{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T10:23:32Z","timestamp":1775471012585,"version":"3.50.1"},"reference-count":188,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,9,30]],"date-time":"2024-09-30T00:00:00Z","timestamp":1727654400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,9,30]],"date-time":"2024-09-30T00:00:00Z","timestamp":1727654400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"abstract":"<jats:title>Abstract<\/jats:title><jats:p>The widespread adoption of cloud computing has dramatically altered how data is stored, processed, and accessed in an era. The rapid development of digital technologies characterizes all this. The widespread adoption of cloud services has introduced new obstacles to guaranteeing secure and expeditious access to sensitive data. Organizations of all types find user-friendly and cost-effective solutions crucial, which is why they consider cloud services essential. The availability of the cloud hampers access control security in systems that are constantly and remotely changing. Conventional methods of access control are efficient, but the advanced world of technology exposes them to more threats. Applying blockchain technology to cloud access control systems, which are decentralized, transparent, and tamper-proof, has overcome these challenges. This paper aims to discuss the potential of blockchain in enhancing access management, security and trust in cloud computing. Besides, this scholarly article reviews the evolving area of blockchain-based access control systems and synthesizes the findings of 118 selected papers from various academic repositories. Based on this systematic review of the studies, twelve different types of blockchain-based access control paradigms can be identified. This work provides a critical analysis of the research on blockchain technology in access control systems, with a focus on scalability, compatibility, and security challenges. It also highlights areas that require further research and proposes directions for future research to advance this rapidly growing area of scholarship.<\/jats:p>","DOI":"10.1186\/s13677-024-00697-7","type":"journal-article","created":{"date-parts":[[2024,9,30]],"date-time":"2024-09-30T09:02:24Z","timestamp":1727686944000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":63,"title":["A systematic review on blockchain-based access control systems in cloud environment"],"prefix":"10.1186","volume":"13","author":[{"given":"Aarti","family":"Punia","sequence":"first","affiliation":[]},{"given":"Preeti","family":"Gulia","sequence":"additional","affiliation":[]},{"given":"Nasib Singh","family":"Gill","sequence":"additional","affiliation":[]},{"given":"Ebuka","family":"Ibeke","sequence":"additional","affiliation":[]},{"given":"Celestine","family":"Iwendi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3715-3882","authenticated-orcid":false,"given":"Piyush Kumar","family":"Shukla","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,30]]},"reference":[{"key":"697_CR1","doi-asserted-by":"publisher","unstructured":"Butt UA, Amin R, Mehmood M, Aldabbas H, Alharbi MT, Albaqami N (Jan. 2023) Cloud Security threats and solutions: a Survey. Wirel Pers Commun 128(1):387\u2013413. https:\/\/doi.org\/10.1007\/s11277-022-09960-z","DOI":"10.1007\/s11277-022-09960-z"},{"key":"697_CR2","doi-asserted-by":"crossref","unstructured":"Rani S, Bhambri P, Kataria A, Khang A, Sivaraman AK (2023) Big Data, Cloud Computing and IoT: tools and applications. CRC","DOI":"10.1201\/9781003298335"},{"key":"697_CR3","doi-asserted-by":"publisher","unstructured":"Chinnasamy P, Deepalakshmi P (Feb. 2022) HCAC-EHR: hybrid cryptographic access control for secure EHR retrieval in healthcare cloud. J Ambient Intell Hum Comput 13(2):1001\u20131019. https:\/\/doi.org\/10.1007\/s12652-021-02942-2","DOI":"10.1007\/s12652-021-02942-2"},{"key":"697_CR4","doi-asserted-by":"publisher","unstructured":"Kunduru AR (May 2023) Security Concerns and Solutions for Enterprise Cloud Computing Applications. AJRCoS 15(4):24\u201333. https:\/\/doi.org\/10.9734\/ajrcos\/2023\/v15i4327","DOI":"10.9734\/ajrcos\/2023\/v15i4327"},{"issue":"8","key":"697_CR5","doi-asserted-by":"publisher","first-page":"e3458","DOI":"10.1002\/ett.3458","volume":"29","author":"P Chinnasamy","year":"2018","unstructured":"Chinnasamy P, Deepalakshmi P (2018) A scalable multilabel-based access control as a service for the cloud (SMBACaaS). Trans Emerg Telecommunications Technol 29(8):e3458. https:\/\/doi.org\/10.1002\/ett.3458","journal-title":"Trans Emerg Telecommunications Technol"},{"key":"697_CR6","unstructured":"Vegesna VV A Critical Investigation and Analysis of Strategic Techniques Before Approving Cloud Computing Service Frameworks. Rochester, NY, Oct. 25, 2023. Accessed: Apr. 29, 2024. [Online]. Available: https:\/\/papers.ssrn.com\/abstract=4612531"},{"key":"697_CR7","unstructured":"Overview of the Snowflake Breach Threat Actor Offers Data of Cloud Company\u2019s Customers, SOCRadar\u00ae Cyber Intelligence Inc. Accessed: Jun. 06, 2024. [Online]. Available: https:\/\/socradar.io\/overview-of-the-snowflake-breach\/"},{"key":"697_CR8","unstructured":"Trello data scraping Atlassian Community. Accessed: Jun. 06, 2024. [Online]. Available: https:\/\/community.atlassian.com\/t5\/Trello-discussions\/Trello-data-scraping\/td-p\/2587475"},{"key":"697_CR9","unstructured":"Bank of America Informs Customers About 90-Day-Old Cyber Attack \u2013 Forbes Advisor. Accessed: Jun. 06, 2024. [Online]. Available: https:\/\/www.forbes.com\/advisor\/personal-finance\/data-breach-affects-bank-of-america-customers\/"},{"key":"697_CR10","doi-asserted-by":"publisher","unstructured":"Li W, Wu J, Cao J, Chen N, Zhang Q, Buyya R (Jun. 2021) Blockchain-based trust management in cloud computing systems: a taxonomy, review and future directions. J Cloud Comput 10(1):35. https:\/\/doi.org\/10.1186\/s13677-021-00247-5","DOI":"10.1186\/s13677-021-00247-5"},{"key":"697_CR11","doi-asserted-by":"publisher","unstructured":"Gajmal Y, More P, Jagtap A, Kale K (Jan. 2024) Access control and data sharing mechanism in decentralized cloud using blockchain technology. J Autonom Intell 7(3). https:\/\/doi.org\/10.32629\/jai.v7i3.1332","DOI":"10.32629\/jai.v7i3.1332"},{"key":"697_CR12","doi-asserted-by":"publisher","unstructured":"Sharma P, Jindal R, Borah MD (Feb. 2023) A review of smart contract-based platforms, applications, and challenges. Cluster Comput 26(1):395\u2013421. https:\/\/doi.org\/10.1007\/s10586-021-03491-1","DOI":"10.1007\/s10586-021-03491-1"},{"key":"697_CR13","doi-asserted-by":"publisher","unstructured":"Yang L et al (2024) Feb., An access control model based on blockchain master-sidechain collaboration, Cluster Comput, vol. 27, no. 1, pp. 477\u2013497, https:\/\/doi.org\/10.1007\/s10586-022-03964-x","DOI":"10.1007\/s10586-022-03964-x"},{"key":"697_CR14","doi-asserted-by":"publisher","unstructured":"Chinnasamy P, Albakri A, Khan M, Raja AA, Kiran A, Babu JC (Jan. 2023) Appl Sci 13 6, Art. 6. https:\/\/doi.org\/10.3390\/app13063970Smart Contract-Enabled Secure Sharing of Health Data for a Mobile Cloud-Based E-Health System","DOI":"10.3390\/app13063970"},{"key":"697_CR15","doi-asserted-by":"publisher","unstructured":"Li D, Han D, Crespi N, Minerva R, Li K-C (Jan. 2023) A blockchain-based secure storage and access control scheme for supply chain finance. J Supercomput 79(1):109\u2013138. https:\/\/doi.org\/10.1007\/s11227-022-04655-5","DOI":"10.1007\/s11227-022-04655-5"},{"key":"697_CR16","doi-asserted-by":"publisher","unstructured":"Fang J, Feng T, Guo X, Ma R, Lu Y (Feb. 2024) Blockchain-Cloud privacy-enhanced distributed industrial data trading based on verifiable credentials. J Cloud Comp 13(1):30. https:\/\/doi.org\/10.1186\/s13677-023-00530-7","DOI":"10.1186\/s13677-023-00530-7"},{"key":"697_CR17","doi-asserted-by":"publisher","unstructured":"Routh AK, Ranjan P (2024) A Comprehensive Review on Granularity Perspective of the Access Control Models in Cloud Computing, in IEEE International Conference on Interdisciplinary Approaches in Technology and Management for Social Innovation (IATMSI), Mar. 2024, pp. 1\u20136. https:\/\/doi.org\/10.1109\/IATMSI60426.2024.10503154","DOI":"10.1109\/IATMSI60426.2024.10503154"},{"key":"697_CR18","doi-asserted-by":"publisher","unstructured":"Patil P, Sangeetha M, Bhaskar V (Apr. 2021) Blockchain for IoT Access Control, Security and privacy: a review. Wirel Pers Commun 117(3):1815\u20131834. https:\/\/doi.org\/10.1007\/s11277-020-07947-2","DOI":"10.1007\/s11277-020-07947-2"},{"key":"697_CR19","doi-asserted-by":"publisher","first-page":"5428","DOI":"10.1109\/ACCESS.2020.3047902","volume":"9","author":"I Butun","year":"2021","unstructured":"Butun I, \u00d6sterberg P (2021) A review of distributed Access Control for Blockchain Systems towards securing the internet of things. IEEE