{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,20]],"date-time":"2025-07-20T04:19:35Z","timestamp":1752985175917,"version":"3.40.5"},"reference-count":55,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2023,10,14]],"date-time":"2023-10-14T00:00:00Z","timestamp":1697241600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,10,14]],"date-time":"2023-10-14T00:00:00Z","timestamp":1697241600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Grid Computing"],"published-print":{"date-parts":[[2023,12]]},"DOI":"10.1007\/s10723-023-09687-6","type":"journal-article","created":{"date-parts":[[2023,10,14]],"date-time":"2023-10-14T10:01:38Z","timestamp":1697277698000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["ICSMPC: Design of an Iterative-Learning Contextual Side Chaining Model for Improving Security of Priority-Aware Cloud Resources"],"prefix":"10.1007","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2988-735X","authenticated-orcid":false,"given":"Madala Guru","family":"Brahmam","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9615-8982","authenticated-orcid":false,"given":"Vijay Anand","family":"R","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,10,14]]},"reference":[{"issue":"12","key":"9687_CR1","doi-asserted-by":"publisher","first-page":"3485","DOI":"10.1109\/JSAC.2022.3213358","volume":"40","author":"S Yao","year":"2022","unstructured":"Yao, S., Wang, M., Qu, Q., Zhang, Z., Zhang, Y.-F., Xu, K., Xu, M.: Blockchain-empowered collaborative task offloading for cloud-edge-device computing. IEEE J. Sel. Areas Commun. 40(12), 3485\u20133500 (2022)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"9687_CR2","doi-asserted-by":"publisher","first-page":"35437","DOI":"10.1109\/ACCESS.2022.3161744","volume":"10","author":"Z Cai","year":"2022","unstructured":"Cai, Z., Yang, G., Xu, S., Zang, C., Chen, J., Hang, P., Yang, B.: Rbaas: A robust blockchain as a service paradigm in cloud-edge collaborative environment. IEEE Access 10, 35437\u201335444 (2022)","journal-title":"IEEE Access"},{"key":"9687_CR3","doi-asserted-by":"publisher","first-page":"79141","DOI":"10.1109\/ACCESS.2022.3194264","volume":"10","author":"G Volpe","year":"2022","unstructured":"Volpe, G., Mangini, A.M., Fanti, M.P.: An architecture combining blockchain, docker and cloud storage for improving digital processes in cloud manufacturing. IEEE Access 10, 79141\u201379151 (2022)","journal-title":"IEEE Access"},{"issue":"12","key":"9687_CR4","first-page":"3242","volume":"71","author":"M Xu","year":"2022","unstructured":"Xu, M., Liu, S., Yu, D., Cheng, X., Guo, S., Yu, J.: Cloudchain: a cloud blockchain using shared memory consensus and rdma. IEEE Trans. Comput. 71(12), 3242\u20133253 (2022)","journal-title":"IEEE Trans. Comput."},{"issue":"4","key":"9687_CR5","doi-asserted-by":"publisher","first-page":"2252","DOI":"10.1109\/TCC.2021.3057771","volume":"10","author":"C Zhang","year":"2021","unstructured":"Zhang, C., Xu, Y., Hu, Y., Wu, J., Ren, J., Zhang, Y.: A blockchain-based multi-cloud storage data auditing scheme to locate faults. IEEE Trans. Cloud Comput. 10(4), 2252\u20132263 (2021)","journal-title":"IEEE Trans. Cloud Comput."},{"issue":"3","key":"9687_CR6","doi-asserted-by":"publisher","first-page":"4477","DOI":"10.1109\/JSYST.2021.3125835","volume":"16","author":"J Zhao","year":"2021","unstructured":"Zhao, J., Huang, H., Gu, C., Hua, Z., Zhang, X.: Blockchain-assisted conditional anonymity privacy-preserving public auditing scheme with reward mechanism. IEEE Syst. J. 16(3), 4477\u20134488 (2021)","journal-title":"IEEE Syst. J."},{"key":"9687_CR7","doi-asserted-by":"crossref","unstructured":"Alzubi, O.A., Alzubi, J.A., Al-Zoubi, A.M., Hassonah, M.A., Kose, U.: An efficient malware detection approach with feature weighting based on harris hawks optimization. Cluster Comput. 