{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T04:30:09Z","timestamp":1772166609036,"version":"3.50.1"},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,9,13]],"date-time":"2024-09-13T00:00:00Z","timestamp":1726185600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2024,9,13]],"date-time":"2024-09-13T00:00:00Z","timestamp":1726185600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"The National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62272007"],"award-info":[{"award-number":["62272007"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"The Natural Science Foundation of Beijing","award":["4234083"],"award-info":[{"award-number":["4234083"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"DOI":"10.1186\/s13677-024-00704-x","type":"journal-article","created":{"date-parts":[[2024,9,13]],"date-time":"2024-09-13T12:25:25Z","timestamp":1726230325000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["A trusted IoT data sharing method based on secure multi-party computation"],"prefix":"10.1186","volume":"13","author":[{"given":"Li","family":"Ma","sequence":"first","affiliation":[]},{"given":"Binbin","family":"Duan","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yingxun","family":"Fu","sequence":"additional","affiliation":[]},{"given":"Dongchao","family":"Ma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,13]]},"reference":[{"key":"704_CR1","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1016\/j.future.2019.02.050","volume":"97","author":"WZ Khan","year":"2019","unstructured":"Khan WZ, Ahmed E, Hakak S et al (2019) Edge computing: a survey [J]. Future Generation Comput Syst 97:219\u2013235","journal-title":"Future Generation Comput Syst"},{"key":"704_CR2","doi-asserted-by":"crossref","unstructured":"Ansari MS, Alsamhi SH, Qiao Y et al (2020) Security of distributed intelligence in edge computing: Threats and countermeasures [J]. The Cloud-to-Thing Continuum: Opportunities and Challenges in Cloud, Fog and Edge Computing, : 95\u2013122","DOI":"10.1007\/978-3-030-41110-7_6"},{"issue":"3","key":"704_CR3","doi-asserted-by":"publisher","first-page":"2027","DOI":"10.1109\/COMST.2016.2548426","volume":"18","author":"M Conti","year":"2016","unstructured":"Conti M, Dragoni N, Lesyk V (2016) A survey of man in the middle attacks [J]. IEEE Commun Surv Tutorials 18(3):2027\u20132051","journal-title":"IEEE Commun Surv Tutorials"},{"key":"704_CR4","doi-asserted-by":"crossref","unstructured":"Pedersen TP (1991) Non-interactive and information-theoretic secure verifiable secret sharing [C]\/\/Annual international cryptology conference. Berlin, Heidelberg: Springer Berlin Heidelberg, : 129\u2013140","DOI":"10.1007\/3-540-46766-1_9"},{"key":"704_CR5","unstructured":"Huigui R, Jinxia M, Bingguo C, Guang S, Fei L Key distribution and recovery algorithm based on Shamir Secret sharing [J]. J Commun 2015, 36(03):64\u201373"},{"issue":"5","key":"704_CR6","doi-asserted-by":"publisher","first-page":"2685","DOI":"10.1109\/TNSE.2022.3168025","volume":"10","author":"Y Liu","year":"2023","unstructured":"Liu Y, Yu W, Ai Z, Xu G, Zhao L, Tian Z (2023) A blockchain-empowered Federated Learning in Healthcare-based Cyber Physical systems. IEEE Trans Netw Sci Eng 10(5):2685\u20132696. https:\/\/doi.org\/10.1109\/TNSE.2022.3168025","journal-title":"IEEE Trans Netw Sci Eng"},{"issue":"4","key":"704_CR7","doi-asserted-by":"publisher","first-page":"880","DOI":"10.1109\/JSAC.2023.3345416","volume":"42","author":"Y Liu","year":"2024","unstructured":"Liu Y, Zhang Y, Su S et al (2024) BlockSC: a Blockchain empowered spatial Crowdsourcing Service in Metaverse while preserving user location privacy [J]. IEEE J Sel Areas Commun 42(4):880\u2013891. https:\/\/doi.org\/10.1109\/JSAC.2023.3345416","journal-title":"IEEE J Sel Areas Commun"},{"key":"704_CR8","doi-asserted-by":"crossref","unstructured":"Sikeridis D, Bidram A, Devetsikiotis M et al (2020) A blockchain-based mechanism for secure data exchange in smart grid protection systems [C]\/\/2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC). IEEE, : 1\u20136","DOI":"10.1109\/CCNC46108.2020.9045368"},{"key":"704_CR9","doi-asserted-by":"publisher","first-page":"102481","DOI":"10.1016\/j.jnca.2019.102481","volume":"149","author":"J Sengupta","year":"2020","unstructured":"Sengupta J, Ruj S, Bit SD (2020) A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT [J]. J Netw Comput Appl 149:102481","journal-title":"J Netw Comput Appl"},{"issue":"18","key":"704_CR10","doi-asserted-by":"publisher","first-page":"5943","DOI":"10.1002\/sec.1748","volume":"9","author":"A Ouaddah","year":"2016","unstructured":"Ouaddah A, Abou Elkalam A, Ait Ouahman A (2016) FairAccess: a new Blockchain-based access control framework for the internet of things [J]. Secur Communication Networks 9(18):5943\u20135964","journal-title":"Secur Communication Networks"},{"issue":"6","key":"704_CR11","doi-asserted-by":"publisher","first-page":"3516","DOI":"10.1109\/TII.2018.2890203","volume":"15","author":"CH Liu","year":"2018","unstructured":"Liu CH, Lin Q, Wen S (2018) Blockchain-enabled data collection