{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:53:00Z","timestamp":1762005180483,"version":"3.41.2"},"reference-count":24,"publisher":"Emerald","issue":"5","license":[{"start":{"date-parts":[[2019,9,17]],"date-time":"2019-09-17T00:00:00Z","timestamp":1568678400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["EL"],"published-print":{"date-parts":[[2019,11,18]]},"abstract":"<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title>\n<jats:p>The purpose of this paper is to propose a trusted security zone architecture that uses a blockchain technology to provide secure sharing of data in the security zone while maintaining the integrity, confidentiality and availability of data. The blockchain uses a distributed network to ensure data availability and uses public ledgers to ensure the integrity and confidentiality of data.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title>\n<jats:p>The proposed architecture uses a blockchain technology to provide secure sharing of data in the security zone while maintaining the integrity, confidentiality and availability of data. The blockchain uses a distributed network to ensure data availability and uses public ledgers to ensure the integrity and confidentiality of data.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Findings<\/jats:title>\n<jats:p>Analysis of the proposed architecture with a use case scenario demonstrates that it provides a robust security measure against unauthorized network intrusions.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title>\n<jats:p>Unlike the existing security zone, this paper adopts a method of storing data by using blockchain. It meets the need to study integrated authentication management methods of future research.<\/jats:p>\n<\/jats:sec>","DOI":"10.1108\/el-02-2019-0053","type":"journal-article","created":{"date-parts":[[2019,12,3]],"date-time":"2019-12-03T06:55:28Z","timestamp":1575356128000},"page":"796-810","source":"Crossref","is-referenced-by-count":8,"title":["A blockchain-based trusted security zone architecture"],"prefix":"10.1108","volume":"37","author":[{"given":"Jeong Hoon","family":"Jo","sequence":"first","affiliation":[]},{"given":"Shailendra","family":"Rathore","sequence":"additional","affiliation":[]},{"given":"Vincenzo","family":"Loia","sequence":"additional","affiliation":[]},{"given":"Jong Hyuk","family":"Park","sequence":"additional","affiliation":[]}],"member":"140","published-online":{"date-parts":[[2019,9,17]]},"reference":[{"issue":"3","key":"key2021102914413466000_ref001","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1007\/s10610-017-9341-6","article-title":"The value of CCTV surveillance cameras as an investigative tool: an empirical analysis","volume":"23","year":"2017","journal-title":"European Journal on Criminal Policy and Research"},{"first-page":"1","volume-title":"Efficient Zero-Knowledge Proof Systems","year":"2016","key":"key2021102914413466000_ref002"},{"key":"key2021102914413466000_ref003","unstructured":"CoinLore (2019), \u201cCryptocurrency list\u201d, available at: www.coinlore.com\/all_coins"},{"volume-title":"Assessing the Impact of CCTV","year":"2005","key":"key2021102914413466000_ref004"},{"issue":"1","key":"key2021102914413466000_ref005","article-title":"PLC-based design of monitoring system for ICT-integrated vertical fish farm","volume":"7","year":"2017","journal-title":"Human-Centric Computing and Information Sciences"},{"issue":"6","key":"key2021102914413466000_ref006","article-title":"A survey on cyber physical system security for IoT: issues, challenges, threats, solutions","volume":"14","year":"2018","journal-title":"Journal of Information Processing Systems"},{"key":"key2021102914413466000_ref01b","doi-asserted-by":"publisher","first-page":"484","DOI":"10.1109\/SCM.2016.7519820","article-title":"Event correlation in the integrated cyber-physical security system","volume-title":"2016 XIX IEEE International Conference on Soft Computing and Measurements (SCM)","year":"2016"},{"issue":"5","key":"key2021102914413466000_ref007","doi-asserted-by":"crossref","first-page":"164","DOI":"10.4236\/jcc.2015.35021","article-title":"Internet of things (IoT): a literature review","volume":"03","year":"2015","journal-title":"Journal of Computer and Communications"},{"issue":"6","key":"key2021102914413466000_ref008","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1109\/MSEC.2018.2875324","article-title":"NIZKCTF: a noninteractive zero-knowledge capture-the-flag platform","volume":"16","year":"2018","journal-title":"IEEE Security and Privacy"},{"issue":"1","key":"key2021102914413466000_ref009","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1109\/JPROC.2011.2161428","article-title":"Cyber-physical