{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T02:58:12Z","timestamp":1769569092582,"version":"3.49.0"},"reference-count":80,"publisher":"Association for Computing Machinery (ACM)","issue":"2","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Distrib. Ledger Technol."],"published-print":{"date-parts":[[2026,6,30]]},"abstract":"<jats:p>Every day, hundreds of gigabytes of data are produced due to the exponential growth of next-generation sequencing and omics technologies. By combining omics data with other data types, such as electronic health record data, panomics research is actively attempting to uncover novel and potentially useful biomarkers. For the effective analysis of high-throughput-derived omics data, it is imperative to establish robust and reliable platforms that prioritize ethical considerations while effectively managing privacy, ownership concerns, and the responsible sharing of data. The GenShare model was proposed to provide an efficient platform that fits these needs. GenShare is a hybrid platform that utilizes blockchain technology. Paillier\u2019s homomorphic encryption scheme in tandem with Intel Software Guard Extension (SGX) serves to enable the sharing of genomic data, execution of count queries, and statistical analysis of genomic data while preserving privacy and avoiding compromise of sensitive information. The objective of this paradigm is to confront security and privacy concerns through the integration of homomorphic encryption and SGX, addressing additional challenges associated with Hyperledger Fabric and Ethereum. In pursuit of this objective, the implementation of the system involved establishing the Hyperledger Fabric network, with various workloads employed to assess the network\u2019s efficiency. Consequently, it was hypothesized that the new GenShare model would enhance the data collection and dissemination cycle and serve as a proficient platform catering to the needs of its users.<\/jats:p>","DOI":"10.1145\/3743696","type":"journal-article","created":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T10:26:18Z","timestamp":1749723978000},"page":"1-21","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["GenShare: A Blockchain-Based Genomic Data Sharing Platform"],"prefix":"10.1145","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4983-2417","authenticated-orcid":false,"given":"Beyhan","family":"Adanur Dedeturk","sequence":"first","affiliation":[{"name":"Abdullah Gul University, Kayseri, Turkey"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0683-1836","authenticated-orcid":false,"given":"Ahmet","family":"Soran","sequence":"additional","affiliation":[{"name":"TRK Technology, Ankara, Turkey"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2272-6270","authenticated-orcid":false,"given":"Burcu","family":"Bakir-Gungor","sequence":"additional","affiliation":[{"name":"Abdullah Gul University, Kayseri, Turkey"}]}],"member":"320","published-online":{"date-parts":[[2026,1,27]]},"reference":[{"issue":"1","key":"e_1_3_1_2_2","doi-asserted-by":"crossref","first-page":"3","DOI":"10.14797\/mdcj-10-1-3","article-title":"Sequencing your genome: What does it mean","volume":"10","author":"Marian A. J.","year":"2014","unstructured":"A. J. Marian. 2014. Sequencing your genome: What does it mean? Methodist DeBakey Cardiovascular Journal 10, 1 (2017), 3\u20136.","journal-title":"Methodist DeBakey Cardiovascular Journal"},{"key":"e_1_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cell.2013.09.006"},{"issue":"7","key":"e_1_3_1_4_2","doi-asserted-by":"crossref","first-page":"476","DOI":"10.1038\/nrg2795","article-title":"Next-generation genomics: An integrative approach","volume":"11","author":"Hawkins R. David","year":"2010","unstructured":"R. David Hawkins, Gary C. Hon, and Bing Ren. 2010. Next-generation genomics: An integrative approach. Nature Reviews Genetics 11, 7 (2010), 476\u2013486.","journal-title":"Nature Reviews Genetics"},{"issue":"1","key":"e_1_3_1_5_2","first-page":"10","article-title":"Bioinformatics: An overview and its applications","volume":"16","author":"da Silva Diniz Wellison Jarles","year":"2017","unstructured":"Wellison Jarles da Silva Diniz and Fernanda Canduri. 