{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T11:40:03Z","timestamp":1750333203484,"version":"3.41.0"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T00:00:00Z","timestamp":1747094400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T00:00:00Z","timestamp":1747094400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2025,7]]},"DOI":"10.1007\/s40747-025-01868-y","type":"journal-article","created":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T06:34:55Z","timestamp":1747118095000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["DEBPIR: enhancing information privacy in decentralized business modeling"],"prefix":"10.1007","volume":"11","author":[{"given":"Gulshan","family":"Kumar","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3921-9512","authenticated-orcid":false,"given":"Rahul","family":"Saha","sequence":"additional","affiliation":[]},{"given":"Mauro","family":"Conti","sequence":"additional","affiliation":[]},{"given":"Tai Hoon","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,13]]},"reference":[{"issue":"7","key":"1868_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.heliyon.2023.e17895","volume":"9","author":"W Huang","year":"2023","unstructured":"Huang W, Ichikohji T (2023) A review and analysis of the business model innovation literature. Heliyon 9(7):1\u201319","journal-title":"Heliyon"},{"issue":"18","key":"1868_CR2","first-page":"1","volume":"13","author":"M Ramadan","year":"2023","unstructured":"Ramadan M, Zakhem NB, Baydoun H, Daouk A, Youssef S, El Fawal A, Elia J, Ashaal A (2023) Toward digital transformation and business model innovation: the nexus between leadership. Org Agility Knowl Transf Adm Sci 13(18):1\u201321","journal-title":"Org Agility Knowl Transf Adm Sci"},{"issue":"1","key":"1868_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jik.2023.100336","volume":"8","author":"L Kanski","year":"2023","unstructured":"Kanski L, Pizon J (2023) The impact of selected components of industry 40 on project management. J Innov Knowl 8(1):1\u201313","journal-title":"J Innov Knowl"},{"key":"1868_CR4","doi-asserted-by":"crossref","unstructured":"Dymitrowski A, Mielcarek P (2023) Innovation business model based on new technologies and company relationships. J Knowl Econ 1\u201320","DOI":"10.1007\/s13132-023-01251-7"},{"issue":"4","key":"1868_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jik.2023.100425","volume":"8","author":"ZJ Wang","year":"2023","unstructured":"Wang ZJ, Chen Z-S, Xiao L, Su Q, Govindan K, Skibniewski MJ (2023) Blockchain adoption in sustainable supply chains for Industry 5.0: a multistakeholder perspective. J Innov Knowl 8(4):1\u201322","journal-title":"J Innov Knowl"},{"key":"1868_CR6","unstructured":"Varner M (2016) 5 Companies that have been caught violating their customers\u2019 privacy, the bottom line. https:\/\/medium.com\/bestcompany\/5-companies-that-have-been-caught-violating-their-customers-privacy-9cfe660ea3eb. Accessed 06 Jan 2024"},{"key":"1868_CR7","unstructured":"Pryimenko L (2024) 7 Examples of real-life data breaches caused by insider threats. https:\/\/www.ekransystem.com\/en\/blog\/real-life-examples-insider-threat-caused-breaches. Accessed 15 Mar 2024"},{"key":"1868_CR8","first-page":"1","volume":"76","author":"M Bakhtina","year":"2023","unstructured":"Bakhtina M, Matulevi\u010dius R, Seeba M (2023) Tool-supported method for privacy analysis of a business process model. J Inf Secur Appl 76:1\u201313","journal-title":"J Inf Secur Appl"},{"key":"1868_CR9","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1057\/palgrave.ejis.3000446","volume":"12","author":"J Hedman","year":"2003","unstructured":"Hedman J, Kalling T (2003) The business model concept: theoretical underpinnings and empirical illustrations. Eur J Inf Syst 12:49\u201359","journal-title":"Eur J Inf Syst"},{"key":"1868_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jbusres.2024.114549","volume":"175","author":"G Magnani","year":"2024","unstructured":"Magnani G, Sanguineti F, Cavusgil ST, Raskovic MM, Jean RJB (2024) Developing resilience: multinational enterprise business model transformation to mitigate major disruptions. J Bus Res 175:1\u20136","journal-title":"J Bus Res"},{"key":"1868_CR11","doi-asserted-by":"publisher","first-page":"18777","DOI":"10.1007\/s11227-022-04586-1","volume":"78","author":"MR Alagheband","year":"2022","unstructured":"Alagheband MR, Mashatan A (2022) Advanced encryption schemes in multi-tier heterogeneous internet of things: taxonomy, capabilities, and