{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T18:58:04Z","timestamp":1771613884207,"version":"3.50.1"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,9,21]],"date-time":"2023-09-21T00:00:00Z","timestamp":1695254400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,9,21]],"date-time":"2023-09-21T00:00:00Z","timestamp":1695254400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2024,2]]},"DOI":"10.1007\/s10207-023-00719-6","type":"journal-article","created":{"date-parts":[[2023,9,21]],"date-time":"2023-09-21T17:01:41Z","timestamp":1695315701000},"page":"519-532","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Blockchain-based data integrity framework for Internet of Things"],"prefix":"10.1007","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6906-6548","authenticated-orcid":false,"given":"Poornima M.","family":"Chanal","sequence":"first","affiliation":[]},{"given":"Mahabaleshwar S.","family":"Kakkasageri","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,21]]},"reference":[{"issue":"3","key":"719_CR1","doi-asserted-by":"publisher","first-page":"1667","DOI":"10.1007\/s11277-020-07649-9","volume":"115","author":"Poornima M Chanal","year":"2020","unstructured":"Chanal, Poornima M., Kakkasageri, Mahabaleshwar S.: Security and Privacy in IoT: A Survey. Journal of Wireless Personal Communication 115(3), 1667\u20131693 (2020)","journal-title":"Journal of Wireless Personal Communication"},{"issue":"7","key":"719_CR2","doi-asserted-by":"publisher","first-page":"1645","DOI":"10.1016\/j.future.2013.01.010","volume":"29","author":"J Gubbi","year":"2013","unstructured":"Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M.: Internet of Things (IoT): A Vision, Architectural Elements, and Future Directions. Journal of Future Generation Computer Systems 29(7), 1645\u20131660 (2013)","journal-title":"Journal of Future Generation Computer Systems"},{"issue":"7","key":"719_CR3","doi-asserted-by":"publisher","first-page":"1497","DOI":"10.1016\/j.adhoc.2012.02.016","volume":"10","author":"D Miorandi","year":"2012","unstructured":"Miorandi, D., Sicari, S., De Pellegrini, F., Chlamtac, I.: Internet of Things: Vision, Applications and Research Challenges. Journal of Ad Hoc Networks 10(7), 1497\u20131516 (2012)","journal-title":"Journal of Ad Hoc Networks"},{"key":"719_CR4","unstructured":"Yang, D., Liu, F., Liang, Y.: A Survey of Internet of Things, Proc. of the International Conference on E-Business Intelligence (ICEBI\u201910), Vol. 978, pp. 78\u201399, China, (2010)"},{"key":"719_CR5","unstructured":"\u201cVision and Challenges for Realizing the Internet of Things\u201d, Cluster of European Research Projects on the Internet of Things, European Commission Information Society and Media, (2010)"},{"key":"719_CR6","doi-asserted-by":"crossref","unstructured":"Suo, H., Wan, J., Zou, C., Liu, J.: Security in the Internet of Things: A Review, Proc. of the IEEE International Conference on Computer Science and Electronics Engineering, Vol. 3. pp. 648\u2013651, China, (2012)","DOI":"10.1109\/ICCSEE.2012.373"},{"key":"719_CR7","doi-asserted-by":"crossref","unstructured":"Poornima, M., Chanal, Mahabaleshwar\u00a0S., Kakkasageri, Sunilkumar\u00a0S., Manvi: \u201cSecurity and Privacy in Internet of Things: Computational Intelligent Techniques based Approaches\u201d, Recent Trends in Computational Intelligence Enabled Research, pp. 111\u2013127, (2021)","DOI":"10.1016\/B978-0-12-822844-9.00009-8"},{"key":"719_CR8","unstructured":"Yang, G., Xu, J., Chen, W., Qi, Z. H., Wang, H.Y.: Security Characteristics and Technology in the Internet of Things, Journal of Nanjing University of Posts and Telecommunications, 30(4), (2010)"},{"key":"719_CR9","doi-asserted-by":"publisher","first-page":"164996","DOI":"10.1109\/ACCESS.2019.2952635","volume":"7","author":"Haiyan Wang","year":"2019","unstructured":"Wang, Haiyan, Zhang, Jiawei: Blockchain Based Data Integrity Verification for Large Scale IoT Data. Journal of IEEE Access 7, 164996\u2013165006 (2019)","journal-title":"Journal of IEEE Access"},{"key":"719_CR10","doi-asserted-by":"crossref","unstructured":"Wang, Xu, Zha, Xuan, Ni, Wei, Liu, Ren\u00a0Ping, Guo, Y.