{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T15:38:47Z","timestamp":1767713927192,"version":"3.48.0"},"reference-count":183,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T00:00:00Z","timestamp":1767657600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T00:00:00Z","timestamp":1767657600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2026,4]]},"DOI":"10.1007\/s10586-025-05871-3","type":"journal-article","created":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T15:32:58Z","timestamp":1767713578000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A comprehensive survey on record management system using blockchain"],"prefix":"10.1007","volume":"29","author":[{"given":"Shruti","family":"Jadon","sequence":"first","affiliation":[]},{"given":"H. S. Manoj","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Bhuvan Vijay","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Shaik Adeeba","family":"Saher","sequence":"additional","affiliation":[]},{"given":"S. M.","family":"Chandana","sequence":"additional","affiliation":[]},{"given":"Prasad B.","family":"Honnavalli","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,6]]},"reference":[{"key":"5871_CR1","doi-asserted-by":"publisher","unstructured":"Sindiramutty, S.R., Tan, C.E., Goh, W.W., Balakrishnan, S., Hamzah, N., Akbar, R.: Securing the Supply Chain: Cybersecurity Strategies for Logistics Resilience. In Navigating Cyber Threats and Cybersecurity in the Logistics Industry; p. 66 (2024). ISBN: 9798369338162. https:\/\/doi.org\/10.4018\/979-8-3693-3816-2.ch011","DOI":"10.4018\/979-8-3693-3816-2.ch011"},{"key":"5871_CR2","unstructured":"Tuffley, D.: 7019ICT Cyber Security Risk Management Course Notes. Senior Lecturer, School of ICT, Griffith University, 2024. A comprehensive coverage of cybersecurity standards, frameworks, and operational procedures for cybersecurity professionals. Copyright David Tuffley Griffith University. All rights reserved (2024)"},{"key":"5871_CR3","doi-asserted-by":"publisher","unstructured":"McGrow, K.: Empowering Nurses with Technology: A Practical Guide to Nurse Informatics, 1st ed.; Productivity Press: New York, 2025; eBook Published 23 January; P. 212 (2025). https:\/\/doi.org\/10.4324\/9781003439721. eBook ISBN: 9781003439721","DOI":"10.4324\/9781003439721"},{"key":"5871_CR4","doi-asserted-by":"publisher","unstructured":"Singla, A., Tanwar, S., Hsiung, P.-A. (Eds.) Artificial Intelligence and Internet of Things based Augmented Trends for Data Driven Systems, 1st ed.; CRC Press: Boca Raton, 2024; eBook Published 31 P. 296 (2024). https:\/\/doi.org\/10.1201\/9781003497318. eBook ISBN: 9781003497318","DOI":"10.1201\/9781003497318"},{"key":"5871_CR5","unstructured":"Chandrasekaram, B.: Preface to \u2019EduQual\u2019: A Blockchain-based Platform to Securely Track Trace Educational Qualifications. Journal of Algebraic Statistics, 13(3), 275-281 (2022). ISSN: 1309-3452. Available online: https:\/\/publishoa.com"},{"key":"5871_CR6","unstructured":"O\u2019Sullivan, A.: Chainlog: A Logic-based Smart Contract Language. Supervisor: Dr. N. Dulay; Second Marker: Prof. E. Lupu. 20 (2022)"},{"key":"5871_CR7","unstructured":"Arghire, I.: PharMerica Discloses Data Breach Impacting 5.8 Million Individuals. Security Week, 15, (2023). https:\/\/www.securityweek.com\/pharmerica-discloses-data-breach-impacting-5-8-million-individuals\/"},{"key":"5871_CR8","unstructured":"McKeon, J.: PharMerica Notifies 5.8M Individuals of Healthcare Data Breach. HealthTech Security, 15 (2023). Available online: https:\/\/www.techtarget.com\/healthtechsecurity\/news\/366594228\/PharMerica-Notifies-58M-Individuals-of-Healthcare-Data-Breach"},{"key":"5871_CR9","unstructured":"Johns Hopkins University: Health System Data Breach. Edelson Lechtzin LLP, 22, (2023). https:\/\/www.edelson-law.com\/data-breach-class-actions\/johns-hopkins-university-and-health-system-data-breach\/"},{"key":"5871_CR10","unstructured":"FasterCapital, Critical Infrastructure, available at: https:\/\/fastercapital.com\/keyword\/critical-infrastructure.html"},{"key":"5871_CR11","first-page":"667","volume":"88","author":"X Zhu","year":"2018","unstructured":"Zhu, X., Badr, Y.: Identity Management Systems for the Internet of Things: A Survey Towards Blockchain Solutions. Futur. Gener. Comput. Syst. 88, 667\u2013678 (2018)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"14","key":"5871_CR12","first-page":"3261","volume":"19","author":"MA Bouras","year":"2019","unstructured":"Bouras, M.A., Lu, Q., Zhang, F., Wan, Y., Zhang, T., Ning, H.: Distributed Ledger Technology for eHealth Identity Privacy: State of The Art and Future Perspective. Sensors 19(14), 3261 (2019)","journal-title":"Sensors"},{"key":"5871_CR13","unstructured":"Alamri, B., Crowley, K., Richardson, I.: Blockchain-Based Identity Management Systems in Health IoT: A Systematic Review. Journal of Healthcare Engineering, (2020)"},{"key":"5871_CR14","first-page":"140151","volume":"8","author":"MR Ahmed","year":"2020","unstructured":"Ahmed, M.R., Islam, A.K.M.M., Shatabda, S., Islam, S.: Blockchain-Based Identity Management System and Self-Sovereign Identity Ecosystem: A Comprehensive Survey. IEEE Access 8, 140151\u2013140168 (2020)","journal-title":"IEEE Access"},{"key":"5871_CR15","volume":"37","author":"T Rathee","year":"2020","unstructured":"Rathee, T., Singh, P.: A systematic literature mapping on secure identity management using blockchain technology. Computer Science Review 37, 100279 (2020)","journal-title":"Computer Science Review"},{"key":"5871_CR16","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2019.2926471","author":"M Kuperberg","year":"2020","unstructured":"Kuperberg, M.: Blockchain-Based Identity Management: A Survey From the Enterprise and Ecosystem Perspective. IEEE Transactions on Engineering Management (2020). https:\/\/doi.org\/10.1109\/TEM.2019.2926471","journal-title":"IEEE Transactions on Engineering Management"},{"issue":"2","key":"5871_CR17","first-page":"437","volume":"36","author":"Y Liu","year":"2021","unstructured":"Liu, Y., He, D., Obaidat, M.S., Kumar, N., Khan, M.K., Choo, K.-K.R.: Blockchain-Based Identity Management Systems: A Review. J. Comput. Sci. Technol. 36(2), 437\u2013452 (2021)","journal-title":"J. Comput. Sci. Technol."