{"id":"https://openalex.org/W7133815126","doi":"https://doi.org/10.1109/tifs.2026.3671063","title":"Revocable and Flexible Privacy-Preserving Data Computing With Bilateral Access Control for Cloud-Fog-Assisted EHR Systems","display_name":"Revocable and Flexible Privacy-Preserving Data Computing With Bilateral Access Control for Cloud-Fog-Assisted EHR Systems","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7133815126","doi":"https://doi.org/10.1109/tifs.2026.3671063"},"language":null,"primary_location":{"id":"doi:10.1109/tifs.2026.3671063","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2026.3671063","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5080671333","display_name":"Mengting Yao","orcid":"https://orcid.org/0000-0002-0052-5099"},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Mengting Yao","raw_affiliation_strings":["College of Cyber Security, Jinan University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Cyber Security, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038946095","display_name":"Jian Weng","orcid":"https://orcid.org/0000-0003-4383-4040"},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]},{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I37987034"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jian Weng","raw_affiliation_strings":["College of Cyber Security, Jinan University, Guangzhou, China","Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Cyber Security, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]},{"raw_affiliation_string":"Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China","institution_ids":["https://openalex.org/I37987034"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110005584","display_name":"Jun Huang","orcid":"https://orcid.org/0000-0001-6656-7120"},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Junjie Huang","raw_affiliation_strings":["College of Cyber Security, Jinan University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Cyber Security, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000539540","display_name":"Hongkai Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hongkai Liu","raw_affiliation_strings":["College of Cyber Security, Jinan University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Cyber Security, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5128177710","display_name":"Jia-Nan Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I2799850029","display_name":"Dongguan University of Technology","ror":"https://ror.org/01m8p7q42","country_code":"CN","type":"education","lineage":["https://openalex.org/I2799850029"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jia-Nan Liu","raw_affiliation_strings":["School of Computer Science and Technology, Dongguan University of Technology, Dongguan, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Dongguan University of Technology, Dongguan, China","institution_ids":["https://openalex.org/I2799850029"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100608591","display_name":"Zhiquan Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhiquan Liu","raw_affiliation_strings":["College of Cyber Security, Jinan University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Cyber Security, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5121828128","display_name":"Jiasi Weng","orcid":null},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]},{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I37987034"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiasi Weng","raw_affiliation_strings":["College of Cyber Security, Jinan University, Guangzhou, China","Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Cyber Security, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]},{"raw_affiliation_string":"Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China","institution_ids":["https://openalex.org/I37987034"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5080671333"],"corresponding_institution_ids":["https://openalex.org/I159948400"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.62097658,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"21","issue":null,"first_page":"3123","last_page":"3136"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.34689998626708984,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.34689998626708984,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.13259999454021454,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.12530000507831573,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.4733999967575073},{"id":"https://openalex.org/keywords/data-access","display_name":"Data access","score":0.39079999923706055},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.36489999294281006},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.33980000019073486},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.3296999931335449},{"id":"https://openalex.org/keywords/data-modeling","display_name":"Data modeling","score":0.30399999022483826}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8306000232696533},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.4733999967575073},{"id":"https://openalex.org/C47487241","wikidata":"https://www.wikidata.org/wiki/Q5227230","display_name":"Data