{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T23:13:32Z","timestamp":1768000412879,"version":"3.49.0"},"reference-count":38,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"7","license":[{"start":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T00:00:00Z","timestamp":1743465600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T00:00:00Z","timestamp":1743465600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T00:00:00Z","timestamp":1743465600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100018537","name":"National Science and Technology Major Project","doi-asserted-by":"publisher","award":["2022ZD0116800"],"award-info":[{"award-number":["2022ZD0116800"]}],"id":[{"id":"10.13039\/501100018537","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Taishan Scholars Program","award":["TSQN202211214"],"award-info":[{"award-number":["TSQN202211214"]}]},{"name":"Shandong Excellent Young Scientists Fund Program","award":["2023HWYQ-113"],"award-info":[{"award-number":["2023HWYQ-113"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2025,4,1]]},"DOI":"10.1109\/jiot.2025.3530247","type":"journal-article","created":{"date-parts":[[2025,1,16]],"date-time":"2025-01-16T18:44:25Z","timestamp":1737053065000},"page":"7778-7792","source":"Crossref","is-referenced-by-count":8,"title":["An Optimized Privacy-Utility Tradeoff Framework for Differentially Private Data Sharing in Blockchain-Based Internet of Things"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3873-5232","authenticated-orcid":false,"given":"Muhammad","family":"Islam","sequence":"first","affiliation":[{"name":"Department of Computing Technologies, Swinburne University of Technology, Melbourne, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3565-7390","authenticated-orcid":false,"given":"Mubashir Husain","family":"Rehmani","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Munster Technological University, Cork, Ireland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3026-7537","authenticated-orcid":false,"given":"Longxiang","family":"Gao","sequence":"additional","affiliation":[{"name":"Key Laboratory of Computing Power Network and Information Security, Ministry of Education, Shandong Computer Science Center, the Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing, and the Shandong Fundamental Research Center for Computer Science, Qilu University of Technology (Shandong Academy of Sciences), Jinan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1677-9525","authenticated-orcid":false,"given":"Jinjun","family":"Chen","sequence":"additional","affiliation":[{"name":"Department of Computing Technologies, Swinburne University of Technology, Melbourne, VIC, Australia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2962586"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2020.2981511"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2843802"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2019.2934991"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2978770"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2878658"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.40"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2020.2965234"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2017.2697856"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2023.3236900"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3145845"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SP54263.2024.00108"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79228-4_1"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3052978"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2017.2701817"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3411495.3421352"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2017.2777968"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2903658"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488825"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2021.3084251"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3205643"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.102481"},{"key":"ref23","volume-title":"A peer-to-peer electronic cash system","author":"Nakamoto","year":"2008"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.8285"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2020.2963840"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3577926"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.8287"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3058209"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.8257"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835868"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2015.2425798"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"192","DOI":"10.1016\/j.comcom.2021.04.006","article-title":"PPaas: Privacy preservation as a service","volume":"173","author":"Chamikara","year":"2021","journal-title":"Comput. Commun."},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1561\/9781601988195"},{"key":"ref34","volume-title":"Hyperledger-fabricdocs documentation","year":"2024"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/1989323.1989348"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/11787006_1"},{"key":"ref37","volume-title":"Adult data","year":"2022"},{"key":"ref38","volume-title":"Hyperledger caliper","year":"2024"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6488907\/10939020\/10843378.pdf?arnumber=10843378","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,29]],"date-time":"2025-03-29T04:04:24Z","timestamp":1743221064000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10843378\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,1]]},"references-count":38,"journal-issue":{"issue":"7"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2025.3530247","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,4,1]]}}}