{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T10:27:45Z","timestamp":1749810465504},"reference-count":45,"publisher":"Informa UK Limited","issue":"1","license":[{"start":{"date-parts":[[2020,9,29]],"date-time":"2020-09-29T00:00:00Z","timestamp":1601337600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/"}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Journal of Information and Telecommunication"],"published-print":{"date-parts":[[2021,1,2]]},"DOI":"10.1080\/24751839.2020.1819634","type":"journal-article","created":{"date-parts":[[2020,9,29]],"date-time":"2020-09-29T09:26:24Z","timestamp":1601371584000},"page":"35-61","update-policy":"http:\/\/dx.doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":15,"title":["Traceability and ownership claim of data on big data marketplace using blockchain technology"],"prefix":"10.1080","volume":"5","author":[{"given":"Swagatika","family":"Sahoo","sequence":"first","affiliation":[{"name":"Department of Computer Science & Engineering, Indian Institute of Technology Patna, Patna, India"}]},{"given":"Raju","family":"Halder","sequence":"additional","affiliation":[{"name":"Department of Computer Science & Engineering, Indian Institute of Technology Patna, Patna, India"}]}],"member":"301","published-online":{"date-parts":[[2020,9,29]]},"reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-003-0097-x"},{"key":"CIT0002","doi-asserted-by":"crossref","unstructured":"Agrawal, R. & Kiernan, J. (2002). Watermarking relational databases. InVLDB \u201902: Proceedings of the 28th International Conference on Very Large Databases(pp. 155\u2013166).","DOI":"10.1016\/B978-155860869-6\/50022-6"},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2903554"},{"key":"CIT0004","doi-asserted-by":"crossref","first-page":"151","DOI":"10.5121\/ijcsit.2017.9511","volume":"9","author":"Alharby M.","year":"2017","journal-title":"International Journal of Computer Science and Information Technology(ijcsit)"},{"key":"CIT0005","unstructured":"Banerjee, P. & Ruj, S. (2018). Blockchain enabled data marketplace \u2013 design and challenges.CoRR, 2018."},{"key":"CIT0006","unstructured":"Benet, J. (2014). IPFS - content addressed, versioned, P2P file system.ArXiv,abs\/1407.3561."},{"key":"CIT0007","doi-asserted-by":"crossref","unstructured":"Bhowmik, D. & Feng, T. (August 2017). The multimedia blockchain: A distributed and tamper-proof media transaction framework. InProceedings of 22nd International Conference on Digital Signal Processing (DSP)(pp. 1\u20135). IEEE.","DOI":"10.1109\/ICDSP.2017.8096051"},{"key":"CIT0008","unstructured":"Billstr\u00f6m, A. & Huss, F. (2017, August).Video Integrity through Blockchain Technology. KTH VETENSKAP OCH KONST."},{"key":"CIT0009","first-page":"22","volume":"1","author":"Buterin V.","year":"2013","journal-title":"GitHub Repository"},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-013-0489-0"},{"key":"CIT0011","doi-asserted-by":"crossref","unstructured":"Choudhuri, A. R., Green, M., Jain, A., Kaptchuk, G. & Miers, I. (2017). Fairness in an unfair world: Fair multiparty computation from public bulletin boards. InProceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery.","DOI":"10.1145\/3133956.3134092"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2812844"},{"key":"CIT0013","unstructured":"Delgado-Segura, S., P\u00e9rez-Sol\u00e0, C., Navarro-Arribas, G. & Herrera-Joancomart\u00ed, J. (2017). A fair protocol for data trading based on bitcoin transactions.IACR Cryptol. ePrint Arch.."},{"key":"CIT0014","doi-asserted-by":"crossref","unstructured":"Dziembowski, S., Eckey, L. & Faust, S. (2018). Fairswap: How to fairly exchange digital goods. InProceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security(pp. 967\u2013984). Association for Computing Machinery.","DOI":"10.1145\/3243734.3243857"},{"key":"CIT0015","unstructured":"Egorov, M., Wilkison, M. & Nu\u00f1ez, D. (2017). Nucypher kms: decentralized key management system.arXiv preprint arXiv:1707.06140(pp. 1\u20135)."},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.1007\/BF02351717"},{"key":"CIT0017","first-page":"3164","volume":"16","author":"Halder R.","year":"2010","journal-title":"Journal of Universal Computer Science"},{"key":"CIT0018","doi-asserted-by":"publisher","DOI":"10.1016\/S0165-1684(98)00011-5"},{"key":"CIT0019","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2015.2416131"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.3905\/jai.2018.21.1.008"},{"key":"CIT0021","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2796585"},{"key":"CIT0022","doi-asserted-by":"crossref","unstructured":"Lan, J. & Chunhua, G. (2013). A hierarchical access control technology for cloud storage. In2013 International Conference on Computer Sciences and Applications(pp. 35\u201340). IEEE.","DOI":"10.1109\/CSA.2013.16"},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2921624"},{"key":"CIT0024","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-017-1251-3"},{"key":"CIT0025","doi-asserted-by":"crossref","unstructured":"Meng, Z., Morizumi, T., Miyata, S. & Kinoshita, H. (2018, July). Design scheme of copyright management system based on digital watermarking and blockchain. InProceedings of IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC)(pp. 359\u2013364). IEEE.","DOI":"10.1109\/COMPSAC.2018.10258"},{"key":"CIT0026","unstructured":"Nakamoto, S. (March 2009).Bitcoin: A peer-to-peer electronic cash system. http:\/\/bitcoin.org\/bitcoin.pdf."