{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T00:55:07Z","timestamp":1772585707366,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,3]],"date-time":"2023-11-03T00:00:00Z","timestamp":1698969600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,3]]},"DOI":"10.1145\/3640115.3640188","type":"proceedings-article","created":{"date-parts":[[2024,3,26]],"date-time":"2024-03-26T12:10:58Z","timestamp":1711455058000},"page":"447-454","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Consent Management System Based on User Data Security and Privacy Using Hyperledger Fabric Blockchain"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4420-0517","authenticated-orcid":false,"given":"Faisal","family":"Mehmood","sequence":"first","affiliation":[{"name":"School of Electronic and Computer Engineering, Peking University ShenZhen Graduate School, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-9335-5342","authenticated-orcid":false,"given":"Umara","family":"Khalid","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, Northwest University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9986-5052","authenticated-orcid":false,"given":"Shahid","family":"Karim","sequence":"additional","affiliation":[{"name":"Research &amp; Development Institute of Northwestern Polytechnical University, China"}]}],"member":"320","published-online":{"date-parts":[[2024,3,26]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Available online: https:\/\/www.gartner.com\/en\/information technology\/glossary\/consent-management (accessed on","year":"2020","unstructured":"\u201cConsent Management.\u201d Available online: https:\/\/www.gartner.com\/en\/information technology\/glossary\/consent-management (accessed on 12 June 2020). [Accessed: 12- June-2021]."},{"key":"e_1_3_2_1_2_1","unstructured":"\u201cWhat is Data Management?\u201d. Available online: https:\/\/www.ngdata.com\/what-is data-management\/. [Accessed: 06-June-2021]."},{"key":"e_1_3_2_1_3_1","unstructured":"\u201c5 things you need to know about Data Privacy.\u201d Available online: https:\/\/dataprivacymanager.net\/5-things-you-need-to-know-about-dataprivacy\/. [Accessed: 06-June-2021]."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/OBD.2016.11"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Liang X. Zhao J. Shetty S. Liu J. & Li D. (2017 October). Integrating blockchain for data sharing and collaboration in mobile healthcare applications. In 2017 IEEE 28th annual international symposium on personal indoor and mobile radio communications (PIMRC) (pp. 1-5). IEEE.","DOI":"10.1109\/PIMRC.2017.8292361"},{"key":"e_1_3_2_1_6_1","first-page":"1533","volume-title":"MediChain TM: a secure decentralized medical data asset management system. In 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications","author":"Rouhani S.","unstructured":"Rouhani, S., Butterworth, L., Simmons, A. D., Humphery, D. G., & Deters, R. (2018, July). MediChain TM: a secure decentralized medical data asset management system. In 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and 72 Social Computing (CPSCom) and IEEE Smart Data (SmartData) (pp. 1533-1538). IEEE."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLANT50963.2020.9355970"},{"key":"e_1_3_2_1_8_1","volume-title":"Permission-Based Blockchain with Proof of Authority for Secured Healthcare Data Sharing. In 2020 2nd International Conference on Advanced Information and Communication Technology (ICAICT) (pp. 35-40)","author":"Al Asad N.","year":"2020","unstructured":"Al Asad, N., Elahi, M. T., Al Hasan, A., & Yousuf, M. A. (2020, November). Permission-Based Blockchain with Proof of Authority for Secured Healthcare Data Sharing. In 2020 2nd International Conference on Advanced Information and Communication Technology (ICAICT) (pp. 35-40). IEEE."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2917976"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.4258\/hir.2020.26.4.265"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SMC42975.2020.9283203"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA.2016.7945805"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2799942"},{"key":"e_1_3_2_1_14_1","volume-title":"F. A Novel Entitlement-based Blockchain-enabled Security Architecture for IoT. In Proceedings of the 2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","author":"Sabrina","year":"2019","unstructured":"Sabrina, F. A Novel Entitlement-based Blockchain-enabled Security Architecture for IoT. In Proceedings of the 2019 29th International Telecommunication Networks and Applications Conference (ITNAC), Auckland, New Zealand, 27\u201329 November 2019."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/1431578"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2936094"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Chowdhury M.J.M.; Colman A.; Kabir M.A.; Han J.; Sarda P. Blockchain as a notarization service for data sharing with personal data store. In Proceedings of the 2018 17th IEEE International Conference on Trust Security and Privacy in Computing and Communications\/12th IEEE International Conference on Big Data Science and Engineering (TrustCom\/BigDataSE) New York NY USA 1\u20133 August 2018.","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00183"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.23919\/SpringSim.2019.8732913"},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the 2018 3rd International Conference on Smart and Sustainable Technologies (SpliTech)","author":"Alessi M.","year":"2018","unstructured":"Alessi, M.; Camillo, A.; Giangreco, E.; Matera, M.; Pino, S.; Storelli, D. Make users own their data: A decentralized personal data store prototype based on ethereum and 74 ipfs. In Proceedings of the 2018 3rd International Conference on Smart and Sustainable Technologies (SpliTech), Split, Croatia, 26\u201329 June 2018."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/BRAINS49436.2020.9223315"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICBC48266.2020.9169432"},{"key":"e_1_3_2_1_22_1","volume-title":"Design and Implementation of a Blockchain-based Consent Management System. arXiv preprint arXiv:1912.09882","author":"Aldred N.","year":"2019","unstructured":"Aldred, N., Baal, L., Broda, G., Trumble, S., & Mahmoud, Q. H. (2019). Design and Implementation of a Blockchain-based Consent Management System. arXiv preprint arXiv:1912.09882"},{"key":"e_1_3_2_1_23_1","volume-title":"The value and importance of health information Privacy","author":"Nass L.A.","year":"2009","unstructured":"S. J Nass, L.A. Levit. L.O. Gostin, and I.of M. (US) C. on H.R. and the P. of H.I.T.H.P. Rule, The value and importance of health information Privacy. National Academies Press (US), 2009."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190538"}],"event":{"name":"ICITEE 2023: 6th International Conference on Information Technologies and Electrical Engineering","location":"Changde, Hunan China","acronym":"ICITEE 2023"},"container-title":["Proceedings of the 6th International Conference on Information Technologies and Electrical Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3640115.3640188","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3640115.3640188","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T13:10:11Z","timestamp":1755868211000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3640115.3640188"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,3]]},"references-count":24,"alternative-id":["10.1145\/3640115.3640188","10.1145\/3640115"],"URL":"https:\/\/doi.org\/10.1145\/3640115.3640188","relation":{},"subject":[],"published":{"date-parts":[[2023,11,3]]},"assertion":[{"value":"2024-03-26","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}