{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T08:12:10Z","timestamp":1762330330846,"version":"build-2065373602"},"reference-count":57,"publisher":"Springer Science and Business Media LLC","issue":"16","license":[{"start":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T00:00:00Z","timestamp":1762300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T00:00:00Z","timestamp":1762300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"DOI":"10.1007\/s11227-025-08011-1","type":"journal-article","created":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T08:06:00Z","timestamp":1762329960000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["DAGShare: a DAG-based personal file sharing framework with off-chain IPFS and access control"],"prefix":"10.1007","volume":"81","author":[{"given":"Hira","family":"Arshad","sequence":"first","affiliation":[]},{"given":"Areeb Ahmed","family":"Bhutta","sequence":"additional","affiliation":[]},{"given":"Adnan Noor","family":"Mian","sequence":"additional","affiliation":[]},{"given":"Sumbal","family":"Fatima","sequence":"additional","affiliation":[]},{"given":"Saru","family":"Kumari","sequence":"additional","affiliation":[]},{"given":"Chien-Ming","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,5]]},"reference":[{"key":"8011_CR1","unstructured":"Nakamoto S (2008) Bitcoin: a peer-to-peer electronic cash system. Decentralized Business Review, p 21260"},{"key":"8011_CR2","doi-asserted-by":"crossref","unstructured":"Zhou I, Makhdoom I, Abolhasan M, Lipman J, Shariati N (2019) A blockchain-based file-sharing system for academic paper review. In: 2019 13th International Conference on Signal Processing and Communication Systems (ICSPCS), pp 1\u201310","DOI":"10.1109\/ICSPCS47537.2019.9008695"},{"key":"8011_CR3","doi-asserted-by":"crossref","unstructured":"Pradhan S, Tripathy S, Nandi S (2018) Blockchain based security framework for p2p filesharing system. In: IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), pp 1\u20136","DOI":"10.1109\/ANTS.2018.8710078"},{"key":"8011_CR4","doi-asserted-by":"publisher","first-page":"103745","DOI":"10.1016\/j.csi.2023.103745","volume":"87","author":"M Almasian","year":"2024","unstructured":"Almasian M, Shafieinejad A (2024) Secure cloud file sharing scheme using blockchain and attribute-based encryption. Comput Stand Interfaces 87:103745","journal-title":"Comput Stand Interfaces"},{"issue":"1","key":"8011_CR5","doi-asserted-by":"publisher","first-page":"tyaa025, 02","DOI":"10.1093\/cybsec\/tyaa025","volume":"7","author":"S Park","year":"2021","unstructured":"Park S, Specter M, Narula N, Rivest RL (2021) Going from bad to worse: from Internet voting to blockchain voting. J Cybersecur 7(1):tyaa025, 02","journal-title":"J Cybersecur"},{"key":"8011_CR6","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1016\/j.ins.2018.06.071","volume":"465","author":"J Li","year":"2018","unstructured":"Li J, Wu J, Chen L (2018) Block-secure: blockchain based scheme for secure p2p cloud storage. Inf Sci 465:219\u2013231","journal-title":"Inf Sci"},{"issue":"2","key":"8011_CR7","first-page":"216","volume":"13","author":"Y Zhang","year":"2019","unstructured":"Zhang Y, Xu C, Cheng N, Li H, Yang H, Shen X (2019) Chronos+: an accurate blockchain-based time-stamping scheme for cloud storage. IEEE Trans Serv Comput 13(2):216\u2013229","journal-title":"IEEE Trans Serv Comput"},{"key":"8011_CR8","doi-asserted-by":"publisher","first-page":"5112","DOI":"10.1109\/ACCESS.2018.2789929","volume":"6","author":"M Turkanovi\u0107","year":"2018","unstructured":"Turkanovi\u0107 M, H\u00f6lbl M, Ko\u0161i\u010d K, Heri\u010dko M, Kami\u0161ali\u0107 A (2018) EduCTX: a blockchain-based higher education credit platform. IEEE Access 6:5112\u20135127","journal-title":"IEEE Access"},{"issue":"2","key":"8011_CR9","doi-asserted-by":"publisher","first-page":"1495","DOI":"10.1109\/JIOT.2018.2836144","volume":"6","author":"Z