{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T22:23:30Z","timestamp":1773786210926,"version":"3.50.1"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2024,1,26]],"date-time":"2024-01-26T00:00:00Z","timestamp":1706227200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,26]],"date-time":"2024-01-26T00:00:00Z","timestamp":1706227200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Computing"],"published-print":{"date-parts":[[2024,3]]},"DOI":"10.1007\/s00607-023-01253-y","type":"journal-article","created":{"date-parts":[[2024,1,26]],"date-time":"2024-01-26T17:02:13Z","timestamp":1706288533000},"page":"939-960","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["TEDA: a trusted execution environment-and-blockchain-based data protection architecture for Internet of Things"],"prefix":"10.1007","volume":"106","author":[{"given":"Hui","family":"Xie","sequence":"first","affiliation":[]},{"given":"Jun","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Zhengyuan","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Shengjun","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Changzhen","family":"Hu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,26]]},"reference":[{"key":"1253_CR1","unstructured":"He W, Golla M, Padhi R, Ofek J, Durmuth M, Fernandes E, Ur B (2018) Rethinking access control and authentication for the home internet of things (iot). USENIX, 255\u2013272"},{"key":"1253_CR2","doi-asserted-by":"crossref","unstructured":"Zhang S, Rong J, Wang B (2020) A privacy protection scheme of smart meter for decentralized smart home environment based on consortium blockchain. Electr Power Energy Syste 1\u201310","DOI":"10.1016\/j.ijepes.2020.106140"},{"key":"1253_CR3","unstructured":"Zhang B, Mor N, Kolb J, Chan DS, Goyal N (2015) The cloud is not enough: saving iot from the cloud. In: Proceedings of the 7th USENIX Conference on Hot Topics in Cloud ComputingJuly"},{"key":"1253_CR4","doi-asserted-by":"crossref","unstructured":"Orenbach M, Lifshits P, Minkin M, Silberstein M (2017) Eleos: exitless os services for sgx enclaves. The Twelfth European Conference, pp 238\u2013253","DOI":"10.1145\/3064176.3064219"},{"key":"1253_CR5","unstructured":"Arnautov S, Trach B, Gregor F, Knauth T, Martin A, Priebe C, Lind J, Muthukumaran D, O\u2019Keeffe D, Stillwell ML, Goltzsche D, Eyers D, Kapitza R, Pietzuch P, Fetzer C (2016) Scone: secure linux containers with intel sgx. USENIX, pp 689\u2013703"},{"key":"1253_CR6","doi-asserted-by":"crossref","unstructured":"Kim T, Park J, Woo J, Jeon S, Huh J (2019) Shieldstore: shielded in-memory key-value storage with sgx. In: Proceedings of the 14th EuroSys Conference 2019","DOI":"10.1145\/3302424.3303951"},{"key":"1253_CR7","unstructured":"Bailleu M, Thalheim J, Bhatotia P, Fetzer C, Honda M, Vaswani K (2019) Speicher: securing lsm-based key-value stores using shielded execution. In: 17th USENIX Conference on File and Storage Technologies (FAST \u201919), pp 173\u2013190"},{"key":"1253_CR8","doi-asserted-by":"crossref","unstructured":"Shen M, Liu H, Zhu L, Xu K, Yu H, Du X, Guizani M (2020) Blockchain-assisted secure device authentication for cross-domain industrial iot. IEEE J Sel Areas Commun 942\u2013954","DOI":"10.1109\/JSAC.2020.2980916"},{"key":"1253_CR9","unstructured":"Hu Y, Kumar S, Popa RA (2020) Ghostor: toward a secure data-sharing system from decentralized trust. In: 17th USENIX symposium on networked systems design and implementation (NSDI \u201920), pp 851\u2013877"},{"key":"1253_CR10","doi-asserted-by":"crossref","unstructured":"Jangirala S, Das AK, Vasilakos AV (2019) Designing secure lightweight blockchain-enabled rfid-based authentication protocol for supply chains in 5g mobile edge computing environment. IEEE Trans Ind Inform 1\u201313","DOI":"10.1109\/TII.2019.2942389"},{"key":"1253_CR11","doi-asserted-by":"crossref","unstructured":"Yang H, Liang Y, Yuan J, Yao Q, Yu A, Zhang J (2020) Distributed blockchain-based trusted multi-domain collaboration for mobile edge computing in 5g and beyond. IEEE Trans Ind Inform 7094\u20137104","DOI":"10.1109\/TII.2020.2964563"},{"key":"1253_CR12","doi-asserted-by":"crossref","unstructured":"Chen Y, Xie H, Lv K, Wei S, Hu C (2019) Deplest: a blockchain-based privacy-preserving distributed database toward user behaviors in social networks. Inf Sci 100\u2013117","DOI":"10.1016\/j.ins.2019.05.092"},{"key":"1253_CR13","doi-asserted-by":"crossref","unstructured":"Si H, Sun C, Li Y, Qiao H, Shi L (2019) Iot information sharing security mechanism based on blockchain technology. Future Gener Compute Syst 1028\u20131040","DOI":"10.1016\/j.future.2019.07.036"},{"key":"1253_CR14","doi-asserted-by":"crossref","unstructured":"Kochovski P, Gec S, Stankovski