{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T07:26:55Z","timestamp":1776151615552,"version":"3.50.1"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2023,9,24]],"date-time":"2023-09-24T00:00:00Z","timestamp":1695513600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,9,24]],"date-time":"2023-09-24T00:00:00Z","timestamp":1695513600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2024,6]]},"DOI":"10.1007\/s10586-023-04145-0","type":"journal-article","created":{"date-parts":[[2023,9,24]],"date-time":"2023-09-24T06:01:31Z","timestamp":1695535291000},"page":"3203-3218","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Blockchain-based optimized edge node selection and privacy preserved framework for federated learning"],"prefix":"10.1007","volume":"27","author":[{"given":"Attia","family":"Qammar","sequence":"first","affiliation":[]},{"given":"Abdenacer","family":"Naouri","sequence":"additional","affiliation":[]},{"given":"Jianguo","family":"Ding","sequence":"additional","affiliation":[]},{"given":"Huansheng","family":"Ning","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,24]]},"reference":[{"key":"4145_CR1","unstructured":"McMahan, Brendan, Moore, Eider, Ramage, Daniel, Hampson, Seth, y\u00a0Arcas, Blaise\u00a0Aguera.: Communication-efficient learning of deep networks from decentralized data. volume\u00a054, pages 1273\u20131282. PMLR, 7 (2017). URL: https:\/\/proceedings.mlr.press\/v54\/mcmahan17a.html"},{"key":"4145_CR2","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MSP.2020.2975749","volume":"37","author":"T Li","year":"2020","unstructured":"Li, T., Sahu, A.K., Talwalkar, A., Smith, V.: Federated learning: Challenges, methods, and future directions. IEEE Signal Process. Mag. 37, 50\u201360 (2020). https:\/\/doi.org\/10.1109\/MSP.2020.2975749","journal-title":"IEEE Signal Process. Mag."},{"key":"4145_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-63076-8_1","author":"L Lyu","year":"2020","unstructured":"Lyu, L., Han, Y., Zhao, J., Yang, Q.: Threats to federated. Learning (2020). https:\/\/doi.org\/10.1007\/978-3-030-63076-8_1","journal-title":"Learning"},{"key":"4145_CR4","doi-asserted-by":"publisher","first-page":"3569","DOI":"10.1007\/s10462-021-10098-w","volume":"55","author":"Q Attia","year":"2022","unstructured":"Attia, Q., Jianguo, D., Huansheng, N.: Federated learning attack surface: Taxonomy, cyber defences, challenges, and future directions. Artif. Intell. Rev. 55, 3569\u20133606 (2022). https:\/\/doi.org\/10.1007\/s10462-021-10098-w","journal-title":"Artif. Intell. Rev."},{"key":"4145_CR5","doi-asserted-by":"publisher","unstructured":"W., Zhibo, S., Mengkai, Z., Zhifei, S., Yang, W., Qian, Q., Hairong Beyond inferring class representatives: User-level privacy leakage from federated learning. 2512\u20132520. IEEE, 4 (2019). https:\/\/doi.org\/10.1109\/INFOCOM.2019.8737416","DOI":"10.1109\/INFOCOM.2019.8737416"},{"key":"4145_CR6","unstructured":"X., Chenhao, Q., Youyang, X., Yong, G., Longxiang. Asynchronous federated learning on heterogeneous devices: A survey. arXiv preprint arXiv:2109.04269, (2021)"},{"key":"4145_CR7","doi-asserted-by":"publisher","unstructured":"Kang, Jiawen, Xiong, Zehui, Niyato, Dusit, Yu, Han, Liang, Ying-Chang, Kim, Dong\u00a0In: Incentive design for efficient federated learning in mobile networks: A contract theory approach. In 2019 IEEE VTS Asia Pacific Wireless Communications Symposium (APWCS), pages 1\u20135. IEEE, (2019). https:\/\/doi.org\/10.1109\/VTS-APWCS.2019.8851649.","DOI":"10.1109\/VTS-APWCS.2019.8851649."