{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,23]],"date-time":"2025-10-23T05:46:36Z","timestamp":1761198396608,"version":"3.37.3"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2024,9,16]],"date-time":"2024-09-16T00:00:00Z","timestamp":1726444800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,9,16]],"date-time":"2024-09-16T00:00:00Z","timestamp":1726444800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Netw Distrib Comput"],"published-print":{"date-parts":[[2024,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>The growing adoption of wearables is driving the demand for personalized services that leverage unprocessed data, such as biometric and health information, to enhance user experiences and support through software applications. However, several existing use cases involving this information still prioritize traditional schemes, neglecting user privacy. Consequently, the transparency of data transmission paths and the potential for tampering remain ambiguous when users share data with service providers. In this paper, we propose the application of an Internet of Things device-focused distributed ledger as an underlying layer for the transmission of encrypted data using streams. Moreover, our proposal enables data recording for future events and the implementation of multi-subscriber models, allowing client information to be shared securely with different service providers. Through simulation experiments conducted on constrained devices, we demonstrate that our proposed framework efficiently transmits large ciphertexts through streams on a distributed ledger, overcoming the inherent limitations of such networks when dealing with substantial data volumes. Ultimately, the performance metrics presented prove that the proposed model is suitable for real-world applications requiring continuous data collection by wearables and subsequent transmission to service providers.<\/jats:p>","DOI":"10.1007\/s44227-024-00038-9","type":"journal-article","created":{"date-parts":[[2024,9,16]],"date-time":"2024-09-16T17:02:01Z","timestamp":1726506121000},"page":"362-384","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Privacy-Preserving Computing Services for Encrypted Personal Data Through Streams Over Distributed Ledgers"],"prefix":"10.1007","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6357-8916","authenticated-orcid":false,"given":"Alberto","family":"Ballesteros-Rodr\u00edguez","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9949-4797","authenticated-orcid":false,"given":"Salvador","family":"S\u00e1nchez-Alonso","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3067-4180","authenticated-orcid":false,"given":"Miguel-\u00c1ngel","family":"Sicilia-Urb\u00e1n","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,16]]},"reference":[{"key":"38_CR1","doi-asserted-by":"publisher","unstructured":"Rydningen ES, \u00c5sberg E, Jaccheri L, Li J (2022) Advantages and opportunities of the iota tangle for health data management: A systematic mapping study. In: 2022 IEEE\/ACM 5th International Workshop on Emerging Trends in Software Engineering for Blockchain (WETSEB), pp. 9\u201316. https:\/\/doi.org\/10.1145\/3528226.3528376","DOI":"10.1145\/3528226.3528376"},{"key":"38_CR2","doi-asserted-by":"publisher","unstructured":"Marcolla C, Sucasas V, Manzano M, Bassoli R, Fitzek FHP, Aaraj N (2022) Survey on Fully Homomorphic Encryption, Theory, and Applications. Cryptology ePrint Archive, Paper 2022\/1602 . https:\/\/doi.org\/10.1109\/JPROC.2022.3205665","DOI":"10.1109\/JPROC.2022.3205665"},{"key":"38_CR3","doi-asserted-by":"publisher","unstructured":"Wang Y, Malluhi QM (2016) Privacy Preserving Computation in Cloud Using Noise-Free Fully Homomorphic Encryption (FHE) Schemes. In: Computer Security \u2013 ESORICS 2016, vol. 9878, pp. 301\u2013323 . https:\/\/doi.org\/10.1007\/978-3-319-45744-4_15","DOI":"10.1007\/978-3-319-45744-4_15"},{"key":"38_CR4","doi-asserted-by":"publisher","first-page":"639","DOI":"10.1016\/j.future.2019.01.046","volume":"95","author":"P Martins","year":"2019","unstructured":"Martins P, Sousa L (2019) A methodical FHE-based cloud computing model. Future Gener Comput Syst 95:639\u2013648. https:\/\/doi.org\/10.1016\/j.future.2019.01.046","journal-title":"Future Gener Comput Syst"},{"key":"38_CR5","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1016\/j.jbi.2014.04.003","volume":"50","author":"JW Bos","year":"2014","unstructured":"Bos JW, Lauter K, Naehrig M (2014) Private predictive analysis on encrypted medical data. J Biomed Inform 50:234\u2013243. https:\/\/doi.org\/10.1016\/j.jbi.2014.04.003","journal-title":"J Biomed Inform"},{"issue":"4","key":"38_CR6","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1111\/anec.12204","volume":"20","author":"A Page","year":"2015","unstructured":"Page A, Kocabas O, Soyata T, Aktas M, Couderc J-P (2015) Cloud-based privacy-preserving remote ECG monitoring and surveillance. Ann Noninvas Electrocardiol 20(4):328\u2013337. https:\/\/doi.org\/10.1111\/anec.12204","journal-title":"Ann Noninvas Electrocardiol"},{"key":"38_CR7","doi-asserted-by":"publisher","first-page":"30039","DOI":"10.1109\/ACCESS.2022.3159694","volume":"10","author":"J-W Lee","year":"2022","unstructured":"Lee J-W, Kang H, Lee Y, Choi W, Eom J, Deryabin M, Lee E, Lee J, Yoo D, Kim Y-S, No J-S (2022) Privacy-preserving machine learning with fully homomorphic encryption for deep neural network. IEEE Access 10:30039\u201330054. https:\/\/doi.org\/10.1109\/ACCESS.2022.3159694","journal-title":"IEEE Access"},{"key":"38_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102936","volume":"177","author":"B Farahani","year":"2021","unstructured":"Farahani B, Firouzi F, Luecking M (2021) The convergence of IoT and distributed ledger technologies (DLT): Opportunities, challenges, and solutions. J Netw Comput Appl 177:102936. https:\/\/doi.org\/10.1016\/j.jnca.2020.102936","journal-title":"J Netw Comput Appl"},{"issue":"6","key":"38_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3359982","volume":"52","author":"Q Zhu","year":"2019","unstructured":"Zhu Q, Loke SW, Trujillo-Rasua R, Jiang F, Xiang Y (2019) Applications of distributed ledger technologies to the internet of things: a survey. ACM Comput. Surv. 52(6):1\u201334. https:\/\/doi.org\/10.1145\/3359982","journal-title":"ACM Comput. Surv."},{"issue":"9","key":"38_CR10","doi-asserted-by":"publisher","first-page":"2621","DOI":"10.3390\/s20092621","volume":"20","author":"C Lupascu","year":"2020","unstructured":"Lupascu C, Lupascu A, Bica I (2020) DLT based authentication framework for industrial IoT devices. Sensors 20(9):2621. https:\/\/doi.org\/10.3390\/s20092621","journal-title":"Sensors"},{"key":"38_CR11","doi-asserted-by":"publisher","unstructured":"Paavolainen S, Nikander P (2018) Security and Privacy Challenges and Potential Solutions for DLT based IoT Systems. In: 2018 Global Internet of Things Summit (GIoTS), pp. 1\u20136. https:\/\/doi.org\/10.1109\/GIOTS.2018.8534527","DOI":"10.1109\/GIOTS.2018.8534527"},{"issue":"12","key":"38_CR12","doi-asserted-by":"publisher","first-page":"312","DOI":"10.3390\/fi13120312","volume":"13","author":"P Gangwani","year":"2021","unstructured":"Gangwani P, Perez-Pons A, Bhardwaj T, Upadhyay H, Joshi S, Lagos L (2021) Securing environmental IoT data using masked authentication messaging protocol in a DAG-based blockchain: IOTA tangle. Future Internet 13(12):312. https:\/\/doi.org\/10.3390\/fi13120312","journal-title":"Future Internet"},{"issue":"13","key":"38_CR13","doi-asserted-by":"publisher","first-page":"4354","DOI":"10.3390\/s21134354","volume":"21","author":"MM Akhtar","year":"2021","unstructured":"Akhtar MM, Rizvi DR, Ahad MA, Kanhere SS, Amjad M, Coviello G (2021) Efficient data communication using distributed ledger technology and IOTA-enabled internet of things for a future