{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,8]],"date-time":"2025-05-08T13:03:32Z","timestamp":1746709412458,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031105418"},{"type":"electronic","value":"9783031105425"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-10542-5_3","type":"book-chapter","created":{"date-parts":[[2022,7,22]],"date-time":"2022-07-22T06:03:02Z","timestamp":1658469782000},"page":"31-46","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Systematic Literature Review on\u00a0Data Provenance in\u00a0Internet of\u00a0Things"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4987-7474","authenticated-orcid":false,"given":"Emrullah","family":"Gultekin","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7908-5067","authenticated-orcid":false,"given":"Mehmet S.","family":"Aktas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,23]]},"reference":[{"key":"3_CR1","doi-asserted-by":"publisher","unstructured":"Aktas, M.S., Astekin, M.: Provenance aware run-time verification of things for self-healing Internet of Things applications. Concurrency Computat. Pract. Exper. 31, e4263 (2019). https:\/\/doi.org\/10.1002\/cpe.4263","DOI":"10.1002\/cpe.4263"},{"key":"3_CR2","doi-asserted-by":"publisher","unstructured":"Dundar, B., Astekin, M., Aktas, M.S.: A big data processing framework for self-healing internet of things applications. In: 2016 12th International Conference on Semantics, Knowledge and Grids (SKG), pp. 62\u201368 (2016). https:\/\/doi.org\/10.1109\/SKG.2016.017","DOI":"10.1109\/SKG.2016.017"},{"key":"3_CR3","doi-asserted-by":"publisher","unstructured":"Ming H.C., Sye L.K., Tang, Z.: Secure Data Provenance in Home Energy Monitoring Networks. In: Proceedings of the 3rd Annual Industrial Control System Security Workshop (ICSS 2017), pp. 7\u201314. ACM, New York (2017). https:\/\/doi.org\/10.1145\/3174776.3174778","DOI":"10.1145\/3174776.3174778"},{"key":"3_CR4","doi-asserted-by":"publisher","unstructured":"Elkhodr, M., Alsinglawi, B., Alshehri, M.: Data provenance in the internet of things. In: 2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA), Krakow, pp. 727\u2013731 (2018). https:\/\/doi.org\/10.1109\/WAINA.2018.00175","DOI":"10.1109\/WAINA.2018.00175"},{"key":"3_CR5","doi-asserted-by":"publisher","unstructured":"Kaku, E., Orji, R., Pry, J., Sofranko, K., Lomotey, R., Deters, R.: Privacy Improvement Architecture for IoT. In: 2018 IEEE International Congress on Internet of Things (ICIOT), San Francisco, CA, pp. 148\u2013155 (2018). https:\/\/doi.org\/10.1109\/ICIOT.2018.00028","DOI":"10.1109\/ICIOT.2018.00028"},{"key":"3_CR6","doi-asserted-by":"publisher","unstructured":"Kaku, E., Lomotey, R.K., Deters, R.: Using Provenance and CoAP to track Requests\/Responses in IoT. Proc. Comput. Sci. 94, 144\u2013151 (2016). https:\/\/doi.org\/10.1016\/j.procs.2016.08.023, ISSN 1877\u20130509","DOI":"10.1016\/j.procs.2016.08.023"},{"key":"3_CR7","doi-asserted-by":"publisher","unstructured":"Kamal, M., Tariq, S .: Light-Weight Security and Data Provenance for Multi-Hop Internet of Things. IEEE Access 6, 34439\u201334448 (2018). https:\/\/doi.org\/10.1109\/ACCESS.2018.2850821","DOI":"10.1109\/ACCESS.2018.2850821"},{"key":"3_CR8","doi-asserted-by":"publisher","unstructured":"Nwafor, E., Campbell, A., Hill, D., Bloom, G.: Towards a provenance collection framework for Internet of Things devices. In: 2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld\/SCALCOM\/UIC\/ATC\/CBDCom\/IOP\/SCI), San Francisco, CA, pp. 1\u20136 (2017). https:\/\/doi.org\/10.1109\/UIC-ATC.2017.8397531","DOI":"10.1109\/UIC-ATC.2017.8397531"},{"issue":"2","key":"3_CR9","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1007\/s00779-017-1067-4","volume":"22","author":"T Pasquier","year":"2017","unstructured":"Pasquier, T., Singh, J., Powles, J., Eyers, D., Seltzer, M., Bacon, J.: Data provenance to audit compliance with privacy policy in the Internet of Things. Pers. Ubiquit. Comput. 