{"id":"https://openalex.org/W4285221470","doi":"https://doi.org/10.1109/tdsc.2022.3188740","title":"Expressive Data Sharing and Self-Controlled Fine-Grained Data Deletion in Cloud-Assisted IoT","display_name":"Expressive Data Sharing and Self-Controlled Fine-Grained Data Deletion in Cloud-Assisted IoT","publication_year":2022,"publication_date":"2022-07-06","ids":{"openalex":"https://openalex.org/W4285221470","doi":"https://doi.org/10.1109/tdsc.2022.3188740"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2022.3188740","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2022.3188740","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5091312281","display_name":"Qian Mei","orcid":"https://orcid.org/0000-0003-2227-0047"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]},{"id":"https://openalex.org/I4210126530","display_name":"Data Assurance and Communication Security","ror":"https://ror.org/02z2gfm30","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Qian Mei","raw_affiliation_strings":["School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, China","Network and Data Security Key Laboratory of Sichuan Province, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]},{"raw_affiliation_string":"Network and Data Security Key Laboratory of Sichuan Province, Chengdu, China","institution_ids":["https://openalex.org/I4210126530"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108361021","display_name":"Minghao Yang","orcid":"https://orcid.org/0000-0001-5397-3576"},"institutions":[{"id":"https://openalex.org/I66867065","display_name":"East China Normal University","ror":"https://ror.org/02n96ep67","country_code":"CN","type":"education","lineage":["https://openalex.org/I66867065"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Minghao Yang","raw_affiliation_strings":["Software Engineering Institute, East China Normal University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Software Engineering Institute, East China Normal University, Shanghai, China","institution_ids":["https://openalex.org/I66867065"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103057536","display_name":"Jinhao Chen","orcid":"https://orcid.org/0000-0003-4311-3729"},"institutions":[{"id":"https://openalex.org/I4210098582","display_name":"ZTE (China)","ror":"https://ror.org/00rjhhq63","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210098582"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jinhao Chen","raw_affiliation_strings":["ZTE Corporation, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"ZTE Corporation, Chengdu, China","institution_ids":["https://openalex.org/I4210098582"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100356430","display_name":"Lili Wang","orcid":"https://orcid.org/0000-0003-3228-4290"},"institutions":[{"id":"https://openalex.org/I4210126530","display_name":"Data Assurance and Communication Security","ror":"https://ror.org/02z2gfm30","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lili Wang","raw_affiliation_strings":["School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, China","Network and Data Security Key Laboratory of Sichuan Province, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]},{"raw_affiliation_string":"Network and Data Security Key Laboratory of Sichuan Province, Chengdu, China","institution_ids":["https://openalex.org/I4210126530"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100643589","display_name":"Hu Xiong","orcid":"https://orcid.org/0000-0001-6137-6667"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]},{"id":"https://openalex.org/I4210126530","display_name":"Data Assurance and Communication Security","ror":"https://ror.org/02z2gfm30","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hu Xiong","raw_affiliation_strings":["School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, China","Network and Data Security Key Laboratory of Sichuan Province, Chengdu, China","Advanced Cryptography and System Security Key Laboratory of Sichuan Province, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]},{"raw_affiliation_string":"Network and Data Security Key Laboratory of Sichuan Province, Chengdu, China","institution_ids":["https://openalex.org/I4210126530"]},{"raw_affiliation_string":"Advanced Cryptography and System Security Key Laboratory of Sichuan Province, Chengdu, China","institution_ids":["https://openalex.org/I4210132990"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5091312281"],"corresponding_institution_ids":["https://openalex.org/I150229711","https://openalex.org/I4210126530"],"apc_list":null,"apc_paid":null,"fwci":3.9799,"has_fulltext":false,"cited_by_count":32,"citation_normalized_percentile":{"value":0.9440642,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"20","issue":"3","first_page":"2625","last_page":"2640"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/notation","display_name":"Notation","score":0.7704971432685852},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5385512113571167},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4704793095588684},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4539697766304016},{"id":"https://openalex.org/keywords/data-sharing","display_name":"Data