{"id":"https://openalex.org/W3213172322","doi":"https://doi.org/10.1109/jiot.2021.3128528","title":"Privacy Protection Data Retrieval Scheme With Inverted Index for IoT Based on Blockchain","display_name":"Privacy Protection Data Retrieval Scheme With Inverted Index for IoT Based on Blockchain","publication_year":2021,"publication_date":"2021-11-16","ids":{"openalex":"https://openalex.org/W3213172322","doi":"https://doi.org/10.1109/jiot.2021.3128528","mag":"3213172322"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2021.3128528","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2021.3128528","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5003153613","display_name":"Wenmin Li","orcid":"https://orcid.org/0000-0002-1278-1735"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Wenmin Li","raw_affiliation_strings":["State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101901099","display_name":"Yang Chen","orcid":"https://orcid.org/0000-0002-8999-1511"},"institutions":[{"id":"https://openalex.org/I4210087772","display_name":"National Computer Network Emergency Response Technical Team/Coordination Center of Chinar","ror":"https://ror.org/00247dh76","country_code":"CN","type":"nonprofit","lineage":["https://openalex.org/I4210087772"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yang Chen","raw_affiliation_strings":["Department of Emergency Responding, National Computer Network Emergency Response Technical Team/Coordination Center of China, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0002-8999-1511","affiliations":[{"raw_affiliation_string":"Department of Emergency Responding, National Computer Network Emergency Response Technical Team/Coordination Center of China, Beijing, China","institution_ids":["https://openalex.org/I4210087772"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050423562","display_name":"Fei Gao","orcid":"https://orcid.org/0000-0002-1546-4364"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fei Gao","raw_affiliation_strings":["State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0002-1546-4364","affiliations":[{"raw_affiliation_string":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100450333","display_name":"Shuo Zhang","orcid":"https://orcid.org/0000-0001-5362-8916"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shuo Zhang","raw_affiliation_strings":["State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0001-5362-8916","affiliations":[{"raw_affiliation_string":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100408679","display_name":"Hua Zhang","orcid":"https://orcid.org/0000-0002-0532-9783"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hua Zhang","raw_affiliation_strings":["State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0002-0532-9783","affiliations":[{"raw_affiliation_string":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5071607720","display_name":"Qiaoyan Wen","orcid":"https://orcid.org/0000-0001-7142-9726"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qiaoyan Wen","raw_affiliation_strings":["State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0001-7142-9726","affiliations":[{"raw_affiliation_string":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5003153613"],"corresponding_institution_ids":["https://openalex.org/I139759216"],"apc_list":null,"apc_paid":null,"fwci":1.3998,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.85295578,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"10","issue":"14","first_page":"12090","last_page":"12101"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8719305396080017},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7207933664321899},{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.6404632329940796},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.6056539416313171},{"id":"https://openalex.org/keywords/data-sharing","display_name":"Data sharing","score":0.4895404279232025},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.4648752510547638},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.46038201451301575},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.45984259247779846},{"id":"https://openalex.org/keywords/index","display_name":"Index (typography)","score":0.44553378224372864},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.36633047461509705},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3639490604400635},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3597956895828247},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.09125640988349915}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8719305396080017},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7207933664321899},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.6404632329940796},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.6056539416313171},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.4895404279232025},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.4648752510547638},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.46038201451301575},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.45984259247779846},{"id":"https://openalex.org/C2777382242","wikidata":"https://www.wikidata.org/wiki/Q6017816","display_name":"Index (typography)","level":2,"score":0.44553378224372864},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.36633047461509705},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3639490604400635},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3597956895828247},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.09125640988349915},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2021.3128528","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2021.3128528","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.5299999713897705}],"awards":[{"id":"https://openalex.org/G2511961424","display_name":null,"funder_award_id":"61672110","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5010162753","display_name":null,"funder_award_id":"61972048","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G638354172","display_name":null,"funder_award_id":"61671082","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6416792519","display_name":null,"funder_award_id":"2020YFB1005900","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G6567475578","display_name":null,"funder_award_id":"62072051","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6630218817","display_name":null,"funder_award_id":"61976024","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W70096886","https://openalex.org/W1851414966","https://openalex.org/W1988169383","https://openalex.org/W2048334094","https://openalex.org/W2056949817","https://openalex.org/W2078590992","https://openalex.org/W2108072891","https://openalex.org/W2138001464","https://openalex.org/W2145426052","https://openalex.org/W2161214567","https://openalex.org/W2164988972","https://openalex.org/W2231711433","https://openalex.org/W2293178884","https://openalex.org/W2293283622","https://openalex.org/W2520342609","https://openalex.org/W2529668542","https://openalex.org/W2752908210","https://openalex.org/W2759564290","https://openalex.org/W2767083252","https://openalex.org/W2774060158","https://openalex.org/W2774471028","https://openalex.org/W2796172907","https://openalex.org/W2886749079","https://openalex.org/W2897521699","https://openalex.org/W2996680452","https://openalex.org/W3022642922","https://openalex.org/W3042900318","https://openalex.org/W3151461088","https://openalex.org/W3154539900","https://openalex.org/W3170118407","https://openalex.org/W3172743044","https://openalex.org/W3177305046","https://openalex.org/W6602830368","https://openalex.org/W6684349517","https://openalex.org/W6744529318","https://openalex.org/W6771834630"],"related_works":["https://openalex.org/W4210406818","https://openalex.org/W4306779889","https://openalex.org/W3048554917","https://openalex.org/W3211706803","https://openalex.org/W4382775358","https://openalex.org/W4246942721","https://openalex.org/W3209862047","https://openalex.org/W4386732777","https://openalex.org/W4304136894","https://openalex.org/W3216065934"],"abstract_inverted_index":{"In":[0,110],"the":[1,17,28,31,37,42,45,49,54,89,99,114,142,154,158,168,191,196],"6G":[2],"era,":[3],"Internet":[4],"of":[5,19,33,44,132,170,195,200],"Things":[6],"(IoT)":[7],"devices":[8],"can":[9,40,52,189],"form":[10],"a":[11,76,85,161],"blockchain":[12,107,197],"network,":[13],"which":[14,128],"also":[15],"faces":[16],"problems":[18],"data":[20,23,39,51,55,65,108,121,192],"sharing.":[21,109],"The":[22,178],"transmitted":[24],"and":[25,47,66,95,148,173,188],"stored":[26],"through":[27],"network":[29,198],"have":[30],"risk":[32],"privacy":[34,94,119],"leaking.":[35],"Encrypting":[36],"shared":[38],"satisfy":[41],"need":[43],"privacy,":[46],"retrieving":[48],"encrypted":[50,64,72],"make":[53],"used":[56,105],"efficiently.":[57],"However,":[58],"to":[59,62,88,112],"enable":[60],"users":[61],"retrieve":[63],"perform":[67],"fine-grained":[68],"authorization":[69],"on":[70],"their":[71],"files":[73],"is":[74,84,129,138],"still":[75,93],"great":[77],"challenge.":[78],"Although":[79],"attribute-based":[80,133],"keyword":[81,144,150],"search":[82],"(ABKS)":[83],"well-received":[86],"solution":[87],"challenge,":[90],"there":[91],"are":[92,103],"efficiency":[96,169,187],"issues":[97],"if":[98],"traditional":[100],"ABKS":[101],"schemes":[102],"directly":[104],"in":[106,186],"order":[111],"solve":[113],"problems,":[115],"this":[116],"article":[117],"proposes":[118],"protection":[120],"retrieval":[122],"scheme":[123,137,159,172,183],"with":[124],"an":[125,130],"inverted":[126],"index,":[127],"application":[131],"encryption.":[134],"First,":[135],"our":[136,171,182],"proved":[139],"secure":[140],"against":[141],"outside":[143],"guessing":[145],"attack":[146,151],"(KGA)":[147],"chosen":[149],"(CKA)":[152],"under":[153],"semitrusted":[155],"model.":[156],"Second,":[157],"returns":[160],"multikeywords":[162],"ranked":[163],"result.":[164],"Third,":[165],"we":[166],"analyze":[167],"verify":[174],"it":[175],"by":[176],"simulation.":[177],"results":[179],"show":[180],"that":[181],"has":[184],"improvement":[185],"meet":[190],"sharing":[193],"needs":[194],"composed":[199],"IoT":[201],"devices.":[202]},"counts_by_year":[{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":7}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