22(2), 333\u2013344 (2017). https:\/\/doi.org\/10.1007\/s00779-017-1067-4","journal-title":"Pers. Ubiquit. Comput."},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Siddiqui, M.S., Rahman, A., Nadeem, A., Alzahrani, A.M.: Secure data provenance in internet of things based networks by outsourcing attribute based signatures and using bloom filters. Int. J. Adv. Comput. Sci. Appli. (IJACSA) 10(5), 221\u2013226 (2019). http:\/\/dx.doi.org\/10.14569\/IJACSA.2019.0100529","DOI":"10.14569\/IJACSA.2019.0100529"},{"key":"3_CR11","doi-asserted-by":"publisher","unstructured":"de Silva, D.L. Batista, A., Corr\u00eaa, P.L.P.: Data Provenance in Environmental Monitoring. In: 2016 IEEE 13th International Conference on Mobile Ad Hoc and Sensor Systems (MASS), Brasilia, pp. 337\u2013342 (2016). https:\/\/doi.org\/10.1109\/MASS.2016.050","DOI":"10.1109\/MASS.2016.050"},{"issue":"11","key":"3_CR12","doi-asserted-by":"publisher","first-page":"5090","DOI":"10.1109\/TGRS.2013.2266929","volume":"51","author":"S Jensen","year":"2013","unstructured":"Jensen, S., Plale, B., Aktas, M.S., Luo, Y., Chen, P., Conover, H.: Provenance capture and use in a satellite data processing pipeline. IEEE Trans. Geosci. Remote Sens. 51(11), 5090\u20135097 (2013). https:\/\/doi.org\/10.1109\/TGRS.2013.2266929","journal-title":"IEEE Trans. Geosci. Remote Sens."},{"key":"3_CR13","doi-asserted-by":"publisher","unstructured":"Nitschke, P., Williams, S.P.: Conceptualizing the internet of things data supply. Proc. Comput. Sci. 181, 642\u2013649 (2021). https:\/\/doi.org\/10.1016\/j.procs.2021.01.213, ISSN 1877\u20130509","DOI":"10.1016\/j.procs.2021.01.213"},{"issue":"2","key":"3_CR14","doi-asserted-by":"publisher","first-page":"2948","DOI":"10.1109\/JSYST.2020.3000269","volume":"15","author":"MN Aman","year":"2021","unstructured":"Aman, M.N., Basheer, M.H., Sikdar, B.: A lightweight protocol for secure data provenance in the internet of things using wireless fingerprints. IEEE Syst. J. 15(2), 2948\u20132958 (2021). https:\/\/doi.org\/10.1109\/JSYST.2020.3000269","journal-title":"IEEE Syst. J."},{"key":"3_CR15","doi-asserted-by":"publisher","unstructured":"Sigwart, M., Borkowski, M., Peise, M., Schulte, S., Tai, S.: Blockchain-based Data Provenance for the Internet of Things. In: 9th International Conference on the Internet of Things (IoT 2019), Bilbao, Spain, October 22\u201325, 8 pages. ACM, New York (2019). https:\/\/doi.org\/10.1145\/3365871.3365886","DOI":"10.1145\/3365871.3365886"},{"key":"3_CR16","doi-asserted-by":"publisher","unstructured":"Siddiqui, M.S., Syed, T.A., Nadeem, A., Nawaz, W., Albouq, S.S.: BlockTrack-L: a lightweight blockchain-based provenance message tracking in IoT. Int. J. Adv. Comput. Sci. Appli. (IJACSA) 11(4) (2020). https:\/\/doi.org\/10.14569\/IJACSA.2020.0110462","DOI":"10.14569\/IJACSA.2020.0110462"},{"key":"3_CR17","doi-asserted-by":"publisher","unstructured":"Lomotey, R.K., Sofranko, K., Orji, R.: Enhancing privacy in wearable iot through a provenance architecture. Multimodal Technol. Interact. 2, 18 (2018). https:\/\/doi.org\/10.3390\/mti2020018","DOI":"10.3390\/mti2020018"},{"issue":"5","key":"3_CR18","doi-asserted-by":"publisher","first-page":"4061","DOI":"10.1109\/JIOT.2019.2961431","volume":"7","author":"Z Liu","year":"2020","unstructured":"Liu, Z., Wu, Y.: An index-based provenance compression scheme for identifying malicious nodes in multihop IoT network. IEEE Internet Things J. 7(5), 4061\u20134071 (2020). https:\/\/doi.org\/10.1109\/JIOT.2019.2961431","journal-title":"IEEE Internet Things J."