{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T05:18:59Z","timestamp":1775625539198,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":39,"publisher":"Springer Singapore","isbn-type":[{"value":"9789811566332","type":"print"},{"value":"9789811566349","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-6634-9_28","type":"book-chapter","created":{"date-parts":[[2020,7,17]],"date-time":"2020-07-17T14:27:09Z","timestamp":1594996029000},"page":"305-319","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["An Effective Block-Chain Based Authentication Technique for Cloud Based IoT"],"prefix":"10.1007","author":[{"given":"S. Dilli","family":"Babu","sequence":"first","affiliation":[]},{"given":"Rajendra","family":"Pamula","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,7,18]]},"reference":[{"issue":"3","key":"28_CR1","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1007\/s10462-017-9565-3","volume":"51","author":"BA Tama","year":"2017","unstructured":"Tama, B.A., Rhee, K.-H.: Tree-based classifier ensembles for early detection method of diabetes: an exploratory study. Artif. Intell. Rev. 51(3), 355\u2013370 (2017). \nhttps:\/\/doi.org\/10.1007\/s10462-017-9565-3","journal-title":"Artif. Intell. Rev."},{"key":"28_CR2","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/j.jnca.2017.04.002","volume":"88","author":"FA Alaba","year":"2017","unstructured":"Alaba, F.A., et al.: Internet of Things security: a survey. J. Netw. Comput. Appl. 88, 10\u201328 (2017)","journal-title":"J. Netw. Comput. Appl."},{"issue":"2","key":"28_CR3","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1109\/TMSCS.2015.2498605","volume":"1","author":"O Arias","year":"2015","unstructured":"Arias, O., et al.: Privacy and security in internet of things and wearable devices. IEEE Trans. Multi-Scale Comput. Syst. 1(2), 99\u2013109 (2015)","journal-title":"IEEE Trans. Multi-Scale Comput. Syst."},{"issue":"12","key":"28_CR4","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1007\/s10916-014-0136-8","volume":"38","author":"H Arshad","year":"2014","unstructured":"Arshad, H., Nikooghadam, M.: Three-factor anonymous authentication and key agreement scheme for telecare medicine information systems. J. Med. Syst. 38(12), 136 (2014). \nhttps:\/\/doi.org\/10.1007\/s10916-014-0136-8","journal-title":"J. Med. Syst."},{"key":"28_CR5","doi-asserted-by":"crossref","unstructured":"Atamli, A.W., Martin, A.: Threat-based security analysis for the internet of things. In: 2014 International Workshop on Secure Internet of Things (SIoT). IEEE (2014)","DOI":"10.1109\/SIoT.2014.10"},{"issue":"15","key":"28_CR6","doi-asserted-by":"publisher","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","volume":"54","author":"L Atzori","year":"2010","unstructured":"Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54(15), 2787\u20132805 (2010)","journal-title":"Comput. Netw."},{"key":"28_CR7","doi-asserted-by":"crossref","unstructured":"Azaria, A., Ekblaw, A., Vieira, T., Lippman, A.: MedRec: using blockchain for medical data access and permission management. In: International Conference on Open and Big Data (OBD), pp. 25\u201330. IEEE (2016)","DOI":"10.1109\/OBD.2016.11"},{"issue":"1","key":"28_CR8","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/s11277-011-0288-5","volume":"58","author":"D Bandyopadhyay","year":"2011","unstructured":"Bandyopadhyay, D., Sen, J.: Internet of things: applications and challenges in technology and standardization. Wirel. Pers. Commun. 58(1), 49\u201369 (2011). \nhttps:\/\/doi.org\/10.1007\/s11277-011-0288-5","journal-title":"Wirel. Pers. Commun."},{"key":"28_CR9","doi-asserted-by":"publisher","first-page":"684","DOI":"10.1016\/j.future.2015.09.021","volume":"56","author":"A Botta","year":"2016","unstructured":"Botta, A., et al.: Integration of cloud computing and internet of things: a survey. Future Gener. Comput. Syst. 56, 684\u2013700 (2016)","journal-title":"Future Gener. Comput. Syst."},{"key":"28_CR10","doi-asserted-by":"crossref","unstructured":"Botta, A., et al.: On the integration of cloud computing and internet of things. In: 2014 International Conference on Future Internet of Things and Cloud (FiCloud). IEEE (2014)","DOI":"10.1109\/FiCloud.2014.14"},{"key":"28_CR11","doi-asserted-by":"crossref","unstructured":"Boussada, R., et al.: A secure and privacy-preserving solution for IoT over NDN applied to E-health. In: 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC). IEEE (2018)","DOI":"10.1109\/IWCMC.2018.8450374"},{"key":"28_CR12","unstructured":"Cachin, et al.: Blockchain, cryptography, and consensus. IBM Research, June 