{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,17]],"date-time":"2025-12-17T08:27:04Z","timestamp":1765960024693,"version":"3.37.3"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"7-8","license":[{"start":{"date-parts":[[2019,2,4]],"date-time":"2019-02-04T00:00:00Z","timestamp":1549238400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2020,2]]},"DOI":"10.1007\/s11042-019-7182-7","type":"journal-article","created":{"date-parts":[[2019,2,3]],"date-time":"2019-02-03T21:03:22Z","timestamp":1549227802000},"page":"4989-5002","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":29,"title":["A unified framework for data integrity protection in people-centric smart cities"],"prefix":"10.1007","volume":"79","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6768-6084","authenticated-orcid":false,"given":"May","family":"Altulyan","sequence":"first","affiliation":[]},{"given":"Lina","family":"Yao","sequence":"additional","affiliation":[]},{"given":"Salil S.","family":"Kanhere","sequence":"additional","affiliation":[]},{"given":"Xianzhi","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Chaoran","family":"Huang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,2,4]]},"reference":[{"key":"7182_CR1","doi-asserted-by":"crossref","unstructured":"Alghamdi WY, Wu H, Kanhere SS (2017) Reliable and secure end-to-end data aggregation using secret sharing in wsns. In: Wireless communications and networking conference (WCNC), 2017 IEEE, pp 1\u20136","DOI":"10.1109\/WCNC.2017.7925558"},{"issue":"2","key":"7182_CR2","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/s13132-012-0084-9","volume":"4","author":"T Bak\u0131c\u0131","year":"2013","unstructured":"Bak\u0131c\u0131 T, Almirall E, Wareham J (2013) A smart city initiative: the case of barcelona. J Knowl Econ 4(2):135\u2013148","journal-title":"J Knowl Econ"},{"key":"7182_CR3","unstructured":"Baliga A (2017) Understanding blockchain consensus models. Persistent"},{"key":"7182_CR4","doi-asserted-by":"crossref","unstructured":"Banerjee M, Lee J, Choo K-KR (2017) A blockchain future for internet-of-things security: a position paper. Digital Communications and Networks","DOI":"10.1016\/j.dcan.2017.10.006"},{"key":"7182_CR5","doi-asserted-by":"crossref","unstructured":"Biswas K, Muthukkumarasamy V (2016) Securing smart cities using blockchain technology. In: , 2016 IEEE 18th international conference on high performance computing and communications; IEEE 14th international conference on smart city; IEEE 2nd international conference on data science and systems (HPCC\/SmartCity\/DSS), IEEE, pp 1392\u20131393","DOI":"10.1109\/HPCC-SmartCity-DSS.2016.0198"},{"key":"7182_CR6","doi-asserted-by":"crossref","unstructured":"Chakrabarty S, Engels DW (2016) A secure iot architecture for smart cities. In: Consumer communications & networking conference (CCNC), 2016 13th IEEE annual, IEEE, pp 812\u2013813","DOI":"10.1109\/CCNC.2016.7444889"},{"issue":"8","key":"7182_CR7","doi-asserted-by":"publisher","first-page":"1617","DOI":"10.1109\/TPAMI.2016.2608901","volume":"39","author":"X Chang","year":"2017","unstructured":"Chang X, Yu Y-L, Yang Y, Xing EP (2017) Semantic pooling for complex event analysis in untrimmed videos. IEEE Trans Pattern Anal Mach Intell 39(8):1617\u20131632","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"7182_CR8","doi-asserted-by":"crossref","unstructured":"Dorri A, Kanhere SS, Jurdak R (2017) Towards an optimized blockchain for iot. In: Proceedings of the second international conference on internet-of-things design and implementation, ACM, pp 173\u2013178","DOI":"10.1145\/3054977.3055003"},{"key":"7182_CR9","first-page":"111","volume":"7","author":"MU Farooq","year":"2015","unstructured":"Farooq MU, Waseem M, Khairi A, Mazhar S (2015) A critical analysis on the security concerns of internet of things (iot). Int J Comput Appl 7:111","journal-title":"Int J Comput Appl"},{"key":"7182_CR10","doi-asserted-by":"crossref","unstructured":"Ferreira C, Walsh R, Ferreira A (2018) Degradation in urban areas. Current Opinion in Environmental Science & Health","DOI":"10.1016\/j.coesh.2018.04.001"},{"issue":"5","key":"7182_CR11","doi-asserted-by":"publisher","first-page":"1368","DOI":"10.1109\/JSEN.2015.2502401","volume":"16","author":"P Gope","year":"2016","unstructured":"Gope