{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T05:56:34Z","timestamp":1775886994844,"version":"3.50.1"},"reference-count":52,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,12,6]],"date-time":"2024-12-06T00:00:00Z","timestamp":1733443200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,6]],"date-time":"2024-12-06T00:00:00Z","timestamp":1733443200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,1]]},"DOI":"10.1007\/s12083-024-01858-w","type":"journal-article","created":{"date-parts":[[2024,12,5]],"date-time":"2024-12-05T23:38:07Z","timestamp":1733441887000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Differential privacy preserving based framework using blockchain for internet-of-things"],"prefix":"10.1007","volume":"18","author":[{"given":"Muhammad","family":"Kashif","sequence":"first","affiliation":[]},{"given":"Kubra","family":"Kalkan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,6]]},"reference":[{"key":"1858_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2021\/8016525","volume":"2021","author":"AI Siam","year":"2021","unstructured":"Siam AI et al (2021) Secure health monitoring communication systems based on IoT and cloud computing for medical emergency applications. Comput Intell Neurosci 2021:1\u201323","journal-title":"Comput Intell Neurosci"},{"issue":"3","key":"1858_CR2","doi-asserted-by":"publisher","first-page":"2326","DOI":"10.1109\/TNSE.2021.3089435","volume":"8","author":"P Kumar","year":"2021","unstructured":"Kumar P et al (2021) PPSF: A Privacy-Preserving and Secure Framework Using Blockchain-Based Machine-Learning for IoT-Driven Smart Cities. IEEE Trans Netw Sci Eng 8(3):2326\u20132341. https:\/\/doi.org\/10.1109\/TNSE.2021.3089435","journal-title":"IEEE Trans Netw Sci Eng"},{"key":"1858_CR3","doi-asserted-by":"publisher","unstructured":"Ratasuk R, Vejlgaard B, Mangalvedhe N, Ghosh A (2016) NB-IoT system for M2M communication. 2016 IEEE Wireless communications and networking conference workshops (WCNCW). Doha, Qatar, pp 428\u2013432. https:\/\/doi.org\/10.1109\/WCNCW.2016.7552737","DOI":"10.1109\/WCNCW.2016.7552737"},{"issue":"6","key":"1858_CR4","doi-asserted-by":"publisher","first-page":"3887","DOI":"10.1109\/TDSC.2021.3110181","volume":"19","author":"F Daidone","year":"2022","unstructured":"Daidone F, Carminati B, Ferrari E (2022) Blockchain-Based Privacy Enforcement in the IoT Domain. IEEE Trans Dependable Secure Comput 19(6):3887\u20133898. https:\/\/doi.org\/10.1109\/TDSC.2021.3110181","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"2","key":"1858_CR5","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1109\/MCOM.2018.1700364","volume":"56","author":"E Luo","year":"2018","unstructured":"Luo E, Bhuiyan MZA, Wang G, Rahman MA, Wu J, Atiquzzaman M (2018) Privacyprotector: Privacy-protected patient data collection in iot-based healthcare systems. IEEE Commun Mag 56(2):163\u2013168","journal-title":"IEEE Commun Mag"},{"issue":"5","key":"1858_CR6","doi-asserted-by":"publisher","first-page":"8345","DOI":"10.1109\/JIOT.2019.2917186","volume":"6","author":"C Xu","year":"2019","unstructured":"Xu C, Wang N, Zhu L, Sharif K, Zhang C (2019) Achieving searchable and privacy-preserving data sharing for cloud-assisted E-Healthcare system. IEEE Int Things J 6(5):8345\u20138356","journal-title":"IEEE Int Things J"},{"issue":"2","key":"1858_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3376915","volume":"53","author":"EJD Aguiar","year":"2020","unstructured":"Aguiar EJD, Faical BS, Krishnamachari B, Ueyama J (2020) A survey of blockchain-based strategies for healthcare. ACM Comput Surv 53(2):1\u201327","journal-title":"ACM Comput Surv"},{"key":"1858_CR8","doi-asserted-by":"crossref","unstructured":"Xie J et al (2019) A survey of blockchain technology applied to smart cities: Research issues and challenges. IEEE Commun Surveys Tuts 21(3):2794\u20132830. 