{"id":"https://openalex.org/W3174468309","doi":"https://doi.org/10.1109/icccs52626.2021.9449093","title":"FDO-ABE: A Fully Decentralized Lightweight Access Control Architecture for Mobile Edge Computing","display_name":"FDO-ABE: A Fully Decentralized Lightweight Access Control Architecture for Mobile Edge Computing","publication_year":2021,"publication_date":"2021-04-23","ids":{"openalex":"https://openalex.org/W3174468309","doi":"https://doi.org/10.1109/icccs52626.2021.9449093","mag":"3174468309"},"language":"en","primary_location":{"id":"doi:10.1109/icccs52626.2021.9449093","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccs52626.2021.9449093","pdf_url":null,"source":{"id":"https://openalex.org/S4306498809","display_name":"2021 IEEE 6th International Conference on Computer and Communication Systems (ICCCS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE 6th International Conference on Computer and Communication Systems (ICCCS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101780221","display_name":"Zhishuo Zhang","orcid":"https://orcid.org/0000-0001-7638-1901"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhishuo Zhang","raw_affiliation_strings":["School of Information and Software Engineering, University of Electronic Science and Technology of China, (UESTC),Chengdu,China","School of Information and Software Engineering, University of Electronic Science and Technology of China, (UESTC), Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Software Engineering, University of Electronic Science and Technology of China, (UESTC),Chengdu,China","institution_ids":["https://openalex.org/I150229711"]},{"raw_affiliation_string":"School of Information and Software Engineering, University of Electronic Science and Technology of China, (UESTC), Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053986669","display_name":"Guanjie Huang","orcid":"https://orcid.org/0000-0002-9343-5534"},"institutions":[{"id":"https://openalex.org/I118347636","display_name":"Australian National University","ror":"https://ror.org/019wvm592","country_code":"AU","type":"education","lineage":["https://openalex.org/I118347636"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Guanjie Huang","raw_affiliation_strings":["Research School of Computer Science, Australian National University (ANU),Canberra,Australia","Research School of Computer Science, Australian National University (ANU), Canberra, Australia"],"affiliations":[{"raw_affiliation_string":"Research School of Computer Science, Australian National University (ANU),Canberra,Australia","institution_ids":["https://openalex.org/I118347636"]},{"raw_affiliation_string":"Research School of Computer Science, Australian National University (ANU), Canberra, Australia","institution_ids":["https://openalex.org/I118347636"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056769328","display_name":"Sunqiang Hu","orcid":null},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Sunqiang Hu","raw_affiliation_strings":["School of Information and Software Engineering, University of Electronic Science and Technology of China, (UESTC),Chengdu,China","School of Information and Software Engineering, University of Electronic Science and Technology of China, (UESTC), Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Software Engineering, University of Electronic Science and Technology of China, (UESTC),Chengdu,China","institution_ids":["https://openalex.org/I150229711"]},{"raw_affiliation_string":"School of Information and Software Engineering, University of Electronic Science and Technology of China, (UESTC), Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100349325","display_name":"Wei Zhang","orcid":"https://orcid.org/0000-0001-8289-8018"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Zhang","raw_affiliation_strings":["School of Information and Software Engineering, University of Electronic Science and Technology of China, (UESTC),Chengdu,China","School of Information and Software Engineering, University of Electronic Science and Technology of China, (UESTC), Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Software Engineering, University of Electronic Science and Technology of China, (UESTC),Chengdu,China","institution_ids":["https://openalex.org/I150229711"]},{"raw_affiliation_string":"School of Information and Software Engineering, University of Electronic Science and Technology of China, (UESTC), Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103103320","display_name":"Yi Wu","orcid":"https://orcid.org/0000-0001-9248-3430"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yi Wu","raw_affiliation_strings":["School of Information and Software Engineering, University of Electronic Science and Technology of China, (UESTC),Chengdu,China","School of Information and Software Engineering, University of Electronic Science and Technology of China, (UESTC), Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Software Engineering, University of Electronic