{"id":"https://openalex.org/W4414465942","doi":"https://doi.org/10.1007/s44443-025-00254-5","title":"A fine-grained bilateral access control scheme under policy and attribute hiding for cloud-fog-assisted IoT","display_name":"A fine-grained bilateral access control scheme under policy and attribute hiding for cloud-fog-assisted IoT","publication_year":2025,"publication_date":"2025-09-24","ids":{"openalex":"https://openalex.org/W4414465942","doi":"https://doi.org/10.1007/s44443-025-00254-5"},"language":"en","primary_location":{"id":"doi:10.1007/s44443-025-00254-5","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s44443-025-00254-5","pdf_url":"https://link.springer.com/content/pdf/10.1007/s44443-025-00254-5.pdf","source":{"id":"https://openalex.org/S2764955546","display_name":"Journal of King Saud University - Computer and Information Sciences","issn_l":"1319-1578","issn":["1319-1578","2213-1248"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of King Saud University Computer and Information Sciences","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://link.springer.com/content/pdf/10.1007/s44443-025-00254-5.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101577175","display_name":"Kejun Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]},{"id":"https://openalex.org/I202334528","display_name":"Beijing Electronic Science and Technology Institute","ror":"https://ror.org/01xdzh226","country_code":"CN","type":"education","lineage":["https://openalex.org/I202334528"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Kejun Zhang","raw_affiliation_strings":["Department of Cyberspace Security, Beijing Electronic Science and Technology Institute, No.7 Fufeng Road, Fengtai District, Beijing, 100070, China","School of Cyberspace Security, Beijing University of Posts and Telecommunications, No.1 Nanfeng Road, Changping District, Beijing, 102206, China"],"affiliations":[{"raw_affiliation_string":"Department of Cyberspace Security, Beijing Electronic Science and Technology Institute, No.7 Fufeng Road, Fengtai District, Beijing, 100070, China","institution_ids":["https://openalex.org/I202334528"]},{"raw_affiliation_string":"School of Cyberspace Security, Beijing University of Posts and Telecommunications, No.1 Nanfeng Road, Changping District, Beijing, 102206, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023067779","display_name":"Xinying Yu","orcid":"https://orcid.org/0000-0001-8891-6723"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xinying Yu","raw_affiliation_strings":["School of Cyberspace Security, Beijing University of Posts and Telecommunications, No.1 Nanfeng Road, Changping District, Beijing, 102206, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Security, Beijing University of Posts and Telecommunications, No.1 Nanfeng Road, Changping District, Beijing, 102206, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100329725","display_name":"Wenbin Wang","orcid":"https://orcid.org/0000-0002-6287-4542"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenbin Wang","raw_affiliation_strings":["School of Cyberspace Security, Beijing University of Posts and Telecommunications, No.1 Nanfeng Road, Changping District, Beijing, 102206, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Security, Beijing University of Posts and Telecommunications, No.1 Nanfeng Road, Changping District, Beijing, 102206, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100432306","display_name":"Pengcheng Li","orcid":"https://orcid.org/0000-0002-0225-6793"},"institutions":[{"id":"https://openalex.org/I16365422","display_name":"Hefei University of Technology","ror":"https://ror.org/02czkny70","country_code":"CN","type":"education","lineage":["https://openalex.org/I16365422"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Pengcheng Li","raw_affiliation_strings":["School of Cyberspace Security, University of Science and Technology of China, No.100 Fuxing Road, Shushan District, Hefei, Anhui, 230026, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Security, University of Science and Technology of China, No.100 Fuxing Road, Shushan District, Hefei, Anhui, 230026, China","institution_ids":["https://openalex.org/I16365422"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100332169","display_name":"Jun Wang","orcid":"https://orcid.org/0000-0003-3422-104X"},"institutions":[{"id":"https://openalex.org/I202334528","display_name":"Beijing Electronic Science and Technology Institute","ror":"https://ror.org/01xdzh226","country_code":"CN","type":"education","lineage":["https://openalex.org/I202334528"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jun Wang","raw_affiliation_strings":["Department of Cyberspace Security, Beijing Electronic Science and Technology Institute, No.7 Fufeng Road, Fengtai District, Beijing, 100070, China"],"affiliations":[{"raw_affiliation_string":"Department of Cyberspace Security, Beijing Electronic Science and Technology Institute, No.7 Fufeng Road, Fengtai District, Beijing, 100070, China","institution_ids":["https://openalex.org/I202334528"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100461301","display_name":"Duo Zhang","orcid":"https://orcid.org/0009-0005-5951-0851"},"institutions":[{"id":"https://openalex.org/I16365422","display_name":"Hefei University of