{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T00:35:14Z","timestamp":1773707714073,"version":"3.50.1"},"reference-count":75,"publisher":"MDPI AG","issue":"7","license":[{"start":{"date-parts":[[2021,4,2]],"date-time":"2021-04-02T00:00:00Z","timestamp":1617321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Blockchain technology provides a tremendous opportunity to transform current personal health record (PHR) systems into a decentralised network infrastructure. However, such technology possesses some drawbacks, such as issues in privacy and storage capacity. Given its transparency and decentralised features, medical data are visible to everyone on the network and are inappropriate for certain medical applications. By contrast, storing vast medical data, such as patient medical history, laboratory tests, X-rays, and MRIs, significantly affect the repository storage of blockchain. This study bridges the gap between PHRs and blockchain technology by offloading the vast medical data into the InterPlanetary File System (IPFS) storage and establishing an enforced cryptographic authorisation and access control scheme for outsourced encrypted medical data. The access control scheme is constructed on the basis of the new lightweight cryptographic concept named smart contract-based attribute-based searchable encryption (SC-ABSE). This newly cryptographic primitive is developed by extending ciphertext-policy attribute-based encryption (CP-ABE) and searchable symmetric encryption (SSE) and by leveraging the technology of smart contracts to achieve the following: (1) efficient and secure fine-grained access control of outsourced encrypted data, (2) confidentiality of data by eliminating trusted private key generators, and (3) multikeyword searchable mechanism. Based on decisional bilinear Diffie\u2013Hellman hardness assumptions (DBDH) and discrete logarithm (DL) problems, the rigorous security indistinguishability analysis indicates that SC-ABSE is secure against the chosen-keyword attack (CKA) and keyword secrecy (KS) in the standard model. In addition, user collusion attacks are prevented, and the tamper-proof resistance of data is ensured. Furthermore, security validation is verified by simulating a formal verification scenario using Automated Validation of Internet Security Protocols and Applications (AVISPA), thereby unveiling that SC-ABSE is resistant to man-in-the-middle (MIM) and replay attacks. The experimental analysis utilised real-world datasets to demonstrate the efficiency and utility of SC-ABSE in terms of computation overhead, storage cost and communication overhead. The proposed scheme is also designed and developed to evaluate throughput and latency transactions using a standard benchmark tool known as Caliper. Lastly, simulation results show that SC-ABSE has high throughput and low latency, with an ultimate increase in network life compared with traditional healthcare systems.<\/jats:p>","DOI":"10.3390\/s21072462","type":"journal-article","created":{"date-parts":[[2021,4,2]],"date-time":"2021-04-02T10:34:09Z","timestamp":1617359649000},"page":"2462","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":46,"title":["Blockchain-Based Access Control Scheme for Secure Shared Personal Health Records over Decentralised Storage"],"prefix":"10.3390","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8045-8809","authenticated-orcid":false,"given":"Hassan","family":"Hussien","sequence":"first","affiliation":[{"name":"Faculty of Computer Science and Information Technology, Universiti Putra Malaysia, Serdang 43400, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4748-0844","authenticated-orcid":false,"given":"Sharifah","family":"Yasin","sequence":"additional","affiliation":[{"name":"Faculty of Computer Science and Information Technology, Universiti Putra Malaysia, Serdang 43400, Malaysia"},{"name":"Institute for Mathematical Research (INSPEM), Universiti Putra Malaysia, Serdang 43400, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0543-3329","authenticated-orcid":false,"given":"Nur","family":"Udzir","sequence":"additional","affiliation":[{"name":"Faculty of Computer Science and Information Technology, Universiti Putra Malaysia, Serdang 43400, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3134-6365","authenticated-orcid":false,"given":"Mohd","family":"Ninggal","sequence":"additional","affiliation":[{"name":"Faculty of Computer Science and Information Technology, Universiti Putra Malaysia, Serdang 43400, Malaysia"}]}],"member":"1968","published-online":{"date-parts":[[2021,4,2]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Khezr, S., Rachid, B., and Abdulsalam, Y. (2020, January 17\u201322). Blockchain-based Model for Sharing Activities of Daily Living in Healthcare Applications. Proceedings of the 2020 IEEE Int. Conf. on Dependable, Autonomic and Secure Computing, Int. Conf. on Pervasive Intelligence and Computing, Calgary, AB, Canada.","DOI":"10.1109\/DASC-PICom-CBDCom-CyberSciTech49142.2020.00109"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"284","DOI":"10.5455\/aim.2019.27.284-291","article-title":"Blockchain Technologies: Opportunities for Solving Real-World Problems in Healthcare and Biomedical Sciences","volume":"27","author":"Justinia","year":"2019","journal-title":"Acta Inform. Med."