sharing","score":0.4147516191005707},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.373468279838562},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.35404083132743835},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.23235249519348145},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.09763693809509277}],"concepts":[{"id":"https://openalex.org/C45357846","wikidata":"https://www.wikidata.org/wiki/Q2001982","display_name":"Notation","level":2,"score":0.7704971432685852},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5385512113571167},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4704793095588684},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4539697766304016},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.4147516191005707},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.373468279838562},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.35404083132743835},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.23235249519348145},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.09763693809509277},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2022.3188740","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2022.3188740","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.41999998688697815,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G1555812177","display_name":null,"funder_award_id":"U1936101","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7337167594","display_name":null,"funder_award_id":"61902054","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7568062542","display_name":null,"funder_award_id":"62002047","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8483471686","display_name":null,"funder_award_id":"CSC, 202006070113","funder_id":"https://openalex.org/F4320322725","funder_display_name":"China Scholarship Council"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322725","display_name":"China Scholarship Council","ror":"https://ror.org/04atp4p48"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":45,"referenced_works":["https://openalex.org/W39353691","https://openalex.org/W165895243","https://openalex.org/W1496212871","https://openalex.org/W1498316612","https://openalex.org/W1510795740","https://openalex.org/W1513098086","https://openalex.org/W1518622464","https://openalex.org/W1568885723","https://openalex.org/W1589101336","https://openalex.org/W1603068992","https://openalex.org/W1720250315","https://openalex.org/W1826672334","https://openalex.org/W1896261913","https://openalex.org/W1967561194","https://openalex.org/W1998586673","https://openalex.org/W2101709669","https://openalex.org/W2108072891","https://openalex.org/W2114296561","https://openalex.org/W2117616411","https://openalex.org/W2129840796","https://openalex.org/W2211075457","https://openalex.org/W2227653143","https://openalex.org/W2601396684","https://openalex.org/W2604252918","https://openalex.org/W2763925543","https://openalex.org/W2792100575","https://openalex.org/W2795178971","https://openalex.org/W2891250116","https://openalex.org/W2947078207","https://openalex.org/W2952941057","https://openalex.org/W2963108924","https://openalex.org/W2981797988","https://openalex.org/W2998533495","https://openalex.org/W3000269852","https://openalex.org/W3012211304","https://openalex.org/W3023659140","https://openalex.org/W3029351686","https://openalex.org/W3046492758","https://openalex.org/W3082555471","https://openalex.org/W3128174515","https://openalex.org/W3134041340","https://openalex.org/W3134730287","https://openalex.org/W4225594710","https://openalex.org/W6749304789","https://openalex.org/W6769652336"],"related_works":["https://openalex.org/W2504004674","https://openalex.org/W4244478748","https://openalex.org/W4223488648","https://openalex.org/W2134969820","https://openalex.org/W2251605416","https://openalex.org/W1595229445","https://openalex.org/W4389340727","https://openalex.org/W4205786897","https://openalex.org/W3150465815","https://openalex.org/W1997222214"],"abstract_inverted_index":{"Expressive":[0],"data":[1,5,41,46,68,114,119,127,134,143,146,152,206],"sharing":[2,115],"and":[3,19,54,63,84,110,116,132,145,177,188,232,239],"efficient":[4],"deletion":[6,120,190],"are":[7,70],"essential":[8],"to":[9,30,39,129,148,180,203],"drive":[10],"the":[11,20,23,44,50,55,64,155,182,189,195,209,229],"development":[12],"of":[13,22,67,185,191],"cloud-assisted":[14,123,242],"IoT.":[15,243],"But":[16],"insecure":[17],"transmission":[18],"vulnerability":[21],"cloud":[24],"server":[25],"may":[26],"cause":[27],"potential":[28,45],"threats":[29],"IoT":[31],"data,":[32],"attribute-based":[33],"encryption":[34,179],"(ABE)":[35],"is":[36,201,225],"widely":[37],"applied":[38],"ensure":[40],"confidentially.":[42],"Nonetheless,":[43],"exposure":[47],"caused":[48],"by":[49],"compromised":[51],"long-term":[52],"key":[53],"contradiction":[56],"between":[57],"conventional":[58],"access":[59,138,199],"structures":[60],"in":[61,122,154,228,241],"ABE":[62,87,176],"various":[65,136],"demands":[66],"owners":[69,128,144],"still":[71],"two":[72],"huge":[73],"challenges.":[74],"To":[75],"overcome":[76],"these":[77],"challenges,":[78],"this":[79],"article":[80],"designs":[81],"an":[82,112],"unbounded":[83,175],"puncturable":[85,178],"ciphertext-policy":[86],"with":[88,135],"arithmetic":[89,196],"span":[90,197],"program":[91,198],"(":[92],"<inline-formula><tex-math":[93,97,101,105,159,163,167,171,210,214,218,222],"notation=\"LaTeX\">$\\mathcal":[94,98,102,106,160,164,168,172,211,215,219,223],"{UP}$</tex-math></inline-formula>":[95,161,212],"-":[96,100,104,162,166,170,213,217,221],"{CP}$</tex-math></inline-formula>":[99,165,216],"{ABE}$</tex-math></inline-formula>":[103,169,220],"{ASP}$</tex-math></inline-formula>":[107,173,224],")":[108],"scheme":[109],"presents":[111],"expressive":[113,205],"self-controlled":[117],"fine-grained":[118],"solution":[121],"IoT,":[124],"which":[125],"allows":[126],"efficiently":[130],"encrypt":[131],"share":[133],"computable":[137],"policies,":[139],"but":[140],"also":[141],"enables":[142],"users":[147],"independently":[149],"delete":[150],"specific":[151,192],"stored":[153],"cloud.":[156],"The":[157],"designed":[158],"leverages":[174],"support":[181],"flexible":[183],"update":[184],"system":[186],"parameters":[187],"data.":[193],"Also,":[194],"structure":[200],"combined":[202],"realize":[204],"sharing.":[207],"Moreover,":[208],"adaptively":[226],"secure":[227],"standard":[230],"model,":[231],"comprehensive":[233],"performance":[234],"evaluations":[235],"demonstrate":[236],"its":[237],"practicability":[238],"scalability":[240]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":9},{"year":2024,"cited_by_count":12},{"year":2023,"cited_by_count":9}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