},{"key":"5871_CR18","doi-asserted-by":"crossref","unstructured":"Houtan, B., Hafid, A. S., Dias, D.: A Survey on Blockchain-Based Self-Sovereign Patient Identity in Healthcare. IEEE Access, (2021)","DOI":"10.1109\/ACCESS.2020.2994090"},{"key":"5871_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2025.100750","volume":"57","author":"M Adil","year":"2025","unstructured":"Adil, M., Farouk, A., Ali, A., Song, H., Jin, Z.: Securing Tomorrow of Next-Generation Technologies with Biometrics, State-of-The-Art Techniques, Open Challenges, and Future Research Directions. Computer Science Review 57, 100750 (2025)","journal-title":"Computer Science Review"},{"key":"5871_CR20","doi-asserted-by":"publisher","first-page":"1545528","DOI":"10.3389\/fmed.2025.1545528","volume":"12","author":"R Ullah","year":"2025","unstructured":"Ullah, R., Sarwar, N., Alatawi, M.N., Alsadhan, A.A., Salamah Alwageed, H., Khan, M., Ali, A.: Advancing personalized diagnosis and treatment using deep learning architecture. Front. Med. 12, 1545528 (2025)","journal-title":"Front. Med."},{"issue":"3","key":"5871_CR21","doi-asserted-by":"publisher","first-page":"22287","DOI":"10.48084\/etasr.10287","volume":"15","author":"AA Al-Maari","year":"2025","unstructured":"Al-Maari, A.A., Abdulnabi, M., Nathan, Y., Ali, A., Ali, U., Khan, M.: Optimized Credit Card Fraud Detection Leveraging Ensemble Machine Learning Methods Engineering. Technology & Applied Science Research 15(3), 22287\u201322294 (2025)","journal-title":"Technology & Applied Science Research"},{"issue":"1","key":"5871_CR22","doi-asserted-by":"publisher","first-page":"19776","DOI":"10.48084\/etasr.9148","volume":"15","author":"S Hussain","year":"2025","unstructured":"Hussain, S., Sarwar, N., Ali, A., Khan, H., Din, I., Alqahtani, A.M., Ali, A.: An Enhanced Random Forest (ERF)-based Machine Learning Framework for Resampling, Prediction, and Classification of Mobile Applications using Textual Features. Engineering, Technology & Applied Science Research 15(1), 19776\u201319781 (2025)","journal-title":"Engineering, Technology & Applied Science Research"},{"key":"5871_CR23","doi-asserted-by":"crossref","unstructured":"Adil, M., Farouk, A., Abulkasim, H., Ali, A., Song, H., Jin, Z.: NG-ICPS: Next Generation Industrial-CPS, Security Threats in the Era of Artificial Intelligence. Open Challenges With Future Research Directions, IEEE Internet of Things Journal (2024)","DOI":"10.1109\/JIOT.2024.3486659"},{"key":"5871_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.array.2025.100395","volume":"26","author":"F Naveed","year":"2025","unstructured":"Naveed, F., Masih, A., Mahmood, J., Ahmed, M., Ali, A., Saddiqa, A., Abdulnabi, Mohamed Shabbir Hamza., Agbozo, E.: Sustainable AI for plant disease classification using ResNet18 in few-shot learning. Array 26, 100395 (2025)","journal-title":"Array"},{"key":"5871_CR25","unstructured":"Masenya, T.M.: Application of Modern Technologies in the Management of Records in Public Libraries. Durban University of Technology, (2020). Received: 08 May 2020; Revised: 09 July 2020; Accepted: 29 August 2020. Email: tm.masenya@webmail.co.za"},{"key":"5871_CR26","doi-asserted-by":"crossref","unstructured":"Karkeraa, S.: Unlocking Blockchain on Azure: Design and Develop Decentralized Applications, 1st ed.; Apress: (2020). ISBN 1484250427, 9781484250426","DOI":"10.1007\/978-1-4842-5043-3_1"},{"issue":"1","key":"5871_CR27","first-page":"1","volume":"36","author":"C Sullivan","year":"2020","unstructured":"Sullivan, C., Burger, E.: E-residency and blockchain. Computer Law & Security Review 36(1), 1\u201313 (2020)","journal-title":"Computer Law & Security Review"},{"key":"5871_CR28","unstructured":"Namperumal, G., Sivathapandi, P., Venkatachalam, D.: The role of blockchain technology in enhancing data integrity and transparency in cloud-based human capital management solutions (2024)"},{"key":"5871_CR29","unstructured":"Seneca Polytechnic. Freedom of Information and Protection of Privacy Policy. Available online: https:\/\/www.senecapolytechnic.ca\/about\/policies\/freedom-of-information-and-protection-of-privacy-policy.html"},{"key":"5871_CR30","volume-title":"Electronic Records and Traditional Archival Values in Digital Era","author":"GR Kanwar","year":"2020","unstructured":"Kanwar, G.R.: Electronic Records and Traditional Archival Values in Digital Era. G.B. Pant University of Agriculture Technology, Pantnagar, Uttarakhand, Assistant Librarian, University Library (2020)"},{"key":"5871_CR31","unstructured":"Zhang, P., Schmidt, D. C., White, J., Lenz, G.: Chapter One - Blockchain Technology Use Cases in Healthcare. (2024)"},{"key":"5871_CR32","unstructured":"FAR EASTERN UNIVERSITY, Institute of Nursing. 1st Semester \u2013 AY 2021-2022 NUR 1219- NCM 118 Nursing Care of Clients with Life-Threatening Conditions, Acute Illness\/ Multi-Organ Problems\/ High Acuity and Emergency Situations. Available online: https:\/\/www.coursehero.com\/file\/p762pol4\/1-Electronic-Medical-Record-EMR-An-electronic-digital-collection-of-medical\/"},{"issue":"2","key":"5871_CR33","doi-asserted-by":"publisher","first-page":"951","DOI":"10.1007\/s13369-024-09065-8","volume":"50","author":"SM Alshahrani","year":"2025","unstructured":"Alshahrani, S.M.: Disrupting the Status Quo: Blockchain\u2019s Potential for Overhauling Conventional Academic Systems. Arab. J. Sci. Eng. 50(2), 951\u2013971 (2025). https:\/\/doi.org\/10.1007\/s13369-024-09065-8","journal-title":"Arab. J. Sci. Eng."},{"key":"5871_CR34","unstructured":"Sound Development City, \u201cHow can UK logistics companies integrate AI for real-time route optimization?