P, Hwang T (2016) Bsn-care: a secure iot-based modern healthcare system using body sensor network. IEEE Sens J 16(5):1368\u20131376","journal-title":"IEEE Sens J"},{"key":"7182_CR12","doi-asserted-by":"crossref","unstructured":"Jararweh Y, Al-Ayyoub M, Benkhelifa E, et al. (2018) An experimental framework for future smart cities using data fusion and software defined systems: the case of environmental monitoring for smart healthcare. Future Generation Computer Systems","DOI":"10.1016\/j.future.2018.01.038"},{"issue":"1","key":"7182_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.2498\/cit.1002318","volume":"22","author":"J Jose","year":"2014","unstructured":"Jose J, Jose J, Princy M (2014) A survey on privacy preserving data aggregation protocols forwireless sensor networks. J Comput Inf Technol 22(1):1\u201320","journal-title":"J Comput Inf Technol"},{"key":"7182_CR14","doi-asserted-by":"crossref","unstructured":"Li X, Jiang P, Chen T, Luo X, Wen Q (2017) A survey on the security of blockchain systems. Future Generation Computer Systems","DOI":"10.1016\/j.future.2017.08.020"},{"key":"7182_CR15","doi-asserted-by":"crossref","unstructured":"Liu B, Yu XL, Chen S, Xu X, Zhu L (2017) Blockchain based data integrity service framework for iot data. In: 2017 IEEE international conference on Web services (ICWS), IEEE, pp 468\u2013475","DOI":"10.1109\/ICWS.2017.54"},{"key":"7182_CR16","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1016\/j.future.2014.08.007","volume":"49","author":"C Liu","year":"2015","unstructured":"Liu C, Yang C, Zhang X, Chen J (2015) External integrity verification for outsourced big data in cloud and iot: a big picture. Futur Gener Comput Syst 49:58\u201367","journal-title":"Futur Gener Comput Syst"},{"key":"7182_CR17","unstructured":"Mazieres D (2015) The stellar consensus protocol: a federated model for internet-level consensus. Stellar Development Foundation"},{"key":"7182_CR18","doi-asserted-by":"crossref","unstructured":"Patil NS, Patil P (2010) Data aggregation in wireless sensor network. In: IEEE international conference on computational intelligence and computing research, vol 6","DOI":"10.1109\/TISC.2010.5714642"},{"issue":"3","key":"7182_CR19","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1145\/3057266","volume":"50","author":"C Perera","year":"2017","unstructured":"Perera C, Qin Y, Estrella JC, Reiff-Marganiec S, Vasilakos AV (2017) Fog computing for sustainable smart cities: a survey. ACM Comput Surv (CSUR) 50(3):32","journal-title":"ACM Comput Surv (CSUR)"},{"issue":"1","key":"7182_CR20","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1109\/TDSC.2014.2316816","volume":"12","author":"M Rezvani","year":"2015","unstructured":"Rezvani M, Ignjatovic A, Bertino E, Jha S (2015) Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks. IEEE Trans Dependable Secure Comput 12(1):98\u2013110","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"7182_CR21","doi-asserted-by":"crossref","unstructured":"Rifi N, Rachkidi E, Agoulmine N, Taher NC (2017) Towards using blockchain technology for iot data access protection. In: 2017 IEEE 17th international conference on ubiquitous wireless broadband (ICUWB), IEEE, pp 1\u20135","DOI":"10.1109\/ICUWB.2017.8251003"},{"key":"7182_CR22","doi-asserted-by":"crossref","unstructured":"Sagirlar G, Carminati B, Ferrari E, Sheehan JD, Ragnoli E (2018) Hybrid-iot: Hybrid blockchain architecture for internet of things-pow sub-blockchains. arXiv:\n1804.03903","DOI":"10.1109\/Cybermatics_2018.2018.00189"},{"key":"7182_CR23","doi-asserted-by":"crossref","unstructured":"Salama U, Yao L, Wang X, Paik H-Y, Beheshti A (2017) Multi-level privacy-preserving access control as a service for personal healthcare monitoring. In: 2017 IEEE international conference on Web services (ICWS), IEEE, pp 878\u2013881","DOI":"10.1109\/ICWS.2017.111"},{"key":"7182_CR24","unstructured":"Sandhu RS (1993) On five definitions of data integrity. In: DBSec, pp 257\u2013267"},{"key":"7182_CR25","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1109\/ACCESS.2017.2757955","volume":"6","author":"PK Sharma","year":"2018","unstructured":"Sharma PK, Chen M-Y, Park JH (2018) A software defined fog node based distributed blockchain cloud architecture for iot. IEEE Access 