{"id":"https://openalex.org/W4210495463","doi":"https://doi.org/10.1109/jiot.2022.3146197","title":"Secure, Efficient, and Weighted Access Control for Cloud-Assisted Industrial IoT","display_name":"Secure, Efficient, and Weighted Access Control for Cloud-Assisted Industrial IoT","publication_year":2022,"publication_date":"2022-01-25","ids":{"openalex":"https://openalex.org/W4210495463","doi":"https://doi.org/10.1109/jiot.2022.3146197"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2022.3146197","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2022.3146197","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5035868158","display_name":"Qi Li","orcid":"https://orcid.org/0000-0002-7280-7378"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Qi Li","raw_affiliation_strings":["School of Computer Science and Jiangsu Key Laboratory of Big Data Security and Intelligent Processing, Nanjing University of Posts and Telecommunications, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Jiangsu Key Laboratory of Big Data Security and Intelligent Processing, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100349106","display_name":"Qianqian Zhang","orcid":"https://orcid.org/0000-0002-8759-1311"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qianqian Zhang","raw_affiliation_strings":["School of Computer Science and Jiangsu Key Laboratory of Big Data Security and Intelligent Processing, Nanjing University of Posts and Telecommunications, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Jiangsu Key Laboratory of Big Data Security and Intelligent Processing, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088237102","display_name":"Haiping Huang","orcid":"https://orcid.org/0000-0002-4392-3599"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haiping Huang","raw_affiliation_strings":["School of Computer Science and Jiangsu Key Laboratory of Big Data Security and Intelligent Processing, Nanjing University of Posts and Telecommunications, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Jiangsu Key Laboratory of Big Data Security and Intelligent Processing, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084565580","display_name":"Wei Zhang","orcid":"https://orcid.org/0000-0002-1658-0236"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Zhang","raw_affiliation_strings":["School of Computer Science and Jiangsu Key Laboratory of Big Data Security and Intelligent Processing, Nanjing University of Posts and Telecommunications, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Jiangsu Key Laboratory of Big Data Security and Intelligent Processing, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023806511","display_name":"Wei Chen","orcid":"https://orcid.org/0000-0002-6248-1298"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Chen","raw_affiliation_strings":["School of Computer Science and Jiangsu Key Laboratory of Big Data Security and Intelligent Processing, Nanjing University of Posts and Telecommunications, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Jiangsu Key Laboratory of Big Data Security and Intelligent Processing, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5082859576","display_name":"Huaqun Wang","orcid":"https://orcid.org/0000-0001-7254-6465"},"institutions":[{"id":"https://openalex.org/I192209268","display_name":"Shaoxing University","ror":"https://ror.org/0435tej63","country_code":"CN","type":"education","lineage":["https://openalex.org/I192209268"]},{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huaqun Wang","raw_affiliation_strings":["School of Computer Science and Jiangsu Key Laboratory of Big Data Security and Intelligent Processing, Nanjing University of Posts and Telecommunications, Nanjing, China","Department of Computer Science and Engineering, Shaoxing University, Shaoxing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Jiangsu Key Laboratory of Big Data Security and Intelligent Processing, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, Shaoxing University, Shaoxing, China","institution_ids":["https://openalex.org/I192209268"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5035868158"],"corresponding_institution_ids":["https://openalex.org/I41198531"],"apc_list":null,"apc_paid":null,"fwci":6.108,"has_fulltext":false,"cited_by_count":48,"citation_normalized_percentile":{"value":0.96767992,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"9","issue":"18","first_page":"16917","last_page":"16927"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9921000003814697,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9789999723434448,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8432939052581787},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7392849326133728},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.7258356213569641},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.6919916868209839},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.6014246344566345},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5997909903526306},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.5759576559066772},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.5035960078239441},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4807400703430176},{"id":"https://openalex.org/keywords/cloud-storage","display_name":"Cloud storage","score":0.46420130133628845},{"id":"https://openalex.org/keywords/key-generation","display_name":"Key generation","score":0.45945340394973755},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.38884782791137695},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.38574928045272827},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.3428635001182556},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3411104083061218},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.23827749490737915},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.116191565990448}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8432939052581787},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7392849326133728},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.7258356213569641},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.6919916868209839},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.6014246344566345},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5997909903526306},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.5759576559066772},