{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,2]],"date-time":"2025-11-02T15:03:56Z","timestamp":1762095836079,"version":"build-2065373602"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"15","license":[{"start":{"date-parts":[[2023,10,23]],"date-time":"2023-10-23T00:00:00Z","timestamp":1698019200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,10,23]],"date-time":"2023-10-23T00:00:00Z","timestamp":1698019200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-023-17204-w","type":"journal-article","created":{"date-parts":[[2023,10,23]],"date-time":"2023-10-23T07:01:41Z","timestamp":1698044501000},"page":"45491-45517","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Data secure application: an application that allows developers to store user data securely using blockchain and IPFS"],"prefix":"10.1007","volume":"83","author":[{"given":"Rupesh Kumar","family":"Dewang","sequence":"first","affiliation":[]},{"given":"Mahendra Pratap","family":"Yadav","sequence":"additional","affiliation":[]},{"given":"Surbhit","family":"Awasthi","sequence":"additional","affiliation":[]},{"given":"Om","family":"Raj","sequence":"additional","affiliation":[]},{"given":"Arvind","family":"Mewada","sequence":"additional","affiliation":[]},{"given":"Kamlakant Laxman","family":"Bawankule","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,10,23]]},"reference":[{"key":"17204_CR1","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1007\/s13174-010-0007-6","volume":"1","author":"Q Zhang","year":"2010","unstructured":"Zhang Q, Cheng L, Boutaba R (2010) Cloud computing: state-of-the-art and research challenges. J Int Serv Appl 1:7\u201318","journal-title":"J Int Serv Appl"},{"issue":"20","key":"17204_CR2","doi-asserted-by":"publisher","first-page":"e6364","DOI":"10.1002\/cpe.6364","volume":"33","author":"M Pratap Yadav","year":"2021","unstructured":"Pratap Yadav M, Pal N, Kumar Yadav D (2021) A formal approach for docker container deployment. Concurr Comput Pract Exp 33(20):e6364","journal-title":"Concurr Comput Pract Exp"},{"key":"17204_CR3","doi-asserted-by":"publisher","first-page":"38437","DOI":"10.1109\/ACCESS.2018.2851611","volume":"6","author":"S Wang","year":"2018","unstructured":"Wang S, Zhang Y, Zhang Y (2018) A blockchain-based framework for data sharing with fine-grained access control in decentralized storage systems. Ieee Access 6:38437\u201338450","journal-title":"Ieee Access"},{"issue":"5","key":"17204_CR4","doi-asserted-by":"publisher","first-page":"3733","DOI":"10.1007\/s10586-022-03598-z","volume":"25","author":"S Ahmad","year":"2022","unstructured":"Ahmad S, Mehfuz S, Mebarek-Oudina F, Beg J (2022) Rsm analysis based cloud access security broker: a systematic literature review. Cluster Comput 25(5):3733\u20133763","journal-title":"Cluster Comput"},{"key":"17204_CR5","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1016\/j.procs.2015.04.171","volume":"48","author":"RV Rao","year":"2015","unstructured":"Rao RV, Selvamani K (2015) Data security challenges and its solutions in cloud computing. Proced Comput Sci 48:204\u2013209","journal-title":"Proced Comput Sci"},{"key":"17204_CR6","doi-asserted-by":"publisher","first-page":"131723","DOI":"10.1109\/ACCESS.2020.3009876","volume":"8","author":"P Yang","year":"2020","unstructured":"Yang P, Xiong N, Ren J (2020) Data security and privacy protection for cloud storage: A survey. IEEE Access 8:131723\u2013131740","journal-title":"IEEE Access"},{"key":"17204_CR7","doi-asserted-by":"publisher","first-page":"101671","DOI":"10.1016\/j.is.2020.101671","volume":"96","author":"A Rafique","year":"2021","unstructured":"Rafique A, Van Landuyt D, Beni EH, Lagaisse B, Joosen W (2021) Cryptdice: Distributed data protection system for secure cloud data storage and computation. Inf Syst 96:101671","journal-title":"Inf Syst"},{"key":"17204_CR8","unstructured":"Gray C (2014) Storj vs. dropbox: Why decentralized storage is the future. On line