1\u201319 (2022)","DOI":"10.1007\/s10586-021-03459-1"},{"issue":"19","key":"9687_CR8","doi-asserted-by":"publisher","first-page":"3007","DOI":"10.3390\/electronics11193007","volume":"11","author":"OA Alzubi","year":"2022","unstructured":"Alzubi, O.A., Alzubi, J.A., Alazab, M., Alrabea, A., Awajan, A., Qiqieh, I.: Optimized machine learning-based intrusion detection system for fog and edge computing environment. Electron. 11(19), 3007 (2022)","journal-title":"Electron."},{"issue":"2","key":"9687_CR9","doi-asserted-by":"publisher","first-page":"1363","DOI":"10.1007\/s10586-022-03686-0","volume":"26","author":"OA Alzubi","year":"2023","unstructured":"Alzubi, O.A., Qiqieh, I., Alzubi, J.A.: Fusion of deep learning based cyberattack detection and classification model for intelligent systems. Cluster Comput. 26(2), 1363\u20131374 (2023)","journal-title":"Cluster Comput."},{"issue":"10","key":"9687_CR10","doi-asserted-by":"publisher","first-page":"7174","DOI":"10.1109\/TII.2022.3140792","volume":"18","author":"T Hewa","year":"2022","unstructured":"Hewa, T., Braeken, A., Liyanage, M., Ylianttila, M.: Fog computing and blockchain-based security service architecture for 5g industrial iot-enabled cloud manufacturing. IEEE Trans. Indust. Inf. 18(10), 7174\u20137185 (2022)","journal-title":"IEEE Trans. Indust. Inf."},{"issue":"1","key":"9687_CR11","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1109\/TCC.2019.2930259","volume":"10","author":"C Qiu","year":"2019","unstructured":"Qiu, C., Yao, H., Jiang, C., Guo, S., Xu, F.: Cloud computing assisted blockchain-enabled internet of things. IEEE Trans. Cloud Comput. 10(1), 247\u2013257 (2019)","journal-title":"IEEE Trans. Cloud Comput."},{"issue":"1","key":"9687_CR12","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1109\/JSYST.2021.3068224","volume":"16","author":"EB Sifah","year":"2021","unstructured":"Sifah, E.B., Xia, Q., Agyekum, K.O.-B.O., Xia, H., Smahi, A., Gao, J.: A blockchain approach to ensuring provenance to outsourced cloud data in a sharing ecosystem. IEEE Syst. J. 16(1), 1673\u20131684 (2021)","journal-title":"IEEE Syst. J."},{"issue":"5","key":"9687_CR13","doi-asserted-by":"publisher","first-page":"1937","DOI":"10.1109\/JBHI.2021.3097237","volume":"26","author":"H Ghayvat","year":"2021","unstructured":"Ghayvat, H., Pandya, S., Bhattacharya, P., Zuhair, M., Rashid, M., Hakak, S., Dev, K.: Cp-bdhca: Blockchain-based confidentiality-privacy preserving big data scheme for healthcare clouds and applications. IEEE J. Biomed. Health Inf. 26(5), 1937\u20131948 (2021)","journal-title":"IEEE J. Biomed. Health Inf."},{"issue":"12","key":"9687_CR14","doi-asserted-by":"publisher","first-page":"1877","DOI":"10.1109\/JAS.2021.1004003","volume":"8","author":"BB Gupta","year":"2021","unstructured":"Gupta, B.B., Li, K.-C., Leung, V.C., Psannis, K.E., Yamaguchi, S., et al.: Blockchain-assisted secure fine-grained searchable encryption for a cloud-based healthcare cyber-physical system. IEEE\/CAA J. Autom. Sinica 8(12), 1877\u20131890 (2021)","journal-title":"IEEE\/CAA J. Autom. Sinica"},{"key":"9687_CR15","doi-asserted-by":"publisher","first-page":"138245","DOI":"10.1109\/ACCESS.2021.3115238","volume":"9","author":"B Sowmiya","year":"2021","unstructured":"Sowmiya, B., Poovammal, E., Ramana, K., Singh, S., Yoon, B.: Linear elliptical curve digital signature (lecds) with blockchain approach for enhanced security on cloud server. IEEE Access 9, 138245\u2013138253 (2021)","journal-title":"IEEE Access"},{"issue":"12","key":"9687_CR16","doi-asserted-by":"publisher","first-page":"9227","DOI":"10.1109\/TII.2022.3164433","volume":"18","author":"P Zheng","year":"2022","unstructured":"Zheng, P., Xu, Q., Luo, X., Zheng, Z., Zheng, W., Chen, X., Zhou, Z., Yan, Y., Zhang, H.: Aeolus: Distributed execution of permissioned blockchain transactions via state sharding. IEEE Trans. Indust. Inf. 18(12), 9227\u20139238 (2022)","journal-title":"IEEE Trans. Indust. Inf."