{"id":"https://openalex.org/W4400035798","doi":"https://doi.org/10.1109/tifs.2024.3419716","title":"Domain-Specific Fine-Grained Access Control for Cloud-Edge Collaborative IoT","display_name":"Domain-Specific Fine-Grained Access Control for Cloud-Edge Collaborative IoT","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W4400035798","doi":"https://doi.org/10.1109/tifs.2024.3419716"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2024.3419716","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2024.3419716","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5076987757","display_name":"Meiyan Xiao","orcid":"https://orcid.org/0000-0001-9590-9820"},"institutions":[{"id":"https://openalex.org/I101479585","display_name":"South China Agricultural University","ror":"https://ror.org/05v9jqt67","country_code":"CN","type":"education","lineage":["https://openalex.org/I101479585"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Meiyan Xiao","raw_affiliation_strings":["College of Mathematics and Informatics, South China Agricultural University, Guangzhou, China"],"raw_orcid":"https://orcid.org/0000-0001-9590-9820","affiliations":[{"raw_affiliation_string":"College of Mathematics and Informatics, South China Agricultural University, Guangzhou, China","institution_ids":["https://openalex.org/I101479585"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011282586","display_name":"Qiong Huang","orcid":"https://orcid.org/0000-0002-7666-8985"},"institutions":[{"id":"https://openalex.org/I101479585","display_name":"South China Agricultural University","ror":"https://ror.org/05v9jqt67","country_code":"CN","type":"education","lineage":["https://openalex.org/I101479585"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qiong Huang","raw_affiliation_strings":["College of Mathematics and Informatics, South China Agricultural University, Guangzhou, China"],"raw_orcid":"https://orcid.org/0000-0002-7666-8985","affiliations":[{"raw_affiliation_string":"College of Mathematics and Informatics, South China Agricultural University, Guangzhou, China","institution_ids":["https://openalex.org/I101479585"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Wenya Chen","orcid":"https://orcid.org/0009-0001-4468-6732"},"institutions":[{"id":"https://openalex.org/I101479585","display_name":"South China Agricultural University","ror":"https://ror.org/05v9jqt67","country_code":"CN","type":"education","lineage":["https://openalex.org/I101479585"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenya Chen","raw_affiliation_strings":["College of Mathematics and Informatics, South China Agricultural University, Guangzhou, China"],"raw_orcid":"https://orcid.org/0009-0001-4468-6732","affiliations":[{"raw_affiliation_string":"College of Mathematics and Informatics, South China Agricultural University, Guangzhou, China","institution_ids":["https://openalex.org/I101479585"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5104335986","display_name":"Chuan Lyu","orcid":null},"institutions":[{"id":"https://openalex.org/I101479585","display_name":"South China Agricultural University","ror":"https://ror.org/05v9jqt67","country_code":"CN","type":"education","lineage":["https://openalex.org/I101479585"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chuan Lyu","raw_affiliation_strings":["College of Mathematics and Informatics, South China Agricultural University, Guangzhou, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Mathematics and Informatics, South China Agricultural University, Guangzhou, China","institution_ids":["https://openalex.org/I101479585"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5054741725","display_name":"Willy Susilo","orcid":"https://orcid.org/0000-0002-1562-5105"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Willy Susilo","raw_affiliation_strings":["School of Computing and Information Technology, University of Wollongong, Wollongong, NSW, Australia"],"raw_orcid":"https://orcid.org/0000-0002-1562-5105","affiliations":[{"raw_affiliation_string":"School of Computing and Information Technology, University of Wollongong, Wollongong, NSW, Australia","institution_ids":["https://openalex.org/I204824540"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5076987757"],"corresponding_institution_ids":["https://openalex.org/I101479585"],"apc_list":null,"apc_paid":null,"fwci":2.0184,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.8715125,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":"19","issue":null,"first_page":"6499","last_page":"6513"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9868000149726868,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9868000149726868,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9861999750137329,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9761000275611877,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8380298614501953},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7068939805030823},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5905211567878723},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.5791498422622681},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.49513378739356995},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.4877255856990814},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.40615057945251465},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.25559234619140625},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.18902486562728882},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.14890509843826294}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8380298614501953},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