{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:43:44Z","timestamp":1767339824055,"version":"3.40.3"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2023,5,8]],"date-time":"2023-05-08T00:00:00Z","timestamp":1683504000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,5,8]],"date-time":"2023-05-08T00:00:00Z","timestamp":1683504000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2021YFB3300900, 2020YFE0201100 and 2022YFB4500800","2021YFB3300900, 2020YFE0201100 and 2022YFB4500800"],"award-info":[{"award-number":["2021YFB3300900, 2020YFE0201100 and 2022YFB4500800","2021YFB3300900, 2020YFE0201100 and 2022YFB4500800"]}]},{"name":"Research Fund of State Key Laboratory of Synthetical Automation for Process Industries","award":["2018ZCX03"],"award-info":[{"award-number":["2018ZCX03"]}]},{"name":"the Funds of the National Natural Science Foundation of China","award":["61621004, U1908213 and 62072089"],"award-info":[{"award-number":["61621004, U1908213 and 62072089"]}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","award":["N2116016, N2104001 and N2019007"],"award-info":[{"award-number":["N2116016, N2104001 and N2019007"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]},{"name":"the Open Program of Neusoft Corporation","award":["NCBETOP2102"],"award-info":[{"award-number":["NCBETOP2102"]}]},{"name":"Program","award":["JCKY2021211B017"],"award-info":[{"award-number":["JCKY2021211B017"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["World Wide Web"],"published-print":{"date-parts":[[2023,9]]},"DOI":"10.1007\/s11280-023-01172-0","type":"journal-article","created":{"date-parts":[[2023,5,8]],"date-time":"2023-05-08T15:15:57Z","timestamp":1683558957000},"page":"2709-2726","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["An efficient privacy-preserving blockchain storage method for internet of things environment"],"prefix":"10.1007","volume":"26","author":[{"given":"Dayu","family":"Jia","sequence":"first","affiliation":[]},{"given":"Guanghong","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Min","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Junchang","family":"Xin","sequence":"additional","affiliation":[]},{"given":"Guoren","family":"Wang","sequence":"additional","affiliation":[]},{"given":"George Y.","family":"Yuan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,5,8]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Li, H., Tang, B., Lu, H., Cheema, M.A., Jensen, C.S.: Spatial data quality in the iot era: management and exploitation. SIGMOD Conference, 2474\u20132482 (2022)","key":"1172_CR1","DOI":"10.1145\/3514221.3522568"},{"doi-asserted-by":"crossref","unstructured":"Ni, W., Cheng, P., Chen, L.: Mixing transactions with arbitrary values on blockchains. IEEE International Conference on Data Engineering (ICDE), 2602\u20132614 (2022)","key":"1172_CR2","DOI":"10.1109\/ICDE53745.2022.00240"},{"key":"1172_CR3","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1016\/bs.adcom.2022.02.011","volume":"127","author":"MP Anuradha","year":"2022","unstructured":"Anuradha, M.P., Rani, K.L.F.C.: Chapter fourteen - blockchain technology for iot edge devices and data security. Adv. Comput. 127, 379\u2013412 (2022)","journal-title":"Adv. Comput."},{"issue":"1","key":"1172_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3409798","volume":"21","author":"Q Song","year":"2021","unstructured":"Song, Q., Chen, Y., Zhong, Y., Lan, K., Fong, S., Tang, R.: A supply-chain system framework based on internet of things using blockchain technology. ACM Trans. Internet Techn. 21(1), 1\u201324 (2021)","journal-title":"ACM Trans. Internet Techn."