{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T23:27:52Z","timestamp":1771025272789,"version":"3.50.1"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031965890","type":"print"},{"value":"9783031965906","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-96590-6_9","type":"book-chapter","created":{"date-parts":[[2025,6,23]],"date-time":"2025-06-23T08:58:17Z","timestamp":1750669097000},"page":"156-175","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Enabling Right to\u00a0be Forgotten in\u00a0a\u00a0Collaborative Environment Using Permissioned Blockchains"],"prefix":"10.1007","author":[{"given":"Anand Manojkumar","family":"Parikh","sequence":"first","affiliation":[]},{"given":"Shamik","family":"Sural","sequence":"additional","affiliation":[]},{"given":"Vijayalakshmi","family":"Atluri","sequence":"additional","affiliation":[]},{"given":"Jaideep","family":"Vaidya","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,24]]},"reference":[{"key":"9_CR1","unstructured":"The European Union\u2019s General Data Protection Regulation (GDPR) (2016). https:\/\/gdpr-info.eu\/"},{"key":"9_CR2","unstructured":"California Consumer Privacy Act (CCPA) (2018). https:\/\/cppa.ca.gov\/regulations\/"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Androulaki, E., Barger, A., et\u00a0al.: Hyperledger fabric: a distributed operating system for permissioned blockchains. In: Proceedings of the 13th EuroSys Conference, pp. 1\u201315 (2018)","DOI":"10.1145\/3190508.3190538"},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"Ateniese, G., Magri, B., Venturi, D., Andrade, E.: Redactable blockchain\u2013or\u2013rewriting history in bitcoin and friends. In: Proceedings of the European Symposium on Security and Privacy, pp. 111\u2013126 (2017)","DOI":"10.1109\/EuroSP.2017.37"},{"issue":"3","key":"9_CR5","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1016\/j.icte.2021.08.006","volume":"7","author":"E Balistri","year":"2021","unstructured":"Balistri, E., Casellato, F., Giannelli, C., Stefanelli, C.: BlockHealth: blockchain-based secure and peer-to-peer health information sharing with data protection and right to be forgotten. ICT Express 7(3), 308\u2013315 (2021)","journal-title":"ICT Express"},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Bayle, A., Koscina, M., Manset, D., Perez-Kempner, O.: When blockchain meets the right to be forgotten: technology versus law in the healthcare industry. In: Proceedings of the 2018 IEEE\/WIC\/ACM International Conference on Web Intelligence, pp. 788\u2013792 (2018)","DOI":"10.1109\/WI.2018.00133"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Belen-Saglam, R., Altuncu, E., Lu, Y., Li, S.: A systematic literature review of the tension between the gdpr and public blockchain systems. In: Blockchain: Research and Applications, pp. 1\u201323 (2023)","DOI":"10.1016\/j.bcra.2023.100129"},{"key":"9_CR8","unstructured":"Benet, J.: IPFS - Content Addressed, Versioned, P2P File System (IPFS Whitepaper) (2014)"},{"issue":"4","key":"9_CR9","doi-asserted-by":"publisher","first-page":"3872","DOI":"10.1109\/TNSM.2022.3214279","volume":"19","author":"V Botta","year":"2022","unstructured":"Botta, V., Iovino, V., Visconti, I.: Towards data redaction in bitcoin. IEEE Trans. Netw. Serv. Manag. 19(4), 3872\u20133883 (2022)","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"9_CR10","unstructured":"Buterin, V., et\u00a0al.: A Next-Generation Smart Contract and Decentralized Application Platform (Ethereum Whitepaper) (2013)"},{"key":"9_CR11","unstructured":"Castro, M., Liskov, B., et al.: Practical byzantine fault tolerance. In: OsDI, vol. 99, pp. 173\u2013186 (1999)"},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"Cohen, A., Smith, A., Swanberg, M., Vasudevan, P.N.: Control, confidentiality, and the right to be forgotten. In: Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, pp. 3358\u20133372 (2023)","DOI":"10.1145\/3576915.3616585"},{"key":"9_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.autcon.2021.104001","volume":"133","author":"M Das","year":"2022","unstructured":"Das, M., Tao, X., Liu, Y., Cheng, J.C.: A blockchain-based integrated document management framework for construction applications. Autom. Constr. 133, 104001 (2022)","journal-title":"Autom. Constr."},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"De\u00a0Capitani Di\u00a0Vimercati, S., Foresti, S., Livraga, G., Samarati, P.: Data privacy: definitions and techniques. Int. J. Uncertainty Fuzz. Knowl.-Based Syst. 20(06), 793\u2013817 (2012)","DOI":"10.1142\/S0218488512400247"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Derler, D., Samelin, K., Slamanig, D., Striecks, C.: Fine-Grained and Controlled Rewriting in Blockchains: Chameleon-Hashing Gone Attribute-Based. Cryptology ePrint Archive (2019)","DOI":"10.14722\/ndss.2019.23066"},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"Deuber, D., Magri, B., Thyagarajan, S.A.K.: Redactable blockchain in the permissionless setting. In: Proceedings of the 2019 IEEE Symposium on Security and Privacy (SP), pp. 124\u2013138 (2019)","DOI":"10.1109\/SP.2019.00039"},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"Deutsch, P.: GZIP File Format Specification Version 4.3. Technical report (1996)","DOI":"10.17487\/rfc1952"},{"key":"9_CR18","doi-asserted-by":"crossref","unstructured":"Dutta, R., Das, A., Dey, A., Bhattacharya, S.: Blockchain vs GDPR in collaborative data governance. In: Proceedings of the 17th International Conference on Cooperative Design, Visualization, and Engineering, CDVE 2020, Bangkok, Thailand, pp. 81\u201392 (2020)","DOI":"10.1007\/978-3-030-60816-3_10"},{"key":"9_CR19","doi-asserted-by":"crossref","unstructured":"Gilbert, H., Handschuh, H.: Security analysis of sha-256 and sisters. In: International Workshop on Selected Areas in Cryptography, pp. 175\u2013193 (2003)","DOI":"10.1007\/978-3-540-24654-1_13"},{"key":"9_CR20","unstructured":"Krawczyk, H., Rabin, T.: Chameleon Hashing and Signatures. Cryptology ePrint Archive (1998)"},{"key":"9_CR21","doi-asserted-by":"crossref","unstructured":"Lamport, L.: Paxos Made Simple. ACM SIGACT News (Distributed Computing Column) 32, 4 (Whole Number 121, December 2001), pp. 51\u201358 (2001)","DOI":"10.1145\/568425.568433"},{"key":"9_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101653","volume":"88","author":"I Makhdoom","year":"2020","unstructured":"Makhdoom, I., Zhou, I., Abolhasan, M., Lipman, J., Ni, W.: PrivySharing: a blockchain-based framework for privacy-preserving and secure data sharing in smart cities. Comput. Secur. 88, 101653 (2020)","journal-title":"Comput. Secur."},{"key":"9_CR23","doi-asserted-by":"crossref","unstructured":"Moreno, J., Fernandez, E.B., Fernandez-Medina, E., Serrano, M.A.: Neuralyzer: a security pattern for the right to be forgotten in big data. In: Proceedings of the Conference on Pattern Languages of Programs, pp.\u00a01\u20139 (2018)","DOI":"10.1145\/3361149.3361166"},{"key":"9_CR24","unstructured":"Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System (Bitcoin Whitepaper) (2008)"},{"key":"9_CR25","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1016\/j.compeleceng.2019.03.014","volume":"76","author":"N Nizamuddin","year":"2019","unstructured":"Nizamuddin, N., Salah, K., Azad, M.A., Arshad, J., Rehman, M.: Decentralized document version control using ethereum blockchain and IPFS. Comput. Electr. Eng. 76, 183\u2013197 (2019)","journal-title":"Comput. Electr. Eng."},{"key":"9_CR26","unstructured":"Ongaro, D., Ousterhout, J.: In search of an understandable consensus algorithm. In: Proceedings of the 2014 USENIX Annual Technical Conference, pp. 305\u2013319 (2014)"},{"issue":"4","key":"9_CR27","doi-asserted-by":"publisher","first-page":"1972","DOI":"10.1109\/TETC.2019.2949510","volume":"9","author":"E Politou","year":"2019","unstructured":"Politou, E., Casino, F., Alepis, E., Patsakis, C.: Blockchain mutability: challenges and proposed solutions. IEEE Trans. Emerg. Top. Comput. 9(4), 1972\u20131986 (2019)","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"key":"9_CR28","doi-asserted-by":"crossref","unstructured":"Singh, A., Sural, S., Sengupta, T., Sural, S.: Trusted sharing of autonomous vehicle crash data using enterprise blockchain and IPFS. In: Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure, pp. 11\u201324 (2023)","DOI":"10.1145\/3594556.3594623"},{"key":"9_CR29","doi-asserted-by":"crossref","unstructured":"Steichen, M., Fiz, B., Norvill, R., Shbair, W., State, R.: Blockchain-based, decentralized access control for IPFS. In: Proceedings of the 2018 IEEE International Conference on Blockchain, pp. 1499\u20131506 (2018)","DOI":"10.1109\/Cybermatics_2018.2018.00253"},{"key":"9_CR30","doi-asserted-by":"publisher","unstructured":"Tenorio-Forn\u00e9s, A., Hassan, S., Pav\u00f3n, J.: Open peer-to-peer systems over blockchain and IPFS: an agent oriented framework, pp. 19\u201324 (2018). https:\/\/doi.org\/10.1145\/3211933.3211937","DOI":"10.1145\/3211933.3211937"},{"key":"9_CR31","doi-asserted-by":"crossref","unstructured":"Tian, Y., Li, N., Li, Y., Szalachowski, P., Zhou, J.: Policy-based chameleon hash for blockchain rewriting with black-box accountability. In: Proceedings of the 36th Annual Computer Security Applications Conference, pp. 813\u2013828 (2020)","DOI":"10.1145\/3427228.3427247"},{"key":"9_CR32","doi-asserted-by":"crossref","unstructured":"Tomaz, A.E.B., Do\u00a0Nascimento, J.C., Hafid, A.S., De\u00a0Souza, J.N.: Preserving privacy in mobile health systems using non-interactive zero-knowledge proof and blockchain. IEEE Access 8, 204441\u2013204458 (2020)","DOI":"10.1109\/ACCESS.2020.3036811"}],"container-title":["Lecture Notes in Computer Science","Data and Applications Security and Privacy XXXIX"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-96590-6_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,23]],"date-time":"2025-06-23T08:58:25Z","timestamp":1750669105000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-96590-6_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031965890","9783031965906"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-96590-6_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"24 June 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DBSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP Annual Conference on Data and Applications Security and Privacy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Gj\u00f8vik","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Norway","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 June 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 June 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"39","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dbsec2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.ntnu.edu\/web\/dbsec2025\/dbsec2025","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}