{"id":"https://openalex.org/W4387490290","doi":"https://doi.org/10.1109/tmc.2023.3323305","title":"CBDDS: Secure and Revocable Cache-Based Distributed Data Sharing for Vehicular Networks","display_name":"CBDDS: Secure and Revocable Cache-Based Distributed Data Sharing for Vehicular Networks","publication_year":2023,"publication_date":"2023-10-10","ids":{"openalex":"https://openalex.org/W4387490290","doi":"https://doi.org/10.1109/tmc.2023.3323305"},"language":"en","primary_location":{"id":"doi:10.1109/tmc.2023.3323305","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tmc.2023.3323305","pdf_url":null,"source":{"id":"https://openalex.org/S69141925","display_name":"IEEE Transactions on Mobile Computing","issn_l":"1536-1233","issn":["1536-1233","1558-0660","2161-9875"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Mobile Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100701249","display_name":"Jing Zhang","orcid":"https://orcid.org/0000-0001-7417-9689"},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jing Zhang","raw_affiliation_strings":["Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, Anhui University, Hefei, China","Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]},{"raw_affiliation_string":"Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101732810","display_name":"Xinzhong Liu","orcid":"https://orcid.org/0009-0006-9677-0318"},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xinzhong Liu","raw_affiliation_strings":["Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, Anhui University, Hefei, China","Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]},{"raw_affiliation_string":"Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081525426","display_name":"Jie Cui","orcid":"https://orcid.org/0000-0001-7258-3418"},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jie Cui","raw_affiliation_strings":["Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, Anhui University, Hefei, China","Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]},{"raw_affiliation_string":"Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016260066","display_name":"Hong Zhong","orcid":"https://orcid.org/0000-0002-0392-9734"},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hong Zhong","raw_affiliation_strings":["Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, Anhui University, Hefei, China","Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]},{"raw_affiliation_string":"Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017473428","display_name":"Lu Wei","orcid":"https://orcid.org/0000-0003-3386-609X"},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lu Wei","raw_affiliation_strings":["Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, Anhui University, Hefei, China","Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]},{"raw_affiliation_string":"Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081831339","display_name":"Irina Bolodurina","orcid":"https://orcid.org/0000-0003-0096-2587"},"institutions":[{"id":"https://openalex.org/I196486018","display_name":"Orenburg State University","ror":"https://ror.org/05b0f8e85","country_code":"RU","type":"education","lineage":["https://openalex.org/I196486018"]}],"countries":["RU"],"is_corresponding":false,"raw_author_name":"Irina Bolodurina","raw_affiliation_strings":["Faculty of Mathematics and Information Technologies, Orenburg State University, Orenburg, Russia"],"affiliations":[{"raw_affiliation_string":"Faculty of Mathematics and Information Technologies, Orenburg State University, Orenburg, Russia","institution_ids":["https://openalex.org/I196486018"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025668908","display_name":"Debiao He","orcid":"https://orcid.org/0000-0002-2446-7436"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Debiao He","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, Hubei, China","Shanghai Key Laboratory of Privacy Preserving Computation, MatrixElements Technologies, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, Hubei, China","institution_ids":["https://openalex.org/I37461747"]},{"raw_affiliation_string":"Shanghai Key Laboratory of Privacy Preserving Computation, MatrixElements Technologies, Shanghai, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5100701249"],"corresponding_institution_ids":["https://openalex.org/I143868143"],"apc_list":null,"apc_paid":null,"fwci":1.3917,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.85184563,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":98},"biblio":{"volume":"23","issue":"6","first_page":"6579","last_page":"6591"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9951000213623047,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8273955583572388},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.634585976600647},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6340962052345276},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5342378616333008},{"id":"https://openalex.org/keywords/cache","display_name":"Cache","score":0.5274384617805481},{"id":"https://openalex.org/keywords/vehicular-ad-hoc-network","display_name":"Vehicular ad hoc network","score":0.5250387191772461},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4844081997871399},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.47997236251831055},{"id":"https://openalex.org/keywords/authentication-server","display_name":"Authentication server","score":0.471757709980011},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.45513641834259033},{"id":"https://openalex.org/keywords/security-token","display_name":"Security token","score":0.42225849628448486},{"id":"https://openalex.org/keywords/data-sharing","display_name":"Data sharing","score":0.41405826807022095},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.21608340740203857},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.18289226293563843},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.08681914210319519}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8273955583572388},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.634585976600647},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6340962052345276},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5342378616333008},{"id":"https://openalex.org/C115537543","wikidata":"https://www.wikidata.org/wiki/Q165596","display_name":"Cache","level":2,"score":0.5274384617805481},{"id":"https://openalex.org/C192448918","wikidata":"https://www.wikidata.org/wiki/Q682677","display_name":"Vehicular