{"id":"https://openalex.org/W4311524700","doi":"https://doi.org/10.1186/s13677-022-00375-6","title":"A novel privacy protection scheme for internet of things based on blockchain and privacy set intersection technique","display_name":"A novel privacy protection scheme for internet of things based on blockchain and privacy set intersection technique","publication_year":2022,"publication_date":"2022-12-15","ids":{"openalex":"https://openalex.org/W4311524700","doi":"https://doi.org/10.1186/s13677-022-00375-6"},"language":"en","primary_location":{"id":"doi:10.1186/s13677-022-00375-6","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-022-00375-6","pdf_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-022-00375-6","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-022-00375-6","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5067112477","display_name":"Qian Zhou","orcid":"https://orcid.org/0000-0001-7890-0664"},"institutions":[{"id":"https://openalex.org/I4210136859","display_name":"Xi\u2019an University of Posts and Telecommunications","ror":"https://ror.org/04jn0td46","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210136859"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Qian Zhou","raw_affiliation_strings":["School of Cyberspace Security, Xi\u2019an University of Posts and Telecommunications, Xi\u2019an, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Security, Xi\u2019an University of Posts and Telecommunications, Xi\u2019an, China","institution_ids":["https://openalex.org/I4210136859"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085049261","display_name":"Chengzhe Lai","orcid":"https://orcid.org/0000-0002-4603-3380"},"institutions":[{"id":"https://openalex.org/I4210136859","display_name":"Xi\u2019an University of Posts and Telecommunications","ror":"https://ror.org/04jn0td46","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210136859"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chengzhe Lai","raw_affiliation_strings":["School of Cyberspace Security, Xi\u2019an University of Posts and Telecommunications, Xi\u2019an, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Security, Xi\u2019an University of Posts and Telecommunications, Xi\u2019an, China","institution_ids":["https://openalex.org/I4210136859"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022384266","display_name":"Qili Guo","orcid":null},"institutions":[{"id":"https://openalex.org/I4210136859","display_name":"Xi\u2019an University of Posts and Telecommunications","ror":"https://ror.org/04jn0td46","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210136859"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qili Guo","raw_affiliation_strings":["School of Cyberspace Security, Xi\u2019an University of Posts and Telecommunications, Xi\u2019an, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Security, Xi\u2019an University of Posts and Telecommunications, Xi\u2019an, China","institution_ids":["https://openalex.org/I4210136859"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087705419","display_name":"Haoyan Ma","orcid":"https://orcid.org/0000-0003-2942-917X"},"institutions":[{"id":"https://openalex.org/I4210136859","display_name":"Xi\u2019an University of Posts and Telecommunications","ror":"https://ror.org/04jn0td46","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210136859"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haoyan Ma","raw_affiliation_strings":["School of Cyberspace Security, Xi\u2019an University of Posts and Telecommunications, Xi\u2019an, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Security, Xi\u2019an University of Posts and Telecommunications, Xi\u2019an, China","institution_ids":["https://openalex.org/I4210136859"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5081385202","display_name":"Dong Zheng","orcid":"https://orcid.org/0000-0002-8343-3914"},"institutions":[{"id":"https://openalex.org/I4210136859","display_name":"Xi\u2019an University of Posts and Telecommunications","ror":"https://ror.org/04jn0td46","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210136859"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dong Zheng","raw_affiliation_strings":["School of Cyberspace Security, Xi\u2019an University of Posts and Telecommunications, Xi\u2019an, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Security, Xi\u2019an University of Posts and Telecommunications, Xi\u2019an, China","institution_ids":["https://openalex.org/I4210136859"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5067112477"],"corresponding_institution_ids":["https://openalex.org/I4210136859"],"apc_list":{"value":990,"currency":"GBP","value_usd":1214},"apc_paid":{"value":990,"currency":"GBP","value_usd":1214},"fwci":1.9097,"has_fulltext":true,"cited_by_count":6,"citation_normalized_percentile":{"value":0.89196195,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":"11","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8435112833976746},{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.7130063772201538},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.6118180751800537},{"id":"https://openalex.org/keywords/outsourcing","display_name":"Outsourcing","score":0.5987696051597595},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.5690286755561829},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.567999541759491},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5524590611457825},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5417085886001587},{"id":"https://openalex.org/keywords/privacy-software","display_name":"Privacy software","score":0.5010099411010742},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4988400936126709},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.49814915657043457},{"id":"https://openalex.org/keywords/service-provider","display_name":"Service