6:115\u2013124","journal-title":"IEEE Access"},{"issue":"1","key":"7182_CR26","first-page":"84","volume":"13","author":"PK Sharma","year":"2017","unstructured":"Sharma PK, Moon SY, Park JH (2017) Block-vn: a distributed blockchain based vehicular network architecture in smart city. J Inf Process Syst 13(1):84","journal-title":"J Inf Process Syst"},{"key":"7182_CR27","unstructured":"Sheng M, Qin Y, Yao L, Benatallah B (2017) Managing the Web of things: linking the real world to the web. Morgan Kaufmann"},{"key":"7182_CR28","doi-asserted-by":"crossref","unstructured":"Sivathanu G, Wright CP, Zadok E (2005) Ensuring data integrity in storage: techniques and applications. In: Proceedings of the 2005 ACM workshop on storage security and survivability, ACM, pp 26\u201336","DOI":"10.1145\/1103780.1103784"},{"issue":"6","key":"7182_CR29","doi-asserted-by":"publisher","first-page":"1844","DOI":"10.1109\/JIOT.2017.2707489","volume":"4","author":"T Song","year":"2017","unstructured":"Song T, Li R, Mei B, Yu J, Xing X, Cheng X (2017) A privacy preserving communication protocol for iot applications in smart homes. IEEE Internet Things J 4(6):1844\u20131852","journal-title":"IEEE Internet Things J"},{"key":"7182_CR30","doi-asserted-by":"crossref","unstructured":"Su K, Li J, Fu H (2011) Smart city and the applications. In: 2011 International conference on electronics, communications and control (ICECC), IEEE, pp 1028\u20131031","DOI":"10.1109\/ICECC.2011.6066743"},{"issue":"4","key":"7182_CR31","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/1380564.1380568","volume":"11","author":"Y Yang","year":"2008","unstructured":"Yang Y, Wang X, Zhu S, Cao G (2008) Sdap: a secure hop-by-hop data aggregation protocol for sensor networks. ACM Trans Inf Syst Secur (TISSEC) 11(4):18","journal-title":"ACM Trans Inf Syst Secur (TISSEC)"},{"issue":"4","key":"7182_CR32","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1109\/MIC.2015.77","volume":"19","author":"L Yao","year":"2015","unstructured":"Yao L, Sheng QZ, Dustdar S (2015) Web-based management of the internet of things. IEEE Internet Comput 19(4):60\u201367","journal-title":"IEEE Internet Comput"},{"issue":"2","key":"7182_CR33","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1145\/2837024","volume":"16","author":"L Yao","year":"2016","unstructured":"Yao L, Sheng QZ, Ngu AH, Li X (2016) Things of interest recommendation by leveraging heterogeneous relations in the internet of things. ACM Trans Internet Technol (TOIT) 16(2):9","journal-title":"ACM Trans Internet Technol (TOIT)"},{"key":"7182_CR34","doi-asserted-by":"crossref","unstructured":"Yi S, Li C, Li Q (2015) A survey of fog computing: concepts, applications and issues. In: Proceedings of the 2015 workshop on mobile big data, ACM, pp 37\u201342","DOI":"10.1145\/2757384.2757397"},{"issue":"7","key":"7182_CR35","doi-asserted-by":"publisher","first-page":"3179","DOI":"10.1109\/TII.2017.2767557","volume":"14","author":"Z Zeng","year":"2018","unstructured":"Zeng Z, Li Z, Cheng D, Zhang H, Zhan K, Yang Y (2018) Two-stream multirate recurrent neural network for video-based pedestrian reidentification. IEEE Trans Ind Inf 14(7):3179\u20133186","journal-title":"IEEE Trans Ind Inf"},{"key":"7182_CR36","unstructured":"Zheng Z, Xie S, Dai H-N, Wang H (2016) Blockchain challenges and opportunities: a survey. Work Pap.\u20132016"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-7182-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-019-7182-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-7182-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,2]],"date-time":"2020-03-02T06:20:26Z","timestamp":1583130026000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-019-7182-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2,4]]},"references-count":36,"journal-issue":{"issue":"7-8","published-print":{"date-parts":[[2020,2]]}},"alternative-id":["7182"],"URL":"https:\/\/doi.org\/10.1007\/s11042-019-7182-7","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2019,2,4]]},"assertion":[{"value":"26 October 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 January 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 January 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 February 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}