{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T14:46:30Z","timestamp":1777128390596,"version":"3.51.4"},"reference-count":54,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,11,26]],"date-time":"2024-11-26T00:00:00Z","timestamp":1732579200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,11,26]],"date-time":"2024-11-26T00:00:00Z","timestamp":1732579200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001321","name":"National Research Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001321","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,11,26]]},"DOI":"10.1109\/bcca62388.2024.10844495","type":"proceedings-article","created":{"date-parts":[[2025,1,22]],"date-time":"2025-01-22T18:46:32Z","timestamp":1737571592000},"page":"597-604","source":"Crossref","is-referenced-by-count":4,"title":["PDaaS: A Personal Data-as-a-Service Platform using Permissioned Blockchain and IPFS"],"prefix":"10.1109","author":[{"given":"Mpyana Mwamba","family":"Merlec","sequence":"first","affiliation":[{"name":"Korea University,Computer Science and Eng.,Seoul,South Korea"}]},{"given":"Nday Kabulo","family":"Sinai","sequence":"additional","affiliation":[{"name":"Korea University,Computer Science and Eng.,Seoul,South Korea"}]},{"given":"Seng-Phil","family":"Hong","sequence":"additional","affiliation":[{"name":"Hanshin University,School of Computing and AI,Seoul,South Korea"}]},{"given":"Hoh Peter","family":"In","sequence":"additional","affiliation":[{"name":"Korea University DAO Solution, Inc.,Seoul,South Korea"}]}],"member":"263","reference":[{"issue":"11","key":"ref1","first-page":"25","article-title":"Data as a service (Daas) in cloud computing [data-as-a-service in the age of data]","volume":"12","author":"Rajesh","year":"2012","journal-title":"Global journal of computer science and technology"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2012.91"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CISIS.2013.87"},{"key":"ref4","article-title":"Data-as-a-service: the Next Step in the As-a-service Journey","volume-title":"Oracle Open World Conference","author":"Pringle"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-1627-1_48"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1002\/9781119055143"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCRI.2015.34"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.5220\/0010470702780285"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.2196\/resprot.6589"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12051237"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2017.2757942"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.5220\/0007787801870197"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MT-ITS49943.2021.9529322"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2022.12.090"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/APSCC.2009.5394136"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2014.73"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpubeco.2019.02.001"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3009876"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.3390\/s21237994"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.21552\/edpl\/2016\/3\/4"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2941905"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2019.8935049"},{"key":"ref23","article-title":"BPDIMS: A blockchain-based personal data and identity management system","volume-title":"52nd Hawaii Intl. Conf. on System Sciences (HICSS)","author":"Benedict"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.3002823"},{"key":"ref25","first-page":"2469","article-title":"Droplet: Decentralized authorization and access control for encrypted data streams","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Shafagh"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/SCC55611.2022.00021"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2948287"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2022.07.014"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.3390\/s24061896"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-3783-4_19"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/IOTM.001.2100148"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.3390\/s22031271"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/DAPPS55202.2022.00016"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.bcra.2021.100026"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/SCC55611.2022.00054"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2019.2895123"},{"key":"ref37","article-title":"IPFS-content addressed versioned P2P file system","author":"Benet","year":"2014"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2022.3209804"},{"key":"ref39","volume-title":"Decentralized Identifiers (DIDs) v1.0: Core architecture, data model, and representations","author":"Sporny","year":"2022"},{"key":"ref40","volume-title":"Verifiable Credentials Data Model v1.1","author":"Sporny","year":"2022"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3302691"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1002\/9781119836728.ch8"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3372804"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-024-04272-6"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-023-32701-6"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2014.2363474"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.46586\/tosc.v2019.i2.55-93"},{"issue":"3","key":"ref48","first-page":"1","article-title":"A review of artificial intelligence big data and blockchain technology applications in medicine and global health","volume":"5","author":"Supriyaand","year":"2021","journal-title":"Big Data and Cognitive Comp"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2020.102199"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-021-00729-z"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC58733.2023.10393600"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/LT.2018.8368494"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2306328"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2876600"}],"event":{"name":"2024 6th International Conference on Blockchain Computing and Applications (BCCA)","location":"Dubai, United Arab Emirates","start":{"date-parts":[[2024,11,26]]},"end":{"date-parts":[[2024,11,29]]}},"container-title":["2024 6th International Conference on Blockchain Computing and Applications (BCCA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10844360\/10844378\/10844495.pdf?arnumber=10844495","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,23]],"date-time":"2025-01-23T06:46:47Z","timestamp":1737614807000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10844495\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,26]]},"references-count":54,"URL":"https:\/\/doi.org\/10.1109\/bcca62388.2024.10844495","relation":{},"subject":[],"published":{"date-parts":[[2024,11,26]]}}}