3rd Quart","DOI":"10.1109\/COMST.2019.2899617"},{"key":"1858_CR9","first-page":"131","volume":"118","author":"J Arshad","year":"2021","unstructured":"Arshad J et al (2021) IoT security vulnerabilities and their impact on applications: A systematic review. Futur Gener Comput Syst 118:131\u2013149","journal-title":"Futur Gener Comput Syst"},{"key":"1858_CR10","first-page":"1","volume":"38","author":"M Dehghani","year":"2018","unstructured":"Dehghani M et al (2018) A comprehensive study on internet of things (IoT) security and privacy challenges and their solutions. J Inf Secur Appl 38:1\u201317","journal-title":"J Inf Secur Appl"},{"key":"1858_CR11","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1016\/j.comnet.2019.01.023","volume":"151","author":"Y Ren","year":"2019","unstructured":"Ren Y et al (2019) A survey on privacy protection in internet of things. Comput Netw 151:147\u2013162","journal-title":"Comput Netw"},{"key":"1858_CR12","first-page":"11","volume":"125","author":"N Zhang","year":"2019","unstructured":"Zhang N et al (2019) IoT security: ongoing challenges and research opportunities. J Netw Comput Appl 125:11\u201322","journal-title":"J Netw Comput Appl"},{"issue":"1","key":"1858_CR13","first-page":"1","volume":"13","author":"FA Alaba","year":"2017","unstructured":"Alaba FA et al (2017) Internet of things security: A review. J Inf Priv Secur 13(1):1\u201316","journal-title":"J Inf Priv Secur"},{"issue":"2","key":"1858_CR14","first-page":"1673","volume":"21","author":"S Garc\u00eda","year":"2019","unstructured":"Garc\u00eda S, Herrera J (2019) Privacy Enhancing Technologies for the Internet of Things: A Survey. IEEE Commun Surv Tutor 21(2):1673\u20131717","journal-title":"IEEE Commun Surv Tutor"},{"issue":"1","key":"1858_CR15","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1109\/TPDS.2012.97","volume":"24","author":"M Li","year":"2013","unstructured":"Li M, Yu S, Zheng Y, Ren K, Lou W (2013) Scalable and secure sharing of personal health records in cloud computing using attributebased encryption. IEEE Trans Parallel Distrib Syst 24(1):131\u2013143","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"1858_CR16","doi-asserted-by":"crossref","unstructured":"Huang J, Sharaf M, Huang C-T (2012) A hierarchical framework for secure and scalable EHR sharing and access control in multi-cloud. In Proc. 41st Int. Conf. Parallel Process. Workshops, Pittsburgh, PA, USA, pp 279\u2013287","DOI":"10.1109\/ICPPW.2012.42"},{"key":"1858_CR17","doi-asserted-by":"crossref","unstructured":"Gerodimos A, Maglaras L, Ferrag MA, Ayres N, Kantzavelou I (2023) IOT: Communication protocols and security threats. Internet of Things and Cyber-Physical Systems","DOI":"10.20944\/preprints202111.0214.v2"},{"issue":"1","key":"1858_CR18","doi-asserted-by":"publisher","first-page":"850","DOI":"10.1109\/COMST.2018.2863956","volume":"21","author":"T Salman","year":"2019","unstructured":"Salman T, Zolanvari M, Erbad A, Jain R, Samaka M (2019) Security services using blockchains: A state of the art survey. IEEE Commun Surv Tutor 21(1):850\u2013880","journal-title":"IEEE Commun Surv Tutor"},{"key":"1858_CR19","doi-asserted-by":"publisher","unstructured":"Hassan MU, Rehmani MH, Chen J (2020) Differential Privacy Techniques for Cyber Physical Systems: A Survey. IEEE Commun Surv Tutor 22(1):746\u2013789. Firstquarter. https:\/\/doi.org\/10.1109\/COMST.2019.2944748","DOI":"10.1109\/COMST.2019.2944748"},{"issue":"4","key":"1858_CR20","first-page":"2804","volume":"8","author":"Q Wang","year":"2021","unstructured":"Wang Q et al (2021) Differential Privacy-Preserving Blockchain-Based IoT Network: A Novel Framework. IEEE Int Things J 8(4):2804\u20132816","journal-title":"IEEE Int Things J"},{"issue":"1","key":"1858_CR21","first-page":"386","volume":"21","author":"C Liu","year":"2020","unstructured":"Liu C et al (2020) Preserving User Privacy in Smart City Using Differential Privacy. IEEE Trans Intell Transp Syst 21(1):386\u2013398","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"1858_CR22","doi-asserted-by":"publisher","unstructured":"Kashif M, Kalkan K (2021) BCPriPIoT: BlockChain Utilized Privacy-Preservation Mechanism for IoT Devices. 