\u201d, Available at: https:\/\/sound-development-city.com\/1744\/how-can-uk-logistics-companies-integrate-ai-for-real-time-route-optimization\/,"},{"key":"5871_CR35","unstructured":"Fakir, F.Z., Baydeniz, E.: The Future of Blockchain in Tourism and Hospitality: Global Insights, (2024)"},{"key":"5871_CR36","unstructured":"Zhu, L., Gai, K., Li, M.: Blockchain Technology in Internet of Things, (2024)"},{"key":"5871_CR37","unstructured":"Dwork, C., Naor, M.: Pricing via Processing or Combatting Junk Mail. In Proceedings of the 12th Annual International Cryptology Conference, (1992)"},{"key":"5871_CR38","unstructured":"Treiblmaier, H., Beck, R. (Eds.) Business Transformation through Blockchain, (2024)"},{"key":"5871_CR39","doi-asserted-by":"publisher","DOI":"10.1201\/9781003437079","volume-title":"WSN and IoT: An Integrated Approach for Smart Applications","author":"S Rani","year":"2024","unstructured":"Rani, S., Taneja, A.: WSN and IoT: An Integrated Approach for Smart Applications. (2024)"},{"key":"5871_CR40","unstructured":"Anglen, J.: AI and Blockchain for a Sustainable Future in 2024. Retrieved from https:\/\/www.rapidinnovation.io\/post\/harnessing-ai-blockchain-sustainable-decentralized-finance-2024, (2024)"},{"key":"5871_CR41","unstructured":"Yingo: \"Does Blockchain Require Knowledge of Mathematics,\" ICO Crypto News, (2024). [Online]. Available: https:\/\/yingo.ca\/articles\/does-blockchain-require-knowledge-of-mathematics. [Accessed: 17-Jan-2025]"},{"key":"5871_CR42","unstructured":"Alkhodair, A.J.M.: Scalable Next Generation Blockchains for Large Scale Complex Cyber-Physical Systems and Their Embedded Systems in Smart Cities"},{"key":"5871_CR43","unstructured":"Goyal, D., Pratap, B., Gupta, S., Raj, S., Agrawal, R. R., Kishor, I. (Eds.). Recent Advances in Sciences, Engineering, Information Technology & Management"},{"key":"5871_CR44","unstructured":"Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System. White Paper, (2008)"},{"key":"5871_CR45","unstructured":"Anglen, J.: Revolutionizing Cybersecurity with Blockchain-Enhanced Protocols in 2024 (2024)"},{"key":"5871_CR46","doi-asserted-by":"crossref","unstructured":"Ramasamy, L. K., Khan, F.: Blockchain for Global Education (2024)","DOI":"10.1007\/978-3-031-52123-2"},{"key":"5871_CR47","unstructured":"Wood, G.: Ethereum: A Secure Decentralized Generalized Transaction Ledger. Ethereum Project Yellow Paper, (2014)"},{"key":"5871_CR48","doi-asserted-by":"crossref","unstructured":"Singhal, N., Goyal, S., Singhal, T.: Potential, Risks, and Ethical Implications of Decentralized Insurance (2024)","DOI":"10.1007\/978-981-97-5894-4"},{"key":"5871_CR49","unstructured":"Nakamoto, S.: \"Bitcoin: A Peer-to-Peer Electronic Cash System,\" (2009)"},{"key":"5871_CR50","doi-asserted-by":"crossref","unstructured":"AlBadi, A., Hajamohideen, F., AlSaqri, D.: A Review on Blockchain Techniques Used for Identity Management System: Privacy and Access Control (2024)","DOI":"10.1007\/978-3-031-40579-2_35"},{"key":"5871_CR51","unstructured":"Yingo: Unlocking the Power and Potential of Blockchain \u2013 A Comprehensive Guide to Understanding and Utilizing Blockchain Technology (2024). Retrieved from https:\/\/yingo.ca\/articles\/unlocking-the-power-and-potential-of-blockchain-a-comprehensive-guide-to-understanding-and-utilizing-blockchain-technology"},{"key":"5871_CR52","doi-asserted-by":"crossref","unstructured":"Chhabra, G., Kaushik, K.: Understanding the Metaverse. Presented at the (2024)","DOI":"10.1007\/978-981-97-2278-5"},{"key":"5871_CR53","unstructured":"Tapscott, D., Tapscott, A.: Blockchain Revolution: How the Technology Behind Bitcoin and Other Cryptocurrencies is Changing the World. Penguin, (2016)"},{"key":"5871_CR54","first-page":"136551","volume":"7","author":"M Szmigiera","year":"2019","unstructured":"Szmigiera, M.: Blockchain Technology: A Survey. IEEE Access 7, 136551\u2013136572 (2019)","journal-title":"IEEE Access"},{"key":"5871_CR55","unstructured":"Powell, M.: Decentralized identities: The future of cybersecurity (2024). Retrieved from https:\/\/www.cpomagazine.com\/cyber-security\/decentralized-identities-the-future-of-cybersecurity\/"},{"key":"5871_CR56","doi-asserted-by":"publisher","first-page":"2292","DOI":"10.1109\/ACCESS.2016.2566339","volume":"4","author":"K Christidis","year":"2016","unstructured":"Christidis, K., Devetsikiotis, M.: Blockchains and Smart Contracts for the Internet of Things. IEEE Access 4, 2292\u20132303 (2016)","journal-title":"IEEE Access"},{"key":"5871_CR57","unstructured":"Paksoy, T., Kochan, C. G., Ali, S. S. (Eds.). Logistics 4.0: Digital transformation of supply chain management. Springer (2024)"},{"issue":"2","key":"5871_CR58","first-page":"854","volume":"13","author":"J Scott","year":"2017","unstructured":"Scott, J.: Blockchain for Supply Chain Management: A Must-Have Guide. IEEE Trans. Industr. Inf. 13(2), 854\u2013865 (2017)","journal-title":"IEEE Trans. Industr. Inf."},{"issue":"2","key":"5871_CR59","first-page":"195","volume":"13","author":"L Mariani","year":"2020","unstructured":"Mariani, L., Minerva, P.: Blockchain Technology for Supply Chain Management: A Systematic Literature Review. Journal of Industrial Engineering and Management 13(2), 195\u2013214 (2020)","journal-title":"Journal of Industrial Engineering and Management"},{"issue":"8","key":"5871_CR60","first-page":"139","volume":"12","author":"B Mohanta","year":"2021","unstructured":"Mohanta, B., Patra, R.R., Behera, S.S.: Blockchain for Supply Chain Transparency and Security. Int. J. Adv. Comput. Sci. Appl. 12(8), 139\u2013149 (2021)","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"5871_CR61","unstructured":"FasterCapital. Blockchain technology and its core characteristics (2024). Retrieved from https:\/\/fastercapital.com\/topics\/blockchain-technology-and-its-core-characteristics.html"},{"issue":"9","key":"5871_CR62","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5120\/ijca2020920362","volume":"175","author":"A Gupta","year":"2020","unstructured":"Gupta, A., Soni, S.: Blockchain for secure and transparent supply chain. International Journal of Computer Applications 175(9), 1\u20137 (2020)","journal-title":"International Journal of Computer Applications"},{"key":"5871_CR63","unstructured":"Panda, S. K., Jena, A. K., Swain, S. K., Satapathy, S. C. (Eds.). (2024). Blockchain technology: Applications and challenges"},{"key":"5871_CR64","unstructured":"Kim, J.: The Future of Auditing: Harnessing Blockchain and Emerging Technology, and Understanding the Impact of Exogenous Shocks, Rutgers The State University of New Jersey, Graduate School - Newark, ProQuest Dissertations & Theses, 30488085 (2023)"},{"key":"5871_CR65","doi-asserted-by":"publisher","unstructured":"Shetty, S., Kamhoua, C., Njilla, L.: Blockchain for Distributed Systems Security, John Wiley & Sons, Inc., (2019). Print ISBN: 9781119519607, Online ISBN: 9781119519621, https:\/\/doi.org\/10.1002\/9781119519621","DOI":"10.1002\/9781119519621"},{"key":"5871_CR66","doi-asserted-by":"crossref","unstructured":"Androulaki, E., et\u00a0al.: Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains. In