{"id":"https://openalex.org/W4410358615","doi":"https://doi.org/10.1109/ojcs.2025.3570087","title":"SSL-XIoMT: Secure, Scalable, and Lightweight Cross-Domain IoMT Sharing With SSI and ZKP Authentication","display_name":"SSL-XIoMT: Secure, Scalable, and Lightweight Cross-Domain IoMT Sharing With SSI and ZKP Authentication","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4410358615","doi":"https://doi.org/10.1109/ojcs.2025.3570087"},"language":"en","primary_location":{"id":"doi:10.1109/ojcs.2025.3570087","is_oa":true,"landing_page_url":"https://doi.org/10.1109/ojcs.2025.3570087","pdf_url":null,"source":{"id":"https://openalex.org/S4210176459","display_name":"IEEE Open Journal of the Computer Society","issn_l":"2644-1268","issn":["2644-1268"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Open Journal of the Computer Society","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/ojcs.2025.3570087","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5008501314","display_name":"Lyhour Hak","orcid":"https://orcid.org/0009-0003-2247-555X"},"institutions":[{"id":"https://openalex.org/I108108428","display_name":"Thammasat University","ror":"https://ror.org/002yp7f20","country_code":"TH","type":"education","lineage":["https://openalex.org/I108108428"]}],"countries":["TH"],"is_corresponding":true,"raw_author_name":"Lyhour Hak","raw_affiliation_strings":["Sirindhorn International Institute of Technology, Thammasat University, Pathum Thani, Thailand","Sirindhorn International Institute of Technology, Thammasat University, Khlong Nueng, Pathum Thani, Thailand"],"affiliations":[{"raw_affiliation_string":"Sirindhorn International Institute of Technology, Thammasat University, Pathum Thani, Thailand","institution_ids":["https://openalex.org/I108108428"]},{"raw_affiliation_string":"Sirindhorn International Institute of Technology, Thammasat University, Khlong Nueng, Pathum Thani, Thailand","institution_ids":["https://openalex.org/I108108428"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5082587353","display_name":"Somchart Fugkeaw","orcid":"https://orcid.org/0000-0001-7156-184X"},"institutions":[{"id":"https://openalex.org/I108108428","display_name":"Thammasat University","ror":"https://ror.org/002yp7f20","country_code":"TH","type":"education","lineage":["https://openalex.org/I108108428"]}],"countries":["TH"],"is_corresponding":false,"raw_author_name":"Somchart Fugkeaw","raw_affiliation_strings":["Sirindhorn International Institute of Technology, Thammasat University, Pathum Thani, Thailand","Sirindhorn International Institute of Technology, Thammasat University, Khlong Nueng, Pathum Thani, Thailand"],"affiliations":[{"raw_affiliation_string":"Sirindhorn International Institute of Technology, Thammasat University, Pathum Thani, Thailand","institution_ids":["https://openalex.org/I108108428"]},{"raw_affiliation_string":"Sirindhorn International Institute of Technology, Thammasat University, Khlong Nueng, Pathum Thani, Thailand","institution_ids":["https://openalex.org/I108108428"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5008501314"],"corresponding_institution_ids":["https://openalex.org/I108108428"],"apc_list":{"value":1750,"currency":"USD","value_usd":1750},"apc_paid":{"value":1750,"currency":"USD","value_usd":1750},"fwci":4.4663,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.94345723,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":99},"biblio":{"volume":"6","issue":null,"first_page":"714","last_page":"725"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9014999866485596,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9014999866485596,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6469628810882568},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.646722137928009},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6080750823020935},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5463904738426208},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.513340175151825},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.4384550452232361},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3951638340950012},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3810913562774658},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3474365770816803},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.20888754725456238},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.16699939966201782},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.053931623697280884}],"concepts":[{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6469628810882568},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.646722137928009},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6080750823020935},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5463904738426208},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.513340175151825},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.4384550452232361},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3951638340950012},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3810913562774658},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3474365770816803},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.20888754725456238},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.16699939966201782},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.053931623697280884},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/ojcs.2025.3570087","is_oa":true,"landing_page_url":"https://doi.org/10.1109/ojcs.2025.3570087","pdf_url":null,"source":{"id":"https://openalex.org/S4210176459","display_name":"IEEE Open Journal of the