provider","score":0.4512570798397064},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.44097089767456055},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.37009578943252563},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.23489460349082947}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8435112833976746},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.7130063772201538},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.6118180751800537},{"id":"https://openalex.org/C46934059","wikidata":"https://www.wikidata.org/wiki/Q61515","display_name":"Outsourcing","level":2,"score":0.5987696051597595},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.5690286755561829},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.567999541759491},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5524590611457825},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5417085886001587},{"id":"https://openalex.org/C509729295","wikidata":"https://www.wikidata.org/wiki/Q7246032","display_name":"Privacy software","level":3,"score":0.5010099411010742},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4988400936126709},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.49814915657043457},{"id":"https://openalex.org/C116537","wikidata":"https://www.wikidata.org/wiki/Q2169973","display_name":"Service provider","level":3,"score":0.4512570798397064},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.44097089767456055},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.37009578943252563},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.23489460349082947},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C136264566","wikidata":"https://www.wikidata.org/wiki/Q159810","display_name":"Economy","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s13677-022-00375-6","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-022-00375-6","pdf_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-022-00375-6","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:351570d527de4b6cb357a7b82621767e","is_oa":true,"landing_page_url":"https://doaj.org/article/351570d527de4b6cb357a7b82621767e","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Cloud Computing: Advances, Systems and Applications, Vol 11, Iss 1, Pp 1-13 (2022)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s13677-022-00375-6","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-022-00375-6","pdf_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-022-00375-6","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/14","score":0.5699999928474426,"display_name":"Life below water"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4311524700.pdf","grobid_xml":"https://content.openalex.org/works/W4311524700.grobid-xml"},"referenced_works_count":28,"referenced_works":["https://openalex.org/W780859780","https://openalex.org/W1485216661","https://openalex.org/W1570296326","https://openalex.org/W1866535025","https://openalex.org/W2004957971","https://openalex.org/W2090334701","https://openalex.org/W2123845384","https://openalex.org/W2129550671","https://openalex.org/W2132172731","https://openalex.org/W2143087446","https://openalex.org/W2340029014","https://openalex.org/W2612145958","https://openalex.org/W2724474800","https://openalex.org/W2766393794","https://openalex.org/W2782492233","https://openalex.org/W2801705091","https://openalex.org/W2805986192","https://openalex.org/W2887461714","https://openalex.org/W2909425366","https://openalex.org/W3006496992","https://openalex.org/W3036749975","https://openalex.org/W3137846090","https://openalex.org/W3161030785","https://openalex.org/W3203183630","https://openalex.org/W3214755690","https://openalex.org/W4226263557","https://openalex.org/W4236472748","https://openalex.org/W4251674497"],"related_works":["https://openalex.org/W4210406818","https://openalex.org/W4306779889","https://openalex.org/W4386732777","https://openalex.org/W3211706803","https://openalex.org/W4382775358","https://openalex.org/W4246942721","https://openalex.org/W3209862047","https://openalex.org/W4304136894","https://openalex.org/W2989851257","https://openalex.org/W2799059781"],"abstract_inverted_index":{"Abstract":[0],"In":[1,42],"the":[2,82,96,101,108,115,120,127,133,138,143],"era":[3],"of":[4,9,14,28,34,103,137],"big":[5],"data,":[6],"an":[7],"ocean":[8],"data":[10,29,65,87,104,110,129],"generated":[11],"by":[12,23,54,106],"Internet":[13],"Things":[15],"(IoT)":[16],"devices":[17],"will":[18],"be":[19],"analyzed":[20],"and":[21,60,93,130,135,149,159],"processed":[22],"cloud":[24],"computing.":[25],"However,":[26],"outsourcing":[27],"can":[30,99,131],"lead":[31],"to":[32,37,63,85],"leakage":[33],"user":[35],"privacy":[36,56,136],"those":[38],"unreliable":[39],"service":[40],"providers.":[41],"this":[43],"paper,":[44],"we":[45,141],"propose":[46],"a":[47,68,112],"novel":[48],"privacy-preserving":[49],"scheme":[50,98,121,153],"for":[51],"IoT":[52],"device":[53],"employing":[55],"set":[57,83],"intersection":[58],"(PSI)":[59],"blockchain":[61,91],"technique":[62,72],"achieve":[64],"privacy.":[66,88],"First,":[67],"homomorphic":[69],"encryption":[70],"PSI":[71],"based":[73],"on":[74,111],"0-1":[75],"encoding":[76],"is":[77],"proposed,":[78],"which":[79],"well":[80,155],"hides":[81],"base":[84],"ensure":[86,132],"Second,":[89],"combining":[90],"structure":[92],"smart":[94],"contract,":[95],"proposed":[97],"improve":[100],"efficiency":[102],"sharing":[105],"storing":[107],"shared":[109],"blockchain.":[113],"Third,":[114],"security":[116,134],"analysis":[117],"shows":[118],"that":[119,151],"has":[122],"extremely":[123],"high":[124],"control":[125],"over":[126],"individual":[128],"data.":[139],"Finally,":[140],"compare":[142],"functionality":[144],"with":[145,156],"other":[146],"relevant":[147],"schemes":[148],"demonstrate":[150],"our":[152],"functions":[154],"low":[157],"communication":[158],"computational":[160],"overhead.":[161]},"counts_by_year":[{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
