{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T18:41:40Z","timestamp":1772822500245,"version":"3.50.1"},"publisher-location":"Cham","reference-count":42,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031651717","type":"print"},{"value":"9783031651724","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-65172-4_19","type":"book-chapter","created":{"date-parts":[[2024,7,12]],"date-time":"2024-07-12T12:02:41Z","timestamp":1720785761000},"page":"301-319","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Incentivized Federated Learning with\u00a0Local Differential Privacy Using Permissioned Blockchains"],"prefix":"10.1007","author":[{"given":"Saptarshi","family":"De Chaudhury","sequence":"first","affiliation":[]},{"given":"Likhith","family":"Reddy","sequence":"additional","affiliation":[]},{"given":"Matta","family":"Varun","sequence":"additional","affiliation":[]},{"given":"Tirthankar","family":"Sengupta","sequence":"additional","affiliation":[]},{"given":"Sandip","family":"Chakraborty","sequence":"additional","affiliation":[]},{"given":"Shamik","family":"Sural","sequence":"additional","affiliation":[]},{"given":"Jaideep","family":"Vaidya","sequence":"additional","affiliation":[]},{"given":"Vijayalakshmi","family":"Atluri","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,13]]},"reference":[{"key":"19_CR1","doi-asserted-by":"crossref","unstructured":"Abadi, M., et\u00a0al.: Deep learning with differential privacy. In: Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, pp. 308\u2014318 (2016)","DOI":"10.1145\/2976749.2978318"},{"key":"19_CR2","doi-asserted-by":"crossref","unstructured":"Akhil\u00a0Vasishta, M.V., Palanisamy, B., Sural, S.: Decentralized authorization using hyperledger fabric. In: IEEE International Conference on Blockchain (Blockchain), pp. 238\u2013243 (2022)","DOI":"10.1109\/Blockchain55522.2022.00040"},{"key":"19_CR3","doi-asserted-by":"crossref","unstructured":"Androulaki, E., et\u00a0al.: Hyperledger fabric: a distributed operating system for permissioned blockchains. In: Proceedings of the Thirteenth EuroSys Conference, pp. 1\u201315 (2018)","DOI":"10.1145\/3190508.3190538"},{"key":"19_CR4","unstructured":"Bagdasaryan, E., et\u00a0al.: How to backdoor federated learning. In: Proceedings of the Twenty Third International Conference on Artificial Intelligence and Statistics, pp. 2938\u20132948 (2020)"},{"key":"19_CR5","unstructured":"Bhowmick, A., Duchi, J., Freudiger, J., Kapoor, G., Rogers, R.: Protection against reconstruction and its applications in private federated learning. arXiv preprint arXiv:1812.00984 (2018)"},{"key":"19_CR6","first-page":"374","volume":"1","author":"K Bonawitz","year":"2019","unstructured":"Bonawitz, K., et al.: Towards federated learning at scale: system design. Proc. Mach. Learn. Syst. 1, 374\u2013388 (2019)","journal-title":"Proc. Mach. Learn. Syst."},{"key":"19_CR7","doi-asserted-by":"crossref","unstructured":"Chakraborty, S., Chakraborty, S.: Proof of federated training: accountable cross-network model training and inference. In: IEEE International Conference on Blockchain and Cryptocurrency, pp.