{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T20:56:03Z","timestamp":1767992163479,"version":"3.49.0"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"20","license":[{"start":{"date-parts":[[2020,9,19]],"date-time":"2020-09-19T00:00:00Z","timestamp":1600473600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,9,19]],"date-time":"2020-09-19T00:00:00Z","timestamp":1600473600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61671087, 61962009, 61003287"],"award-info":[{"award-number":["61671087, 61962009, 61003287"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100004806","name":"Fok Ying Tong Education Foundation","doi-asserted-by":"crossref","award":["131067"],"award-info":[{"award-number":["131067"]}],"id":[{"id":"10.13039\/501100004806","id-type":"DOI","asserted-by":"crossref"}]},{"name":"the Major Science and Technology Support Program of Guizhou Province","award":["20183001"],"award-info":[{"award-number":["20183001"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,8]]},"DOI":"10.1007\/s11042-020-09867-6","type":"journal-article","created":{"date-parts":[[2020,9,19]],"date-time":"2020-09-19T17:02:51Z","timestamp":1600534971000},"page":"30677-30690","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["A new blockchain-based personal privacy protection scheme"],"prefix":"10.1007","volume":"80","author":[{"given":"Yu-Long","family":"Gao","sequence":"first","affiliation":[]},{"given":"Xiu-Bo","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Gang","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Wen","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Mian-Xiong","family":"Dong","sequence":"additional","affiliation":[]},{"given":"Xin","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,19]]},"reference":[{"key":"9867_CR1","doi-asserted-by":"publisher","first-page":"534","DOI":"10.1007\/978-3-319-72395-2_49","volume-title":"Medibchain: A blockchain based privacy preserving platform for healthcare data [C]\/\/International conference on security, privacy and anonymity in computation, communication and storage","author":"A Al Omar","year":"2017","unstructured":"Al Omar A, Rahman MS, Basu A et al (2017) Medibchain: A blockchain based privacy preserving platform for healthcare data [C]\/\/International conference on security, privacy and anonymity in computation, communication and storage. Springer, Cham, pp 534\u2013543"},{"issue":"4","key":"9867_CR2","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1109\/MCC.2017.3791019","volume":"4","author":"A Anjum","year":"2017","unstructured":"Anjum A, Sporny M, Sill A (2017) Blockchain standards for compliance and trust. IEEE Cloud Comput 4(4):84\u201390","journal-title":"IEEE Cloud Comput"},{"key":"9867_CR3","doi-asserted-by":"crossref","unstructured":"Atzei, Nicola, BartolettI, Massimo, Cimoli, Tiziana. (2017) A survey of attacks on ethereum smart contracts (sok). In: Principles of security and trust. Springer, Berlin, Heidelberg, pp. 164\u2013186","DOI":"10.1007\/978-3-662-54455-6_8"},{"issue":"5","key":"9867_CR4","doi-asserted-by":"publisher","first-page":"662","DOI":"10.1080\/1369118X.2012.678878","volume":"15","author":"D Boyd","year":"2012","unstructured":"Boyd D, Crawford K (2012) Critical questions for big data: provocations for a cultural, technological, and scholarly phenomenon. Inf Commun Soc 15(5):662\u2013679","journal-title":"Inf Commun Soc"},{"key":"9867_CR5","unstructured":"Buterin V (2014) Ethereum: A next-generation smart contract and decentralized application platform. URL https:\/\/github.com\/ethereum\/wiki\/wiki\/%5BEnglish%5D-White-Paper"},{"key":"9867_CR6","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1016\/j.ins.2015.09.039","volume":"329","author":"H Cheng","year":"2016","unstructured":"Cheng H, Su Z, Xiong N, Xiao Y (2016) Energy-efficient node scheduling algorithms for wireless sensor networks using Markov random field model. Inf Sci 329:461\u2013477","journal-title":"Inf Sci"},{"key":"9867_CR7","doi-asserted-by":"publisher","first-page":"2292","DOI":"10.1109\/ACCESS.2016.2566339","volume":"4","author":"K Christidis","year":"2016","unstructured":"Christidis K, Devetsikiotis M (2016) Blockchains