and sharing for industrial IoT with deep reinforcement learning [J]. IEEE Trans Industr Inf 15(6):3516\u20133526","journal-title":"IEEE Trans Industr Inf"},{"key":"704_CR12","doi-asserted-by":"crossref","unstructured":"Liang X, An N, Li D A Blockchain and ABAC Based Data Access Control Scheme in Smart Grid [C]\/\/2022 International Conference on Blockchain Technology and, Security I et al (2022) (ICBCTIS). IEEE, : 52\u201355","DOI":"10.1109\/ICBCTIS55569.2022.00023"},{"issue":"12","key":"704_CR13","doi-asserted-by":"publisher","first-page":"9259","DOI":"10.1109\/TII.2022.3177630","volume":"18","author":"Y Yang","year":"2022","unstructured":"Yang Y, Wu J, Long C et al (2022) Blockchain-enabled multiparty computation for privacy preserving and public audit in Industrial IoT [J]. IEEE Trans Industr Inf 18(12):9259\u20139267","journal-title":"IEEE Trans Industr Inf"},{"issue":"3","key":"704_CR14","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1108\/JMTM-03-2019-0118","volume":"31","author":"PJ Zelbst","year":"2020","unstructured":"Zelbst PJ, Green KW, Sower VE et al (2020) The impact of RFID, IIoT, and Blockchain technologies on supply chain transparency [J]. J Manuf Technol Manage 31(3):441\u2013457","journal-title":"J Manuf Technol Manage"},{"key":"704_CR15","doi-asserted-by":"publisher","first-page":"176935","DOI":"10.1109\/ACCESS.2019.2956748","volume":"7","author":"T Alladi","year":"2019","unstructured":"Alladi T, Chamola V, Parizi RM et al (2019) Blockchain applications for industry 4.0 and industrial IoT: a review [J]. Ieee Access 7:176935\u2013176951","journal-title":"Ieee Access"},{"issue":"11","key":"704_CR16","doi-asserted-by":"publisher","first-page":"7669","DOI":"10.1109\/TII.2021.3049141","volume":"17","author":"K Yu","year":"2021","unstructured":"Yu K, Tan L, Aloqaily M et al (2021) Blockchain-enhanced data sharing with traceable and direct revocation in IIoT [J]. IEEE Trans Industr Inf 17(11):7669\u20137678","journal-title":"IEEE Trans Industr Inf"},{"issue":"05","key":"704_CR17","first-page":"987","volume":"46","author":"C Wu Hongyue","year":"2019","unstructured":"Wu Hongyue C, Zhiwei SHI, Bowen DENG, Shuiguang C, Shizhan XUE, Xiao FENG, Zhiyong (2019) A decentralized service request distribution method for edge computing environment [J]. Chin J Comput 46(05):987\u20131002","journal-title":"Chin J Comput"},{"key":"704_CR18","doi-asserted-by":"publisher","first-page":"85714","DOI":"10.1109\/ACCESS.2020.2991734","volume":"8","author":"K Cao","year":"2020","unstructured":"Cao K, Liu Y, Meng G et al (2020) An overview on edge computing research [J]. IEEE Access 8:85714\u201385728","journal-title":"IEEE Access"},{"issue":"9","key":"704_CR19","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1109\/MCOM.2018.1701231","volume":"56","author":"B Chen","year":"2018","unstructured":"Chen B, Wan J, Celesti A et al (2018) Edge computing in IoT-based manufacturing [J]. IEEE Commun Mag 56(9):103\u2013109","journal-title":"IEEE Commun Mag"},{"key":"704_CR20","unstructured":"Permission L, Yanbiao X Gaogang Efficient data name search method based on mixed Count Bloom Filter [J]. J Comput Res Dev 2023, 60(05):1136\u20131150"},{"key":"704_CR21","doi-asserted-by":"crossref","unstructured":"Ghadamyari M, Samet S (2019) Privacy-Preserving Statistical Analysis of Health Data Using Paillier Ho momorphic Encryption and Permissioned Blockchain [C].In:2019 IEEE International Conference on Big Data(Big Data),5474\u20135479","DOI":"10.1109\/BigData47090.2019.9006231"},{"key":"704_CR22","unstructured":"Jianhua H, Huiya J,Zhongcheng L.Constructing fair secure multi-party computation based on blockchain [J]. Appl Res Comput 2020, 37:225\u2013244"},{"key":"704_CR23","unstructured":"Zyskind G, Nathan O,Pentland A Enigma:Decentralized computation platform with guaranteed privacy [J].arXiv preprint arXiv:1506.03471,2015"},{"key":"704_CR24","unstructured":"Kang H, Ji S Hierarchical Stackelberg Game Swarm learning incentive method for Wireless Edge Network [J\/OL]"}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-024-00704-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13677-024-00704-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-024-00704-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,13]],"date-time":"2024-09-13T12:29:29Z","timestamp":1726230569000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofcloudcomputing.springeropen.com\/articles\/10.1186\/s13677-024-00704-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,13]]},"references-count":24,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,12]]}},"alternative-id":["704"],"URL":"https:\/\/doi.org\/10.1186\/s13677-024-00704-x","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-3893891\/v1","asserted-by":"object"}]},"ISSN":["2192-113X"],"issn-type":[{"value":"2192-113X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,9,13]]},"assertion":[{"value":"24 January 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 September 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 September 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"138"}}