Technology","ror":"https://ror.org/02czkny70","country_code":"CN","type":"education","lineage":["https://openalex.org/I16365422"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Duo Zhang","raw_affiliation_strings":["School of Cyberspace Security, University of Science and Technology of China, No.100 Fuxing Road, Shushan District, Hefei, Anhui, 230026, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Security, University of Science and Technology of China, No.100 Fuxing Road, Shushan District, Hefei, Anhui, 230026, China","institution_ids":["https://openalex.org/I16365422"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5117445455","display_name":"Ying Zhang","orcid":"https://orcid.org/0000-0001-5858-801X"},"institutions":[{"id":"https://openalex.org/I202334528","display_name":"Beijing Electronic Science and Technology Institute","ror":"https://ror.org/01xdzh226","country_code":"CN","type":"education","lineage":["https://openalex.org/I202334528"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ying Zhang","raw_affiliation_strings":["Department of Cyberspace Security, Beijing Electronic Science and Technology Institute, No.7 Fufeng Road, Fengtai District, Beijing, 100070, China"],"affiliations":[{"raw_affiliation_string":"Department of Cyberspace Security, Beijing Electronic Science and Technology Institute, No.7 Fufeng Road, Fengtai District, Beijing, 100070, China","institution_ids":["https://openalex.org/I202334528"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5101577175"],"corresponding_institution_ids":["https://openalex.org/I139759216","https://openalex.org/I202334528"],"apc_list":{"value":1350,"currency":"USD","value_usd":1350},"apc_paid":{"value":1350,"currency":"USD","value_usd":1350},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.13385884,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"37","issue":"8","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.7009000182151794},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6909000277519226},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.5133000016212463},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5029000043869019},{"id":"https://openalex.org/keywords/elgamal-encryption","display_name":"ElGamal encryption","score":0.474700003862381},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.4740999937057495},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.447299987077713},{"id":"https://openalex.org/keywords/bloom-filter","display_name":"Bloom filter","score":0.43320000171661377},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.428600013256073}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7610999941825867},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.7009000182151794},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6909000277519226},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6233999729156494},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.5133000016212463},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5029000043869019},{"id":"https://openalex.org/C11045955","wikidata":"https://www.wikidata.org/wiki/Q1162410","display_name":"ElGamal encryption","level":4,"score":0.474700003862381},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.4740999937057495},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.447299987077713},{"id":"https://openalex.org/C147224247","wikidata":"https://www.wikidata.org/wiki/Q885373","display_name":"Bloom filter","level":2,"score":0.43320000171661377},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.428600013256073},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.41679999232292175},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4101000130176544},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3968999981880188},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.38019999861717224},{"id":"https://openalex.org/C47487241","wikidata":"https://www.wikidata.org/wiki/Q5227230","display_name":"Data access","level":2,"score":0.36640000343322754},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.3564000129699707},{"id":"https://openalex.org/C106131492","wikidata":"https://www.wikidata.org/wiki/Q3072260","display_name":"Filter (signal processing)","level":2,"score":0.3562000095844269},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3479999899864197},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.3285999894142151},{"id":"https://openalex.org/C165064840","wikidata":"https://www.wikidata.org/wiki/Q1321061","display_name":"Matching (statistics)","level":2,"score":0.31940001249313354},{"id":"https://openalex.org/C69360830","wikidata":"https://www.wikidata.org/wiki/Q1172237","display_name":"Data Protection Act 1998","level":2,"score":0.2816999852657318},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.25540000200271606},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.2547000050544739},{"id":"https://openalex.org/C2779886121","wikidata":"https://www.wikidata.org/wiki/Q288682","display_name":"XACML","level":3,"score":0.25119999051094055}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/s44443-025-00254-5","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s44443-025-00254-5","pdf_url":"https://link.springer.com/content/pdf/10.1007/s44443-025-00254-5.pdf","source":{"id":"https://openalex.org/S2764955546","display_name":"Journal of King Saud University - Computer and Information