Access 9:5428\u20135441. https:\/\/doi.org\/10.1109\/ACCESS.2020.3047902","journal-title":"IEEE Access"},{"key":"697_CR20","doi-asserted-by":"publisher","unstructured":"Wijesekara PADSN (2024) A Literature Review on Access Control in Networking Employing Blockchain, ijcs, vol. 13, no. 1, Feb. https:\/\/doi.org\/10.33022\/ijcs.v13i1.3764","DOI":"10.33022\/ijcs.v13i1.3764"},{"key":"697_CR21","doi-asserted-by":"publisher","unstructured":"Sharma P, Jindal R, Borah MD (2020) Blockchain Technology for Cloud Storage: A Systematic Literature Review, ACM Comput. Surv, vol. 53, no. 4, p. 89:1\u201389:32, Aug. https:\/\/doi.org\/10.1145\/3403954","DOI":"10.1145\/3403954"},{"key":"697_CR22","doi-asserted-by":"crossref","unstructured":"Praharaj L, Gupta M (2023) A systematic review of Access Control in Cloud Computing. in Future Connected technologies. CRC","DOI":"10.1201\/9781003287612-3"},{"issue":"17","key":"697_CR23","doi-asserted-by":"publisher","first-page":"e6383","DOI":"10.1002\/cpe.6383","volume":"35","author":"T Liu","year":"2023","unstructured":"Liu T, Wu J, Li J, Li J, Li Y (2023) Efficient decentralized access control for secure data sharing in cloud computing. Concurrency Computation: Pract Experience 35(17):e6383. https:\/\/doi.org\/10.1002\/cpe.6383","journal-title":"Concurrency Computation: Pract Experience"},{"key":"697_CR24","doi-asserted-by":"publisher","unstructured":"Saxena UR, Alam T (2023) Provisioning trust-oriented role-based access control for maintaining data integrity in cloud, Int J Syst Assur Eng Manag, vol. 14, no. 6, pp. 2559\u20132578, Dec. https:\/\/doi.org\/10.1007\/s13198-023-02112-x","DOI":"10.1007\/s13198-023-02112-x"},{"key":"697_CR25","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1007\/978-3-031-57870-0_37","volume-title":"Advanced Information networking and applications","author":"O BenMarak","year":"2024","unstructured":"BenMarak O, Naanaa A, Elasmi S (2024) A security evaluation of Chaos Attribute-based Access Control (ABAC) for Cloud Computing. In: Barolli L (ed) Advanced Information networking and applications. Springer Nature Switzerland, Cham, pp 415\u2013425. https:\/\/doi.org\/10.1007\/978-3-031-57870-0_37."},{"key":"697_CR26","doi-asserted-by":"publisher","first-page":"512","DOI":"10.1007\/978-3-031-53555-0_49","volume-title":"Advances in internet, data & web technologies","author":"S Nakamura","year":"2024","unstructured":"Nakamura S, Takizawa M (2024) Trust Zone Model with the Mandatory Access Control Model. In: Barolli L (ed) in Advances in internet, data & web technologies. Springer Nature Switzerland, Cham, pp 512\u2013521. https:\/\/doi.org\/10.1007\/978-3-031-53555-0_49."},{"key":"697_CR27","doi-asserted-by":"publisher","first-page":"118002","DOI":"10.1109\/ACCESS.2023.3326244","volume":"11","author":"MN Jamil","year":"2023","unstructured":"Jamil MN, Hossain MS, Islam RU, Andersson K (2023) Workload Orchestration in Multi-access Edge Computing using belief rule-based Approach. IEEE Access 11:118002\u2013118023. https:\/\/doi.org\/10.1109\/ACCESS.2023.3326244","journal-title":"IEEE Access"},{"key":"697_CR28","unstructured":"Kumar Pawan G, Mohan Hari P, Amit S, Sanyam A (2024) Improving security, privacy, and trust in Cloud Computing. IGI Global"},{"key":"697_CR29","doi-asserted-by":"publisher","unstructured":"de Oliveira MT, Verginadis Y, Reis LHA, Psarra E, Patiniotakis I, Olabarriaga SD (2023) AC-ABAC: Attribute-based access control for electronic medical records during acute care, Expert Systems with Applications, vol. 213, p. 119271, Mar. https:\/\/doi.org\/10.1016\/j.eswa.2022.119271","DOI":"10.1016\/j.eswa.2022.119271"},{"key":"697_CR30","doi-asserted-by":"publisher","unstructured":"Zhuang Y, Sun Y, Deng H, Guo J (Jan. 2023) Research on big data access control mechanism. Int J Comput Sci Eng 26(2):192\u2013198. https:\/\/doi.org\/10.1504\/IJCSE.2023.129738","DOI":"10.1504\/IJCSE.2023.129738"},{"key":"697_CR31","doi-asserted-by":"publisher","unstructured":"Brimhall B, Garrard J, De La Garza C, Coffman J, May, A Comparative Analysis of Linux Mandatory Access Control Policy Enforcement Mechanisms (2023), in Proceedings of the 16th European Workshop on System Security, Rome Italy: ACM, pp. 1\u20137. https:\/\/doi.org\/10.1145\/3578357.3589454","DOI":"10.1145\/3578357.3589454"},{"issue":"20","key":"697_CR32","doi-asserted-by":"publisher","first-page":"e6864","DOI":"10.1002\/cpe.6864","volume":"35","author":"F Shan","year":"2023","unstructured":"Shan F, Li F, Ji P (2023) A smart access control mechanism based on user preference in online social networks. Concurrency Computation: Pract Experience 35(20):e6864. https:\/\/doi.org\/10.1002\/cpe.6864","journal-title":"Concurrency Computation: Pract Experience"},{"key":"697_CR33","unstructured":"Nakamoto S Bitcoin: A Peer-to-Peer Electronic Cash System"},{"key":"697_CR34","doi-asserted-by":"publisher","unstructured":"Li J, Kassem M (Dec. 2021) Applications of distributed ledger technology (DLT) and blockchain-enabled smart contracts in construction. Autom Constr 132:103955. https:\/\/doi.org\/10.1016\/j.autcon.2021.103955","DOI":"10.1016\/j.autcon.2021.103955"},{"key":"697_CR35","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/978-3-030-85443-0_7","volume-title":"Privacy and Data Protection challenges in the distributed era","author":"E Politou","year":"2022","unstructured":"Politou E, Alepis E, Virvou M, Patsakis C (2022) Privacy in Blockchain. In: Politou E, Alepis E, Virvou M, Patsakis C (eds) in Privacy and Data Protection challenges in the distributed era. Springer International Publishing, Cham, pp 133\u2013149. https:\/\/doi.org\/10.1007\/978-3-030-85443-0_7."},{"key":"697_CR36","unstructured":"Blockchain Technology Market Size &, Growth, Report (2030) Accessed: Apr. 29, 2024. [Online]. Available: https:\/\/www.grandviewresearch.com\/industry-analysis\/blockchain-technology-market"},{"key":"697_CR37","doi-asserted-by":"publisher","unstructured":"Petersen K, Vakkalanka S, Kuzniarz L (Aug. 2015) Guidelines for conducting systematic mapping studies in software engineering: an update. Inf Softw Technol 64:1\u201318. https:\/\/doi.org\/10.1016\/j.infsof.2015.03.007","DOI":"10.1016\/j.infsof.2015.03.007"},{"key":"697_CR38","doi-asserted-by":"publisher","unstructured":"Alzoubi YI, Gill A, Mishra A (Nov. 2022) A systematic review of the purposes of Blockchain and fog computing integration: classification and open issues. J Cloud Comput 11(1):80. https:\/\/doi.org\/10.1186\/s13677-022-00353-y","DOI":"10.1186\/s13677-022-00353-y"},{"key":"697_CR39","doi-asserted-by":"publisher","unstructured":"Putra GD, Dedeoglu V, Kanhere SS, Jurdak R (2020) Trust Management in Decentralized IoT Access Control System, in IEEE International Conference on Blockchain and Cryptocurrency (ICBC), May 2020, pp. 1\u20139. https:\/\/doi.org\/10.1109\/ICBC48266.2020.9169481","DOI":"10.1109\/ICBC48266.2020.9169481"},{"key":"697_CR40","doi-asserted-by":"publisher","unstructured":"Ur Rahman M, Guidi B, Baiardi F (2020) Blockchain-based access control management for Decentralized Online Social Networks, Journal of Parallel and Distributed Computing, vol. 144, pp. 41\u201354, Oct. https:\/\/doi.org\/10.1016\/j.jpdc.2020.05.011","DOI":"10.1016\/j.jpdc.2020.05.011"},{"key":"697_CR41","doi-asserted-by":"publisher","unstructured":"Putra GD, Dedeoglu V, Kanhere SS, Jurdak R, Ignjatovic A (2021) Trust-Based Blockchain Authorization for IoT, IEEE Transactions on Network and Service Management, vol. 18, no. 2, pp. 1646\u20131658, Jun. https:\/\/doi.org\/10.1109\/TNSM.2021.3077276","DOI":"10.1109\/TNSM.2021.3077276"},{"key":"697_CR42","doi-asserted-by":"publisher","unstructured":"Rizal Batubara F, Ubacht J, Janssen M (2019) Unraveling Transparency and Accountability in Blockchain, in Proceedings of the 20th Annual International Conference on Digital Government Research, in dg.o 2019. New York, NY, USA: Association for Computing Machinery, Jun. pp. 204\u2013213. https:\/\/doi.org\/10.1145\/3325112.3325262","DOI":"10.1145\/3325112.3325262"},{"key":"697_CR43","doi-asserted-by":"publisher","unstructured":"Rouhani S, Belchior R, Cruz RS, Deters R (2021) Distributed attribute-based access control system using permissioned blockchain, World Wide Web, vol. 24, no. 5, pp. 1617\u20131644, Sep. https:\/\/doi.org\/10.1007\/s11280-021-00874-7","DOI":"10.1007\/s11280-021-00874-7"},{"key":"697_CR44","doi-asserted-by":"publisher","unstructured":"Sultana T, Almogren A, Akbar M, Zuair M, Ullah I, Javaid N (2020) Data Sharing System Integrating Access Control Mechanism using Blockchain-Based Smart Contracts for IoT Devices, Applied Sciences, vol. 10, no. 2, Art. no. 2, Jan. https:\/\/doi.org\/10.3390\/app10020488","DOI":"10.3390\/app10020488"},{"key":"697_CR45","doi-asserted-by":"publisher","unstructured":"Kamboj P, Khare S, Pal S (2021) User authentication using Blockchain based smart