{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,27]],"date-time":"2025-12-27T03:44:49Z","timestamp":1766807089043,"version":"3.41.0"},"reference-count":42,"publisher":"Association for Computing Machinery (ACM)","issue":"6","license":[{"start":{"date-parts":[[2024,3,8]],"date-time":"2024-03-08T00:00:00Z","timestamp":1709856000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2022YFB2703303"],"award-info":[{"award-number":["2022YFB2703303"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62122032"],"award-info":[{"award-number":["62122032"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Aeronautical Science Foundation of China","award":["2022Z0660M1001"],"award-info":[{"award-number":["2022Z0660M1001"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Multimedia Comput. Commun. Appl."],"published-print":{"date-parts":[[2024,6,30]]},"abstract":"<jats:p>With the development of the Internet of Things (IoT) and cloud computing, various multimedia data such as audio, video, and images have experienced explosive growth, ushering in the era of big data. Large-scale computing tasks in the Multimedia Internet of Things (M-IoT), such as mathematical optimization problems, have begun to be outsourced from IoT devices with limited computing power to cloud servers for execution. However, outsourcing computation brings security concerns, because the behaviors of clouds are invisible to users. The leakage of privacy data in outsourced optimization problems leads to immeasurable losses. The mutual distrust between clouds and users causes that the correctness of the optimal decisions and the fairness of the payment activities are not guaranteed. Blockchain technology has the characteristic of immutability and has become a new security paradigm for eliminating multi-party trust concerns. In this article, we propose a Bitcoin-based secure outsourcing scheme to address the aforementioned security concerns. To prevent confidential data leakage, the proposed scheme designs a computable privacy-preserving method for the outsourced optimization problems. To judge the correctness of the optimal decision and reduce verification costs, the proposed scheme designs a low-cost two-layer verification mechanism based on dual theory and blockchain technology. Blockchain nodes reach a consensus on the problem solutions and trigger an automatic fair payment protocol-based Bitcoin. Security analysis and experimental results demonstrate that our scheme guarantees privacy, fairness, and computational efficiency.<\/jats:p>","DOI":"10.1145\/3637489","type":"journal-article","created":{"date-parts":[[2023,12,19]],"date-time":"2023-12-19T11:51:17Z","timestamp":1702986677000},"page":"1-23","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["A Bitcoin-based Secure Outsourcing Scheme for Optimization Problem in Multimedia Internet of Things"],"prefix":"10.1145","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0046-5994","authenticated-orcid":false,"given":"Wenyuan","family":"Yang","sequence":"first","affiliation":[{"name":"Sun Yat-sen University, Shenzhen, Guangdong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4542-9719","authenticated-orcid":false,"given":"Shaocong","family":"Wu","sequence":"additional","affiliation":[{"name":"Xi\u2019an Jiaotong University, Xi\u2019an, Shaanxi, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1243-3909","authenticated-orcid":false,"given":"Jianwei","family":"Fei","sequence":"additional","affiliation":[{"name":"School of Computer, Nanjing University of Information Science and Technology, Nanjing, Jiangsu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9565-6819","authenticated-orcid":false,"given":"Xianwang","family":"Zeng","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China, Chengdu, Sichuan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7697-2197","authenticated-orcid":false,"given":"Yuemin","family":"Ding","sequence":"additional","affiliation":[{"name":"Tecnun School of Engineering, University of Navarra, Guip\u00fazcoa, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6860-647X","authenticated-orcid":false,"given":"Zhihua","family":"Xia","sequence":"additional","affiliation":[{"name":"Jinan University, College of Cyber