{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T10:34:43Z","timestamp":1769942083859,"version":"3.49.0"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,5,18]],"date-time":"2025-05-18T00:00:00Z","timestamp":1747526400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,5,18]],"date-time":"2025-05-18T00:00:00Z","timestamp":1747526400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2025,6]]},"DOI":"10.1007\/s10207-025-01046-8","type":"journal-article","created":{"date-parts":[[2025,5,18]],"date-time":"2025-05-18T02:19:24Z","timestamp":1747534764000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["HPPS - Harmonized privacy-preserving scheme for the internet of things and edge-collaborated smart city services"],"prefix":"10.1007","volume":"24","author":[{"given":"Jaikumar","family":"Rajendran","sequence":"first","affiliation":[]},{"given":"Leena","family":"Bojaraj","sequence":"additional","affiliation":[]},{"given":"Kathirvelu","family":"Murugan","sequence":"additional","affiliation":[]},{"given":"Gurumoorthy Kambatty","family":"Bojan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,18]]},"reference":[{"key":"1046_CR1","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1016\/j.future.2023.05.008","volume":"148","author":"F Ullah","year":"2023","unstructured":"Ullah, F., Pun, C.-M., Kaiwartya, O., Sadiq, A.S., Lloret, J., Ali, M.: Hide-healthcare iot data trust management: Attribute centric intelligent privacy approach. Future Generation Computer Systems 148, 326\u2013341 (2023)","journal-title":"Future Generation Computer Systems"},{"issue":"12","key":"1046_CR2","doi-asserted-by":"publisher","first-page":"14792","DOI":"10.1007\/s10489-022-04039-5","volume":"53","author":"K Krinkin","year":"2023","unstructured":"Krinkin, K., et al.: On-device context-aware misuse detection framework for heterogeneous iot edge. Applied Intelligence 53(12), 14792\u201314818 (2023)","journal-title":"Applied Intelligence"},{"issue":"1","key":"1046_CR3","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1007\/s10586-021-03400-6","volume":"26","author":"Y Zhao","year":"2023","unstructured":"Zhao, Y., Hu, N., Zhao, Y., Zhu, Z.: A secure and flexible edge computing scheme for ai-driven industrial iot. Cluster Computing 26(1), 283\u2013301 (2023)","journal-title":"Cluster Computing"},{"issue":"4","key":"1046_CR4","doi-asserted-by":"publisher","first-page":"906","DOI":"10.1016\/j.dcan.2022.05.004","volume":"9","author":"Y Shen","year":"2023","unstructured":"Shen, Y., Shen, S., Li, Q., Zhou, H., Wu, Z., Qu, Y.: Evolutionary privacy-preserving learning strategies for edge-based iot data sharing schemes. Digital Communications and Networks 9(4), 906\u2013919 (2023)","journal-title":"Digital Communications and Networks"},{"key":"1046_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2023.108674","volume":"108","author":"T Saba","year":"2023","unstructured":"Saba, T., Rehman, A., Haseeb, K., Bahaj, S.A., Lloret, J.: Trust-based decentralized blockchain system with machine learning using internet of agriculture things. Computers and Electrical Engineering 108, 108674 (2023)","journal-title":"Computers and Electrical Engineering"},{"issue":"11","key":"1046_CR6","doi-asserted-by":"publisher","first-page":"8967","DOI":"10.1109\/JIOT.2021.3119513","volume":"9","author":"J Chen","year":"2021","unstructured":"Chen, J., Wang, L., Wen, M., Zhang, K., Chen, K.: Efficient certificateless online\/offline signcryption scheme for edge iot devices. IEEE Internet of Things Journal 9(11), 8967\u20138979 (2021)","journal-title":"IEEE Internet of Things Journal"},{"key":"1046_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2023.108626","volume":"107","author":"B Sharma","year":"2023","unstructured":"Sharma, B., Sharma, L., Lal, C., Roy, S.: Anomaly based network intrusion detection for iot attacks using deep learning technique. Computers and Electrical Engineering 107, 108626 (2023)","journal-title":"Computers and Electrical Engineering"},{"key":"1046_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103381","volume":"132","author":"R Yang","year":"2023","unstructured":"Yang, R., He, H., Wang, Y., Qu, Y., Zhang, W.: Dependable federated learning for iot intrusion detection against poisoning attacks. Computers & Security 132, 103381 (2023)","journal-title":"Computers & Security"},{"issue":"6","key":"1046_CR9","doi-asserted-by":"publisher","first-page":"3753","DOI":"10.1007\/s10586-022-03776-z","volume":"26","author":"A Heidari","year":"2023","unstructured":"Heidari, A., Jabraeil Jamali, M.A.: Internet of things intrusion detection systems: a comprehensive review and future directions. Cluster Computing 26(6), 3753\u20133780 (2023)","journal-title":"Cluster Computing"},{"issue":"11","key":"1046_CR10","doi-asserted-by":"publisher","first-page":"12622","DOI":"10.1007\/s11227-023-05153-y","volume":"79","author":"D Santhadevi","year":"2023","unstructured":"Santhadevi, D., Janet, B.: Stacked deep learning framework for edge-based intelligent threat detection in iot network. The Journal of Supercomputing 79(11), 12622\u201312655 (2023)","journal-title":"The Journal of Supercomputing"},{"issue":"20","key":"1046_CR11","doi-asserted-by":"publisher","first-page":"17934","DOI":"10.1109\/JIOT.2023.3279615","volume":"10","author":"Y Feng","year":"2023","unstructured":"Feng, Y., Zhang, W., Yin, S., Tang, H., Xiang, Y., Zhang, Y.: A collaborative stealthy ddos detection method based on reinforcement learning at the edge of internet of things. IEEE Internet of Things Journal 10(20), 17934\u201317948 (2023)","journal-title":"IEEE Internet of Things Journal"},{"issue":"3","key":"1046_CR12","doi-asserted-by":"publisher","first-page":"3738","DOI":"10.1007\/s11227-023-05616-2","volume":"80","author":"S Cherbal","year":"2024","unstructured":"Cherbal, S., Zier, A., Hebal, S., Louail, L., Annane, B.: Security in internet of things: a review on approaches based on blockchain, machine learning, cryptography, and quantum computing. The Journal of Supercomputing 80(3), 3738\u20133816 (2024)","journal-title":"The Journal of Supercomputing"},{"issue":"1","key":"1046_CR13","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1109\/JSTSP.2022.3224591","volume":"17","author":"M Xu","year":"2022","unstructured":"Xu, M., Niyato, D., Yang, Z., Xiong, Z., Kang, J., Kim, D.I., Shen, X.: Privacy-preserving intelligent resource allocation for federated edge learning in quantum internet. IEEE Journal of Selected Topics in Signal Processing 17(1), 142\u2013157 (2022)","journal-title":"IEEE Journal of Selected Topics in Signal Processing"},{"key":"1046_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.109769","volume":"229","author":"Z Cheng","year":"2023","unstructured":"Cheng, Z., Ji, X., You, W., Zhao, Y., Guo, Z.: Secho: A deep reinforcement learning-based scheme for secure handover in mobile edge computing. Computer Networks 229, 109769 (2023)","journal-title":"Computer Networks"},{"issue":"29","key":"1046_CR15","doi-asserted-by":"publisher","first-page":"21499","DOI":"10.1007\/s00521-023-08375-6","volume":"35","author":"W Zheng","year":"2023","unstructured":"Zheng, W., Cao, Y., Tan, H.: Secure sharing of industrial iot data based on distributed trust management and trusted execution environments: a federated learning approach. Neural Computing and Applications 35(29), 21499\u201321509 (2023)","journal-title":"Neural Computing and Applications"},{"issue":"2","key":"1046_CR16","doi-asserted-by":"publisher","first-page":"1159","DOI":"10.1109\/TNSM.2021.3122147","volume":"19","author":"Z Liao","year":"2021","unstructured":"Liao, Z., Pang, X., Zhang, J., Xiong, B., Wang, J.: Blockchain on security and forensics management in edge computing for iot: A comprehensive survey. IEEE Transactions on Network and Service Management 19(2), 1159\u20131175 (2021)","journal-title":"IEEE Transactions on Network and Service Management"},{"key":"1046_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.120192","volume":"225","author":"S Shen","year":"2023","unstructured":"Shen, S., Wu, X., Sun, P., Zhou, H., Wu, Z., Yu, S.: Optimal privacy preservation strategies with signaling q-learning for edge-computing-based iot resource grant systems. Expert Systems with Applications 225, 120192 (2023)","journal-title":"Expert Systems with Applications"},{"issue":"14","key":"1046_CR18","doi-asserted-by":"publisher","first-page":"12077","DOI":"10.1109\/JIOT.2021.3123333","volume":"10","author":"M Dai","year":"2021","unstructured":"Dai, M., Xu, S., Wang, Z., Ma, H., Qiu, X.: Edge trusted sharing: task-driven decentralized resources collaborate in iot. IEEE Internet of Things Journal 10(14), 12077\u201312089 (2021)","journal-title":"IEEE Internet of Things Journal"},{"key":"1046_CR19","doi-asserted-by":"publisher","first-page":"2234","DOI":"10.1109\/TIFS.2023.3266164","volume":"18","author":"Z Song","year":"2023","unstructured":"Song, Z., Ma, H., Zhang, R., Xu, W., Li, J.: Everything under control: secure data sharing mechanism for cloud-edge computing. IEEE Transactions on Information Forensics and Security 18, 2234\u20132249 (2023)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"10","key":"1046_CR20","doi-asserted-by":"publisher","first-page":"8632","DOI":"10.1109\/JIOT.2020.3047640","volume":"8","author":"W Yang","year":"2020","unstructured":"Yang, W., Guan, Z., Wu, L., Du, X., Guizani, M.: Secure data access control with fair accountability in smart grid data sharing: An edge blockchain approach. IEEE Internet of Things Journal 8(10), 8632\u20138643 (2020)","journal-title":"IEEE Internet of Things Journal"},{"key":"1046_CR21","unstructured":"Chen, J., Guo, S., Shen, T., Feng, Y., Gao, J., Qiu, X.: Incefl: a sharing incentive mechanism for edge-assisted federated learning in industrial iot. Digital Communications and Networks (2023)"},{"key":"1046_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2023.102984","volume":"144","author":"Y Zou","year":"2023","unstructured":"Zou, Y., Peng, T., Wang, G., Luo, E., Xiong, J.: Blockchain-assisted multi-keyword fuzzy search encryption for secure data sharing. Journal of Systems Architecture 144, 102984 (2023)","journal-title":"Journal of Systems Architecture"},{"key":"1046_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2021.107568","volume":"96","author":"G Fortino","year":"2021","unstructured":"Fortino, G., Fotia, L., Messina, F., Rosaci, D., Sarn\u00e9, G.M.: Trusted object framework (tof): A clustering reputation-based approach using edge computing for sharing resources among iot smart objects. Computers & Electrical Engineering 96, 107568 (2021)","journal-title":"Computers & Electrical Engineering"},{"key":"1046_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102917","volume":"176","author":"A Manzoor","year":"2021","unstructured":"Manzoor, A., Braeken, A., Kanhere, S.S., Ylianttila, M., Liyanage, M.: Proxy re-encryption enabled secure and anonymous iot data sharing platform based on blockchain. Journal of Network and Computer Applications 176, 102917 (2021)","journal-title":"Journal of Network and Computer Applications"},{"key":"1046_CR25","doi-asserted-by":"crossref","unstructured":"Liu, M., Lu, N., Wen, Y., Cheng, Q., Shi, W.: Sea: Secure and efficient public auditing for edge-assisted iot aggregated data sharing. Mobile Networks and Applications, 1\u201312 (2023)","DOI":"10.1007\/s11036-023-02146-2"},{"issue":"2","key":"1046_CR26","doi-asserted-by":"publisher","first-page":"769","DOI":"10.1007\/s12652-021-02929-z","volume":"13","author":"U Narayanan","year":"2022","unstructured":"Narayanan, U., Paul, V., Joseph, S.: Decentralized blockchain based authentication for secure data sharing in cloud-iot: Deblock-sec. Journal of Ambient Intelligence and Humanized Computing 13(2), 769\u2013787 (2022)","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"key":"1046_CR27","doi-asserted-by":"crossref","unstructured":"Sun, H., Tan, Y.-A., Zhu, L., Zhang, Q., Ai, S., Zheng, J.: A blockchain-based access control protocol for secure resource sharing with mobile edge-cloud collaboration. Journal of Ambient Intelligence and Humanized Computing 14(10), 13661\u201313672 (2023)","DOI":"10.1007\/s12652-022-04020-7"},{"key":"1046_CR28","doi-asserted-by":"crossref","unstructured":"Agyekum, K.O.