{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T07:55:50Z","timestamp":1773388550543,"version":"3.50.1"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2024,1,22]],"date-time":"2024-01-22T00:00:00Z","timestamp":1705881600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,22]],"date-time":"2024-01-22T00:00:00Z","timestamp":1705881600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Front. Comput. Sci."],"published-print":{"date-parts":[[2024,6]]},"DOI":"10.1007\/s11704-022-2327-7","type":"journal-article","created":{"date-parts":[[2024,1,22]],"date-time":"2024-01-22T02:03:31Z","timestamp":1705889011000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Hybrid concurrency control protocol for data sharing among heterogeneous blockchains"],"prefix":"10.1007","volume":"18","author":[{"given":"Tiezheng","family":"Guo","sequence":"first","affiliation":[]},{"given":"Zhiwei","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Ye","family":"Yuan","sequence":"additional","affiliation":[]},{"given":"Xiaochun","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Guoren","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,22]]},"reference":[{"issue":"6","key":"2327_CR1","doi-asserted-by":"publisher","first-page":"866","DOI":"10.1109\/69.553155","volume":"8","author":"M S Chen","year":"1996","unstructured":"Chen M S, Han J, Yu P S. Data mining: an overview from a database perspective. IEEE Transactions on Knowledge and data Engineering, 1996, 8(6): 866\u2013883","journal-title":"IEEE Transactions on Knowledge and data Engineering"},{"issue":"2","key":"2327_CR2","doi-asserted-by":"publisher","first-page":"402","DOI":"10.1109\/TIFS.2012.2235831","volume":"8","author":"L A Dunning","year":"2013","unstructured":"Dunning L A, Kresman R. Privacy preserving data sharing with anonymous ID assignment. IEEE Transactions on Information Forensics and Security, 2013, 8(2): 402\u2013413","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"2327_CR3","doi-asserted-by":"crossref","unstructured":"Kandukuri B R, Paturi V R, Rakshit A. Cloud security issues. In: Proceedings of 2009 IEEE International Conference on Services Computing. 2009, 517\u2013520","DOI":"10.1109\/SCC.2009.84"},{"issue":"1","key":"2327_CR4","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1109\/TKDE.2010.100","volume":"23","author":"P Papadimitriou","year":"2011","unstructured":"Papadimitriou P, Garcia-Molina H. Data leakage detection. IEEE Transactions on Knowledge and Data Engineering, 2011, 23(1): 51\u201363","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"2327_CR5","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1016\/j.future.2014.06.004","volume":"43\u201344","author":"J J Yang","year":"2015","unstructured":"Yang J J, Li J Q, Niu Y. A hybrid solution for privacy preserving medical data sharing in the cloud environment. Future Generation Computer Systems, 2015, 43\u201344: 74\u201386","journal-title":"Future Generation Computer Systems"},{"key":"2327_CR6","unstructured":"Wei J, Wulan B, Yan J, Sun M, Jing H. The adoption of blockchain technologies in data sharing: a state of the art survey. In: Proceedings of the WHICEB 2019. 2019"},{"issue":"4","key":"2327_CR7","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1504\/IJWGS.2018.095647","volume":"14","author":"Z Zheng","year":"2018","unstructured":"Zheng Z, Xie S, Dai H N, Chen X, Wang H. Blockchain challenges and opportunities: a survey. International Journal of Web and Grid Services, 2018, 14(4): 352\u2013375","journal-title":"International Journal of Web and Grid Services"},{"issue":"5","key":"2327_CR8","doi-asserted-by":"publisher","first-page":"102651","DOI":"10.1016\/j.ipm.2021.102651","volume":"58","author":"C Piao","year":"2021","unstructured":"Piao C, Hao Y, Yan J, Jiang X. Privacy preserving in blockchain-based government data sharing: a Service-On-Chain (SOC) approach. Information Processing & Management, 2021, 58(5): 102651","journal-title":"Information Processing & Management"},{"key":"2327_CR9","doi-asserted-by":"crossref","unstructured":"Wang S, Liu J. Blockchain based secure data sharing model. In: Proceedings of the 24th International Conference on Computer Supported Cooperative Work in Design (CSCWD). 2021, 464\u2013469","DOI":"10.1109\/CSCWD49262.2021.9437751"},{"key":"2327_CR10","unstructured":"Johnson S, Robinson P, Brainard J. Sidechains and interoperability. 