machine-to-machine economy. Sensors 21(13):4354. https:\/\/doi.org\/10.3390\/s21134354","journal-title":"Sensors"},{"key":"38_CR14","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1016\/j.csbj.2018.06.004","volume":"16","author":"J Brogan","year":"2018","unstructured":"Brogan J, Baskaran I, Ramachandran N (2018) Authenticating health activity data using distributed ledger technologies. Comput Struct Biotechnol J 16:257\u2013266. https:\/\/doi.org\/10.1016\/j.csbj.2018.06.004","journal-title":"Comput Struct Biotechnol J"},{"key":"38_CR15","doi-asserted-by":"publisher","DOI":"10.3390\/s23010014","author":"FNdS Vanin","year":"2023","unstructured":"Vanin FNdS, Policarpo LM, Righi RdR, Heck SM, Silva VF, Goldim J, Costa CA (2023) A blockchain-based end-to-end data protection model for personal health records sharing: a fully homomorphic encryption approach. Sensors. https:\/\/doi.org\/10.3390\/s23010014","journal-title":"Sensors"},{"key":"38_CR16","doi-asserted-by":"publisher","DOI":"10.3390\/s22041384","author":"A Carelli","year":"2022","unstructured":"Carelli A, Palmieri A, Vilei A, Castanier F, Vesco A (2022) Enabling secure data exchange through the iota tangle for iot constrained devices. Sensors. https:\/\/doi.org\/10.3390\/s22041384","journal-title":"Sensors"},{"key":"38_CR17","unstructured":"Nakamoto S (2008) Bitcoin: A peer-to-peer electronic cash system. Decentralized business review"},{"key":"38_CR18","unstructured":"Buterin V et al.: (2014) A next-generation smart contract and decentralized application platform. white paper"},{"key":"38_CR19","unstructured":"Popov SY (2015) The Tangle"},{"key":"38_CR20","doi-asserted-by":"publisher","unstructured":"Jakobsson M, Juels A (1999) Proofs of Work and Bread Pudding Protocols(Extended Abstract), pp. 258\u2013272. https:\/\/doi.org\/10.1007\/978-0-387-35568-9_18","DOI":"10.1007\/978-0-387-35568-9_18"},{"issue":"11","key":"38_CR21","first-page":"169","volume":"4","author":"RL Rivest","year":"1978","unstructured":"Rivest RL, Adleman L, Dertouzos ML et al (1978) On data banks and privacy homomorphisms. Found Secure Comput 4(11):169\u2013180","journal-title":"Found Secure Comput"},{"key":"38_CR22","doi-asserted-by":"publisher","unstructured":"Gentry C (2009) Fully Homomorphic Encryption Using Ideal Lattices. In: Proceedings of the Forty-First Annual ACM Symposium on Theory of Computing. STOC \u201909, pp. 169\u2013178.https:\/\/doi.org\/10.1145\/1536414.1536440","DOI":"10.1145\/1536414.1536440"},{"key":"38_CR23","doi-asserted-by":"publisher","DOI":"10.1007\/s40747-022-00756-z","author":"K Munjal","year":"2022","unstructured":"Munjal K, Bhatia R (2022) A systematic review of homomorphic encryption and its contributions in healthcare industry. Complex Intell Syst. https:\/\/doi.org\/10.1007\/s40747-022-00756-z","journal-title":"Complex Intell Syst"},{"issue":"1","key":"38_CR24","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/2128\/1\/012021","volume":"2128","author":"SM Fawaz","year":"2021","unstructured":"Fawaz SM, Belal N, ElRefaey A, Fakhr MW (2021) A comparative study of homomorphic encryption schemes using microsoft SEAL. J Phys 2128(1):012021. https:\/\/doi.org\/10.1088\/1742-6596\/2128\/1\/012021","journal-title":"J Phys"},{"key":"38_CR25","unstructured":"Microsoft SEAL (release 4.1). https:\/\/github.com\/Microsoft\/SEAL. Microsoft Research, Redmond, WA. (2023)"},{"key":"38_CR26","doi-asserted-by":"publisher","unstructured":"Sathya SS, Vepakomma P, Raskar R, Ramachandra R, Bhattacharya S (2018) A Review of Homomorphic Encryption Libraries for Secure Computation. https:\/\/doi.org\/10.48550\/arXiv.1812.02428","DOI":"10.48550\/arXiv.1812.02428"},{"key":"38_CR27","unstructured":"Zama: Concrete: TFHE Compiler. https:\/\/github.com\/zama-ai\/concrete"},{"key":"38_CR28","doi-asserted-by":"publisher","unstructured":"Brakerski Z, Gentry C, Vaikuntanathan V (2012) (leveled) fully homomorphic encryption without