{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T06:26:13Z","timestamp":1774074373858,"version":"3.50.1"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2022,3,5]],"date-time":"2022-03-05T00:00:00Z","timestamp":1646438400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,3,5]],"date-time":"2022-03-05T00:00:00Z","timestamp":1646438400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2022,5]]},"DOI":"10.1007\/s11276-022-02924-y","type":"journal-article","created":{"date-parts":[[2022,3,5]],"date-time":"2022-03-05T18:02:44Z","timestamp":1646503364000},"page":"1541-1562","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":42,"title":["A blockchain and smart contract-based data provenance collection and storing in cloud environment"],"prefix":"10.1007","volume":"28","author":[{"given":"Amrita","family":"Jyoti","sequence":"first","affiliation":[]},{"given":"R. K.","family":"Chauhan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,5]]},"reference":[{"key":"2924_CR1","doi-asserted-by":"publisher","first-page":"849","DOI":"10.1016\/j.future.2017.09.020","volume":"79","author":"B Varghese","year":"2018","unstructured":"Varghese, B., & Buyya, R. (2018). Next generation cloud computing: New trends and research directions. Future Generation Computer Systems, 79, 849\u2013861.","journal-title":"Future Generation Computer Systems"},{"key":"2924_CR2","doi-asserted-by":"publisher","first-page":"43752","DOI":"10.1109\/ACCESS.2020.2978452","volume":"8","author":"H Hassan","year":"2020","unstructured":"Hassan, H., El-Desouky, A. I., Ibrahim, A., El-Kenawy, E. S. M., & Arnous, R. (2020). Enhanced QoS-based model for trust assessment in cloud computing environment. IEEE Access, 8, 43752\u201343763.","journal-title":"IEEE Access"},{"issue":"1","key":"2924_CR3","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/s10586-017-0849-9","volume":"21","author":"P Li","year":"2018","unstructured":"Li, P., Li, J., Huang, Z., Gao, C. Z., Chen, W. B., & Chen, K. (2018). Privacy-preserving outsourced classification in cloud computing. Cluster Computing, 21(1), 277\u2013286.","journal-title":"Cluster Computing"},{"key":"2924_CR4","doi-asserted-by":"crossref","unstructured":"Aceto, G., Persico, V., & Pescap\u00e9, A. (2020). Industry 4.0 and health: Internet of things, big data, and cloud computing for healthcare 4.0.\u00a0Journal of Industrial Information Integration,\u00a018, 100129.","DOI":"10.1016\/j.jii.2020.100129"},{"key":"2924_CR5","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1016\/j.chb.2018.04.003","volume":"85","author":"D Alsmadi","year":"2018","unstructured":"Alsmadi, D., & Prybutok, V. (2018). Sharing and storage behavior via cloud computing: Security and privacy in research and practice. Computers in Human Behavior, 85, 218\u2013226.","journal-title":"Computers in Human Behavior"},{"key":"2924_CR6","doi-asserted-by":"publisher","first-page":"80812","DOI":"10.1109\/ACCESS.2020.2987735","volume":"8","author":"A Razaque","year":"2020","unstructured":"Razaque, A., Amsaad, F., Hariri, S., Almasri, M., Rizvi, S. S., & Frej, M. B. H. (2020). Enhanced grey risk assessment model for support of cloud service provider. IEEE Access, 8, 80812\u201380826.","journal-title":"IEEE Access"},{"key":"2924_CR7","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1016\/j.compeleceng.2018.06.006","volume":"71","author":"N Subramanian","year":"2018","unstructured":"Subramanian, N., & Jeyaraj, A. (2018). Recent security challenges in cloud computing. Computers & Electrical Engineering, 71, 28\u201342.","journal-title":"Computers & Electrical Engineering"},{"issue":"15","key":"2924_CR8","doi-asserted-by":"publisher","first-page":"10701","DOI":"10.1007\/s11042-020-08703-1","volume":"79","author":"Y Yang","year":"2020","unstructured":"Yang, Y., Liu, X., Guo, W., Zheng, X., Dong, C., & Liu, Z. (2020). Multimedia access control with secure provenance in fog-cloud computing networks. Multimedia Tools and Applications, 79(15), 10701\u201310716.","journal-title":"Multimedia Tools and Applications"},{"key":"2924_CR9","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1016\/j.future.2017.10.010","volume":"79","author":"H Cui","year":"2018","unstructured":"Cui, H., Deng, R. H., & Li, Y. (2018). Attribute-based cloud storage with secure provenance over encrypted data. Future Generation Computer Systems, 79, 461\u2013472.","journal-title":"Future Generation Computer Systems"},{"key":"2924_CR10","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1016\/j.comcom.2019.12.041","volume":"151","author":"S Namasudra","year":"2020","unstructured":"Namasudra, S., Devi, D., Kadry, S., Sundarasekar, R., & Shanthini, A. (2020). Towards DNA based data security in the cloud computing environment. Computer Communications, 151, 539\u2013547.","journal-title":"Computer Communications"},{"key":"2924_CR11","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1016\/j.procs.2019.12.100","volume":"163","author":"MS