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Gul, M.J., Subramanian, B., Paul, A., and Kim, J. (2021). Blockchain for public health care in smart society. Microprocess. Microsyst., 80.","DOI":"10.1016\/j.micpro.2020.103524"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"1273","DOI":"10.1177\/1460458219866350","article-title":"Electronic health records in a blockchain: A systematic review","volume":"26","author":"Mayer","year":"2020","journal-title":"Health Inform. J."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Hasselgren, A., Kralevska, K., Gligoroski, D., Pedersen, S.A., and Faxvaag, A. (2020). Blockchain in healthcare and health sciences\u2014A scoping review. Int. J. Med. Inform., 134.","DOI":"10.1016\/j.ijmedinf.2019.104040"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Hussien, H.M., Yasin, S.M., Udzir, S.N.I., Zaidan, A.A., and Zaidan, B.B. (2019). A systematic review for enabling of develop a blockchain technology in healthcare application: Taxonomy, substantially analysis, motivations, challenges, recommendations and future direction. J. Med. Syst., 43.","DOI":"10.1007\/s10916-019-1445-8"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"23663","DOI":"10.1109\/ACCESS.2020.2969230","article-title":"Scalability Challenges in Healthcare Blockchain System\u2014A Systematic Review","volume":"8","author":"Mazlan","year":"2020","journal-title":"IEEE Access"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"8770","DOI":"10.1109\/JIOT.2019.2923525","article-title":"Healthchain: A blockchain-based privacy preserving scheme for large-scale health data","volume":"6","author":"Xu","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1016\/j.compeleceng.2019.03.014","article-title":"Decentralized document version control using ethereum blockchain and IPFS","volume":"76","author":"Nizamuddin","year":"2019","journal-title":"Comput. Electr. Eng."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"66792","DOI":"10.1109\/ACCESS.2019.2917555","article-title":"Blockchain for secure ehrs sharing of mobile cloud based e-health systems","volume":"7","author":"Nguyen","year":"2019","journal-title":"IEEE Access"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"4613","DOI":"10.1007\/s12652-020-01710-y","article-title":"MedSBA: A novel and secure scheme to share medical data based on blockchain technology and attribute-based encryption","volume":"11","author":"Pournaghi","year":"2020","journal-title":"J. Ambient Intell. Humaniz. Comput."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Iqbal, J., Umar, A.I., Amin, N., and Waheed, A. (2019). Efficient and secure attribute-based heterogeneous online\/offline signcryption for body sensor networks based on blockchain. Int. J. Distrib. Sens. Netw., 15.","DOI":"10.1177\/1550147719875654"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Wang, H., and Song, Y. (2018). Secure cloud-based EHR system using attribute-based cryptosystem and blockchain. J. Med. Syst., 42.","DOI":"10.1007\/s10916-018-0994-6"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Thwin, T.T., and Vasupongayya, S. (2019). Blockchain-based access control model to preserve privacy for personal health record systems. Secur. Commun. Netw.","DOI":"10.1155\/2019\/8315614"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Khatoon, A. (2020). A blockchain-based smart contract system for healthcare management. Electronics, 9.","DOI":"10.3390\/electronics9010094"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"14757","DOI":"10.1109\/ACCESS.2017.2730843","article-title":"MeDShare: Trust-less medical data sharing among cloud service providers via blockchain","volume":"5","author":"Xia","year":"2017","journal-title":"IEEE Access"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Fan, K., Wang, S., Ren, Y., Li, H., and Yang, Y. (2018). Medblock: Efficient and secure medical data sharing via blockchain. J. Med. Syst., 42.","DOI":"10.1007\/s10916-018-0993-7"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Zhao, Y., Cui, M., Zheng, L., Zhang, R., Meng, L., Gao, D., and Zhang, Y. (2019). Research on electronic medical record access control based on blockchain. Int. J. Distrib. Sens. Netw., 15.","DOI":"10.1177\/1550147719889330"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Abouelmehdi, K., Beni-Hessane, A., and Khaloufi, H. (2018). Big healthcare data: Preserving security and privacy. J. Big Data, 5.","DOI":"10.1186\/s40537-017-0110-7"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1016\/j.comcom.2020.02.018","article-title":"An exhaustive survey on security and privacy issues in Healthcare 4.0","volume":"153","author":"Hathaliya","year":"2020","journal-title":"Comput. Commun."