Science and Technology of China, (UESTC),Chengdu,China","institution_ids":["https://openalex.org/I150229711"]},{"raw_affiliation_string":"School of Information and Software Engineering, University of Electronic Science and Technology of China, (UESTC), Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5045032131","display_name":"Zhiguang Qin","orcid":"https://orcid.org/0000-0001-6745-6377"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhiguang Qin","raw_affiliation_strings":["School of Information and Software Engineering, University of Electronic Science and Technology of China, (UESTC),Chengdu,China","School of Information and Software Engineering, University of Electronic Science and Technology of China, (UESTC), Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Software Engineering, University of Electronic Science and Technology of China, (UESTC),Chengdu,China","institution_ids":["https://openalex.org/I150229711"]},{"raw_affiliation_string":"School of Information and Software Engineering, University of Electronic Science and Technology of China, (UESTC), Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5101780221"],"corresponding_institution_ids":["https://openalex.org/I150229711"],"apc_list":null,"apc_paid":null,"fwci":0.6345,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.70141392,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"78","issue":null,"first_page":"193","last_page":"198"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.995199978351593,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9794999957084656,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8279959559440613},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.6729522347450256},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.6468567848205566},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5723465085029602},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5417227745056152},{"id":"https://openalex.org/keywords/mobile-edge-computing","display_name":"Mobile edge computing","score":0.5359751582145691},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5097543597221375},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.5077289342880249},{"id":"https://openalex.org/keywords/edge-computing","display_name":"Edge computing","score":0.5028297305107117},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.4966431260108948},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.47917285561561584},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.4527377188205719},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.44915738701820374},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.44533589482307434},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.44037312269210815},{"id":"https://openalex.org/keywords/mobile-computing","display_name":"Mobile computing","score":0.4246240258216858},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4162234663963318},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3794311583042145},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.2857266664505005},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2285303771495819},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.06988435983657837}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8279959559440613},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.6729522347450256},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.6468567848205566},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5723465085029602},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5417227745056152},{"id":"https://openalex.org/C2776061582","wikidata":"https://www.wikidata.org/wiki/Q25325231","display_name":"Mobile edge computing","level":3,"score":0.5359751582145691},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5097543597221375},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.5077289342880249},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.5028297305107117},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.4966431260108948},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.47917285561561584},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.4527377188205719},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.44915738701820374},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.44533589482307434},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.44037312269210815},{"id":"https://openalex.org/C144543869","wikidata":"https://www.wikidata.org/wiki/Q2738570","display_name":"Mobile computing","level":2,"score":0.4246240258216858},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4162234663963318},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3794311583042145},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2857266664505005},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2285303771495819},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.06988435983657837},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccs52626.2021.9449093","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccs52626.2021.9449093","pdf_url":null,"source":{"id":"https://openalex.org/S4306498809","display_name":"2021 