Sciences","issn_l":"1319-1578","issn":["1319-1578","2213-1248"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of King Saud University Computer and Information Sciences","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:481b7f3041164e6ea104e0ca37009803","is_oa":true,"landing_page_url":"https://doaj.org/article/481b7f3041164e6ea104e0ca37009803","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of King Saud University: Computer and Information Sciences, Vol 37, Iss 8, Pp 1-21 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1007/s44443-025-00254-5","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s44443-025-00254-5","pdf_url":"https://link.springer.com/content/pdf/10.1007/s44443-025-00254-5.pdf","source":{"id":"https://openalex.org/S2764955546","display_name":"Journal of King Saud University - Computer and Information Sciences","issn_l":"1319-1578","issn":["1319-1578","2213-1248"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of King Saud University Computer and Information Sciences","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1239215047","display_name":null,"funder_award_id":"3282023012","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"},{"id":"https://openalex.org/G2595408210","display_name":null,"funder_award_id":"3282025041","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"},{"id":"https://openalex.org/G8951484681","display_name":null,"funder_award_id":"Grant","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"}],"funders":[{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4414465942.pdf","grobid_xml":"https://content.openalex.org/works/W4414465942.grobid-xml"},"referenced_works_count":33,"referenced_works":["https://openalex.org/W71234479","https://openalex.org/W1513551553","https://openalex.org/W1520227725","https://openalex.org/W1588309063","https://openalex.org/W2063145953","https://openalex.org/W2108072891","https://openalex.org/W2113976134","https://openalex.org/W2138001464","https://openalex.org/W2407215383","https://openalex.org/W2796994201","https://openalex.org/W2890650288","https://openalex.org/W2896729774","https://openalex.org/W2952370845","https://openalex.org/W2968703654","https://openalex.org/W3000548332","https://openalex.org/W3131824067","https://openalex.org/W3153620288","https://openalex.org/W3168560073","https://openalex.org/W3172604505","https://openalex.org/W3182147107","https://openalex.org/W3198147790","https://openalex.org/W3198584778","https://openalex.org/W4205769651","https://openalex.org/W4206331936","https://openalex.org/W4210495463","https://openalex.org/W4226059379","https://openalex.org/W4385945581","https://openalex.org/W4386777633","https://openalex.org/W4387682094","https://openalex.org/W4389960983","https://openalex.org/W4391945301","https://openalex.org/W4394586091","https://openalex.org/W4405179682"],"related_works":[],"abstract_inverted_index":{"Cloud-fog":[0],"computing-based":[1],"Internet":[2],"of":[3,132,161,184],"Things":[4],"(IoT)":[5],"applications":[6],"can":[7],"store":[8],"and":[9,25,33,67,90,101,121,136,158,180],"analyze":[10],"numerous":[11],"data":[12,27,31,65,99,109],"resources,":[13],"but":[14],"they":[15],"also":[16],"face":[17],"security":[18,175],"risks":[19],"such":[20],"as":[21],"untrustworthy":[22],"cloud":[23],"servers":[24],"unauthorized":[26],"access.":[28],"To":[29],"protect":[30],"privacy":[32,63,130],"achieve":[34],"fine-grained":[35,144],"access":[36,105,134,146,169],"control,":[37],"Ciphertext-Policy":[38],"Attribute-based":[39],"Encryption":[40],"(CP-ABE)":[41],"technology":[42],"has":[43],"been":[44],"widely":[45],"adopted.":[46],"However,":[47],"two":[48],"critical":[49],"challenges":[50],"remain":[51],"in":[52],"practical":[53],"applications:":[54],"how":[55,68],"to":[56,69,103,128,154],"prevent":[57],"sensitive":[58],"attributes":[59],"from":[60,74],"leaking":[61],"user":[62],"during":[64],"sharing":[66],"filter":[70,120],"the":[71,118,122,133,137,162,174,182],"target":[72,163],"ciphertexts":[73],"massive":[75],"encrypted":[76],"data.":[77],"Therefore,":[78],"this":[79],"paper":[80],"proposes":[81],"a":[82,112,143],"Fine-Grained":[83],"Bilateral":[84],"Access":[85],"Control":[86],"Scheme":[87],"under":[88],"Policy":[89],"Attribute":[91],"Hiding":[92],"for":[93,107],"Cloud-Fog-Assisted":[94],"IoT":[95],"(BAC-PAH),":[96],"allowing":[97],"both":[98],"owners":[100],"visitors":[102],"define":[104],"policies":[106],"outsourced":[108],"autonomously.":[110],"Specifically,":[111],"policy-attribute":[113],"hiding":[114],"method":[115],"based":[116,149],"on":[117,141,150],"cuckoo":[119],"ElGamal":[123],"encryption":[124],"algorithm":[125],"is":[126,152],"designed":[127],"realize":[129],"protection":[131],"policy":[135],"attribute":[138],"set.":[139],"Based":[140],"this,":[142],"bilateral":[145],"control":[147],"scheme":[148],"CP-ABE":[151],"developed":[153],"ensure":[155],"accurate":[156],"matching":[157],"authorized":[159],"decryption":[160],"ciphertexts,":[164],"thereby":[165],"achieving":[166],"flexible":[167],"many-to-many":[168],"control.":[170],"Finally,":[171],"we":[172],"derive":[173],"proof":[176],"using":[177],"game":[178],"hopping":[179],"demonstrate":[181],"superiority":[183],"BAC-PAH":[185],"through":[186],"extensive":[187],"experiments.":[188]},"counts_by_year":[],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