contract in role-based access control, Peer-to-Peer Netw. Appl, vol. 14, no. 5, pp. 2961\u20132976, Sep. https:\/\/doi.org\/10.1007\/s12083-021-01150-1","DOI":"10.1007\/s12083-021-01150-1"},{"key":"697_CR46","doi-asserted-by":"publisher","unstructured":"Aftab MU et al (2022) Traditional and Hybrid Access Control Models: A Detailed Survey, Security and Communication Networks, vol. p. e1560885, Feb. 2022, https:\/\/doi.org\/10.1155\/2022\/1560885","DOI":"10.1155\/2022\/1560885"},{"key":"697_CR47","unstructured":"Gitlan D SHA-256 Algorithm - A Non-Technical Guide, SSL Dragon. Accessed: Jun. 06, 2024. [Online]. Available: https:\/\/www.ssldragon.com\/blog\/sha-256-algorithm\/"},{"key":"697_CR48","doi-asserted-by":"publisher","unstructured":"Dolmeta A, Martina M, Masera G (2023) Comparative Study of Keccak SHA-3 Implementations, Cryptography, vol. 7, no. 4, Art. no. 4, Dec. https:\/\/doi.org\/10.3390\/cryptography7040060","DOI":"10.3390\/cryptography7040060"},{"key":"697_CR49","doi-asserted-by":"publisher","first-page":"402","DOI":"10.1007\/978-3-319-04852-9_21","volume-title":"Topics in cryptology \u2013 CT-RSA 2014","author":"J Guo","year":"2014","unstructured":"Guo J, Karpman P, Nikoli\u0107 I, Wang L, Wu S (2014) Analysis of BLAKE2. In: Benaloh J (ed) Topics in cryptology \u2013 CT-RSA 2014. Springer International Publishing, Cham, pp 402\u2013423. https:\/\/doi.org\/10.1007\/978-3-319-04852-9_21."},{"key":"697_CR50","doi-asserted-by":"publisher","unstructured":"Lam DK, Le VTD, Tran TH (2022) Efficient Architectures for Full Hardware Scrypt-Based Block Hashing System, Electronics, vol. 11, no. 7, Art. no. 7, Jan. https:\/\/doi.org\/10.3390\/electronics11071068","DOI":"10.3390\/electronics11071068"},{"key":"697_CR51","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1007\/978-3-031-30634-1_7","volume-title":"Advances in cryptology \u2013 EUROCRYPT 2023","author":"F Liu","year":"2023","unstructured":"Liu F et al (2023) Analysis of RIPEMD-160: new collision attacks and finding characteristics with MILP. In: Hazay C, Stam M (eds) in Advances in cryptology \u2013 EUROCRYPT 2023. Springer Nature Switzerland, Cham, pp 189\u2013219. https:\/\/doi.org\/10.1007\/978-3-031-30634-1_7."},{"key":"697_CR52","doi-asserted-by":"publisher","unstructured":"Hlobaz A, Statistical Analysis of Enhanced SDEx Encryption Method Based on SHA-512 Hash Function, in (2020) 29th International Conference on Computer Communications and Networks (ICCCN), Honolulu, HI, USA: IEEE, Aug. 2020, pp. 1\u20136. https:\/\/doi.org\/10.1109\/ICCCN49398.2020.9209663","DOI":"10.1109\/ICCCN49398.2020.9209663"},{"key":"697_CR53","doi-asserted-by":"publisher","unstructured":"Sadeghi-Nasab A, Rafe V (2023) A comprehensive review of the security flaws of hashing algorithms, J Comput Virol Hack Tech, vol. 19, no. 2, pp. 287\u2013302, Jun. https:\/\/doi.org\/10.1007\/s11416-022-00447-w","DOI":"10.1007\/s11416-022-00447-w"},{"key":"697_CR54","doi-asserted-by":"publisher","unstructured":"Aggarwal S, Kumar N (2021) Hashes\u2606, in Advances in Computers, vol. 121, S. Aggarwal, N. Kumar, and P. Raj, Eds., in The Blockchain Technology for Secure and Smart Applications across Industry Verticals, vol. 121., Elsevier, pp. 83\u201393. https:\/\/doi.org\/10.1016\/bs.adcom.2020.08.003","DOI":"10.1016\/bs.adcom.2020.08.003"},{"key":"697_CR55","unstructured":"Ethash, GitHub Accessed: Jun. 07, 2024. [Online]. Available: https:\/\/github.com\/ethereum\/wiki\/wiki\/Ethash"},{"key":"697_CR56","doi-asserted-by":"publisher","unstructured":"Kaur G, Singh K, Gill HS (2021) Chaos-based joint speech encryption scheme using SHA-1, Multimed Tools Appl, vol. 80, no. 7, pp. 10927\u201310947, Mar. https:\/\/doi.org\/10.1007\/s11042-020-10223-x","DOI":"10.1007\/s11042-020-10223-x"},{"key":"697_CR57","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1007\/978-981-16-3637-0_24","volume-title":"Networking, Intelligent systems and Security","author":"HEL Makhtoum","year":"2022","unstructured":"Makhtoum HEL, Bentaleb Y (2022) Comparative study of Keccak and Blake2 hash functions. In: Ben Ahmed M, Teodorescu H-NL, Mazri T, Subashini P, Boudhir AA (eds) in Networking, Intelligent systems and Security. Springer, Singapore, pp 343\u2013350. https:\/\/doi.org\/10.1007\/978-981-16-3637-0_24."},{"key":"697_CR58","doi-asserted-by":"publisher","unstructured":"Eum S, Kim H, Song M, Seo H (2023) Optimized Implementation of Argon2 Utilizing the Graphics Processing Unit, Applied Sciences, vol. 13, no. 16, Art. no. 16, Jan. https:\/\/doi.org\/10.3390\/app13169295","DOI":"10.3390\/app13169295"},{"key":"697_CR59","unstructured":"Gauravaram P et al (2008) Gr\u00f8stl - a SHA-3 candidate. Sep"},{"key":"697_CR60","doi-asserted-by":"publisher","first-page":"00093","DOI":"10.1051\/bioconf\/20249700093","volume":"97","author":"F Al-Shareefi","year":"2024","unstructured":"Al-Shareefi F, Al-Barmani Z (2024) Comparing two cryptographic hash algorithms: SHA-512 and whirlpool- a case study on file integrity monitoring. BIO Web Conf 97:00093. https:\/\/doi.org\/10.1051\/bioconf\/20249700093","journal-title":"BIO Web Conf"},{"key":"697_CR61","doi-asserted-by":"publisher","unstructured":"V. N. Karazin Kharkiv National University, Svobody sq., 4, Kharkiv, 61022, Ukraine et al., Performance Analysis of Cryptographic Hash Functions Suitable for Use in Blockchain, IJCNIS, vol. 13, no. 2, pp. 1\u201315, (2021) https:\/\/doi.org\/10.5815\/ijcnis.2021.02.01","DOI":"10.5815\/ijcnis.2021.02.01"},{"key":"697_CR62","doi-asserted-by":"publisher","unstructured":"Abed S, Jaffal R, Mohd BJ, Al-Shayeji M (2021) An analysis and evaluation of lightweight hash functions for blockchain-based IoT devices, Cluster Comput, vol. 24, no. 4, pp. 3065\u20133084, Dec. https:\/\/doi.org\/10.1007\/s10586-021-03324-1","DOI":"10.1007\/s10586-021-03324-1"},{"key":"697_CR63","doi-asserted-by":"publisher","unstructured":"Ferdous MS, Chowdhury MJM, Hoque MA (May 2021) A survey of consensus algorithms in public blockchain systems for crypto-currencies. J Netw Comput Appl 182:103035. https:\/\/doi.org\/10.1016\/j.jnca.2021.103035","DOI":"10.1016\/j.jnca.2021.103035"},{"key":"697_CR64","doi-asserted-by":"publisher","unstructured":"Tetu J-F, Trudeau L-C, Van Beirendonck M, Balatsoukas-Stimming A, Giard P (2020) A Standalone FPGA-Based Miner for Lyra2REv2 Cryptocurrencies, IEEE Trans. Circuits Syst. I, vol. 67, no. 4, pp. 1194\u20131206, Apr. https:\/\/doi.org\/10.1109\/TCSI.2020.2970923","DOI":"10.1109\/TCSI.2020.2970923"},{"key":"697_CR65","doi-asserted-by":"publisher","unstructured":"Sandeepkumar EV, Suresh A, Blockchain Assisted Cloud Storage For Electronic Health Records, in (2023) International Conference on Computer Communication and Informatics (ICCCI), Jan. 2023, pp. 1\u20136. https:\/\/doi.org\/10.1109\/ICCCI56745.2023.10128219","DOI":"10.1109\/ICCCI56745.2023.10128219"},{"key":"697_CR66","doi-asserted-by":"publisher","unstructured":"Kumar A, Abhishek K, Bhushan B, Chakraborty C (2021) RETRACTED ARTICLE: Secure access control for manufacturing sector with application of ethereum blockchain, Peer-to-Peer Netw. Appl, vol. 14, no. 5, pp. 3058\u20133074, Sep. https:\/\/doi.org\/10.1007\/s12083-021-01108-3","DOI":"10.1007\/s12083-021-01108-3"},{"key":"697_CR67","doi-asserted-by":"publisher","unstructured":"Jia C, Geng Y, Sun S, Research on Data Access Management Based on Blockchain Engine (2022), International Conference on Big Data, Information and Computer Network (BDICN), Jan. 2022, pp. 465\u2013468. https:\/\/doi.org\/10.1109\/BDICN55575.2022.00091","DOI":"10.1109\/BDICN55575.2022.00091"},{"key":"697_CR68","doi-asserted-by":"publisher","unstructured":"Zou Y, Peng T, Zhong W, Guan K, Wang G (2022) Reliable and Controllable Data Sharing Based on Blockchain, in Ubiquitous Security, G. Wang, K.