\u00a01\u20139 (2022)","DOI":"10.1109\/ICBC54727.2022.9805548"},{"key":"19_CR8","doi-asserted-by":"crossref","unstructured":"Chamikara, M.A.P., et\u00a0al.: Local differential privacy for federated learning. In: European Symposium on Research in Computer Security, pp. 195\u2013216 (2022)","DOI":"10.1007\/978-3-031-17140-6_10"},{"key":"19_CR9","doi-asserted-by":"crossref","unstructured":"Cormode, G., et\u00a0al.: Privacy at scale: local differential privacy in practice. In: International Conference on Management of Data, pp. 1655\u20131658 (2018)","DOI":"10.1145\/3183713.3197390"},{"key":"19_CR10","doi-asserted-by":"crossref","unstructured":"Desai, H.B., Ozdayi, M.S., Kantarcioglu, M.: BlockFLA: accountable federated learning via hybrid blockchain architecture. In: Eleventh ACM Conference on Data and Application Security and Privacy, pp. 101\u2013112 (2021)","DOI":"10.1145\/3422337.3447837"},{"key":"19_CR11","doi-asserted-by":"crossref","unstructured":"Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Theory of Cryptography, pp. 265\u2013284 (2006)","DOI":"10.1007\/11681878_14"},{"key":"19_CR12","first-page":"2214","volume":"67","author":"Y Gu","year":"2022","unstructured":"Gu, Y., Bai, Y., Xu, S.: CS-MIA: membership inference attack based on prediction confidence series in federated learning. J. Inf. Secur. Appl. 67, 2214\u20132226 (2022)","journal-title":"J. Inf. Secur. Appl."},{"key":"19_CR13","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1186\/s13677-022-00294-6","volume":"11","author":"T Hai","year":"2022","unstructured":"Hai, T., et al.: BVFLEMR: an integrated federated learning and blockchain technology for cloud-based medical records recommendation system. J. Cloud Comput. 11, 22 (2022)","journal-title":"J. Cloud Comput."},{"key":"19_CR14","doi-asserted-by":"crossref","unstructured":"Hao, M., et\u00a0al.: Towards efficient and privacy-preserving federated deep learning. In: IEEE International Conference on Communications, pp.\u00a01\u20136 (2019)","DOI":"10.1109\/ICC.2019.8761267"},{"key":"19_CR15","unstructured":"Hard, A., et al.: Federated learning for mobile keyboard prediction. ArXiv, vol. 1, pp. 1\u201312 (2018)"},{"issue":"9","key":"19_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3560816","volume":"55","author":"W Issa","year":"2023","unstructured":"Issa, W., et al.: Blockchain-based federated learning for securing internet of things: a comprehensive survey. ACM Comput. Surv. 55(9), 1\u201343 (2023)","journal-title":"ACM Comput. Surv."},{"key":"19_CR17","doi-asserted-by":"crossref","unstructured":"Khan, J.A., Wang, W., Ozbay, K.: FLOATING: federated learning for optimized automated trajectory information storing on blockchain. In: IEEE International Conference on Blockchain and Cryptocurrency, pp.\u00a01\u20134 (2023)","DOI":"10.1109\/ICBC56567.2023.10174956"},{"key":"19_CR18","unstructured":"Kong, S., Li, Y., Zhou, H.: Incentivizing federated learning. arXiv preprint arXiv:cs.cv (2022)"},{"issue":"11","key":"19_CR19","doi-asserted-by":"publisher","first-page":"2278","DOI":"10.1109\/5.726791","volume":"86","author":"Y LeCun","year":"1998","unstructured":"LeCun, Y., Bottou, L., Bengio, Y., Haffner, P.: Gradient-based learning applied to document recognition. Proc. IEEE 86(11), 2278\u20132324 (1998)","journal-title":"Proc. IEEE"},{"key":"19_CR20","doi-asserted-by":"crossref","unstructured":"Li, W., et\u00a0al.: Privacy-preserving federated brain tumour segmentation. In: Machine Learning in Medical Imaging, pp. 133\u2013141 (2019)","DOI":"10.1007\/978-3-030-32692-0_16"},{"issue":"1","key":"19_CR21","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1109\/MNET.011.2000263","volume":"35","author":"Y Li","year":"2020","unstructured":"Li, Y., et al.: A blockchain-based decentralized federated learning framework with committee consensus. IEEE Network 35(1), 234\u2013241 (2020)","journal-title":"IEEE Network"},{"issue":"4","key":"19_CR22","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MWC.01.1900525","volume":"27","author":"Y Liu","year":"2020","unstructured":"Liu, Y., et al.: A secure federated learning framework for 5G networks. IEEE Wirel. Commun. 