{"id":"https://openalex.org/W4389609796","doi":"https://doi.org/10.1109/tdsc.2023.3337093","title":"DSChain: A Blockchain System for Complete Lifecycle Security of Data in Internet of Things","display_name":"DSChain: A Blockchain System for Complete Lifecycle Security of Data in Internet of Things","publication_year":2023,"publication_date":"2023-12-12","ids":{"openalex":"https://openalex.org/W4389609796","doi":"https://doi.org/10.1109/tdsc.2023.3337093"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2023.3337093","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2023.3337093","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5081525426","display_name":"Jie Cui","orcid":"https://orcid.org/0000-0001-7258-3418"},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jie Cui","raw_affiliation_strings":["Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, Anhui University, Hefei, China","Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]},{"raw_affiliation_string":"Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101898982","display_name":"Yatao Li","orcid":"https://orcid.org/0000-0002-0696-4631"},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yatao Li","raw_affiliation_strings":["Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, Anhui University, Hefei, China","Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]},{"raw_affiliation_string":"Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015149253","display_name":"Qingyang Zhang","orcid":"https://orcid.org/0000-0002-2600-6748"},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qingyang Zhang","raw_affiliation_strings":["Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, Anhui University, Hefei, China","Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]},{"raw_affiliation_string":"Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016260066","display_name":"Hong Zhong","orcid":"https://orcid.org/0000-0002-0392-9734"},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hong Zhong","raw_affiliation_strings":["Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, Anhui University, Hefei, China","Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]},{"raw_affiliation_string":"Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077232320","display_name":"Chengjie Gu","orcid":"https://orcid.org/0009-0001-6597-168X"},"institutions":[{"id":"https://openalex.org/I184681353","display_name":"Anhui University of Science and Technology","ror":"https://ror.org/00q9atg80","country_code":"CN","type":"education","lineage":["https://openalex.org/I184681353"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chengjie Gu","raw_affiliation_strings":["School of Public Security and Emergency Management, Anhui University of Science and Technology, Hefei, China","Security Research Institute, New H3C Group, Hefei, China"],"affiliations":[{"raw_affiliation_string":"School of Public Security and Emergency Management, Anhui University of Science and Technology, Hefei, China","institution_ids":["https://openalex.org/I184681353"]},{"raw_affiliation_string":"Security Research Institute, New H3C Group, Hefei, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025668908","display_name":"Debiao He","orcid":"https://orcid.org/0000-0002-2446-7436"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Debiao He","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, China","Shanghai Key Laboratory of Privacy Preserving Computation, MatrixElements Technologies, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]},{"raw_affiliation_string":"Shanghai Key Laboratory of Privacy Preserving Computation, MatrixElements Technologies, Shanghai, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5081525426"],"corresponding_institution_ids":["https://openalex.org/I143868143"],"apc_list":null,"apc_paid":null,"fwci":4.9737,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.95672759,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"21","issue":"4","first_page":"3977","last_page":"3993"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7910069823265076},{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.7243461608886719},{"id":"https://openalex.org/keywords/merkle-tree","display_name":"Merkle tree","score":0.6313357353210449},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5841245055198669},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5460432171821594},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4909806549549103},{"id":"https://openalex.org/keywords/data-sharing","display_name":"Data sharing","score":0.4836062490940094},{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.45693129301071167},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.42859840393066406},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.40863484144210815},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.21209940314292908},{"id":"https://openalex.org/keywords/cryptographic-hash-function","display_name":"Cryptographic