{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,16]],"date-time":"2025-05-16T08:48:50Z","timestamp":1747385330517,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":20,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819712731"},{"type":"electronic","value":"9789819712748"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-97-1274-8_25","type":"book-chapter","created":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T19:20:02Z","timestamp":1710271202000},"page":"380-400","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Blockchain-Based Privacy-Preservation Platform for\u00a0Data Storage and\u00a0Query Processing"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4225-2807","authenticated-orcid":false,"given":"Michael","family":"Mireku Kwakye","sequence":"first","affiliation":[]},{"given":"Ken","family":"Barker","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,3,13]]},"reference":[{"key":"25_CR1","doi-asserted-by":"crossref","unstructured":"Zakerzadeh H., Aggarwal, C.C., Barker, K.: Privacy-preserving big data publishing. In: Proceedings of the 27th International Conference on Scientific and Statistical Database Management (SSDBM 2015), La Jolla, CA, USA, pp. 1\u201311 (2015)","DOI":"10.1145\/2791347.2791380"},{"issue":"5","key":"25_CR2","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: a model for protecting privacy. Internat. J. Uncertain. Fuzziness Knowl.-Based Syst. 10(5), 557\u2013570 (2002)","journal-title":"Internat. J. Uncertain. Fuzziness Knowl.-Based Syst."},{"key":"25_CR3","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: l-diversity: privacy beyond k-anonymity. In: 22nd International Conference on Data Engineering, Atlanta, Georgia, USA, p. 24 (2006)","DOI":"10.1109\/ICDE.2006.1"},{"key":"25_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11787006_1","volume-title":"Automata, Languages and Programming","author":"C Dwork","year":"2006","unstructured":"Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1\u201312. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11787006_1"},{"key":"25_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1007\/978-3-540-25955-8_2","volume-title":"Privacy in Statistical Databases","author":"SE Fienberg","year":"2004","unstructured":"Fienberg, S.E., McIntyre, J.: Data swapping: variations on a theme by Dalenius and Reiss. In: Domingo-Ferrer, J., Torra, V. (eds.) PSD 2004. LNCS, vol. 3050, pp. 14\u201329. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-25955-8_2"},{"key":"25_CR6","doi-asserted-by":"crossref","unstructured":"Bawany, N. Z., Shaikh, Z. A.: Data privacy ontology for ubiquitous computing. Int. J. Adv. Comput. Sci. Appl. 8(1) (2017)","DOI":"10.14569\/IJACSA.2017.080120"},{"key":"25_CR7","doi-asserted-by":"crossref","unstructured":"Barth, A., Datta, A., Mitchell, J.C., Nissenbaum, H.: Privacy and contextual integrity: framework and applications. In: IEEE Symposium on Security and Privacy (S &P 2006), pp. 184\u2013198, Berkeley, California, USA (2006)","DOI":"10.1109\/SP.2006.32"},{"key":"25_CR8","unstructured":"Nissenbaum, H.: Privacy in Context - Technology, Policy, and the Integrity of Social Life, pp. 1\u2013288, I\u2013XIV. Stanford University Press (2010). ISBN 978-0-8047-5237-4"},{"issue":"1","key":"25_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2629689","volume":"17","author":"M Jafari","year":"2014","unstructured":"Jafari, M., Safavi-Naini, R., Fong, P.W.L., Barker, K.: A framework for expressing and enforcing purpose-based privacy policies. ACM Trans. Inf. Syst. Secur. 17(1), 1\u201331 (2014)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"25_CR10","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Hippocratic databases. In: 28th International Conference on Very Large Data Bases (VLDB 2002), pp. 143\u2013154, Hong Kong, China (2002)","DOI":"10.1016\/B978-155860869-6\/50021-4"},{"key":"25_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1007\/978-3-642-02843-4_7","volume-title":"Dataspace: The Final Frontier","author":"K Barker","year":"2009","unstructured":"Barker, K., et al.: A data privacy taxonomy. In: Sexton, A.P. (ed.) BNCOD 2009. LNCS, vol. 5588, pp. 42\u201354. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-02843-4_7"},{"key":"25_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-27057-9_1","volume-title":"Big Data Analytics","author":"K Barker","year":"2015","unstructured":"Barker, K.: Privacy protection or data value: can we have both? In: Kumar, N., Bhatnagar, V. (eds.) BDA 2015. LNCS, vol. 9498, pp. 3\u201320. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-27057-9_1"},{"key":"25_CR13","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-981-15-2693-0_1","volume-title":"Advances in Cyber Security","author":"H Baskaran","year":"2020","unstructured":"Baskaran, H., Yussof, S., Rahim, F.A.: A survey on privacy concerns in blockchain applications and current blockchain solutions to preserve data privacy. In: Anbar, M., Abdullah, N., Manickam, S. (eds.) ACeS 2019. CCIS, vol. 1132, pp. 3\u201317. Springer, Singapore (2020). https:\/\/doi.org\/10.1007\/978-981-15-2693-0_1"},{"key":"25_CR14","unstructured":"McConaghy, T., et al.: BigchainDB: a scalable blockchain database. White paper. ascribe GmbH, Berlin, Germany (2016)"},{"issue":"6","key":"25_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TDSC.2021.3110181","volume":"19","author":"F Daidone","year":"2022","unstructured":"Daidone, F., Carminati, B., Ferrari, E.: Blockchain-based privacy enforcement in the IoT domain. IEEE Trans. Dependable Secure Comput. 19(6), 1\u20131 (2022)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"25_CR16","doi-asserted-by":"crossref","unstructured":"Fernandez, M., Jaimunk, J., Thuraisingham, B.: Privacy-preserving architecture for cloud-IoT platforms. In: IEEE International Conference on Web Services (ICWS 2019), Milan, Italy, pp. 11\u201319 (2019)","DOI":"10.1109\/ICWS.2019.00015"},{"issue":"7","key":"25_CR17","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1007\/s10916-018-0982-x","volume":"42","author":"KN Griggs","year":"2018","unstructured":"Griggs, K.N., Ossipova, O., Kohlios, C.P., Baccarini, A.N., Howson, E.A., Hayajneh, T.: Healthcare blockchain system using smart contracts for secure automated remote patient monitoring. J. Med. Syst. 42(7), 130 (2018)","journal-title":"J. Med. Syst."},{"key":"25_CR18","unstructured":"Stanford Center for Biomedical Informatics Research. Prot\u00e9g\u00e9 Semantic Web Ontology. https:\/\/protege.stanford.edu. Accessed 26 Sept 2023"},{"key":"25_CR19","unstructured":"MultiChain Blockchain Platform. https:\/\/www.multichain.com. Accessed 26 Sept 2023"},{"key":"25_CR20","doi-asserted-by":"crossref","unstructured":"Ghosh, S.S., Parmar, H., Shah, P., Samdani, K.: A comprehensive analysis between popular symmetric encryption algorithms. In: 1st International Conference on Data Science & Analytics (IEEE Punecon 2018), Pune, India, pp. 1\u20137 (2018)","DOI":"10.1109\/PUNECON.2018.8745324"}],"container-title":["Communications in Computer and Information Science","Ubiquitous Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-1274-8_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T19:23:53Z","timestamp":1710271433000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-1274-8_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819712731","9789819712748"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-1274-8_25","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"13 March 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"UbiSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Ubiquitous Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Exeter","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 November 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 November 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ubisec2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/hpcn.exeter.ac.uk\/ubisec2023\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"MyReview","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"91","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}