{"id":"https://openalex.org/W4409581297","doi":"https://doi.org/10.1109/jiot.2025.3562155","title":"Privacy-Enhanced Role-Based Access Control for IoT Systems","display_name":"Privacy-Enhanced Role-Based Access Control for IoT Systems","publication_year":2025,"publication_date":"2025-04-18","ids":{"openalex":"https://openalex.org/W4409581297","doi":"https://doi.org/10.1109/jiot.2025.3562155"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2025.3562155","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3562155","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088618880","display_name":"Yawei Zhang","orcid":"https://orcid.org/0009-0000-2164-4073"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yawei Zhang","raw_affiliation_strings":["College of Computer and Cyber Security and the Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, China","College of Computer and Cyber Security, Fujian Normal University, Fujian Provincial Key Laboratory of Network Security and Cryptology, Fuzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Cyber Security and the Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"College of Computer and Cyber Security, Fujian Normal University, Fujian Provincial Key Laboratory of Network Security and Cryptology, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043453012","display_name":"Lanxiang Chen","orcid":"https://orcid.org/0000-0002-5232-7801"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lanxiang Chen","raw_affiliation_strings":["College of Computer and Cyber Security and the Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, China","College of Computer and Cyber Security, Fujian Normal University, Fujian Provincial Key Laboratory of Network Security and Cryptology, Fuzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Cyber Security and the Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"College of Computer and Cyber Security, Fujian Normal University, Fujian Provincial Key Laboratory of Network Security and Cryptology, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011340503","display_name":"Yizhao Zhu","orcid":"https://orcid.org/0009-0003-5516-6585"},"institutions":[{"id":"https://openalex.org/I6469544","display_name":"City University of Macau","ror":"https://ror.org/04gpd4q15","country_code":"MO","type":"education","lineage":["https://openalex.org/I6469544"]}],"countries":["MO"],"is_corresponding":false,"raw_author_name":"Yizhao Zhu","raw_affiliation_strings":["Faculty of Data Science, City University of Macau, Macau SAR, China","Faculty of Data Science, City University of Macau, Macao SAR, China"],"affiliations":[{"raw_affiliation_string":"Faculty of Data Science, City University of Macau, Macau SAR, China","institution_ids":["https://openalex.org/I6469544"]},{"raw_affiliation_string":"Faculty of Data Science, City University of Macau, Macao SAR, China","institution_ids":["https://openalex.org/I6469544"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100544295","display_name":"Xiangqian Kong","orcid":"https://orcid.org/0009-0000-2254-1914"},"institutions":[{"id":"https://openalex.org/I149240348","display_name":"Jilin Normal University","ror":"https://ror.org/00xtsag93","country_code":"CN","type":"education","lineage":["https://openalex.org/I149240348"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiangqian Kong","raw_affiliation_strings":["College of Mathematics and Computer, Jilin Normal University, Siping, China"],"affiliations":[{"raw_affiliation_string":"College of Mathematics and Computer, Jilin Normal University, Siping, China","institution_ids":["https://openalex.org/I149240348"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5088618880"],"corresponding_institution_ids":["https://openalex.org/I111753288"],"apc_list":null,"apc_paid":null,"fwci":13.3073,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.9818373,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":99},"biblio":{"volume":"12","issue":"14","first_page":"27269","last_page":"27279"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9933000206947327,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9933000206947327,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9699000120162964,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9642999768257141,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.805626630783081},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.6364060640335083},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.564842164516449},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.46649762988090515},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4618263840675354},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.44436272978782654}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.805626630783081},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.6364060640335083},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.564842164516449},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.46649762988090515},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4618263840675354},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.44436272978782654}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2025.3562155","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3562155","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3693746272","display_name":null,"funder_award_id":"No. 