security of a smart grid infrastructure","volume":"100","year":"2012","journal-title":"Proceedings of the IEEE"},{"year":"2008","key":"key2021102914413466000_ref010","article-title":"Bitcoin: a peer-to-peer electronic cash system"},{"key":"key2021102914413466000_ref011","unstructured":"Pettey, C. (2017), available at: www.gartner.com\/en\/newsroom\/press-releases\/2017-10-04-gartner-identifies-the-top-10-strategic-technology-trends-for-2018"},{"issue":"2","key":"key2021102914413466000_ref012","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1109\/TII.2016.2612645","article-title":"Multi-agent approach for enhancing security of protection schemes in cyber-physical energy systems","volume":"13","year":"2017","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"key2021102914413466000_ref013","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1016\/j.asoc.2018.05.049","article-title":"Semi-supervised learning based distributed attack detection framework for IoT","volume":"72","year":"2018","journal-title":"Applied Soft Computing"},{"key":"key2021102914413466000_ref014","doi-asserted-by":"crossref","first-page":"688","DOI":"10.1109\/ACCESS.2017.2774837","article-title":"A hesitant fuzzy based security approach for fog and mobile-edge computing","volume":"6","year":"2018","journal-title":"IEEE Access"},{"key":"key2021102914413466000_ref015","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1016\/j.ins.2017.08.063","article-title":"Social network security: issues, challenges, threats, and solutions","volume":"421","year":"2017","journal-title":"Information Sciences"},{"issue":"4","key":"key2021102914413466000_ref016","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1109\/MCE.2018.2816745","article-title":"DistArch-SCNet: blockchain-based distributed architecture with li-fi communication for a scalable smart city network","volume":"7","year":"2018","journal-title":"IEEE Consumer Electronics Magazine"},{"issue":"12","key":"key2021102914413466000_ref017","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1109\/MCOM.2018.1700822","article-title":"SoftEdgeNet: SDN based energy-efficient distributed network architecture for edge computing","volume":"56","year":"2018","journal-title":"IEEE Communications Magazine"},{"issue":"3","key":"key2021102914413466000_ref01a","doi-asserted-by":"publisher","first-page":"466","DOI":"10.1109\/TDSC.2016.2599880","article-title":"On the interplay between cyber and physical spaces for adaptive security","volume":"15","year":"2018","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"key2021102914413466000_ref018","first-page":"557","article-title":"An overview of blockchain technology: Architecture, consensus, and future trends","volume-title":"IEEE international congress on big data (BigData congress)","year":"2017"},{"issue":"1","key":"key2021102914413466000_ref019","article-title":"Time evolution of face recognition in accessible scenarios","volume":"5","year":"2015","journal-title":"Human-Centric Computing and Information Sciences"},{"issue":"5","key":"key2021102914413466000_ref020","doi-asserted-by":"crossref","first-page":"4257","DOI":"10.1109\/TIE.2017.2772190","article-title":"Anomaly detection based on zone partition for security protection of industrial cyber-physical systems","volume":"65","year":"2018","journal-title":"Ieee Transactions on Industrial Electronics"},{"issue":"8","key":"key2021102914413466000_ref022","first-page":"3690","article-title":"Consortium blockchain for secure energy trading in industrial internet of things","volume":"14","year":"2018","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"1","key":"key2021102914413466000_ref023","first-page":"184","article-title":"Block-VN: a distributed blockchain based vehicular network architecture in smart city","volume":"13","year":"2017","journal-title":"JIPS"}],"container-title":["The Electronic Library"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/EL-02-2019-0053\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/EL-02-2019-0053\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T01:06:47Z","timestamp":1753405607000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/el\/article\/37\/5\/796-810\/242727"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,17]]},"references-count":24,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2019,9,17]]},"published-print":{"date-parts":[[2019,11,18]]}},"alternative-id":["10.1108\/EL-02-2019-0053"],"URL":"https:\/\/doi.org\/10.1108\/el-02-2019-0053","relation":{},"ISSN":["0264-0473","0264-0473"],"issn-type":[{"type":"print","value":"0264-0473"},{"type":"print","value":"0264-0473"}],"subject":[],"published":{"date-parts":[[2019,9,17]]}}}