{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T16:19:29Z","timestamp":1770826769475,"version":"3.50.1"},"reference-count":43,"publisher":"MDPI AG","issue":"21","license":[{"start":{"date-parts":[[2022,11,4]],"date-time":"2022-11-04T00:00:00Z","timestamp":1667520000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"University of Glasgow"},{"name":"Queen Mary University of London"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Remote Sensing"],"abstract":"<jats:p>Facilitated by the Internet of Things (IoT) and diverse IoT devices, remote sensing data are evolving into the multimedia era with an expanding data scale. Massive remote sensing data are collected by IoT devices to monitor environments and human activities. Because IoT devices are involved in the data collection, there are probably private data contained in the collected remote sensing data, such as the device owner information and the precise location. Therefore, when data analysts, researchers, and other stakeholders require remote sensing data from numerous IoT devices for different analyses and investigations, how to distribute massive remote sensing data efficiently and regulate different people to view different parts of the distributed remote sensing data is a challenge to be addressed. Many general solutions rely on granular access control for content distribution but do not consider the low computational efficiency caused by the huge file size of the remote sensing data or certain IoT devices only have a constrained computational performance. Therefore, we propose a new granular content distribution scheme, which is more lightweight and practical for the distribution of multimedia remote sensing data with the consideration of the large data size to avoid complicated operations to the data. Furthermore, a dual data integrity check (hash summary and watermark) designed in our scheme can detect tampering or forgery from encrypted remote sensing data before decrypting it and validate it again after decryption. The security analyses and experimental results manifest that our new scheme can maintain high computational efficiency and block tampering and forgery during the granular content distribution for IoT remote sensing data.<\/jats:p>","DOI":"10.3390\/rs14215574","type":"journal-article","created":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T03:02:22Z","timestamp":1667790142000},"page":"5574","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Granular Content Distribution for IoT Remote Sensing Data Supporting Privacy Preservation"],"prefix":"10.3390","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5155-122X","authenticated-orcid":false,"given":"Xiaoshuai","family":"Zhang","sequence":"first","affiliation":[{"name":"James Watt School of Engineering, University of Glasgow, Glasgow G12 8QQ, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5028-2291","authenticated-orcid":false,"given":"Guangyuan","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Engineering, Peking University, Beijing 100871, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3971-8434","authenticated-orcid":false,"given":"Xingru","family":"Huang","sequence":"additional","affiliation":[{"name":"School of Electronic Engineering and Computer Science, Queen Mary University of London, London E1 4NS, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3156-9609","authenticated-orcid":false,"given":"Stefan","family":"Poslad","sequence":"additional","affiliation":[{"name":"School of Electronic Engineering and Computer Science, Queen Mary University of London, London E1 4NS, UK"}]}],"member":"1968","published-online":{"date-parts":[[2022,11,4]]},"reference":[{"key":"ref_1","unstructured":"Wikipedia (2022, February 25). Internet of Things. Available online: https:\/\/en.wikipedia.org\/wiki\/Internet_of_things."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Dang, L.M., Piran, M., Han, D., Min, K., and Moon, H. (2019). A survey on internet of things and cloud computing for healthcare. Electronics, 8.","DOI":"10.3390\/electronics8070768"},{"key":"ref_3","unstructured":"Facts & Factors (2022, January 13). Global Internet of Things (IoT) Market Size To Hit USD 1842 Billion by 2028 at a 24.5% CAGR Growth (with COVID-19 Analysis): Facts & Factors. Available online: https:\/\/www.globenewswire.com\/news-release\/2022\/01\/13\/2366783\/0\/en\/Global-Internet-of-Things-IoT-Market-Size-To-Hit-USD-1-842-Billion-by-2028-at-a-24-5-CAGR-Growth-with-COVID-19-Analysis-Facts-Factors.html."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","article-title":"The internet of things: A survey","volume":"54","author":"Atzori","year":"2010","journal-title":"Comput. Netw."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"87169","DOI":"10.1109\/ACCESS.2019.2925403","article-title":"A provable semi-outsourcing privacy preserving scheme for data transmission from IoT devices","volume":"7","author":"Zhang","year":"2019","journal-title":"IEEE Access"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Pallavi, S., Mallapur, J.D., and Bendigeri, K.Y. (2017, January 20\u201322). Remote sensing and controlling of greenhouse agriculture parameters based on IoT. Proceedings of the 2017 International Conference on Big Data, IoT and Data Science (BID), Pune, India.","DOI":"10.1109\/BID.2017.8336571"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"110889","DOI":"10.1016\/j.rser.2021.110889","article-title":"Artificial intelligence and internet of things to improve efficacy of diagnosis and remote sensing of solar photovoltaic systems: Challenges, recommendations and future directions","volume":"143","author":"Mellit","year":"2021","journal-title":"Renew. Sustain. Energy Rev."