and smart contracts for the internet of things. IEEE Access 4:2292\u20132303","journal-title":"IEEE Access"},{"key":"9867_CR8","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1016\/j.scs.2018.02.014","volume":"39","author":"GG Dagher","year":"2018","unstructured":"Dagher GG, Mohler J, Milojkovic M, Marella PB (2018) Ancile: privacy-preserving framework for access control and interoperability of electronic health records using blockchain technology. Sustain Cities Soc 39:283\u2013297","journal-title":"Sustain Cities Soc"},{"key":"9867_CR9","doi-asserted-by":"crossref","unstructured":"Decker C, Wattenhofer R (2013) Information propagation in the bitcoin network, Peer-to-Peer Computing (P2P), 2013 IEEE Thirteenth International Conference on. IEEE, Trento","DOI":"10.1109\/P2P.2013.6688704"},{"issue":"1","key":"9867_CR10","first-page":"135","volume":"58","author":"Z Deng","year":"2019","unstructured":"Deng Z, Ren Y, Liu Y, Yin X, Shen Z, Kim H-J (2019) Blockchain-based trusted electronic records preservation in cloud storage, computers. Mater Cont 58(1):135\u2013151","journal-title":"Mater Cont"},{"issue":"7","key":"9867_CR11","first-page":"137","volume":"5","author":"H Es-Samaali","year":"2017","unstructured":"Es-Samaali H, Outchakoucht A, Leroy JP (2017) A blockchain-based access control for big data. Int J Comput Netw Commun Secur 5(7):137\u2013147","journal-title":"Int J Comput Netw Commun Secur"},{"issue":"9","key":"9867_CR12","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/MC.2017.3571042","volume":"50","author":"I Eyal","year":"2017","unstructured":"Eyal I (2017) Blockchain technology: transforming libertarian Cryptocurrency dreams to finance and banking realities. Computer 50(9):38\u201349","journal-title":"Computer"},{"key":"9867_CR13","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1016\/j.ins.2014.06.022","volume":"283","author":"W Fang","year":"2014","unstructured":"Fang W, Li Y, Zhang H, Xiong N, Lai J, Vasilakos AV (2014) On the throughput-energy tradeoff for data transmission between cloud and mobile devices. Inf Sci 283:79\u201393","journal-title":"Inf Sci"},{"issue":"22","key":"9867_CR14","doi-asserted-by":"publisher","first-page":"14617","DOI":"10.1007\/s11042-016-3316-3","volume":"75","author":"Z Fang","year":"2016","unstructured":"Fang Z, Fei F, Fang Y, Lee C, Xiong N, Shu L, Chen S (2016) Abnormal event detection in crowded scenes based on deep learning. Multimed Tools Appl 75(22):14617\u201314639","journal-title":"Multimed Tools Appl"},{"key":"9867_CR15","unstructured":"Fayyad U M, Piatetsky-Shapiro G, Smyth P et al. (1996) Advances in knowledge discovery and data mining. American Association for Artificial Intelligence Menlo Park"},{"issue":"1","key":"9867_CR16","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MVT.2018.2879647","volume":"14","author":"J Feng","year":"2018","unstructured":"Feng J, Liu Z, Wu C et al (2018) Mobile edge computing for the internet of vehicles: offloading framework and job scheduling. IEEE Veh Technol Mag 14(1):28\u201336","journal-title":"IEEE Veh Technol Mag"},{"key":"9867_CR17","unstructured":"Ferraiolo D, Cugini J, Kuhn DR (1995) Role-based access control (RBAC): features and motivations. Proceedings of 11th annual computer security application conference, pp 241-48"},{"issue":"6","key":"9867_CR18","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1109\/MNET.2018.1700269","volume":"32","author":"F Gao","year":"2018","unstructured":"Gao F, Zhu L, Shen M, Sharif K, Wan Z, Ren K (2018) A blockchain-based privacy-preserving payment mechanism for vehicle-to-grid networks. IEEE Netw 32(6):184\u2013192","journal-title":"IEEE Netw"},{"key":"9867_CR19","doi-asserted-by":"publisher","first-page":"27205","DOI":"10.1109\/ACCESS.2018.2827203","volume":"6","author":"YL Gao","year":"2018","unstructured":"Gao YL, Chen XB, Chen YL, Sun Y, Niu XX, Yang YX (2018) A secure cryptocurrency scheme based on post-quantum blockchain. IEEE Access 6:27205\u201327213","journal-title":"IEEE Access"},{"issue":"12","key":"9867_CR20","doi-asserted-by":"publisher","first-page":"2214","DOI":"10.3390\/su9122214","volume":"9","author":"P