},{"key":"9687_CR17","doi-asserted-by":"publisher","first-page":"67787","DOI":"10.1109\/ACCESS.2022.3185016","volume":"10","author":"S Itoo","year":"2022","unstructured":"Itoo, S., Khan, A.A., Kumar, V., Alkhayyat, A., Ahmad, M., Srinivas, J.: Ckmib: Construction of key agreement protocol for cloud medical infrastructure using blockchain. IEEE Access 10, 67787\u201367801 (2022)","journal-title":"IEEE Access"},{"issue":"18","key":"9687_CR18","doi-asserted-by":"publisher","first-page":"13958","DOI":"10.1109\/JIOT.2021.3068410","volume":"8","author":"Y Zhang","year":"2021","unstructured":"Zhang, Y., Li, B., Liu, B., Hu, Y., Zheng, H.: A privacy-aware pufs-based multiserver authentication protocol in cloud-edge iot systems using blockchain. IEEE Int. Things J. 8(18), 13958\u201313974 (2021)","journal-title":"IEEE Int. Things J."},{"issue":"12","key":"9687_CR19","first-page":"3322","volume":"71","author":"D Liu","year":"2022","unstructured":"Liu, D., Huang, C., Ni, J., Lin, X., Shen, X.S.: Blockchain-cloud transparent data marketing: Consortium management and fairness. IEEE Trans. Comput. 71(12), 3322\u20133335 (2022)","journal-title":"IEEE Trans. Comput."},{"issue":"7","key":"9687_CR20","doi-asserted-by":"publisher","first-page":"5914","DOI":"10.1109\/JIOT.2020.3032997","volume":"8","author":"A Saini","year":"2020","unstructured":"Saini, A., Zhu, Q., Singh, N., Xiang, Y., Gao, L., Zhang, Y.: A smart-contract-based access control framework for cloud smart healthcare system. IEEE Int. Things J. 8(7), 5914\u20135925 (2020)","journal-title":"IEEE Int. Things J."},{"issue":"6","key":"9687_CR21","doi-asserted-by":"publisher","first-page":"1393","DOI":"10.1109\/TPDS.2021.3113873","volume":"33","author":"H Wu","year":"2021","unstructured":"Wu, H., Peng, Z., Guo, S., Yang, Y., Xiao, B.: Vql: Efficient and verifiable cloud query services for blockchain systems. IEEE Trans. Parallel Distrib. Syst. 33(6), 1393\u20131406 (2021)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"9687_CR22","doi-asserted-by":"publisher","first-page":"106655","DOI":"10.1109\/ACCESS.2021.3100072","volume":"9","author":"M Whaiduzzaman","year":"2021","unstructured":"Whaiduzzaman, M., Mahi, M.J.N., Barros, A., Khalil, M.I., Fidge, C., Buyya, R.: Bfim: Performance measurement of a blockchain based hierarchical tree layered fog-iot microservice architecture. IEEE Access 9, 106655\u2013106674 (2021)","journal-title":"IEEE Access"},{"issue":"4","key":"9687_CR23","doi-asserted-by":"publisher","first-page":"2163","DOI":"10.1109\/JIOT.2020.3033521","volume":"8","author":"H Wu","year":"2020","unstructured":"Wu, H., Wolter, K., Jiao, P., Deng, Y., Zhao, Y., Xu, M.: Eedto: An energy-efficient dynamic task offloading algorithm for blockchain-enabled iot-edge-cloud orchestrated computing. IEEE Int. Things J. 8(4), 2163\u20132176 (2020)","journal-title":"IEEE Int. Things J."},{"issue":"2","key":"9687_CR24","doi-asserted-by":"publisher","first-page":"108","DOI":"10.23919\/ICN.2021.0009","volume":"2","author":"G Liu","year":"2021","unstructured":"Liu, G., Wu, J., Wang, T.: Blockchain-enabled fog resource access and granting. Intell. Conv. Netw. 2(2), 108\u2013114 (2021)","journal-title":"Intell. Conv. Netw."},{"key":"9687_CR25","doi-asserted-by":"publisher","first-page":"69513","DOI":"10.1109\/ACCESS.2021.3077123","volume":"9","author":"R Awadallah","year":"2021","unstructured":"Awadallah, R., Samsudin, A., Teh, J.S., Almazrooie, M.: An integrated architecture for maintaining security in cloud computing based on blockchain. IEEE Access 9, 69513\u201369526 (2021)","journal-title":"IEEE Access"},{"issue":"4","key":"9687_CR26","doi-asserted-by":"publisher","first-page":"1362","DOI":"10.1109\/TCC.2019.2927219","volume":"9","author":"X Zhang","year":"2019","unstructured":"Zhang, X., Zhao, J., Xu, C., Li, H., Wang, H., Zhang, Y.: Cipppa: Conditional identity privacy-preserving public auditing for cloud-based wbans against malicious auditors. IEEE Trans. Cloud Comput. 