Siddiqui","year":"2019","unstructured":"Siddiqui, M. S., Rahman, A., & Nadeem, A. (2019). Secure data provenance in IoT network using bloom filters. Procedia Computer Science, 163, 190\u2013197.","journal-title":"Procedia Computer Science"},{"key":"2924_CR12","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1016\/j.future.2019.09.053","volume":"103","author":"O Gireesha","year":"2020","unstructured":"Gireesha, O., Somu, N., Krithivasan, K., & VS, S. S. (2020). IIVIFS-WASPAS: An integrated Multi-Criteria Decision-Making perspective for cloud service provider selection. Future Generation Computer Systems, 103, 91\u2013110.","journal-title":"Future Generation Computer Systems"},{"key":"2924_CR13","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1016\/j.ijinfomgt.2018.12.003","volume":"46","author":"M Lnenicka","year":"2019","unstructured":"Lnenicka, M., & Komarkova, J. (2019). Developing a government enterprise architecture framework to support the requirements of big and open linked data with the use of cloud computing. International Journal of Information Management, 46, 124\u2013141.","journal-title":"International Journal of Information Management"},{"key":"2924_CR14","doi-asserted-by":"publisher","first-page":"102038","DOI":"10.1016\/j.simpat.2019.102038","volume":"99","author":"A Wilczy\u0144ski","year":"2020","unstructured":"Wilczy\u0144ski, A., & Ko\u0142odziej, J. (2020). Modelling and simulation of security-aware task scheduling in cloud computing based on blockchain technology. Simulation Modelling Practice and Theory, 99, 102038.","journal-title":"Simulation Modelling Practice and Theory"},{"key":"2924_CR15","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/j.tele.2018.11.006","volume":"36","author":"F Casino","year":"2019","unstructured":"Casino, F., Dasaklis, T. K., & Patsakis, C. (2019). A systematic literature review of blockchain-based applications: Current status, classification and open issues. Telematics and Informatics, 36, 55\u201381.","journal-title":"Telematics and Informatics"},{"key":"2924_CR16","doi-asserted-by":"publisher","first-page":"101728","DOI":"10.1016\/j.sysarc.2020.101728","volume":"107","author":"C Ge","year":"2020","unstructured":"Ge, C., Ma, X., & Liu, Z. (2020). A semi-autonomous distributed blockchain-based framework for UAVs system. Journal of Systems Architecture, 107, 101728.","journal-title":"Journal of Systems Architecture"},{"key":"2924_CR17","doi-asserted-by":"crossref","unstructured":"Abramson, W., Hall, A. J., Papadopoulos, P., Pitropakis, N., & Buchanan, W. J. (2020, September). A distributed trust framework for privacy-preserving machine learning. In\u00a0International Conference on Trust and Privacy in Digital Business\u00a0(pp. 205\u2013220). Springer, Cham.","DOI":"10.1007\/978-3-030-58986-8_14"},{"key":"2924_CR18","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1016\/j.future.2018.09.019","volume":"91","author":"L Zhu","year":"2019","unstructured":"Zhu, L., Wu, Y., Gai, K., & Choo, K. K. R. (2019). Controllable and trustworthy blockchain-based cloud data management. Future Generation Computer Systems, 91, 527\u2013535.","journal-title":"Future Generation Computer Systems"},{"key":"2924_CR19","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1016\/j.future.2018.07.042","volume":"90","author":"M Muzammal","year":"2019","unstructured":"Muzammal, M., Qu, Q., & Nasrulin, B. (2019). Renovating blockchain with distributed databases: An open source system. Future generation computer systems, 90, 105\u2013117.","journal-title":"Future generation computer systems"},{"key":"2924_CR20","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1016\/j.comcom.2020.04.023","volume":"157","author":"M Wang","year":"2020","unstructured":"Wang, M., & Zhang, Q. (2020). Optimized data storage algorithm of IoT based on cloud computing in distributed system. Computer Communications, 157, 124\u2013131.","journal-title":"Computer Communications"},{"issue":"8","key":"2924_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-018-1007-5","volume":"42","author":"H Kaur","year":"2018","unstructured":"Kaur, H., Alam, M. A., Jameel, R., Mourya, A. K., & Chang, V. (2018). A proposed solution and future direction for blockchain-based heterogeneous medicare data in cloud environment. Journal of medical systems, 42(8), 1\u201311.","journal-title":"Journal of medical systems"},{"key":"2924_CR22","doi-asserted-by":"crossref","unstructured":"Tasnim, M. A., Al Omar, A., Rahman, M. S., & Bhuiyan, M. Z. A. (2018, December). Crab: Blockchain based criminal record management system. In\u00a0International conference on security, privacy and anonymity in computation, communication and storage\u00a0(pp. 294\u2013303). Springer, Cham.","DOI":"10.1007\/978-3-030-05345-1_25"},{"issue":"4","key":"2924_CR23","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/MCE.2019.2892222","volume":"8","author":"D