},{"key":"3_CR19","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3934","volume":"32","author":"X Rong-na","year":"2021","unstructured":"Rong-na, X., Hui, L., Guo-zhen, S., Yun-chuan, G., Ben, N., Mang, S.: Provenance-based data flow control mechanism for Internet of things. Trans. Emerging Tel. Tech. 32, e3934 (2021). https:\/\/doi.org\/10.1002\/ett.3934","journal-title":"Trans. Emerging Tel. Tech."},{"key":"3_CR20","doi-asserted-by":"publisher","unstructured":"Suhail, S., Hussain, R., Abdellatif, M., Pandey, S.R., Khan, A., Hong, C.S.: Provenance-enabled packet path tracing in the RPL-based internet of things. Comput. Netw. 173, 107189 (2020). https:\/\/doi.org\/10.1016\/j.comnet.2020.107189, ISSN 1389-1286","DOI":"10.1016\/j.comnet.2020.107189"},{"issue":"8","key":"3_CR21","doi-asserted-by":"publisher","first-page":"7564","DOI":"10.1109\/JIOT.2020.2988481","volume":"7","author":"D Liu","year":"2020","unstructured":"Liu, D., Ni, J., Huang, C., Lin, X., Shen, X.S.: Secure and efficient distributed network provenance for IoT: a blockchain-based approach. IEEE Internet Things J. 7(8), 7564\u20137574 (2020). https:\/\/doi.org\/10.1109\/JIOT.2020.2988481","journal-title":"IEEE Internet Things J."},{"issue":"1","key":"3_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-021-00505-y","volume":"8","author":"H Honar Pajooh","year":"2021","unstructured":"Honar Pajooh, H., Rashid, M.A., Alam, F., Demidenko, S.: IoT Big Data provenance scheme using blockchain on Hadoop ecosystem. J. f Big Data 8(1), 1\u201326 (2021). https:\/\/doi.org\/10.1186\/s40537-021-00505-y","journal-title":"J. f Big Data"},{"issue":"4","key":"3_CR23","doi-asserted-by":"publisher","first-page":"2821","DOI":"10.1007\/s11277-021-08157-0","volume":"118","author":"S Porkodi","year":"2021","unstructured":"Porkodi, S., Kesavaraja, D.: Secure data provenance in Internet of Things using hybrid attribute based crypt technique. Wireless Pers. Commun. 118(4), 2821\u20132842 (2021). https:\/\/doi.org\/10.1007\/s11277-021-08157-0","journal-title":"Wireless Pers. Commun."},{"key":"3_CR24","doi-asserted-by":"publisher","unstructured":"Baogang, B., Shah, N., Yuhe, B., Amir, A.: Security and provenance for Internet of Health Things: a systematic literature review. J. Soft. Evolution Process 33, e2335 (2021). https:\/\/doi.org\/10.1002\/smr.2335","DOI":"10.1002\/smr.2335"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2022 Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-10542-5_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,22]],"date-time":"2022-07-22T06:04:04Z","timestamp":1658469844000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-10542-5_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031105418","9783031105425"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-10542-5_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"23 July 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCSA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Science and Its Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Malaga","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 July 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 July 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccsa2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/iccsa.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"CyberChair 4","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"279","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"57","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.6","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8.7","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"285 Workshop submission accepted out of 815 submissions","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}