-K. R. Choo, R. K. L. Ko, Y. Xu, and B. Crispo, Eds., Singapore: Springer, pp. 229\u2013240. https:\/\/doi.org\/10.1007\/978-981-19-0468-4_17","DOI":"10.1007\/978-981-19-0468-4_17"},{"key":"697_CR69","doi-asserted-by":"publisher","unstructured":"Algarni S et al (2021) Jan., Blockchain-Based Secured Access Control in an IoT System, Applied Sciences, vol. 11, no. 4, Art. no. 4, https:\/\/doi.org\/10.3390\/app11041772","DOI":"10.3390\/app11041772"},{"key":"697_CR70","doi-asserted-by":"publisher","unstructured":"Boumezbeur I, Zarour K (Mar. 2022) Privacy Preservation and Access Control for Sharing Electronic Health Records Using Blockchain Technology. Acta Informatica Pragensia 11:105\u2013122. https:\/\/doi.org\/10.18267\/j.aip.176","DOI":"10.18267\/j.aip.176"},{"key":"697_CR71","doi-asserted-by":"publisher","unstructured":"Chen Z, Xu W, Wang B, Yu H (Nov. 2021) A blockchain-based preserving and sharing system for medical data privacy. Future Generation Comput Syst 124:338\u2013350. https:\/\/doi.org\/10.1016\/j.future.2021.05.023","DOI":"10.1016\/j.future.2021.05.023"},{"key":"697_CR72","doi-asserted-by":"publisher","unstructured":"Yang W, Guan Z, Wu L, Du X, Guizani M (May 2021) An Edge Blockchain Approach. IEEE Internet Things J 8(10):8632\u20138643. https:\/\/doi.org\/10.1109\/JIOT.2020.3047640. Secure Data Access Control With Fair Accountability in Smart Grid Data Sharing:","DOI":"10.1109\/JIOT.2020.3047640"},{"key":"697_CR73","doi-asserted-by":"publisher","unstructured":"Liu Y, Zhang J, Zhan J (2021) Privacy protection for fog computing and the internet of things data based on blockchain, Cluster Comput, vol. 24, no. 2, pp. 1331\u20131345, Jun. https:\/\/doi.org\/10.1007\/s10586-020-03190-3","DOI":"10.1007\/s10586-020-03190-3"},{"key":"697_CR74","doi-asserted-by":"publisher","unstructured":"Fan Y et al (2019) Oct., TraceChain: A blockchain-based scheme to protect data confidentiality and traceability, Software: Practice and Experience, vol. 52, https:\/\/doi.org\/10.1002\/spe.2753","DOI":"10.1002\/spe.2753"},{"key":"697_CR75","doi-asserted-by":"publisher","unstructured":"Gowda NC, Manvi SS, B. M. A., and, Lorenz P (May 2023) BSKM-FC: Blockchain-based secured key management in a fog computing environment. Future Generation Comput Syst 142:276\u2013291. https:\/\/doi.org\/10.1016\/j.future.2022.12.042","DOI":"10.1016\/j.future.2022.12.042"},{"key":"697_CR76","doi-asserted-by":"publisher","first-page":"3307","DOI":"10.1109\/ACCESS.2022.3140419","volume":"10","author":"D Na","year":"2022","unstructured":"Na D, Park S (2022) Blockchain-based Dashcam Video Management Method for data sharing and Integrity in V2V Network. IEEE Access 10:3307\u20133319. https:\/\/doi.org\/10.1109\/ACCESS.2022.3140419","journal-title":"IEEE Access"},{"key":"697_CR77","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1007\/978-981-15-5566-4_32","volume-title":"Intelligent Computing and Applications","author":"D Praveena Anjelin","year":"2021","unstructured":"Praveena Anjelin D, Ganesh Kumar S (2021) Blockchain Technology for Data sharing in decentralized Storage System. In: Dash SS, Das S, Panigrahi BK (eds) in Intelligent Computing and Applications. Springer, Singapore, pp 369\u2013382. https:\/\/doi.org\/10.1007\/978-981-15-5566-4_32."},{"key":"697_CR78","doi-asserted-by":"publisher","unstructured":"Huang H, Sun X, Xiao F, Zhu P, Wang W (Feb. 2021) Blockchain-based eHealth system for auditable EHRs manipulation in cloud environments. J Parallel Distrib Comput 148:46\u201357. https:\/\/doi.org\/10.1016\/j.jpdc.2020.10.002","DOI":"10.1016\/j.jpdc.2020.10.002"},{"key":"697_CR79","doi-asserted-by":"publisher","unstructured":"Li X, Blockchain-Based A (2022) Verifiable User Data Access Control Policy for Secured Cloud Data Storage, Computational Intelligence and Neuroscience, vol. p. e2254411, Apr. 2022, https:\/\/doi.org\/10.1155\/2022\/2254411","DOI":"10.1155\/2022\/2254411"},{"key":"697_CR80","doi-asserted-by":"publisher","unstructured":"Deng H, Meng X, Guo J, Xi E, Zhao H (2020) A Framework of Blockchain-Based Security for WBANs, in 3rd International Conference on Smart BlockChain (SmartBlock), Oct. 2020, pp. 75\u201380. https:\/\/doi.org\/10.1109\/SmartBlock52591.2020.00021","DOI":"10.1109\/SmartBlock52591.2020.00021"},{"key":"697_CR81","doi-asserted-by":"publisher","unstructured":"Prasad PS, Beena Bethel GN, Singh N, Kumar Gunjan V, Basir S, Miah S (2022) [Retracted] Blockchain-Based Privacy Access Control Mechanism and Collaborative Analysis for Medical Images, Security and Communication Networks, vol. p. e9579611, Jun. 2022, https:\/\/doi.org\/10.1155\/2022\/9579611","DOI":"10.1155\/2022\/9579611"},{"key":"697_CR82","unstructured":"Hoang V-H, Lehtihet E, Ghamri-Doudane Y (2020) Privacy-preserving blockchain-based data sharing platform for decentralized Storage systems. Jun"},{"key":"697_CR83","doi-asserted-by":"publisher","unstructured":"Zhou W, Jin J, Blockchain-Based A Access Control Framework for Secured Data Sharing in Industrial Internet, in (2020) Eighth International Conference on Advanced Cloud and Big Data (CBD), Dec. 2020, pp. 231\u2013236. https:\/\/doi.org\/10.1109\/CBD51900.2020.00049","DOI":"10.1109\/CBD51900.2020.00049"},{"key":"697_CR84","doi-asserted-by":"publisher","unstructured":"Spoorti H, Sneha R, Soujanya V, Heena K, Pooja S, Narayan DG (2021) Secure Access Control to Cloud Resources using Blockchain, in IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER), Nov. 2021, pp. 164\u2013169. https:\/\/doi.org\/10.1109\/DISCOVER52564.2021.9663647","DOI":"10.1109\/DISCOVER52564.2021.9663647"},{"key":"697_CR85","doi-asserted-by":"publisher","unstructured":"Kumar S, Singhal A, Dumka A (2019) Analysis of Cloud Security Framework using Blockchain Technology. Rochester, NY. 05. https:\/\/doi.org\/10.2139\/ssrn.3383151","DOI":"10.2139\/ssrn.3383151"},{"key":"697_CR86","doi-asserted-by":"publisher","first-page":"38437","DOI":"10.1109\/ACCESS.2018.2851611","volume":"6","author":"S Wang","year":"2018","unstructured":"Wang S, Zhang Y, Zhang Y (2018) A blockchain-based Framework for Data sharing with fine-Grained Access Control in Decentralized Storage systems. IEEE Access 6:38437\u201338450. https:\/\/doi.org\/10.1109\/ACCESS.2018.2851611","journal-title":"IEEE Access"},{"key":"697_CR87","doi-asserted-by":"publisher","unstructured":"Gao H, Luo S, Ma Z, Yan X, Xu Y (2021) BFR-SE: A Blockchain-Based Fair and Reliable Searchable Encryption Scheme for IoT with Fine-Grained Access Control in Cloud Environment, Wireless Communications and Mobile Computing, vol. p. e5340116, Nov. 2021, https:\/\/doi.org\/10.1155\/2021\/5340116","DOI":"10.1155\/2021\/5340116"},{"key":"697_CR88","doi-asserted-by":"publisher","unstructured":"Zhang Y, Xiong L, Li F, Niu X, Wu H (Sep. 2023) A blockchain-based privacy-preserving auditable authentication scheme with hierarchical access control for mobile cloud computing. J Syst Architect 142:102949. https:\/\/doi.org\/10.1016\/j.sysarc.2023.102949","DOI":"10.1016\/j.sysarc.2023.102949"},{"key":"697_CR89","doi-asserted-by":"publisher","DOI":"10.21203\/rs.3.rs-2031082\/v1","author":"R Ch","year":"2022","unstructured":"Ch R (2022) Design a decentralized secure access control network using blockchain on a cloud platform. Rev Preprint Sep. https:\/\/doi.org\/10.21203\/rs.3.rs-2031082\/v1","journal-title":"Rev Preprint Sep"},{"key":"697_CR90","doi-asserted-by":"publisher","unstructured":"Le T, Mutka MW (2018) CapChain: A Privacy Preserving Access Control Framework Based on Blockchain for Pervasive Environments, in IEEE International Conference on Smart Computing (SMARTCOMP), Taormina: IEEE, Jun. 2018, pp. 57\u201364. https:\/\/doi.org\/10.1109\/SMARTCOMP.2018.00074","DOI":"10.1109\/SMARTCOMP.2018.00074"},{"key":"697_CR91","doi-asserted-by":"publisher","unstructured":"Wang H, Song Y (2018) Secure Cloud-Based EHR System Using Attribute-Based Cryptosystem and Blockchain, J Med Syst, vol. 42, no. 8, p. 152, Aug. https:\/\/doi.org\/10.1007\/s10916-018-0994-6","DOI":"10.1007\/s10916-018-0994-6"},{"key":"697_CR92","doi-asserted-by":"publisher","unstructured":"Yan L, Ge L, Wang Z, Zhang G, Xu J, Hu Z (Apr. 2023) Access control scheme based on blockchain and attribute-based searchable encryption in cloud environment. J Cloud Comput 12(1):61. https:\/\/doi.org\/10.1186\/s13677-023-00444-4","DOI":"10.1186\/s13677-023-00444-4"},{"key":"697_CR93","doi-asserted-by":"publisher","unstructured":"Tan L, Shi N, Yu K, Aloqaily M, Jararweh Y (2021) A Blockchain-empowered Access Control Framework for Smart Devices in Green Internet of Things, ACM Trans. Internet Technol, vol. 21, no. 3, p. 80:1\u201380:20, Jun. https:\/\/doi.org\/10.1145\/3433542","DOI":"10.1145\/3433542"},{"key":"697_CR94","doi-asserted-by":"publisher","unstructured":"Truong H et al (2022) [Retracted] Enabling Decentralized and Auditable Access Control for IoT through Blockchain and Smart Contracts, Security and Communication Networks, vol. p. e1828747, Jun. 2022, https:\/\/doi.org\/10.1155\/2022\/1828747","DOI":"10.1155\/2022\/1828747"},{"key":"697_CR95","doi-asserted-by":"publisher","unstructured":"Deebak BD, AL-Turjman F (Jan. 2022) A robust and distributed architecture for 5G-enabled networks in the smart blockchain era. Comput Commun 181:293\u2013308. https:\/\/doi.org\/10.1016\/j.comcom.2021.10.015","DOI":"10.1016\/j.comcom.2021.10.015"},{"key":"697_CR96","doi-asserted-by":"publisher","DOI":"10.13052\/jmm1550-4646.1636","author":"M Marwan","year":"2020","unstructured":"Marwan M, Temghart AA, Sifou F, AlShahwan F (2020) A decentralized blockchain-based Architecture for a Secure Cloud-enabled IoT. JMM Nov. https:\/\/doi.org\/10.13052\/jmm1550-4646.1636","journal-title":"JMM Nov"},{"key":"697_CR97","doi-asserted-by":"publisher","unstructured":"Nguyen DC, Pathirana PN, Ding M, Seneviratne A (2021) A Cooperative Architecture of Data Offloading and Sharing for Smart Healthcare with Blockchain, in IEEE International Conference on Blockchain and