V, Bajec M, Drobintsev PD (2019) Trust management in a blockchain based fog computing platform with trustless smart oracles. Future Gener Comput Syst 747\u2013759","DOI":"10.1016\/j.future.2019.07.030"},{"key":"1253_CR15","unstructured":"Ali M, Nelson J, Shea R, Freedman MJ (2016) Blockstack: a global naming and storage system secured by blockchains. In: 2016 USENIX annual technical conference (USENIX ATC \u201916), pp 181\u2013194"},{"key":"1253_CR16","unstructured":"Narula N, Vasquez W, Virza M (2018) zkledger: privacy-preserving auditing for distributed ledgers. USENIX, pp 65\u201380"},{"key":"1253_CR17","doi-asserted-by":"crossref","unstructured":"Fan K, Bao Z, Liu M, Vasilakos AV, Shi W (2020) Dredas: decentralized, reliable and efficient remote outsourced data auditing scheme with blockchain smart contract for industrial iot. Future Gener Comput Syst Int J Esci 665\u2013674","DOI":"10.1016\/j.future.2019.10.014"},{"key":"1253_CR18","doi-asserted-by":"crossref","unstructured":"Li L, Liua J, Changa X, Liu T, Liu J (2020) Toward conditionally anonymous bitcoin transactions: a lightweight-script approach. Inf Sci 290\u2013303","DOI":"10.1016\/j.ins.2019.09.011"},{"key":"1253_CR19","doi-asserted-by":"crossref","unstructured":"Zhou Z, Wang B, Dong M, Ota K (2019) Secure and efficient vehicle-to-grid energy trading in cyber physical systems: integration of blockchain and edge computing. IEEE Trans Syst Man Cybern Syst 1\u201315","DOI":"10.1109\/TSMC.2019.2896323"},{"key":"1253_CR20","doi-asserted-by":"crossref","unstructured":"He S, Tang Q, Wu CQ, Shen X (2020) Decentralizing iot management systems using blockchain for censorship resistance. IEEE Trans Ind Inform 715\u2013727","DOI":"10.1109\/TII.2019.2939797"},{"key":"1253_CR21","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3289832","author":"AP Kalapaaking","year":"2022","unstructured":"Kalapaaking AP, Khalil I, Atiquzzaman M (2022) Blockchain-enabled and multisignature-powered verifiable model for securing federated learning systems. IEEE Trans Internets Things. https:\/\/doi.org\/10.1109\/JIOT.2023.3289832","journal-title":"IEEE Trans Internets Things"},{"key":"1253_CR22","unstructured":"Matetic S, Wust K, Schneider M, Kostiainen K, Karame G, Capkun S (2019) Bite: bitcoin lightweight client privacy using trusted execution. In: 28th USENIX Security Symposium, pp 783\u2013800"},{"key":"1253_CR23","unstructured":"Oleksenko O, Trach B, Krahn R, Martin A, Fetzer C, Silberstein M (2018) Varys: protecting sgx enclaves from practical side-channel attacks. In: 2018 USENIX annual technical conference (USENIX ATC \u201918), pp 227\u2013239"},{"key":"1253_CR24","doi-asserted-by":"crossref","unstructured":"Dave A, Leung C, Popa RA, Gonzalez JE, Stoica I (2020) Oblivious coopetitive analytics using hardware enclaves. In: EuroSys \u201920: proceedings of the fifteenth European conference on computer systems","DOI":"10.1145\/3342195.3387552"},{"key":"1253_CR25","doi-asserted-by":"crossref","unstructured":"Zhao W, Lu K, Qi Y, Qi S (2020) Mptee: bringing flexible and efficient memory protection to intel sgx. In: EuroSys \u201920: proceedings of the fifteenth European conference on computer systems, pp 1\u201315","DOI":"10.1145\/3342195.3387536"},{"key":"1253_CR26","unstructured":"Anati I, Gueron S, Johnson S (2013) Innovative technology for cpu based attestation and sealing. In: In Proceedings of the 2nd international workshop on hardware and architectural support for security and privacy"},{"key":"1253_CR27","unstructured":"Corporation I (2014) Intel\u00aesoftware guard extensions programming reference. In: 329298-002us Edition"},{"key":"1253_CR28","unstructured":"Zcash. https:\/\/z.cash (2017)"}],"container-title":["Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-023-01253-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00607-023-01253-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-023-01253-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,2]],"date-time":"2024-03-02T11:09:24Z","timestamp":1709377764000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00607-023-01253-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,26]]},"references-count":28,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,3]]}},"alternative-id":["1253"],"URL":"https:\/\/doi.org\/10.1007\/s00607-023-01253-y","relation":{},"ISSN":["0010-485X","1436-5057"],"issn-type":[{"value":"0010-485X","type":"print"},{"value":"1436-5057","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1,26]]},"assertion":[{"value":"4 April 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 December 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 January 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}