at: https:\/\/bitcoinmagazine.com\/articles\/storjvs-dropboxdecentralized-storage-future, 1408177107"},{"key":"17204_CR9","unstructured":"Benet J (2014) Ipfs-content addressed, versioned, p2p file system. arXiv:1407.3561"},{"issue":"30","key":"17204_CR10","doi-asserted-by":"publisher","first-page":"43837","DOI":"10.1007\/s11042-022-13215-1","volume":"81","author":"MT Nyo","year":"2022","unstructured":"Nyo MT, Mebarek-Oudina F, Hlaing SS, Khan NA (2022) Otsu\u2019s thresholding technique for mri image brain tumor segmentation. Multimed Tools Appl 81(30):43837\u201343849","journal-title":"Multimed Tools Appl"},{"key":"17204_CR11","doi-asserted-by":"crossref","unstructured":"Zhang J, Wang XA, Ma J (2015) Data owner based attribute based encryption. In 2015 international conference on intelligent networking and collaborative systems. IEEE, pp 144\u2013148","DOI":"10.1109\/INCoS.2015.42"},{"issue":"4","key":"17204_CR12","doi-asserted-by":"publisher","first-page":"2841","DOI":"10.1007\/s10586-021-03301-8","volume":"24","author":"J Zarrin","year":"2021","unstructured":"Zarrin J, Wen Phang H, Babu Saheer L, Zarrin B (2021) Blockchain for decentralization of internet: prospects, trends, and challenges. Cluster Comput 24(4):2841\u20132866","journal-title":"Cluster Comput"},{"key":"17204_CR13","unstructured":"Nakamoto S (2008) Bitcoin: A peer-to-peer electronic cash system. Decentral Bus Rev"},{"key":"17204_CR14","unstructured":"Decuyper X (2020) How does a blockchain work - simply explained. https:\/\/www.youtube.com\/watch?v=SSo_EIwHSd4. Accessed 01 June 2020"},{"issue":"2","key":"17204_CR15","first-page":"100112","volume":"2","author":"R Prakash","year":"2022","unstructured":"Prakash R, Anoop VS, Asharaf S (2022) Blockchain technology for cybersecurity: A text mining literature analysis. Int J Inf Manag Data Ins 2(2):100112","journal-title":"Int J Inf Manag Data Ins"},{"key":"17204_CR16","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/j.tele.2018.11.006","volume":"36","author":"F Casino","year":"2019","unstructured":"Casino F, Dasaklis TK, Patsakis C (2019) A systematic literature review of blockchain-based applications: Current status, classification and open issues. Telemat Inf 36:55\u201381","journal-title":"Telemat Inf"},{"key":"17204_CR17","doi-asserted-by":"publisher","first-page":"2901","DOI":"10.1007\/s12083-021-01127-0","volume":"14","author":"SN Khan","year":"2021","unstructured":"Khan SN, Loukil F, Ghedira-Guegan C, Benkhelifa E, Bani-Hani A (2021) Blockchain smart contracts: Applications, challenges, and future trends. Peer-to-peer Netw Appl 14:2901\u20132925","journal-title":"Peer-to-peer Netw Appl"},{"issue":"3","key":"17204_CR18","doi-asserted-by":"publisher","first-page":"100074","DOI":"10.1016\/j.bcra.2022.100074","volume":"3","author":"A Laurent","year":"2022","unstructured":"Laurent A, Brotcorne L, Fortz B (2022) Transaction fees optimization in the ethereum blockchain. Blockchain Res Appl 3(3):100074","journal-title":"Blockchain Res Appl"},{"key":"17204_CR19","unstructured":"Etherscan API. https:\/\/etherscan.io\/apis. Accessed 02 June 2020"},{"key":"17204_CR20","unstructured":"Gwei to INR (Gwei to Indian Rupee). https:\/\/www.cryps.info\/en\/Gwei_to_INR\/. Accessed 03 June 2020"},{"key":"17204_CR21","unstructured":"Blockchain for financial services. https:\/\/ibm.com\/blockchain\/industries\/financial-services. Accessed 29 May 2020"},{"key":"17204_CR22","unstructured":"Blockchain for the supply chain. https:\/\/www.ibm.com\/blockchain\/industries\/supply-chain. Accessed 29 May 2020"},{"key":"17204_CR23","unstructured":"Fromknecht C, Velicanu D, Yakoubov S (2014) A decentralized public key infrastructure with identity retention. Cryptol ePrint Archive"},{"key":"17204_CR24","doi-asserted-by":"crossref","unstructured":"Zyskind G, Nathan O et\u00a0al (2015) Decentralizing privacy: Using blockchain to protect personal data. In: 2015 IEEE security and privacy workshops. IEEE, pp 