objectives. J Supercomput 78:18777\u201318824","journal-title":"J Supercomput"},{"key":"1868_CR12","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3390\/app132112068","volume":"13","author":"S Szymoniak","year":"2023","unstructured":"Szymoniak S, Kesar S (2023) Key agreement and authentication protocols in the internet of things: a survey. Appl Sci 13:1\u201323","journal-title":"Appl Sci"},{"key":"1868_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s00145-021-09398-9","volume":"34","author":"C Dobraunig","year":"2021","unstructured":"Dobraunig C, Eichlseder M, Mendel F, Schl\u00e4ffer M (2021) ASCON v1.2: lightweight authenticated encryption and hashing. J Cryptol 34:1\u201342","journal-title":"J Cryptol"},{"issue":"7","key":"1868_CR14","first-page":"1","volume":"4","author":"I Abrar","year":"2024","unstructured":"Abrar I, Sheikh JA (2024) Current trends of blockchain technology: architecture, applications, challenges, and opportunities. Discov Intern Things 4(7):1\u201320","journal-title":"Discov Intern Things"},{"key":"1868_CR15","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-9975-3","volume-title":"Blockchain essentials","author":"RS Mangrulkar","year":"2024","unstructured":"Mangrulkar RS, Chavan PV (2024) Blockchain essentials. Apress, Berkeley"},{"key":"1868_CR16","first-page":"1","volume":"2022","author":"X Fan","year":"2022","unstructured":"Fan X, Chen C, Yuan L (2022) Centralization and firm performance: new evidence on the role of firm size. Wirel Commun Mob Comput 2022:1\u201317","journal-title":"Wirel Commun Mob Comput"},{"key":"1868_CR17","unstructured":"Bianca A (2019) The disadvantages to centralized control in a business. https:\/\/smallbusiness.chron.com\/disadvantages-centralized-control-business-20670.html. Accessed 12 Feb 2024"},{"issue":"3","key":"1868_CR18","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1016\/j.bushor.2019.01.009","volume":"62","author":"VJ Morkunas","year":"2019","unstructured":"Morkunas VJ, Paschen J, Boon E (2019) How blockchain technologies impact your business model. Bus Horiz 62(3):295\u2013306","journal-title":"Bus Horiz"},{"key":"1868_CR19","first-page":"1","volume":"13","author":"Y Chen","year":"2020","unstructured":"Chen Y, Bellavitis C (2020) Blockchain disruption and decentralized finance: the rise of decentralized business models. J Bus Vent Insights 13:1\u201311","journal-title":"J Bus Vent Insights"},{"key":"1868_CR20","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/978-3-031-39101-9_11","volume-title":"Knowledge and digital technology. Knowledge and space","author":"A Tumasjan","year":"2024","unstructured":"Tumasjan A (2024) The promise and prospects of blockchain-based decentralized business models. In: Gl\u00fcckler J, Panitz R (eds) Knowledge and digital technology. Knowledge and space, vol 19. Springer, New York, pp 203\u2013224"},{"issue":"6","key":"1868_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/electronics12061479","volume":"12","author":"H Taherdoost","year":"2023","unstructured":"Taherdoost H, Madanchian M (2023) Blockchain-based new business models: a systematic review. Electronics 12(6):1\u201324","journal-title":"Electronics"},{"key":"1868_CR22","doi-asserted-by":"crossref","unstructured":"Zyskind G, Nathan O, Pentland A (2015) Decentralizing privacy: using blockchain to protect personal data. In: IEEE security and privacy workshops, pp 180\u2013184","DOI":"10.1109\/SPW.2015.27"},{"key":"1868_CR23","doi-asserted-by":"crossref","unstructured":"Kosba A, Miller A, Shi E, Wen Z, Papamanthou C (2016) Hawk: the blockchain model of cryptography and privacy-preserving smart contracts. In: IEEE symposium on security and privacy (SP) 2016, pp 839\u2013858","DOI":"10.1109\/SP.2016.55"},{"issue":"2","key":"1868_CR24","first-page":"1","volume":"2","author":"D Marikyan","year":"2022","unstructured":"Marikyan D, Papagiannidis S, Rana OF, Ranjan R (2022) Blockchain: a business model innovation analysis. Digit Bus 2(2):1\u201313","journal-title":"Digit Bus"},{"key":"1868_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.techfore.2021.120601","volume":"166","author":"L Schlecht","year":"2021","unstructured":"Schlecht L, Schneider S, Buchwald A (2021) The prospective value creation potential of Blockchain in business models: a Delphi study. Technol Forecast Soc Change 166:1\u201318","journal-title":"Technol Forecast Soc Change"},{"issue":"3","key":"1868_CR26","first-page":"1","volume":"163","author":"G Li","year":"2022","unstructured":"Li G, Xue J, Li N, Ivanov