{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T16:20:52Z","timestamp":1772727652869,"version":"3.50.1"},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2024,11,4]],"date-time":"2024-11-04T00:00:00Z","timestamp":1730678400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,4]],"date-time":"2024-11-04T00:00:00Z","timestamp":1730678400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-024-03306-1","type":"journal-article","created":{"date-parts":[[2024,11,4]],"date-time":"2024-11-04T15:03:38Z","timestamp":1730732618000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Enhancing Privacy in VANET Cloud: A Blockchain-Powered Identity Authentication Framework"],"prefix":"10.1007","volume":"5","author":[{"given":"Nayana","family":"Hegde","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shridevi J.","family":"Kamble","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"B. N.","family":"Aryalekshmi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"D. R.","family":"Janardhana","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"H.","family":"Ravishankar","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2024,11,4]]},"reference":[{"key":"3306_CR1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/ACCESS.2015.2510966","volume":"4","author":"D Zheng","year":"2016","unstructured":"Zheng D, Jing C, Guo R, Gao S, Wang L. A traceable Blockchain-based Access authentication system with privacy preservation in VANETs. IEEE Access. 2016;4:1\u201311.","journal-title":"IEEE Access"},{"key":"3306_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/app11041772","volume":"11","author":"S Algarni","year":"2021","unstructured":"Algarni S, FathyEassa KA. Blockchain-based secured access control in an IoT system. Appl Sci. 2021;11:1\u201316.","journal-title":"Appl Sci"},{"key":"3306_CR3","doi-asserted-by":"crossref","unstructured":"Fongen A. Identity management and integrity protection in the internet of things. In: IEEE international conference on emerging security technologies. 2012. pp. 111\u2013114","DOI":"10.1109\/EST.2012.15"},{"key":"3306_CR4","unstructured":"Zhao G, Si X, Wang J, LongX, Hu T. A novel mutual authentication scheme for internet of things. In: IEEE international conference on modelling, identification and control. 2011. pp.1\u20136"},{"key":"3306_CR5","doi-asserted-by":"crossref","unstructured":"Dorri A, Kanhere SS, Jurdak R, Gauravaram P. Blockchain for IoT security and privacy: the case study of a smart home. In: IEEE international conference on pervasive computing and communications, 2017, pp.17\u201323","DOI":"10.1109\/PERCOMW.2017.7917634"},{"key":"3306_CR6","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1806.02008","author":"Z Bao","year":"2018","unstructured":"Bao Z, Shi W, He D, Raymond Chood KK. IoTChain: a three-tier Blockchain-based IoT security architecture. Cryptogr Secur. 2018. https:\/\/doi.org\/10.48550\/arXiv.1806.02008.","journal-title":"Cryptogr Secur"},{"key":"3306_CR7","doi-asserted-by":"crossref","unstructured":"Lu Z, Wang Q, Qu G, Liu Z. BARS: a Blockchain-based anonymous reputation system for trust management in VANETs. In: IEEE international conference on big data science and engineering. 2018. pp. 1\u20136","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00025"},{"key":"3306_CR8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2864189","author":"L Zhaojun","year":"2018","unstructured":"Zhaojun L, Liu W, Wang Q, Gang Q, Liu Z. A privacy-preserving trust model based on Blockchain for VANETs. IEEE Access. 2018. https:\/\/doi.org\/10.1109\/ACCESS.2018.2864189.","journal-title":"IEEE Access"},{"issue":"15","key":"3306_CR9","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.jnca.2018.05.005","volume":"116","author":"C Lin","year":"2018","unstructured":"Lin C, DebiaoHe XH, Choo KKR, Vasilakos AV. BSeIn: a blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0. J Netw Comput Appl. 2018;116(15):42\u201352.","journal-title":"J Netw Comput Appl"},{"key":"3306_CR10","doi-asserted-by":"crossref","unstructured":"Chuang MC, Lee JF. PPAS: a privacy preservation authentication scheme for vehicle-to-infrastructure communication networks. In: IEEE international conference on consumer electronics, communications and networks. 2011. pp.1\u20136","DOI":"10.1109\/CECNET.2011.5768254"},{"key":"3306_CR11","unstructured":"Peng X. A novel authentication protocol for vehicle network. In: IEEE international conference on systems and informatics. 2016. pp. 1\u20136"},{"key":"3306_CR12","doi-asserted-by":"crossref","unstructured":"Yuan Y, Wang FY. Towards blockchain-based intelligent transportation systems. In: IEEE international conference on intelligent transportation systems. 2016. pp. 1\u20136","DOI":"10.1109\/ITSC.2016.7795984"},{"key":"3306_CR13","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1704.02553","author":"S Rowan","year":"2017","unstructured":"Rowan S, Clear M, Gerla M, MerielHuggard CMG. Securing vehicle to vehicle communications using BlockChain through visible light and acoustic side-channels. Cryptogr Secur. 2017. https:\/\/doi.org\/10.48550\/arXiv.1704.02553.","journal-title":"Cryptogr Secur"},{"key":"3306_CR14","first-page":"56656","volume":"7","author":"YD LixiaXie","year":"2019","unstructured":"LixiaXie YD, Yang H, Wang X. Blockchain-based secure and trustworthy internet of things in SDN-enabled 5G-VANETs. Mobile Service Comput Internet Things. 2019;7:56656\u201366.","journal-title":"Mobile Service Comput Internet Things"},{"issue":"6","key":"3306_CR15","doi-asserted-by":"publisher","first-page":"3680","DOI":"10.1109\/TII.2019.2903342","volume":"15","author":"J Huang","year":"2019","unstructured":"Huang J, Kong L, Chen G, Min-You Wu, Liu X, Zeng P. Towards secure industrial IoT: Blockchain system with credit-based consensus mechanism. IEEE Trans Industr Inf. 2019;15(6):3680\u20139.","journal-title":"IEEE Trans Industr Inf"},{"issue":"1","key":"3306_CR16","first-page":"1","volume":"1","author":"N Hegde","year":"2022","unstructured":"Hegde N, Manvi S. Distributed integrity and non-repudiation scheme in the dynamic vehicular cloud environment. Int J Inf Comput Secur. 2022;1(1):1\u201315.","journal-title":"Int J Inf Comput Secur"},{"issue":"5","key":"3306_CR17","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1080\/19393555.2022.2081636","volume":"32","author":"N Hegde","year":"2023","unstructured":"Hegde N, Manvi SS, Lallie HS. Secure search scheme for encrypted data in the VANET cloud with random query trapdoor. Inf Secur J Glob Perspect. 2023;32(5):383\u2013400.","journal-title":"Inf Secur J Glob Perspect"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-024-03306-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-024-03306-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-024-03306-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,4]],"date-time":"2024-11-04T15:12:01Z","timestamp":1730733121000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-024-03306-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,4]]},"references-count":17,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2024,12]]}},"alternative-id":["3306"],"URL":"https:\/\/doi.org\/10.1007\/s42979-024-03306-1","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,4]]},"assertion":[{"value":"2 August 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 September 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 November 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"There is no conflict of interest in this research work.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}}],"article-number":"1016"}}