180\u2013184","DOI":"10.1109\/SPW.2015.27"},{"key":"17204_CR25","doi-asserted-by":"crossref","unstructured":"Rahulamathavan Y, Phan RC-W, Rajarajan M, Misra S, Kondoz A (2017) Privacy-preserving blockchain based iot ecosystem using attribute-based encryption. In 2017 IEEE international conference on advanced networks and telecommunications systems (ANTS). IEEE, pp 1\u20136","DOI":"10.1109\/ANTS.2017.8384164"},{"issue":"7","key":"17204_CR26","first-page":"137","volume":"5","author":"H Es-Samaali","year":"2017","unstructured":"Es-Samaali H, Outchakoucht A, Leroy JP (2017) A blockchain-based access control for big data. Int J Comput Netw Commun Secur 5(7):137","journal-title":"Int J Comput Netw Commun Secur"},{"key":"17204_CR27","unstructured":"IPFS powers the distributed Web. https:\/\/ipfs.io\/. Accessed 29 May 2020"},{"key":"17204_CR28","unstructured":"Vorick D, Champine L (2014) Sia: Simple decentralized storage. Retriev May 8:2018"},{"key":"17204_CR29","unstructured":"Storj\u00a0Labs I (2018) Storj: A decentralized cloud storage network framework"},{"key":"17204_CR30","unstructured":"Labs P (2017) Filecoin: A decentralized storage network"},{"issue":"5","key":"17204_CR31","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney L (2002) k-anonymity: a model for protecting privacy. Int J Uncert Fuzz Knowl-based Syst 10(5):557\u2013570","journal-title":"Int J Uncert Fuzz Knowl-based Syst"},{"key":"17204_CR32","doi-asserted-by":"crossref","unstructured":"Li N, Li T, Venkatasubramanian S (2006) t-closeness: Privacy beyond k-anonymity and l-diversity. In: 2007 IEEE 23rd international conference on data engineering. IEEE, pp 106\u2013115","DOI":"10.1109\/ICDE.2007.367856"},{"key":"17204_CR33","doi-asserted-by":"crossref","unstructured":"Machanavajjhala A, Kifer D, Gehrke J, Venkitasubramaniam M (2007) l-diversity: Privacy beyond k-anonymity. ACM Trans Knowl Disc Data (TKDD) 1(1):3\u2013es","DOI":"10.1145\/1217299.1217302"},{"key":"17204_CR34","unstructured":"Narayanan A, Shmatikov V (2006) How to break anonymity of the netflix prize dataset. arXiv:cs\/0610105"},{"key":"17204_CR35","doi-asserted-by":"crossref","unstructured":"Gentry C (2009) Fully homomorphic encryption using ideal lattices. In: Proceedings of the forty-first annual ACM symposium on theory of computing. pp 169\u2013178","DOI":"10.1145\/1536414.1536440"},{"key":"17204_CR36","doi-asserted-by":"crossref","unstructured":"Wang S, Zhang Y, Zhang Y (2018) A blockchain-based framework for data sharing with fine-grained access control in decentralized storage systems. IEEE Access 6:38437\u201338450","DOI":"10.1109\/ACCESS.2018.2851611"},{"key":"17204_CR37","unstructured":"Benet J, Greco N (2018) Filecoin: a decentralized storage network. Protocol Labs"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-17204-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-17204-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-17204-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,29]],"date-time":"2024-04-29T11:04:39Z","timestamp":1714388679000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-17204-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,23]]},"references-count":37,"journal-issue":{"issue":"15","published-online":{"date-parts":[[2024,5]]}},"alternative-id":["17204"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-17204-w","relation":{},"ISSN":["1573-7721"],"issn-type":[{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2023,10,23]]},"assertion":[{"value":"11 April 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 September 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 September 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 October 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This work has not any funding support, it has not any conficts of interests or competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Funding and\/or Conflicts of interests\/Competing interests"}}]}}