2017. Bioinformatics: An overview and its applications. Genetics and Molecular Research 16, 1 (2017), 10\u201331.","journal-title":"Genetics and Molecular Research"},{"key":"e_1_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cell.2019.02.039"},{"issue":"5","key":"e_1_3_1_7_2","doi-asserted-by":"crossref","first-page":"e0177158","DOI":"10.1371\/journal.pone.0177158","article-title":"Open sharing of genomic data: Who does it and why","volume":"12","author":"Haeusermann Tobias","year":"2017","unstructured":"Tobias Haeusermann, Bastian Greshake, Alessandro Blasimme, Darja Irdam, Martin Richards, and Effy Vayena. 2017. Open sharing of genomic data: Who does it and why? PloS One 12, 5 (2017), e0177158.","journal-title":"PloS One"},{"key":"e_1_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1093\/biosci\/biy085"},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.3681048"},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1038\/s41436-019-0618-7"},{"key":"e_1_3_1_11_2","article-title":"Privacy and progress in whole genome sequencing","author":"Gutmann A.","year":"2012","unstructured":"A. Gutmann, J. Wagner, Y. Ali, A. L. Allen, J. D. Arras, B. F. Atkinson, and R. S. Kucherlapati. 2012. Privacy and progress in whole genome sequencing. Presidential Committee for the Study of Bioethical. Retrieved from https:\/\/bioethicsarchive.georgetown.edu\/pcsbi\/sites\/default\/files\/PrivacyProgress508.pdf","journal-title":"Presidential Committee for the Study of Bioethical"},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pbio.1002195"},{"key":"e_1_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0006"},{"key":"e_1_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/1368905"},{"key":"e_1_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2018.11.006"},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.csbj.2019.01.010"},{"key":"e_1_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.18632\/oncotarget.22345"},{"key":"e_1_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/3563044"},{"key":"e_1_3_1_19_2","unstructured":"genecoin.me. 2020. Genecoin. Retrieved January 12 2020 from http:\/\/genecoin.me\/"},{"issue":"1","key":"e_1_3_1_20_2","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1109\/TCBB.2018.2829760","article-title":"Safety: Secure GWAS in federated environment through a hybrid solution","volume":"16","author":"Sadat Md Nazmus","year":"2019","unstructured":"Md Nazmus Sadat, Md Momin Al Aziz, Noman Mohammed, Feng Chen, Xiaoqian Jiang, and Shuang Wang. 2019. Safety: Secure GWAS in federated environment through a hybrid solution. IEEE\/ACM Transactions on Computational Biology and Bioinformatics 16, 1 (2019), 93\u2013102.","journal-title":"IEEE\/ACM Transactions on Computational Biology and Bioinformatics"},{"key":"e_1_3_1_21_2","first-page":"1744","volume-title":"AMIA Annual Symposium Proceedings","volume":"2017","author":"Chenghong Wang","year":"2017","unstructured":"Wang Chenghong, Yichen Jiang, Noman Mohammed, Feng Chen, Xiaoqian Jiang, Md Momin Al Aziz, Md Nazmus Sadat, and Shuang Wang. 2017. SCOTCH: Secure counting of encrypted genomic data using a hybrid approach. In AMIA Annual Symposium Proceedings, Vol. 2017. American Medical Informatics Association, 1744."},{"issue":"6","key":"e_1_3_1_22_2","first-page":"871","article-title":"Princess: Privacy-protecting rare disease international network collaboration via encryption through software guard extensions","volume":"33","author":"Chen Feng","year":"2017","unstructured":"Feng Chen, Shuang Wang, Xiaoqian Jiang, Sijie Ding, Yao Lu, Jihoon Kim, S. Cenk Sahinalp, Chisato Shimizu, Jane C. Burns, Victoria J. Wright, et al. 2017. Princess: Privacy-protecting rare disease international network collaboration via encryption through software guard extensions. Bioinformatics (Oxford, England) 33, 6 (2017), 871\u2013878.","journal-title":"Bioinformatics (Oxford, England)"},{"key":"e_1_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/HealthCom.2018.8531136"},{"issue":"1","key":"e_1_3_1_24_2","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1093\/jamia\/ocy149","article-title":"Blockchain-based platforms for genomic data sharing: A de-centralized approach in response to the governance problems","volume":"26","author":"Shabani Mahsa","year":"2019","unstructured":"Mahsa Shabani. 