{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:44:15Z","timestamp":1740149055697,"version":"3.37.3"},"reference-count":32,"publisher":"Wiley","license":[{"start":{"date-parts":[[2021,2,28]],"date-time":"2021-02-28T00:00:00Z","timestamp":1614470400000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61902291","62072352","2019M653567","2019JM-425","JB191507"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["61902291","62072352","2019M653567","2019JM-425","JB191507"],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007128","name":"Natural Science Foundation of Shaanxi Province","doi-asserted-by":"publisher","award":["61902291","62072352","2019M653567","2019JM-425","JB191507"],"id":[{"id":"10.13039\/501100007128","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["61902291","62072352","2019M653567","2019JM-425","JB191507"],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2021,2,28]]},"abstract":"Cloud-based Internet of Things, which is considered as a promising paradigm these days, can provide various applications for our society. However, as massive sensitive and private data in IoT devices are collected and outsourced to cloud for data storage, processing, or sharing for cost saving, the data security has become a bottleneck for its further development. Moreover, in many large-scale IoT systems, multiple group data sharing is practical for users. Thus, how to ensure data security in multiple group data sharing remains an open problem, especially the fine-grained access control and data integrity verification with public auditing. Therefore, in this paper, we propose a blockchain-based fine-grained data sharing scheme for multiple groups in cloud-based IoT systems. In particular, we design a novel multiauthority large universe CP-ABE scheme to guarantee the fine-grained access control and data integrity across multiple groups by integrating group signature into our scheme. Moreover, to ease the need for a trusted third auditor in traditional data public auditing schemes, we introduce blockchain technique to enable a distributed data public auditing. In addition, with the group signature, our scheme also realizes anonymity and traitor tracing. The security analysis and performance evaluation show that our scheme is practical for large-scale IoT systems.<\/jats:p>","DOI":"10.1155\/2021\/6689448","type":"journal-article","created":{"date-parts":[[2021,2,28]],"date-time":"2021-02-28T19:20:14Z","timestamp":1614540014000},"page":"1-13","source":"Crossref","is-referenced-by-count":3,"title":["Blockchain-Based Fine-Grained Data Sharing for Multiple Groups in Internet of Things"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5147-8336","authenticated-orcid":true,"given":"Teng","family":"Li","sequence":"first","affiliation":[{"name":"School of Cyber Engineering, Xidian University, Xi\u2019an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7393-710X","authenticated-orcid":true,"given":"Jiawei","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Cyber Engineering, Xidian University, Xi\u2019an, China"}]},{"given":"Yangxu","family":"Lin","sequence":"additional","affiliation":[{"name":"School of Cyber Engineering, Xidian University, Xi\u2019an, China"}]},{"given":"Shengkai","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Cyber Engineering, Xidian University, Xi\u2019an, China"}]},{"given":"Jianfeng","family":"Ma","sequence":"additional","affiliation":[{"name":"School of Cyber Engineering, Xidian University, Xi\u2019an, China"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.09.016"},{"issue":"1","key":"2","first-page":"1","article-title":"A survey on security challenges in cloud computing: issues, threats, and solutions","volume":"2","author":"H. Tabrizchi","year":"2020","journal-title":"The Journal of Supercomputing"},{"article-title":"Efficient hierarchical data access control for resource-limited users in cloud-based e-health","author":"J. Zhang","key":"3","doi-asserted-by":"crossref","DOI":"10.1109\/NaNA.2019.00062"},{"key":"4","article-title":"Secure data group sharing and dissemination with attribute and time conditions in public cloud","volume":"42","author":"Q. Huang","year":"2018","journal-title":"IEEE Transactions on Services Computing"},{"issue":"3","key":"5","doi-asserted-by":"crossref","first-page":"2739","DOI":"10.1109\/JSYST.2018.2865221","article-title":"Attribute-based privacy-preserving data sharing for dynamic groups in cloud computing","volume":"13","author":"H. Xiong","year":"2018","journal-title":"IEEE Systems Journal"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.12.015"},{"issue":"2","key":"7","doi-asserted-by":"crossref","first-page":"331","DOI":"10.1109\/TIFS.2018.2850312","article-title":"Enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage","volume":"14","author":"W. Shen","year":"2018","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"8","doi-asserted-by":"crossref","DOI":"10.1016\/j.future.2020.03.032","article-title":"An efficient data integrity auditing protocol for cloud computing","volume":"109","author":"N. Garg","year":"2020","journal-title":"Future Generation Computer Systems"},{"first-page":"1017","article-title":"Homomorphic authentication scheme for proof of retrievability with public verifiability","author":"S. Hiremath","key":"9"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101686"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-008-9094-3"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/mis.2016.97"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.3025898"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-018-9781-0"},{"first-page":"457","article-title":"Fuzzy identity-based encryption","author":"A. Sahai","key":"15"},{"first-page":"89","article-title":"Attribute-based encryption for fine-grained access control of encrypted data","author":"V. Goyal","key":"16"},{"key":"17","article-title":"Large-universe attribute-based encryption with public traceability for cloud storage","volume":"33","author":"Z. Zhang","year":"2020","journal-title":"IEEE Internet of Things Journal"},{"issue":"4","key":"18","article-title":"Dynamic traceable cp-abe with revocation for outsourced big data in cloud storage","volume":"34","author":"P. K. Premkamal","year":"2020","journal-title":"International Journal of Communication Systems"},{"key":"19","first-page":"568","article-title":"Decentralizing attribute-based encryption","volume":"6597","author":"A. Lewko","year":"2011","journal-title":"Advances in Cryptology"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-016-9019-8"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.102435"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.12.016"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.4469"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.11.011"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-017-9245-1"},{"article-title":"Blockchain-based database to ensure data integrity in cloud computing environments","year":"2017","author":"E. Gaetani","key":"26"},{"first-page":"359","article-title":"Exploiting block-chain data structure for auditorless auditing on cloud data","author":"S. Ghoshal","key":"27"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2017.10.020"},{"key":"29","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-46416-6_22","article-title":"Group signatures","volume-title":"Workshop on the Theory and Application of Cryptographic Techniques","author":"D. Chaum","year":"1991"},{"key":"30","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-61092-3_5","article-title":"Combining merkle hash tree and chaotic cryptography for secure data fusion in iot","volume-title":"Transactions on Computational Science","author":"N. Nesa","year":"2020"},{"key":"31","unstructured":"NakamotoS.Bitcoin: a peer-to-peer electronic cash system,\u201d Manubot2019Technical Report"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/mnet.001.1900178"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/6689448.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/6689448.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/6689448.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,28]],"date-time":"2021-02-28T19:20:29Z","timestamp":1614540029000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2021\/6689448\/"}},"subtitle":[],"editor":[{"given":"Kim-Kwang Raymond","family":"Choo","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,2,28]]},"references-count":32,"alternative-id":["6689448","6689448"],"URL":"https:\/\/doi.org\/10.1155\/2021\/6689448","relation":{},"ISSN":["1939-0122","1939-0114"],"issn-type":[{"type":"electronic","value":"1939-0122"},{"type":"print","value":"1939-0114"}],"subject":[],"published":{"date-parts":[[2021,2,28]]}}}