D (2022) Blockchain-supported business model design, supply chain resilience, and firm performance. Transp Res E Logist Transp Rev 163(3):1\u201318","journal-title":"Transp Res E Logist Transp Rev"},{"issue":"3","key":"1868_CR27","first-page":"1","volume":"2","author":"F Corradini","year":"2021","unstructured":"Corradini F, Marcelletti A, Morichetta A, Polini A, Re B, Scala E, Tiezzi F (2021) Model-driven engineering for multi-party business processes on multiple blockchains. Blockchain Res Appl 2(3):1\u201315","journal-title":"Blockchain Res Appl"},{"key":"1868_CR28","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1016\/j.future.2023.05.006","volume":"147","author":"F Corradini","year":"2023","unstructured":"Corradini F, Marcelletti A, Morichetta A, Polini A, Re B, Tiezzi F (2023) A flexible approach to multi-party business process execution on blockchain. Future Gener Comput Syst 147:219\u2013234","journal-title":"Future Gener Comput Syst"},{"key":"1868_CR29","doi-asserted-by":"publisher","first-page":"312","DOI":"10.3390\/blockchains2030015","volume":"2","author":"R Almadadha","year":"2024","unstructured":"Almadadha R (2024) Blockchain technology in financial accounting: enhancing transparency, security, and ESG reporting. Blockchains 2:312\u2013333","journal-title":"Blockchains"},{"key":"1868_CR30","first-page":"1","volume":"177","author":"SB Far","year":"2023","unstructured":"Far SB, Asaar MR, Haghbin A (2023) A privacy-preserving framework for blockchain-based multi-level marketing. Comput Ind Eng 177:1\u201317","journal-title":"Comput Ind Eng"},{"key":"1868_CR31","doi-asserted-by":"publisher","first-page":"1779","DOI":"10.1007\/s12525-022-00536-0","volume":"32","author":"J Sedlmeir","year":"2022","unstructured":"Sedlmeir J, Lautenschlager J, Fridgen G, Urbach N (2022) The transparency challenge of blockchain in organizations. Electron Mark 32:1779\u20131794","journal-title":"Electron Mark"},{"issue":"1","key":"1868_CR32","first-page":"1","volume":"5","author":"V Buterin","year":"2024","unstructured":"Buterin V, Illum J, Nadler M, Sch\u00e4r F, Soleimani A (2024) Blockchain privacy and regulatory compliance: towards a practical equilibrium. Blockchain Res Appl 5(1):1\u20139","journal-title":"Blockchain Res Appl"},{"key":"1868_CR33","first-page":"1","volume":"76","author":"O Akanfe","year":"2024","unstructured":"Akanfe O, Lawong D, Raghav Rao H (2024) Blockchain technology and privacy regulation: reviewing frictions and synthesizing opportunities. Int J Inf Manag 76:1\u201320","journal-title":"Int J Inf Manag"},{"key":"1868_CR34","doi-asserted-by":"publisher","first-page":"633","DOI":"10.1007\/s10257-024-00673-3","volume":"22","author":"A Gr\u00fcnewald","year":"2024","unstructured":"Gr\u00fcnewald A, G\u00fcrpinar T, Culotta C, Guderian A (2024) Archetypes of blockchain-based business models in enterprise networks. Inf Syst E-Bus Manag 22:633\u2013665","journal-title":"Inf Syst E-Bus Manag"},{"key":"1868_CR35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s42979-020-00215-x","volume":"1","author":"R Zaman","year":"2020","unstructured":"Zaman R, Hassani M (2020) On enabling GDPR compliance in business processes through data-driven solutions. SN Comput Sci 1:1\u201315","journal-title":"SN Comput Sci"},{"key":"1868_CR36","doi-asserted-by":"crossref","unstructured":"Diamantopoulou V, Karyda M (2021) Integrating privacy-by-design with business process redesign. In: Computer security, ESORICS 2021 international workshops: CyberICPS, SECPRE, ADIoT, SPOSE, CPS4CIP, and CDT &SECOMANE. Revised selected papers, Springer, Berlin, pp 127\u2013137","DOI":"10.1007\/978-3-030-95484-0_8"},{"key":"1868_CR37","unstructured":"The Economic Times: Industry News, 2024. https:\/\/economictimes.indiatimes.com\/industry\/cons-products\/electronics\/boat-data-breach-name-address-contact-number-email-id-of-75-lakh-boat-customers-reportedly-leaked-online\/articleshow\/109127405.cms?utm_source=contentofinterest&utm_medium=text &utm_campaign=cppst. Accessed 8 Apr 2024"},{"key":"1868_CR38","doi-asserted-by":"crossref","unstructured":"Jin J, Chuengsatiansup C, Murray T, Rubinstein BIP, Yarom Y, Ohrimenko O (2024) Elephants do not forget: differential privacy with state continuity for privacy budget. In: ACM SIGSAC conference on computer and communications security (CCS \u201924). ACM, pp 1909\u20131923","DOI":"10.1145\/3658644.3670281"},{"key":"1868_CR39","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.iot.2023.100984","volume":"24","author":"K