Security, Guangzhou, Guangdong, China"}]}],"member":"320","published-online":{"date-parts":[[2024,3,8]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICBDS53701.2022.9935975"},{"key":"e_1_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCC56324.2022.10065644"},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.3390\/s19020326"},{"issue":"3","key":"e_1_3_1_5_2","first-page":"1","article-title":"Privacy protection for medical data sharing in smart healthcare","volume":"16","author":"Fang Liming","year":"2020","unstructured":"Liming Fang, Changchun Yin, Juncen Zhu, Chunpeng Ge, Muhammad Tanveer, Alireza Jolfaei, and Zehong Cao. 2020. Privacy protection for medical data sharing in smart healthcare. ACM Trans. Multim. Comput., Commun. Applic. 16, 3 (2020), 1\u201318.","journal-title":"ACM Trans. Multim. Comput., Commun. Applic."},{"key":"e_1_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-017-9410-9"},{"key":"e_1_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC51644.2023.10059690"},{"key":"e_1_3_1_8_2","doi-asserted-by":"crossref","unstructured":"Chunpeng Ge Zhe Liu Willy Susilo Liming Fang and Hao Wang. 2023. Attribute-based encryption with reliable outsourced decryption in cloud computing using smart contract. IEEE Transactions on Dependable and Secure Computing (2023) 1\u201312.","DOI":"10.1109\/TDSC.2023.3265932"},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14623-7_25"},{"key":"e_1_3_1_10_2","volume-title":"A Fully Homomorphic Encryption Scheme","author":"Gentry Craig","year":"2009","unstructured":"Craig Gentry. 2009. A Fully Homomorphic Encryption Scheme. Stanford University."},{"key":"e_1_3_1_11_2","doi-asserted-by":"crossref","unstructured":"Yogita and Neetesh Kumar Gupta. 2020. Integrity auditing with attribute based ECMRSA algorithm for cloud data outsourcing. In Proceedings of International Conference on Intelligent Sustainable Systems. 1284\u20131289.","DOI":"10.1109\/ICISS49785.2020.9315948"},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2019.2939373"},{"key":"e_1_3_1_13_2","doi-asserted-by":"crossref","unstructured":"Abdullah Ayub Khan Asif Ali Laghari Zaffar Ahmed Shaikh Zdzislawa Dacko-Pikiewicz and Sebastian Kot. 2022. Internet of Things (IoT) security with blockchain technology: A state-of-the-art review. IEEE Access 10 (2022) 122679\u2013122695.","DOI":"10.1109\/ACCESS.2022.3223370"},{"key":"e_1_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/IDCIoT56793.2023.10053430"},{"key":"e_1_3_1_15_2","volume-title":"Introduction to Algorithms","author":"Leiserson Charles Eric","year":"1994","unstructured":"Charles Eric Leiserson, Ronald L. Rivest, Thomas H. Cormen, and Clifford Stein. 1994. Introduction to Algorithms. Vol. 3. MIT Press Cambridge, MA."},{"issue":"3","key":"e_1_3_1_16_2","first-page":"1","article-title":"Fog-based secure service discovery for internet of multimedia things: A cross-blockchain approach","volume":"16","author":"Liang Haoran","year":"2020","unstructured":"Haoran Liang, Jun Wu, Xi Zheng, Mengshi Zhang, Jianhua Li, and Alireza Jolfaei. 2020. Fog-based secure service discovery for internet of multimedia things: A cross-blockchain approach. ACM Trans. Multim. Comput., Commun. Applic. 16, 3 (2020), 1\u201323.","journal-title":"ACM Trans. Multim. Comput., Commun. Applic."},{"key":"e_1_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2017.09.008"},{"key":"e_1_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3073818"},{"key":"e_1_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1145\/3343031.3350999"},{"key":"e_1_3_1_20_2","doi-asserted-by":"crossref","unstructured":"David G. Luenberger and Ye Yinyu. 2008. Linear and Nonlinear Programming. Vol. 116 Springer.","DOI":"10.1007\/978-0-387-74503-9"},{"key":"e_1_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2964280"},{"key":"e_1_3_1_22_2","doi-asserted-by":"crossref","unstructured":"Haixin Nie Xiaofeng Chen Jin Li Josolph Liu and Wenjing Lou. 2014. Efficient and verifiable algorithm for secure outsourcing of large-scale linear programming. In Proceedings of IEEE International Conference on Advanced Information Networking and Applications. 591\u2013596.","DOI":"10.1109\/AINA.2014.147"},{"key":"e_1_3_1_23_2","first-page":"25","volume-title":"Proceedings of the International Conference on Selected Areas in Cryptography","author":"Paindavoine Marie","year":"2015","unstructured":"Marie Paindavoine and Bastien Vialla. 