{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T16:48:58Z","timestamp":1770310138293,"version":"3.49.0"},"reference-count":54,"publisher":"Wiley","issue":"3","license":[{"start":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T00:00:00Z","timestamp":1769212800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"},{"start":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T00:00:00Z","timestamp":1769212800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Concurrency and Computation"],"published-print":{"date-parts":[[2026,2]]},"abstract":"<jats:title>ABSTRACT<\/jats:title>\n                  <jats:p>Privacy\u2010Preserving Data Sharing (PPDS) masks the individual's collected data (e.g., medical healthcare data) before being disseminated by organizations for analysis and research. Patient data contains sensitive values that must be dealt with while ensuring certain privacy conditions are met. This minimizes the risk of re\u2010identification of an individual record from the group of privacy\u2010preserved data. However, with the advancement in technology (i.e., Big Data, the Internet of Things (IoT), and Blockchain), the existing classical privacy\u2010preserving techniques are becoming obsolete. In this paper, we propose a blockchain\u2010based secure data sharing technique named \u201cSecureChain\u201d, which preserves the privacy of an individual record using local differential privacy (LDP). The three distinguished features of the proposed approach are lower latency, higher throughput, and improved privacy. The proposed model outperforms the benchmarks in terms of both latency and throughput. In terms of precision, the proposed method improves the accuracy to 88.53% compared to its counterparts, which achieved 49% and 85% accuracy. The results of the experiment verify that the proposed approach outperforms its counterparts.<\/jats:p>","DOI":"10.1002\/cpe.70473","type":"journal-article","created":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T10:47:48Z","timestamp":1769251668000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["SecureChain: A Blockchain\u2010Based Secure Model for Sharing Privacy\u2010Preserved Data Using Local Differential Privacy"],"prefix":"10.1002","volume":"38","author":[{"given":"Altaf","family":"Hussain","sequence":"first","affiliation":[{"name":"School of Electronic and Control Engineering Chang'an University  Xi'an China"}]},{"given":"Laraib","family":"Javed","sequence":"additional","affiliation":[{"name":"Department of Cyber Security Air University  Islamabad Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9275-8318","authenticated-orcid":false,"given":"Muhammad Inam Ul","family":"Haq","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Bioinformatics Khushal Khan Khattak University Karak  Karak Pakistan"}]},{"given":"Razaullah","family":"Khan","sequence":"additional","affiliation":[{"name":"Department of Computer Science University of Engineering and Technology  Mardan Pakistan"}]},{"given":"Wajahat","family":"Akbar","sequence":"additional","affiliation":[{"name":"School of Electronic and Control Engineering Chang'an University  Xi'an China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9819-7945","authenticated-orcid":false,"given":"Razaz Waheeb","family":"Attar","sequence":"additional","affiliation":[{"name":"Management Department, College of Business Administration Princess Nourah Bint Abdulrahman University  Riyadh Saudi Arabia"}]},{"given":"Ahmed","family":"Alhazmi","sequence":"additional","affiliation":[{"name":"Department of Cybersecurity Umm Al\u2010Qura University  Makkah Saudi Arabia"}]},{"given":"Amal Hassan","family":"Alhazmi","sequence":"additional","affiliation":[{"name":"Management Department, College of Business Administration Princess Nourah Bint Abdulrahman University  Riyadh Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4761-0346","authenticated-orcid":false,"given":"Tariq","family":"Hussain","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, and School of Statistics and Mathematics Zhejiang Gongshang University  Hangzhou China"}]}],"member":"311","published-online":{"date-parts":[[2026,1,24]]},"reference":[{"key":"e_1_2_13_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2024.3444824"},{"key":"e_1_2_13_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.aci.2019.11.005"},{"key":"e_1_2_13_4_1","doi-asserted-by":"publisher","DOI":"10.1111\/exsy.13131"},{"key":"e_1_2_13_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s43995-024-00085-x"},{"key":"e_1_2_13_6_1","doi-asserted-by":"publisher","DOI":"10.69554\/STNB6990"},{"key":"e_1_2_13_7_1","doi-asserted-by":"publisher","DOI":"10.1057\/s41299-021-00121-9"},{"issue":"8","key":"e_1_2_13_8_1","first-page":"199","article-title":"Managing Data Lifecycle Effectively: Best Practices for Data Retention and Archival Processes","volume":"20","author":"Ige A. B.","year":"2024","journal-title":"International Journal of Engineering Research and Development"},{"key":"e_1_2_13_9_1","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.568"},{"key":"e_1_2_13_10_1","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.1255"},{"key":"e_1_2_13_11_1","first-page":"1","volume-title":"Proceedings of the 2021 IEEE 26th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","author":"De Ree M.","year":"2021"},{"key":"e_1_2_13_12_1","doi-asserted-by":"publisher","DOI":"10.1089\/big.2021.0169"},{"key":"e_1_2_13_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3287636"},{"key":"e_1_2_13_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3577926"},{"key":"e_1_2_13_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.matpr.2021.03.083"},{"key":"e_1_2_13_16_1","unstructured":"R.Hu \u201cDealing With Privacy Risk: Solutions to Data Sharing Under the Gdpr for Data Controllers \u201d (Ph.D. Dissertation University of Southampton 2020)."