Cryptocurrency (ICBC), May 2021, pp. 1\u20138. https:\/\/doi.org\/10.1109\/ICBC51069.2021.9461063","DOI":"10.1109\/ICBC51069.2021.9461063"},{"key":"697_CR98","doi-asserted-by":"crossref","unstructured":"Tariq F, Khan Z, Sultana T, Rehman M, Shahzad Q, Javaid N (2020) Leveraging Fine-grained Access Control in Blockchain-based Healthcare System","DOI":"10.1007\/978-3-030-44041-1_10"},{"key":"697_CR99","doi-asserted-by":"publisher","first-page":"134393","DOI":"10.1109\/ACCESS.2020.3011201","volume":"8","author":"V Malamas","year":"2020","unstructured":"Malamas V, Kotzanikolaou P, Dasaklis TK, Burmester M (2020) A hierarchical Multi Blockchain for Fine Grained Access to Medical Data. IEEE Access 8:134393\u2013134412. https:\/\/doi.org\/10.1109\/ACCESS.2020.3011201","journal-title":"IEEE Access"},{"key":"697_CR100","doi-asserted-by":"publisher","first-page":"112713","DOI":"10.1109\/ACCESS.2019.2929205","volume":"7","author":"S Wang","year":"2019","unstructured":"Wang S, Wang X, Zhang Y (2019) A Secure Cloud Storage Framework with Access Control based on Blockchain. IEEE Access 7:112713\u2013112725. https:\/\/doi.org\/10.1109\/ACCESS.2019.2929205","journal-title":"IEEE Access"},{"key":"697_CR101","doi-asserted-by":"publisher","unstructured":"Singhal J, Gautam AS, Bhatia A, Agrawal A, Kaushik R (2022) DD-Locker: Blockchain-based Decentralized Personal Document Locker, in International Conference on Information Networking (ICOIN), Jan. 2022, pp. 68\u201373. https:\/\/doi.org\/10.1109\/ICOIN53446.2022.9687236","DOI":"10.1109\/ICOIN53446.2022.9687236"},{"key":"697_CR102","doi-asserted-by":"publisher","unstructured":"Sharma P, Jindal R, Borah MD (Nov. 2021) Blockchain-based decentralized architecture for cloud storage system. J Inform Secur Appl 62:102970. https:\/\/doi.org\/10.1016\/j.jisa.2021.102970","DOI":"10.1016\/j.jisa.2021.102970"},{"key":"697_CR103","doi-asserted-by":"publisher","unstructured":"Tharani JS, Tharmakulasingam M, Muthukkumarasamy V (Jan. 2020) A blockchain-based database management system. Knowl Eng Rev 35:e. https:\/\/doi.org\/10.1017\/S0269888920000302","DOI":"10.1017\/S0269888920000302"},{"key":"697_CR104","doi-asserted-by":"publisher","first-page":"114322","DOI":"10.1109\/ACCESS.2023.3324740","volume":"11","author":"T Haritha","year":"2023","unstructured":"Haritha T, Anitha A (2023) Multi-level Security in Healthcare by integrating lattice-based Access Control and Blockchain- based smart contracts system. IEEE Access 11:114322\u2013114340. https:\/\/doi.org\/10.1109\/ACCESS.2023.3324740","journal-title":"IEEE Access"},{"key":"697_CR105","doi-asserted-by":"publisher","unstructured":"Xiao M, Huang Q, Miao Y, Li S, Susilo W (2022) Blockchain Based Multi-Authority Fine-Grained Access Control System With Flexible Revocation, IEEE Transactions on Services Computing, vol. 15, no. 6, pp. 3143\u20133155, Nov. https:\/\/doi.org\/10.1109\/TSC.2021.3086023","DOI":"10.1109\/TSC.2021.3086023"},{"key":"697_CR106","doi-asserted-by":"publisher","unstructured":"Sharma S, Sharma P, Secure Software Updates for Resource-Constrained IoT on The Blockchain, in (2023) 3rd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE), May 2023, pp. 1612\u20131616. https:\/\/doi.org\/10.1109\/ICACITE57410.2023.10182546","DOI":"10.1109\/ICACITE57410.2023.10182546"},{"key":"697_CR107","doi-asserted-by":"publisher","unstructured":"Liu Y et al (2023) Secure and scalable Cross-domain Data sharing in zero-Trust Cloud-Edge-End Environment based on Sharding Blockchain. IEEE Trans Dependable Secur Comput 1\u201314. https:\/\/doi.org\/10.1109\/TDSC.2023.3313799","DOI":"10.1109\/TDSC.2023.3313799"},{"key":"697_CR108","doi-asserted-by":"publisher","unstructured":"Rohini K, Kala R, Kavitha C, Hema R, Praveen Kumar P (2020) Industrial IoT with Light-Weighted supporting hierarchical storage in distributed co-operative network for Blockchain Technology. in The Convergence of Artificial Intelligence and Blockchain technologies. WORLD SCIENTIFIC, pp 201\u2013220. https:\/\/doi.org\/10.1142\/9789811225079_0010.","DOI":"10.1142\/9789811225079_0010"},{"key":"697_CR109","doi-asserted-by":"publisher","unstructured":"Zhang J, Yang Y, Liu X, Ma J (2022) An Efficient Blockchain-Based Hierarchical Data Sharing for Healthcare Internet of Things, IEEE Transactions on Industrial Informatics, vol. 18, no. 10, pp. 7139\u20137150, Oct. https:\/\/doi.org\/10.1109\/TII.2022.3145851","DOI":"10.1109\/TII.2022.3145851"},{"key":"697_CR110","doi-asserted-by":"publisher","unstructured":"Sravanthi K et al (2024) An Efficient Multi-User Groupwise Integrity CP-ABE(GI-CPABE) for Homogeneous and Heterogeneous Cloud Blockchain Transactions, Journal of Electrical Systems, vol. 20, no. 1, Art. no. 1, Jan. https:\/\/doi.org\/10.52783\/jes.685","DOI":"10.52783\/jes.685"},{"key":"697_CR111","doi-asserted-by":"crossref","unstructured":"Showkat S, Qureshi S (2022) Integration of Big Data, Machine Learning, and Blockchain Technology, in Machine Learning Adoption in Blockchain-Based Intelligent Manufacturing. CRC","DOI":"10.1201\/9781003252009-1"},{"key":"697_CR112","doi-asserted-by":"publisher","unstructured":"Sarfaraz A, Chakrabortty R, Essam D (2022) AccessChain: An Access Control Framework to Protect Data Access in Blockchain Enabled Supply Chain, Computer Science and Mathematics, preprint, Feb. https:\/\/doi.org\/10.20944\/preprints202202.0106.v1","DOI":"10.20944\/preprints202202.0106.v1"},{"key":"697_CR113","doi-asserted-by":"publisher","first-page":"59612","DOI":"10.1109\/ACCESS.2022.3180367","volume":"10","author":"B Alamri","year":"2022","unstructured":"Alamri B, Crowley K, Richardson I (2022) Blockchain-Based Identity Management Systems in Health IoT: a systematic review. IEEE Access 10:59612\u201359629. https:\/\/doi.org\/10.1109\/ACCESS.2022.3180367","journal-title":"IEEE Access"},{"key":"697_CR114","unstructured":"Kawalkar SA, Bhoyar DB (2024) Design of an Efficient Cloud Security Model through Federated Learning, Blockchain, AI-Driven Policies, and Zero Trust Frameworks, International Journal of Intelligent Systems and Applications in Engineering, vol. 12, no. 10s, Art. no. 10s, Jan"},{"key":"697_CR115","doi-asserted-by":"publisher","unstructured":"Omr\u010den L, Leventi\u0107 H, Romi\u0107 K, Gali\u0107 I (2021) Integration of Blockchain and AI in EHR sharing: A survey, in 2021 International Symposium ELMAR, Sep. pp. 155\u2013160. https:\/\/doi.org\/10.1109\/ELMAR52657.2021.9550953","DOI":"10.1109\/ELMAR52657.2021.9550953"},{"key":"697_CR116","doi-asserted-by":"publisher","unstructured":"Jayasudha M, Vijayalakshmi C (2022) Blockchain meets healthcare: Architecture for secure data sharing in unobtrusive medical applications, AIP Conference Proceedings, vol. 2405, no. 1, p. 020025, Apr. https:\/\/doi.org\/10.1063\/5.0072467","DOI":"10.1063\/5.0072467"},{"key":"697_CR117","doi-asserted-by":"publisher","unstructured":"Zukarnain Z, Muneer A, Atirah N, Almohammedi A (2022) Medi-Block Record Secure Data Sharing in Healthcare System: Issues, Solutions and Challenges, Computer Systems Science and Engineering, Nov. https:\/\/doi.org\/10.32604\/csse.2023.034448","DOI":"10.32604\/csse.2023.034448"},{"key":"697_CR118","doi-asserted-by":"publisher","unstructured":"Chougule H, Dhadiwal S, Lokhande M, Naikade R, Patil R (Jan. 2022) Digital Evidence Management System for Cybercrime Investigation using Proxy Re-encryption and Blockchain. Procedia Comput Sci 215:71\u201377. https:\/\/doi.org\/10.1016\/j.procs.2022.12.008","DOI":"10.1016\/j.procs.2022.12.008"},{"key":"697_CR119","doi-asserted-by":"publisher","unstructured":"Singh I, Singh B (2023) Integration of Decentralized BlockChain with Cloud & IoT Based SCM, in 2023 International Conference on Advancement in Computation & Computer Technologies (InCACCT), May pp. 887\u2013892. https:\/\/doi.org\/10.1109\/InCACCT57535.2023.10141797","DOI":"10.1109\/InCACCT57535.2023.10141797"},{"key":"697_CR120","doi-asserted-by":"publisher","first-page":"76248","DOI":"10.1109\/ACCESS.2021.3067284","volume":"9","author":"ZH Qaisar","year":"2021","unstructured":"Qaisar ZH, Almotiri SH, Al Ghamdi MA, Nagra AA, Ali G (2021) A scalable and efficient Multi-agent Architecture for Malware Protection in Data sharing over Mobile Cloud. IEEE Access 9:76248\u201376259. https:\/\/doi.org\/10.1109\/ACCESS.2021.3067284","journal-title":"IEEE Access"},{"key":"697_CR121","doi-asserted-by":"publisher","unstructured":"Sun H, Tan Y, Zhu L, Zhang Q, Ai S, Zheng J (2023) A blockchain-based access control protocol for secure resource sharing with mobile edge-cloud collaboration, J Ambient Intell Human Comput, vol. 14, no. 10, pp. 13661\u201313672, Oct. https:\/\/doi.org\/10.1007\/s12652-022-04020-7","DOI":"10.1007\/s12652-022-04020-7"},{"key":"697_CR122","doi-asserted-by":"publisher","unstructured":"Li M, Qin Y (2021) Scaling the Blockchain-based Access Control Framework for IoT via Sharding, in ICC - IEEE International Conference on Communications, Jun. 2021, pp. 1\u20136. https:\/\/doi.org\/10.1109\/ICC42927.2021.9500403","DOI":"10.1109\/ICC42927.2021.9500403"},{"key":"697_CR123","doi-asserted-by":"publisher","unstructured":"Yu K, Tan L, Aloqaily M, Yang H, Jararweh Y (2021) Blockchain-Enhanced Data Sharing With Traceable and Direct Revocation in IIoT, IEEE Transactions on Industrial Informatics, vol. 17, no. 11, pp. 7669\u20137678, Nov. https:\/\/doi.org\/10.1109\/TII.2021.3049141","DOI":"10.1109\/TII.2021.3049141"},{"key":"697_CR124","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/978-3-030-82322-1_7","volume-title":"Artificial Intelligence and Sustainable Computing for Smart City","author":"D Garg","year":"2021","unstructured":"Garg D, Bhatia KK, Gupta S (2021) A Research Perspective on Security in Fog Computing through Blockchain Technology. In: Solanki A, Sharma SK, Tarar S, Tomar P, Sharma S, Nayyar A (eds) in Artificial Intelligence and Sustainable Computing for Smart City. Springer International Publishing, Cham, pp 91\u2013104. https:\/\/doi.org\/10.1007\/978-3-030-82322-1_7."