2015. Minimizing the number of bootstrappings in fully homomorphic encryption. In Proceedings of the International Conference on Selected Areas in Cryptography. Springer, 25\u201343."},{"key":"e_1_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2010.66"},{"key":"e_1_3_1_25_2","first-page":"344","volume-title":"Proceedings of the International Convention MIPRO","author":"Popovi\u0107 Kre\u0161imir","year":"2010","unstructured":"Kre\u0161imir Popovi\u0107 and \u017deljko Hocenski. 2010. Cloud computing security issues and challenges. In Proceedings of the International Convention MIPRO. 344\u2013349."},{"issue":"4","key":"e_1_3_1_26_2","first-page":"1","article-title":"SecSIFT: Secure image SIFT feature extraction in cloud computing","volume":"12","author":"Qin Zhan","year":"2016","unstructured":"Zhan Qin, Jingbo Yan, Kui Ren, Chang Wen Chen, and Cong Wang. 2016. SecSIFT: Secure image SIFT feature extraction in cloud computing. ACM Trans. Multim. Comput., Commun. Applic. 12, 4 (2016), 1\u201324.","journal-title":"ACM Trans. Multim. Comput., Commun. Applic."},{"key":"e_1_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jii.2022.100408"},{"key":"e_1_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1145\/3338533.3366608"},{"key":"e_1_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.3390\/s20020539"},{"key":"e_1_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.1145\/3325194"},{"key":"e_1_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1145\/3158363"},{"key":"e_1_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1145\/3380743"},{"key":"e_1_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3164081"},{"key":"e_1_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2417542"},{"key":"e_1_3_1_35_2","first-page":"185","volume-title":"Proceedings of the International Conference on Wireless Communication and Network Engineering DEStech Transactions on Computer Science and Engineering","author":"Wang Zhi-kuan","year":"2017","unstructured":"Zhi-kuan Wang and Liu Yang. 2017. Secure outsourcing of large-scale linear programming. In Proceedings of the International Conference on Wireless Communication and Network Engineering DEStech Transactions on Computer Science and Engineering. 185\u2013190."},{"issue":"1","key":"e_1_3_1_36_2","first-page":"1","article-title":"BMIF: Privacy-preserving blockchain-based medical image fusion","volume":"19","author":"Xiang Tao","year":"2023","unstructured":"Tao Xiang, Honghong Zeng, Biwen Chen, and Shangwei Guo. 2023. BMIF: Privacy-preserving blockchain-based medical image fusion. ACM Trans. Multim. Comput., Commun. Applic. 19, 1 (2023), 1\u201323.","journal-title":"ACM Trans. Multim. Comput., Commun. Applic."},{"key":"e_1_3_1_37_2","doi-asserted-by":"publisher","DOI":"10.1145\/3123266.3123339"},{"key":"e_1_3_1_38_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.compag.2022.107493"},{"key":"e_1_3_1_39_2","doi-asserted-by":"publisher","DOI":"10.1145\/3425636"},{"key":"e_1_3_1_40_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3001728"},{"key":"e_1_3_1_41_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2018.2864191"},{"key":"e_1_3_1_42_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2021.3068195"},{"key":"e_1_3_1_43_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3261560"}],"container-title":["ACM Transactions on Multimedia Computing, Communications, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3637489","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3637489","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:03:25Z","timestamp":1750291405000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3637489"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3,8]]},"references-count":42,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2024,6,30]]}},"alternative-id":["10.1145\/3637489"],"URL":"https:\/\/doi.org\/10.1145\/3637489","relation":{},"ISSN":["1551-6857","1551-6865"],"issn-type":[{"type":"print","value":"1551-6857"},{"type":"electronic","value":"1551-6865"}],"subject":[],"published":{"date-parts":[[2024,3,8]]},"assertion":[{"value":"2023-05-14","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-11-27","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-03-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}