},{"key":"ref_21","unstructured":"Song, D.X., Wagner, D., and Perrig, A. (2000, January 14\u201317). Practical techniques for searches on encrypted data. Proceedings of the 2000 IEEE Symposium on Security and Privacy, Berkeley, CA, USA."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"895","DOI":"10.3233\/JCS-2011-0426","article-title":"Searchable symmetric encryption: Improved definitions and efficient constructions","volume":"19","author":"Curtmola","year":"2011","journal-title":"J. Comput. Secur."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Wang, C., Cao, N., Li, J., Ren, K., and Lou, W. (2010, January 21\u201325). Secure ranked keyword search over encrypted cloud data. Proceedings of the IEEE 30th International Conference on Distributed Computing Systems, Genoa, Italy.","DOI":"10.1109\/ICDCS.2010.34"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1109\/TPDS.2013.45","article-title":"Privacy-preserving multi-keyword ranked search over encrypted cloud data","volume":"25","author":"Cao","year":"2013","journal-title":"IEEE Trans. parallel Distrib. Syst."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Alderman, J., Martin, K.M., and Renwick, S.L. (2017, January 3\u20137). Multi-level access in searchable symmetric encryption. Proceedings of the International Conference on Financial Cryptography and Data Security, Sliema, Malta.","DOI":"10.1007\/978-3-319-70278-0_3"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1016\/j.jnca.2016.09.010","article-title":"Efficient searchable symmetric encryption for storing multiple source dynamic social data on cloud","volume":"86","author":"Liu","year":"2017","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1016\/j.jcss.2020.06.003","article-title":"Secure-channel free searchable encryption with multiple keywords: A generic construction, an instantiation, and its implementation","volume":"114","author":"Emura","year":"2020","journal-title":"J. Comput. Syst. Sci."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"1521","DOI":"10.1007\/s00607-019-00762-z","article-title":"Secure search for encrypted personal health records from big data NoSQL databases in cloud","volume":"102","author":"Chen","year":"2020","journal-title":"Computing"},{"key":"ref_29","first-page":"213A","article-title":"Multi-level access using searchable symmetric encryption with applicability for earth sciences. Scientific Bulletin \u201cMircea cel Batran\u201d","volume":"23","author":"Mihailescu","year":"2020","journal-title":"Nav. Acad."},{"key":"ref_30","unstructured":"Li, H., Zhang, F., He, J., and Tian, H. (2017). A searchable symmetric encryption scheme using blockchain. arXiv."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1016\/j.compeleceng.2018.10.015","article-title":"Blockchain-based searchable symmetric encryption scheme","volume":"73","author":"Li","year":"2019","journal-title":"Comput. Electr. Eng."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"31077","DOI":"10.1109\/ACCESS.2018.2844400","article-title":"TKSE: Trustworthy keyword search over encrypted data with two-side verifiability via blockchain","volume":"6","author":"Zhang","year":"2018","journal-title":"IEEE Access"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"781","DOI":"10.1016\/j.future.2017.08.036","article-title":"Searchain: Blockchain-based private keyword search in decentralised storage","volume":"107","author":"Jiang","year":"2020","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"420","DOI":"10.1016\/j.future.2019.01.018","article-title":"Blockchain based searchable encryption for electronic health record sharing","volume":"95","author":"Chen","year":"2019","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Chen, Y., Ding, S., Xu, Z., Zheng, H., and Yang, S. (2019). Blockchain-based medical records secure storage and medical service framework. J. Med. Syst., 43.","DOI":"10.1007\/s10916-018-1121-4"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"427","DOI":"10.1016\/j.ins.2019.02.038","article-title":"Cloud-assisted secure eHealth systems for tamper-proofing EHR via blockchain","volume":"485","author":"Cao","year":"2019","journal-title":"Inf. Sci."},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Goyal, V., Pandey, O., Sahai, A., and Waters, B. (2006, January 30). Attribute-based encryption for fine-grained access control of encrypted data. Proceedings of the 13th ACM Conference on Computer and Communications Security, Alexandria, VA, USA.","DOI":"10.1145\/1180405.1180418"},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., and Waters, B. (2007, January 20\u201323). Ciphertext-policy attribute-based encryption. Proceedings of the 2007 IEEE Symposium on Security and Privacy (SP\u201907), Berkeley, CA, USA.","DOI":"10.1109\/SP.2007.11"},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Lewko, A., Okamoto, T., Sahai, A., Takashima, K., and Waters, B. (2010). Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption. Annual International Conference on the Theory and Applications of Cryptographic Techniques, Springer.","DOI":"10.1007\/978-3-642-13190-5_4"},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1016\/j.ins.2013.12.027","article-title":"An expressive and provably secure ciphertext-policy attribute-based encryption","volume":"276","author":"Balu","year":"2014","journal-title":"Inf. Sci."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"799","DOI":"10.3233\/JCS-2009-0383","article-title":"Secure attribute-based systems","volume":"18","author":"Pirretti","year":"2010","journal-title":"J. Comput. Secur."},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Nita, S.L., and Mihailescu, M.I. (2020, January 15\u201317). A Searchable Encryption Scheme Based on Elliptic Curves. Proceedings of the Workshops of the International Conference on Advanced Information Networking and Applications, Caserta, Italy.","DOI":"10.1007\/978-3-030-44038-1_74"},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"1214","DOI":"10.1109\/TPDS.2010.203","article-title":"Attribute-based access control with efficient revocation in data outsourcing systems","volume":"22","author":"Hur","year":"2010","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"5682","DOI":"10.1109\/ACCESS.2018.2889754","article-title":"CP-ABSE: A ciphertext-policy attribute-based searchable encryption scheme","volume":"7","author":"Yin","year":"2019","journal-title":"IEEE Access"},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"66655","DOI":"10.1109\/ACCESS.2019.2917772","article-title":"Multi-keyword searchable and data verifiable attribute-based encryption scheme for cloud storage","volume":"7","author":"Sun","year":"2019","journal-title":"IEEE Access"},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"80675","DOI":"10.1109\/ACCESS.2019.2922646","article-title":"KS-ABESwET: A Keyword Searchable Attribute-Based Encryption Scheme with Equality Test in the Internet of Things","volume":"7","author":"Wang","year":"2019","journal-title":"IEEE Access"},{"key":"ref_47","unstructured":"Sultan, N.H., Kaaniche, N., Laurent, M., and Barbhuiya, F.A. (2019). Authorised keyword search over outsourced encrypted data in cloud environment. IEEE Trans. Cloud Comput., early access."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"33202","DOI":"10.1109\/ACCESS.2019.2902040","article-title":"Hidden ciphertext policy attribute-based encryption with fast decryption for personal health record system","volume":"7","author":"Zhang","year":"2019","journal-title":"IEEE Access"},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Li, M., Yu, S., Ren, K., and Lou, W. (2010). September. Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings. International Conference on Security and Privacy in Communication Systems, Springer.","DOI":"10.1007\/978-3-642-16161-2_6"},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1109\/TPDS.2012.97","article-title":"Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption","volume":"24","author":"Li","year":"2012","journal-title":"IEEE Trans. parallel Distrib. Syst."},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s42979-020-00246-4","article-title":"Privacy Enforced Access Control Model for Secured Data Handling in Cloud-Based Pervasive Health Care System","volume":"1","author":"Prince","year":"2020","journal-title":"SN Comput. Sci."},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"394","DOI":"10.1016\/j.ins.2019.05.056","article-title":"Building a dynamic searchable encrypted medical database for multi-client","volume":"527","author":"Xu","year":"2020","journal-title":"Inf. Sci."},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"88012","DOI":"10.1109\/ACCESS.2019.2925625","article-title":"Flexible and efficient blockchain-based ABE scheme with multi-authority for medical on demand in telemedicine system","volume":"7","author":"Guo","year":"2019","journal-title":"IEEE Access"},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"149282","DOI":"10.1109\/ACCESS.2019.2947313","article-title":"MBPA: A Medibchain-Based Privacy-Preserving Mutual Authentication in TMIS for Mobile Medical Cloud Architecture","volume":"7","author":"Liu","year":"2019","journal-title":"IEEE Access"},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"102887","DOI":"10.1109\/ACCESS.2019.2931531","article-title":"Blockchain-based personal health records sharing scheme with data integrity verifiable","volume":"7","author":"Wang","year":"2019","journal-title":"IEEE Access"},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"7195","DOI":"10.1109\/ACCESS.2019.2959044","article-title":"Electronic Health Record Sharing Scheme With Searchable Attribute-Based Encryption on