{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T20:15:22Z","timestamp":1777752922581,"version":"3.51.4"},"reference-count":69,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:00:00Z","timestamp":1753401600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:00:00Z","timestamp":1753401600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Syst Assur Eng Manag"],"published-print":{"date-parts":[[2025,11]]},"DOI":"10.1007\/s13198-025-02878-2","type":"journal-article","created":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T06:44:36Z","timestamp":1753425876000},"page":"3639-3654","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["An insight towards trustworthy cloud computing: enabling restricted access control and secure service transactions using Ethereum blockchain"],"prefix":"10.1007","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0419-4530","authenticated-orcid":false,"given":"Urvashi Rahul","family":"Saxena","sequence":"first","affiliation":[]},{"given":"Ramin","family":"Karim","sequence":"additional","affiliation":[]},{"given":"Uday","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,25]]},"reference":[{"key":"2878_CR1","doi-asserted-by":"crossref","unstructured":"Al-Aswad H, Hasan H, Elmedany W, Ali M, Balakrishna C (2019) Towards a blockchain-based zero-knowledge model for secure data sharing and access. In: 2019 7th International conference on future internet of things and cloud workshops (FiCloudW). IEEE, pp 76\u201381.","DOI":"10.1109\/FiCloudW.2019.00027"},{"issue":"18","key":"2878_CR2","doi-asserted-by":"publisher","first-page":"8496","DOI":"10.3390\/app11188496","volume":"11","author":"ST Alshammari","year":"2021","unstructured":"Alshammari ST, Alsubhi K (2021) Building a reputation attack detector for effective trust evaluation in a cloud services environment. Appl Sci 11(18):8496. https:\/\/doi.org\/10.3390\/app11188496","journal-title":"Appl Sci"},{"issue":"20","key":"2878_CR3","doi-asserted-by":"publisher","first-page":"7716","DOI":"10.3390\/s22207716","volume":"22","author":"T Bai","year":"2022","unstructured":"Bai T, Hu Y, He J, Fan H, An Z (2022) Health-zkIDM: a healthcare identity system based on fabric blockchain and zero-knowledge proof. Sensors (Basel) 22(20):7716","journal-title":"Sensors (Basel)"},{"key":"2878_CR4","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1016\/j.patrec.2022.02.013","volume":"156","author":"E Balamurugan","year":"2022","unstructured":"Balamurugan E, Mehbodniya A, Kariri E, Yadav K, Kumar A, Haq MA (2022) Network optimization using defender system in cloud computing security based intrusion detection system with game theory deep neural network (IDSGT-DNN). Pattern Recogn Lett 156:142\u2013151","journal-title":"Pattern Recogn Lett"},{"key":"2878_CR5","doi-asserted-by":"publisher","unstructured":"Barenji AV, Guo H, Tian Z, Li Z, Wang WM, Huang GQ (2019) Blockchain-based cloud manufacturing: decentralization. arxiv.org. [online] https:\/\/doi.org\/10.3233\/978-1-61499-898-3-1003","DOI":"10.3233\/978-1-61499-898-3-1003"},{"key":"2878_CR6","doi-asserted-by":"crossref","unstructured":"Bendiab K, Kolokotronis N, Shiaeles S, Boucherkha S (2018) WiP: a novel blockchain-based trust model for cloud identity management. In: 2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC\/PiCom\/DataCom\/CyberSciTech). IEEE, pp 724\u2013729","DOI":"10.1109\/DASC\/PiCom\/DataCom\/CyberSciTec.2018.00126"},{"issue":"3","key":"2878_CR7","doi-asserted-by":"publisher","first-page":"719","DOI":"10.1080\/07421222.2018.1481634","volume":"35","author":"A Benlian","year":"2018","unstructured":"Benlian A, Kettinger WJ, Sunyaev A, Winkler TJ, Guest Editors (2018) The