},{"issue":"2","key":"1172_CR5","doi-asserted-by":"publisher","first-page":"1242","DOI":"10.1109\/TNSE.2019.2961932","volume":"8","author":"P Bhattacharya","year":"2021","unstructured":"Bhattacharya, P., Tanwar, S., Bodkhe, U., Tyagi, S., Kumar, N.: Bindaas: blockchain-based deep-learning as-a-service in healthcare 4.0 applications. IEEE Trans. Netw. Sci. Eng. 8(2), 1242\u20131255 (2021)","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"doi-asserted-by":"crossref","unstructured":"Jia, D., Xin, J., Wang, Z., Guo, W., Wang, G.: Elasticchain: Support very large blockchain by reducing data redundancy. Proc. APWeb-WAIM, 440\u2013454 (2018)","key":"1172_CR6","DOI":"10.1007\/978-3-319-96893-3_33"},{"issue":"3","key":"1172_CR7","doi-asserted-by":"publisher","first-page":"1085","DOI":"10.1007\/s11280-021-00944-w","volume":"25","author":"D Jia","year":"2022","unstructured":"Jia, D., Xin, J., Wang, Z., Lei, H., Wang, G.: Elm-based data distribution model in elasticchain. World Wide Web 25(3), 1085\u20131102 (2022)","journal-title":"World Wide Web"},{"key":"1172_CR8","doi-asserted-by":"publisher","first-page":"67890","DOI":"10.1109\/ACCESS.2021.3077650","volume":"9","author":"D Jia","year":"2021","unstructured":"Jia, D., Xin, J., Wang, Z., Wang, G.: Optimized data storage method for sharding-based blockchain. IEEE Access 9, 67890\u201367900 (2021)","journal-title":"IEEE Access"},{"doi-asserted-by":"crossref","unstructured":"Dang, H., Dinh, T.T.A., Loghin, D., Chang, E.C., Lin, Q., Ooi, B.C.: Towards scaling blockchain systems via sharding. Proc. SIGMOD, 123\u2013140 (2019)","key":"1172_CR9","DOI":"10.1145\/3299869.3319889"},{"doi-asserted-by":"crossref","unstructured":"Kogias, E.K., Jovanovic, P., Gasser, L., Gailly, N., Syta, E., Ford, B.: Omniledger: a secure, scale-out, decentralized ledger via sharding. Proc. IEEE Symposium on Security and Privacy, 583\u2013598 (2018)","key":"1172_CR10","DOI":"10.1109\/SP.2018.000-5"},{"unstructured":"Huang, G.-B., Siew, C.K.: Extreme learning machine: Rbf network case. Int. Conference on Control, Automation, Robotics and Vision, ICARCV, 1029\u20131036 (2004)","key":"1172_CR11"},{"unstructured":"Shahverdi, A., Shirinov, M., Dachman-Soled, D.: Database reconstruction from noisy volumes: a cache side-channel attack on sqlite. USENIX Security Symposium, 1019\u20131035 (2021)","key":"1172_CR12"},{"unstructured":"Jia, J., Gong, N.Z.: Attriguard: A practical defense against attribute inference attacks via adversarial machine learning. USENIX Security Symposium, 513\u2013529 (2018)","key":"1172_CR13"},{"issue":"2","key":"1172_CR14","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/MITP.2022.3157206","volume":"24","author":"N Kshetri","year":"2022","unstructured":"Kshetri, N.: Web 3.0 and the metaverse shaping organizations\u2019 brand and product strategies. IT Prof. 24(2), 11\u201315 (2022)","journal-title":"IT Prof."},{"issue":"1","key":"1172_CR15","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1108\/ICS-03-2020-0043","volume":"30","author":"L Leite","year":"2022","unstructured":"Leite, L., dos Santos, D.R., Almeida, F.L.: The impact of general data protection regulation on software engineering practices. Inf. Comput. Secur. 30(1), 79\u201396 (2022)","journal-title":"Inf. Comput. Secur."},{"issue":"1","key":"1172_CR16","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1109\/MSEC.2019.2953324","volume":"18","author":"W Stallings","year":"2020","unstructured":"Stallings, W.: Handling of personal information and deidentified, aggregated, and pseudonymized information under the california consumer privacy act. IEEE Secur. Priv. 18(1), 61\u201364 (2020)","journal-title":"IEEE Secur. Priv."},{"issue":"2","key":"1172_CR17","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/IOTM.0011.2100030","volume":"4","author":"H-N Dai","year":"2021","unstructured":"Dai, H.-N., Wu, Y., Wang, H., Imran, M., Haider, N.: Blockchain-empowered edge intelligence for internet of medical things against covid-19. IEEE Internet Things Mag. 4(2), 34\u201339 (2021)","journal-title":"IEEE Internet Things Mag."