Blockchain","volume":"8","author":"Niu","year":"2019","journal-title":"IEEE Access"},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"59389","DOI":"10.1109\/ACCESS.2020.2982964","article-title":"Blockchain-Based Secure Storage and Access Scheme For Electronic Medical Records in IPFS","volume":"8","author":"Sun","year":"2020","journal-title":"IEEE Access"},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"112713","DOI":"10.1109\/ACCESS.2019.2929205","article-title":"A secure cloud storage framework with access control based on blockchain","volume":"7","author":"Wang","year":"2019","journal-title":"IEEE Access"},{"key":"ref_59","doi-asserted-by":"crossref","unstructured":"Miao, Y., Ma, J., Liu, X., Wei, F., Liu, Z., and Wang, X.A. (2016). m 2-ABKS: Attribute-based multi-keyword search over encrypted personal health records in multi-owner setting. J. Med. Syst., 40.","DOI":"10.1007\/s10916-016-0617-z"},{"key":"ref_60","doi-asserted-by":"crossref","unstructured":"Zheng, Q., Xu, S., and Ateniese, G.A. (May, January 27). VABKS: Verifiable attribute-based keyword search over outsourced encrypted data. Proceedings of the IEEE INFOCOM 2014-IEEE Conference on Computer Communications, Toronto, ON, Canada.","DOI":"10.1109\/INFOCOM.2014.6847976"},{"key":"ref_61","doi-asserted-by":"crossref","unstructured":"Ali, M., and Sadeghi, M.R. (2020). Provable secure lightweight attribute-based keyword search for cloud-based Internet of Things networks. Trans. Emerg. Telecommun. Technol.","DOI":"10.1002\/ett.3905"},{"key":"ref_62","unstructured":"(2021, February 02). The AVISPA Project. Available online: http:\/\/www.avispa-project.org\/."},{"key":"ref_63","doi-asserted-by":"crossref","unstructured":"Armando, A., Basin, D., Boichut, Y., Chevalier, Y., Compagna, L., Cu\u00e9llar, J., Drielsma, P.H., H\u00e9am, P.C., Kouchnarenko, O., and Mantovani, J. (2005). The AVISPA tool for the automated validation of internet security protocols and applications. International Conference on Computer Aided Verification, Springer.","DOI":"10.1007\/11513988_27"},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"1752","DOI":"10.1002\/sec.1140","article-title":"An effective ECC-based user access control scheme with attribute-based encryption for wireless sensor networks","volume":"8","author":"Chatterjee","year":"2015","journal-title":"Secur. Commun. Netw."},{"key":"ref_65","doi-asserted-by":"crossref","first-page":"38431","DOI":"10.1109\/ACCESS.2019.2905846","article-title":"A novel attribute-based access control scheme using blockchain for IoT","volume":"7","author":"Ding","year":"2019","journal-title":"IEEE Access"},{"key":"ref_66","doi-asserted-by":"crossref","unstructured":"Hsu, C.L., Chen, W.X., and Le, T.V. (2020). An Autonomous Log Storage Management Protocol with Blockchain Mechanism and Access Control for the Internet of Things. Sensors, 20.","DOI":"10.3390\/s20226471"},{"key":"ref_67","doi-asserted-by":"crossref","unstructured":"Kim, M., Yu, S., Lee, J., Park, Y., and Park, Y. (2020). Design of secure protocol for cloud-assisted electronic health record system using blockchain. Sensors, 20.","DOI":"10.3390\/s20102913"},{"key":"ref_68","unstructured":"(2021, February 02). SPAN: Security Protocol ANimator for AVISPA. Available online: http:\/\/people.irisa.fr\/Thomas.Genet\/span\/."},{"key":"ref_69","unstructured":"(2020, November 11). Enron Email Dataset. Available online: https:\/\/www.cs.cmu.edu\/~enron\/."},{"key":"ref_70","unstructured":"(2020, November 11). Type-A Pairings-PBC. Available online: https:\/\/crypto.stanford.edu\/pbc\/manual\/ch08s03.html."},{"key":"ref_71","unstructured":"(2020, November 11). Pairing Based Cryptography (PBC) Library. Available online: https:\/\/crypto.stanford.edu\/pbc\/."},{"key":"ref_72","unstructured":"(2020, November 11). Ethereum Blockchain Network. Available online: https:\/\/geth.ethereum.org\/getting-started\/private-net."},{"key":"ref_73","unstructured":"(2020, November 11). Clique Proof-of-Authority Consensus Protocol. Available online: https:\/\/github.com\/ethereum\/go-ethereum\/tree\/master\/consensus\/clique."},{"key":"ref_74","unstructured":"(2020, November 11). Eth-Crypto Library for Ethereum. Available online: https:\/\/github.com\/pubkey\/eth-crypto."},{"key":"ref_75","unstructured":"(2020, November 11). Caliper Benchmark Tool for Ethereum Configuration. Available online: https:\/\/hyperledger.github.io\/caliper\/v0.4.2\/ethereum-config\/."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/21\/7\/2462\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T13:26:06Z","timestamp":1760361966000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/21\/7\/2462"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,2]]},"references-count":75,"journal-issue":{"issue":"7","published-online":{"date-parts":[[2021,4]]}},"alternative-id":["s21072462"],"URL":"https:\/\/doi.org\/10.3390\/s21072462","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,4,2]]}}}