IEEE 6th International Conference on Computer and Communication Systems (ICCCS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE 6th International Conference on Computer and Communication Systems (ICCCS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.49000000953674316,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[{"id":"https://openalex.org/G1555812177","display_name":null,"funder_award_id":"U1936101","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5814277799","display_name":null,"funder_award_id":"61520106007","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W1498316612","https://openalex.org/W1510795740","https://openalex.org/W1524327560","https://openalex.org/W1552940468","https://openalex.org/W1682451491","https://openalex.org/W1763482972","https://openalex.org/W1790074971","https://openalex.org/W1976420017","https://openalex.org/W1998436947","https://openalex.org/W2093355488","https://openalex.org/W2108072891","https://openalex.org/W2262390119","https://openalex.org/W2394819966","https://openalex.org/W2401387098","https://openalex.org/W2472413865","https://openalex.org/W2490067714","https://openalex.org/W2511018534","https://openalex.org/W2568772110","https://openalex.org/W2594560857","https://openalex.org/W2751904527","https://openalex.org/W2763448549","https://openalex.org/W2805186316","https://openalex.org/W2898242456","https://openalex.org/W2910358275","https://openalex.org/W2944410240","https://openalex.org/W3106445841","https://openalex.org/W3128663643","https://openalex.org/W6673756782","https://openalex.org/W6711969670"],"related_works":["https://openalex.org/W2131846073","https://openalex.org/W4372269058","https://openalex.org/W114534093","https://openalex.org/W2383331906","https://openalex.org/W361351722","https://openalex.org/W4223919663","https://openalex.org/W1513098086","https://openalex.org/W2743419166","https://openalex.org/W2963348623","https://openalex.org/W2921225894"],"abstract_inverted_index":{"Attribute-based":[0],"encryption":[1],"(ABE)":[2],"is":[3,66,102,249],"an":[4,28,213,253],"emergent":[5],"cryptographic":[6],"primitive":[7],"introduced":[8,42],"in":[9,23,73,85,93,107,132,135,175,231],"recent":[10],"years.":[11],"Due":[12],"to":[13,26,202,241],"its":[14],"fine-grained":[15],"access":[16,30,150,254],"policy,":[17],"ABE":[18,96,115,144,164],"has":[19],"been":[20],"widely":[21],"used":[22],"cloud":[24],"security":[25],"build":[27],"attribute-based":[29,179],"control":[31,151,255],"architecture.":[32],"As":[33],"a":[34,103,140],"promising":[35],"edge":[36,81],"technology,":[37],"Mobile":[38,47],"Edge":[39],"Computing":[40],"(MEC),":[41],"for":[43,55,119,153,182,193,219,257],"the":[44,51,56,64,80,83,86,89,108,113,120,149,154,161,170,177,187,194,204,228,242],"Internet":[45,84],"of":[46,82,88],"Things":[48],"(IoMT),":[49],"provides":[50,186],"high":[52],"quality":[53],"services":[54],"end-users":[57],"with":[58,122],"mobile":[59,90,209,238],"IoT":[60,239],"devices.":[61],"In":[62],"MEC,":[63],"data":[65,105,125],"stored":[67],"and":[68,71,189],"processed":[69],"isolately":[70],"independently":[72],"fog":[74,198],"nodes":[75],"or":[76,197],"cloudlets":[77,196],"located":[78],"at":[79],"vicinity":[87],"users.":[91],"But":[92],"most":[94],"existing":[95,114],"schemes,":[97],"researchers":[98],"only":[99,168],"consider":[100],"there":[101],"single":[104],"storage":[106,192],"system.":[109],"So":[110],"this":[111,129,136],"makes":[112],"scheme":[116,145,248],"not":[117,167],"applicable":[118],"MEC":[121],"distributed":[123,195],"micro":[124],"storages.":[126],"To":[127],"solve":[128],"prominent":[130],"challenge":[131],"traditional":[133],"ABE,":[134],"paper,":[137],"we":[138,211],"propose":[139],"fully":[141],"decentralized":[142],"outsourced":[143,215],"(FDO-ABE)":[146],"acted":[147],"as":[148,252],"architecture":[152],"MEC.":[155,258],"Our":[156],"FDO-ABE":[157,221,247],"scheme,":[158,166],"based":[159],"on":[160],"non-interactive":[162],"multi-authority":[163],"(NI-MA-ABE)":[165],"supports":[169],"multi":[171,178],"attribute":[172],"authorities":[173],"(AAs)":[174],"generating":[176],"private":[180],"keys":[181],"user,":[183],"but":[184],"also":[185],"independent":[188],"isolated":[190],"ciphertext":[191],"nodes.":[199],"What's":[200],"more,":[201],"offload":[203],"computational":[205],"intensive":[206],"tasks":[207],"from":[208,237],"devices,":[210],"design":[212],"efficient":[214],"decryption":[216,232],"(oDec)":[217],"algorithm":[218],"our":[220,225,246],"scheme.":[222],"By":[223],"using":[224],"oDec":[226],"algorithm,":[227],"complex":[229],"operations":[230],"phase":[233],"can":[234],"be":[235],"transmitted":[236],"devices":[240],"cloudlets.":[243],"Summing":[244],"up,":[245],"more":[250],"suitable":[251],"model":[256]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