transformative value of cloud computing: a decoupling, platformization, and recombination theoretical framework. J Manage Inf Syst 35(3):719\u2013739","journal-title":"J Manage Inf Syst"},{"key":"2878_CR8","doi-asserted-by":"crossref","unstructured":"Bhatt S, Patwa F, Sandhu R (2017) An access control framework for cloud-enabled wearable internet of things. In: 2017 IEEE 3rd international conference on collaboration and internet computing (CIC). IEEE, pp 328\u2013338","DOI":"10.1109\/CIC.2017.00050"},{"key":"2878_CR9","doi-asserted-by":"crossref","unstructured":"Bulgurcu, B., Cavusoglu, H., & Benbasat, I. (2010). Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness. MIS quarterly, 523\u2013548.","DOI":"10.2307\/25750690"},{"issue":"1","key":"2878_CR10","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1007\/s11277-022-09960-z","volume":"128","author":"UA Butt","year":"2023","unstructured":"Butt UA, Amin R, Mehmood M, Aldabbas H, Alharbi MT, Albaqami N (2023) Cloud security threats and solutions: a survey. Wirel Pers Commun 128(1):387\u2013413","journal-title":"Wirel Pers Commun"},{"key":"2878_CR11","doi-asserted-by":"crossref","unstructured":"Canetti R, Krawczyk H (2001) Analysis of key-exchange protocols and their use for building secure channels. In: International conference on the theory and applications of cryptographic techniques. Springer, Berlin Heidelberg, pp 453\u2013474","DOI":"10.1007\/3-540-44987-6_28"},{"key":"2878_CR12","unstructured":"Chang E (2019) General attacks and approaches in cloud-scale networks. In: Proceedings of the IEEE international conference on computer communications, Valencia, Spain, vol 29"},{"issue":"11","key":"2878_CR13","doi-asserted-by":"publisher","first-page":"1981","DOI":"10.3390\/sym15111981","volume":"15","author":"M Dawood","year":"2023","unstructured":"Dawood M, Tu S, Xiao C, Alasmary H, Waqas M, Rehman SU (2023) Cyberattacks and security of cloud computing: a complete guideline. Symmetry 15(11):1981","journal-title":"Symmetry"},{"key":"2878_CR14","doi-asserted-by":"publisher","first-page":"534","DOI":"10.1109\/COMST.2023.3312349","volume":"26","author":"C De Alwis","year":"2023","unstructured":"De Alwis C, Porambage P, Dev K, Gadekallu TR, Liyanage M (2023) A survey on network slicing security: attacks, challenges, solutions and research directions. IEEE Commun Surv Tutor 26:534\u2013570","journal-title":"IEEE Commun Surv Tutor"},{"key":"2878_CR15","unstructured":"Dolev D, Lamport L, Pease M, Shostak R (1987) The Byzantine generals. In: Concurrency control and reliability in distributed systems, pp 348\u2013369."},{"issue":"6","key":"2878_CR16","first-page":"1321","volume":"45","author":"S-J Du","year":"2017","unstructured":"Du S-J, Xu S-S, Liu JN, Zhang JW, Ma JF (2017) Collusion-attack-defensive data location verification protocols in cloud computing. ACTA Electonica Sin 45(6):1321","journal-title":"ACTA Electonica Sin"},{"key":"2878_CR17","doi-asserted-by":"publisher","DOI":"10.3991\/ijim.v11i2.6561","author":"SA El-Seoud","year":"2017","unstructured":"El-Seoud SA, El-Sofany HF, Abdelfattah M, Mohamed R (2017) Big data and cloud computing: trends and challenges. Int J Interact Mob Technol (iJIM). https:\/\/doi.org\/10.3991\/ijim.v11i2.6561","journal-title":"Int J Interact Mob Technol (iJIM)"},{"key":"2878_CR18","doi-asserted-by":"crossref","unstructured":"Ethereum Blockchain App Platform (2018) Accessed: Feb. 1. [Online]. Available: https:\/\/www.ethereum.org\/","DOI":"10.1007\/978-1-4842-5278-9_1"},{"key":"2878_CR19","doi-asserted-by":"crossref","unstructured":"Fiat A, Shamir A (1986) How to prove yourself: practical solutions to identification and signature problems. In: Conference on the theory and application of cryptographic techniques. Springer, Berlin Heidelberg, pp 186\u2013194","DOI":"10.1007\/3-540-47721-7_12"},{"key":"2878_CR20","unstructured":"Gaetani E, Aniello L, Baldoni R, Lombardi F, Margheri A, Sassone V (2017) Blockchain-based database to ensure data integrity in cloud computing environments"},{"key":"2878_CR21","unstructured":"Gavin W (2014) Ethereum: A secure decentralised generalised transaction ledger. Ethereum ProjectYellow Paper. [Online]. Available: https:\/\/ethereum.github.io\/yellowpaper\/paper.pdf"},{"issue":"4","key":"2878_CR22","doi-asserted-by":"publisher","first-page":"778","DOI":"10.1109\/TPDS.2018.2870652","volume":"30","author":"M Ghafoorian","year":"2018","unstructured":"Ghafoorian M, Abbasinezhad-Mood D, Shakeri H (2018) A thorough trust and reputation based RBAC model for secure data storage in the cloud. IEEE Trans Parallel Distrib Syst 30(4):778\u2013788","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"1","key":"2878_CR23","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1109\/tcc.2014.2328578","volume":"3","author":"N Ghosh","year":"2015","unstructured":"Ghosh N, Ghosh SK, Das SK (2015) SelCSP: a framework to facilitate selection of cloud service providers. IEEE Trans Cloud Comput 3(1):66\u201379. https:\/\/doi.org\/10.1109\/tcc.2014.2328578","journal-title":"IEEE Trans Cloud Comput"},{"issue":"6","key":"2878_CR24","doi-asserted-by":"publisher","first-page":"788","DOI":"10.1108\/JEIM-01-2015-0001","volume":"28","author":"A Gutierrez","year":"2015","unstructured":"Gutierrez A, Boukrami E, Lumsden R (2015) Technological, organisational and environmental factors influencing managers\u2019 decision to adopt cloud computing in the UK. J Enterp Inf Manag 28(6):788\u2013807","journal-title":"J Enterp Inf Manag"},{"issue":"5","key":"2878_CR25","doi-asserted-by":"publisher","first-page":"1159","DOI":"10.3390\/electronics12051159","volume":"12","author":"MA Haq","year":"2023","unstructured":"Haq MA (2023) DBoTPM: a deep neural network-based botnet prediction model. Electronics 12(5):1159","journal-title":"Electronics"},{"key":"2878_CR26","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2022.018708","author":"MA Haq","year":"2022","unstructured":"Haq MA, Rahim Khan MA (2022) DNNBoT: deep neural network-based botnet detection and classification. Comput Mater Continua. https:\/\/doi.org\/10.32604\/cmc.2022.018708","journal-title":"Comput Mater Continua"},{"key":"2878_CR27","doi-asserted-by":"crossref","unstructured":"Haq, M. A., Rahim Khan, M. A., & AL-Harbi, T. (2022). Development of PCCNN-based network intrusion detection system for EDGE computing.\u00a0Computers, Materials & Continua,\u00a071(1).","DOI":"10.32604\/cmc.2022.018708"},{"key":"2878_CR28","doi-asserted-by":"crossref","unstructured":"Harshavardhan A, Vijayakumar T, Mugunthan SR (2018) Blockchain technology in cloud computing to overcome security vulnerabilities. In: 2018 2nd International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC) I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), 2018 2nd International Conference on. IEEE, pp 408\u2013414","DOI":"10.1109\/I-SMAC.2018.8653690"},{"key":"2878_CR29","doi-asserted-by":"crossref","unstructured":"Hou D, Zhang J, Huang S, Peng Z, Ma J, Zhu X (2022) Privacy-preserving energy trading using blockchain and zero knowledge proof. In: 2022 IEEE international conference on blockchain (blockchain). IEEE, pp 412\u2013418","DOI":"10.1109\/Blockchain55522.2022.00064"},{"issue":"4","key":"2878_CR30","first-page":"1918","volume":"5","author":"MKR Ingole","year":"2018","unstructured":"Ingole MKR, Yamde MS (2018) Blockchain technology in cloud