\u00a0Jay, Niu, Xinxin, Zheng, Kangfeng: Survey on Blockchain for Internet of Things, Journal of Computer Communications, Elsevier, 136, pp. 10\u201329, (2019)","DOI":"10.1016\/j.comcom.2019.01.006"},{"key":"719_CR11","doi-asserted-by":"crossref","unstructured":"Md. Ashraf Uddin, Andrew Stranieri, Iqbal Gondal, Venki Balasubramanian, \u201cA Survey on the Adoption of Blockchain in IoT: Challenges and Solutions\u201d, Journal of Blockchain: Research and Applications, 2(2), pp. 1\u201349, 2021","DOI":"10.1016\/j.bcra.2021.100006"},{"key":"719_CR12","doi-asserted-by":"publisher","first-page":"2151","DOI":"10.1007\/s00500-015-1918-8","volume":"21","author":"Jian Mao","year":"2017","unstructured":"Mao, Jian, Zhang, Yan, Li, Pei, Li, Teng, Qianhong, Wu., Liu, Jianwei: A Position Aware Merkle Tree for Dynamic Cloud Data Integrity Verification. Journal of Soft Computing 21, 2151\u20132164 (2017)","journal-title":"Journal of Soft Computing"},{"key":"719_CR13","doi-asserted-by":"crossref","unstructured":"Furukawa, J., Imai, H.: An Efficient Group Signature Scheme from Bilinear Maps, Proc. of the International Conference on Information Security and Privacy, Berlin, (2005)","DOI":"10.1007\/11506157_38"},{"issue":"6","key":"719_CR14","doi-asserted-by":"publisher","first-page":"3680","DOI":"10.1109\/TII.2019.2903342","volume":"15","author":"Junqin Huang","year":"2019","unstructured":"Huang, Junqin, Kong, Linghe, Chen, Guihai, Min-You, Wu., Liu, Xue, Zeng, Peng: Towards Secure industrial IoT: Blockchain System with Credit based Consensus Mechanism. IEEE Transactions on Industrial Informatics 15(6), 3680\u20133689 (2019)","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"3","key":"719_CR15","first-page":"12","volume":"21","author":"Yu Yong","year":"2018","unstructured":"Yong, Yu., Li, Yannan, Tian, Junfeng, Liu, Jianwei: Blockchain-Based Solutions to Security and Privacy Issues in the Internet of Things. Jouranal of IEEE Wireless Communications 21(3), 12\u201318 (2018)","journal-title":"Jouranal of IEEE Wireless Communications"},{"key":"719_CR16","doi-asserted-by":"crossref","unstructured":"Ul\u00a0Hassan, M., Rehmani, M.H., Chen, J.: Privacy Preservation in Blockchain based IoT Systems: Integration Issues, Prospects, Challenges, and Future Research Directions, Journal of Future Generation Computer Systems, Vol. 97, pp. 512\u2013529, (2019)","DOI":"10.1016\/j.future.2019.02.060"},{"key":"719_CR17","doi-asserted-by":"crossref","unstructured":"Zorzo, Javelino\u00a0F., Nunes, Henry\u00a0C., Lunardi, Roben\u00a0C., Michelin, Regio\u00a0A., Kanhere, Salil\u00a0S.: Dependable IoT using Blockchain based Technology, In 2018 Eighth Latin-American Symposium on Dependable Computing (LADC), pp, 1\u20139, Brazil, (2018)","DOI":"10.1109\/LADC.2018.00010"},{"key":"719_CR18","doi-asserted-by":"publisher","first-page":"1028","DOI":"10.1016\/j.future.2019.07.036","volume":"101","author":"Haiping Si","year":"2019","unstructured":"Si, Haiping, Sun, Changxia, Li, Yanling, Qiao, Hongbo, Shi, Lei: IoT Information Sharing Security Mechanism based on Blockchain Technology. Journal of Future Generation Computer Systems 101, 1028\u20131040 (2019)","journal-title":"Journal of Future Generation Computer Systems"},{"issue":"1","key":"719_CR19","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1109\/TNSE.2018.2887236","volume":"7","author":"Yu-Jia Chen","year":"2020","unstructured":"Chen, Yu-Jia., Wang, Li-Chun., Wang, Shu: Stochastic Blockchain for IoT Data Integrity. Journal of IEEE Transactions on Network Science