9(4), 1362\u20131375 (2019)","journal-title":"IEEE Trans. Cloud Comput."},{"issue":"2","key":"9687_CR27","doi-asserted-by":"publisher","first-page":"1903","DOI":"10.1109\/TII.2022.3188835","volume":"19","author":"Y Zhang","year":"2022","unstructured":"Zhang, Y., Liang, Y., Jia, B., Wang, P.: Scheduling and process optimization for blockchain-enabled cloud manufacturing using dynamic selection evolutionary algorithm. IEEE Trans. Indust. Inf. 19(2), 1903\u20131911 (2022)","journal-title":"IEEE Trans. Indust. Inf."},{"issue":"21","key":"9687_CR28","doi-asserted-by":"publisher","first-page":"21520","DOI":"10.1109\/JIOT.2022.3181556","volume":"9","author":"SD Okegbile","year":"2022","unstructured":"Okegbile, S.D., Cai, J., Alfa, A.S.: Performance analysis of blockchain-enabled data-sharing scheme in cloud-edge computing-based iot networks. IEEE Int. Things J. 9(21), 21520\u201321536 (2022)","journal-title":"IEEE Int. Things J."},{"key":"9687_CR29","doi-asserted-by":"publisher","first-page":"36978","DOI":"10.1109\/ACCESS.2022.3164081","volume":"10","author":"Z Ullah","year":"2022","unstructured":"Ullah, Z., Raza, B., Shah, H., Khan, S., Waheed, A.: Towards blockchain-based secure storage and trusted data sharing scheme for iot environment. IEEE Access 10, 36978\u201336994 (2022)","journal-title":"IEEE Access"},{"issue":"4","key":"9687_CR30","doi-asserted-by":"publisher","first-page":"1335","DOI":"10.1109\/TCC.2019.2923222","volume":"9","author":"Y Zhang","year":"2019","unstructured":"Zhang, Y., Xu, C., Ni, J., Li, H., Shen, X.S.: Blockchain-assisted public-key encryption with keyword search against keyword guessing attacks for cloud storage. IEEE Trans. Cloud Comput. 9(4), 1335\u20131348 (2019)","journal-title":"IEEE Trans. Cloud Comput."},{"issue":"7","key":"9687_CR31","doi-asserted-by":"publisher","first-page":"5077","DOI":"10.1109\/TII.2020.3016025","volume":"17","author":"Y Yu","year":"2020","unstructured":"Yu, Y., Liu, S., Yeoh, P.L., Vucetic, B., Li, Y.: Layerchain: A hierarchical edge-cloud blockchain for large-scale low-delay industrial internet of things applications. IEEE Trans. Indust. Inf. 17(7), 5077\u20135086 (2020)","journal-title":"IEEE Trans. Indust. Inf."},{"issue":"7","key":"9687_CR32","doi-asserted-by":"publisher","first-page":"5007","DOI":"10.1109\/TII.2021.3105527","volume":"18","author":"MS Rahman","year":"2021","unstructured":"Rahman, M.S., Khalil, I., Moustafa, N., Kalapaaking, A.P., Bouras, A.: A blockchain-enabled privacy-preserving verifiable query framework for securing cloud-assisted industrial internet of things systems. IEEE Trans. Indust. Inf. 18(7), 5007\u20135017 (2021)","journal-title":"IEEE Trans. Indust. Inf."},{"key":"9687_CR33","doi-asserted-by":"publisher","first-page":"85777","DOI":"10.1109\/ACCESS.2022.3198094","volume":"10","author":"K Zala","year":"2022","unstructured":"Zala, K., Thakkar, H.K., Jadeja, R., Singh, P., Kotecha, K., Shukla, M.: Prms: Design and development of patients\u2019 e-healthcare records management system for privacy preservation in third party cloud platforms. IEEE Access 10, 85777\u201385791 (2022)","journal-title":"IEEE Access"},{"key":"9687_CR34","doi-asserted-by":"publisher","first-page":"74902","DOI":"10.1109\/ACCESS.2022.3190979","volume":"10","author":"G Yang","year":"2022","unstructured":"Yang, G., Lee, K., Lee, K., Yoo, Y., Lee, H., Yoo, C.: Resource analysis of blockchain consensus algorithms in hyperledger fabric. IEEE Access 10, 74902\u201374920 (2022)","journal-title":"IEEE Access"},{"issue":"2","key":"9687_CR35","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1109\/TCSS.2021.3049152","volume":"8","author":"Y Fan","year":"2021","unstructured":"Fan, Y., Wang, L., Wu, W., Du, D.: Cloud\/edge computing resource allocation