Yang","year":"2018","unstructured":"Yang Z, Yang K, Lei L, Zheng K, Leung VC (2018) Blockchain-based decentralized trust management in vehicular networks. IEEE Internet Things J 6(2):1495\u20131505","journal-title":"IEEE Internet Things J"},{"key":"8011_CR10","doi-asserted-by":"crossref","unstructured":"Stanciu A (2017) Blockchain based distributed control system for edge computing. In: 2017 21st International Conference on Control Systems and Computer Science (CSCS). IEEE, pp 667\u2013671","DOI":"10.1109\/CSCS.2017.102"},{"key":"8011_CR11","doi-asserted-by":"crossref","unstructured":"Xu X, Weber I, Staples M, Zhu L, Bosch J, Bass L, Pautasso C, Rimba P (2017) A taxonomy of blockchain-based systems for architecture design. In: IEEE International Conference on Software Architecture (ICSA). IEEE, pp 243\u2013252","DOI":"10.1109\/ICSA.2017.33"},{"issue":"2","key":"8011_CR12","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/s10723-018-9439-1","volume":"16","author":"V Stankovski","year":"2018","unstructured":"Stankovski V, Prodan R (2018) Guest editors\u2019 introduction: special issue on storage for the big data era. J Grid Comput 16(2):161\u2013163","journal-title":"J Grid Comput"},{"key":"8011_CR13","doi-asserted-by":"publisher","first-page":"10995","DOI":"10.1109\/ACCESS.2023.3240237","volume":"11","author":"MI Khalid","year":"2023","unstructured":"Khalid MI, Ehsan I, Al-Ani AK, Iqbal J, Hussain S, Ullah SS et al (2023) A comprehensive survey on blockchain-based decentralized storage networks. IEEE Access 11:10995\u201311015","journal-title":"IEEE Access"},{"key":"8011_CR14","doi-asserted-by":"publisher","first-page":"103232","DOI":"10.1016\/j.jnca.2021.103232","volume":"195","author":"AI Sanka","year":"2021","unstructured":"Sanka AI, Cheung RC (2021) A systematic review of blockchain scalability: issues, solutions, analysis and future research. J Netw Comput Appl 195:103232","journal-title":"J Netw Comput Appl"},{"key":"8011_CR15","unstructured":"Poon J, Dryja T (2016) The bitcoin lightning network: scalable off-chain instant payments"},{"key":"8011_CR16","first-page":"2327","volume":"21","author":"G Wood","year":"2016","unstructured":"Wood G (2016) Polkadot: vision for a heterogeneous multi-chain framework. White Paper 21:2327\u20134662","journal-title":"White Paper"},{"key":"8011_CR17","unstructured":"Serguei (2022) IOTA, https:\/\/www.iota.org\/. Accessed 7 April"},{"key":"8011_CR18","unstructured":"Juan Benet (2022) IPFS, https:\/\/ipfs.io\/. Accessed 7 April"},{"key":"8011_CR19","doi-asserted-by":"publisher","first-page":"10792","DOI":"10.1109\/JIOT.2021.3128025","volume":"9","author":"L Zhao","year":"2021","unstructured":"Zhao L, Vigneri L, Cullen A, Sanders W, Ferraro P, Shorten R (2021) Secure access control for dag-based distributed ledgers. IEEE Internet Things J 9:10792\u201310806","journal-title":"IEEE Internet Things J"},{"key":"8011_CR20","unstructured":"Ferraro P, King C, Shorten R (2018) Iota-based directed acyclic graphs without orphans, arXiv preprint arXiv:1901.07302"},{"key":"8011_CR21","first-page":"964","volume":"6","author":"S Popov","year":"2019","unstructured":"Popov S, Lu Q (2019) IOTA: feeless and free. IEEE Blockchain Techn Briefs 6:964","journal-title":"IEEE Blockchain Techn Briefs"},{"key":"8011_CR22","unstructured":"Benet J (2014) Ipfs-content addressed, versioned, p2p file system,\u2019 arXiv preprint arXiv:1407.3561,"},{"issue":"1","key":"8011_CR23","doi-asserted-by":"publisher","first-page":"1047","DOI":"10.1007\/s10586-023-04038-2","volume":"27","author":"J Kaur","year":"2024","unstructured":"Kaur J, Rani R, Kalra N (2024) Attribute-based access control scheme for secure storage and sharing of EHRS using blockchain and IPFS. Clust Comput 27(1):1047\u20131061","journal-title":"Clust Comput"},{"key":"8011_CR24","first-page":"3","volume":"1","author":"S