2019. Blockchain-based platforms for genomic data sharing: A de-centralized approach in response to the governance problems? Journal of the American Medical Informatics Association 26, 1 (2019), 76\u201380.","journal-title":"Journal of the American Medical Informatics Association"},{"key":"e_1_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.30953\/bhty.v1.34"},{"key":"e_1_3_1_26_2","unstructured":"Ethereum Foundation. 2025. Home. Retrieved July 13 2025 from https:\/\/ethereum.org\/"},{"key":"e_1_3_1_27_2","unstructured":"Hyperledger Foundation. 2025. Hyperledger \u2013 Open source blockchain technologies. Retrieved July 13 2025 from https:\/\/www.hyperledger.org\/"},{"issue":"2","key":"e_1_3_1_28_2","doi-asserted-by":"crossref","first-page":"3:1","DOI":"10.1147\/JRD.2019.2913621","article-title":"Supporting private data on Hyperledger Fabric with secure multiparty computation","volume":"63","author":"Benhamouda Fabrice","year":"2019","unstructured":"Fabrice Benhamouda, Shai Halevi, and Tzipora Halevi. 2019. Supporting private data on Hyperledger Fabric with secure multiparty computation. IBM Journal of Research and Development 63, 2\/3 (2019), 3:1\u20133:8.","journal-title":"IBM Journal of Research and Development"},{"key":"e_1_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-5758-9_37"},{"key":"e_1_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.7717\/peerj.12130"},{"key":"e_1_3_1_31_2","unstructured":"Intel Corporation. 2025. Data center solutions IoT and PC innovation. Retrieved July 13 2025 from https:\/\/www.intel.com\/content\/www\/us\/en\/architecture-and-technology\/"},{"key":"e_1_3_1_32_2","doi-asserted-by":"crossref","unstructured":"Dylan Yaga Peter Mell Nik Roby and Karen Scarfone. 2019. Blockchain technology overview. arXiv:1906.11078. Retrieved from https:\/\/arxiv.org\/abs\/1906.11078","DOI":"10.6028\/NIST.IR.8202"},{"key":"e_1_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/MCSE.2017.3421554"},{"key":"e_1_3_1_34_2","unstructured":"F. Kaderali. 2007. Foundations and Applications of Cryptology. Doctoral Dissertation. Universit\u00e4t Erlangen-N\u00fcrnberg."},{"key":"e_1_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/SMC.2017.8123011"},{"key":"e_1_3_1_36_2","unstructured":"Karim Sultan Umar Ruhi and Rubina Lakhani. 2018. Conceptualizing blockchains: Characteristics & applications. arXiv:1806.03693. Retrieved from https:\/\/arxiv.org\/abs\/1806.03693"},{"key":"e_1_3_1_37_2","doi-asserted-by":"publisher","DOI":"10.1093\/jamia\/ocy185"},{"key":"e_1_3_1_38_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2018.10.004"},{"key":"e_1_3_1_39_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2019.2895123"},{"key":"e_1_3_1_40_2","doi-asserted-by":"publisher","DOI":"10.1101\/gr.207464.116"},{"key":"e_1_3_1_41_2","doi-asserted-by":"publisher","DOI":"10.3390\/healthcare7020056"},{"key":"e_1_3_1_42_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-30429-4_1"},{"issue":"1","key":"e_1_3_1_43_2","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1186\/s12916-019-1296-7","article-title":"\u2018Fit-for-purpose?\u2019\u2014Challenges and opportunities for applications of blockchain technology in the future of healthcare","volume":"17","author":"Mackey Tim K.","year":"2019","unstructured":"Tim K. Mackey, Tsung-Ting Kuo, Basker Gummadi, Kevin A. Clauson, George Church, Dennis Grishin, Kamal Obbad, Robert Barkovich, and Maria Palombini. 2019. \u2018Fit-for-purpose?