Computer Society","issn_l":"2644-1268","issn":["2644-1268"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Open Journal of the Computer Society","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:b58fa132729a401494dedbfa56a6819c","is_oa":true,"landing_page_url":"https://doaj.org/article/b58fa132729a401494dedbfa56a6819c","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Open Journal of the Computer Society, Vol 6, Pp 714-725 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/ojcs.2025.3570087","is_oa":true,"landing_page_url":"https://doi.org/10.1109/ojcs.2025.3570087","pdf_url":null,"source":{"id":"https://openalex.org/S4210176459","display_name":"IEEE Open Journal of the Computer Society","issn_l":"2644-1268","issn":["2644-1268"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Open Journal of the Computer Society","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W2108072891","https://openalex.org/W2621249842","https://openalex.org/W2884987878","https://openalex.org/W2895774561","https://openalex.org/W3010858269","https://openalex.org/W3015387180","https://openalex.org/W3113589776","https://openalex.org/W3135398899","https://openalex.org/W3151004293","https://openalex.org/W3154832033","https://openalex.org/W3160872014","https://openalex.org/W3188721355","https://openalex.org/W3202149324","https://openalex.org/W4285289117","https://openalex.org/W4292260711","https://openalex.org/W4294691637","https://openalex.org/W4296437375","https://openalex.org/W4298371111","https://openalex.org/W4313591413","https://openalex.org/W4318624531","https://openalex.org/W4319302723","https://openalex.org/W4366504362","https://openalex.org/W4375796414","https://openalex.org/W4381801546","https://openalex.org/W4384787626","https://openalex.org/W4386275828","https://openalex.org/W4386590864","https://openalex.org/W4386609118","https://openalex.org/W4387886077","https://openalex.org/W4388820026","https://openalex.org/W4389474215","https://openalex.org/W4391468035","https://openalex.org/W4392405520","https://openalex.org/W4394595424","https://openalex.org/W4402830502","https://openalex.org/W6749892479","https://openalex.org/W6768415072"],"related_works":["https://openalex.org/W2389214306","https://openalex.org/W2965083567","https://openalex.org/W4235240664","https://openalex.org/W1838576100","https://openalex.org/W2095886385","https://openalex.org/W2006088653","https://openalex.org/W4255148435","https://openalex.org/W2889616422","https://openalex.org/W2089704382","https://openalex.org/W1983399550"],"abstract_inverted_index":{"The":[0,211],"Internet":[1],"of":[2,104,183],"Medical":[3],"Things":[4],"(IoMT)":[5],"is":[6,218],"transforming":[7],"healthcare":[8,26],"by":[9,123,148],"enabling":[10],"devices":[11],"to":[12,33,152,192],"generate":[13],"and":[14,37,50,56,67,84,107,132,138,158,167,171,189,209],"share":[15],"critical":[16],"patient":[17],"data.":[18],"However,":[19],"securely":[20,136],"sharing":[21,225],"this":[22],"data":[23,58,224],"across":[24],"different":[25],"entities":[27],"remains":[28],"a":[29,89,111],"significant":[30],"challenge":[31],"due":[32],"concerns":[34],"over":[35],"privacy":[36,122,170],"security.":[38],"Traditional":[39],"solutions":[40],"using":[41],"Ciphertext":[42],"Policy":[43],"Attribute-Based":[44],"Encryption":[45],"(CP-ABE),":[46],"Self-Sovereign":[47],"Identity":[48],"(SSI),":[49],"Zero-Knowledge":[51,100],"Proofs":[52],"(ZKPs)":[53],"offer":[54],"secure":[55],"anonymous":[57],"access,":[59],"but":[60],"they":[61],"often":[62],"fall":[63],"short":[64],"in":[65,70],"scalability":[66],"integration,":[68],"particularly":[69],"cross":[71],"domain":[72],"environments.":[73],"To":[74],"address":[75],"these":[76],"limitations,":[77],"we":[78,145],"introduce":[79],"SSL-XIoMT,":[80],"an":[81],"optimized":[82],"SSI":[83,97],"ZKP":[85,133],"authentication":[86,200],"framework":[87,114],"within":[88,110],"consortium":[90,112],"Hyperledger-based":[91],"environment.":[92],"This":[93,161],"innovative":[94],"system":[95],"integrates":[96],"under":[98],"advanced":[99],"Scalable":[101],"Transparent":[102],"Argument":[103],"Knowledge":[105],"(ZK-STARK)":[106],"Plonk":[108],"protocols":[109],"Hyperledger":[113],"for":[115,186,220],"privacy-preserving":[116],"identity":[117,121,130],"verification.":[118],"We":[119],"enhance":[120],"integrating":[124],"Multi-Party":[125],"Computation":[126],"(MPC),":[127],"ensuring":[128],"that":[129,177,216],"credentials":[131],"proofs":[134],"are":[135],"shared":[137],"reconstructed":[139],"without":[140],"exposing":[141],"sensitive":[142],"information.":[143],"Additionally,":[144],"optimize":[146],"CP-ABE":[147,187],"offloading":[149],"complex":[150],"computations":[151],"fog":[153],"nodes,":[154],"which":[155],"pre-compute":[156],"attributes":[157],"logical":[159],"operations.":[160],"approach":[162,201],"significantly":[163],"reduces":[164],"computational":[165],"overhead":[166],"enhances":[168],"both":[169],"efficiency.":[172],"Our":[173],"extensive":[174],"analysis":[175],"shows":[176],"SSL-XIoMT":[178,217],"dramatically":[179],"improves":[180],"the":[181,203],"performance":[182],"processing":[184,207],"time":[185,208],"encryption":[188],"decryption":[190],"compared":[191],"current":[193],"methods.":[194],"Moreover,":[195],"our":[196],"hybrid":[197],"ZKPs":[198],"based":[199],"outperforms":[202],"existing":[204],"schemes":[205],"regarding":[206],"flexibility.":[210],"throughput":[212],"test":[213],"also":[214],"demonstrates":[215],"practical":[219],"large":[221],"scale":[222],"cross-domain":[223],"implementation.":[226]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