2017. \nhttps:\/\/www.itu.int\/en\/ITU-T\/Workshops-andSeminars\/201703\/Documents\/Christian%20Cachin%20bl\n\n blockchain-itu.pdf"},{"key":"28_CR13","unstructured":"Chen, H., et al.: SOUPA: standard ontology for ubiquitous and pervasive applications. In: 2004 The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, MOBIQUITOUS 2004. IEEE (2004)"},{"key":"28_CR14","unstructured":"Cognizant Technology Solutions (2017). \nhttps:\/\/www.cognizant.com\/perspectives\/how-blockchain-cantransform-life-insurance-processes"},{"key":"28_CR15","unstructured":"Dias, F.S., et al.: 22nd international symposium on intensive care and emergency medicine. Crit. Care 6(1) (2002)"},{"key":"28_CR16","doi-asserted-by":"publisher","first-page":"761","DOI":"10.1016\/j.future.2017.08.043","volume":"82","author":"AA Diro","year":"2018","unstructured":"Diro, A.A., Chilamkurti, N.: Distributed attack detection scheme using deep learning approach for the Internet of Things. Future Gener. Comput. Syst. 82, 761\u2013768 (2018)","journal-title":"Future Gener. Comput. Syst."},{"issue":"5","key":"28_CR17","doi-asserted-by":"publisher","first-page":"848","DOI":"10.1007\/s11036-017-0851-8","volume":"22","author":"AA Diro","year":"2017","unstructured":"Diro, A.A., Chilamkurti, N., Kumar, N.: Lightweight cybersecurity schemes using elliptic curve cryptography in publish-subscribe fog computing. Mob. Netw. Appl. 22(5), 848\u2013858 (2017). \nhttps:\/\/doi.org\/10.1007\/s11036-017-0851-8","journal-title":"Mob. Netw. Appl."},{"key":"28_CR18","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1007\/978-3-319-60717-7_26","volume-title":"Quality, Reliability, Security and Robustness in Heterogeneous Networks","author":"AA Diro","year":"2017","unstructured":"Diro, A.A., Chilamkurti, N., Veeraraghavan, P.: Elliptic curve based cybersecurity schemes for publish-subscribe internet of things. In: Lee, J.-H., Pack, S. (eds.) QShine 2016. LNICST, vol. 199, pp. 258\u2013268. Springer, Cham (2017). \nhttps:\/\/doi.org\/10.1007\/978-3-319-60717-7_26"},{"issue":"10","key":"28_CR19","doi-asserted-by":"publisher","first-page":"1089","DOI":"10.1002\/sec.219","volume":"4","author":"S Fowler","year":"2011","unstructured":"Fowler, S., Zeadally, S., Chilamkurti, N.: Impact of denial of service solutions on network quality of service. Secur. Commun. Netw. 4(10), 1089\u20131103 (2011)","journal-title":"Secur. Commun. Netw."},{"key":"28_CR20","doi-asserted-by":"crossref","unstructured":"Gollakota, S., et al.: They can hear your heartbeats: non-invasive security for implantable medical devices. ACM SIGCOMM Comput. Commun. Rev. 41(4) (2011)","DOI":"10.1145\/2043164.2018438"},{"issue":"1","key":"28_CR21","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/MPRV.2008.16","volume":"7","author":"D Halperin","year":"2008","unstructured":"Halperin, D., et al.: Security and privacy for implantable medical devices. IEEE Pervasive Comput. 7(1), 30\u201339 (2008)","journal-title":"IEEE Pervasive Comput."},{"issue":"1","key":"28_CR22","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/s00530-013-0346-9","volume":"21","author":"D He","year":"2013","unstructured":"He, D., Kumar, N., Chen, J., Lee, C.-C., Chilamkurti, N., Yeo, S.-S.: Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks. Multimedia Syst. 21(1), 49\u201360 (2013). \nhttps:\/\/doi.org\/10.1007\/s00530-013-0346-9","journal-title":"Multimedia Syst."},{"issue":"3","key":"28_CR23","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1007\/s11277-011-0385-5","volume":"61","author":"T Heer","year":"2011","unstructured":"Heer, T., et al.: Security challenges in the IP-based internet of things. Wirel. Pers. Commun. 61(3), 527\u2013542 (2011). \nhttps:\/\/doi.org\/10.1007\/s11277-011-0385-5","journal-title":"Wirel. Pers. Commun."},{"issue":"15","key":"28_CR24","doi-asserted-by":"publisher","first-page":"2581","DOI":"10.1002\/sec.1488","volume":"9","author":"C-H Hsu","year":"2016","unstructured":"Hsu, C.-H., et al.: Efficient identity authentication and encryption technique for high throughput RFID system. Secur. Commun. Netw. 9(15), 2581\u20132591 (2016)","journal-title":"Secur. Commun. Netw."},{"key":"28_CR25","unstructured":"http:\/\/bitfury.com\/content\/5-whitepapers-research\/public-vs-private-pt1-1.pdf"},{"key":"28_CR26","doi-asserted-by":"crossref","unstructured":"http:\/\/dx.doi.org\/10.1109\/P2P.2013.6688704","DOI":"10.1109\/P2P.2013.6688704"},{"issue":"2","key":"28_CR27","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1108\/10662240910952364","volume":"19","author":"S Hussain","year":"2009","unstructured":"Hussain, S., et al.: An efficient collision-resistant security mechanism for heterogeneous sensor networks. Internet Res. 19(2), 227\u2013245 (2009)","journal-title":"Internet Res."