2021 Third international conference on blockchain computing and applications (BCCA), pp 201\u2013209. https:\/\/doi.org\/10.1109\/BCCA53669.2021.9657016","DOI":"10.1109\/BCCA53669.2021.9657016"},{"key":"1858_CR23","unstructured":"ConsenSys, Quorum whitepaper (2024). https:\/\/github.com\/ConsenSys\/quorum-docs\/blob\/master\/Quorum Whitepaper0.2.pdf"},{"key":"1858_CR24","first-page":"1","volume":"151","author":"G Wood","year":"2014","unstructured":"Wood G (2014) Ethereum: a secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper 151:1\u201332","journal-title":"Ethereum Project Yellow Paper"},{"key":"1858_CR25","unstructured":"Ongaro D, Ousterhout J (2014) In search of an understandable consensus algorithm. In: Proceedings of the 2014 USENIX Conference; 19-20 Jun 2014; Philadelphia, PA, USA, USENIX Association, pp 305\u2013320"},{"key":"1858_CR26","unstructured":"Moniz H (2020) The Istanbul BFT consensus algorithm. arXiv, arXiv:2002.03613 arXiv preprint"},{"key":"1858_CR27","unstructured":"Szilagyi P (2017) EIP-225: Clique proof-of-authority consensus protocol, Ethereum improvement proposals, 225. https:\/\/eips.ethereum.org\/EIPS\/e ip-225"},{"issue":"8","key":"1858_CR28","doi-asserted-by":"publisher","first-page":"5110","DOI":"10.1109\/TII.2019.2957140","volume":"16","author":"M Keshk","year":"2020","unstructured":"Keshk M, Turnbull B, Moustafa N, Vatsalan D, Choo KR (2020) A privacy-preserving-framework-based blockchain and deep learning for protecting smart power networks. IEEE Trans Ind Informat 16(8):5110\u20135118","journal-title":"IEEE Trans Ind Informat"},{"issue":"9","key":"1858_CR29","doi-asserted-by":"publisher","first-page":"6092","DOI":"10.1109\/TII.2020.2974555","volume":"16","author":"PCM Arachchige","year":"2020","unstructured":"Arachchige PCM, Bertok P, Khalil I, Liu D, Camtepe S, Atiquzzaman M (2020) A trustworthy privacy preserving framework for machine learning in industrial IoT systems. IEEE Trans Ind Informat 16(9):6092\u20136102","journal-title":"IEEE Trans Ind Informat"},{"issue":"12","key":"1858_CR30","doi-asserted-by":"publisher","first-page":"9463","DOI":"10.1109\/JIOT.2020.2996590","volume":"8","author":"O Alkadi","year":"2021","unstructured":"Alkadi O, Moustafa N, Turnbull B, Choo KR (2021) A deep blockchain framework-enabled collaborative intrusion detection for protecting IoT and cloud networks. IEEE Int Things J 8(12):9463\u20139472","journal-title":"IEEE Int Things J"},{"key":"1858_CR31","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1016\/j.comcom.2020.10.022","volume":"165","author":"W Ren","year":"2021","unstructured":"Ren W, Tong X, Du J, Wang N, Li SC, Min G, Zhao Z, Bashir AK (2021) Privacy-preserving using homomorphic encryption in Mobile IoT systems. Comput Commun 165:105\u2013111. https:\/\/doi.org\/10.1016\/j.comcom.2020.10.022","journal-title":"Comput Commun"},{"key":"1858_CR32","doi-asserted-by":"publisher","unstructured":"Mikula T, Jacobsen RH (2018) Identity and Access Management with Blockchain in Electronic Healthcare Records. 