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.5035960078239441},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4807400703430176},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.46420130133628845},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.45945340394973755},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.38884782791137695},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.38574928045272827},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3428635001182556},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3411104083061218},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.23827749490737915},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.116191565990448}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2022.3146197","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2022.3146197","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.6299999952316284}],"awards":[{"id":"https://openalex.org/G3978973471","display_name":null,"funder_award_id":"2019YFB2101700","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G4083922625","display_name":null,"funder_award_id":"62072369","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4236343159","display_name":null,"funder_award_id":"61872192","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5410711530","display_name":null,"funder_award_id":"19KJA310010","funder_id":"https://openalex.org/F4320324207","funder_display_name":"Jiangsu Provincial Department of Education"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320324207","display_name":"Jiangsu Provincial Department of Education","ror":"https://ror.org/059md9404"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":40,"referenced_works":["https://openalex.org/W1498316612","https://openalex.org/W1510795740","https://openalex.org/W1546886278","https://openalex.org/W1806049065","https://openalex.org/W1836362512","https://openalex.org/W1898753656","https://openalex.org/W1974267799","https://openalex.org/W1979960234","https://openalex.org/W1982946433","https://openalex.org/W2058701727","https://openalex.org/W2086298846","https://openalex.org/W2108072891","https://openalex.org/W2109657825","https://openalex.org/W2119137917","https://openalex.org/W2139910984","https://openalex.org/W2322315143","https://openalex.org/W2331349420","https://openalex.org/W2745062479","https://openalex.org/W2796994201","https://openalex.org/W2886211034","https://openalex.org/W2902611338","https://openalex.org/W2904277101","https://openalex.org/W2910128060","https://openalex.org/W2944719821","https://openalex.org/W2952941057","https://openalex.org/W2972535651","https://openalex.org/W2980561852","https://openalex.org/W2981222105","https://openalex.org/W2986617006","https://openalex.org/W3005206852","https://openalex.org/W3008052621","https://openalex.org/W3034614954","https://openalex.org/W3041223433","https://openalex.org/W3083985131","https://openalex.org/W3094623621","https://openalex.org/W3132076411","https://openalex.org/W3142542690","https://openalex.org/W3175385336","https://openalex.org/W3198147790","https://openalex.org/W6602830368"],"related_works":["https://openalex.org/W2131846073","https://openalex.org/W4372269058","https://openalex.org/W114534093","https://openalex.org/W2383331906","https://openalex.org/W361351722","https://openalex.org/W4223919663","https://openalex.org/W1513098086","https://openalex.org/W2743419166","https://openalex.org/W2963348623","https://openalex.org/W2921225894"],"abstract_inverted_index":{"In":[0,63],"the":[1,14,23,33,36,41,46,83,106,118,122,130,140,150,154,159,173,184,192,197,221,224],"cloud-assisted":[2,78],"Industrial":[3],"Internet":[4],"of":[5,48,108,121,161,186,196,223],"Things":[6],"(IIoT),":[7],"ciphertext-policy":[8],"attribute-based":[9],"encryption":[10],"(CP-ABE)":[11],"could":[12],"help":[13],"data":[15,21],"owner":[16],"(DO)":[17],"share":[18],"his":[19],"sensitive":[20],"via":[22],"cloud":[24,155],"under":[25],"self-defined":[26],"access":[27,73,89,212],"structures.":[28],"Among":[29],"general":[30],"CP-ABE":[31],"schemes,":[32],"decryption":[34,145,226],"overhead,":[35],"key":[37,114,127,218],"generation":[38,115],"cost,":[39],"and":[40,71,202,220],"ciphertext":[42,215],"length":[43,107],"increase":[44],"with":[45],"number":[47],"involved":[49],"attributes.":[50,62],"Additionally,":[51],"only":[52,177],"regular":[53],"attributes":[54,93,102],"are":[55,137],"taking":[56],"into":[57],"consideration":[58],"rather":[59],"than":[60],"weighted":[61,72,92,101,211],"this":[64],"article,":[65],"we":[66,164],"proposed":[67,198],"a":[68],"secure,":[69],"efficient,":[70],"control":[74],"scheme":[75],"(SEWAC)":[76],"for":[77],"IIoT":[79],"applications.":[80],"SEWAC":[81,110,207],"enables":[82],"DO":[84],"to":[85,116,149,156,175],"formulate":[86],"any":[87],"fine-grained":[88],"structure":[90],"over":[91],"without":[94],"making":[95],"it":[96],"more":[97],"complicated.":[98],"Furthermore,":[99],"such":[100],"would":[103],"not":[104],"add":[105],"ciphertext.":[109],"also":[111,190],"supports":[112],"online/offline":[113],"alleviate":[117],"computational":[119,135],"cost":[120],"authority":[123],"from":[124],"answering":[125],"mass":[126],"requests":[128],"in":[129,139,182],"online":[131],"phase,":[132],"while":[133],"most":[134],"tasks":[136],"executed":[138],"offline":[141],"phase.":[142],"The":[143],"heavy":[144],"overhead":[146],"is":[147],"offloaded":[148],"cloud.":[151],"To":[152],"ensure":[153],"honestly":[157],"execute":[158],"process":[160],"outsourced":[162,225],"decryption,":[163],"design":[165],"an":[166],"efficient":[167,217],"batch":[168,187],"verification":[169],"method,":[170],"which":[171],"allows":[172],"user":[174],"spend":[176],"three":[178],"bilinear":[179],"pairing":[180],"operations":[181],"checking":[183],"correctness":[185],"results.":[188],"We":[189],"give":[191],"formal":[193],"security":[194],"proof":[195],"scheme.":[199],"Comprehensive":[200],"comparisons":[201],"implementation":[203],"results":[204],"indicate":[205],"that":[206],"can":[208],"better":[209],"achieve":[210],"control,":[213],"compressed":[214],"length,":[216],"generation,":[219],"assurance":[222],"result.":[227]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":9},{"year":2024,"cited_by_count":15},{"year":2023,"cited_by_count":12},{"year":2022,"cited_by_count":8}],"updated_date":"2026-04-11T08:14:18.477133","created_date":"2025-10-10T00:00:00"}