\u2019\u2014Challenges and opportunities for applications of blockchain technology in the future of healthcare. BMC Medicine 17, 1 (2019), 68\u201317.","journal-title":"BMC Medicine"},{"key":"e_1_3_1_44_2","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btu561"},{"key":"e_1_3_1_45_2","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813725"},{"key":"e_1_3_1_46_2","doi-asserted-by":"crossref","unstructured":"Brian Hayes. 2012. Alice and bob in cipherspace. American Scientist 100 5 (2012) 362\u2013367.","DOI":"10.1511\/2012.98.362"},{"key":"e_1_3_1_47_2","doi-asserted-by":"publisher","unstructured":"Abbas Acar Hidayet Aksu A. Selcuk Uluagac and Mauro Conti. 2018. A survey on homomorphic encryption schemes: Theory and implementation. ACM Computing Surveys 51 4 (July 2018) Article 79 31\u201335. DOI: 10.1145\/3214303","DOI":"10.1145\/3214303"},{"key":"e_1_3_1_48_2","doi-asserted-by":"publisher","DOI":"10.1155\/2007\/13801"},{"issue":"7","key":"e_1_3_1_49_2","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1186\/s12920-020-0719-9","article-title":"Optimized homomorphic encryption solution for secure genome-wide association studies","volume":"13","author":"Blatt Marcelo","year":"2020","unstructured":"Marcelo Blatt, Alexander Gusev, Yuriy Polyakov, Kurt R. Rohloff, and Vinod Vaikuntanathan. 2020. Optimized homomorphic encryption solution for secure genome-wide association studies. BMC Medical Genomics 13, Suppl 7 (2020), 83.","journal-title":"BMC Medical Genomics"},{"key":"e_1_3_1_50_2","doi-asserted-by":"publisher","unstructured":"Kristin Lauter Adriana L\u00f3pez-Alt and Michael Naehrig. 2014. Private computation on encrypted genomic data. In Genomic Data Privacy. D. J. Balding I. Moln\u00e1r-Szakacs and J. D. Kelleher (Eds.) 3\u201327. Springer. DOI: 10.1007\/978-3-319-16295-9_1","DOI":"10.1007\/978-3-319-16295-9_1"},{"key":"e_1_3_1_51_2","doi-asserted-by":"publisher","DOI":"10.1145\/2517840.2517843"},{"key":"e_1_3_1_52_2","doi-asserted-by":"publisher","unstructured":"Masaya Yasuda Takeshi Shimoyama Jun Kogure Kazuhiro Yokoyama and Takeshi Koshiba. 2013. Secure pattern matching using somewhat homomorphic encryption. In Proceedings of the 2013 ACM Workshop on Cloud Computing Security Workshop. ACM 65\u201376. DOI: 10.1145\/2517488.2517497","DOI":"10.1145\/2517488.2517497"},{"key":"e_1_3_1_53_2","first-page":"20a8","article-title":"Fundamentals of fully homomorphic encryption\u2014A survey","volume":"25","author":"Brakerski Zvika","unstructured":"Zvika Brakerski. Fundamentals of fully homomorphic encryption\u2014A survey. In Electronic Colloquium on Computational Complexity 2018 (ECCC), Vol. 25, 20a8.","journal-title":"Electronic Colloquium on Computational Complexity 2018 (ECCC)"},{"key":"e_1_3_1_54_2","first-page":"85","volume-title":"2017 International Workshop on Managing Insider Security Threats","author":"Drucker Nir","year":"2017","unstructured":"Nir Drucker and Shay Gueron. 2017. Combining homomorphic encryption with trusted execution environment: A demonstration with Paillier encryption and SGX. In 2017 International Workshop on Managing Insider Security Threats, 85\u201388."},{"issue":"2","key":"e_1_3_1_55_2","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1186\/s12920-017-0281-2","article-title":"PRESAGE: Privacy-preserving genetic testing via software guard extension","volume":"10","author":"Chen Feng","year":"2017","unstructured":"Feng Chen, Chenghong Wang, Wenrui Dai, Xiaoqian Jiang, Noman Mohammed, Md Momin Al Aziz, Md Nazmus Sadat, Cenk Sahinalp, Kristin Lauter, and Shuang Wang. 2017. PRESAGE: Privacy-preserving genetic testing via software guard extension. BMC Medical Genomics 10, Suppl 2 (2017), 48\u201385.","journal-title":"BMC Medical Genomics"},{"key":"e_1_3_1_56_2","unstructured":"D. Grishin K. Obbad P. Estep M. Cifric Y. Zhao G. Church and Nebula Ganomics. 