2018 21st Euromicro Conference on Digital System Design (DSD). Prague, Czech Republic, pp 699\u2013706. https:\/\/doi.org\/10.1109\/DSD.2018.00008","DOI":"10.1109\/DSD.2018.00008"},{"key":"1858_CR33","doi-asserted-by":"crossref","unstructured":"Alam T (2019) IoT-Fog: A communication framework using blockchain in the internet of things. arXiv preprint arXiv:1904.00226","DOI":"10.2139\/ssrn.3638991"},{"key":"1858_CR34","doi-asserted-by":"crossref","unstructured":"Zhang A, Lin X (2018) Towards secure and privacy-preserving data sharing in e-Health systems via consortium blockchain. J Med Syst 42:140","DOI":"10.1007\/s10916-018-0995-5"},{"key":"1858_CR35","doi-asserted-by":"crossref","unstructured":"Liu J, Li X, Ye L, Zhang H, Du X, Guizani M (2018) BPDS: A blo+ckchain based privacy-preserving data sharing for electronic medical records. arXiv:1811.03223","DOI":"10.1109\/GLOCOM.2018.8647713"},{"issue":"10","key":"1858_CR36","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-016-0574-6","volume":"40","author":"X Yue","year":"2016","unstructured":"Yue X, Wang H, Jin D, Li M, Jiang W (2016) Healthcare data gateways: Found healthcare intelligence on blockchain with novel privacy risk control. J Med Syst 40(10):1\u20138","journal-title":"J Med Syst"},{"key":"1858_CR37","doi-asserted-by":"crossref","unstructured":"Zaghloul E, Li T, Ren J (2019) Security and privacy of electronic health records: Decentralized and hierarchical data sharing using smart contracts. In Proc Int Conf Comput Netw Commun (ICNC). Honolulu, HI, USA, pp 375\u2013379","DOI":"10.1109\/ICCNC.2019.8685552"},{"key":"1858_CR38","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1016\/j.scs.2018.02.014","volume":"39","author":"GG Dagher","year":"2018","unstructured":"Dagher GG, Mohler J, Milojkovic M, Marella PB (2018) Ancile: Privacy-preserving framework for access control and interoperability of electronic health records using blockchain technology. Sustain Cities Soc 39:283\u2013297","journal-title":"Sustain Cities Soc"},{"key":"1858_CR39","unstructured":"Wood DG (2018) Ethereum: A secure decentralized generalised transaction ledger byzantium version. Zug, Switzerland, Ethereum, Yellow Paper. [Online]. Available: https:\/\/ethereum.github.io\/yellowpaper\/ paper.pdf"},{"issue":"6","key":"1858_CR40","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1109\/MCC.2018.064181122","volume":"5","author":"M Yang","year":"2018","unstructured":"Yang M, Margheri A, Hu R, Sassone V (2018) Differentially Private Data Sharing in a Cloud Federation with Blockchain. IEEE Cloud Comput 5(6):69\u201379. https:\/\/doi.org\/10.1109\/MCC.2018.064181122","journal-title":"IEEE Cloud Comput"},{"key":"1858_CR41","first-page":"186525","volume":"8","author":"Z Qian","year":"2020","unstructured":"Qian Z, Liu H, Xie J (2020) A differential privacy-preserving framework for smart contracts in blockchain. IEEE Access 8:186525\u2013186532","journal-title":"IEEE Access"},{"issue":"5","key":"1858_CR42","doi-asserted-by":"publisher","first-page":"1413","DOI":"10.1109\/TCBB.2018.2854782","volume":"15","author":"JL Raisaro","year":"2018","unstructured":"Raisaro JL et al (2018) Protecting privacy and security of genomic data in i2b2 with homomorphic encryption and differential privacy. IEEE\/ACM Trans Comput Biol Bioinf 15(5):1413\u20131426","journal-title":"IEEE\/ACM Trans Comput Biol Bioinf"},{"key":"1858_CR43","first-page":"5622","volume":"7","author":"R Al Omar","year":"2019","unstructured":"Al Omar R, Al-Eroud R, Al-Enazi A, Al-Ghamdi A (2019) Privacy-Preserving Data Aggregation in IoT Using Blockchain and Differential Privacy. IEEE Access 7:5622\u20135634","journal-title":"IEEE Access"},{"key":"1858_CR44","doi-asserted-by":"crossref","first-page":"207515","DOI":"10.1109\/ACCESS.2020.3011504","volume":"8","author":"I Fauzi","year":"2020","unstructured":"Fauzi I, Abdullah AH, Anuar NB, Basori AH (2020) Privacy-Preserving Data Collection and Sharing Framework for IoT in Healthcare Using Blockchain and Differential Privacy. IEEE Access 8:207515\u2013207533","journal-title":"IEEE Access"},{"issue":"05","key":"1858_CR45","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney L (2002) k-anonymity: A model for protecting privacy. Int J Uncertain Fuzziness Knowl-Based Syst 10(05):557\u2013570","journal-title":"Int J Uncertain Fuzziness Knowl-Based Syst"},{"key":"1858_CR46","doi-asserted-by":"crossref","unstructured":"Ruffing T, Moreno-Sanchez P, Kate A (2014) Coinshuffle: Practical decentralized coin mixing for bitcoin. In: European symposium on research in computer security. Springer, pp 345\u2013364","DOI":"10.1007\/978-3-319-11212-1_20"},{"issue":"3","key":"1858_CR47","doi-asserted-by":"publisher","first-page":"542","DOI":"10.1007\/s11390-018-1839-y","volume":"33","author":"R Yuan","year":"2018","unstructured":"Yuan R, Xia Y-B, Chen H-B, Zang B-Y, Xie J (2018) Shadoweth: Private smart contract on public blockchain. J Comput Sci Tech 33(3):542\u2013556","journal-title":"J Comput Sci Tech"},{"key":"1858_CR48","doi-asserted-by":"publisher","unstructured":"Kashif M, Kalkan K (2023) EPIoT: Enhanced privacy preservation based blockchain mechanism for internet-of-things. Comput Netw 238:110107. https:\/\/doi.org\/10.1016\/j.comnet.2023.110107","DOI":"10.1016\/j.comnet.2023.110107"},{"key":"1858_CR49","doi-asserted-by":"publisher","unstructured":"Tu Z, Liu S, Xiong X, Zhao J, Cai Z (2020) Differential private average publishing of numerical stream data for wearable devices. J Comput Appl 40(6):6. https:\/\/doi.org\/10.11772\/j.issn.1001-9081. 2019111929","DOI":"10.11772\/j.issn.1001-9081"},{"issue":"8","key":"1858_CR50","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0272766","volume":"17","author":"Z Li","year":"2022","unstructured":"Li Z, Wang B, Li J, Hua Y, Zhang S (2022) Local differential privacy protection for wearable device data. PLoS ONE 17(8):e0272766. https:\/\/doi.org\/10.1371\/journal.pone.0272766","journal-title":"PLoS ONE"},{"issue":"1","key":"1858_CR51","doi-asserted-by":"publisher","first-page":"15725","DOI":"10.1038\/s41598-022-19544-3","volume":"12","author":"S Zhang","year":"2022","unstructured":"Zhang S, Li X (2022) Differential privacy medical data publishing method based on attribute correlation. Sci Rep 12(1):15725. https:\/\/doi.org\/10.1038\/s41598-022-19544-3","journal-title":"Sci Rep"},{"issue":"1","key":"1858_CR52","doi-asserted-by":"publisher","first-page":"3770","DOI":"10.1109\/TCE.2024.3372506","volume":"70","author":"R Li","year":"2024","unstructured":"Li R, Wang Z, Fang L, Peng C, Wang W, Xiong H (2024) Efficient Blockchain-Assisted Distributed Identity-Based Signature Scheme for Integrating Consumer Electronics in Metaverse. IEEE Trans Consum Electron 70(1):3770\u20133780. https:\/\/doi.org\/10.1109\/TCE.2024.3372506","journal-title":"IEEE Trans Consum Electron"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01858-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-024-01858-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01858-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,17]],"date-time":"2025-05-17T09:33:04Z","timestamp":1747474384000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-024-01858-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,6]]},"references-count":52,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1]]}},"alternative-id":["1858"],"URL":"https:\/\/doi.org\/10.1007\/s12083-024-01858-w","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12,6]]},"assertion":[{"value":"14 March 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 September 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 December 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics Approval"}},{"value":"I would like to declare on behalf of my co-author that the work described was original research that has not been published previously, and not under consideration for publication elsewhere, in whole or in part.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}],"article-number":"33"}}