ad hoc network","level":4,"score":0.5250387191772461},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4844081997871399},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.47997236251831055},{"id":"https://openalex.org/C2777331311","wikidata":"https://www.wikidata.org/wiki/Q784561","display_name":"Authentication server","level":3,"score":0.471757709980011},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.45513641834259033},{"id":"https://openalex.org/C48145219","wikidata":"https://www.wikidata.org/wiki/Q1335365","display_name":"Security token","level":2,"score":0.42225849628448486},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.41405826807022095},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.21608340740203857},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.18289226293563843},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.08681914210319519},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tmc.2023.3323305","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tmc.2023.3323305","pdf_url":null,"source":{"id":"https://openalex.org/S69141925","display_name":"IEEE Transactions on Mobile Computing","issn_l":"1536-1233","issn":["1536-1233","1558-0660","2161-9875"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Mobile Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.47999998927116394,"id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G1765855239","display_name":null,"funder_award_id":"62202008","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2892304349","display_name":null,"funder_award_id":"62302008","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7048866551","display_name":null,"funder_award_id":"ESSCKF 2022-04","funder_id":"https://openalex.org/F4320312071","funder_display_name":"Ministry of Education, Libya"},{"id":"https://openalex.org/G8497496367","display_name":null,"funder_award_id":"62272002","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320312071","display_name":"Ministry of Education, Libya","ror":"https://ror.org/02w030k33"},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W1510795740","https://openalex.org/W1667889362","https://openalex.org/W1967373117","https://openalex.org/W2108072891","https://openalex.org/W2139910984","https://openalex.org/W2562868812","https://openalex.org/W2805084172","https://openalex.org/W2920780305","https://openalex.org/W2969910737","https://openalex.org/W3003267684","https://openalex.org/W3049535205","https://openalex.org/W3088323682","https://openalex.org/W3098526301","https://openalex.org/W3104151607","https://openalex.org/W3127167990","https://openalex.org/W3135344605","https://openalex.org/W3159116648","https://openalex.org/W3159526139","https://openalex.org/W3162001039","https://openalex.org/W3170708168","https://openalex.org/W3172803077","https://openalex.org/W3203005489","https://openalex.org/W3215217041","https://openalex.org/W4206991310","https://openalex.org/W4210541751","https://openalex.org/W4210827399","https://openalex.org/W4225594710","https://openalex.org/W4226059379","https://openalex.org/W4226263707","https://openalex.org/W4285201318","https://openalex.org/W4288064657","https://openalex.org/W4311080956","https://openalex.org/W4312658198","https://openalex.org/W4312729317","https://openalex.org/W4385683283"],"related_works":["https://openalex.org/W4388335561","https://openalex.org/W2970530566","https://openalex.org/W4288261899","https://openalex.org/W4307309205","https://openalex.org/W2967478618","https://openalex.org/W4385009901","https://openalex.org/W4385572700","https://openalex.org/W2997152889","https://openalex.org/W2977639386","https://openalex.org/W3197214447"],"abstract_inverted_index":{"In":[0,63,98],"vehicular":[1,37,84,177],"networks,":[2],"caching":[3],"content":[4,46,116],"on":[5],"an":[6,109],"edge":[7],"server":[8],"(ES)":[9],"is":[10],"a":[11,74,87,153],"popular":[12],"method":[13],"for":[14,83,152],"quickly":[15],"responding":[16],"to":[17,39,43,66,108,114,117,144],"massive":[18],"vehicle":[19,57,135],"service":[20,30,115],"requests,":[21],"reducing":[22],"communication":[23,60,194],"delays,":[24],"and":[25,28,59,69,76,91,103,127,129,163,179,193],"enhancing":[26],"driver":[27],"passenger":[29],"experiences.":[31],"However,":[32],"after":[33],"integrating":[34],"ESs":[35,143],"with":[36],"networks":[38,85,178],"provide":[40],"vehicles":[41,126],"access":[42,113,123],"the":[44,54,132,140,145,150,170,173],"cached":[45],"in":[47],"these":[48],"ESs,":[49,128],"significant":[50],"challenges":[51],"regarding":[52],"protecting":[53],"privacy":[55,133],"of":[56,134,142,156,176],"data":[58,80],"security":[61,68,161,165,174,183],"arise.":[62],"this":[64,99],"study,":[65],"address":[67],"privacy-preserving":[70],"issues,":[71],"we":[72,138,167],"propose":[73],"secure":[75],"revocable":[77],"cache-based":[78],"distributed":[79],"sharing":[81],"scheme":[82,171,187],"wherein":[86],"token":[88],"authentication":[89,102],"mechanism":[90],"multi-authority":[92],"ciphertext-policy":[93],"attribute-based":[94],"encryption":[95],"are":[96,106],"integrated.":[97],"scheme,":[100],"both":[101],"authorization":[104],"capabilities":[105],"delegated":[107],"ES":[110],"while":[111],"restricting":[112],"only":[118],"legal":[119],"vehicles,":[120],"achieving":[121],"proper":[122],"control":[124],"between":[125,191],"effectively":[130],"preserving":[131],"data.":[136],"Moreover,":[137],"attributed":[139],"revocations":[141],"associated":[146],"attribute":[147],"authorities,":[148],"eliminating":[149],"need":[151],"system-wide":[154],"update":[155],"keying":[157],"materials.":[158],"Through":[159],"rigorous":[160],"proofs":[162],"detailed":[164],"analyses,":[166],"demonstrate":[168],"that":[169],"meets":[172],"requirements":[175],"can":[180],"resist":[181],"more":[182],"attacks.":[184],"The":[185],"proposed":[186],"achieves":[188],"better":[189],"balance":[190],"computational":[192],"costs":[195],"than":[196],"related":[197],"schemes.":[198]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":4}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