computing: a systematic review. Int Res J Eng Tech 5(4):1918\u20131921","journal-title":"Int Res J Eng Tech"},{"issue":"8","key":"2878_CR31","doi-asserted-by":"publisher","first-page":"3809","DOI":"10.1016\/j.eswa.2013.12.017","volume":"41","author":"A Jula","year":"2014","unstructured":"Jula A, Sundararajan E, Othman Z (2014) Cloud computing service composition: a systematic literature review. Expert Syst Appl 41(8):3809\u20133824. https:\/\/doi.org\/10.1016\/j.eswa.2013.12.017","journal-title":"Expert Syst Appl"},{"key":"2878_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-018-1007-5","volume":"42","author":"H Kaur","year":"2018","unstructured":"Kaur H, Alam MA, Jameel R, Mourya AK, Chang V (2018) A proposed solution and future direction for blockchain-based heterogeneous medicare data in cloud environment. J Med Syst 42:1\u201311","journal-title":"J Med Syst"},{"issue":"2","key":"2878_CR33","first-page":"28","volume":"4","author":"J Kolodziej","year":"2018","unstructured":"Kolodziej J, Fern\u00e1ndez Cerero D, Fern\u00e1ndez Montes Gonz\u00e1lez A (2018) Blockchain secure cloud: a new generation integrated cloud and blockchain platforms\u2013general concepts and challenges. Eur Cybersecur J 4(2):28\u201335","journal-title":"Eur Cybersecur J"},{"issue":"1","key":"2878_CR34","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1049\/iet-ifs.2012.0232","volume":"7","author":"X Li","year":"2013","unstructured":"Li X, Du J (2013) Adaptive and attribute-based trust model for service-level agreement guarantee in cloud computing. IET Inform Secur 7(1):39\u201350","journal-title":"IET Inform Secur"},{"issue":"3","key":"2878_CR35","doi-asserted-by":"publisher","DOI":"10.3390\/sym9030035","volume":"9","author":"J Lim","year":"2017","unstructured":"Lim J, Yu H, Gil JM (2017) Detecting sybil attacks in cloud computing environments based on fail-stop signature. Symmetry 9(3):35","journal-title":"Symmetry"},{"issue":"4","key":"2878_CR36","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1109\/cc.2014.6827577","volume":"11","author":"G Lin","year":"2014","unstructured":"Lin G, Wang D, Bie Y, Lei M (2014) MTBAC: a mutual trust based access control model in cloud computing. China Commun 11(4):154\u2013162. https:\/\/doi.org\/10.1109\/cc.2014.6827577","journal-title":"China Commun"},{"issue":"4","key":"2878_CR37","doi-asserted-by":"publisher","first-page":"5196","DOI":"10.1109\/TNSM.2022.3181814","volume":"19","author":"Z Liu","year":"2022","unstructured":"Liu Z, Hu C, Xia H, Xiang T, Wang B, Chen J (2022) SPDTS: a differential privacy-based blockchain scheme for secure power data trading. IEEE Trans Netw Serv Manag 19(4):5196\u20135207","journal-title":"IEEE Trans Netw Serv Manag"},{"issue":"2","key":"2878_CR38","doi-asserted-by":"publisher","first-page":"2301","DOI":"10.1109\/TSG.2018.2867750","volume":"10","author":"X Luo","year":"2018","unstructured":"Luo X, Zhang S, Litvinov E (2018) Practical design and implementation of cloud computing for power system planning studies. IEEE Trans Smart Grid 10(2):2301\u20132311","journal-title":"IEEE Trans Smart Grid"},{"key":"2878_CR39","doi-asserted-by":"crossref","unstructured":"Murthy CVB, Shri ML (2020) A survey on integrating cloud computing with blockchain. In: 2020 international conference on emerging trends in information technology and engineering (ic-ETITE). IEEE, pp 1\u20136","DOI":"10.1109\/ic-ETITE47903.2020.470"},{"key":"2878_CR40","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3440802","author":"S Nakamoto","year":"2008","unstructured":"Nakamoto S (2008) Bitcoin: a peer-to-peer electronic cash system. SSRN Electron J. https:\/\/doi.org\/10.2139\/ssrn.3440802","journal-title":"SSRN