Tosh","year":"2019","unstructured":"Tosh, D., Shetty, S., Liang, X., Kamhoua, C., & Njilla, L. L. (2019). Data provenance in the cloud: A blockchain-based approach. IEEE consumer electronics magazine, 8(4), 38\u201344.","journal-title":"IEEE consumer electronics magazine"},{"issue":"2","key":"2924_CR24","doi-asserted-by":"publisher","first-page":"739","DOI":"10.1007\/s10586-020-03157-4","volume":"24","author":"M Tahir","year":"2021","unstructured":"Tahir, M., Sardaraz, M., Mehmood, Z., & Muhammad, S. (2021). CryptoGA: A cryptosystem based on genetic algorithm for cloud data security. Cluster Computing, 24(2), 739\u2013752.","journal-title":"Cluster Computing"},{"key":"2924_CR25","first-page":"3877","volume":"33","author":"PS Kumari","year":"2020","unstructured":"Kumari, P. S., & Kamal, A. N. B. (2020). Integrity service application model with prevention of cryptanalytic attacks. Materials Today: Proceedings, 33, 3877\u20133883.","journal-title":"Materials Today: Proceedings"},{"issue":"6","key":"2924_CR26","doi-asserted-by":"publisher","first-page":"102382","DOI":"10.1016\/j.ipm.2020.102382","volume":"57","author":"J Li","year":"2020","unstructured":"Li, J., Wu, J., Jiang, G., & Srikanthan, T. (2020). Blockchain-based public auditing for big data in cloud storage. Information Processing & Management, 57(6), 102382.","journal-title":"Information Processing & Management"},{"key":"2924_CR27","doi-asserted-by":"crossref","unstructured":"Darwish, M. A., Yafi, E., Al Ghamdi, M. A., & Almasri, A. (2020). Decentralizing privacy implementation at cloud storage using blockchain-based hybrid algorithm. Arabian Journal for Science and Engineering, 1\u201310.","DOI":"10.1007\/s13369-020-04394-w"},{"issue":"3","key":"2924_CR28","doi-asserted-by":"publisher","first-page":"831","DOI":"10.1007\/s41870-020-00441-9","volume":"12","author":"M Tajammul","year":"2020","unstructured":"Tajammul, M., & Parveen, R. (2020). Auto encryption algorithm for uploading data on cloud storage. International Journal of Information Technology, 12(3), 831\u2013837.","journal-title":"International Journal of Information Technology"},{"key":"2924_CR29","doi-asserted-by":"publisher","first-page":"102010","DOI":"10.1016\/j.cose.2020.102010","volume":"99","author":"H Huang","year":"2020","unstructured":"Huang, H., Zhu, P., Xiao, F., Sun, X., & Huang, Q. (2020). A blockchain-based scheme for privacy-preserving and secure sharing of medical data. Computers & Security, 99, 102010.","journal-title":"Computers & Security"},{"key":"2924_CR30","doi-asserted-by":"crossref","unstructured":"Bal, P. K., & Pradhan, S. K. (2020). Multi-level authentication-based secure aware data transaction on cloud using cyclic shift transposition algorithm. In\u00a0Advances in Intelligent Computing and Communication\u00a0(pp. 384\u2013393). Springer, Singapore.","DOI":"10.1007\/978-981-15-2774-6_46"},{"issue":"3","key":"2924_CR31","doi-asserted-by":"publisher","first-page":"e150","DOI":"10.1002\/itl2.150","volume":"3","author":"N Ajaykumar","year":"2020","unstructured":"Ajaykumar, N., Sarvagya, M., & Parandkar, P. (2020). A novel security algorithm ECC-L for wireless sensor network. Internet Technology Letters, 3(3), e150.","journal-title":"Internet Technology Letters"},{"key":"2924_CR32","doi-asserted-by":"crossref","unstructured":"Debnath, S., Chattopadhyay, A., & Dutta, S. (2017, November). Brief review on journey of secured hash algorithms. In\u00a02017 4th International Conference on Opto-Electronics and Applied Optics (Optronix)\u00a0(pp. 1\u20135). IEEE.","DOI":"10.1109\/OPTRONIX.2017.8349971"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-022-02924-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11276-022-02924-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-022-02924-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T23:31:00Z","timestamp":1744155060000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11276-022-02924-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,5]]},"references-count":32,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,5]]}},"alternative-id":["2924"],"URL":"https:\/\/doi.org\/10.1007\/s11276-022-02924-y","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"value":"1022-0038","type":"print"},{"value":"1572-8196","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,3,5]]},"assertion":[{"value":"7 February 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 March 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Authors declares that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"There is no informed consent for this study.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"Not Applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"This article does not contain any studies with human participants\u00a0and\/or animals performed by any of the authors.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}