},{"key":"697_CR125","doi-asserted-by":"publisher","unstructured":"Imamguluyev R, Hasanov A, Mikayilova R (2023) Enhancing Node Selection in Blockchain-Enabled Edge Internet of Things (IoT): A Fuzzy Logic Approach for Improved Performance, in 7th International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Oct. 2023, pp. 37\u201341. https:\/\/doi.org\/10.1109\/I-SMAC58438.2023.10290320","DOI":"10.1109\/I-SMAC58438.2023.10290320"},{"key":"697_CR126","doi-asserted-by":"publisher","unstructured":"Mallick SR, Goswami V, Lenka RK, Sharma S, Barik RK, Performance evaluation of Queueing assisted IoMT-Fog-Blockchain framework for healthcare organizations, in (2022) IEEE 9th Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering (UPCON), Dec. 2022, pp. 1\u20136. https:\/\/doi.org\/10.1109\/UPCON56432.2022.9986439","DOI":"10.1109\/UPCON56432.2022.9986439"},{"key":"697_CR127","doi-asserted-by":"publisher","unstructured":"Mallick SR, Goswami V, Lenka RK, Patra S, Kumar V, Barik RK, Performance evaluation of priority Queueing assisted IoST-Fog-Blockchain framework in Geospatial Cloud Environment, in (2023) International Conference on Microwave, Optical, and Communication Engineering (ICMOCE), May 2023, pp. 1\u20134. https:\/\/doi.org\/10.1109\/ICMOCE57812.2023.10167317","DOI":"10.1109\/ICMOCE57812.2023.10167317"},{"key":"697_CR128","doi-asserted-by":"publisher","unstructured":"Fu L et al (Nov. 2023) Blockchain-enabled device command operation security for Industrial Internet of things. Future Generation Comput Syst 148:280\u2013297. https:\/\/doi.org\/10.1016\/j.future.2023.06.004","DOI":"10.1016\/j.future.2023.06.004"},{"key":"697_CR129","doi-asserted-by":"publisher","unstructured":"Gai K, Wang S, Zhao H, She Y, Zhang Z, Zhu L (2023) Blockchain-Based Multisignature Lock for UAC in Metaverse, IEEE Transactions on Computational Social Systems, vol. 10, no. 5, pp. 2201\u20132213, Oct. https:\/\/doi.org\/10.1109\/TCSS.2022.3226717","DOI":"10.1109\/TCSS.2022.3226717"},{"key":"697_CR130","doi-asserted-by":"publisher","unstructured":"Alshehri S, Bamasaq O, Alghazzawi D, Jamjoom A (2023) Dynamic Secure Access Control and Data Sharing Through Trusted Delegation and Revocation in a Blockchain-Enabled Cloud-IoT Environment, IEEE Internet Things J, vol. 10, no. 5, pp. 4239\u20134256, Mar. https:\/\/doi.org\/10.1109\/JIOT.2022.3217087","DOI":"10.1109\/JIOT.2022.3217087"},{"key":"697_CR131","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2022.0131004","author":"Y Qiu","year":"2022","unstructured":"Qiu Y, Sun B, Dang Q, Du C, Li N (2022) IJACSA 13(10). https:\/\/doi.org\/10.14569\/IJACSA.2022.0131004. Fine-grained Access Control Method for Blockchain Data Sharing based on Cloud Platform Big Data"},{"key":"697_CR132","doi-asserted-by":"publisher","unstructured":"Song L, Ju X, Zhu Z, Li M (2021) An access control model for the Internet of Things based on zero-knowledge token and blockchain, J Wireless Com Network, vol. no. 1, p. 105, Dec. 2021, https:\/\/doi.org\/10.1186\/s13638-021-01986-4","DOI":"10.1186\/s13638-021-01986-4"},{"key":"697_CR133","doi-asserted-by":"publisher","unstructured":"Kebande VR, Awaysheh FM, Ikuesan RA, Alawadi SA, Alshehri MD (Jan. 2021) Sensors 21 18, Art. 18. https:\/\/doi.org\/10.3390\/s21186018A Blockchain-Based Multi-Factor Authentication Model for a Cloud-Enabled Internet of Vehicles","DOI":"10.3390\/s21186018"},{"key":"697_CR134","doi-asserted-by":"publisher","unstructured":"Nguyen DC, Pathirana PN, Ding M, Seneviratne A (2021) Secure Computation Offloading in Blockchain Based IoT Networks With Deep Reinforcement Learning, IEEE Transactions on Network Science and Engineering, vol. 8, no. 4, pp. 3192\u20133208, Oct. https:\/\/doi.org\/10.1109\/TNSE.2021.3106956","DOI":"10.1109\/TNSE.2021.3106956"},{"key":"697_CR135","doi-asserted-by":"publisher","unstructured":"Riad K, Elhoseny M (2022) A Blockchain-Based Key-Revocation Access Control for Open Banking, Wireless Communications and Mobile Computing, vol. p. e3200891, Jan. 2022, https:\/\/doi.org\/10.1155\/2022\/3200891","DOI":"10.1155\/2022\/3200891"},{"key":"697_CR136","doi-asserted-by":"publisher","unstructured":"Sohrabi N, Yi X, Tari Z, Khalil I (2020) BACC: Blockchain-Based Access Control For Cloud Data, in Proceedings of the Australasian Computer Science Week Multiconference, in ACSW \u201920. New York, NY, USA: Association for Computing Machinery, Feb. pp. 1\u201310. https:\/\/doi.org\/10.1145\/3373017.3373027","DOI":"10.1145\/3373017.3373027"},{"key":"697_CR137","doi-asserted-by":"publisher","unstructured":"Qin X, Huang Y, Yang Z, Li X (Jan. 2021) A blockchain-based access control scheme with multiple attribute authorities for secure cloud data sharing. J Syst Architect 112:101854. https:\/\/doi.org\/10.1016\/j.sysarc.2020.101854","DOI":"10.1016\/j.sysarc.2020.101854"},{"key":"697_CR138","doi-asserted-by":"publisher","unstructured":"Khatiwada P, Yang B (2022) An access control and authentication scheme for secure data sharing in the decentralized cloud storage system, in 5th Conference on Cloud and Internet of Things (CIoT), Mar. 2022, pp. 137\u2013144. https:\/\/doi.org\/10.1109\/CIoT53061.2022.9766634","DOI":"10.1109\/CIoT53061.2022.9766634"},{"key":"697_CR139","doi-asserted-by":"publisher","unstructured":"Yao Y, Chang X, Mi\u0161i\u0107 J, Mi\u0161i\u0107 VB (2020) Lightweight and Privacy-Preserving ID-as-a-Service Provisioning in Vehicular Cloud Computing, IEEE Transactions on Vehicular Technology, vol. 69, no. 2, pp. 2185\u20132194, Feb. https:\/\/doi.org\/10.1109\/TVT.2019.2960831","DOI":"10.1109\/TVT.2019.2960831"},{"key":"697_CR140","doi-asserted-by":"publisher","unstructured":"Alharbi A (2023) Applying Access Control Enabled Blockchain (ACE-BC) Framework to Manage Data Security in the CIS System, Sensors, vol. 23, no. 6, Art. no. 6, Jan. https:\/\/doi.org\/10.3390\/s23063020","DOI":"10.3390\/s23063020"},{"key":"697_CR141","doi-asserted-by":"publisher","unstructured":"Mahamuni N, Pattewar G, Nikam H, Loka O, Patil R (2023) A Blockchain and Proxy Re-encryption Based Approach for IoT Data Security: A Review, in Proceedings of the 2nd International Conference on Emerging Technologies and Intelligent Systems, M. A. Al-Sharafi, M. Al-Emran, M. N. Al-Kabi, and K. Shaalan, Eds., Cham: Springer International Publishing, pp. 587\u2013595. https:\/\/doi.org\/10.1007\/978-3-031-25274-7_51","DOI":"10.1007\/978-3-031-25274-7_51"},{"key":"697_CR142","doi-asserted-by":"publisher","unstructured":"Ravi CN, Dinesh Krishnan S, Kaliyaperumal M, Kumar S, Ram Prasad AVS, and S. Suma Christal Mary, Blockchain-based Privacy-Preserving System for Internet of Things (IoT), in (2023) 8th International Conference on Communication and Electronics Systems (ICCES), Jun. 2023, pp. 309\u2013315. https:\/\/doi.org\/10.1109\/ICCES57224.2023.10192790","DOI":"10.1109\/ICCES57224.2023.10192790"},{"issue":"3","key":"697_CR143","doi-asserted-by":"publisher","first-page":"e2187","DOI":"10.1002\/nem.2187","volume":"32","author":"M George","year":"2022","unstructured":"George M, Mary Chacko A (2022) MediTrans\u2014Patient-centric interoperability through blockchain. Int J Network Manage 32(3):e2187. https:\/\/doi.org\/10.1002\/nem.2187","journal-title":"Int J Network Manage"},{"key":"697_CR144","doi-asserted-by":"publisher","unstructured":"Li T, Wang H, He D, Yu J (Aug. 2022) Blockchain-based privacy-preserving and rewarding private data sharing for IoT. IEEE Internet Things J 9(16):15138\u201315149. https:\/\/doi.org\/10.1109\/JIOT.2022.3147925","DOI":"10.1109\/JIOT.2022.3147925"},{"key":"697_CR145","doi-asserted-by":"publisher","unstructured":"Kang G, Kim Y-G (Oct. 2022) Secure Collaborative Platform for Health Care Research in an Open Environment: perspective on accountability in