Electron J"},{"key":"2878_CR41","unstructured":"Namazi M, Ross D, Zhu X, Ayday E (2022) zkFaith: Soonami's Zero-Knowledge Identity Protocol. arXiv preprint arXiv:2212.12785"},{"key":"2878_CR42","unstructured":"Nanayakkara S., Perera S, Senaratne S (2019) Stakeholders\u2019 perspective on blockchain and smart contracts solutions for construction supply chains. In: CIB world building congress. Hong Kong SAR China, pp 17\u201321"},{"issue":"2","key":"2878_CR43","first-page":"136","volume":"1","author":"RP Padhy","year":"2011","unstructured":"Padhy RP, Patra MR, Satapathy SC (2011) Cloud computing: security issues and research challenges. Int J Comput Sci Inf Technol Secur (IJCSITS) 1(2):136\u2013146","journal-title":"Int J Comput Sci Inf Technol Secur (IJCSITS)"},{"issue":"8","key":"2878_CR44","doi-asserted-by":"publisher","first-page":"164","DOI":"10.3390\/sym9080164","volume":"9","author":"JH Park","year":"2017","unstructured":"Park JH, Park JH (2017) Blockchain security in cloud computing: use cases, challenges, and solutions. Symmetry 9(8):164","journal-title":"Symmetry"},{"issue":"2","key":"2878_CR45","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1145\/322186.322188","volume":"27","author":"M Pease","year":"1980","unstructured":"Pease M, Shostak R, Lamport L (1980) Reaching agreement in the presence of faults. J ACM (JACM) 27(2):228\u2013234","journal-title":"J ACM (JACM)"},{"issue":"3","key":"2878_CR46","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1109\/TSC.2015.2413111","volume":"8","author":"L Qu","year":"2015","unstructured":"Qu L, Wang Y, Orgun MA, Liu L, Liu H, Bouguettaya A (2015) CCCloud: context-aware and credible cloud service selection based on subjective assessment and objective assessment. IEEE Trans Serv Comput 8(3):369\u2013383","journal-title":"IEEE Trans Serv Comput"},{"key":"2878_CR47","doi-asserted-by":"crossref","unstructured":"Ren Z, Zha X, Zhang K, Liu J, Zhao H (2019) Lightweight protection of user identity privacy based on zero-knowledge proof. In: 2019 IEEE international conference on systems, man and cybernetics (SMC). IEEE, pp 2549\u20132554","DOI":"10.1109\/SMC.2019.8913866"},{"key":"2878_CR48","doi-asserted-by":"crossref","unstructured":"Sanghi N, Bhatnagar R, Kaur G, Jain V (2018) BlockCloud: blockchain with cloud computing. In: 2018 international conference on advances in computing, communication control and networking (ICACCCN). IEEE, pp 430\u2013434","DOI":"10.1109\/ICACCCN.2018.8748467"},{"key":"2878_CR49","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-021-00402-1","author":"UR Saxena","year":"2021","unstructured":"Saxena UR, Alam T (2021a) Role-based access control using identity and broadcast-based encryption for securing cloud data. J Comput Virol Hacking Tech. https:\/\/doi.org\/10.1007\/s11416-021-00402-1","journal-title":"J Comput Virol Hacking Tech"},{"key":"2878_CR50","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-021-00402-1","author":"UR Saxena","year":"2021","unstructured":"Saxena UR, Alam T (2021b) Role based access control using identity and broadcast-based encryption for securing cloud data. J Comput Virol Hacking Tech. https:\/\/doi.org\/10.1007\/s11416-021-00402-1","journal-title":"J Comput Virol Hacking Tech"},{"issue":"4","key":"2878_CR51","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/s11761-023-00377-5","volume":"17","author":"UR Saxena","year":"2023","unstructured":"Saxena UR, Alam T (2023a) Recommendation-based trust computation and rating prediction model for security enhancement in cloud computing systems. Serv Oriented Comput Appl 17(4):239\u2013257","journal-title":"Serv Oriented Comput