},{"key":"4145_CR8","doi-asserted-by":"publisher","unstructured":"Zeng, Rongfei, Zhang, Shixun, Wang, Jiaqi, Chu, Xiaowen: Fmore: An incentive scheme of multi-dimensional auction for federated learning in mec. pages 278\u2013288. IEEE, 11 (2020). https:\/\/doi.org\/10.1109\/ICDCS47774.2020.00094","DOI":"10.1109\/ICDCS47774.2020.00094"},{"key":"4145_CR9","doi-asserted-by":"publisher","unstructured":"Nishio, Takayuki, Yonetani, Ryo: Client selection for federated learning with heterogeneous resources in mobile edge. pages 1\u20137. IEEE, 5 (2019). https:\/\/doi.org\/10.1109\/ICC.2019.8761315","DOI":"10.1109\/ICC.2019.8761315"},{"key":"4145_CR10","doi-asserted-by":"publisher","first-page":"63229","DOI":"10.1109\/ACCESS.2021.3075203","volume":"9","author":"N Bouacida","year":"2021","unstructured":"Bouacida, N., Mohapatra, P.: Vulnerabilities in federated learning. IEEE Access 9, 63229\u201363249 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3075203","journal-title":"IEEE Access"},{"key":"4145_CR11","doi-asserted-by":"publisher","first-page":"3276","DOI":"10.1109\/JIOT.2022.3144450","volume":"10","author":"SK Lo","year":"2023","unstructured":"Lo, S.K., Liu, Y., Lu, Q., Wang, C., Xu, X., Paik, H.-Y., Zhu, L.: Toward trustworthy ai: Blockchain-based architecture design for accountability and fairness of federated learning systems. IEEE Internet Things J. 10, 3276\u20133284 (2023). https:\/\/doi.org\/10.1109\/JIOT.2022.3144450","journal-title":"IEEE Internet Things J."},{"key":"4145_CR12","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1109\/MNET.011.2000263","volume":"35","author":"Y Li","year":"2021","unstructured":"Li, Y., Chen, C., Liu, N., Huang, H., Zheng, Z., Yan, Q.: A blockchain-based decentralized federated learning framework with committee consensus. IEEE Netw. 35, 234\u2013241 (2021). https:\/\/doi.org\/10.1109\/MNET.011.2000263","journal-title":"IEEE Netw."},{"key":"4145_CR13","doi-asserted-by":"publisher","first-page":"3951","DOI":"10.1007\/s10462-022-10271-9","volume":"56","author":"A Qammar","year":"2023","unstructured":"Qammar, A., Karim, A., Ning, H., Ding, J.: Securing federated learning with blockchain: a systematic literature review. Artif. Intell. Rev. 56, 3951\u20133985 (2023). https:\/\/doi.org\/10.1007\/s10462-022-10271-9","journal-title":"Artif. Intell. Rev."},{"key":"4145_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3570953","volume":"55","author":"J Zhu","year":"2023","unstructured":"Zhu, J., Cao, J., Saxena, D., Jiang, S., Ferradi, H.: Blockchain-empowered federated learning: Challenges, solutions, and future directions. ACM Comput. Surv. 55, 1\u201331 (2023). https:\/\/doi.org\/10.1145\/3570953","journal-title":"ACM Comput. Surv."},{"key":"4145_CR15","doi-asserted-by":"publisher","first-page":"380","DOI":"10.1016\/j.future.2021.11.028","volume":"129","author":"S Singh","year":"2022","unstructured":"Singh, S., Rathore, S., Alfarraj, O., Tolba, A., Yoon, B.: A framework for privacy-preservation of iot healthcare data using federated learning and blockchain technology. Fut. Gener. Comput. Syst. 129, 380\u2013388 (2022). https:\/\/doi.org\/10.1016\/j.future.2021.11.028","journal-title":"Fut. Gener. Comput. Syst."},{"key":"4145_CR16","doi-asserted-by":"publisher","first-page":"102362","DOI":"10.1016\/j.jisa.2019.102362","volume":"48","author":"M Alloghani","year":"2019","unstructured":"Alloghani, M., Alani, M.M., Al-Jumeily, D., Baker, T., Mustafina, J., Hussain, A., Aljaaf, A.J.: A systematic review on the status and progress of homomorphic encryption technologies. J. Inform. Secur. Appl. 48, 102362 (2019). https:\/\/doi.org\/10.1016\/j.jisa.2019.102362","journal-title":"J. Inform. Secur. Appl."