Access Control. J Med Internet Res 24(10):e37978. https:\/\/doi.org\/10.2196\/37978","DOI":"10.2196\/37978"},{"key":"697_CR146","doi-asserted-by":"publisher","unstructured":"Du R, Ma C, Li M (2023) Privacy-Preserving Searchable Encryption Scheme Based on Public and Private Blockchains, Tsinghua Science and Technology, vol. 28, no. 1, pp. 13\u201326, Feb. https:\/\/doi.org\/10.26599\/TST.2021.9010070","DOI":"10.26599\/TST.2021.9010070"},{"key":"697_CR147","doi-asserted-by":"publisher","unstructured":"Zhang L, Li X, Wu Q, Rezaeibagha F (2024) Blockchain-Aided Anonymous Traceable and Revocable Access Control Scheme With Dynamic Policy Updating for the Cloud IoT, IEEE Internet of Things Journal, vol. 11, no. 1, pp. 526\u2013542, Jan. https:\/\/doi.org\/10.1109\/JIOT.2023.3287190","DOI":"10.1109\/JIOT.2023.3287190"},{"key":"697_CR148","doi-asserted-by":"publisher","first-page":"70604","DOI":"10.1109\/ACCESS.2020.2985762","volume":"8","author":"C Yang","year":"2020","unstructured":"Yang C, Tan L, Shi N, Xu B, Cao Y, Yu K (2020) AuthPrivacyChain: a blockchain-based Access Control Framework with privacy protection in Cloud. IEEE Access 8:70604\u201370615. https:\/\/doi.org\/10.1109\/ACCESS.2020.2985762","journal-title":"IEEE Access"},{"key":"697_CR149","doi-asserted-by":"publisher","unstructured":"Pandiaraj A, Nagaraj P, Kumar PB, Rasi P, Lakshmi MN, Bhavani, Reddy CHV, Blockchain Using Private Cloud for Secure EHRS Systems, in (2023) 3rd International Conference on Pervasive Computing and Social Networking (ICPCSN), Jun. 2023, pp. 873\u2013878. https:\/\/doi.org\/10.1109\/ICPCSN58827.2023.00149","DOI":"10.1109\/ICPCSN58827.2023.00149"},{"key":"697_CR150","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/978-3-031-22959-6_8","volume-title":"Image Based Computing for Food and Health Analytics: requirements, challenges, solutions and practices: IBCFHA","author":"P Verma","year":"2023","unstructured":"Verma P, Tiwari R, Hong W-C (2023) Secure authentication in IoT Based Healthcare Management Environment using Integrated Fog Computing enabled Blockchain System. In: Tiwari R, Koundal D, Upadhyay S (eds) Image Based Computing for Food and Health Analytics: requirements, challenges, solutions and practices: IBCFHA. Springer International Publishing, Cham, pp 137\u2013146. https:\/\/doi.org\/10.1007\/978-3-031-22959-6_8."},{"key":"697_CR151","doi-asserted-by":"publisher","unstructured":"Sharma P, Jindal R, Borah MD (Apr. 2022) Blockchain-based cloud storage system with CP-ABE-based access control and revocation process. J Supercomput 78:7700\u20137728. https:\/\/doi.org\/10.1007\/s11227-021-04179-4","DOI":"10.1007\/s11227-021-04179-4"},{"key":"697_CR152","doi-asserted-by":"publisher","unstructured":"Li C et al (2022) Dec., Efficient Medical Big Data Management With Keyword-Searchable Encryption in Healthchain, IEEE Systems Journal, vol. 16, no. 4, pp. 5521\u20135532, https:\/\/doi.org\/10.1109\/JSYST.2022.3173538","DOI":"10.1109\/JSYST.2022.3173538"},{"key":"697_CR153","doi-asserted-by":"publisher","unstructured":"Jayatunga E, Nag A, Jurcut AD (2022) Security Requirements for Vehicle-to-Everything (V2X) Communications Integrated with Blockchain, in Fourth International Conference on Blockchain Computing and Applications (BCCA), Sep. 2022, pp. 208\u2013213. https:\/\/doi.org\/10.1109\/BCCA55292.2022.9922372","DOI":"10.1109\/BCCA55292.2022.9922372"},{"key":"697_CR154","doi-asserted-by":"publisher","unstructured":"Li M et al (2024) Blockchain-Based Searchable Encryption Access Control Mechanism for the Internet of Things, in Proceedings of the 13th International Conference on Computer Engineering and Networks, Y. Zhang, L. Qi, Q. Liu, G. Yin, and X. Liu, Eds., Singapore: Springer Nature, pp. 258\u2013268. https:\/\/doi.org\/10.1007\/978-981-99-9247-8_26","DOI":"10.1007\/978-981-99-9247-8_26"},{"key":"697_CR155","doi-asserted-by":"publisher","unstructured":"Deebak BD, Hwang SO (May 2024) Healthcare Applications using Blockchain with a cloud-assisted decentralized privacy-preserving Framework. IEEE Trans Mob Comput 23(5):5897\u20135916. https:\/\/doi.org\/10.1109\/TMC.2023.3315510","DOI":"10.1109\/TMC.2023.3315510"},{"key":"697_CR156","doi-asserted-by":"publisher","first-page":"66792","DOI":"10.1109\/ACCESS.2019.2917555","volume":"7","author":"DC Nguyen","year":"2019","unstructured":"Nguyen DC, Pathirana PN, Ding M, Seneviratne A (2019) Blockchain for Secure EHRs sharing of Mobile Cloud based E-Health systems. IEEE Access 7:66792\u201366806. https:\/\/doi.org\/10.1109\/ACCESS.2019.2917555","journal-title":"IEEE Access"},{"key":"697_CR157","doi-asserted-by":"publisher","first-page":"136704","DOI":"10.1109\/ACCESS.2019.2943153","volume":"7","author":"Y Wang","year":"2019","unstructured":"Wang Y, Zhang A, Zhang P, Wang H (2019) Cloud-assisted EHR sharing with security and Privacy Preservation via Consortium Blockchain. IEEE Access 7:136704\u2013136719. https:\/\/doi.org\/10.1109\/ACCESS.2019.2943153","journal-title":"IEEE Access"},{"key":"697_CR158","doi-asserted-by":"publisher","unstructured":"Al Breiki H, Al Qassem L, Salah K, Habib Ur Rehman M, Sevtinovic D, Decentralized Access Control for IoT Data Using Blockchain and Trusted Oracles, in (2019) IEEE International Conference on Industrial Internet (ICII), Orlando, FL, USA: IEEE, Nov. 2019, pp. 248\u2013257. https:\/\/doi.org\/10.1109\/ICII.2019.00051","DOI":"10.1109\/ICII.2019.00051"},{"key":"697_CR159","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1007\/978-3-031-29056-5_45","volume-title":"Advanced Information networking and applications","author":"A Pateritsas","year":"2023","unstructured":"Pateritsas A, Petrakis EGM (2023) iBot: secure and Trusted Access to IoT Data with Blockchain. In: Barolli L (ed) in Advanced Information networking and applications. Springer International Publishing, Cham, pp 521\u2013533. https:\/\/doi.org\/10.1007\/978-3-031-29056-5_45."},{"key":"697_CR160","doi-asserted-by":"publisher","unstructured":"Bisht T, Dinesh D, Usha G, Gautam K (2023) Edge Devices and Blockchain Integration in IoT System: A Novel Design Approach, in International Conference on Intelligent Data Communication Technologies and Internet of Things (IDCIoT), Jan. 2023, pp. 35\u201340. https:\/\/doi.org\/10.1109\/IDCIoT56793.2023.10053481","DOI":"10.1109\/IDCIoT56793.2023.10053481"},{"key":"697_CR161","doi-asserted-by":"publisher","unstructured":"Yang L, Zou W, Wang J, Tang Z (May 2022) EdgeShare: a blockchain-based edge data-sharing framework for Industrial Internet of things. Neurocomputing 485:219\u2013232. https:\/\/doi.org\/10.1016\/j.neucom.2021.01.147","DOI":"10.1016\/j.neucom.2021.01.147"},{"key":"697_CR162","doi-asserted-by":"publisher","first-page":"62998","DOI":"10.1109\/ACCESS.2023.3288332","volume":"11","author":"S Fugkeaw","year":"2023","unstructured":"Fugkeaw S, Wirz L, Hak L (2023) Secure and Lightweight Blockchain-Enabled Access Control for Fog-assisted IoT Cloud Based Electronic Medical records sharing. IEEE Access 11:62998\u201363012. https:\/\/doi.org\/10.1109\/ACCESS.2023.3288332","journal-title":"IEEE Access"},{"key":"697_CR163","doi-asserted-by":"publisher","first-page":"34045","DOI":"10.1109\/ACCESS.2019.2904042","volume":"7","author":"M Ma","year":"2019","unstructured":"Ma M, Shi G, Li F (2019) Privacy-oriented blockchain-based distributed Key Management Architecture for Hierarchical Access Control in the IoT scenario. IEEE Access 7:34045\u201334059. https:\/\/doi.org\/10.1109\/ACCESS.2019.2904042","journal-title":"IEEE Access"},{"key":"697_CR164","doi-asserted-by":"publisher","unstructured":"Li H, Han D, Tang M (2021) Logisticschain: A Blockchain-Based Secure Storage Scheme for Logistics Data, Mobile Information Systems, vol. p. e8840399, Feb. 2021, https:\/\/doi.org\/10.1155\/2021\/8840399","DOI":"10.1155\/2021\/8840399"},{"key":"697_CR165","doi-asserted-by":"publisher","unstructured":"Jayasri R, Jayakumar D, Joshila Roselin S, Ramkumar MO, Plan of Block-chain Enabled Confirmed Key Management Protocol for Internet of Medical Things Development, in (2022) 3rd International Conference on Electronics and Sustainable Communication Systems (ICESC), Aug. 2022, pp. 668\u2013673. https:\/\/doi.org\/10.1109\/ICESC54411.2022.9885295","DOI":"10.1109\/ICESC54411.2022.9885295"},{"key":"697_CR166","doi-asserted-by":"publisher","unstructured":"Zheng K et al (Oct. 2022) Blockchain technology for enterprise credit information sharing in supply chain finance. J Innov Knowl 7(4):100256. https:\/\/doi.org\/10.1016\/j.jik.2022.100256","DOI":"10.1016\/j.jik.2022.100256"},{"key":"697_CR167","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1007\/978-981-99-1252-0_56","volume-title":"Advances in Computer Science and ubiquitous Computing","author":"S Noh","year":"2023","unstructured":"Noh S, Firdaus M, Qian Z, Rhee K-H, Blockchain-Based A (2023) Data Integrity auditing protocol for Smart HACCP. In: Park JS, Yang LT, Pan Y, Park JH (eds) in Advances in Computer Science and ubiquitous Computing. Springer Nature, Singapore, pp 423\u2013429. https:\/\/doi.org\/10.1007\/978-981-99-1252-0_56."