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Ullo, S.L., and Sinha, G. (2021). Advances in IoT and smart sensors for remote sensing and agriculture applications. Remote Sens., 13.","DOI":"10.3390\/rs13132585"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Li, W., Awais, M., Ru, W., Shi, W., Ajmal, M., Uddin, S., and Liu, C. (2020). Review of sensor network-based irrigation systems using IoT and remote sensing. Adv. Meteorol., 2020.","DOI":"10.1155\/2020\/8396164"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Abraham, S., Beard, J., and Manijacob, R. (2017, January 19\u201322). Remote environmental monitoring using Internet of Things (IoT). Proceedings of the 2017 IEEE Global Humanitarian Technology Conference (GHTC), San Jose, CA, USA.","DOI":"10.1109\/GHTC.2017.8239335"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"112708","DOI":"10.1109\/ACCESS.2020.3002948","article-title":"A multi-modal approach for crop health mapping using low altitude remote sensing, internet of things (IoT) and machine learning","volume":"8","author":"Shafi","year":"2020","journal-title":"IEEE Access"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Michler, J.D., Josephson, A., Kilic, T., and Murray, S. (2022). Privacy Protection, Measurement Error, and the Integration of Remote Sensing and Socioeconomic Survey Data. arXiv.","DOI":"10.1016\/j.jdeveco.2022.102927"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Lu, Y., Zhang, D., Shang, L., and Wang, D. (2018, January 10\u201313). Risksens: A multi-view learning approach to identifying risky traffic locations in intelligent transportation systems using social and remote sensing. Proceedings of the 2018 IEEE International Conference on Big Data (Big Data), Seattle, WA, USA.","DOI":"10.1109\/BigData.2018.8621996"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Voigt, P., and von dem Bussche, A. (2017). Organisational Requirements. The EU General Data Protection Regulation (GDPR): A Practical Guide, Springer International Publishing.","DOI":"10.1007\/978-3-319-57959-7"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1016\/j.future.2014.06.004","article-title":"A hybrid solution for privacy preserving medical data sharing in the cloud environment","volume":"43","author":"Yang","year":"2015","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1016\/j.future.2014.10.014","article-title":"Secure sharing of personal health records in cloud computing: Ciphertext-policy attribute-based signcryption","volume":"52","author":"Liu","year":"2015","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Li, Z.R., Chang, E.C., Huang, K.H., and Lai, F. (2011, January 14\u201317). A secure electronic medical record sharing mechanism in the cloud computing platform. Proceedings of the 2011 IEEE 15th International Symposium on Consumer Electronics (ISCE), Singapore.","DOI":"10.1109\/ISCE.2011.5973792"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1109\/TPDS.2012.97","article-title":"Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption","volume":"24","author":"Li","year":"2012","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1016\/j.future.2016.07.019","article-title":"A secure and efficient ciphertext-policy attribute-based signcryption for personal health records sharing in cloud computing","volume":"67","author":"Rao","year":"2017","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Triantafyllou, A., Sarigiannidis, P., and Bibi, S. (2019). Precision agriculture: A remote sensing monitoring system architecture. Information, 10.","DOI":"10.3390\/info10110348"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Adi, W., Mulhem, S., and Mars, A. (2017, January 12\u201314). Secured remote sensing by deploying clone-resistant Secret Unknown Ciphers. Proceedings of the 2017 IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW), Taipei, Taiwan.","DOI":"10.1109\/ICCE-China.2017.7991031"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"3287","DOI":"10.1109\/JIOT.2020.3030813","article-title":"Secure cloud-aided object recognition on hyperspectral remote sensing images","volume":"8","author":"Gao","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref_23","unstructured":"Kaliski, B.S. (1997, January 17\u201321). Digital signcryption or how to achieve cost(signature & encryption) \u226a cost(signature) + cost(encryption). Proceedings of the Advances in Cryptology\u2014CRYPTO \u201997, Santa Barbara, CA, USA."