{"id":"https://openalex.org/W4286506835","doi":"https://doi.org/10.1109/cits55221.2022.9832996","title":"Ciphertext-Policy Attribute-based Encryption for Securing IoT Devices in Fog Computing","display_name":"Ciphertext-Policy Attribute-based Encryption for Securing IoT Devices in Fog Computing","publication_year":2022,"publication_date":"2022-07-13","ids":{"openalex":"https://openalex.org/W4286506835","doi":"https://doi.org/10.1109/cits55221.2022.9832996"},"language":"en","primary_location":{"id":"doi:10.1109/cits55221.2022.9832996","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cits55221.2022.9832996","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 International Conference on Computer, Information and Telecommunication Systems (CITS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://ro.ecu.edu.au/ecuworks2022-2026/1100","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5040007583","display_name":"Shanshan Tu","orcid":"https://orcid.org/0000-0002-6220-4119"},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Shanshan Tu","raw_affiliation_strings":["Beijing University of Technology,Faculty of Information Technology,Beijing,China,100124"],"affiliations":[{"raw_affiliation_string":"Beijing University of Technology,Faculty of Information Technology,Beijing,China,100124","institution_ids":["https://openalex.org/I37796252"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002427699","display_name":"Fengming Huang","orcid":"https://orcid.org/0009-0008-7733-4494"},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fengming Huang","raw_affiliation_strings":["Beijing University of Technology,Faculty of Information Technology,Beijing,China,100124"],"affiliations":[{"raw_affiliation_string":"Beijing University of Technology,Faculty of Information Technology,Beijing,China,100124","institution_ids":["https://openalex.org/I37796252"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Shengju Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I180662265","display_name":"China Mobile (China)","ror":"https://ror.org/05gftfe97","country_code":"CN","type":"company","lineage":["https://openalex.org/I180662265"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shengju Zhang","raw_affiliation_strings":["China Mobile (SuZhou) Software Technology Co., Ltd,China,215153"],"affiliations":[{"raw_affiliation_string":"China Mobile (SuZhou) Software Technology Co., Ltd,China,215153","institution_ids":["https://openalex.org/I180662265"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000485488","display_name":"Akhtar Badshah","orcid":"https://orcid.org/0000-0001-7867-2657"},"institutions":[{"id":"https://openalex.org/I5400463","display_name":"Ghulam Ishaq Khan Institute of Engineering Sciences and Technology","ror":"https://ror.org/01sb6ek09","country_code":"PK","type":"education","lineage":["https://openalex.org/I5400463"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Akhtar Badshah","raw_affiliation_strings":["GIK Institute of Engineering Sciences and Technology,Faculty of Computer Science and Engineering,Topi,Pakistan,23640"],"affiliations":[{"raw_affiliation_string":"GIK Institute of Engineering Sciences and Technology,Faculty of Computer Science and Engineering,Topi,Pakistan,23640","institution_ids":["https://openalex.org/I5400463"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067599262","display_name":"Hisham Alasmary","orcid":"https://orcid.org/0000-0002-6482-3968"},"institutions":[{"id":"https://openalex.org/I82952536","display_name":"King Khalid University","ror":"https://ror.org/052kwzs30","country_code":"SA","type":"education","lineage":["https://openalex.org/I82952536"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Hisham Alasmary","raw_affiliation_strings":["King Khalid University,College of Computer Science,Department of Computer Science,Abha,Kingdom of Saudi Arabia","Information Security and Cybersecurity Unit, King Khalid University, Abha, Kingdom of Saudi Arabia","Department of Computer Science, College of Computer Science, King Khalid University, Abha, Kingdom of Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"King Khalid University,College of Computer Science,Department of Computer Science,Abha,Kingdom of Saudi Arabia","institution_ids":["https://openalex.org/I82952536"]},{"raw_affiliation_string":"Information Security and Cybersecurity Unit, King Khalid University, Abha, Kingdom of Saudi Arabia","institution_ids":["https://openalex.org/I82952536"]},{"raw_affiliation_string":"Department of Computer Science, College of Computer Science, King Khalid University, Abha, Kingdom of Saudi Arabia","institution_ids":["https://openalex.org/I82952536"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5086533220","display_name":"Muhammad Waqas","orcid":"https://orcid.org/0000-0003-0814-7544"},"institutions":[{"id":"https://openalex.org/I106663880","display_name":"University of Bahrain","ror":"https://ror.org/0317ekv86","country_code":"BH","type":"education","lineage":["https://openalex.org/I106663880"]},{"id":"https://openalex.org/I12079687","display_name":"Edith Cowan University","ror":"https://ror.org/05jhnwe22","country_code":"AU","type":"education","lineage":["https://openalex.org/I12079687"]},{"id":"https://openalex.org/I8541234","display_name":"University College of Bahrain","ror":"https://ror.org/00m2z1b30","country_code":"BH","type":"education","lineage":["https://openalex.org/I8541234"]}],"countries":["AU","BH"],"is_corresponding":false,"raw_author_name":"Muhammad Waqas","raw_affiliation_strings":["University of Bahrain,College of Information Technology,Computer Engineering Department,Bahrain,32038","School of Engineering, Edith Cowan University, Perth"],"affiliations":[{"raw_affiliation_string":"University of Bahrain,College of Information Technology,Computer Engineering Department,Bahrain,32038","institution_ids":["https://openalex.org/I8541234","https://openalex.org/I106663880"]},{"raw_affiliation_string":"School of Engineering, Edith Cowan