Proceedings of the 13th EuroSys Conference, (2018)","DOI":"10.1145\/3190508.3190538"},{"key":"5871_CR67","doi-asserted-by":"crossref","unstructured":"Abdelmohsen, D., Abdelkader, T., Hashem, M.: \"A Review on Privacy and Anonymity in Blockchain Security,\" IEEE, (2024)","DOI":"10.1109\/ICICIS58388.2023.10391174"},{"key":"5871_CR68","unstructured":"Sompolinsky, Y., Zohar, A.: Secure High-Throughput Transactions in Bitcoin and Ethereum Blockchains. In Proceedings of the 2016 IEEE European Symposium on Security and Privacy, (2016)"},{"key":"5871_CR69","unstructured":"Sangfor Technologies, \"Blockchain Security: Key Concepts, Threats, and Future Trends,\" 15 (2024). Available: https:\/\/www.sangfor.com\/glossary\/cybersecurity\/blockchain-security-key-concepts-threats-and-future-trends"},{"key":"5871_CR70","unstructured":"Dinh, T. T. A., et\u00a0al.: Blockchain in Industry 4.0: A Survey. IEEE Access, (2017)"},{"key":"5871_CR71","unstructured":"Filipsson, F.: \"Blockchain Technology and Its Future in Global Finance,\" Redress Compliance. Available: https:\/\/redresscompliance.com\/blockchain-technology-and-its-future-in-global-finance\/"},{"key":"5871_CR72","unstructured":"Caro, F., et\u00a0al.: Overview of Blockchain Technology: Architecture, Consensus, and Future Trends. Journal of Blockchain Research, (2017)"},{"key":"5871_CR73","unstructured":"Dimitri Nek, \"Blockchain Hosting: Exploring Types, Costs, and Considerations,\" Available: https:\/\/webhostinggeeks.com\/blog\/blockchain-hosting-exploring-types-costs-and-considerations\/"},{"key":"5871_CR74","unstructured":"Abbas, H. S., Shah, M. A.: Hybrid Blockchain for Smart City: A Survey. Journal of Network and Computer Applications, (2020)"},{"key":"5871_CR75","unstructured":"Szabo, N.: The Idea of Smart Contracts. The Journal of Distributed Computing, (1994)"},{"key":"5871_CR76","unstructured":"FasterCapital, \"Bitcoin PoW,\" Available: https:\/\/www.fastercapital.com\/keyword\/bitcoin-pow.html"},{"key":"5871_CR77","doi-asserted-by":"crossref","unstructured":"Ravani, A., Edupuganti, S., Pugh, J., Sushama, S.: Applications of Blockchain Technology: An Industry Focus, (2024)","DOI":"10.1201\/9781003384809"},{"key":"5871_CR78","unstructured":"Buterin, V.: A Next-Generation Smart Contract and Decentralized Application Platform. Ethereum White Paper, (2014)"},{"key":"5871_CR79","unstructured":"FasterCapital, \"DCV Leverages,\" Available: https:\/\/fastercapital.com\/keyword\/dcv-leverages.html"},{"key":"5871_CR80","unstructured":"Ryan, L.: Delegated Proof of Stake: A New Blockchain Consensus Algorithm. Blockchain Journal, (2014)"},{"key":"5871_CR81","unstructured":"Castro, M., Liskov, B.: Practical Byzantine Fault Tolerance. In Proceedings of the 3rd Symposium on Operating Systems Design and Implementation, (1999)"},{"key":"5871_CR82","unstructured":"Ongaro, D., Ousterhout, J.: In Search of an Understandable Consensus Algorithm. USENIX Annual Technical Conference, (2014)"},{"key":"5871_CR83","unstructured":"FasterCapital, \"Symmetric, Asymmetric, and Hybrid Encryption Methods,\" Available: https:\/\/fastercapital.com\/topics\/symmetric,-asymmetric,-and-hybrid-encryption-methods.html"},{"key":"5871_CR84","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-73125-9","volume-title":"Proceedings of the Future Technologies Conference (FTC) 2024, Volume 2","author":"K Arai","year":"2024","unstructured":"Arai, K.: Proceedings of the Future Technologies Conference (FTC) 2024, Volume 2. (2024)"},{"key":"5871_CR85","doi-asserted-by":"crossref","unstructured":"Murugan, T., Singh, W. J. (Eds.) Cybersecurity and Data Science Innovations for Sustainable Development of HEICC: Healthcare, Education, Industry, Cities, and Communities, (2024)","DOI":"10.1201\/9781032711300"},{"key":"5871_CR86","doi-asserted-by":"publisher","unstructured":"Sheela, D.V., Chitra,R.: Securing Online Quiz Management through Blockchain Technology and Three-Tier Cryptography with Hash-based Authentication. In 2023 7th International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), 135-144, (2023). https:\/\/doi.org\/10.1109\/I-SMAC58438.2023.10290272","DOI":"10.1109\/I-SMAC58438.2023.10290272"},{"key":"5871_CR87","doi-asserted-by":"publisher","DOI":"10.1007\/979-8-8688-1023-7","volume-title":"Introduction to Data Governance for Machine Learning Systems: Fundamental Principles, Critical Practices, and Future Trends","author":"AN Prasad","year":"2024","unstructured":"Prasad, A.N.: Introduction to Data Governance for Machine Learning Systems: Fundamental Principles, Critical Practices, and Future Trends. (2024)"},{"key":"5871_CR88","unstructured":"Kosinski, M., Forrest, A.: What is Identity and Access Management (IAM)? Available online: https:\/\/www.ibm.com\/think\/topics\/identity-access-management?gad_source=1&gclid= &p1=Search &p4=43700062230082296 &p5=p"},{"key":"5871_CR89","doi-asserted-by":"crossref","unstructured":"Younas, M., Awan, I., Kryvinska, N., Bentahar, J., \u00dcnal, P. (Eds.) The 5th Joint International Conference on AI, Big Data and Blockchain (ABB 2024), (2024)","DOI":"10.1007\/978-3-031-73151-8"},{"key":"5871_CR90","unstructured":"Sandupama, K.L.D.G.: \u201cICT Individual Assignment 11,\u201d Batch 30B, Available at: https:\/\/www.coursehero.com\/file\/p6tqure\/ICT-Individual-Assignment-11-P-a-g-e-Batch-30B-Part-2-Describe-and-evaluate-data\/, Accessed on: [insert access date]"},{"key":"5871_CR91","unstructured":"\u201cCloud Application Security: Ensuring Protection in Cloud-Based Environments,\u201d Hakia, Available at: https:\/\/hakia.com\/cloud-application-security-ensuring-protection-in-cloud-based-environments\/,"},{"key":"5871_CR92","unstructured":"Sutradhar, S., Karforma, S., Bose, R., Roy, S., Djebali, S., Bhattacharyya, D.: Internet of Things and Cyber-Physical Systems. In: Proceedings of the IEEE International Conference, (2020)"},{"key":"5871_CR93","unstructured":"Malamas, E.: \"Distributed Security and Trust Management in Multi-Authority and Multi-Domain Environments Based on Blockchain. Case Studies in Healthcare and Supply Chain Management Systems,\" University of Piraeus, ProQuest Dissertations & Theses, (2024). Available: https:\/\/www.proquest.com\/docview\/3122639850"},{"key":"5871_CR94","unstructured":"Jimma University, \"Blockchain Technology,\" Computer S 