Popov","year":"2018","unstructured":"Popov S (2018) The tangle. White paper 1:3","journal-title":"White paper"},{"issue":"9","key":"8011_CR25","doi-asserted-by":"publisher","first-page":"2042","DOI":"10.3390\/s19092042","volume":"19","author":"Y Jiang","year":"2019","unstructured":"Jiang Y, Wang C, Wang Y, Gao L (2019) A cross-chain solution to integrating multiple blockchains for IoT data management. Sensors 19(9):2042","journal-title":"Sensors"},{"key":"8011_CR26","doi-asserted-by":"crossref","unstructured":"Assante D, Crucco R (2019) M2M learning environment for electric applications. In: (2019) IEEE Global Engineering Education Conference (EDUCON). IEEE, pp 1518\u20131522","DOI":"10.1109\/EDUCON.2019.8725151"},{"key":"8011_CR27","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1016\/j.csbj.2018.06.004","volume":"16","author":"J Brogan","year":"2018","unstructured":"Brogan J, Baskaran I, Ramachandran N (2018) Authenticating health activity data using distributed ledger technologies. Comput Struct Biotechnol J 16:257\u2013266","journal-title":"Comput Struct Biotechnol J"},{"key":"8011_CR28","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.parkreldis.2018.08.001","volume":"58","author":"X Zheng","year":"2019","unstructured":"Zheng X, Vieira A, Marcos SL, Aladro Y, Ordieres-Mer\u00e9 J (2019) Activity-aware essential tremor evaluation using deep learning method based on acceleration data. Parkinsonism Related Disorders 58:17\u201322","journal-title":"Parkinsonism Related Disorders"},{"key":"8011_CR29","doi-asserted-by":"publisher","first-page":"103383","DOI":"10.1016\/j.jnca.2022.103383","volume":"2003","author":"M Conti","year":"2022","unstructured":"Conti M, Kumar G, Nerurkar P, Saha R, Vigneri L (2022) A survey on security challenges and solutions in the IOTA. J Netw Comput Appl 2003:103383","journal-title":"J Netw Comput Appl"},{"key":"8011_CR30","doi-asserted-by":"crossref","unstructured":"Bu G, G\u00fcrcan \u00d6, Potop-Butucaru M (2019) G-IOTA: fair and confidence aware tangle. In: IEEE INFOCOM 2019-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). IEEE, pp 44\u2013649","DOI":"10.1109\/INFCOMW.2019.8845163"},{"key":"8011_CR31","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1016\/j.comnet.2018.11.019","volume":"148","author":"U Sarfraz","year":"2019","unstructured":"Sarfraz U, Alam M, Zeadally S, Khan A (2019) Privacy aware IOTA ledger: decentralized mixing and unlinkable iota transactions. Comput Netw 148:361\u2013372","journal-title":"Comput Netw"},{"key":"8011_CR32","unstructured":"Handy P (2022) Introducing masked authenticated messaging, https:\/\/medium.com\/iotatangle\/introducing-masked-authenticated-messaging-e55c1822d50e. Accessed 7 April"},{"key":"8011_CR33","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1016\/j.future.2019.06.025","volume":"101","author":"S Shafeeq","year":"2019","unstructured":"Shafeeq S, Alam M, Khan A (2019) Privacy aware decentralized access control system. Futur Gener Comput Syst 101:420\u2013433","journal-title":"Futur Gener Comput Syst"},{"key":"8011_CR34","unstructured":"Popov S, Moog H, Camargo D, Capossele A, Dimitrov V, Gal A, Greve A, Kusmierz B, Mueller S, Penzkofer A et\u00a0al (2020) The coordicide. Accessed Jan, pp 1\u201330"},{"key":"8011_CR35","unstructured":"De la Rocha A, Dias D, Psaras Y (2021) Accelerating content routing with bitswap: a multi-path file transfer protocol in ipfs and filecoin"},{"key":"8011_CR36","unstructured":"Mazi\u00e8res DDF (2000) Self-certifying file system, Ph.D. dissertation, Massachusetts Institute of Technology"},{"key":"8011_CR37","doi-asserted-by":"crossref","unstructured":"Zamani M, Movahedi M, Raykova M (2018) Rapidchain: scaling blockchain via full sharding. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp 931\u2013948","DOI":"10.1145\/3243734.3243853"},{"key":"8011_CR38","unstructured":"Layer O (2022) Omni layer, http:\/\/www.omnilayer.org\/. Accessed 7 April"},{"issue":"1","key":"8011_CR39","doi-asserted-by":"publisher","first-page":"92","DOI":"10.3390\/pr9010092","volume":"9","author":"Z Shahbazi","year":"2021","unstructured":"Shahbazi Z, Byun Y-C (2021) Improving transactional data system based on an edge computing-blockchain-machine learning integrated framework. Processes 9(1):92","journal-title":"Processes"},{"key":"8011_CR40","doi-asserted-by":"crossref","unstructured":"Cui S, Asghar MR, Russello G (2018) Towards blockchain-based scalable and trustworthy file sharing. In: 2018 27th International Conference on Computer Communication and Networks (ICCCN). IEEE, pp 1\u20132","DOI":"10.1109\/ICCCN.2018.8487379"},{"issue":"3","key":"8011_CR41","doi-asserted-by":"publisher","first-page":"367","DOI":"10.3233\/JCS-2010-0415","volume":"19","author":"C Dong","year":"2011","unstructured":"Dong C, Russello G, Dulay N (2011) Shared and searchable encrypted data for untrusted servers. J Comput Secur 19(3):367\u2013397","journal-title":"J Comput Secur"},{"key":"8011_CR42","doi-asserted-by":"crossref","unstructured":"Tenorio-Forn\u00e9s A, Hassan S, Pav\u00f3n J (2018) Open peer-to-peer systems over blockchain and ipfs: An agent oriented framework. In\" Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for Distributed Systems, pp 19\u201324","DOI":"10.1145\/3211933.3211937"},{"key":"8011_CR43","doi-asserted-by":"crossref","unstructured":"Nyaletey E, Parizi RM, Zhang Q, Choo K-KR (2019) BlockIPFS-blockchain-enabled interplanetary file system for forensic and trusted data traceability. In: 2019 IEEE International Conference on Blockchain (Blockchain). IEEE, pp 18\u201325","DOI":"10.1109\/Blockchain.2019.00012"},{"issue":"Suppl 1","key":"8011_CR44","first-page":"63","volume":"15","author":"S Vimal","year":"2019","unstructured":"Vimal S, Srivatsa S (2019) A new cluster P2P file sharing system based on IPFS and blockchain technology. J Am Intell Human Comput 15(Suppl 1):63\u201363","journal-title":"J Am Intell Human Comput"},{"key":"8011_CR45","doi-asserted-by":"crossref","unstructured":"Huang H-S, Chang T-S, Wu J-Y (2020) A secure file sharing system based on IPFS and blockchain. In: Proceedings of the 2020 2nd International Electronics Communication Conference, pp 96\u2013100","DOI":"10.1145\/3409934.3409948"},{"key":"8011_CR46","doi-asserted-by":"crossref","unstructured":"Shafagh H, Burkhalter L, Hithnawi A, Duquennoy S (2017) Towards blockchain-based auditable storage and sharing of IoT data. In: Proceedings of the 2017 on Cloud Computing Security Workshop, pp 45\u201350","DOI":"10.1145\/3140649.3140656"},{"issue":"5","key":"8011_CR47","doi-asserted-by":"publisher","first-page":"921","DOI":"10.3390\/pr12050921","volume":"12","author":"IC Lin","year":"2024","unstructured":"Lin IC, Tseng PC, Chen PH, Chiou SJ (2024) Enhancing data preservation and security in industrial control systems through integrated iota implementation. Processes 12(5):921","journal-title":"Processes"},{"issue":"11","key":"8011_CR48","doi-asserted-by":"publisher","first-page":"3191","DOI":"10.1109\/TC.2023.3288760","volume":"72","author":"H Guo","year":"2023","unstructured":"Guo H, Xu M, Zhang J, Liu C, Yu D, Dustdar S, Cheng X (2023) Filedag: a multi-version decentralized storage network built on dag-based blockchain. IEEE Trans Comput 72(11):3191\u20133202","journal-title":"IEEE Trans Comput"},{"key":"8011_CR49","first-page":"3651","volume":"2025","author":"Y Teng","year":"2025","unstructured":"Teng Y, Lv J, Wang Z, Gao Y, Dong W (2025) Timechain: a secure and decentralized off-chain storage system for IoT time series data. Proceedings of the ACM on Web Conference 2025:3651\u20133659","journal-title":"Proceedings of the ACM on Web Conference"},{"key":"8011_CR50","doi-asserted-by":"crossref","unstructured":"Huang TY, Chen