{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,6]],"date-time":"2024-10-06T01:15:53Z","timestamp":1728177353550},"reference-count":56,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Future Generation Computer Systems"],"published-print":{"date-parts":[[2024,1]]},"DOI":"10.1016\/j.future.2023.08.010","type":"journal-article","created":{"date-parts":[[2023,8,12]],"date-time":"2023-08-12T20:36:01Z","timestamp":1691872561000},"page":"49-63","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":8,"special_numbering":"C","title":["Differential privacy model for blockchain based smart home architecture"],"prefix":"10.1016","volume":"150","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-0898-5417","authenticated-orcid":false,"given":"Amjad","family":"Qashlan","sequence":"first","affiliation":[]},{"given":"Priyadarsi","family":"Nanda","sequence":"additional","affiliation":[]},{"given":"Manoranjan","family":"Mohanty","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"9","key":"10.1016\/j.future.2023.08.010_b1","doi-asserted-by":"crossref","first-page":"2784","DOI":"10.3390\/s18092784","article-title":"A hypergraph-based blockchain model and application in internet of things-enabled smart homes","volume":"18","author":"Qu","year":"2018","journal-title":"Sensors"},{"key":"10.1016\/j.future.2023.08.010_b2","article-title":"Privacy-preserving transactive energy management for IoT-aided smart homes via blockchain","author":"Yang","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.future.2023.08.010_b3","doi-asserted-by":"crossref","first-page":"117802","DOI":"10.1109\/ACCESS.2020.3004662","article-title":"Investigating smart home security: Is blockchain the answer?","volume":"8","author":"Arif","year":"2020","journal-title":"IEEE Access"},{"key":"10.1016\/j.future.2023.08.010_b4","doi-asserted-by":"crossref","first-page":"512","DOI":"10.1016\/j.future.2019.02.060","article-title":"Privacy preservation in blockchain based IoT systems: Integration issues, prospects, challenges, and future research directions","volume":"97","author":"Hassan","year":"2019","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.future.2023.08.010_b5","series-title":"2019 IEEE International Conference on Pervasive Computing and Communications (PerCom","first-page":"1","article-title":"Aggregating crowd wisdom via blockchain: A private, correct, and robust realization","author":"Duan","year":"2019"},{"key":"10.1016\/j.future.2023.08.010_b6","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1016\/j.jpdc.2020.06.003","article-title":"Differential privacy in blockchain technology: A futuristic approach","volume":"145","author":"Hassan","year":"2020","journal-title":"J. Parallel Distrib. Comput."},{"issue":"6","key":"10.1016\/j.future.2023.08.010_b7","doi-asserted-by":"crossref","first-page":"3548","DOI":"10.1109\/TII.2019.2893433","article-title":"Privacy-preserving energy trading using consortium blockchain in smart grid","volume":"15","author":"Gai","year":"2019","journal-title":"IEEE Trans. Ind. Inform."},{"key":"10.1016\/j.future.2023.08.010_b8","series-title":"2017 IEEE 6th International Conference on Renewable Energy Research and Applications (ICRERA)","first-page":"454","article-title":"Smart district through IoT and blockchain","author":"Lazaroiu","year":"2017"},{"key":"10.1016\/j.future.2023.08.010_b9","doi-asserted-by":"crossref","unstructured":"S. Aggarwal, R. Chaudhary, G.S. Aujla, A. Jindal, A. Dua, N. Kumar, Energychain: Enabling energy trading for smart homes using blockchains in smart grid ecosystem, in: Proceedings of the 1st ACM MobiHoc Workshop on Networking and Cybersecurity for Smart Cities, 2018, pp. 1\u20136.","DOI":"10.1145\/3214701.3214704"},{"key":"10.1016\/j.future.2023.08.010_b10","series-title":"2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","first-page":"618","article-title":"Blockchain for IoT security and privacy: The case study of a smart home","author":"Dorri","year":"2017"},{"key":"10.1016\/j.future.2023.08.010_b11","series-title":"2017 International Conference on Information and Communication Technology Convergence","first-page":"1165","article-title":"Blockchain based smart door lock system","author":"Han","year":"2017"},{"key":"10.1016\/j.future.2023.08.010_b12","doi-asserted-by":"crossref","first-page":"1027","DOI":"10.1016\/j.future.2019.09.050","article-title":"An efficient lightweight integrated blockchain (ELIB) model for IoT security and privacy","volume":"102","author":"Mohanty","year":"2020","journal-title":"Future Gener. Comput. Syst."},{"issue":"1","key":"10.1016\/j.future.2023.08.010_b13","first-page":"1","article-title":"A blockchain-based smart home gateway architecture for preventing data forgery","volume":"10","author":"Lee","year":"2020","journal-title":"Hum.