1021, CoachLightningNarwhal40, 5\/4\/2024. Available: https:\/\/www.coursehero.com\/file\/232721769\/Blockchain-Technologydocx\/"},{"key":"5871_CR95","doi-asserted-by":"publisher","unstructured":"El Ghazouani, M., Ikidid, A., Ait Zaouiat, C., Layla, A., Lachgar, M., Er-Rajy, L.: \"A Blockchain-based Method Ensuring Integrity of Shared Data in a Distributed-Control Intersection Network,\" International Journal of Advanced Computer Science and Applications (IJACSA), 14(10), (2023). https:\/\/doi.org\/10.14569\/IJACSA.2023.0141052","DOI":"10.14569\/IJACSA.2023.0141052"},{"key":"5871_CR96","unstructured":"ZMainframes, \"Mainframe Data Encryption: Safeguarding Sensitive Information,\" ZLog, 2024. [Online]. Available: https:\/\/zmainframes.com\/zlog\/mainframe-data-encryption-safeguarding-sensitive-information\/?noamp=mobile"},{"key":"5871_CR97","doi-asserted-by":"publisher","unstructured":"Chilamkurti, N., Poongodi, T., Balusamy, B.: Blockchain, Internet of Things, and Artificial Intelligence, 1st ed., New York: Chapman and Hall\/CRC, (2021). [Online]. Available: https:\/\/doi.org\/10.1201\/9780429352898","DOI":"10.1201\/9780429352898"},{"key":"5871_CR98","unstructured":"Noor, M.A.F., Khanum, S., Anwar, T., Ansari, M.: A Holistic View on Blockchain and Its Issues, (2024)"},{"key":"5871_CR99","unstructured":"FasterCapital, \"Encryption and Cryptography in Blockchain Security,\" (2024). [Online]. Available: https:\/\/fastercapital.com\/topics\/encryption-and-cryptography-in-blockchain-security.html. [Accessed: 17-Jan-2025]"},{"key":"5871_CR100","unstructured":"FasterCapital, \"Data Encryption Standard,\" (2024). [Online]. Available: https:\/\/fastercapital.com\/keyword\/data-encryption-standard.html. [Accessed: 17-Jan-2025]"},{"key":"5871_CR101","doi-asserted-by":"crossref","unstructured":"Darwish, S.M., Abu-Deif, M.M., Elkaffas, S.M.: \"Blockchain for video watermarking: An enhanced copyright protection approach for video forensics based on perceptual hash function,\" (2024)","DOI":"10.1371\/journal.pone.0308451"},{"issue":"1","key":"5871_CR102","first-page":"1","volume":"36","author":"C Sullivan","year":"2020","unstructured":"Sullivan, C., Burger, E.: E-residency and Blockchain. Computer Law & Security Review 36(1), 1\u201313 (2020)","journal-title":"Computer Law & Security Review"},{"key":"5871_CR103","doi-asserted-by":"crossref","unstructured":"Sharad Mangrulkar, R., Vijay Chavan, P.: \u201cBlockchain Essentials: Core Concepts and Implementations,.\u201d Presented at the (2024)","DOI":"10.1007\/978-1-4842-9975-3"},{"key":"5871_CR104","unstructured":"\"Cryptocurrency and Digital Marketing: What You Need to Know,\" Film Daily, (2024). [Online]. Available: https:\/\/filmdaily.co\/news\/cryptocurrency-and-digital-marketing-what-you-need-to-know\/"},{"issue":"7","key":"5871_CR105","doi-asserted-by":"publisher","first-page":"246","DOI":"10.3390\/fi16070246","volume":"16","author":"S Lazzaro","year":"2024","unstructured":"Lazzaro, S., Buccafurri, F.: Achieving Accountability and Data Integrity in Message Queuing Telemetry Transport Using Blockchain and Interplanetary File System. Future Internet 16(7), 246 (2024). https:\/\/doi.org\/10.3390\/fi16070246","journal-title":"Future Internet"},{"key":"5871_CR106","doi-asserted-by":"publisher","first-page":"2274","DOI":"10.1109\/ACCESS.2017.2782733","volume":"6","author":"J-H Lee","year":"2017","unstructured":"Lee, J.-H.: BIDaaS: Blockchain based ID as a service. IEEE Access 6, 2274\u20132278 (2017)","journal-title":"IEEE Access"},{"key":"5871_CR107","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1748","author":"A Ouaddah","year":"2017","unstructured":"Ouaddah, A., Elkalam, A.A., Ouahman, A.A.: FairAccess: a new Blockchain-based access control framework for the Internet of Things. Security and Communication Networks (2017). https:\/\/doi.org\/10.1002\/sec.1748","journal-title":"Security and Communication Networks"},{"key":"5871_CR108","doi-asserted-by":"crossref","unstructured":"Azouvi, S., Al-Bassam, M., Meiklejohn, S.: Who Am I? Secure Identity Registration on Distributed Ledgers. In: International Conference on Security Protocols, (2018)","DOI":"10.1007\/978-3-319-67816-0_21"},{"key":"5871_CR109","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1016\/j.csbj.2018.07.004","volume":"16","author":"P Zhang","year":"2018","unstructured":"Zhang, P., White, J., Schmidt, D.C., Lenz, G., Rosenbloom, S.T.: FHIRChain: Applying Blockchain to Securely and Scalably Share Clinical Data. Comput. Struct. Biotechnol. J. 16, 267\u2013278 (2018)","journal-title":"Comput. Struct. Biotechnol. J."},{"key":"5871_CR110","doi-asserted-by":"crossref","unstructured":"Buccafurri, F., Lax, G., Russo, A., Zunino, G.: Integrating Digital Identity and Blockchain. Lecture Notes in Computer Science (LNCS), (2019)","DOI":"10.1007\/978-3-030-02610-3_32"},{"key":"5871_CR111","first-page":"771","volume":"151","author":"F Loukil","year":"2019","unstructured":"Loukil, F., Ghedira, C., Boukadi, K., A\u00efcha-Nabila, B.: Towards an end-to-end IoT data privacy-preserving framework using blockchain technology. Procedia Computer Science 151, 771\u2013778 (2019)","journal-title":"Procedia Computer Science"},{"key":"5871_CR112","doi-asserted-by":"crossref","unstructured":"Alkouz, A., HajYasien, A., Alarabeyyat, A., Samara, K., Al-Saleh, M.: EPPR: Using Blockchain for Sharing Educational Records. Proceedings of the IEEE International Conference, (2020)","DOI":"10.1109\/ITT48889.2019.9075126"},{"key":"5871_CR113","doi-asserted-by":"crossref","unstructured":"Daniel, E., Tschorsch, F.: Towards Verifiable Mutability for Blockchains. Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency (ICBC), (2020)","DOI":"10.1109\/EuroSP51992.2021.00059"},{"key":"5871_CR114","doi-asserted-by":"crossref","unstructured":"Haveri, P., U B, R., Narayan, D. G., Nagaratna, K., Shivaraj, K.: EduBlock: Securing Educational Documents using Blockchain Technology. Proceedings of the International Conference, (2020)","DOI":"10.1109\/ICCCNT49239.2020.9225265"},{"key":"5871_CR115","unstructured":"Katta, S., Alrawashdeh, K., Adebayo, J., Tulasi, M.: Blockchain-based Distributed Hybrid Cloud Identity Management for Securing IoT Devices in the Cloud. Procedia Computer Science, (2020)"},{"key":"5871_CR116","doi-asserted-by":"crossref","unstructured":"Akkaoui, R., Hei, X., Cheng, W.: EdgeMediChain: A Hybrid Edge Blockchain-Based Framework for Health Data Exchange. IEEE Access, (2021)","DOI":"10.1109\/ACCESS.2020.3003575"},{"key":"5871_CR117","unstructured":"Deepa, V. V., Thamotharan, B., Mahto, D., Rajendiran, P., Sriram, A. L., Chandramohan, K.: Smart embedded health monitoring system and secure electronic health record (EHR) transactions using blockchain technology. IEEE Access, (2021)"},{"key":"5871_CR118","unstructured":"Elghoul, M. K., Bahgat, S. F., Hussein, A. S., Hamad, S. H.: Management of medical record data with multi?level security on Amazon Web Services. Journal of Cloud Computing, (2021)"},{"key":"5871_CR119","first-page":"45105","volume":"9","author":"AA Khan","year":"2021","unstructured":"Khan, A.A., Laghari, A.A., Shaikh, A.A., Mamlouk, A.M., Bourouis, S., Alshazly, H.: Educational Blockchain: A Secure Degree Attestation and Verification Traceability Architecture for Higher Education Commission. IEEE Access 9, 45105\u201345121 (2021)","journal-title":"IEEE Access"},{"key":"5871_CR120","doi-asserted-by":"crossref","unstructured":"Kairaldeen, A. R., Abdullah, N. F., Abu-Samah, A., Nordin, R.: Peer-to-Peer User Identity Verification Time Optimization in IoT Blockchain Network. IEEE Access, (2021)","DOI":"10.1155\/2021\/4401809"},{"key":"5871_CR121","doi-asserted-by":"crossref","unstructured":"Liao, C.-H., Yuan, S.-M.: Blockchain-Based Cross-Organizational Integrated Platform for Issuing and Redeeming Reward Points. IEEE Access, (2020)","DOI":"10.1145\/3368926.3369676"},{"key":"5871_CR122","unstructured":"Ma, Z., Jiang, M., Gao, H., Wang, Z.: Blockchain for digital rights management. Journal of Computer Science and Technology, (2021)"},{"key":"5871_CR123","unstructured":"Ozturk, S. B., Aydos, M.: A Blockchain-Based Decentralized Identity, Access Management, and Trust Evaluation Framework for IoT. IEEE Access, (2021)"},{"key":"5871_CR124","unstructured":"Saleh, O. S., Ghazali, O., Rana, M. E.: Blockchain Based Framework for Educational Certificates Verification. In: Proceedings of the IEEE International Conference, (2021)"},{"key":"5871_CR125","doi-asserted-by":"crossref","unstructured":"Shakan, Y., Kumalakov, B., Mutanov, G., Mamykova, Z., Kistaubayev, Y.: Verification of University Student and Graduate Data using Blockchain Technology. IEEE Access, (2021)","DOI":"10.15837\/ijccc.2021.5.4266"},{"key":"5871_CR126","unstructured":"Shaikh, Z. A., Khoumbati, K. U. R., Ghazali, O., Rana, M. E.: A Blockchain Based Framework for FinTech Insurance Applications. IEEE Access, (2021)"},{"key":"5871_CR127","unstructured":"Shrivastava, A. K., Vashistth, C., Rajak, A., Tripathi, A. K.: A Decentralized Way to Store and Authenticate Educational Documents on Private Blockchain. Proceedings of the IEEE International Conference, (2021)"},{"key":"5871_CR128","unstructured":"Singh, C., Warraich, J., Thakkar, R.: IAM Identity Access Management$$-$$Importance in Maintaining Security Systems within Organizations. IEEE Access, (2021)"},{"key":"5871_CR129","doi-asserted-by":"crossref","unstructured":"Dong, C., Jiang, F., Li, X., Yao, A., Li, G., Liu, X.: A Blockchain-aided Self-Sovereign Identity Framework for Edge-based UAV Delivery System. 2021 IEEE\/ACM 21st International Symposium on Cluster, Cloud and Internet Computing (CCGrid), (2021)","DOI":"10.1109\/CCGrid51090.2021.00074"},{"issue":"6","key":"5871_CR130","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TNSM.2022.3166006","volume":"31","author":"H Guo","year":"2022","unstructured":"Guo, H., Li, W., Nejad, M., Shen, C.C.: A Hybrid Blockchain-Edge Architecture for Electronic Health Record Management With Attribute-Based Cryptographic Mechanisms. IEEE Trans. Netw. Serv. Manage. 31(6), 1\u20131 (2022). https:\/\/doi.org\/10.1109\/TNSM.2022.3166006","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"key":"5871_CR131","doi-asserted-by":"publisher","unstructured":"Thorve, A., Shirole, M., Jain, P., Santhumayor, C., Sarode, S.: \"Decentralized Identity Management Using Blockchain,\" in 2022 5th International Conference on Computing, Analytics and Internet of Things (CACINS), Mumbai, India, p. 1\u20136 (2022). https:\/\/doi.org\/10.1109\/CACINS5602022.10074477","DOI":"10.1109\/CACINS5602022.10074477"},{"issue":"11","key":"5871_CR132","first-page":"6060","volume":"23","author":"L Zheng","year":"2023","unstructured":"Zheng, L., et al.: A Blockchain-Enabled Solution for Space Exploration Data Management Using a Hybrid Blockchain Model. Sensors 23(11), 6060 (2023)","journal-title":"Sensors"},{"key":"5871_CR133","doi-asserted-by":"crossref","unstructured":"Yao, A., Pal, S., Dong, C., Li, X., Liu, X.: A Framework for User Biometric Privacy Protection in UAV Delivery Systems with Edge Computing. 2024 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops) (2024)","DOI":"10.1109\/PerComWorkshops59983.2024.10502849"},{"issue":"9","key":"5871_CR134","doi-asserted-by":"publisher","first-page":"11233","DOI":"10.1109\/JIOT.2025.3529808","volume":"12","author":"C Dong","year":"2025","unstructured":"Dong, C., Pal, S., Chen, S., Jiang, F., Liu, X.: A Privacy-Aware Task Distribution Architecture for UAV Communications System Using Blockchain. IEEE Internet Things J. 12(9), 11233\u201311243 (2025)","journal-title":"IEEE Internet Things J."},{"issue":"11","key":"5871_CR135","doi-asserted-by":"publisher","first-page":"3450","DOI":"10.3390\/s25113450","volume":"25","author":"M Imran","year":"2025","unstructured":"Imran, M., et al.: A Zero-Knowledge Proof-Enabled Blockchain-Based Academic Record Verification System. Sensors 25(11), 3450 (2025)","journal-title":"Sensors"},{"key":"5871_CR136","doi-asserted-by":"publisher","first-page":"03007","DOI":"10.1051\/itmconf\/20257803007","volume":"73","author":"J Chen","year":"2025","unstructured":"Chen, J., Zhang, Y., Wei, M.: Integration of Blockchain and Artificial Intelligence in Healthcare: Enhancing Data Security and Operational Efficiency. ITM Web of Conferences 73, 03007 (2025)","journal-title":"ITM Web of Conferences"},{"key":"5871_CR137","unstructured":"Deepa, V.V., Thamotharan, B., Mahto, D., Rajendiran, P., Sriram, A. L., Chandramohan, K.: Smart embedded health monitoring system and secure electronic health record (EHR) transactions using blockchain technology. IEEE