University, Perth","institution_ids":["https://openalex.org/I12079687"]}]}],"institutions":[],"countries_distinct_count":5,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5040007583"],"corresponding_institution_ids":["https://openalex.org/I37796252"],"apc_list":null,"apc_paid":null,"fwci":0.9717,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.79563782,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.991100013256073,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.8512693643569946},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8201227784156799},{"id":"https://openalex.org/keywords/revocation","display_name":"Revocation","score":0.7558114528656006},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.7480562329292297},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7009987831115723},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5335023403167725},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.523910403251648},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5209535360336304},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5017850399017334},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.49789857864379883},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.44754257798194885},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4354473352432251},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4129772186279297},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.3205753266811371},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.13699382543563843}],"concepts":[{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.8512693643569946},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8201227784156799},{"id":"https://openalex.org/C2775892892","wikidata":"https://www.wikidata.org/wiki/Q6509517","display_name":"Revocation","level":3,"score":0.7558114528656006},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.7480562329292297},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7009987831115723},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5335023403167725},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.523910403251648},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5209535360336304},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5017850399017334},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.49789857864379883},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.44754257798194885},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4354473352432251},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4129772186279297},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3205753266811371},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.13699382543563843},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/cits55221.2022.9832996","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cits55221.2022.9832996","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 International Conference on Computer, Information and Telecommunication Systems (CITS)","raw_type":"proceedings-article"},{"id":"pmh:oai:ro.ecu.edu.au:ecuworks2022-2026-2100","is_oa":true,"landing_page_url":"https://ro.ecu.edu.au/ecuworks2022-2026/1100","pdf_url":null,"source":{"id":"https://openalex.org/S2765015692","display_name":"Australasian Journal of Paramedicine","issn_l":"2202-7270","issn":["2202-7270"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Research outputs 2022 to 2026","raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:ro.ecu.edu.au:ecuworks2022-2026-2100","is_oa":true,"landing_page_url":"https://ro.ecu.edu.au/ecuworks2022-2026/1100","pdf_url":null,"source":{"id":"https://openalex.org/S2765015692","display_name":"Australasian Journal of Paramedicine","issn_l":"2202-7270","issn":["2202-7270"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Research outputs 2022 to 2026","raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320321408","display_name":"Ministry of Education","ror":"https://ror.org/01p262204"},{"id":"https://openalex.org/F4320324433","display_name":"King Khalid University","ror":"https://ror.org/052kwzs30"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W2322315143","https://openalex.org/W2345277316","https://openalex.org/W2403036368","https://openalex.org/W2510373603","https://openalex.org/W2548207196","https://openalex.org/W2565477418","https://openalex.org/W2570516435","https://openalex.org/W2593472119","https://openalex.org/W2774165115","https://openalex.org/W2790257945","https://openalex.org/W2795655377","https://openalex.org/W2902581743","https://openalex.org/W2902762175","https://openalex.org/W2924988643","https://openalex.org/W2938480467","https://openalex.org/W3020407551","https://openalex.org/W3041223433","https://openalex.org/W3092550547","https://openalex.org/W3118272523","https://openalex.org/W3125245754","https://openalex.org/W3166266336","https://openalex.org/W3212271205","https://openalex.org/W4210763735"],"related_works":["https://openalex.org/W4248847356","https://openalex.org/W2744624421","https://openalex.org/W777049646","https://openalex.org/W2131846073","https://openalex.org/W4372269058","https://openalex.org/W114534093","https://openalex.org/W2620043489","https://openalex.org/W4235894667","https://openalex.org/W4292493860","https://openalex.org/W2767823571"],"abstract_inverted_index":{"Securing":[0],"Internet":[1],"of":[2,18,51],"Things":[3],"(IoT)":[4],"devices":[5,70,96,118],"in":[6,44,48],"fog":[7,72,98,122],"computing":[8,73],"systems":[9],"can":[10],"be":[11,101],"challenging":[12],"due":[13],"to":[14,71,100,121],"the":[15,82,106,111,126],"inherent":[16],"limitations":[17],"IoT":[19,37,69,95,117],"devices.":[20,38],"For":[21],"instance,":[22],"cryptographic":[23],"primitives,":[24],"such":[25],"as":[26],"attribute-based":[27,54,84],"encryption":[28,57,85,112],"(ABE)":[29],"schemes,":[30],"are":[31,59,119],"computationally":[32],"expensive":[33],"for":[34,116],"deployment":[35],"on":[36,81],"Thus,":[39],"ABE":[40],"is":[41,79],"not":[42],"realistic":[43],"facilitating":[45],"real-time":[46],"updates":[47],"various":[49],"applications":[50],"IoT.":[52],"Therefore,":[53],"and":[55,65,97,113],"multi-authority":[56],"schemes":[58],"designed":[60],"that":[61],"help":[62],"attribute":[63,76,107],"revocation":[64,77],"computation":[66],"outsourcing":[67],"from":[68],"servers.":[74],"The":[75,88],"scheme":[78,90],"based":[80],"ciphertext-policy":[83],"(CP-ABE)":[86],"technique.":[87],"CP-ABE":[89,127],"allows":[91],"secret":[92],"keys":[93],"between":[94],"nodes":[99],"dynamically":[102],"generated":[103],"by":[104],"incorporating":[105],"group":[108],"keys.":[109],"Then,":[110],"decryption":[114],"functions":[115],"outsourced":[120],"nodes,":[123],"which":[124],"present":[125],"validation.":[128]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":1}],"updated_date":"2026-04-16T08:26:57.006410","created_date":"2025-10-10T00:00:00"}