},{"key":"e_1_2_13_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.aej.2023.04.037"},{"key":"e_1_2_13_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-99-1075-5_2"},{"key":"e_1_2_13_19_1","unstructured":"O. J.Akindote A. O.Adegbite S. O.Dawodu A.Omotosho A.Anyanwu andC. P.Maduka \u201cComparative Review of Big Data Analytics and Gis in Healthcare Decision\u2010Making \u201d(2023)."},{"key":"e_1_2_13_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.matpr.2021.07.105"},{"key":"e_1_2_13_21_1","doi-asserted-by":"publisher","DOI":"10.1080\/20479700.2020.1843887"},{"issue":"14","key":"e_1_2_13_22_1","first-page":"11416","article-title":"Blockchain for Healthcare Data Management: Opportunities, Challenges, and Future Recommendations","volume":"34","author":"Yaqoob I.","year":"2021","journal-title":"Neural Computing and Applications"},{"key":"e_1_2_13_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108500"},{"key":"e_1_2_13_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.matpr.2022.04.998"},{"key":"e_1_2_13_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3490237"},{"key":"e_1_2_13_26_1","first-page":"21628","article-title":"Bridging Central and Local Differential Privacy in Data Acquisition Mechanisms","volume":"35","author":"Fallah A.","year":"2022","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_2_13_27_1","doi-asserted-by":"publisher","DOI":"10.1214\/23-AOS2267"},{"key":"e_1_2_13_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2916503"},{"key":"e_1_2_13_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.02.018"},{"key":"e_1_2_13_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2019.04.017"},{"key":"e_1_2_13_31_1","doi-asserted-by":"publisher","DOI":"10.1142\/S021848850200165X"},{"key":"e_1_2_13_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2010.03.020"},{"key":"e_1_2_13_33_1","first-page":"106","volume-title":"2007 IEEE 23rd International Conference on Data Engineering","author":"Li N.","year":"2006"},{"key":"e_1_2_13_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/11787006_1"},{"key":"e_1_2_13_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-37337-5_20"},{"key":"e_1_2_13_36_1","doi-asserted-by":"publisher","DOI":"10.31142\/ijtsrd23780"},{"key":"e_1_2_13_37_1","unstructured":"M.Khan S.Foley andB.O'Sullivan \u201cFrom k\u2010Anonymity to Differential Privacy: A Brief Introduction to Formal Privacy Models \u201d2021."},{"key":"e_1_2_13_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-21373-2_12"},{"issue":"12","key":"e_1_2_13_39_1","first-page":"172","article-title":"A Study on k\u2010Anonymity, l\u2010Diversity, and t\u2010Closeness Techniques","volume":"17","author":"Rajendran K.","year":"2017","journal-title":"IJCSNS"},{"key":"e_1_2_13_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-018-1884-6"},{"key":"e_1_2_13_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2019.09.009"},{"key":"e_1_2_13_42_1","doi-asserted-by":"publisher","DOI":"10.5815\/ijcnis.2015.12.05"},{"key":"e_1_2_13_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376666"},{"key":"e_1_2_13_44_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9050716"},{"key":"e_1_2_13_45_1","doi-asserted-by":"publisher","DOI":"10.4018\/IJHISI.2020070105"},{"key":"e_1_2_13_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3378679.3394533"},{"key":"e_1_2_13_47_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.icte.2018.10.002"},{"key":"e_1_2_13_48_1","doi-asserted-by":"publisher","DOI":"10.3390\/s23156762"},{"issue":"3","key":"e_1_2_13_49_1","first-page":"15017","article-title":"Blockchain in Healthcare: A Patient\u2010Centered Model","volume":"20","author":"Chen H. S.","year":"2019","journal-title":"Biomedical Journal of Scientific & Technical Research"},{"key":"e_1_2_13_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3382769"},{"key":"e_1_2_13_51_1","doi-asserted-by":"publisher","DOI":"10.3390\/s20226587"},{"key":"e_1_2_13_52_1","doi-asserted-by":"publisher","DOI":"10.1080\/23270012.2020.1801529"},{"key":"e_1_2_13_53_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102078"},{"key":"e_1_2_13_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICICICT46008.2019.8993210"},{"key":"e_1_2_13_55_1","doi-asserted-by":"publisher","DOI":"10.1186\/s40854-019-0147-z"}],"container-title":["Concurrency and Computation: Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/cpe.70473","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1002\/cpe.70473","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/cpe.70473","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T03:07:05Z","timestamp":1770260825000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/cpe.70473"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,24]]},"references-count":54,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2026,2]]}},"alternative-id":["10.1002\/cpe.70473"],"URL":"https:\/\/doi.org\/10.1002\/cpe.70473","archive":["Portico"],"relation":{},"ISSN":["1532-0626","1532-0634"],"issn-type":[{"value":"1532-0626","type":"print"},{"value":"1532-0634","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,24]]},"assertion":[{"value":"2025-06-14","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-11-18","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2026-01-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"e70473"}}