{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T01:29:59Z","timestamp":1760232599404,"version":"build-2065373602"},"reference-count":31,"publisher":"MDPI AG","issue":"6","license":[{"start":{"date-parts":[[2022,11,19]],"date-time":"2022-11-19T00:00:00Z","timestamp":1668816000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Singapore-UK Cyber Security of EPSRC","award":["EP\/N020170\/1","20YJCZH102"],"award-info":[{"award-number":["EP\/N020170\/1","20YJCZH102"]}]},{"name":"MOE Humanities, and Social Sciences Foundation of China","award":["EP\/N020170\/1","20YJCZH102"],"award-info":[{"award-number":["EP\/N020170\/1","20YJCZH102"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Systems"],"abstract":"<jats:p>Data assets trading can encourage owners to distribute data and achieve large-scale data aggregation to promote the development of the supply chain system. Blockchain is a promising platform for constructing a decentralized data marketplace. The data may face risks in the marketplace, such as illegal theft, malicious tampering, or illegal distribution in the transactions process. The data ownership confirmation in a blockchain-empowered marketplace has attracted much attention in recent years. However, challenges still remain, including maintaining data integrity, traceability of illegal data, and accountability. In this paper, we propose a new data ownership confirmation scheme (DOCS) in the transaction scenario of blockchain-empowered distributed data assets trading. It integrates smart contracts, data-embedding technology, and data fingerprint to realize ownership confirmation and protection of data assets in transactions. DOCS ensures reliable mapping between on-chain data ownership information and off-chain data entities, which assists with the accurate prosecution of the illegal distribution of data assets. We demonstrate that DOCS can have desirable security properties in multiple attack models.<\/jats:p>","DOI":"10.3390\/systems10060226","type":"journal-article","created":{"date-parts":[[2022,11,21]],"date-time":"2022-11-21T03:09:30Z","timestamp":1669000170000},"page":"226","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["DOCS: A Data Ownership Confirmation Scheme for Distributed Data Trading"],"prefix":"10.3390","volume":"10","author":[{"given":"Yang","family":"Liu","sequence":"first","affiliation":[{"name":"Institute of Logistics Science and Engineering, Shanghai Maritime University, Shanghai 200120, China"}]},{"given":"Yang","family":"Zhang","sequence":"additional","affiliation":[{"name":"Institute of Logistics Science and Engineering, Shanghai Maritime University, Shanghai 200120, China"}]},{"given":"Yongsheng","family":"Yang","sequence":"additional","affiliation":[{"name":"Institute of Logistics Science and Engineering, Shanghai Maritime University, Shanghai 200120, China"}]},{"given":"Yan","family":"Ma","sequence":"additional","affiliation":[{"name":"School of Accounting, Nanjing University of Finance and Economics, Nanjing 210023, China"},{"name":"School of Computing, National University of Singapore, Singapore 119077, Singapore"}]}],"member":"1968","published-online":{"date-parts":[[2022,11,19]]},"reference":[{"key":"ref_1","first-page":"9","article-title":"Bitcoin: A Peer-to-Peer Electronic Cash System","volume":"21260","author":"Nakamoto","year":"2008","journal-title":"Decentralized Bus. Rev."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"2084","DOI":"10.1109\/COMST.2016.2535718","article-title":"Bitcoin and beyond: A Technical Survey on Decentralized Digital Currencies","volume":"18","author":"Tschorsch","year":"2016","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Sharma, P., Jindal, R., and Borah, M.D. (2022). A Review of Smart Contract-Based Platforms, Applications, and Challenges. Cluster Comput., in press.","DOI":"10.1007\/s10586-021-03491-1"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"100109","DOI":"10.1016\/j.iot.2019.100109","article-title":"Capacity of Blockchain Based Internet-of-Things: Testbed and Analysis","volume":"8","author":"Wang","year":"2019","journal-title":"Internet Things"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Leiba, O., Yitzchak, Y., Bitton, R., Nadler, A., and Shabtai, A. (2018, January 24\u201326). Incentivized delivery network of IoT software updates based on trustless proof-of-distribution. Proceedings of the 2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), London, UK.","DOI":"10.1109\/EuroSPW.2018.00011"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Azaria, A., Ekblaw, A., Vieira, T., and Lippman, A. (2016, January 22\u201324). Medrec: Using blockchain for medical data access and permission management. Proceedings of the 2016 2nd international conference on open and big data (OBD), Vienna, Austria.","DOI":"10.1109\/OBD.2016.11"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1002\/int.22293","article-title":"Data Security Sharing Model Based on Privacy Protection for Blockchain-enabled Industrial Internet of Things","volume":"36","author":"Zhang","year":"2021","journal-title":"Int. J. Intell. Syst."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"305","DOI":"10.1108\/IJPDLM-08-2019-0234","article-title":"Blockchain as Supply Chain Technology: Considering Transparency and Security","volume":"51","author":"Xu","year":"2021","journal-title":"Int. J. Phys. Distrib. Logist. Manag."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1016\/j.aej.2021.04.079","article-title":"Supply Chain Financial Service Management System Based on Block Chain IoT Data Sharing and Edge Computing","volume":"61","author":"Wang","year":"2022","journal-title":"Alex. Eng. J."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"102616","DOI":"10.1016\/j.omega.2022.102616","article-title":"The Information Leakage Strategies of the Supply Chain under the Block Chain Technology Introduction","volume":"110","author":"Li","year":"2022","journal-title":"Omega"},{"key":"ref_11","unstructured":"Kuo, T.-T., and Ohno-Machado, L. (2018). Modelchain: Decentralized Privacy-Preserving Healthcare Predictive Modeling Framework on Private Blockchain Networks. arXiv."