-B.O., Xia, Q., Sifah, E.B., Cobblah, C.N.A., Xia, H., Gao, J.: A proxy re-encryption approach to secure data sharing in the internet of things based on blockchain. IEEE Systems Journal 16(1), 1685\u20131696 (2021)","DOI":"10.1109\/JSYST.2021.3076759"},{"key":"1046_CR29","doi-asserted-by":"publisher","DOI":"10.1016\/j.phycom.2023.102087","volume":"59","author":"M Tanveer","year":"2023","unstructured":"Tanveer, M., Bashir, A.K., Alzahrani, B.A., Albeshri, A., Alsubhi, K., Chaudhry, S.A.: Cadf-cse: Chaotic map-based authenticated data access\/sharing framework for iot-enabled cloud storage environment. Physical Communication 59, 102087 (2023)","journal-title":"Physical Communication"},{"issue":"15","key":"1046_CR30","doi-asserted-by":"publisher","first-page":"17132","DOI":"10.1007\/s11227-022-04533-0","volume":"78","author":"A Shivhare","year":"2022","unstructured":"Shivhare, A., Maurya, M.K., Sarif, J., Kumar, M.: A secret sharing-based scheme for secure and energy efficient data transfer in sensor-based iot. The Journal of Supercomputing 78(15), 17132\u201317149 (2022)","journal-title":"The Journal of Supercomputing"},{"key":"1046_CR31","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2021.102028","volume":"115","author":"A Altaf","year":"2021","unstructured":"Altaf, A., Abbas, H., Iqbal, F., Khan, M.M.Z.M., Rauf, A., Kanwal, T.: Mitigating service-oriented attacks using context-based trust for smart cities in iot networks. Journal of Systems Architecture 115, 102028 (2021)","journal-title":"Journal of Systems Architecture"},{"issue":"3","key":"1046_CR32","doi-asserted-by":"publisher","first-page":"2217","DOI":"10.1007\/s11277-023-10539-5","volume":"131","author":"S Ramya","year":"2023","unstructured":"Ramya, S., Doraipndian, M., Amirtharajan, R.: Lape2d: lightweight authentication protocol to secure end and edge devices in iot framework. Wireless Personal Communications 131(3), 2217\u20132239 (2023)","journal-title":"Wireless Personal Communications"},{"issue":"6","key":"1046_CR33","doi-asserted-by":"publisher","first-page":"607","DOI":"10.3390\/electronics8060607","volume":"8","author":"IA Najm","year":"2019","unstructured":"Najm, I.A., Hamoud, A.K., Lloret, J., Bosch, I.: Machine learning prediction approach to enhance congestion control in 5g iot environment. Electronics 8(6), 607 (2019)","journal-title":"Electronics"},{"issue":"5","key":"1046_CR34","doi-asserted-by":"publisher","first-page":"8690","DOI":"10.1109\/JIOT.2023.3321778","volume":"11","author":"JE Rivadeneira","year":"2023","unstructured":"Rivadeneira, J.E., S\u00e1nchez, O.T., Dias, M., Rodrigues, A., Boavida, F., Silva, J.S.: Confluence: An integration model for human-in-the-loop iot privacy-preserving solutions toward sustainability in a smart city. IEEE Internet of Things Journal 11(5), 8690\u20138714 (2023)","journal-title":"IEEE Internet of Things Journal"},{"key":"1046_CR35","doi-asserted-by":"crossref","unstructured":"Sun, J., Bao, Y., Qiu, W., Lu, R., Zhang, S., Guan, Y., Cheng, X.: Privacy-preserving fine-grained data sharing with dynamic service for the cloud-edge iot. IEEE Transactions on Dependable and Secure Computing (2024)","DOI":"10.1109\/TDSC.2024.3432650"},{"key":"1046_CR36","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2025.110070","volume":"123","author":"G Zheng","year":"2025","unstructured":"Zheng, G., Gong, B., Guo, C., Peng, T., Gong, M.: Awe-dpfl: Adaptive weighting and dynamic privacy budget federated learning for heterogeneous data in iot. Computers and Electrical Engineering 123, 110070 (2025)","journal-title":"Computers and Electrical Engineering"},{"issue":"2","key":"1046_CR37","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1007\/s12083-025-01906-z","volume":"18","author":"G Piao","year":"2025","unstructured":"Piao, G., Zhu, J.: Accesschain: A scalable and privacy-preserving access control scheme for blockchain-based iot. Peer-to-Peer Networking and Applications 18(2), 92 (2025)","journal-title":"Peer-to-Peer Networking and Applications"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01046-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-025-01046-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01046-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,21]],"date-time":"2025-06-21T10:11:21Z","timestamp":1750500681000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-025-01046-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,18]]},"references-count":37,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,6]]}},"alternative-id":["1046"],"URL":"https:\/\/doi.org\/10.1007\/s10207-025-01046-8","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,5,18]]},"assertion":[{"value":"18 May 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"131"}}