Appl"},{"issue":"3","key":"2878_CR52","doi-asserted-by":"publisher","first-page":"950","DOI":"10.1007\/s13198-023-01896-2","volume":"14","author":"UR Saxena","year":"2023","unstructured":"Saxena UR, Alam T (2023b) Role-based access using partial homomorphic encryption for securing cloud data. Int J Syst Assur Eng Manag 14(3):950\u2013966","journal-title":"Int J Syst Assur Eng Manag"},{"issue":"6","key":"2878_CR53","doi-asserted-by":"publisher","first-page":"2559","DOI":"10.1007\/s13198-023-02112-x","volume":"14","author":"UR Saxena","year":"2023","unstructured":"Saxena UR, Alam T (2023c) Provisioning trust-oriented role-based access control for maintaining data integrity in cloud. Int J Syst Assur Eng Manag 14(6):2559\u20132578","journal-title":"Int J Syst Assur Eng Manag"},{"key":"2878_CR54","doi-asserted-by":"crossref","unstructured":"Saxena UR, Alam T (2022) Modified identify and broadcast-based encryption scheme to secure cloud. In: 2022 international conference on computational intelligence and sustainable engineering solutions (CISES). IEEE, pp 289\u2013294","DOI":"10.1109\/CISES54857.2022.9844395"},{"key":"2878_CR55","doi-asserted-by":"crossref","unstructured":"Singh J, Michels JD (2018) Blockchain as a service (BaaS): providers and trust. In: 2018 IEEE european symposium on security and privacy workshops (EuroS&PW). IEEE, pp 67\u201374","DOI":"10.1109\/EuroSPW.2018.00015"},{"key":"2878_CR56","doi-asserted-by":"publisher","DOI":"10.1002\/9781119491422","volume-title":"Information governance: concepts, strategies and best practices","author":"RF Smallwood","year":"2019","unstructured":"Smallwood RF (2019) Information governance: concepts, strategies and best practices. John Wiley & Sons"},{"issue":"1","key":"2878_CR57","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1186\/s13638-021-01986-4","volume":"2021","author":"L Song","year":"2021","unstructured":"Song L, Ju X, Zhu Z, Li M (2021) An access control model for the Internet of Things based on zero-knowledge token and blockchain. EURASIP J Wirel Commun Netw 2021(1):105","journal-title":"EURASIP J Wirel Commun Netw"},{"key":"2878_CR58","doi-asserted-by":"crossref","unstructured":"Tapas N, Merlino G, Longo F, Puliafito A (2019) Blockchain-based publicly verifiable cloud storage. In: 2019 IEEE international conference on smart computing (SMARTCOMP). IEEE, pp 381\u2013386","DOI":"10.1109\/SMARTCOMP.2019.00076"},{"key":"2878_CR59","doi-asserted-by":"publisher","first-page":"204441","DOI":"10.1109\/ACCESS.2020.3036811","volume":"8","author":"AEB Tomaz","year":"2020","unstructured":"Tomaz AEB, Do Nascimento JC, Hafid AS, De Souza JN (2020) Preserving privacy in mobile health systems using non-interactive zero-knowledge proof and blockchain. IEEE Access 8:204441\u2013204458","journal-title":"IEEE Access"},{"issue":"4","key":"2878_CR60","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/MCE.2019.2892222","volume":"8","author":"D Tosh","year":"2019","unstructured":"Tosh D, Shetty S, Liang X, Kamhoua C, Njilla LL (2019) Data provenance in the cloud: a blockchain-based approach. IEEE Consum Electron Mag 8(4):38\u201344","journal-title":"IEEE Consum Electron Mag"},{"issue":"1","key":"2878_CR61","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1109\/TBDATA.2022.3148181","volume":"9","author":"C Wang","year":"2022","unstructured":"Wang C, Wang S, Cheng X, He Y, Xiao K, Fan S (2022) A privacy and efficiency-oriented data sharing mechanism for IoTs. IEEE Trans Big Data 9(1):174\u2013185","journal-title":"IEEE Trans Big Data"},{"key":"2878_CR62","doi-asserted-by":"crossref","unstructured":"Westerlund M, Kratzke N (2018) Towards distributed clouds: a review about the evolution of centralized cloud