2019, arXiv preprint arXiv: 1903.04077"},{"issue":"3","key":"2327_CR11","doi-asserted-by":"publisher","first-page":"e0229003","DOI":"10.1371\/journal.pone.0229003","volume":"15","author":"C Tenopir","year":"2020","unstructured":"Tenopir C, Rice N M, Allard S, Baird L, Borycz J, Christian L, Grant B, Olendorf R, Sandusky R J. Data sharing, management, use, and reuse: practices and perceptions of scientists worldwide. PLoS One, 2020, 15(3): e0229003","journal-title":"PLoS One"},{"issue":"11","key":"2327_CR12","doi-asserted-by":"publisher","first-page":"1510","DOI":"10.1038\/nn.3818","volume":"17","author":"R A Poldrack","year":"2014","unstructured":"Poldrack R A, Gorgolewski K J. Making big data open: data sharing in neuroimaging. Nature Neuroscience, 2014, 17(11): 1510\u20131517","journal-title":"Nature Neuroscience"},{"issue":"11","key":"2327_CR13","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1145\/2994581","volume":"59","author":"S Underwood","year":"2016","unstructured":"Underwood S. Blockchain beyond bitcoin. Communications of the ACM, 2016, 59(11): 15\u201317","journal-title":"Communications of the ACM"},{"key":"2327_CR14","doi-asserted-by":"publisher","first-page":"38437","DOI":"10.1109\/ACCESS.2018.2851611","volume":"6","author":"S Wang","year":"2018","unstructured":"Wang S, Zhang Y, Zhang Y. A blockchain-based framework for data sharing with fine-grained access control in decentralized storage systems. IEEE Access, 2018, 6: 38437\u201338450","journal-title":"IEEE Access"},{"key":"2327_CR15","first-page":"650","volume":"2017","author":"A Dubovitskaya","year":"2017","unstructured":"Dubovitskaya A, Xu Z, Ryu S, Schumacher M, Wang F. Secure and trustable electronic medical records sharing using blockchain. AMIA Annual Symposium Proceedings, 2017, 2017: 650\u2013659","journal-title":"AMIA Annual Symposium Proceedings"},{"issue":"1","key":"2327_CR16","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1186\/s13638-021-02041-y","volume":"2021","author":"Y Guo","year":"2021","unstructured":"Guo Y, Wang S, Huang J. A blockchain-assisted framework for secure and reliable data sharing in distributed systems. EURASIP Journal on Wireless Communications and Networking, 2021, 2021(1): 169","journal-title":"EURASIP Journal on Wireless Communications and Networking"},{"issue":"3","key":"2327_CR17","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1007\/s11390-018-1840-5","volume":"33","author":"B K Zheng","year":"2018","unstructured":"Zheng B K, Zhu L H, Shen M, Gao F, Zhang C, Li Y D, Yang J. Scalable and privacy-preserving data sharing based on blockchain. Journal of Computer Science and Technology, 2018, 33(3): 557\u2013567","journal-title":"Journal of Computer Science and Technology"},{"key":"2327_CR18","doi-asserted-by":"crossref","unstructured":"Garfinkel T, Pfaff B, Chow J, Rosenblum M, Boneh D. Terra: a virtual machine-based platform for trusted computing. In: Proceedings of the 19th ACM Symposium on Operating Systems Principles. 2003, 193\u2013206","DOI":"10.1145\/945445.945464"},{"key":"2327_CR19","doi-asserted-by":"crossref","unstructured":"Sabt M, Achemlal M, Bouabdallah A. Trusted execution environment: what it is, and what it is not. In: Proceedings of 2015 IEEE Trustcom\/BigDataSE\/ISPA. 2015, 57\u201364","DOI":"10.1109\/Trustcom.2015.357"},{"key":"2327_CR20","doi-asserted-by":"crossref","unstructured":"Chakrabarti S, Leslie-Hurd R, Vij M, Mckeen F, Rozas C, Caspi D, Alexandrovich I, Anati I. Intel\u00ae software guard extensions (Intel\u00ae SGX) architecture for oversubscription of secure memory in a virtualized environment. In: Proceedings of the Hardware and Architectural Support for Security and Privacy. 2017, 1\u20138","DOI":"10.1145\/3092627.3092634"},{"key":"2327_CR21","doi-asserted-by":"crossref","unstructured":"McKeen F, Alexandrovich I, Anati I, Caspi D, Johnson S, Leslie-Hurd R, Rozas C. Intel\u00ae software guard extensions (Intel\u00ae SGX) support for dynamic memory management inside an enclave. In: Proceedings of the Hardware and Architectural Support for Security and Privacy 2016. 