27(4), 24\u201331 (2020)","journal-title":"IEEE Wirel. Commun."},{"key":"19_CR23","doi-asserted-by":"crossref","unstructured":"Liu, Y., et\u00a0al.: Fedcoin: a peer-to-peer payment system for federated learning. In: Federated Learning: Privacy and Incentive, pp. 125\u2013138 (2020)","DOI":"10.1007\/978-3-030-63076-8_9"},{"issue":"3","key":"19_CR24","doi-asserted-by":"publisher","first-page":"2134","DOI":"10.1109\/TII.2019.2942179","volume":"16","author":"Y Lu","year":"2020","unstructured":"Lu, Y., et al.: Differentially private asynchronous federated learning for mobile edge computing in urban informatics. IEEE Trans. Industr. Inf. 16(3), 2134\u20132143 (2020)","journal-title":"IEEE Trans. Industr. Inf."},{"key":"19_CR25","unstructured":"McMahan, B., et\u00a0al.: Communication-efficient learning of deep networks from decentralized data. In: 20th International Conference on Artificial Intelligence and Statistics, pp. 1273\u20131282 (2017)"},{"key":"19_CR26","doi-asserted-by":"crossref","unstructured":"Meese, C., et\u00a0al.: BFRT: blockchained federated learning for real-time traffic flow prediction. In: 22nd IEEE International Symposium on Cluster, Cloud and Internet Computing, pp. 317\u2013326 (2022)","DOI":"10.1109\/CCGrid54584.2022.00041"},{"key":"19_CR27","doi-asserted-by":"crossref","unstructured":"Naseri, M., Hayes, J., Cristofaro, E.D.: Local and central differential privacy for robustness and privacy in federated learning. In: Network and Distributed Systems Security Symposium, pp. 1\u201318 (2022)","DOI":"10.14722\/ndss.2022.23054"},{"key":"19_CR28","doi-asserted-by":"crossref","unstructured":"Nguyen, T., et\u00a0al.: Blockchain-based secure client selection in federated learning. In: IEEE International Conference on Blockchain and Cryptocurrency, pp.\u00a01\u20139 (2022)","DOI":"10.1109\/ICBC54727.2022.9805521"},{"key":"19_CR29","doi-asserted-by":"crossref","unstructured":"Ouyang, L., et al.: Artificial identification: a novel privacy framework for federated learning based on blockchain. IEEE Trans. Comput. Soc. Syst. 10(6), 3576-2585 (2023)","DOI":"10.1109\/TCSS.2022.3226861"},{"key":"19_CR30","doi-asserted-by":"crossref","unstructured":"Padala, M., Damle, S., Gujar, S.: Federated learning meets fairness and differential privacy. In: Neural Information Processing, pp. 692\u2013699 (2021)","DOI":"10.1007\/978-3-030-92310-5_80"},{"issue":"8","key":"19_CR31","doi-asserted-by":"publisher","first-page":"4734","DOI":"10.1109\/TCOMM.2020.2990686","volume":"68","author":"SR Pokhrel","year":"2020","unstructured":"Pokhrel, S.R., Choi, J.: Federated learning with blockchain for autonomous vehicles: analysis and design challenges. IEEE Trans. Commun. 68(8), 4734\u20134746 (2020)","journal-title":"IEEE Trans. Commun."},{"key":"19_CR32","doi-asserted-by":"crossref","unstructured":"Sattler, F., Wiedemann, S., M\u00fcller, K.R., Samek, W.: Robust and communication-efficient federated learning from non-i.i.d. data. IEEE Trans. Neural Netw. Learn. Syst. 31(9), 3400\u20133413 (2020)","DOI":"10.1109\/TNNLS.2019.2944481"},{"key":"19_CR33","doi-asserted-by":"crossref","unstructured":"Sun, L., Qian, J., Chen, X.: LDP-FL: practical private aggregation in federated learning with local differential privacy. In: Thirtieth International Joint Conference on Artificial Intelligence, pp. 1571\u20131578 (2021)","DOI":"10.24963\/ijcai.2021\/217"},{"key":"19_CR34","doi-asserted-by":"crossref","unstructured":"Triastcyn, A., Faltings, B.: Federated learning with Bayesian differential privacy. In: IEEE International Conference on Big Data, pp. 2587\u20132596 (2019)","DOI":"10.1109\/BigData47090.2019.9005465"},{"key":"19_CR35","doi-asserted-by":"crossref","unstructured":"Truex, S., et\u00a0al.: LDP-fed: federated learning with local differential privacy. In: Third ACM International Workshop on Edge Systems, Analytics and Networking, pp. 61\u201366 (2020)","DOI":"10.1145\/3378679.3394533"},{"key":"19_CR36","unstructured":"Wang, Z., Hu, Q.: Blockchain-based federated learning: a comprehensive survey. arXiv preprint arXiv:2110.02182 (2021)"},{"key":"19_CR37","doi-asserted-by":"publisher","first-page":"3454","DOI":"10.1109\/TIFS.2020.2988575","volume":"15","author":"K Wei","year":"2020","unstructured":"Wei, K., et al.: Federated learning with differential privacy: algorithms and performance analysis. IEEE Trans. Inf. Forensics Secur. 15, 3454\u20133469 (2020)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"4","key":"19_CR38","doi-asserted-by":"publisher","first-page":"3642","DOI":"10.1109\/JIOT.2022.3231363","volume":"10","author":"L Witt","year":"2023","unstructured":"Witt, L., et al.: Decentral and incentivized federated learning frameworks: a systematic literature review. IEEE Internet Things J. 10(4), 3642\u20133663 (2023)","journal-title":"IEEE Internet Things J."},{"issue":"10","key":"19_CR39","doi-asserted-by":"publisher","first-page":"6927","DOI":"10.1109\/TII.2021.3134257","volume":"18","author":"Y Xu","year":"2022","unstructured":"Xu, Y., et al.: Incentive mechanism for differentially private federated learning in industrial internet of things. IEEE Trans. Industr. Inf. 18(10), 6927\u20136939 (2022)","journal-title":"IEEE Trans. Industr. Inf."},{"key":"19_CR40","unstructured":"Yang, M., et\u00a0al.: Local differential privacy and its applications: a comprehensive survey. arXiv preprint arXiv:2008.03686 (2020)"},{"issue":"2","key":"19_CR41","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3298981","volume":"10","author":"Q Yang","year":"2019","unstructured":"Yang, Q., Liu, Y., Chen, T., Tong, Y.: Federated machine learning: concept and applications. ACM Trans. Intell. Syst. Technol. 10(2), 1\u201319 (2019)","journal-title":"ACM Trans. Intell. Syst. Technol."},{"issue":"11","key":"19_CR42","doi-asserted-by":"publisher","first-page":"8836","DOI":"10.1109\/JIOT.2020.3037194","volume":"8","author":"Y Zhao","year":"2020","unstructured":"Zhao, Y., et al.: Local differential privacy-based federated learning for internet of things. IEEE Internet Things J. 8(11), 8836\u20138853 (2020)","journal-title":"IEEE Internet Things J."}],"container-title":["Lecture Notes in Computer Science","Data and Applications Security and Privacy XXXVIII"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-65172-4_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,12]],"date-time":"2024-07-12T12:07:12Z","timestamp":1720786032000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-65172-4_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031651717","9783031651724"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-65172-4_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"13 July 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DBSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP Annual Conference on Data and Applications Security and Privacy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"San Jose, CA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 July 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"38","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dbsec2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.dbsec2024.unimol.it\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}