YC, Hsieh TC, Chang HC, Chang CC (2023) A secure and IoT-enabled data sharing system based on IPFS and iota blockchain. In: Proceedings of the 2023 5th Blockchain and Internet of Things Conference, July 50\u201357","DOI":"10.1145\/3625078.3625085"},{"issue":"8","key":"8011_CR51","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1109\/MCOM.003.2400277","volume":"63","author":"S Reddi","year":"2025","unstructured":"Reddi S, Rao PM, Saraswathi P, Bera B, Das AK, Sikdar B (2025) Homomorphic encryption for privacy-preserving data sharing with iota and IPFS in IoT-based medical cyber-physical systems. IEEE Commun Mag 63(8):123\u2013130","journal-title":"IEEE Commun Mag"},{"issue":"10","key":"8011_CR52","doi-asserted-by":"publisher","first-page":"1929","DOI":"10.3390\/electronics14101929","volume":"14","author":"IC Lin","year":"2025","unstructured":"Lin IC, Ruan JY, Chang CC, Chang CC, Wang CT (2025) A cybersecurity detection platform integrating iota DLT and IPFS for vulnerability management. Electronics 14(10):1929","journal-title":"Electronics"},{"key":"8011_CR53","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.future.2023.10.014","volume":"152","author":"C Mazzocca","year":"2024","unstructured":"Mazzocca C, Romandini N, Montanari R, Montori F, Zanella A (2024) Enabling federated learning at the edge through the iota tangle. Futur Gener Comput Syst 152:17\u201329","journal-title":"Futur Gener Comput Syst"},{"issue":"6","key":"8011_CR54","doi-asserted-by":"publisher","first-page":"1345","DOI":"10.1007\/s00607-020-00806-9","volume":"102","author":"T Alsboui","year":"2020","unstructured":"Alsboui T, Qin Y, Hill R, Al-Aqrabi H (2020) Enabling distributed intelligence for the internet of things with iota and mobile agents. Computing 102(6):1345\u20131363","journal-title":"Computing"},{"key":"8011_CR55","doi-asserted-by":"crossref","unstructured":"Ahmad AP, Ilham AA, Paundu AW (2023) Analysis of blockchain and interplanetary file system (IPFS) utilization for big data architecture optimization. In 2023 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT). IEEE, pp 652\u2013657","DOI":"10.1109\/COMNETSAT59769.2023.10420785"},{"key":"8011_CR56","doi-asserted-by":"crossref","unstructured":"Armando A, Basin D,Boichut Y, Chevalier Y, Compagna L, Cu\u00e9llar J, Drielsma PH, H\u00e9am P-C, Kouchnarenko O, Mantovani J et\u00a0al. (2005) The avispa tool for the automated validation of internet security protocols and applications. In: International Conference on Computer Aided Verification. Springer, pp 281\u2013285","DOI":"10.1007\/11513988_27"},{"key":"8011_CR57","doi-asserted-by":"publisher","first-page":"109638","DOI":"10.1016\/j.comnet.2023.109638","volume":"224","author":"MA Akram","year":"2023","unstructured":"Akram MA, Ahmad H, Mian AN, Jurcut AD, Kumari S (2023) Blockchain-based privacy-preserving authentication protocol for UAV networks. Comput Netw 224:109638","journal-title":"Comput Netw"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-025-08011-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-025-08011-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-025-08011-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T08:06:09Z","timestamp":1762329969000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-025-08011-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,5]]},"references-count":57,"journal-issue":{"issue":"16","published-online":{"date-parts":[[2025,11]]}},"alternative-id":["8011"],"URL":"https:\/\/doi.org\/10.1007\/s11227-025-08011-1","relation":{},"ISSN":["1573-0484"],"issn-type":[{"type":"electronic","value":"1573-0484"}],"subject":[],"published":{"date-parts":[[2025,11,5]]},"assertion":[{"value":"30 June 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 October 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 November 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"1519"}}