},{"issue":"9","key":"1172_CR18","doi-asserted-by":"publisher","first-page":"6358","DOI":"10.1109\/TII.2022.3142030","volume":"18","author":"P Kumar","year":"2022","unstructured":"Kumar, P., Kumar, R., Gupta, G.P., Tripathi, R., Srivastava, G.: P2tif: a blockchain and deep learning framework for privacy-preserved threat intelligence in industrial iot. IEEE Trans. Ind. Informatics 18(9), 6358\u20136367 (2022)","journal-title":"IEEE Trans. Ind. Informatics"},{"issue":"3","key":"1172_CR19","doi-asserted-by":"publisher","first-page":"2326","DOI":"10.1109\/TNSE.2021.3089435","volume":"8","author":"P Kumar","year":"2021","unstructured":"Kumar, P., Kumar, R., Srivastava, G., Gupta, G.P., Tripathi, R., Gadekallu, T.R., Xiong, N.N.: Ppsf: a privacy-preserving and secure framework using blockchain-based machine-learning for iot-driven smart cities. IEEE Trans. Netw. Sci. Eng. 8(3), 2326\u20132341 (2021)","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"1172_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.compag.2021.106573","volume":"192","author":"F Jamil","year":"2022","unstructured":"Jamil, F., Ibrahim, M., Ullah, I., Kim, S., Kahng, H.K., Kim, D.: Optimal smart contract for autonomous greenhouse environment based on iot blockchain network in agriculture. Comput. Electron. Agric. 192, 106573 (2022)","journal-title":"Comput. Electron. Agric."},{"issue":"4","key":"1172_CR21","doi-asserted-by":"publisher","first-page":"2745","DOI":"10.1109\/TII.2021.3101208","volume":"18","author":"A Bedari","year":"2022","unstructured":"Bedari, A., Wang, S., Yang, J.: A two-stage feature transformation-based fingerprint authentication system for privacy protection in iot. IEEE Trans. Ind. Informatics 18(4), 2745\u20132752 (2022)","journal-title":"IEEE Trans. Ind. Informatics"},{"doi-asserted-by":"crossref","unstructured":"Akter, M., Moustafa, N., Lynar, T.M.: Edge intelligence-based privacy protection framework for iot-based smart healthcare systems. INFOCOM Workshops, 1\u20138 (2022)","key":"1172_CR22","DOI":"10.1109\/INFOCOMWKSHPS54753.2022.9798196"},{"issue":"6","key":"1172_CR23","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1007\/s11432-020-2957-5","volume":"64","author":"Z Guan","year":"2021","unstructured":"Guan, Z., Yang, W., Zhu, L., Wu, L., Wang, R.: Achieving adaptively secure data access control with privacy protection for lightweight iot devices. Sci. China Inf. Sci. 64(6), 140\u2013153 (2021)","journal-title":"Sci. China Inf. Sci."},{"key":"1172_CR24","first-page":"1","volume":"3558972","author":"X He","year":"2021","unstructured":"He, X., Guo, H., Cheng, X.: Blockchain-based privacy protection scheme for iot-assisted educational big data management. Wirel. Commun. Mob. Comput. 3558972, 1\u201311 (2021)","journal-title":"Wirel. Commun. Mob. Comput."},{"issue":"12","key":"1172_CR25","doi-asserted-by":"publisher","first-page":"2659","DOI":"10.14778\/3476311.3476313","volume":"14","author":"Z Zhang","year":"2021","unstructured":"Zhang, Z., Dong, D., Ma, Y., Ying, Y., Jiang, D., Chen, K., Shou, L., Chen, G.: Refiner: a reliable incentive-driven federated learning system powered by blockchain. Proc. VLDB Endow 14(12), 2659\u20132662 (2021)","journal-title":"Proc. VLDB Endow"},{"doi-asserted-by":"crossref","unstructured":"Deng, Y., Han, T., Zhang, N.: Flex: Trading edge computing resources for federated learning via blockchain. INFOCOM Workshops, 1\u20132 (2021)","key":"1172_CR26","DOI":"10.1109\/INFOCOMWKSHPS51825.2021.9484628"},{"issue":"5","key":"1172_CR27","doi-asserted-by":"publisher","first-page":"1092","DOI":"10.1109\/TC.2021.3072033","volume":"71","author":"L Feng","year":"2022","unstructured":"Feng, L., Zhao, Y., Guo, S., Qiu, X., Li, W., Yu, P.: Bafl: a blockchain-based asynchronous federated learning framework. IEEE Trans. Computers 71(5), 1092\u20131103 (2022)","journal-title":"IEEE Trans. Computers"},{"issue":"1","key":"1172_CR28","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1109\/TCSS.2021.3100258","volume":"9","author":"Z Qin","year":"2022","unstructured":"Qin, Z., Ye, J., Meng, J., Lu, B., Wang, L.: Privacy-preserving blockchain-based federated learning for marine internet of things. IEEE Trans. Comput. Soc. Syst. 9(1), 159\u2013173 (2022)","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"issue":"1\u20133","key":"1172_CR29","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1016\/j.neucom.2005.12.126","volume":"70","author":"G-B Huang","year":"2006","unstructured":"Huang, G.