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"3701","DOI":"10.1109\/TII.2018.2794991","article-title":"Provably secure and lightweight certificateless signature scheme for IIoT environments","volume":"14","author":"Karati","year":"2018","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Truong, H.T.T., Almeida, M., Karame, G., and Soriente, C. (2019, January 14\u201317). Towards secure and decentralized sharing of IoT data. Proceedings of the 2019 IEEE International Conference on Blockchain (Blockchain), Atlanta, GA, USA.","DOI":"10.1109\/Blockchain.2019.00031"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Chen, Y., Hu, B., Yu, H., Duan, Z., and Huang, J. (2021). A threshold proxy re-encryption scheme for secure IoT data sharing based on blockchain. Electronics, 10.","DOI":"10.3390\/electronics10192359"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Marr, B. (2016). Big Data in Practice: How 45 Successful Companies Used Big Data Analytics to Deliver Extraordinary Results, John Wiley & Sons.","DOI":"10.1002\/9781119278825"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"8967","DOI":"10.1109\/JIOT.2021.3119513","article-title":"Efficient Certificateless Online\/Offline Signcryption Scheme for Edge IoT Devices","volume":"9","author":"Chen","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1109\/MNET.101.2100125","article-title":"On Smart IoT Remote Sensing over Integrated Terrestrial-Aerial-Space Networks: An Asynchronous Federated Learning Approach","volume":"35","author":"Fadlullah","year":"2021","journal-title":"IEEE Netw."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"88","DOI":"10.23919\/JCC.2020.04.009","article-title":"Digital watermarking secure scheme for remote sensing image protection","volume":"17","author":"Yuan","year":"2020","journal-title":"China Commun."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Stinson, D.R. (2005). Cryptography: Theory and Practice, CRC Press.","DOI":"10.1201\/9781420057133"},{"key":"ref_32","unstructured":"Barker, E., Barker, W., Burr, W., Polk, W., and Smid, M. (2020). Recommendation for Key Management Part 1: General (Revision 5), NIST. Technical Report NIST.SP.800-57pt1r5."},{"key":"ref_33","unstructured":"Szczechowiak, P., Oliveira, L.B., Scott, M., Collier, M., and Dahab, R. (February, January 30). NanoECC: Testing the limits of elliptic curve cryptography in sensor networks. Proceedings of the European conference on Wireless Sensor Networks, Bologna, Italy."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1109\/MWC.2004.1269719","article-title":"The advantages of elliptic curve cryptography for wireless security","volume":"11","author":"Lauter","year":"2004","journal-title":"IEEE Wirel. Commun."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1109\/TMC.2006.16","article-title":"A study of the energy consumption characteristics of cryptographic algorithms and security protocols","volume":"5","author":"Potlapally","year":"2005","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"e4946","DOI":"10.1002\/cpe.4946","article-title":"An overview of Internet of Things (IoT): Architectural aspects, challenges, and protocols","volume":"32","author":"Gupta","year":"2020","journal-title":"Concurr. Comput. Pract. Exp."},{"key":"ref_37","unstructured":"Lowe, G. (1997, January 10\u201312). Casper: A compiler for the analysis of security protocols. Proceedings of the 10th Computer Security Foundations Workshop, Rockport, MA, USA."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"666","DOI":"10.1145\/359576.359585","article-title":"Communicating sequential processes","volume":"21","author":"Hoare","year":"1978","journal-title":"Commun. ACM"},{"key":"ref_39","first-page":"187","article-title":"FDR3\u2014A Modern Refinement Checker for CSP","volume":"Volume 8413","author":"Havelund","year":"2014","journal-title":"International Conference on Tools and Algorithms for the Construction and Analysis of Systems"},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"2352","DOI":"10.1109\/TGRS.2006.873853","article-title":"TOPSAR: Terrain observation by progressive scans","volume":"44","author":"Guarnieri","year":"2006","journal-title":"IEEE Trans. Geosci. Remote Sens."},{"key":"ref_41","unstructured":"Scott, M. (2019, August 21). MIRACL-Multiprecision Integer and Rational Arithmetic C\/C++ Library. Available online: https:\/\/github.com\/miracl\/MIRACL."},{"key":"ref_42","unstructured":"Viega, J., Messier, M., and Chandra, P. (2002). Network Security with OpenSSL: Cryptography for Secure Communications, O\u2019Reilly Media, Inc."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"252","DOI":"10.1007\/11935230_17","article-title":"Trading One-Wayness Against Chosen-Ciphertext Security in Factoring-Based Encryption","volume":"Volume 4284","author":"Paillier","year":"2006","journal-title":"Proceedings of the Advances in Cryptology\u2013ASIACRYPT 2006: 12th International Conference on the Theory and Application of Cryptology and Information Security"}],"container-title":["Remote Sensing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2072-4292\/14\/21\/5574\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T01:10:53Z","timestamp":1760145053000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2072-4292\/14\/21\/5574"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,4]]},"references-count":43,"journal-issue":{"issue":"21","published-online":{"date-parts":[[2022,11]]}},"alternative-id":["rs14215574"],"URL":"https:\/\/doi.org\/10.3390\/rs14215574","relation":{},"ISSN":["2072-4292"],"issn-type":[{"value":"2072-4292","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,11,4]]}}}