Mershad","year":"2023","unstructured":"Mershad K, Cheikhrouhou O (2023) Lightweight blockchain solutions: taxonomy, research progress, comprehensive review. Internet Things 24:1\u201345","journal-title":"Internet Things"},{"key":"1868_CR40","doi-asserted-by":"crossref","unstructured":"Degabriele J. P, Govinden J, G\u00fcnther F, Paterson KG (2021) The security of ChaCha20-Poly1305 in the multi-user setting. In: Proceedings of the 2021 ACM SIGSAC conference on computer and communications security (CCS \u201921). ACM, pp 1981\u20132003","DOI":"10.1145\/3460120.3484814"},{"key":"1868_CR41","doi-asserted-by":"crossref","unstructured":"Anand PP, Vignesh V (2024) Architectural implementation of high-performance AES-GCM for network security. In: Proceedings of international conference on data, electronics, and computing, lecture notes in networks and systems, vol 1103. Springer, pp 305\u2013315","DOI":"10.1007\/978-981-97-6489-1_22"},{"key":"1868_CR42","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.tcs.2017.12.019","volume":"714","author":"J Lai","year":"2018","unstructured":"Lai J, Mu Y, Guo F, Chen R, Ma S (2018) Efficient k-out-of-n oblivious transfer scheme with the ideal communication cost. Theoret Comput Sci 714:15\u201326","journal-title":"Theoret Comput Sci"},{"key":"1868_CR43","doi-asserted-by":"crossref","unstructured":"Attema T, Cascudo I, Cramer R, Damg\u00e5rd I, Escudero D (2022) Vector commitments over rings and compressed $$\\Sigma $$-protocols. In: Theory of cryptography: 20th international conference. Springer, Berlin, pp 173\u2013202","DOI":"10.1007\/978-3-031-22318-1_7"},{"key":"1868_CR44","first-page":"281","volume-title":"Advances in cryptology\u2014ASIACRYPT 2021. Lecture notes in computer science","author":"I McQuoid","year":"2021","unstructured":"McQuoid I, Rosulek M, Roy L (2021) Batching base oblivious transfers. In: Tibouchi M, Wang H (eds) Advances in cryptology\u2014ASIACRYPT 2021. Lecture notes in computer science, vol 13092. Springer, Cham, pp 281\u2013310"},{"key":"1868_CR45","unstructured":"Cremers C, Dax A, Jacomme C, Zhao M (2023) Automated analysis of protocols that use authenticated encryption: how subtle AEAD differences can impact protocol security. Cryptology ePrint Archive, Paper 2023\/1246, pp 1\u201333. https:\/\/eprint.iacr.org\/2023\/1246. Accessed 12 Dec 2023"},{"key":"1868_CR46","unstructured":"Tink Cryptographic Library, Authenticated encryption with associated data (AEAD), Technical documentation. https:\/\/developers.google.com\/tink\/aead. Accessed 12 Dec 2023"},{"key":"1868_CR47","unstructured":"Hyperledger Caliper, Technical documentation. https:\/\/hyperledger.github.io\/caliper\/. Accessed 10 Feb 2024"},{"key":"1868_CR48","doi-asserted-by":"crossref","unstructured":"Chhabra A, Saha R, Kumar G (2024) PRIBANI: a privacy-ensured framework for blockchain transactions with information retrieval. Clust Comput 1\u201318","DOI":"10.1007\/s10586-024-04387-6"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-025-01868-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-025-01868-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-025-01868-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T11:09:21Z","timestamp":1750331361000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-025-01868-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,13]]},"references-count":48,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2025,7]]}},"alternative-id":["1868"],"URL":"https:\/\/doi.org\/10.1007\/s40747-025-01868-y","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"type":"print","value":"2199-4536"},{"type":"electronic","value":"2198-6053"}],"subject":[],"published":{"date-parts":[[2025,5,13]]},"assertion":[{"value":"19 September 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 March 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 May 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors did not receive support from any organization for the submitted work. The authors have no relevant financial or non-financial interests to disclose. The authors have no competing interests to declare that are relevant to the content of this article. All authors certify that they have no affiliations with or involvement in any organization or entity with any financial interest or non-financial interest in the subject matter or materials discussed in this manuscript. The authors have no financial or proprietary interests in any material discussed in this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"290"}}