.108553","article-title":"A decentralized strongly secure attribute-based encryption and authentication scheme for distributed Internet of Mobile Things","volume":"201","author":"Zhang","year":"2021","journal-title":"Comput Netw"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-83-3\/TSP_CMC_60297\/TSP_CMC_60297.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:26:45Z","timestamp":1763342805000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v83n3\/60981"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":34,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.060297","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2024-10-29","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-04-02","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-05-19","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}