},{"key":"4145_CR17","doi-asserted-by":"publisher","first-page":"229","DOI":"10.3390\/electronics9020229","volume":"9","author":"FO Catak","year":"2020","unstructured":"Catak, F.O., Aydin, I., Elezaj, O., Yildirim-Yayilgan, S.: Practical implementation of privacy preserving clustering methods using a partially homomorphic encryption algorithm. Electronics 9, 229 (2020). https:\/\/doi.org\/10.3390\/electronics9020229","journal-title":"Electronics"},{"key":"4145_CR18","doi-asserted-by":"publisher","unstructured":"Zhang, L., Xu, J., Vijayakumar, P., Sharma, P.K., Ghosh, U. Homomorphic encryption-based privacy-preserving federated learning in iot-enabled healthcare system. IEEE Transactions on Network Science and Engineering, pages 1\u201317, (2022). https:\/\/doi.org\/10.1109\/TNSE.2022.3185327","DOI":"10.1109\/TNSE.2022.3185327"},{"key":"4145_CR19","volume-title":"ElGamal: Public-Key Cryptosystem","author":"KG Jaspreet","year":"2015","unstructured":"Jaspreet, K.G.: ElGamal: Public-Key Cryptosystem. Indiana State University, Math and Computer Science Department, Terre Haute (2015)"},{"key":"4145_CR20","unstructured":"nVotes. Multiplicative vs additive homomorphic elgamal, 1 2020. URL: https:\/\/nvotes.com\/multiplicative-vs-additive-homomorphic-elgamal\/"},{"key":"4145_CR21","doi-asserted-by":"publisher","unstructured":"Batool, Z., Zhang, K., Toews, M. Fl-mab: client selection and monetization for blockchain-based federated learning. pages 299\u2013307. ACM, 4 (2022). https:\/\/doi.org\/10.1145\/3477314.3507050","DOI":"10.1145\/3477314.3507050"},{"key":"4145_CR22","doi-asserted-by":"publisher","first-page":"3316","DOI":"10.1109\/TII.2020.3036166","volume":"18","author":"A Fu","year":"2022","unstructured":"Fu, A., Zhang, X., Xiong, N., Gao, Y., Wang, H., Zhang, J.: Vfl: A verifiable federated learning with privacy-preserving for big data in industrial iot. IEEE Trans. Indus. Inform. 18, 3316\u20133326 (2022). https:\/\/doi.org\/10.1109\/TII.2020.3036166","journal-title":"IEEE Trans. Indus. Inform."},{"key":"4145_CR23","doi-asserted-by":"publisher","first-page":"1333","DOI":"10.1109\/TII.2021.3095506","volume":"18","author":"Z Su","year":"2022","unstructured":"Su, Z., Wang, Y., Luan, T.H., Zhang, N., Li, F., Chen, T., Cao, H.: Secure and efficient federated learning for smart grid with edge-cloud collaboration. IEEE Trans. Indus. Inform. 18, 1333\u20131344 (2022). https:\/\/doi.org\/10.1109\/TII.2021.3095506","journal-title":"IEEE Trans. Indus. Inform."},{"key":"4145_CR24","doi-asserted-by":"publisher","first-page":"2430","DOI":"10.1109\/JSAC.2020.3000372","volume":"38","author":"M Song","year":"2020","unstructured":"Song, M., Wang, Z., Zhang, Z., Song, Y., Wang, Q., Ren, J., Qi, H.: Analyzing user-level privacy attack against federated learning. IEEE J. Select. Areas Commun. 38, 2430\u20132444 (2020). https:\/\/doi.org\/10.1109\/JSAC.2020.3000372","journal-title":"IEEE J. Select. Areas Commun."},{"key":"4145_CR25","doi-asserted-by":"publisher","unstructured":"Zhu, Ligeng, Han, Song: Deep Leakage from Gradients. (2020). https:\/\/doi.org\/10.1007\/978-3-030-63076-8_2","DOI":"10.1007\/978-3-030-63076-8_2"},{"key":"4145_CR26","doi-asserted-by":"publisher","unstructured":"Luo, X., Wu, Y., Xiao, X., Ooi, B.C. Feature inference attack on model predictions in vertical federated learning. pages 181\u2013192. IEEE, 4 (2021). https:\/\/doi.org\/10.1109\/ICDE51399.2021.00023","DOI":"10.1109\/ICDE51399.2021.00023"},{"key":"4145_CR27","doi-asserted-by":"publisher","first-page":"1092","DOI":"10.1109\/TC.2021.3072033","volume":"71","author":"L Feng","year":"2022","unstructured":"Feng, L., Zhao, Y., Guo, S., Qiu, X., Li, W., Yu, P.: Bafl: A blockchain-based asynchronous federated learning framework. IEEE Trans. Comput. 