-B., Zhu, Q.-Y., Siew, C.K.: Extreme learning machine: theory and applications. Neurocomputing 70(1\u20133), 489\u2013501 (2006)","journal-title":"Neurocomputing"},{"key":"1172_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TIM.2020.3013129","volume":"70","author":"T Ouyang","year":"2021","unstructured":"Ouyang, T., Wang, C., Yu, Z., Stach, R., Mizaikoff, B., Huang, G.-B., Wang, Q.-J.: Nox measurements in vehicle exhaust using advanced deep elm networks. IEEE Trans. Instrum. Meas. 70, 1\u201310 (2021)","journal-title":"IEEE Trans. Instrum. Meas."},{"doi-asserted-by":"crossref","unstructured":"Chen, Y.-T., Chuang, Y.-C., Wu, A.-Y.A.: Online extreme learning machine design for the application of federated learning. IEEE International Conference on Artificial Intelligence Circuits and Systems (AICAS), 188\u2013192 (2020)","key":"1172_CR31","DOI":"10.1109\/AICAS48895.2020.9073802"},{"doi-asserted-by":"crossref","unstructured":"Zhang, Z., Cao, X., Jia, J., Gong, N.Z.: Fldetector: defending federated learning against model poisoning attacks via detecting malicious clients. ACM SIGKDD Conference, 2545\u20132555 (2022)","key":"1172_CR32","DOI":"10.1145\/3534678.3539231"},{"key":"1172_CR33","doi-asserted-by":"publisher","first-page":"5303","DOI":"10.1609\/aaai.v35i6.16669","volume":"2021","author":"K Donahue","year":"2021","unstructured":"Donahue, K., Kleinberg, J.M.: Model-sharing games: analyzing federated learning under voluntary participations. AAAI 2021, 5303\u20135311 (2021)","journal-title":"AAAI"},{"key":"1172_CR34","first-page":"947","volume":"2021","author":"J Zhang","year":"2021","unstructured":"Zhang, J., Wu, Y., Pan, R.: Incentive mechanism for horizontal federated learning based on reputation and reverse auction. WWW 2021, 947\u2013956 (2021)","journal-title":"WWW"},{"unstructured":"Bitcoin price stats and information. https:\/\/bitinfocharts.com\/. [Online] Accessed on: 23 Sep 2022","key":"1172_CR35"},{"unstructured":"Chaincode. https:\/\/github.com\/hyperledger\/fabric\/blob\/v0.6\/examples\/ chaincode\/go\/chaincode_example02\/chaincode_example02.go. [Online] Accessed on: 23 Sep 2022","key":"1172_CR36"}],"container-title":["World Wide Web"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11280-023-01172-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11280-023-01172-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11280-023-01172-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T03:58:44Z","timestamp":1744171124000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11280-023-01172-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,8]]},"references-count":36,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2023,9]]}},"alternative-id":["1172"],"URL":"https:\/\/doi.org\/10.1007\/s11280-023-01172-0","relation":{},"ISSN":["1386-145X","1573-1413"],"issn-type":[{"type":"print","value":"1386-145X"},{"type":"electronic","value":"1573-1413"}],"subject":[],"published":{"date-parts":[[2023,5,8]]},"assertion":[{"value":"28 January 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 March 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 March 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 May 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interest"}},{"value":"All applicable international, national, and\/or institutional guidelines for the care and use of animals were followed. All procedures performed in studies involving human participants were in accordance with the ethical standards of the institutional and\/or national research committee and with the 1964 Helsinki declaration and its later amendments or comparable ethical standards. This article does not contain any studies with human participants performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}