62072105","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W1485216661","https://openalex.org/W1498316612","https://openalex.org/W2004957971","https://openalex.org/W2138001464","https://openalex.org/W2608934870","https://openalex.org/W2766393794","https://openalex.org/W2796994201","https://openalex.org/W2798774540","https://openalex.org/W2909941289","https://openalex.org/W2978995927","https://openalex.org/W2997837815","https://openalex.org/W3002823324","https://openalex.org/W3048592926","https://openalex.org/W3084020249","https://openalex.org/W3093117838","https://openalex.org/W3136931855","https://openalex.org/W3142742079","https://openalex.org/W3157712508","https://openalex.org/W3210411400","https://openalex.org/W4205221992","https://openalex.org/W4205371695","https://openalex.org/W4225775401","https://openalex.org/W4226059379","https://openalex.org/W4285134135","https://openalex.org/W4292136447","https://openalex.org/W4312233213","https://openalex.org/W4313135279","https://openalex.org/W4384519471","https://openalex.org/W4390576786","https://openalex.org/W4392397286","https://openalex.org/W4394850647","https://openalex.org/W4401650773","https://openalex.org/W4401655841","https://openalex.org/W4402301183","https://openalex.org/W4404213236"],"related_works":["https://openalex.org/W4245926026","https://openalex.org/W4311097251","https://openalex.org/W2586548817","https://openalex.org/W2625093826","https://openalex.org/W4200598720","https://openalex.org/W2921026492","https://openalex.org/W4247463117","https://openalex.org/W4361251261","https://openalex.org/W3031181660","https://openalex.org/W4238100021"],"abstract_inverted_index":{"Unauthorized":[0],"accessing":[1],"private":[2,93],"information":[3],"poses":[4],"a":[5,22,35,125,205],"significant":[6],"security":[7,157,162],"risk":[8],"in":[9],"IoT.":[10],"Although":[11],"role-based":[12,38],"access":[13,39],"control":[14,40],"can":[15],"partially":[16],"address":[17],"the":[18,28,52,59,66,83,88,91,178,196,218],"problem,":[19],"there":[20],"is":[21],"lack":[23],"of":[24,30,54,69,82,90,131,198,207,220],"studies":[25],"on":[26],"protecting":[27],"privacy":[29,53,173],"roles.":[31,133],"This":[32],"work":[33],"proposes":[34],"novel":[36],"privacy-enhanced":[37],"(PE-RBAC)":[41],"scheme":[42,50,99],"for":[43,146,170,176],"resource-limited":[44],"cloud-based":[45],"IoT":[46,70,78,132,147,171,182,200],"systems.":[47],"Our":[48,98],"PE-RBAC":[49],"enhances":[51],"traditional":[55],"RBAC":[56],"by":[57,107],"allowing":[58],"cloud":[60,84,179],"platform":[61,180],"(CP)":[62],"to":[63,103],"learn":[64],"only":[65,136],"necessary":[67],"roles":[68,86],"devices":[71,79,148],"rather":[72],"than":[73],"their":[74],"entire":[75],"role":[76,101,193],"sets.":[77],"remain":[80],"unaware":[81],"platform\u2019s":[85],"through":[87,188],"incorporation":[89],"authorized":[92],"set":[94],"intersection":[95],"(APSI)":[96],"protocol.":[97],"enables":[100],"authorization":[102,110],"prevent":[104],"unauthorized":[105],"requests":[106,209],"integrating":[108],"an":[109,114],"center":[111],"(AC)":[112],"with":[113,149,212,217],"authentication":[115],"scheme.":[116],"It":[117,134,184],"achieves":[118,165],"lightweight":[119],"computation":[120],"and":[121,139,153,160,167,174,181,195],"communication":[122],"overhead":[123,214],"using":[124],"garbled":[126],"Bloom":[127],"filter":[128],"(GBF),":[129],"independent":[130],"requires":[135],"XOR":[137],"operations":[138],"random":[140],"number":[141,197,219],"generation,":[142],"making":[143],"it":[144,164],"ideal":[145],"limited":[150],"computing":[151],"capacity":[152],"bandwidth.":[154],"Through":[155],"formal":[156],"model":[158],"definitions":[159],"rigorous":[161],"analysis,":[163],"unlinkability":[166],"ciphertext":[168],"indistinguishability":[169],"device":[172],"unforgeability":[175],"both":[177],"devices.":[183,201,221],"demonstrates":[185],"high":[186],"practicality":[187],"real-world-like":[189],"experiments":[190],"considering":[191],"varying":[192],"sizes":[194],"concurrent":[199],"Experimental":[202],"results":[203],"show":[204],"throughput":[206],"1,100":[208],"per":[210],"second,":[211],"storage":[213],"remaining":[215],"linear":[216]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