},{"volume-title":"Bitcoin and cryptocurrency technologies","year":"2016","author":"Narayanan A.","key":"CIT0027"},{"key":"CIT0028","doi-asserted-by":"crossref","unstructured":"Ng, W. & Lau, H.L. (2005). Effective approaches for watermarking xml data. In L. Zhou, B. C. Ooi, & X. Meng (Eds.),Database systems for advanced applications(pp. 68\u201380). Springer.","DOI":"10.1007\/11408079_9"},{"key":"CIT0029","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2812239"},{"key":"CIT0030","doi-asserted-by":"crossref","unstructured":"Oh, H. O., Seok, J. W., Hong, J. W. & Youn, D. H. (2001). New echo embedding technique for robust and imperceptible audio watermarking. In2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221)(Vol. 3, pp. 1341\u20131344). IEEE.","DOI":"10.1109\/ICASSP.2001.941176"},{"key":"CIT0031","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.10.009"},{"key":"CIT0032","doi-asserted-by":"crossref","unstructured":"Pilkington, M. (2016). Blockchain technology: Principles and applications. In F. Xavier Olleros & M. Zhegu (Eds.),Handbook of research on digital transformations. Edward Elgar.","DOI":"10.4337\/9781784717766.00019"},{"key":"CIT0033","unstructured":"Produit, B. (2018). Using blockchain technology in distributed storage systems."},{"key":"CIT0034","doi-asserted-by":"crossref","unstructured":"Ramachandran, G. S., Radhakrishnan, R. & Krishnamachari, B. (2018). Towards a decentralized data marketplace for smart cities. In2018 IEEE International Smart Cities Conference (ISC2)(pp. 1\u20138). IEEE.","DOI":"10.1109\/ISC2.2018.8656952"},{"key":"CIT0035","doi-asserted-by":"publisher","DOI":"10.3390\/app9112343"},{"key":"CIT0036","doi-asserted-by":"crossref","unstructured":"Sahoo, S., Roshan, R., Singh, V. & Halder, R. (2020). Bdmark: A blockchain-driven approach to big data watermarking. In P. Sitek, M. Pietranik, M. Kr\u00f3tkiewicz, & C. Srinilta (Eds.),Intelligent information and database systems(pp. 71\u201384). Springer.","DOI":"10.1007\/978-981-15-3380-8_7"},{"key":"CIT0037","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-019-03924-5"},{"key":"CIT0038","doi-asserted-by":"crossref","unstructured":"Terzo, O., Ruiu, P., Bucci, E. & Xhafa, F. (July 2013). Data as a service (daas) for sharing and processing of large data collections in the cloud. InProceedings of Seventh International Conference on Complex, Intelligent, and Software Intensive Systems(pp. 475\u2013480). IEEE.","DOI":"10.1109\/CISIS.2013.87"},{"key":"CIT0039","doi-asserted-by":"crossref","unstructured":"Truex, S., Baracaldo, N., Anwar, A., Steinke, T., Ludwig, H. & Zhang, R. (2018). A hybrid approach to privacy-preserving federated learning.CoRR, abs\/1812.03224.","DOI":"10.1145\/3338501.3357370"},{"key":"CIT0040","unstructured":"Tsilidou, A. & Foroglou, G. (May 2015). Further applications of the blockchain. InProceedings of 12th Student Conference on Managerial Science and Technology."},{"key":"CIT0041","doi-asserted-by":"crossref","unstructured":"Wangming, Y. (November 2017). The digital watermarking algorithm based on the big data algebra graoh. InProceedings of International Conference on Robots & Intelligent System(pp. 342\u2013345). IEEE.","DOI":"10.1109\/ICRIS.2017.92"},{"key":"CIT0042","doi-asserted-by":"crossref","unstructured":"Yang, J., Wang, H., Wang, Z., Long, J. & Du, B. (2018, December 11\u201313). BDCP: A framework for big data copyright protection based on digital watermarking.11th International Conference and Satellite Workshops, SpaCCS 2018, Melbourne, NSW, Australia (pp. 351\u2013360). https:\/\/doi.org\/10.1007\/978-3-030-05345-1_30","DOI":"10.1007\/978-3-030-05345-1_30"},{"key":"CIT0043","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2847705"},{"key":"CIT0044","doi-asserted-by":"crossref","unstructured":"Zhao, S. & O'Mahony, D. (December 2018). Bmcprotector: A blockchain and smart contract based application for music copyright protection. InProceedings of International Conference on Blockchain Technology and Application(pp. 1\u20135). ACM.","DOI":"10.1145\/3301403.3301404"},{"key":"CIT0045","doi-asserted-by":"crossref","unstructured":"Zheng, Q., Li, Y., Chen, P. & Dong, X. (December 2018). An innovative ipfs-based storage model for blockchain. In2018 IEEE\/WIC\/ACM International Conference on Web Intelligence (WI)(pp. 704\u2013708). IEEE.","DOI":"10.1109\/WI.2018.000-8"}],"container-title":["Journal of Information and Telecommunication"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/24751839.2020.1819634","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,15]],"date-time":"2024-08-15T02:24:15Z","timestamp":1723688655000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/24751839.2020.1819634"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,29]]},"references-count":45,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1,2]]}},"alternative-id":["10.1080\/24751839.2020.1819634"],"URL":"https:\/\/doi.org\/10.1080\/24751839.2020.1819634","relation":{},"ISSN":["2475-1839","2475-1847"],"issn-type":[{"type":"print","value":"2475-1839"},{"type":"electronic","value":"2475-1847"}],"subject":[],"published":{"date-parts":[[2020,9,29]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tjit20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tjit20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2020-06-15","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-09-02","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-09-29","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}