71, 1092\u20131103 (2022). https:\/\/doi.org\/10.1109\/TC.2021.3072033","journal-title":"IEEE Trans. Comput."},{"issue":"4","key":"4145_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3524104","volume":"55","author":"Y Qu","year":"2022","unstructured":"Qu, Y., Uddin, M.P., Gan, C., Xiang, Y., Gao, L., Yearwood, J.: Blockchain-enabled federated learning: A survey. ACM Comput. Surv. 55(4), 1\u201335 (2022). https:\/\/doi.org\/10.1145\/3524104","journal-title":"ACM Comput. Surv."},{"key":"4145_CR29","doi-asserted-by":"publisher","first-page":"1279","DOI":"10.1109\/LCOMM.2019.2921755","volume":"24","author":"H Kim","year":"2020","unstructured":"Kim, H., Park, J., Bennis, M., Kim, S.-L.: Blockchained on-device federated learning. IEEE Commun. Lett. 24, 1279\u20131283 (2020). https:\/\/doi.org\/10.1109\/LCOMM.2019.2921755","journal-title":"IEEE Commun. Lett."},{"key":"4145_CR30","doi-asserted-by":"publisher","first-page":"10700","DOI":"10.1109\/JIOT.2019.2940820","volume":"6","author":"J Kang","year":"2019","unstructured":"Kang, J., Xiong, Z., Niyato, D., Xie, S., Zhang, J.: Incentive mechanism for reliable federated learning: A joint optimization approach to combining reputation and contract theory. IEEE Internet Things J. 6, 10700\u201310714 (2019). https:\/\/doi.org\/10.1109\/JIOT.2019.2940820","journal-title":"IEEE Internet Things J."},{"key":"4145_CR31","doi-asserted-by":"publisher","first-page":"1910","DOI":"10.1109\/TVT.2021.3055767","volume":"70","author":"J Kang","year":"2021","unstructured":"Kang, J., Xiong, Z., Li, X., Zhang, Y., Niyato, D., Leung, C., Miao, C.: Optimizing task assignment for reliable blockchain-empowered federated edge learning. IEEE Trans. Veh. Technol. 70, 1910\u20131923 (2021). https:\/\/doi.org\/10.1109\/TVT.2021.3055767","journal-title":"IEEE Trans. Veh. Technol."},{"key":"4145_CR32","doi-asserted-by":"publisher","first-page":"2964","DOI":"10.1109\/TII.2020.3007817","volume":"17","author":"Y Qu","year":"2021","unstructured":"Qu, Y., Pokhrel, S.R., Garg, S., Gao, L., Xiang, Y.: A blockchained federated learning framework for cognitive computing in industry 4.0 networks. IEEE Trans. Ind. Inform. 17, 2964\u20132973 (2021). https:\/\/doi.org\/10.1109\/TII.2020.3007817","journal-title":"IEEE Trans. Ind. Inform."},{"key":"4145_CR33","doi-asserted-by":"publisher","first-page":"4049","DOI":"10.1109\/TII.2021.3085960","volume":"18","author":"B Jia","year":"2022","unstructured":"Jia, B., Zhang, X., Liu, J., Zhang, Y., Huang, K., Liang, Y.: Blockchain-enabled federated learning data protection aggregation scheme with differential privacy and homomorphic encryption in iiot. IEEE Trans. Ind. Inform. 18, 4049\u20134058 (2022). https:\/\/doi.org\/10.1109\/TII.2021.3085960","journal-title":"IEEE Trans. Ind. Inform."},{"key":"4145_CR34","doi-asserted-by":"publisher","first-page":"8485","DOI":"10.1109\/TII.2021.3075706","volume":"17","author":"M Habib","year":"2021","unstructured":"Habib, M., Rehman, M., Ahmed, D., Salah, K., Damiani, E., Svetinovic, D.: Trustfed: A framework for fair and trustworthy cross-device federated learning in iiot. IEEE Trans. Ind. Inform. 17, 8485\u20138494 (2021). https:\/\/doi.org\/10.1109\/TII.2021.3075706","journal-title":"IEEE Trans. Ind. Inform."