2016, 10","DOI":"10.1145\/2948618.2954331"},{"issue":"1\u201310","key":"2327_CR22","first-page":"119","volume":"1","author":"S Johnson","year":"2016","unstructured":"Johnson S, Scarlata V, Rozas C, Brickell E, Mckeen F, Corporation I. Intel\u00ae Software Guard Extensions: EPID Provisioning and Attestation Services. White Paper, 2016, 1(1\u201310): 119","journal-title":"White Paper"},{"key":"2327_CR23","doi-asserted-by":"publisher","first-page":"103276","DOI":"10.1016\/j.autcon.2020.103276","volume":"118","author":"R Yang","year":"2020","unstructured":"Yang R, Wakefield R, Lyu S, Jayasuriya S, Han F, Yi X, Yang X, Amarasinghe G, Chen S. Public and private blockchain in construction business process and information integration. Automation in Construction, 2020, 118: 103276","journal-title":"Automation in Construction"},{"issue":"2","key":"2327_CR24","doi-asserted-by":"publisher","first-page":"374","DOI":"10.1145\/3149.214121","volume":"32","author":"M J Fischer","year":"1985","unstructured":"Fischer M J, Lynch N A, Paterson M S. Impossibility of distributed consensus with one faulty process. Journal of the ACM, 1985, 32(2): 374\u2013382","journal-title":"Journal of the ACM"},{"key":"2327_CR25","doi-asserted-by":"crossref","unstructured":"Tikhomirov S. Ethereum: state of knowledge and research perspectives. In: Proceedings of International Symposium on Foundations and Practice of Security. 2017, 206\u2013221","DOI":"10.1007\/978-3-319-75650-9_14"},{"key":"2327_CR26","doi-asserted-by":"crossref","unstructured":"Androulaki E, Barger A, Bortnikov V, Cachin C, Christidis K, De Caro D, Enyeart D, Ferris C, Laventman G, Manevich Y, Muralidharan S, Murthy C, Nguyen B, Sethi M, Singh G, Smith K, Soriniotti A, Stathakopoulou C, Vukoli\u0107 M, Cocco S W, Yellick J. Hyperledger fabric: a distributed operating system for permissioned blockchains. In: Proceedings of the Thirteenth EuroSys Conference. 2018, 30","DOI":"10.1145\/3190508.3190538"},{"issue":"11","key":"2327_CR27","doi-asserted-by":"publisher","first-page":"624","DOI":"10.1145\/360363.360369","volume":"19","author":"K P Eswaran","year":"1976","unstructured":"Eswaran K P, Gray J N, Lorie R A, Traiger I L. The notions of consistency and predicate locks in a database system. Communications of the ACM, 1976, 19(11): 624\u2013633","journal-title":"Communications of the ACM"},{"key":"2327_CR28","doi-asserted-by":"crossref","unstructured":"Chen Y, Yu X, Koutris P, Arpaci-Dusseau A C, Arpaci-Dusseau R H, Shu J. Plor: general transactions with predictable, low tail latency. In: Proceedings of the 2022 International Conference on Management of Data. 2022, 19\u201333","DOI":"10.1145\/3514221.3517879"},{"key":"2327_CR29","first-page":"1","volume":"2631","author":"E Rescorla","year":"1999","unstructured":"Rescorla E. Diffie-Hellman Key Agreement Method. RFC, 1999, 2631: 1\u201313","journal-title":"RFC"},{"key":"2327_CR30","doi-asserted-by":"crossref","unstructured":"Sharma A, Schuhknecht F M, Agrawal D, Dittrich J. Blurring the lines between blockchains and database systems: the case of hyperledger fabric. In: Proceedings of 2019 International Conference on Management of Data. 2019, 105\u2013122","DOI":"10.1145\/3299869.3319883"},{"key":"2327_CR31","doi-asserted-by":"crossref","unstructured":"Ruan P, Loghin D, Ta Q T, Zhang M, Chen G, Ooi B C. A transactional perspective on execute-order-validate blockchains. In: Proceedings of 2020 ACM SIGMOD International Conference on Management of Data. 2020, 543\u2013557","DOI":"10.1145\/3318464.3389693"}],"container-title":["Frontiers of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-022-2327-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11704-022-2327-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-022-2327-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,5]],"date-time":"2025-09-05T18:29:25Z","timestamp":1757096965000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11704-022-2327-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,22]]},"references-count":31,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,6]]}},"alternative-id":["2327"],"URL":"https:\/\/doi.org\/10.1007\/s11704-022-2327-7","relation":{},"ISSN":["2095-2228","2095-2236"],"issn-type":[{"value":"2095-2228","type":"print"},{"value":"2095-2236","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1,22]]},"assertion":[{"value":"30 May 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 December 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 January 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"183104"}}