},{"key":"697_CR168","doi-asserted-by":"publisher","unstructured":"Han R, Wang Y, Wan M, Yuan T, Sun G (2023) FIBPRO: Peer-to-peer data management and sharing cloud storage system based on blockchain, Peer-to-Peer Netw. Appl, vol. 16, no. 6, pp. 2850\u20132864, Nov. https:\/\/doi.org\/10.1007\/s12083-023-01570-1","DOI":"10.1007\/s12083-023-01570-1"},{"key":"697_CR169","doi-asserted-by":"publisher","unstructured":"Qureshi KN, Jeon G, Hassan MM, Hassan MR, Kaur K (2023) Blockchain-Based Privacy-Preserving Authentication Model Intelligent Transportation Systems, IEEE Transactions on Intelligent Transportation Systems, vol. 24, no. 7, pp. 7435\u20137443, Jul. https:\/\/doi.org\/10.1109\/TITS.2022.3158320","DOI":"10.1109\/TITS.2022.3158320"},{"key":"697_CR170","doi-asserted-by":"publisher","first-page":"85190","DOI":"10.1109\/ACCESS.2020.2992203","volume":"8","author":"H Li","year":"2020","unstructured":"Li H, Pei L, Liao D, Chen S, Zhang M, Xu D (2020) A fine-Grained Access Control Scheme for VANET Data based on Blockchain. IEEE Access 8:85190\u201385203. https:\/\/doi.org\/10.1109\/ACCESS.2020.2992203","journal-title":"IEEE Access"},{"key":"697_CR171","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1007\/978-3-030-14234-6_15","volume-title":"Information Security and Cryptology","author":"J Guo","year":"2019","unstructured":"Guo J, Yang W, Lam K-Y, Yi X (2019) Using blockchain to Control Access to Cloud Data. In: Guo F, Huang X, Yung M (eds) in Information Security and Cryptology. Lecture Notes in Computer Science. Springer International Publishing, Cham, pp 274\u2013288. https:\/\/doi.org\/10.1007\/978-3-030-14234-6_15."},{"key":"697_CR172","unstructured":"Ri O-C, Kim Y-J, Jong Y-J Blockchain-based RBAC Model with separation of duties constraint in Cloud Environment."},{"key":"697_CR173","doi-asserted-by":"publisher","first-page":"103745","DOI":"10.1016\/j.csi.2023.103745","volume":"87","author":"M Almasian","year":"2024","unstructured":"Almasian M, Shafieinejad A (2024) Secure cloud file sharing scheme using blockchain and attribute-based encryption. Comput Stand Interfaces 87:103745. https:\/\/doi.org\/10.1016\/j.csi.2023.103745","journal-title":"Comput Stand Interfaces"},{"key":"697_CR174","doi-asserted-by":"publisher","unstructured":"Saini A, Zhu Q, Singh N, Xiang Y, Gao L, Zhang Y (2021) A Smart-Contract-Based Access Control Framework for Cloud Smart Healthcare System, IEEE Internet of Things Journal, vol. 8, no. 7, pp. 5914\u20135925, Apr. https:\/\/doi.org\/10.1109\/JIOT.2020.3032997","DOI":"10.1109\/JIOT.2020.3032997"},{"issue":"7","key":"697_CR175","doi-asserted-by":"publisher","first-page":"e4749","DOI":"10.1002\/dac.4749","volume":"34","author":"VS Naresh","year":"2021","unstructured":"Naresh VS, Reddi S, Allavarpu VVLD (2021) Blockchain-based patient centric health care communication system. Int J Commun Syst 34(7):e4749. https:\/\/doi.org\/10.1002\/dac.4749","journal-title":"Int J Commun Syst"},{"key":"697_CR176","doi-asserted-by":"publisher","unstructured":"Ding Y, Sato H (2020) Bloccess: Towards Fine-Grained Access Control Using Blockchain in a Distributed Untrustworthy Environment, in 8th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud), Aug. 2020, pp. 17\u201322. https:\/\/doi.org\/10.1109\/MobileCloud48802.2020.00011","DOI":"10.1109\/MobileCloud48802.2020.00011"},{"key":"697_CR177","doi-asserted-by":"publisher","unstructured":"Chen Y, Meng L, Zhou H, Xue G (2021) A Blockchain-Based Medical Data Sharing Mechanism with Attribute-Based Access Control and Privacy Protection, Wireless Communications and Mobile Computing, vol. p. e6685762, Jul. 2021, https:\/\/doi.org\/10.1155\/2021\/6685762","DOI":"10.1155\/2021\/6685762"},{"key":"697_CR178","doi-asserted-by":"publisher","unstructured":"Doshi D, Khara S (2021) Blockchain-Based Decentralized Cloud Storage, in International Conference on Mobile Computing and Sustainable Informatics, J. S. Raj, Ed., Cham: Springer International Publishing, pp. 563\u2013569. https:\/\/doi.org\/10.1007\/978-3-030-49795-8_54","DOI":"10.1007\/978-3-030-49795-8_54"},{"key":"697_CR179","doi-asserted-by":"publisher","unstructured":"Jabarulla MY, Lee H-N (2021) Blockchain-Based Distributed Patient-Centric Image Management System, Applied Sciences, vol. 11, no. 1, Art. no. 1, Jan. https:\/\/doi.org\/10.3390\/app11010196","DOI":"10.3390\/app11010196"},{"key":"697_CR180","doi-asserted-by":"publisher","unstructured":"Khare S, Badholia A (Apr. 2023) BLA2C2: design of a Novel Blockchain-based Light-Weight Authentication & Access Control Layer for Cloud Deployments. IJRITCC 11(3):283\u2013294. https:\/\/doi.org\/10.17762\/ijritcc.v11i3.6359","DOI":"10.17762\/ijritcc.v11i3.6359"},{"key":"697_CR181","doi-asserted-by":"publisher","unstructured":"Gajmal YM, Udayakumar R (2021) Blockchain-Based Access Control and Data Sharing Mechanism in Cloud Decentralized Storage System, Journal of Web Engineering, pp. 1359\u20131388, Aug. https:\/\/doi.org\/10.13052\/jwe1540-9589.2054","DOI":"10.13052\/jwe1540-9589.2054"},{"key":"697_CR182","doi-asserted-by":"publisher","unstructured":"Li G, Wu H, Wu J, Li Z (May 2024) Efficient and secure privacy protection scheme and consensus mechanism in MEC enabled e-commerce consortium blockchain. J Cloud Comp 13(1):97. https:\/\/doi.org\/10.1186\/s13677-024-00652-6","DOI":"10.1186\/s13677-024-00652-6"},{"key":"697_CR183","doi-asserted-by":"publisher","unstructured":"Saari A, Vimpari J, Junnila S (Oct. 2022) Blockchain in real estate: recent developments and empirical applications. Land Use Policy 121:106334. https:\/\/doi.org\/10.1016\/j.landusepol.2022.106334","DOI":"10.1016\/j.landusepol.2022.106334"},{"key":"697_CR184","doi-asserted-by":"publisher","unstructured":"Javaid M, Haleem A, Singh RP, Suman R, Khan S (Jul. 2022) A review of Blockchain Technology applications for financial services. BenchCouncil Trans Benchmarks Stand Evaluations 2(3):100073. https:\/\/doi.org\/10.1016\/j.tbench.2022.100073","DOI":"10.1016\/j.tbench.2022.100073"},{"key":"697_CR185","doi-asserted-by":"publisher","first-page":"31197","DOI":"10.1109\/ACCESS.2024.3366656","volume":"12","author":"Deepak","year":"2024","unstructured":"Deepak et al (2024) Exploring the potential of Blockchain Technology in an IoT-Enabled environment: a review. IEEE Access 12:31197\u201331227. https:\/\/doi.org\/10.1109\/ACCESS.2024.3366656","journal-title":"IEEE Access"},{"key":"697_CR186","doi-asserted-by":"publisher","unstructured":"Akbar MA, Mahmood S, Siemon D (2022) Toward Effective and Efficient DevOps using Blockchain, in Proceedings of the 26th International Conference on Evaluation and Assessment in Software Engineering, in EASE \u201922. New York, NY, USA: Association for Computing Machinery, Jun. pp. 421\u2013427. https:\/\/doi.org\/10.1145\/3530019.3531344","DOI":"10.1145\/3530019.3531344"},{"key":"697_CR187","doi-asserted-by":"publisher","unstructured":"Loukil F, Abed M, Boukadi K (2021) Blockchain adoption in education: a systematic literature review, Educ Inf Technol, vol. 26, no. 5, pp. 5779\u20135797, Sep. https:\/\/doi.org\/10.1007\/s10639-021-10481-8","DOI":"10.1007\/s10639-021-10481-8"},{"key":"697_CR188","doi-asserted-by":"publisher","unstructured":"Tan E, Mahula S, Crompvoets J (Jan. 2022) Blockchain governance in the public sector: a conceptual framework for public management. Government Inform Q 39(1):101625. https:\/\/doi.org\/10.1016\/j.giq.2021.101625","DOI":"10.1016\/j.giq.2021.101625"}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-024-00697-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13677-024-00697-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-024-00697-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,30]],"date-time":"2024-09-30T09:02:38Z","timestamp":1727686958000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofcloudcomputing.springeropen.com\/articles\/10.1186\/s13677-024-00697-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,30]]},"references-count":188,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,12]]}},"alternative-id":["697"],"URL":"https:\/\/doi.org\/10.1186\/s13677-024-00697-7","relation":{"references":[{"id-type":"uri","id":"","asserted-by":"subject"}]},"ISSN":["2192-113X"],"issn-type":[{"value":"2192-113X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,9,30]]},"assertion":[{"value":"30 April 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 August 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 September 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"The authors declare no conflicts of interest to report regarding the present study.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"146"}}