and Engineering 7(1), 373\u2013384 (2020)","journal-title":"Journal of IEEE Transactions on Network Science and Engineering"},{"key":"719_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jpdc.2020.06.007","volume":"146","author":"D Yue","year":"2020","unstructured":"Yue, D., Li, R., Zhang, Y., Tian, W., Huang, Y.: Blockchain based Verification Framework for Data Integrity in Edge Cloud Storage. Journal of Parallel and Distributed Computing 146, 1\u201314 (2020)","journal-title":"Journal of Parallel and Distributed Computing"},{"key":"719_CR21","doi-asserted-by":"crossref","unstructured":"Peng, Ceng\u00a0Wei, Wang, Dahu, Zhao, Yu, Tyagi, Sumarga\u00a0Kumar\u00a0Sah, Kumar, Neeraj: Blockchain Data-based Cloud Data Integrity Protection Mechanism. Journal of Future Generation Computer Systems 102, 902\u2013911 (2020)","DOI":"10.1016\/j.future.2019.09.028"},{"key":"719_CR22","doi-asserted-by":"crossref","unstructured":"Zhang, Yuan, Chunxiang, Xu., Lin, Xiaodong, Xuemin: Blockchain-Based Public Integrity Verification for Cloud Storage against Procrastinating Auditors. IEEE Transactions on Cloud Computing 9(3), 923\u2013937 (2021)","DOI":"10.1109\/TCC.2019.2908400"},{"key":"719_CR23","doi-asserted-by":"publisher","first-page":"56656","DOI":"10.1109\/ACCESS.2019.2913682","volume":"7","author":"Lixia Xie","year":"2019","unstructured":"Xie, Lixia, Ding, Ying, Yang, Hongyu, Wang, Xinmu: Blockchain-Based Secure and Trustworthy Internet of Things in SDN-Enabled 5G-VANETs. Journal of IEEE Access 7, 56656\u201356666 (2019)","journal-title":"Journal of IEEE Access"},{"key":"719_CR24","first-page":"34046","volume":"7","author":"Mingxin Ma","year":"2019","unstructured":"Ma, Mingxin, Shi, Guozhen, Li, Fenghua: Privacy-Oriented Blockchain-Based Distributed Key Management Architecture for Hierarchical Access Control in the IoT Scenario. Journal of IEEE Access 7, 34046\u201334059 (2019)","journal-title":"Journal of IEEE Access"},{"key":"719_CR25","doi-asserted-by":"crossref","unstructured":"Atlam, H.F., Walters, R.J., Wills, G.B., Alenezi, A., Alharthi, A.: Integration of Cloud Computing with Internet of Things: Challenges and Open Issues, Proc. of The IEEE International Conference on Internet of Things and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), pp. 670\u2013675, UK, (2017)","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData.2017.105"},{"key":"719_CR26","doi-asserted-by":"crossref","unstructured":"Hang, Lei, Kim, Do\u00a0Hyuen: Design and Implementation of an Integrated IoT Blockchain Platform for Sensing Data Integrity, Journal of Sensor, 19(10), (2019)","DOI":"10.3390\/s19102228"},{"key":"719_CR27","doi-asserted-by":"crossref","unstructured":"Kleinaki, Athina\u00a0Styliani, Mytis-Gkometh, Petros, Drosatos, George: A Blockchain-Based Notarization Service for Biomedical Knowledge Retrieval. Journal of Computational and Structural Biotechnology 16, 288\u2013297 (2018)","DOI":"10.1016\/j.csbj.2018.08.002"},{"key":"719_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.compag.2020.105251","volume":"170","author":"Lei Hang","year":"2020","unstructured":"Hang, Lei, Ullah, Israr, Kim, DoHyeun: A Secure Fish Farm Platform based on Blockchain for Agriculture Data Integrity. Journal of Computers and Electronics in Agriculture 170, 1\u201315 (2020)","journal-title":"Journal of Computers and Electronics in Agriculture"},{"key":"719_CR29","doi-asserted-by":"crossref","unstructured":"Machado, Caciano, Frohlich, Antonio\u00a0Augusto: IoT Data Integrity Verification for Cyber-Physical Systems Using Blockchain, Proc. of the International Symposium on Object Oriented Real Time Distributed Computing, pp. 83-90, Singapore, (2018)","DOI":"10.1109\/ISORC.2018.00019"},{"key":"719_CR30","first-page":"1","volume":"8","author":"Dongyoung Koo","year":"2018","unstructured":"Koo, Dongyoung, Shin, Youngjoo, Yun, Joobeom, Hur, Junbeom: Improving Security and Reliability in Merkle Tree-Based Online Data Authentication with Leakage Resilience. Journal of Applied Science 8, 1\u201329 (2018)","journal-title":"Journal of Applied Science"},{"issue":"12","key":"719_CR31","first-page":"12233","volume":"119","author":"AR Arunachalam","year":"2018","unstructured":"Arunachalam, A.R., Michael, G.: Merkle Hash Tree with Hash based Digital Signature for Cloud data Confidentiality and Security. Journal of Pure and Applied Mathematics 119(12), 12233\u201312242 (2018)","journal-title":"Journal of Pure and Applied Mathematics"},{"key":"719_CR32","first-page":"367","volume":"127","author":"Quazi Mamun","year":"2013","unstructured":"Mamun, Quazi, Islam, Rafiqul, Kaosar, Mohammed: Ensuring Data Integrity by Anomaly Node Detection during Data Gathering in WSNs. Journal of Security Communication 127, 367\u2013379 (2013)","journal-title":"Journal of Security Communication"},{"key":"719_CR33","doi-asserted-by":"crossref","unstructured":"Altulyan, May, Yao, Lina, Kanhere, Salil\u00a0S., Wang, Xianzhi, Huang, Chaoran: A Unified Framework for Data Integrity Protection in People-centric Smart Cities, Journal of Multimedia Tools and Applications. 79, pp. 4989\u20135002, (2020)","DOI":"10.1007\/s11042-019-7182-7"},{"issue":"01","key":"719_CR34","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s42979-020-00382-x","volume":"2","author":"Poornima M Chanal","year":"2021","unstructured":"Chanal, Poornima M., Kakkasageri, Mahabaleshwar S.: Preserving Data Confidentiality in Internet of Things. Journal of SN Computer Science, Springer 2(01), 1\u201312 (2021)","journal-title":"Journal of SN Computer Science, Springer"},{"key":"719_CR35","doi-asserted-by":"crossref","unstructured":"Othman, Soufiene\u00a0Ben, Bahattab, Abdullah\u00a0Ali, Trad, Abdelbasset, Youssef, Habib: Confidentiality and Integrity for Data Aggregation in WSN Using Homomorphic Encryption. Journal of Wireless Personal Communication 80, 867\u2013889 (2015)","DOI":"10.1007\/s11277-014-2061-z"},{"key":"719_CR36","doi-asserted-by":"crossref","unstructured":"Awasthi, Prakhar, Mittal, Sanya, Mukherjee, Sibeli, Limbasiya, Trupil: A Protected Cloud Computation Algorithm Using Homomorphic Encryption for Preserving Data Integrity, Proc. of the $$5^{th}$$ International Conference on Advanced Computing, Networking and Informatics, pp. 509\u2013517, Goa, (2018)","DOI":"10.1007\/978-981-10-8639-7_53"},{"issue":"5","key":"719_CR37","first-page":"825","volume":"10","author":"D Chandravathi","year":"2017","unstructured":"Chandravathi, D., Lakshmi, P.V.: A New Hybrid Homomorphic Encryption Scheme for Cloud Data Security. Journal of Advances in Computational Sciences and Technology 10(5), 825\u2013837 (2017)","journal-title":"Journal of Advances in Computational Sciences and Technology"},{"issue":"7","key":"719_CR38","first-page":"2069","volume":"19","author":"Yun Liu","year":"2018","unstructured":"Liu, Yun, Li, Chaoran, Zhang, Jing, Liu, Qing: A Homomorphic MAC-based Secure Data Aggregation Scheme for Wireless Sensor Networks. Journal of Internet Technology 19(7), 2069\u20132077 (2018)","journal-title":"Journal of Internet Technology"},{"key":"719_CR39","first-page":"01","volume":"2021","author":"Gaopeng Xie","year":"2021","unstructured":"Xie, Gaopeng, Liu, Yuling, Xin, Guojiang, Yang, Qiuwei: Blockchain-Based Cloud Data Integrity Verification Scheme with High Efficiency. Journal of Security and Communication Networks 2021, 01\u201315 (2021)","journal-title":"Journal of Security and Communication Networks"},{"key":"719_CR40","doi-asserted-by":"crossref","unstructured":"Mamta, Brij\u00a0B., Gupta, Kuan-Ching\u00a0Li, Leung, Victor\u00a0C.M., Psannis, Kostas\u00a0E., Yamaguchi, Shingo: Blockchain-Assisted Secure Fine-Grained Searchable Encryption for a Cloud-Based Healthcare Cyber-Physical