bootstrapping. In: Proceedings of the 3rd Innovations in Theoretical Computer Science Conference. ITCS \u201912, pp. 309\u2013325. https:\/\/doi.org\/10.1145\/2090236.2090262","DOI":"10.1145\/2090236.2090262"},{"key":"38_CR29","doi-asserted-by":"publisher","unstructured":"Cheon JH, Kim A, Kim M, Song Y (2017) Homomorphic Encryption for Arithmetic of Approximate Numbers. In: Advances in Cryptology \u2013 ASIACRYPT 2017, pp. 409\u2013437 . https:\/\/doi.org\/10.1007\/978-3-319-70694-8_15","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"38_CR30","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/s00145-019-09319-x","volume":"33","author":"I Chillotti","year":"2020","unstructured":"Chillotti I, Gama N, Georgieva M, Izabach\u00e8ne M (2020) TFHE: fast fully homomorphic encryption over the Torus. J Cryptol 33:34\u201391. https:\/\/doi.org\/10.1007\/s00145-019-09319-x","journal-title":"J Cryptol"},{"key":"38_CR31","unstructured":"Chillotti I, Joye M, Ligier D, Orfila J-B, Tap S (2020) CONCRETE: Concrete Operates oN Ciphertexts Rapidly by Extending TfhE. In: WAHC 2020\u20138th Workshop on Encrypted Computing & Applied Homomorphic Cryptography, vol. 15"},{"key":"38_CR32","doi-asserted-by":"publisher","unstructured":"Chillotti I, Joye M, Paillier P (2021) Programmable Bootstrapping Enables Efficient Homomorphic Inference of Deep Neural Networks. In: Cyber Security Cryptography and Machine Learning, vol. 12716, pp. 1\u201319 . https:\/\/doi.org\/10.1007\/978-3-030-78086-9_1","DOI":"10.1007\/978-3-030-78086-9_1"},{"key":"38_CR33","unstructured":"IOTA Foundation: Energy Consumption of IOTA 2.0 (2022). https:\/\/blog.iota.org\/energy-consumption-of-iota-2-0\/"},{"key":"38_CR34","doi-asserted-by":"publisher","unstructured":"Wolberg W, Mangasarian O, Street N, Street W (1995) Breast Cancer Wisconsin (Diagnostic). UCI Machine Learning Repository.https:\/\/doi.org\/10.24432\/C5DW2B","DOI":"10.24432\/C5DW2B"},{"key":"38_CR35","unstructured":"IOTA Foundation: Iotaledger\/Hornet: Iota Fullnode software. https:\/\/github.com\/iotaledger\/hornet"},{"key":"38_CR36","unstructured":"Archer D, Chen L, Cheon JH, Gilad-Bachrach R, Hallman RA, Huang Z, Jiang X, Kumaresan R, Malin BA, Sofia H et al.: (2017) Applications of homomorphic encryption. In: Crypto Standardization Workshop, Microsoft Research, vol. 14"},{"key":"38_CR37","unstructured":"Benet J (2014) IPFS - Content Addressed, Versioned, P2P File System"},{"key":"38_CR38","unstructured":"IOTA Foundation: Networks & Endpoints. https:\/\/wiki.iota.org\/build\/networks-endpoints"},{"key":"38_CR39","doi-asserted-by":"publisher","unstructured":"Gentry C, Halevi S, Smart NP (2012) Fully Homomorphic Encryption with Polylog Overhead. In: Advances in Cryptology \u2013 EUROCRYPT 2012, pp. 465\u2013482. https:\/\/doi.org\/10.1007\/978-3-642-29011-4_28","DOI":"10.1007\/978-3-642-29011-4_28"}],"container-title":["International Journal of Networked and Distributed Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44227-024-00038-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s44227-024-00038-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44227-024-00038-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,6]],"date-time":"2024-11-06T10:08:46Z","timestamp":1730887726000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s44227-024-00038-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,16]]},"references-count":39,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["38"],"URL":"https:\/\/doi.org\/10.1007\/s44227-024-00038-9","relation":{},"ISSN":["2211-7938","2211-7946"],"issn-type":[{"type":"print","value":"2211-7938"},{"type":"electronic","value":"2211-7946"}],"subject":[],"published":{"date-parts":[[2024,9,16]]},"assertion":[{"value":"8 April 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 August 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 September 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}}]}}