2018. Blockchain-Enabled Genomic Data Sharing and Analysis Platform. Retrieved May 22 2021 from https:\/\/arep.med.harvard.edu\/pdf\/Grishin_Church_v4.52_2018.pdf"},{"key":"e_1_3_1_57_2","volume-title":"European Conference on Service-Oriented and Cloud Computing3\u201315","author":"Eberhardt Jacob","year":"2017","unstructured":"Jacob Eberhardt and Stefan Tai. 2017. On or off the blockchain? Insights on off-chaining computation and data. In European Conference on Service-Oriented and Cloud Computing. Springer, 3\u201315."},{"key":"e_1_3_1_58_2","first-page":"30","volume-title":"Threshold Signatures for Blockchain Systems","author":"Stathakopoulous C.","year":"2017","unstructured":"C. Stathakopoulous and Christian Cachin. 2017. Threshold Signatures for Blockchain Systems. Swiss Federal Institute of Technology, 30."},{"key":"e_1_3_1_59_2","unstructured":"Apache Software Foundation. 2025. Home. Retrieved July 13 2025 from https:\/\/jmeter.apache.org\/"},{"key":"e_1_3_1_60_2","unstructured":"Hyperledger Performance Scale Working Group. 2018. Hyperledger Blockchain Performance Metrics. Whitepaper 1. Retrieved from https:\/\/www.hyperledger.org\/wpcontent\/uploads\/2018\/10\/HL_Whitepaper_Metrics_PDF_V1"},{"key":"e_1_3_1_61_2","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1109\/Blockchain.2019.00015","volume-title":"2019 IEEE International Conference on Blockchain (Blockchain)","author":"Guo Hao","year":"2019","unstructured":"Hao Guo, Wanxin Li, Mark Nejad, and Chien-Chung Shen. 2019. Access control for electronic health records with hybrid blockchain-edge architecture. In 2019 IEEE International Conference on Blockchain (Blockchain). IEEE, 44\u201351."},{"key":"e_1_3_1_62_2","unstructured":"Rajasekhar Chaganti Bharat Bhushan and Vinayakumar Ravi. 2022. The role of blockchain in DDoS attacks mitigation: Techniques open challenges and future directions. arXiv:2202.03617. Retrieved from https:\/\/arxiv.org\/abs\/2202.03617"},{"key":"e_1_3_1_63_2","doi-asserted-by":"crossref","unstructured":"www.shivom.io. 2020. Shivom. Retrieved January 12 2020 from https:\/\/www.shivom.io\/","DOI":"10.5958\/0975-4377.2020.00038.5"},{"key":"e_1_3_1_64_2","unstructured":"Nikolay Kulemin Sergey Popov and Alexey Gorbachev. 2017. The Zenome Project: Whitepaper Blockchain-Based Genomic Ecosystem. Retrieved January 12 2020 from https:\/\/zenome.io\/"},{"key":"e_1_3_1_65_2","unstructured":"genomes.io. 2020. Genomes.io. Retrieved January 12 2020 from https:\/\/www.genomes.io\/"},{"key":"e_1_3_1_66_2","doi-asserted-by":"publisher","DOI":"10.31585\/jbba-3-1-(6)2020"},{"key":"e_1_3_1_67_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2021.102535"},{"key":"e_1_3_1_68_2","first-page":"104658","article-title":"Detecting model misconducts in decentralized healthcare federated learning","volume":"158","author":"Kuo Tsung-Ting","year":"2021","unstructured":"Tsung-Ting Kuo and Anh Pham. 2021. Detecting model misconducts in decentralized healthcare federated learning. International Journal of Medical Informatics 158 (2022), 104658.","journal-title":"International Journal of Medical Informatics"},{"issue":"1","key":"e_1_3_1_69_2","doi-asserted-by":"crossref","first-page":"134","DOI":"10.1186\/s13059-022-02699-7","article-title":"Storing and analyzing a genome on a blockchain","volume":"23","author":"G\u00fcrsoy Gamze","year":"2022","unstructured":"Gamze G\u00fcrsoy, Charlotte M. Brannon, Eric Ni, Sarah Wagner, Amol Khanna, and Mark Gerstein. 2022. Storing and analyzing a genome on a blockchain. Genome Biology 23, 1 (2022), 134\u2013122.","journal-title":"Genome Biology"},{"key":"e_1_3_1_70_2","first-page":"779","article-title":"PHDMF: A flexible and scalable personal health data management framework based on blockchain technology","author":"Ma Liangxiao","year":"2022","unstructured":"Liangxiao Ma, Yongxiang Liao, Haiwei Fan, Xianfeng Zheng, Jintao Zhao, Ziyi Xiao, Guangyong Zheng, and Yun Xiong. 