Giungato","year":"2017","unstructured":"Giungato P, Rana R, Tarabella A, Tricase C (2017) Current trends in sustainability of Bitcoins and related Blockchain technology. Sustainability 9(12):2214","journal-title":"Sustainability"},{"issue":"4","key":"9867_CR21","first-page":"724","volume":"6","author":"Z Guoping","year":"2011","unstructured":"Guoping Z, Wentao G (2011) The research of access control based on UCON in the internet of things. J Softw 6(4):724\u2013731","journal-title":"J Softw"},{"issue":"5\u20136","key":"9867_CR22","doi-asserted-by":"publisher","first-page":"1189","DOI":"10.1016\/j.mcm.2013.02.006","volume":"58","author":"S Gusmeroli","year":"2013","unstructured":"Gusmeroli S, Piccione S, Rotondi D (2013) A capability-based security approach to manage access control in the internet of things. Math Comput Model 58(5\u20136):1189\u20131205","journal-title":"Math Comput Model"},{"issue":"1","key":"9867_CR23","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/s102070100002","volume":"1","author":"D Johnson","year":"2001","unstructured":"Johnson D, Menezes A, Vanstone S (2001) The elliptic curve digital signature algorithm (ECDSA). Int J Inf Secur 1(1):36\u201363","journal-title":"Int J Inf Secur"},{"issue":"1","key":"9867_CR24","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1109\/TETC.2015.2511457","volume":"6","author":"H Li","year":"2018","unstructured":"Li H, Liu D, Dai Y, Luan TH, Yu S (2018) Personalized search over encrypted data with efficient and secure updates in Mobile clouds. IEEE Trans Emerg Top Comput 6(1):97\u2013109","journal-title":"IEEE Trans Emerg Top Comput"},{"issue":"1","key":"9867_CR25","doi-asserted-by":"publisher","first-page":"1489","DOI":"10.1186\/s40064-016-3061-0","volume":"5","author":"X Liu","year":"2016","unstructured":"Liu X, Li S, Liu J, Chen X, Xu G (2016) Secure multiparty computation of a comparison problem. SpringerPlus 5(1):1489","journal-title":"SpringerPlus"},{"issue":"3","key":"9867_CR26","doi-asserted-by":"publisher","first-page":"991","DOI":"10.1007\/s11036-018-1031-1","volume":"24","author":"Z Liu","year":"2019","unstructured":"Liu Z, Tsuda T, Watanabe H, Ryuo S, Iwasawa N (2019) Data driven cyber-physical system for landslide detection. Mobile Netw Appl 24(3):991\u20131002","journal-title":"Mobile Netw Appl"},{"issue":"6","key":"9867_CR27","doi-asserted-by":"publisher","first-page":"1657","DOI":"10.1007\/s11276-009-0220-z","volume":"16","author":"F Long","year":"2010","unstructured":"Long F, Xiong N, Vasilakos AV, Yang LT, Sun F (2010) A sustainable heuristic QoS routing algorithm for pervasive multi-layered satellite wireless networks. Wirel Netw 16(6):1657\u20131673","journal-title":"Wirel Netw"},{"issue":"6077","key":"9867_CR28","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1126\/science.336.6077.22","volume":"336","author":"J Mervis","year":"2012","unstructured":"Mervis J (2012) Science policy: agencies rally to tackle big data. Science 336(6077):22","journal-title":"Science"},{"key":"9867_CR29","unstructured":"Nakamoto S (2008) Bitcoin: A peer-to-peer electronic cash system. [online]. Available: https:\/\/bitcoin.org\/bitcoin.pdf"},{"issue":"1","key":"9867_CR30","doi-asserted-by":"publisher","first-page":"601","DOI":"10.1109\/COMST.2017.2762345","volume":"20","author":"J Ni","year":"2017","unstructured":"Ni J, Zhang K, Lin X et al (2017) Securing fog computing for internet of things applications: challenges and solutions. IEEE Commun Surveys Tutor 20(1):601\u2013628","journal-title":"IEEE Commun Surveys Tutor"},{"issue":"2","key":"9867_CR31","doi-asserted-by":"publisher","first-page":"1184","DOI":"10.1109\/JIOT.2018.2812239","volume":"5","author":"O Novo","year":"2018","unstructured":"Novo O (2018) Blockchain meets IoT: an architecture for scalable access management in IoT. IEEE Internet Things J 5(2):1184\u20131195","journal-title":"IEEE Internet Things J"},{"issue":"18","key":"9867_CR32","doi-asserted-by":"publisher","first-page":"5943","DOI":"10.1002\/sec.1748","volume":"9","author":"A Ouaddah","year":"2016","unstructured":"Ouaddah A, Abou Elkalam A, Ait Ouahman A (2016) FairAccess: A new Blockchain-based access control framework for the internet of