System, Journal of Automatica Sinica, 8,(12), 1877\u20131890, (2021)","DOI":"10.1109\/JAS.2021.1004003"},{"issue":"3","key":"719_CR41","doi-asserted-by":"publisher","first-page":"20","DOI":"10.4018\/IJSWIS.2020070102","volume":"16","author":"Aakanksha Tewari","year":"2020","unstructured":"Tewari, Aakanksha, Gupta, Brij B.: Secure Timestamp-Based Mutual Authentication Protocol for IoT Devices Using RFID Tags. Journal of Semantic Web and Information Systems 16(3), 20\u201334 (2020)","journal-title":"Journal of Semantic Web and Information Systems"},{"key":"719_CR42","doi-asserted-by":"publisher","first-page":"3179","DOI":"10.1007\/s13042-020-01241-0","volume":"12","author":"Ivan Cvitic","year":"2021","unstructured":"Cvitic, Ivan, Perakovic, Dragan, Perisa, Marko, Gupta, Brij: Ensemble Machine Learning Approach for Classification of IoT Devices in Smart Home. Journal of Machine Learning and Cybernetics 12, 3179\u20133202 (2021)","journal-title":"Journal of Machine Learning and Cybernetics"},{"key":"719_CR43","doi-asserted-by":"crossref","unstructured":"Al-Qerem, Ahmad, Alauthman, Mohammad, Almomani, Ammar, Gupta, B.B.: IoT Transaction Processing through Cooperative Concurrency Control on Fog-Cloud Computing Environment, Journal of Soft Computing, 24, pp. 5695\u20135711, (2020)","DOI":"10.1007\/s00500-019-04220-y"},{"key":"719_CR44","doi-asserted-by":"crossref","unstructured":"Vipindev, Adat\u00a0B.B., Gupta: Security in Internet of Things: Issues, Challenges, Taxonomy, and Architecture. Journal of Telecommunication Systems 24, 423\u2013441 (2018)","DOI":"10.1007\/s11235-017-0345-9"},{"issue":"9","key":"719_CR45","doi-asserted-by":"publisher","first-page":"6160","DOI":"10.1109\/TII.2021.3081416","volume":"18","author":"Junwei Zhang","year":"2022","unstructured":"Zhang, Junwei, Wang, Zhuzhu, Wang, Dandan, Zhang, Xinglong, Gupta, Brij B., Liu, Ximeng, Ma, Jianfeng: A Secure Decentralized Spatial Crowdsourcing Scheme for 6G-Enabled Network in Box. IEEE Transactions on Industrial Informatics 18(9), 6160\u20136170 (2022)","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"1","key":"719_CR46","first-page":"73","volume":"11","author":"Chetan M Bulla","year":"2021","unstructured":"Bulla, Chetan M., Birje, Mahantesh N.: A Multi-Agent-Based Data Collection and Aggregation Model for Fog Enabled Cloud Monitoring. Journal of Cloud Applications and Computing 11(1), 73\u201392 (2021)","journal-title":"Journal of Cloud Applications and Computing"},{"key":"719_CR47","first-page":"174","volume":"19","author":"Christos Stergioua","year":"2018","unstructured":"Stergioua, Christos, Psannisa, Kostas E., Guptab, Brij B., Ishibashic, Yutaka: Security, Privacy and Efficiency of Sustainable Cloud Computing for Big Data and IoT. Journal of Sustainable Computing: Informatics and Systems 19, 174\u2013184 (2018)","journal-title":"Journal of Sustainable Computing: Informatics and Systems"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-023-00719-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-023-00719-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-023-00719-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,23]],"date-time":"2024-01-23T01:12:51Z","timestamp":1705972371000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-023-00719-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,21]]},"references-count":47,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,2]]}},"alternative-id":["719"],"URL":"https:\/\/doi.org\/10.1007\/s10207-023-00719-6","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,9,21]]},"assertion":[{"value":"21 September 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Author Mrs. Poornima M. Chanal declares that she has no conflict of interest. Author Dr. Mahabaleshwar S. Kakkasageri declares that he has no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}