},{"key":"4145_CR35","unstructured":"Ethereum Foundation. web3.py, 2023. URL: https:\/\/web3py.readthedocs.io\/en\/stable\/"},{"key":"4145_CR36","unstructured":"Protocol Labs. Ipfs powers the distributed web, 2023. URL: https:\/\/ipfs.tech\/"},{"key":"4145_CR37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_15","volume-title":"Homomorphic encryption for arithmetic of approximate numbers","author":"HC Jung","year":"2017","unstructured":"Jung, H.C., Andrey, K., Miran, K., Yongsoo, S.: Homomorphic encryption for arithmetic of approximate numbers. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70694-8_15"},{"key":"4145_CR38","doi-asserted-by":"crossref","unstructured":"Ibarrondo, A., Viand, A. Pyfhel: Python for homomorphic encryption libraries. In Proceedings of the 9th on Workshop on Encrypted Computing & Applied Homomorphic Cryptography, pages 11\u201316, (2021)","DOI":"10.1145\/3474366.3486923"},{"issue":"6","key":"4145_CR39","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2535925","volume":"60","author":"Vadim Lyubashevsky","year":"2013","unstructured":"Lyubashevsky, Vadim, Peikert, Chris, Regev, Oded: On ideal lattices and learning with errors over rings. J. ACM (JACM) 60(6), 1\u201335 (2013)","journal-title":"J. ACM (JACM)"},{"key":"4145_CR40","doi-asserted-by":"crossref","unstructured":"Albrecht, Martin, Chase, Melissa, Chen, Hao, Ding, Jintai, Goldwasser, Shafi, Gorbunov, Sergey, Halevi, Shai, Hoffstein, Jeffrey, Laine, Kim, Lauter, Kristin: et\u00a0al. Homomorphic encryption standard. Protecting privacy through homomorphic encryption, pages 31\u201362, (2021)","DOI":"10.1007\/978-3-030-77287-1_2"},{"issue":"1","key":"4145_CR41","doi-asserted-by":"publisher","first-page":"1127","DOI":"10.1109\/TVT.2022.3205307","volume":"72","author":"J Lee","year":"2022","unstructured":"Lee, J., Ko, H., Seo, S., Pack, S.: Data distribution-aware online client selection algorithm for federated learning in heterogeneous networks. IEEE Trans. Veh. Technol. 72(1), 1127\u20131136 (2022). https:\/\/doi.org\/10.1109\/TVT.2022.3205307","journal-title":"IEEE Trans. Veh. Technol."},{"key":"4145_CR42","doi-asserted-by":"publisher","first-page":"18378","DOI":"10.1109\/JIOT.2022.3160425","volume":"9","author":"J Qi","year":"2022","unstructured":"Qi, J., Lin, F., Chen, Z., Tang, C., Jia, R., Li, M.: High-quality model aggregation for blockchain-based federated learning via reputation-motivated task participation. IEEE Internet Things J. 9, 18378\u201318391 (2022). https:\/\/doi.org\/10.1109\/JIOT.2022.3160425","journal-title":"IEEE Internet Things J."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-023-04145-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-023-04145-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-023-04145-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,29]],"date-time":"2024-05-29T21:13:07Z","timestamp":1717017187000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-023-04145-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,24]]},"references-count":42,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,6]]}},"alternative-id":["4145"],"URL":"https:\/\/doi.org\/10.1007\/s10586-023-04145-0","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,9,24]]},"assertion":[{"value":"26 July 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 August 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 September 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 September 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}