2022. PHDMF: A flexible and scalable personal health data management framework based on blockchain technology. Frontiers in Genetics, 779.","journal-title":"Frontiers in Genetics"},{"issue":"5","key":"e_1_3_1_71_2","doi-asserted-by":"crossref","first-page":"713","DOI":"10.3390\/jpm12050713","article-title":"An idealized clinicogenomic registry to engage underrepresented populations using innovative technology","volume":"12","author":"Silva Patrick","year":"2022","unstructured":"Patrick Silva, Deborah Vollmer Dahlke, Matthew Lee Smith, Wendy Charles, Jorge Gomez, Marcia G. Ory, and Kenneth S. Ramos. 2022. An idealized clinicogenomic registry to engage underrepresented populations using innovative technology. Journal of Personalized Medicine 12, 5 (2022), 713.","journal-title":"Journal of Personalized Medicine"},{"issue":"2","key":"e_1_3_1_72_2","doi-asserted-by":"crossref","first-page":"266","DOI":"10.5505\/pajes.2021.69947","article-title":"Multi-level security model in distributed database systems","volume":"28","author":"Bak\u0131r \u00c7.","year":"2022","unstructured":"\u00c7. Bak\u0131r and M. G\u00fc\u00e7l\u00fc. 2022. Multi-level security model in distributed database systems. Pamukkale University Journal of Engineering Sciences 28, 2 (2022), 266\u2013276.","journal-title":"Pamukkale University Journal of Engineering Sciences"},{"key":"e_1_3_1_73_2","unstructured":"D. Nugent. 2022. Privacy-preserving credit card fraud detection using homomorphic encryption. arXiv:2211.06675. Retrieved from https:\/\/arxiv.org\/abs\/2211.06675"},{"key":"e_1_3_1_74_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2022.113910"},{"key":"e_1_3_1_75_2","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1109\/EuroSP.2019.00023","volume-title":"2019 IEEE European Symposium on Security and Privacy (EuroS&P)","author":"Cheng R.","year":"2019","unstructured":"R. Cheng, F. Zhang, J. Kos, W. He, N. Hynes, N. Johnson, A. Juels, A. Miller, and D. Song. 2019. Ekiden: A platform for confidentiality-preserving, trustworthy, and performant smart contracts. In 2019 IEEE European Symposium on Security and Privacy (EuroS&P). IEEE, 185\u2013200."},{"key":"e_1_3_1_76_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2979881"},{"key":"e_1_3_1_77_2","doi-asserted-by":"publisher","DOI":"10.1109\/DSN-S50200.2020.00043"},{"key":"e_1_3_1_78_2","doi-asserted-by":"crossref","first-page":"2185","DOI":"10.1109\/BigData52589.2021.9671934","volume-title":"2021 IEEE International Conference on Big Data (Big Data)","author":"Alexandridis A.","year":"2021","unstructured":"A. Alexandridis, G. Al-Sumaidaee, R. Alkhudary, and Z. Zilic. 2021. Making case for using RAFT in healthcare through Hyperledger Fabric. In 2021 IEEE International Conference on Big Data (Big Data). IEEE, 2185\u20132191."},{"key":"e_1_3_1_79_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-0733-2_27"},{"key":"e_1_3_1_80_2","doi-asserted-by":"publisher","DOI":"10.5555\/AAI28107782"},{"issue":"6","key":"e_1_3_1_81_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3456631","article-title":"Security vulnerabilities of SGX and countermeasures: A survey","volume":"54","author":"Fei S.","year":"2022","unstructured":"S. Fei, Z. Yan, W. Ding, and H. Xie. 2022. Security vulnerabilities of SGX and countermeasures: A survey. ACM Computing Surveys 54, 6 (2022), 1\u201336.","journal-title":"ACM Computing Surveys"}],"container-title":["Distributed Ledger Technologies: Research and Practice"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3743696","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T12:49:23Z","timestamp":1769518163000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3743696"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,27]]},"references-count":80,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2026,6,30]]}},"alternative-id":["10.1145\/3743696"],"URL":"https:\/\/doi.org\/10.1145\/3743696","relation":{},"ISSN":["2769-6480","2769-6480"],"issn-type":[{"value":"2769-6480","type":"print"},{"value":"2769-6480","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,27]]},"assertion":[{"value":"2024-12-19","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-05-27","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2026-01-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}