7068939805030823},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5905211567878723},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.5791498422622681},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.49513378739356995},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.4877255856990814},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.40615057945251465},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.25559234619140625},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.18902486562728882},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.14890509843826294},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2024.3419716","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2024.3419716","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4372474279","display_name":null,"funder_award_id":"62272174","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G646317189","display_name":null,"funder_award_id":"2024A1515012666","funder_id":"https://openalex.org/F4320337111","funder_display_name":"Basic and Applied Basic Research Foundation of Guangdong Province"},{"id":"https://openalex.org/G8709255156","display_name":null,"funder_award_id":"2023A1515011194","funder_id":"https://openalex.org/F4320337111","funder_display_name":"Basic and Applied Basic Research Foundation of Guangdong Province"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320337111","display_name":"Basic and Applied Basic Research Foundation of Guangdong Province","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W1498316612","https://openalex.org/W2040325382","https://openalex.org/W2108072891","https://openalex.org/W2138001464","https://openalex.org/W2169046918","https://openalex.org/W2621249842","https://openalex.org/W2779336304","https://openalex.org/W2888094362","https://openalex.org/W2915827760","https://openalex.org/W3006434756","https://openalex.org/W3007975392","https://openalex.org/W3036248800","https://openalex.org/W3083518585","https://openalex.org/W3091074232","https://openalex.org/W3092550547","https://openalex.org/W3096081135","https://openalex.org/W3112962245","https://openalex.org/W3120224044","https://openalex.org/W3128663643","https://openalex.org/W3156440914","https://openalex.org/W3166266336","https://openalex.org/W3199684414","https://openalex.org/W4214873055","https://openalex.org/W4224246582","https://openalex.org/W4285026938","https://openalex.org/W4285256539","https://openalex.org/W4306767408","https://openalex.org/W4308295781","https://openalex.org/W4312390103","https://openalex.org/W4312658198","https://openalex.org/W4387886077","https://openalex.org/W6602830368","https://openalex.org/W6790131382"],"related_works":["https://openalex.org/W4244478748","https://openalex.org/W4245926026","https://openalex.org/W4223488648","https://openalex.org/W2134969820","https://openalex.org/W2251605416","https://openalex.org/W2560439919","https://openalex.org/W4389340727","https://openalex.org/W3150465815","https://openalex.org/W1997222214","https://openalex.org/W3150023697"],"abstract_inverted_index":{"The":[0,109],"cloud-edge":[1,90,211],"collaborative":[2,91,212],"data":[3,6,60,86,97,102,117,124,161,173,214],"sharing":[4,61,87,103,125,180],"supporting":[5],"confidentiality":[7],"can":[8],"be":[9,39],"realized":[10,143],"by":[11,167],"adopting":[12],"outsourced":[13],"Attribute-Based":[14],"Encryption":[15],"(ABE)":[16],"schemes.":[17],"Yet,":[18],"most":[19],"existing":[20],"schemes":[21],"in":[22,144,151,210],"such":[23,30],"kind":[24],"of":[25,42,51,179,185,194,207],"scenarios":[26],"are":[27,36],"facing":[28],"challenges":[29],"as":[31,127,129],"vulnerable":[32],"terminal":[33,149],"devices":[34,150],"that":[35],"easy":[37],"to":[38,56,99,121,146,158,175],"attacked,":[40],"lack":[41,54],"flexible":[43],"authorization":[44,119],"management":[45],"methods":[46,55],"for":[47,89],"a":[48,68,83,106],"large":[49],"number":[50,178],"devices,":[52],"and":[53,112,134,196,198,205],"securely":[57],"specify":[58,176],"on-demand":[59,85,213],"domains.":[62],"In":[63],"this":[64],"paper,":[65],"we":[66,154],"propose":[67],"Domain-specific":[69],"On-demand":[70],"Access":[71],"Control":[72],"scheme":[73,157],"with":[74],"fully":[75],"Independent":[76],"Revocation":[77],"(DOACIR),":[78],"which":[79],"not":[80],"only":[81],"realizes":[82],"three-layer":[84],"framework":[88],"IoT":[92],"environments":[93],"but":[94],"also":[95,142],"allows":[96],"uploader":[98,174],"restrict":[100],"the":[101,123,131,156,169,183,191,199,203],"domain":[104],"through":[105],"succinct":[107],"way.":[108],"attribute":[110],"authority":[111],"multiple":[113],"edge":[114],"servers":[115],"perform":[116],"access":[118],"collaboratively":[120],"improve":[122,155],"efficiency":[126,206],"well":[128],"avoid":[130],"key-abuse":[132],"problem":[133],"key-leakage":[135],"problem.":[136],"Fully":[137],"independent":[138],"user":[139],"revocation":[140],"is":[141],"DOACIR":[145,165,195],"flexibly":[147],"manage":[148],"IoT.":[152],"Further,":[153],"support":[159],"cross-domain":[160],"sharing,":[162],"namely":[163],"Cross-Domain":[164],"(CD-DOACIR),":[166],"improving":[168],"encryption":[170],"phase":[171],"allowing":[172],"any":[177],"domains":[181],"while":[182],"size":[184],"ciphertext":[186],"remains":[187],"constant.":[188],"We":[189],"provide":[190],"security":[192],"proofs":[193],"CD-DOACIR,":[197],"experiment":[200],"results":[201],"demonstrate":[202],"effectiveness":[204],"our":[208],"solutions":[209],"sharing.":[215]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":1}],"updated_date":"2025-12-26T23:08:49.675405","created_date":"2025-10-10T00:00:00"}
