{"id":"https://openalex.org/W4311080956","doi":"https://doi.org/10.1109/tifs.2022.3220030","title":"AADEC: Anonymous and Auditable Distributed Access Control for Edge Computing Services","display_name":"AADEC: Anonymous and Auditable Distributed Access Control for Edge Computing Services","publication_year":2022,"publication_date":"2022-11-04","ids":{"openalex":"https://openalex.org/W4311080956","doi":"https://doi.org/10.1109/tifs.2022.3220030"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2022.3220030","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2022.3220030","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101971686","display_name":"Xiaotong Zhou","orcid":"https://orcid.org/0000-0002-4856-0627"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]},{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiaotong Zhou","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, China","Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, Guilin, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]},{"raw_affiliation_string":"Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, Guilin, China","institution_ids":["https://openalex.org/I5343935"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025668908","display_name":"Debiao He","orcid":"https://orcid.org/0000-0002-2446-7436"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Debiao He","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, China","Shanghai Key Laboratory of Privacy-Preserving Computation, Matrix Elements Technologies, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]},{"raw_affiliation_string":"Shanghai Key Laboratory of Privacy-Preserving Computation, Matrix Elements Technologies, Shanghai, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081596329","display_name":"Jianting Ning","orcid":"https://orcid.org/0000-0001-7165-398X"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianting Ning","raw_affiliation_strings":["Fujian Provincial Key Laboratory of Network Security and Cryptology, College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Fujian Provincial Key Laboratory of Network Security and Cryptology, College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088264677","display_name":"Min Luo","orcid":"https://orcid.org/0000-0002-1819-9332"},"institutions":[{"id":"https://openalex.org/I152269853","display_name":"Qilu University of Technology","ror":"https://ror.org/04hyzq608","country_code":"CN","type":"education","lineage":["https://openalex.org/I152269853"]},{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]},{"id":"https://openalex.org/I4210142748","display_name":"Shandong Academy of Sciences","ror":"https://ror.org/04y8d6y55","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210142748"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Min Luo","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, China","Shandong Provincial Key Laboratory of Computer Networks, Qilu University of Technology (Shandong Academy of Sciences), Jinan, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]},{"raw_affiliation_string":"Shandong Provincial Key Laboratory of Computer Networks, Qilu University of Technology (Shandong Academy of Sciences), Jinan, China","institution_ids":["https://openalex.org/I4210142748","https://openalex.org/I152269853"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5031931063","display_name":"Xinyi Huang","orcid":"https://orcid.org/0000-0003-0070-1707"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xinyi Huang","raw_affiliation_strings":["Artificial Intelligence Thrust, Information Hub, Hong Kong University of Science and Technology (Guangzhou), Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"Artificial Intelligence Thrust, Information Hub, Hong Kong University of Science and Technology (Guangzhou), Guangzhou, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5101971686"],"corresponding_institution_ids":["https://openalex.org/I37461747","https://openalex.org/I5343935"],"apc_list":null,"apc_paid":null,"fwci":2.2205,"has_fulltext":false,"cited_by_count":19,"citation_normalized_percentile":{"value":0.89678437,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"18","issue":null,"first_page":"290","last_page":"303"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8248559236526489},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7164070010185242},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.6621330380439758},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.5804997682571411},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5580602884292603},{"id":"https://openalex.org/keywords/edge-computing","display_name":"Edge computing","score":0.5493372678756714},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5022335052490234},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.5012445449829102},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.49499648809432983},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4854310154914856},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.45016205310821533},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.4445544183254242},{"id":"https://openalex.org/keywords/security-token","display_name":"Security token","score":0.4402744174003601},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4124853312969208},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.09380209445953369}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8248559236526489},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7164070010185242},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.6621330380439758},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.5804997682571411},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5580602884292603},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.5493372678756714},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5022335052490234},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.5012445449829102},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.49499648809432983},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4854310154914856},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.45016205310821533},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.4445544183254242},{"id":"https://openalex.org/C48145219","wikidata":"https://www.wikidata.org/wiki/Q1335365","display_name":"Security token","level":2,"score":0.4402744174003601},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4124853312969208},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09380209445953369},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tifs.2022.3220030","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2022.3220030","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},{"id":"pmh:oai:repository.hkust.edu.hk:1783.1-122970","is_oa":false,"landing_page_url":"http://repository.hkust.edu.hk/ir/Record/1783.1-122970","pdf_url":null,"source":{"id":"https://openalex.org/S4306401796","display_name":"Rare & Special e-Zone (The Hong Kong University of Science and Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I200769079","host_organization_name":"Hong Kong University of Science and Technology","host_organization_lineage":["https://openalex.org/I200769079"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.550000011920929}],"awards":[{"id":"https://openalex.org/G1741003700","display_name":null,"funder_award_id":"2020010601012187","funder_id":"https://openalex.org/F4320326713","funder_display_name":"Wuhan Municipal Science and Technology Bureau"},{"id":"https://openalex.org/G1828293475","display_name":null,"funder_award_id":"2020J02016","funder_id":"https://openalex.org/F4320323190","funder_display_name":"Fujian Provincial Department of Science and Technology"},{"id":"https://openalex.org/G4117558629","display_name":null,"funder_award_id":"U21A20466","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4190834028","display_name":null,"funder_award_id":"62172307","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5043465742","display_name":null,"funder_award_id":"61972094","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5449561768","display_name":null,"funder_award_id":"2020CFA052","funder_id":"https://openalex.org/F4320322186","funder_display_name":"Natural Science Foundation of Hubei Province"},{"id":"https://openalex.org/G5497752695","display_name":null,"funder_award_id":"2021YFA1000600","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G5669255772","display_name":null,"funder_award_id":"62032005","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7801050751","display_name":null,"funder_award_id":"2020AEA013","funder_id":"https://openalex.org/F4320330031","funder_display_name":"Science and Technology Department of Hubei Province"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322186","display_name":"Natural Science Foundation of Hubei Province","ror":null},{"id":"https://openalex.org/F4320323190","display_name":"Fujian Provincial Department of Science and Technology","ror":"https://ror.org/00rgzpv08"},{"id":"https://openalex.org/F4320326713","display_name":"Wuhan Municipal Science and Technology Bureau","ror":null},{"id":"https://openalex.org/F4320330031","display_name":"Science and Technology Department of Hubei Province","ror":null},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W1479826086","https://openalex.org/W1589034595","https://openalex.org/W1667889362","https://openalex.org/W1976420017","https://openalex.org/W2079913403","https://openalex.org/W2104648615","https://openalex.org/W2106583429","https://openalex.org/W2112995928","https://openalex.org/W2405633850","https://openalex.org/W2509608824","https://openalex.org/W2596636257","https://openalex.org/W2744999500","https://openalex.org/W2790515622","https://openalex.org/W2790742414","https://openalex.org/W2808603859","https://openalex.org/W2913435035","https://openalex.org/W2921960465","https://openalex.org/W2946018107","https://openalex.org/W2946807166","https://openalex.org/W2950254710","https://openalex.org/W2951187092","https://openalex.org/W2951834778","https://openalex.org/W2952604022","https://openalex.org/W2963373072","https://openalex.org/W2972684599","https://openalex.org/W2975188135","https://openalex.org/W3015074395","https://openalex.org/W3085329122","https://openalex.org/W3155710513","https://openalex.org/W3159566766","https://openalex.org/W3172803077","https://openalex.org/W3212518961","https://openalex.org/W3213317411","https://openalex.org/W4226149406","https://openalex.org/W6743073161","https://openalex.org/W6763208004"],"related_works":["https://openalex.org/W4388335561","https://openalex.org/W2970530566","https://openalex.org/W4288261899","https://openalex.org/W4307309205","https://openalex.org/W2967478618","https://openalex.org/W4385009901","https://openalex.org/W4385572700","https://openalex.org/W2997152889","https://openalex.org/W1997179160","https://openalex.org/W3014916130"],"abstract_inverted_index":{"Edge":[0,125],"computing":[1,6],"is":[2,133],"an":[3,116,148],"emerging":[4],"distributed":[5],"concept":[7],"that":[8,139,176],"allows":[9],"edge":[10,49],"servers":[11],"to":[12,21,71,107,128],"provide":[13],"authorized":[14],"consumers":[15],"with":[16,151],"various":[17,28],"on-demand":[18],"services.":[19],"Due":[20],"highly":[22],"dynamic":[23],"and":[24,37,66,75,101,118,147,161,172,186],"untrustworthy":[25],"network":[26],"environments,":[27],"potential":[29],"security":[30,159,163],"concerns":[31],"(e.g.,":[32],"unauthorized":[33],"access,":[34],"data":[35,76,103,109],"manipulation,":[36],"privacy":[38,93],"leakage)":[39],"have":[40],"been":[41],"the":[42,46,87,97,108,157],"critical":[43],"factors":[44],"restricting":[45],"development":[47],"of":[48],"computing.":[50],"A":[51],"recent":[52],"heterogeneous":[53],"framework":[54],"proposed":[55],"by":[56,96],"Dougherty":[57],"et":[58],"al.":[59],"(CCS\u201921),":[60],"named":[61],"APECS,":[62],"deploys":[63],"token-based":[64],"authorization":[65],"multiple":[67],"attribute-based":[68],"encryption":[69],"(MABE)":[70],"guarantee":[72],"access":[73,84],"control":[74,85],"confidentiality.":[77],"While":[78],"APECS":[79],"achieves":[80],"a":[81,143,180],"secure":[82],"asynchronous":[83],"without":[86],"\u201calways-on\u201d":[88],"cloud,":[89],"it":[90],"suffers":[91],"from":[92],"leakage":[94],"(caused":[95],"public":[98],"identity":[99],"information)":[100],"fake":[102],"spreading":[104],"issues":[105],"(due":[106],"confidentiality).":[110],"In":[111],"this":[112],"paper,":[113],"we":[114,140],"propose":[115],"Anonymous":[117],"Auditable":[119],"Distributed":[120],"Access":[121],"Control":[122],"Framework":[123],"for":[124,165],"Computing":[126],"(AADEC)":[127],"relieve":[129],"these":[130],"issues.":[131],"AADEC":[132,177],"based":[134],"on":[135],"two":[136],"building":[137],"blocks":[138],"designed,":[141],"namely":[142],"conditional":[144],"anonymous":[145],"authentication":[146],"auditable":[149],"MABE":[150],"optimized":[152],"performance.":[153],"We":[154],"also":[155],"define":[156],"formal":[158],"models":[160],"present":[162],"proofs":[164],"our":[166],"proposal.":[167],"The":[168],"final":[169],"qualitative":[170],"comparison":[171],"performance":[173],"benchmark":[174],"demonstrate":[175],"can":[178],"achieve":[179],"trade-off":[181],"among":[182],"anonymity,":[183],"confidentiality,":[184],"auditability":[185],"efficiency.":[187]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":9},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":1}],"updated_date":"2026-04-18T07:56:08.524223","created_date":"2025-10-10T00:00:00"}