things. Secur Commun Netw 9(18):5943\u20135964","journal-title":"Secur Commun Netw"},{"issue":"2","key":"9867_CR33","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/MCE.2017.2776459","volume":"7","author":"D Puthal","year":"2018","unstructured":"Puthal D, Malik N, Mohanty SP, Kougianos E, Yang C (2018) The Blockchain as a decentralized security framework. IEEE Consumer Electron Mag 7(2):18\u201321","journal-title":"IEEE Consumer Electron Mag"},{"issue":"2","key":"9867_CR34","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1109\/MCOM.2017.1600435CM","volume":"55","author":"P Schulz","year":"2017","unstructured":"Schulz P, Matthe M, Klessig H, Simsek M, Fettweis G, Ansari J, Ashraf SA, Almeroth B, Voigt J, Riedel I, Puschmann A, Mitschele-Thiel A, Muller M, Elste T, Windisch M (2017) Latency critical IoT applications in 5G: perspective on the design of radio interface and network architecture. IEEE Commun Mag 55(2):70\u201378","journal-title":"IEEE Commun Mag"},{"issue":"3","key":"9867_CR35","first-page":"973","volume":"60","author":"R Song","year":"2019","unstructured":"Song R, Song Y, Liu Z, Tang M, Zhou K (2019) GaiaWorld: A novel Blockchain system based on competitive PoS consensus mechanism, computers. Mater Cont 60(3):973\u2013987","journal-title":"Mater Cont"},{"key":"9867_CR36","doi-asserted-by":"crossref","unstructured":"Vishwa A, Hussain FK (2018) A Blockchain based approach for multimedia privacy protection and provenance. 2018 IEEE Symposium Series on Computational Intelligence (SSCI). IEEE, pp 1941-1945","DOI":"10.1109\/SSCI.2018.8628636"},{"issue":"1","key":"9867_CR37","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1007\/s11042-013-1378-z","volume":"72","author":"Z Wan","year":"2014","unstructured":"Wan Z, Xiong N, Ghani N, Vasilakos AV, Zhou L (2014) Adaptive unequal protection for wireless video transmission over IEEE 802.11 e networks. Multimed Tools Appl 72(1):541\u2013571","journal-title":"Multimed Tools Appl"},{"key":"9867_CR38","doi-asserted-by":"publisher","first-page":"17545","DOI":"10.1109\/ACCESS.2018.2805837","volume":"6","author":"J Wang","year":"2018","unstructured":"Wang J, Li M, He Y, Li H, Xiao K, Wang C (2018) A blockchain based privacy-preserving incentive mechanism in crowdsensing applications. IEEE Access 6:17545\u201317556","journal-title":"IEEE Access"},{"issue":"1","key":"9867_CR39","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1109\/TKDE.2013.109","volume":"26","author":"X Wu","year":"2014","unstructured":"Wu X, Zhu X, Wu GQ, Ding W (2014) Data mining with big data. IEEE Trans Knowl Data Eng 26(1):97\u2013107","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"6","key":"9867_CR40","first-page":"1","volume":"52","author":"Q Zhu","year":"2019","unstructured":"Zhu Q, Loke SW, Trujillo-Rasua R et al (2019) Applications of distributed ledger technologies to the internet of things: A survey. ACM Comput Survey (CSUR) 52(6):1\u201334","journal-title":"ACM Comput Survey (CSUR)"},{"key":"9867_CR41","doi-asserted-by":"crossref","unstructured":"Zyskind G, Nathan O (2015) Decentralizing privacy: using blockchain to protect personal data, IEEE Security and Privacy Workshops (SPW), San Jose, 180\u2013184","DOI":"10.1109\/SPW.2015.27"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09867-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-09867-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09867-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,18]],"date-time":"2021-09-18T23:44:03Z","timestamp":1632008643000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-09867-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,19]]},"references-count":41,"journal-issue":{"issue":"20","published-print":{"date-parts":[[2021,8]]}},"alternative-id":["9867"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-09867-6","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,9,19]]},"assertion":[{"value":"17 February 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 August 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 September 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 September 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}