},{"key":"28_CR28","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1016\/j.apenergy.2017.03.039","volume":"195","author":"JJ Sikorski","year":"2017","unstructured":"Sikorski, J.J., Haughton, J., Kraft, M.: Blockchain technology in the chemical industry: machine-to-machine electricity market. Appl. Energy 195, 234\u2013246 (2017)","journal-title":"Appl. Energy"},{"key":"28_CR29","doi-asserted-by":"publisher","first-page":"2292","DOI":"10.1109\/ACCESS.2016.2566339","volume":"4","author":"K Christidis","year":"2016","unstructured":"Christidis, K., Devetsikiotis, M.: Blockchains and smart contracts for the internet of things. IEEE Access 4, 2292\u20132303 (2016)","journal-title":"IEEE Access"},{"key":"28_CR30","unstructured":"Linn, L.A., Koo, M.B.: Blockchain for health data and its potential use in health IT and healthcare-related research"},{"key":"28_CR31","doi-asserted-by":"crossref","unstructured":"Mettler, M.: Blockchain technology in healthcare: the revolution starts here. In: 2016 IEEE 18th International Conference on e-Health Networking, Applications, and Services (Healthcom), pp. 1\u20133. IEEE (2016)","DOI":"10.1109\/HealthCom.2016.7749510"},{"key":"28_CR32","unstructured":"Vasin, P.: Blackcoins proof-of-stake protocol v2 (2014)"},{"issue":"2","key":"28_CR33","doi-asserted-by":"publisher","first-page":"44","DOI":"10.3390\/info8020044","volume":"8","author":"Q Xia","year":"2017","unstructured":"Xia, Q., Sifah, E.B., Smahi, A., Amofa, S., Zhang, X.: BBDS: blockchain-based data sharing for electronic medical records in cloud environments. Information 8(2), 44 (2017)","journal-title":"Information"},{"key":"28_CR34","volume-title":"Distributed Systems: Principles and Paradigms","author":"S Tanenbaum","year":"2007","unstructured":"Tanenbaum, S., Van Steen, M.: Distributed Systems: Principles and Paradigms. Prentice-Hall, Upper Saddle River (2007)"},{"key":"28_CR35","unstructured":"Schwartz, N.Y., Britto, A.: The ripple protocol consensus algorithm, Ripple Labs Inc. White Paper, vol. 5 (2014)"},{"key":"28_CR36","doi-asserted-by":"crossref","unstructured":"Sun, et al.: Block chain-based sharing services: what blockchain technology can contribute to smart cities (2016)","DOI":"10.1186\/s40854-016-0040-y"},{"issue":"4","key":"28_CR37","doi-asserted-by":"publisher","first-page":"983","DOI":"10.1007\/s12083-016-0456-1","volume":"10","author":"Yu Zhang","year":"2016","unstructured":"Zhang, Yu., Wen, J.: The IoT electric business model: using blockchain technology for the internet of things. Peer-to-Peer Netw. Appl. 10(4), 983\u2013994 (2016). \nhttps:\/\/doi.org\/10.1007\/s12083-016-0456-1","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"28_CR38","doi-asserted-by":"crossref","unstructured":"Mukhopadhyay, U., Skjellum, A., Hambolu, O., Oakley, J., Yu, L., Brooks, R.: A brief survey of cryptocurrency systems. In: 2016 14th Annual Conference on Privacy, Security, and Trust (PST), pp. 745\u2013752. IEEE (2016)","DOI":"10.1109\/PST.2016.7906988"},{"key":"28_CR39","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Wen, J.: An IoT electric business model, based on the protocol of bitcoin. In: 2015 18th International Conference on Intelligence in Next Generation Networks (ICIN), pp. 184\u2013191. IEEE (2015)","DOI":"10.1109\/ICIN.2015.7073830"}],"container-title":["Communications in Computer and Information Science","Advances in Computing and Data Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-6634-9_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,17]],"date-time":"2020-07-17T14:38:32Z","timestamp":1594996712000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-6634-9_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9789811566332","9789811566349"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-6634-9_28","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"18 July 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICACDS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advances in Computing and Data Sciences","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Valletta","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Malta","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 April 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 April 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icacds2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/icacds.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"354","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"46","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"13% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}