and pricing for mobile blockchain: an iterative greedy and search approach. IEEE Trans. Comput. Soc. Syst. 8(2), 451\u2013463 (2021)","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"issue":"4","key":"9687_CR36","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1364\/JOCN.447833","volume":"14","author":"P Alemany","year":"2022","unstructured":"Alemany, P., Vilalta, R., Mu\u00f1oz, R., Casellas, R., Mart\u00ednez, R.: Evaluation of the abstraction of optical topology models in blockchain-based data center interconnection. J. Opt. Commun. Netw. 14(4), 211\u2013221 (2022)","journal-title":"J. Opt. Commun. Netw."},{"issue":"2","key":"9687_CR37","doi-asserted-by":"publisher","first-page":"1176","DOI":"10.1109\/TNSM.2021.3122923","volume":"19","author":"RH Kim","year":"2021","unstructured":"Kim, R.H., Noh, H., Song, H., Park, G.S.: Quick block transport system for scalable hyperledger fabric blockchain over d2d-assisted 5g networks. IEEE Trans. Netw. Serv. Manag. 19(2), 1176\u20131190 (2021)","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"9687_CR38","doi-asserted-by":"publisher","first-page":"82435","DOI":"10.1109\/ACCESS.2021.3084942","volume":"9","author":"G Subramanian","year":"2021","unstructured":"Subramanian, G., Thampy, A.S.: Implementation of hybrid blockchain in a pre-owned electric vehicle supply chain. IEEE Access 9, 82435\u201382454 (2021)","journal-title":"IEEE Access"},{"issue":"14","key":"9687_CR39","doi-asserted-by":"publisher","first-page":"11717","DOI":"10.1109\/JIOT.2021.3058946","volume":"8","author":"BS Egala","year":"2021","unstructured":"Egala, B.S., Pradhan, A.K., Badarla, V., Mohanty, S.P.: Fortified-chain: a blockchain-based framework for security and privacy-assured internet of medical things with effective access control. IEEE Int. Things J. 8(14), 11717\u201311731 (2021)","journal-title":"IEEE Int. Things J."},{"issue":"16","key":"9687_CR40","doi-asserted-by":"publisher","first-page":"12694","DOI":"10.1109\/JIOT.2020.3007650","volume":"8","author":"C Qiu","year":"2020","unstructured":"Qiu, C., Wang, X., Yao, H., Du, J., Yu, F.R., Guo, S.: Networking integrated cloud-edge-end in iot: A blockchain-assisted collective q-learning approach. IEEE Int. Things J. 8(16), 12694\u201312704 (2020)","journal-title":"IEEE Int. Things J."},{"issue":"4","key":"9687_CR41","doi-asserted-by":"publisher","first-page":"760","DOI":"10.26599\/TST.2021.9010046","volume":"27","author":"J Ren","year":"2021","unstructured":"Ren, J., Li, J., Liu, H., Qin, T.: Task offloading strategy with emergency handling and blockchain security in sdn-empowered and fog-assisted healthcare iot. Tsinghua Sci. Technol. 27(4), 760\u2013776 (2021)","journal-title":"Tsinghua Sci. Technol."},{"key":"9687_CR42","doi-asserted-by":"publisher","first-page":"75365","DOI":"10.1109\/ACCESS.2022.3191414","volume":"10","author":"S Son","year":"2022","unstructured":"Son, S., Kwon, D., Lee, J., Yu, S., Jho, N.-S., Park, Y.: On the design of a privacy-preserving communication scheme for cloud-based digital twin environments using blockchain. IEEE Access 10, 75365\u201375375 (2022)","journal-title":"IEEE Access"},{"issue":"6","key":"9687_CR43","doi-asserted-by":"publisher","first-page":"2058","DOI":"10.1109\/TMC.2020.3035990","volume":"21","author":"S Jiang","year":"2020","unstructured":"Jiang, S., Li, X., Wu, J.: Multi-leader multi-follower stackelberg game in mobile blockchain mining. IEEE Trans. Mobile Comput. 21(6), 2058\u20132071 (2020)","journal-title":"IEEE Trans. Mobile Comput."},{"issue":"12","key":"9687_CR44","doi-asserted-by":"publisher","first-page":"3325","DOI":"10.1109\/JSAC.2022.3213323","volume":"40","author":"X Wang","year":"2022","unstructured":"Wang, X., Zhao, Y., Qiu, C., Liu, Z., Nie, J., Leung, V.C.: Infedge: A blockchain-based incentive mechanism in hierarchical federated learning for end-edge-cloud communications. IEEE J. Sel. Areas Commun. 