},{"key":"ref_12","first-page":"119","article-title":"The Truth about Blockchain","volume":"95","author":"Lakhani","year":"2017","journal-title":"Harv. Bus. Rev."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"449","DOI":"10.1016\/j.ins.2018.11.028","article-title":"Machine Learning Based Privacy-Preserving Fair Data Trading in Big Data Market","volume":"478","author":"Zhao","year":"2019","journal-title":"Inf. Sci."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"102953","DOI":"10.1016\/j.jnca.2020.102953","article-title":"A Multi-Type and Decentralized Data Transaction Scheme Based on Smart Contracts and Digital Watermarks","volume":"176","author":"Xiang","year":"2021","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"102518","DOI":"10.1016\/j.ipm.2021.102518","article-title":"A Blockchain-Based Code Copyright Management System","volume":"58","author":"Jing","year":"2021","journal-title":"Inf. Process. Manag."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Luu, L., Teutsch, J., Kulkarni, R., and Saxena, P. (2015, January 12\u201316). Demystifying incentives in the consensus computer. Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, 12\u201316 October 2015, Denver, CO, USA.","DOI":"10.1145\/2810103.2813659"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"1520","DOI":"10.1007\/s12083-021-01096-4","article-title":"Copyright Protection Method of Big Data Based on Nash Equilibrium and Constraint Optimization","volume":"14","author":"Xu","year":"2021","journal-title":"Peer-Peer Netw. Appl."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1016\/j.jpdc.2021.02.022","article-title":"A Secured Distributed Detection System Based on IPFS and Blockchain for Industrial Image and Video Data Security","volume":"152","author":"Kumar","year":"2021","journal-title":"J. Parallel Distrib. Comput."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Nasonov, D., Visheratin, A.A., and Boukhanovsky, A. (2018, January 12\u201314). Blockchain-based transaction integrity in distributed big data marketplace. Proceedings of the International Conference on Computational Science, Faro, Portugal.","DOI":"10.1007\/978-3-319-93698-7_43"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Zhou, J., Tang, F., Zhu, H., Nan, N., and Zhou, Z. (August, January 30). Distributed data vending on blockchain. Proceedings of the 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Halifax, NS, Canada.","DOI":"10.1109\/Cybermatics_2018.2018.00201"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Strehle, E., and Maurer, M. (2021, January 21\u201323). The DibiChain protocol: Privacy-preserving discovery and exchange of supply chain information. Proceedings of the International Conference on Model and Data Engineering, Tallinn, Estonia.","DOI":"10.1007\/978-3-030-87657-9_18"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Nawaz, A., Pe\u00f1a Queralta, J., Guan, J., Awais, M., Gia, T.N., Bashir, A.K., Kan, H., and Westerlund, T. (2020). Edge Computing to Secure Iot Data Ownership and Trade with the Ethereum Blockchain. Sensors, 20.","DOI":"10.3390\/s20143965"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Vincent, P., Larochelle, H., Bengio, Y., and Manzagol, P.-A. (2008, January 5\u20139). Extracting and composing robust features with denoising autoencoders. Proceedings of the 25th International Conference on Machine Learning, Helsinki, Finland.","DOI":"10.1145\/1390156.1390294"},{"key":"ref_24","unstructured":"Sutskever, I., Vinyals, O., and Le, Q.V. (2015). Sequence to sequence learning with neural networks. Advances in Neural Information Processing Systems, Proceedings of the 28th Annual Conference on Neural Information Processing Systems 2014 [(NIPS)], Montreal, QC, Canada, 8\u201313 December 2014, Curran."},{"key":"ref_25","unstructured":"Salah, R., Vincent, P., and Muller, X. (July, January 28). Contractive auto-encoders: Explicit invariance during feature extraction. Proceedings of the 28th International Conference on Machine Learning, Washington, DC, USA."},{"key":"ref_26","unstructured":"Bellet, A., Habrard, A., and Sebban, M. (2013). A Survey on Metric Learning for Feature Vectors and Structured Data. arXiv."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"3789","DOI":"10.1109\/TIP.2014.2332398","article-title":"Decomposition-Based Transfer Distance Metric Learning for Image Classification","volume":"23","author":"Luo","year":"2014","journal-title":"IEEE Trans. Image Process."},{"key":"ref_28","unstructured":"Lafferty, J., Williams, C., Shawe-Taylor, J., Zemel, R., and Culotta, A. (2010). Large margin multi-task metric learning. Advances in Neural Information Processing Systems 23 (NIPS 2010), NIPS."},{"key":"ref_29","unstructured":"Szabo, N. (2022, September 01). Smart Contracts. Available online: https:\/\/www.fon.hum.uva.nl\/rob\/Courses\/InformationInSpeech\/CDROM\/Literature\/LOTwinterschool2006\/szabo.best.vwh.net\/smart.contracts.html."},{"key":"ref_30","first-page":"1","article-title":"Ethereum: A Secure Decentralised Generalised Transaction Ledger","volume":"151","author":"Wood","year":"2014","journal-title":"Ethereum Proj. Yellow Pap."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Das, S., Ribeiro, V.J., and Anand, A. (2018). YODA: Enabling Computationally Intensive Contracts on Blockchains with Byzantine and Selfish Nodes. arXiv.","DOI":"10.14722\/ndss.2019.23142"}],"container-title":["Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2079-8954\/10\/6\/226\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T01:22:04Z","timestamp":1760145724000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2079-8954\/10\/6\/226"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,19]]},"references-count":31,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2022,12]]}},"alternative-id":["systems10060226"],"URL":"https:\/\/doi.org\/10.3390\/systems10060226","relation":{},"ISSN":["2079-8954"],"issn-type":[{"type":"electronic","value":"2079-8954"}],"subject":[],"published":{"date-parts":[[2022,11,19]]}}}