Access, (2021)"},{"key":"5871_CR138","doi-asserted-by":"publisher","DOI":"10.3390\/app112210917","author":"AA Khan","year":"2021","unstructured":"Khan, A.A., Laghari, A.A., Shaikh, A.A., Bourouis, S., Mamlouk, A.M., Alshazly, H.: Educational Blockchain: A Secure Degree Attestation and Verification Traceability Architecture for Higher Education Commission. Applied Sciences (2021). https:\/\/doi.org\/10.3390\/app112210917","journal-title":"Applied Sciences"},{"key":"5871_CR139","unstructured":"FasterCapital, \"The Proof of Work (PoW) Consensus Mechanism,\" Available: https:\/\/fastercapital.com\/topics\/the-proof-of-work-(pow)-consensus-mechanism.html"},{"key":"5871_CR140","unstructured":"Buterin, V.: Ethereum: A Next-Generation Smart Contract and Decentralized Application Platform. https:\/\/ethereum.org\/en\/whitepaper\/ (2014)"},{"key":"5871_CR141","unstructured":"Buterin, V.: Ethereum: A Secure Decentralized Generalized Transaction Ledger. Ethereum Yellow Paper, (2014)"},{"key":"5871_CR142","unstructured":"Zengiverse: \"Economic Dynamics of the Solana Ecosystem: Incentives, Tokenomics, and Future Projections,\" Medium, (2024). [Online]. Available: https:\/\/medium.com\/@Zengiverse\/economic-dynamics-of-the-solana-ecosystem-incentives-tokenomics-and-future-projections-33a487ef6f21. [Accessed: 17-Jan-2025]"},{"key":"5871_CR143","doi-asserted-by":"crossref","unstructured":"Androulaki, E., Manevich, Y., Muralidharan, S., Murthy, C., Nguyen, B., Sethi, M., Singh, G., Smith, K., Sorniotti, A., Stathakopoulou, C., Vukoli\u0107, M., Barger, A., Cocco, S., Yellick, J., Bortnikov, V., Cachin, C.: Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains. Proceedings of the Thirteenth EuroSys Conference, (2018)","DOI":"10.1145\/3190508.3190538"},{"key":"5871_CR144","unstructured":"\"Blockchain Technology Explained: A Comprehensive Overview,\" Prodigital Web, (2024). [Online]. Available: https:\/\/www.prodigitalweb.com\/blockchain-technology-explained\/. [Accessed: 17-Jan-2025]"},{"key":"5871_CR145","unstructured":"Microsoft, \"What is Access Control,\" Microsoft Security, 2024. [Online]. Available: https:\/\/www.microsoft.com\/en-za\/security\/business\/security-101\/what-is-access-control. [Accessed: 17-Jan-2025]"},{"key":"5871_CR146","doi-asserted-by":"publisher","unstructured":"Eyal, I., Sirer, E. G.: Majority is not Enough: Bitcoin Mining is Vulnerable. Financial Cryptography and Data Security, Springer, p. 436\u2013454 (2014). https:\/\/doi.org\/10.1007\/978-3-662-45472-5_28","DOI":"10.1007\/978-3-662-45472-5_28"},{"key":"5871_CR147","unstructured":"Heilman, E., Kendler, A., Zohar, A., Goldberg, S.: Eclipse Attacks on Bitcoin\u2019s Peer-to-Peer Network. 24th USENIX Security Symposium (USENIX Security 15), p. 129\u2013144 (2015). Available at: https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/heilman"},{"key":"5871_CR148","doi-asserted-by":"publisher","unstructured":"Bonneau, J., Miller, A., Clark, J., Narayanan, A., Kroll, J. A., Felten, E. W.: SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies. IEEE Symposium on Security and Privacy (SP), p. 104\u2013121 (2015).https:\/\/doi.org\/10.1109\/SP.2015.14","DOI":"10.1109\/SP.2015.14"},{"key":"5871_CR149","doi-asserted-by":"crossref","first-page":"165972","DOI":"10.1109\/ACCESS.2021.3076205","volume":"9","author":"S Rahmadika","year":"2021","unstructured":"Rahmadika, S., Arifin, A.S., Djatna, T.: Blockchain Consensus Protocols: A Survey and Classification Framework. IEEE Access 9, 165972\u2013165988 (2021)","journal-title":"IEEE Access"},{"key":"5871_CR150","doi-asserted-by":"publisher","unstructured":"Alharby, M., van Moorsel, A.: Blockchain-Based Smart Contracts: A Systematic Mapping Study. IEEE International Conference on Cloud Computing Technology and Science (CloudCom), p. 775\u2013780 (2017). https:\/\/doi.org\/10.1109\/CloudCom.2017.117","DOI":"10.1109\/CloudCom.2017.117"},{"key":"5871_CR151","doi-asserted-by":"publisher","unstructured":"Zamani, M., Movahedi, M., Raykova, M.: RapidChain: Scaling Blockchain via Full Sharding. Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (CCS), p. 931\u2013948 (2018). https:\/\/doi.org\/10.1145\/3243734.3243853","DOI":"10.1145\/3243734.3243853"},{"key":"5871_CR152","unstructured":"Wang, Q., Liu, J., Lin, X.: SoK: Public Blockchain Sharding. arXiv preprint arXiv:2405.20521, (2023). Available at: https:\/\/arxiv.org\/abs\/2405.20521"},{"key":"5871_CR153","unstructured":"Ben-Sasson, E., Chiesa, A., Garman, C., Green, M., Miers, I., Tromer, E., Virza, M.: Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture. 23rd USENIX Security Symposium (USENIX Security 14), p. 781\u2013796 (2014). Available at: https:\/\/www.usenix.org\/conference\/usenixsecurity14\/technical-sessions\/presentation\/ben-sasson"},{"issue":"9","key":"5871_CR154","first-page":"76","volume":"62","author":"S Goldwasser","year":"2019","unstructured":"Goldwasser, S., Kalai, Y.T., Rothblum, G.N.: Delegating Computation: Interactive Proofs and Zero Knowledge. Commun. ACM 62(9), 76\u201384 (2019)","journal-title":"Commun. ACM"},{"key":"5871_CR155","doi-asserted-by":"crossref","unstructured":"Naik, N., Jenkins, P.: uPort Open-Source Identity Management System: An Assessment of Self-Sovereign Identity and User-Centric Data Platform Built on Blockchain. Proceedings of the IEEE International Conference, (2020)","DOI":"10.1109\/ISSE49799.2020.9272223"},{"key":"5871_CR156","first-page":"104602","volume":"8","author":"W Liu","year":"2020","unstructured":"Liu, W., Zhang, Y.: A Survey on Blockchain-Based Decentralized Identity Management Systems. IEEE Access 8, 104602\u2013104618 (2020)","journal-title":"IEEE Access"},{"key":"5871_CR157","unstructured":"Uport: uPort: An Overview of Decentralized Identity Solutions on Ethereum. Available at: https:\/\/www.uport.me\/, (2022)"},{"key":"5871_CR158","unstructured":"Zohar, A., Goren, S.: Decentralized Identity Management on the Ethereum Blockchain. Proceedings of the 2019 International Conference on Blockchain Technology, (2019)"},{"key":"5871_CR159","unstructured":"Barton, M., Grob, L.: uPort: A Decentralized Identity Management Solution. Blockchain for Social Impact Conference, (2018)"},{"key":"5871_CR160","unstructured":"Buterin, V.: Ethereum White Paper: A Next-Generation Smart Contract and Decentralized Application Platform. Ethereum Foundation, (2016)"},{"key":"5871_CR161","first-page":"938","volume":"108","author":"M Metzler","year":"2020","unstructured":"Metzler, M., G\u00fcnther, F.: Blockchain-Based Off-Chain Data Storage for Decentralized Applications. Futur. Gener. Comput. Syst. 108, 938\u2013950 (2020)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"1","key":"5871_CR162","first-page":"1","volume":"9","author":"S Pearson","year":"2018","unstructured":"Pearson, S.: Blockchain-Based Storage Systems: A New Paradigm for Data Privacy. Journal of Cloud Computing 9(1), 1\u201312 (2018)","journal-title":"Journal of Cloud Computing"},{"issue":"4","key":"5871_CR163","first-page":"483","volume":"28","author":"S Borriello","year":"2020","unstructured":"Borriello, S., D\u2019Angelo, G.: Leveraging Ethereum for Decentralized Identity Management. J. Comput. Secur. 