40(12), 3325\u20133342 (2022)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"3","key":"9687_CR45","doi-asserted-by":"publisher","first-page":"1498","DOI":"10.1109\/TSC.2020.2999559","volume":"15","author":"M Barati","year":"2020","unstructured":"Barati, M., Rana, O.: Tracking gdpr compliance in cloud-based service delivery. IEEE Trans. Serv. Comput. 15(3), 1498\u20131511 (2020)","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"6","key":"9687_CR46","doi-asserted-by":"publisher","first-page":"3956","DOI":"10.1109\/TNSE.2021.3110101","volume":"9","author":"H Zhang","year":"2021","unstructured":"Zhang, H., Gao, P., Yu, J., Lin, J., Xiong, N.N.: Machine learning on cloud with blockchain: a secure, verifiable and fair approach to outsource the linear regression. IEEE Trans. Netw. Sci. Eng. 9(6), 3956\u20133967 (2021)","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"9687_CR47","doi-asserted-by":"crossref","unstructured":"Lin, Y., Li, J., Kimura, S., Yang, Y., Ji, Y., Cao, Y.: Consortium blockchain-based public integrity verification in cloud storage for iot. IEEE Int. Things J. 9(5), 3978\u20133987 (2021)","DOI":"10.1109\/JIOT.2021.3102236"},{"key":"9687_CR48","unstructured":"vSphere Data Set. https:\/\/core.vmware.com\/resource\/vsphere-datasets"},{"key":"9687_CR49","unstructured":"Trends in Digital Asset Management. https:\/\/statistics.technavio.org\/statistics\/trends-in-digital-asset-management"},{"key":"9687_CR50","unstructured":"DDoS NGram Payload. https:\/\/www.kaggle.com\/datasets\/lanmasco\/ddos-ngram-payload"},{"key":"9687_CR51","unstructured":"Cloud Security Statistics. https:\/\/www.technavio.com\/report\/cloud-security-solutions-market-industry-analysis"},{"key":"9687_CR52","unstructured":"Cloud Attack Data Samples. https:\/\/ieee-dataport.org\/documents\/cloud-attack-dataset"},{"key":"9687_CR53","unstructured":"Crypto Jacking Attack Time Series Dataset. https:\/\/www.kaggle.com\/datasets\/keshanijayasinghe\/cryptojacking-attack-timeseries-dataset"},{"key":"9687_CR54","unstructured":"Blockchain Security Issues Data Samples. https:\/\/ieee-dataport.org\/documents\/blockchain-security-issues"},{"key":"9687_CR55","unstructured":"Ransomware Blockchain Samples. https:\/\/data.mendeley.com\/datasets\/xn447zrnk4"}],"container-title":["Journal of Grid Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10723-023-09687-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10723-023-09687-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10723-023-09687-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,26]],"date-time":"2023-12-26T20:03:39Z","timestamp":1703621019000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10723-023-09687-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,14]]},"references-count":55,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2023,12]]}},"alternative-id":["9687"],"URL":"https:\/\/doi.org\/10.1007\/s10723-023-09687-6","relation":{},"ISSN":["1570-7873","1572-9184"],"issn-type":[{"type":"print","value":"1570-7873"},{"type":"electronic","value":"1572-9184"}],"subject":[],"published":{"date-parts":[[2023,10,14]]},"assertion":[{"value":"4 April 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 September 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 October 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Custom code.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Code availability"}},{"value":"The authors declare no conflict of interest.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"All the authors involved have agreed to participate in this submitted article.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"All the authors involved in this manuscript give full consent for publication of this submitted article.","order":6,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}],"article-number":"55"}}