hash function","score":0.20202085375785828}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7910069823265076},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.7243461608886719},{"id":"https://openalex.org/C205383636","wikidata":"https://www.wikidata.org/wiki/Q14746","display_name":"Merkle tree","level":4,"score":0.6313357353210449},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5841245055198669},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5460432171821594},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4909806549549103},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.4836062490940094},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.45693129301071167},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.42859840393066406},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.40863484144210815},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.21209940314292908},{"id":"https://openalex.org/C7608002","wikidata":"https://www.wikidata.org/wiki/Q477202","display_name":"Cryptographic hash function","level":3,"score":0.20202085375785828},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2023.3337093","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2023.3337093","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1101349560","display_name":null,"funder_award_id":"2208085QF198","funder_id":"https://openalex.org/F4320334897","funder_display_name":"Natural Science Foundation of Anhui Province"},{"id":"https://openalex.org/G167982814","display_name":null,"funder_award_id":"U23A20308","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G827846473","display_name":null,"funder_award_id":"62202005","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8497496367","display_name":null,"funder_award_id":"62272002","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320334897","display_name":"Natural Science Foundation of Anhui Province","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4387259453","https://openalex.org/W2397192327","https://openalex.org/W3020097167","https://openalex.org/W2141006951","https://openalex.org/W3152823548","https://openalex.org/W2125735429","https://openalex.org/W2154676777","https://openalex.org/W2952942094","https://openalex.org/W4319993352","https://openalex.org/W3159877768"],"abstract_inverted_index":{"There":[0],"is":[1,38,189],"a":[2,39,74,111,116,144,164,185],"growing":[3],"concern":[4],"about":[5],"the":[6,43,67,104,125,149,160],"complete":[7],"lifecycle":[8],"security":[9,92,101],"of":[10,14,127,167],"data":[11,27,29,35,68,91,100,118,129],"in":[12,56,69],"Internet":[13],"Things":[15],"(IoT).":[16],"This":[17],"may":[18],"cause":[19],"privacy":[20],"and":[21,31,50,64,79,82,93,120,162,169,188],"trust":[22],"problems":[23,45],"for":[24,34,90,98],"users":[25],"regarding":[26],"sources,":[28],"storage,":[30],"access":[32,137],"control":[33,136],"sharing.":[36],"Blockchain":[37],"valuable":[40],"solution":[41],"to":[42,102,114,123,135,138],"above":[44],"through":[46],"distributed":[47],"ledger":[48],"technology,":[49],"it":[51],"has":[52],"been":[53],"widely":[54],"applied":[55],"various":[57],"fields":[58],"such":[59],"as":[60],"public":[61,121],"services,":[62],"finance,":[63],"IoT.":[65],"However,":[66],"IoT":[70,99],"are":[71],"characterized":[72],"by":[73],"large":[75,77],"quantity,":[76],"capacity,":[78],"timely":[80],"response,":[81],"existing":[83],"blockchain":[84],"systems":[85],"only":[86],"partially":[87],"resolve":[88],"them":[89],"performance.":[94,157],"We":[95,158],"propose":[96,143],"DSChain":[97,161,176],"address":[103],"challenges":[105],"mentioned":[106],"above.":[107],"Our":[108],"system":[109,156],"uses":[110],"certificateless":[112],"signature":[113],"ensure":[115,124],"trusted":[117],"source":[119],"auditing":[122],"integrity":[126],"stored":[128],"while":[130],"using":[131],"ciphertext-policy":[132],"attribute-based":[133],"encryption":[134],"shared":[139],"data.":[140],"Moreover,":[141],"we":[142],"packaging":[145],"mechanism":[146],"based":[147],"on":[148,184],"Merkle":[150],"Hash":[151],"Tree":[152],"that":[153,175],"effectively":[154],"improves":[155],"implement":[159],"provide":[163],"detailed":[165],"analysis":[166],"performance":[168],"security.":[170],"The":[171],"experimental":[172],"results":[173],"indicate":[174],"can":[177],"achieve":[178],"approximately":[179],"1,035":[180],"transactions":[181],"per":[182],"second":[183],"single":[186],"peer":[187],"scalable.":[190]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":8},{"year":2024,"cited_by_count":1}],"updated_date":"2026-04-13T07:58:08.660418","created_date":"2025-10-10T00:00:00"}