access","level":2,"score":0.39079999923706055},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3806000053882599},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.36489999294281006},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.33980000019073486},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.3296999931335449},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.30970001220703125},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.30399999022483826},{"id":"https://openalex.org/C17500928","wikidata":"https://www.wikidata.org/wiki/Q959968","display_name":"Control system","level":2,"score":0.3010999858379364},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.29809999465942383},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.27219998836517334},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.27059999108314514},{"id":"https://openalex.org/C3020028006","wikidata":"https://www.wikidata.org/wiki/Q9158","display_name":"Electronic mail","level":2,"score":0.25360000133514404},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.25029999017715454}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2026.3671063","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2026.3671063","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":44,"referenced_works":["https://openalex.org/W177444027","https://openalex.org/W209244779","https://openalex.org/W1510795740","https://openalex.org/W1520749030","https://openalex.org/W1522101599","https://openalex.org/W1724472458","https://openalex.org/W1853548709","https://openalex.org/W1979120705","https://openalex.org/W2078590992","https://openalex.org/W2106116277","https://openalex.org/W2108072891","https://openalex.org/W2154205416","https://openalex.org/W2184323066","https://openalex.org/W2395093458","https://openalex.org/W2606882085","https://openalex.org/W2613071398","https://openalex.org/W2811460901","https://openalex.org/W2891745995","https://openalex.org/W2952370845","https://openalex.org/W3035024380","https://openalex.org/W3198147790","https://openalex.org/W3199684414","https://openalex.org/W3202486309","https://openalex.org/W4205176191","https://openalex.org/W4206331936","https://openalex.org/W4230713095","https://openalex.org/W4312468793","https://openalex.org/W4313705349","https://openalex.org/W4317928317","https://openalex.org/W4377079727","https://openalex.org/W4386133957","https://openalex.org/W4386322364","https://openalex.org/W4387478956","https://openalex.org/W4387682094","https://openalex.org/W4389495243","https://openalex.org/W4390700182","https://openalex.org/W4391724805","https://openalex.org/W4391877958","https://openalex.org/W4392956768","https://openalex.org/W4396535419","https://openalex.org/W4399526745","https://openalex.org/W4402522045","https://openalex.org/W4406012097","https://openalex.org/W4412939450"],"related_works":[],"abstract_inverted_index":{"Cloud-fog-assisted":[0],"electronic":[1],"health":[2],"record":[3],"(EHR)":[4],"systems":[5],"offer":[6,59],"promising":[7],"solutions":[8],"for":[9,80],"large-scale":[10],"medical":[11],"data":[12,72],"storage":[13],"and":[14,36,47,70,107,119,128,143,152,166],"processing.":[15],"However,":[16],"they":[17],"also":[18],"raise":[19],"critical":[20],"privacy":[21],"concerns,":[22],"particularly":[23],"regarding":[24],"secure":[25],"computation":[26,108],"over":[27,109],"sensitive":[28],"data,":[29],"fine-grained":[30],"bilateral":[31,76,104],"access":[32,77,105],"control,":[33],"dynamic":[34],"revocation,":[35],"decryption":[37,117],"key":[38,126],"exposure.":[39],"Existing":[40],"cryptographic":[41,88],"primitives,":[42],"such":[43],"as":[44],"functional":[45,95],"encryption":[46,96],"matchmaking":[48,94],"encryption,":[49],"address":[50],"some":[51],"of":[52,168],"these":[53],"challenges":[54],"individually":[55],"but":[56],"fail":[57],"to":[58,124],"a":[60,68,86,120],"unified":[61],"solution.":[62],"In":[63,112],"this":[64],"work,":[65],"we":[66],"design":[67],"revocable":[69,92],"privacy-preserving":[71],"computing":[73],"system":[74],"with":[75],"control":[78,106],"(RPDC-BAC)":[79],"cloud-fog-assisted":[81],"EHR":[82],"sharing":[83],"by":[84],"proposing":[85],"novel":[87],"primitive,":[89],"called":[90],"server-aided":[91,121],"attribute-based":[93],"(SR-AB-MFE).":[97],"Specifically,":[98],"the":[99,149,164],"proposed":[100,150],"scheme":[101],"supports":[102],"expressive":[103],"encrypted":[110],"data.":[111],"addition,":[113],"it":[114],"incorporates":[115],"time-evolving":[116],"keys":[118],"revocation":[122],"mechanism":[123],"mitigate":[125],"exposure":[127],"efficiently":[129],"revoke":[130],"users.":[131],"To":[132],"further":[133],"reduce":[134],"receiver-side":[135],"overhead,":[136],"fog":[137],"nodes":[138],"assist":[139],"in":[140],"ciphertext":[141],"authentication":[142],"partial":[144],"decryption.":[145],"We":[146],"formally":[147],"define":[148],"primitive":[151],"prove":[153],"its":[154],"security":[155],"under":[156],"static":[157],"assumptions.":[158],"Finally,":[159],"extensive":[160],"experimental":[161],"results":[162],"demonstrate":[163],"efficiency":[165],"practicality":[167],"our":[169],"design.":[170]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2026-03-06T00:00:00"}