computing, distributed ledger technologies, and a foresight on unifying opportunities and security implications. In: 2018 International conference on high performance computing & simulation (HPCS). IEEE, pp 655\u2013663","DOI":"10.1109\/HPCS.2018.00108"},{"key":"2878_CR63","unstructured":"Wood G (2014) Ethereum: a secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper 151:1\u201332"},{"key":"2878_CR64","doi-asserted-by":"crossref","unstructured":"Xu L, Shah N, Chen L, Diallo N, Gao Z, Lu Y, Shi W (2017) Enabling the sharing economy: Privacy respecting contract based on public blockchain. In: Proceedings of the ACM workshop on blockchain, cryptocurrencies and contracts, pp 15\u201321","DOI":"10.1145\/3055518.3055527"},{"issue":"12","key":"2878_CR65","doi-asserted-by":"publisher","first-page":"1657","DOI":"10.3390\/e23121657","volume":"23","author":"K Yuan","year":"2021","unstructured":"Yuan K, Yan Y, Xiao T, Zhang W, Zhou S, Jia C (2021) Privacy-protection scheme of a credit-investigation system based on blockchain. Entropy 23(12):1657","journal-title":"Entropy"},{"issue":"no. 1","key":"2878_CR66","first-page":"17","volume":"14","author":"D Zeginis","year":"2013","unstructured":"Zeginis D, D\u2019Andria F, Bocconi S, Cruz JG, Martin OC, Gouvas P, Ledakis G, Tarabanis KA (2013) A user-centric multiPaaS application management solution for hybrid multi-cloud scenarios. Scalable Comput Pract Exp 14(1):17\u201332","journal-title":"Scalable Comput Pract Exp"},{"issue":"1","key":"2878_CR67","first-page":"9922167","volume":"2022","author":"Y Zhang","year":"2022","unstructured":"Zhang Y (2022) Increasing cyber defense in the music education sector using blockchain zero-knowledge proof identification. Comput Intell Neurosci 2022(1):9922167","journal-title":"Comput Intell Neurosci"},{"issue":"4","key":"2878_CR68","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1504\/ijwgs.2018.095647","volume":"14","author":"Z Zheng","year":"2018","unstructured":"Zheng Z, Xie S, Dai HN, Chen X, Wang H (2018) Blockchain challenges and opportunities: a survey. Int J Web Grid Serv 14(4):352\u2013375. https:\/\/doi.org\/10.1504\/ijwgs.2018.095647","journal-title":"Int J Web Grid Serv"},{"key":"2878_CR69","doi-asserted-by":"crossref","unstructured":"Zhu H, Wang Y, Hei X, Ji W, Zhang L (2018) A blockchain-based decentralized cloud resource scheduling architecture. In: 2018 International conference on networking and network applications (NaNA). IEEE, pp 324\u2013329","DOI":"10.1109\/NANA.2018.8648712"}],"container-title":["International Journal of System Assurance Engineering and Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-025-02878-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13198-025-02878-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-025-02878-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T18:10:05Z","timestamp":1761847805000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13198-025-02878-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,25]]},"references-count":69,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2025,11]]}},"alternative-id":["2878"],"URL":"https:\/\/doi.org\/10.1007\/s13198-025-02878-2","relation":{},"ISSN":["0975-6809","0976-4348"],"issn-type":[{"value":"0975-6809","type":"print"},{"value":"0976-4348","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7,25]]},"assertion":[{"value":"25 September 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 June 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 July 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"On behalf of all authors, the corresponding author states that there is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}}]}}