28(4), 483\u2013501 (2020)","journal-title":"J. Comput. Secur."},{"key":"5871_CR164","unstructured":"Sovrin Foundation: The Sovrin Network: A Decentralized Digital Identity Network. https:\/\/sovrin.org, (2016)"},{"key":"5871_CR165","unstructured":"Reed, D., Sabadello, M., Zafar, H.: Sovrin: A Protocol and Token for Self-Sovereign Identity and Decentralized Trust. Proceedings of the 2018 IEEE European Symposium on Security and Privacy Workshops (EuroS &PW), 83-90, (2018)"},{"key":"5871_CR166","unstructured":"Allen, C.: The Path to Self-Sovereign Identity. https:\/\/www.mattr.global, (2016)"},{"issue":"4","key":"5871_CR167","first-page":"305","volume":"7","author":"L Bradshaw","year":"2019","unstructured":"Bradshaw, L., Geach, D.: Implementing a Global Identity Network Using the Sovrin Protocol. Journal of Digital Identity Management 7(4), 305\u2013316 (2019)","journal-title":"Journal of Digital Identity Management"},{"key":"5871_CR168","unstructured":"Prasanna, S.: Indian Journal of Legal Review, Volume 4, Issue 1, (2024). ISSN: 2583-2344. Available at https:\/\/ijlr.iledu.in\/, Accessed: 2024"},{"key":"5871_CR169","unstructured":"Sovrin Foundation: The Sovrin Governance Framework. https:\/\/sovrin.org\/wp-content\/uploads\/Sovrin-Governance-Framework-v1.0.pdf, (2019)"},{"key":"5871_CR170","unstructured":"Tempelhof, S. T.: Bitnation: A Borderless and Decentralized Nation. https:\/\/www.bitnation.co, (2014)"},{"key":"5871_CR171","unstructured":"Bitnation: Bitnation Official Website Closure and Domain Sale. https:\/\/www.bitnation.co, (2022)"},{"key":"5871_CR172","unstructured":"Weitzman, J., Ebrahimi, A.: ShoCard: A Mobile Blockchain-Based Identity Solution. Proceedings of the 2015 IEEE International Conference on Blockchain, 12-15, (2015)"},{"key":"5871_CR173","unstructured":"Dillet, R.: \"ShoCard is a digital identity card on the blockchain,\" TechCrunch, 5, (2015). [Online]. Available: https:\/\/techcrunch.com\/2015\/05\/05\/shocard-is-a-digital-identity-card-on-the-blockchain\/"},{"issue":"3","key":"5871_CR174","first-page":"29","volume":"4","author":"J Weitzman","year":"2016","unstructured":"Weitzman, J., Ebrahimi, A.: Secure and Accountable Digital Identity Verification Using Blockchain Technology. Journal of Digital Security 4(3), 29\u201338 (2016)","journal-title":"Journal of Digital Security"},{"issue":"2","key":"5871_CR175","first-page":"67","volume":"5","author":"J Weitzman","year":"2017","unstructured":"Weitzman, J., Ebrahimi, A.: Challenges in Scaling and Recovering ShoCard Blockchain-Based Identity. Journal of Blockchain Applications 5(2), 67\u201373 (2017)","journal-title":"Journal of Blockchain Applications"},{"key":"5871_CR176","unstructured":"Ekblaw, A., Azaria, A., Halamka, J.D., Lippman, A.: MedRec: A Case Study for Blockchain in Healthcare. Proceedings of the IEEE Open & Big Data Conference, (2017). Available at: https:\/\/www.media.mit.edu\/publications\/medrec-a-case-study-for-blockchain-in-healthcare\/"},{"key":"5871_CR177","unstructured":"Sadiku, M. N. O., Eze, K. G., Musa, S. M.: Blockchain Technology in Healthcare. International Journal of Healthcare Information Systems and Informatics, (2020)"},{"key":"5871_CR178","unstructured":"Matsalu, M., Kask, K.: Securing Digital Society with KSI Blockchain Technology. Estonian Information System Authority Whitepaper, (2017). Available at: https:\/\/www.ria.ee\/en\/ksi-blockchain.html"},{"key":"5871_CR179","unstructured":"Guardtime: Estonia\u2019s Blockchain Infrastructure: Guardtime KSI Overview. Guardtime, (2020). Available at: https:\/\/guardtime.com\/solutions\/government"},{"key":"5871_CR180","unstructured":"IBM Corporation: IBM Food Trust \u2013 Blockchain for the Food Supply Chain. IBM Blockchain Solutions, (2019). Available at: https:\/\/www.ibm.com\/blockchain\/solutions\/food-trust"},{"key":"5871_CR181","unstructured":"Walmart Inc.: Walmart\u2019s Use of Blockchain to Ensure Food Safety. Walmart Newsroom, (2019). Available at: https:\/\/corporate.walmart.com\/newsroom\/2019\/06\/11"},{"key":"5871_CR182","unstructured":"Propy Inc.: Propy Whitepaper \u2013 Global Real Estate Transactions on Blockchain. (2018). Available at: https:\/\/propy.com\/propywhitepaper.pdf"},{"key":"5871_CR183","unstructured":"Forbes Technology Council: How Blockchain is Transforming Real Estate Transactions. Forbes, (2021). Available at: https:\/\/www.forbes.com\/sites\/forbestechcouncil\/2021\/08\/24\/how-blockchain-is-transforming-real-estate-transactions\/"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05871-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-025-05871-3","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05871-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T15:33:25Z","timestamp":1767713605000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-025-05871-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,6]]},"references-count":183,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2026,4]]}},"alternative-id":["5871"],"URL":"https:\/\/doi.org\/10.1007\/s10586-025-05871-3","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,6]]},"assertion":[{"value":"19 March 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 November 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 November 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 January 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not Applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}},{"value":"The authors declare no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"98"}}