-centric Comput. Inform. Sci."},{"key":"10.1016\/j.future.2023.08.010_b14","doi-asserted-by":"crossref","first-page":"180","DOI":"10.1016\/j.jpdc.2019.08.005","article-title":"LSB: A lightweight scalable blockchain for IoT security and anonymity","volume":"134","author":"Dorri","year":"2019","journal-title":"J. Parallel Distrib. Comput."},{"key":"10.1016\/j.future.2023.08.010_b15","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1016\/j.future.2019.05.023","article-title":"Securing IoTs in distributed blockchain: Analysis, requirements and open issues","volume":"100","author":"Moin","year":"2019","journal-title":"Future Gener. Comput. Syst."},{"issue":"4","key":"10.1016\/j.future.2023.08.010_b16","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1109\/MITP.2017.3051335","article-title":"Can blockchain strengthen the internet of things?","volume":"19","author":"Kshetri","year":"2017","journal-title":"IT Professional"},{"key":"10.1016\/j.future.2023.08.010_b17","series-title":"2018 IEEE International Conference on Internet of Things (IThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)","first-page":"81","article-title":"Improving iot services in smart-home using blockchain smart contract","author":"Zhou","year":"2018"},{"key":"10.1016\/j.future.2023.08.010_b18","article-title":"Blockchain empowered differentially private and auditable data publishing in industrial IoT","author":"Xu","year":"2020","journal-title":"IEEE Trans. Ind. Inform."},{"issue":"4","key":"10.1016\/j.future.2023.08.010_b19","doi-asserted-by":"crossref","DOI":"10.1177\/1550147719844159","article-title":"SH-BlockCC: A secure and efficient internet of things smart home architecture based on cloud computing and blockchain technology","volume":"15","author":"Singh","year":"2019","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"10.1016\/j.future.2023.08.010_b20","doi-asserted-by":"crossref","first-page":"62058","DOI":"10.1109\/ACCESS.2019.2916345","article-title":"Homomorphic consortium blockchain for smart home system sensitive data privacy preserving","volume":"7","author":"She","year":"2019","journal-title":"IEEE Access"},{"key":"10.1016\/j.future.2023.08.010_b21","series-title":"2017 2nd International Conference on Information Technology (INCIT)","first-page":"1","article-title":"Review of ethereum: Smart home case study","author":"Aung","year":"2017"},{"issue":"1","key":"10.1016\/j.future.2023.08.010_b22","doi-asserted-by":"crossref","first-page":"577","DOI":"10.1109\/COMST.2015.2459691","article-title":"A survey of public-key cryptographic primitives in wireless sensor networks","volume":"18","author":"Shim","year":"2015","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"10.1016\/j.future.2023.08.010_b23","series-title":"IFIP International Summer School on Privacy and Identity Management","first-page":"15","article-title":"Big data privacy and anonymization","author":"Torra","year":"2016"},{"key":"10.1016\/j.future.2023.08.010_b24","series-title":"2013 APWG ECrime Researchers Summit","first-page":"1","article-title":"An inquiry into money laundering tools in the bitcoin ecosystem","author":"M\u00f6ser","year":"2013"},{"issue":"4","key":"10.1016\/j.future.2023.08.010_b25","doi-asserted-by":"crossref","first-page":"3416","DOI":"10.1109\/COMST.2018.2842460","article-title":"A survey on security and privacy issues of bitcoin","volume":"20","author":"Conti","year":"2018","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"10.1016\/j.future.2023.08.010_b26","series-title":"Automata, Languages and Programming: 33rd International Colloquium, ICALP2006, Venice, Italy, July 10-14, 2006, Proceedings, Part I, vol. 4051","author":"Bugliesi","year":"2006"},{"key":"10.1016\/j.future.2023.08.010_b27","series-title":"IFIP International Summer School on Privacy and Identity Management","first-page":"201","article-title":"Using differential privacy for the internet of things","author":"Rodr\u00edguez","year":"2016"},{"issue":"1\u20132","key":"10.1016\/j.future.2023.08.010_b28","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1007\/s00450-016-0310-y","article-title":"Differential privacy for real smart metering data","volume":"32","author":"Eibl","year":"2017","journal-title":"Comput. Sci. Res. Dev."},{"key":"10.1016\/j.future.2023.08.010_b29","series-title":"2018 IEEE Globecom Workshops (GC Wkshps)","first-page":"1","article-title":"BHEEM: A blockchain-based framework for securing electronic health records","author":"Vora","year":"2018"},{"key":"10.1016\/j.future.2023.08.010_b30","series-title":"2019 IEEE International Conference on Big Data (Big Data)","first-page":"5469","article-title":"Asynchronous blockchain-based privacy-preserving training framework for disease diagnosis","author":"Chen","year":"2019"},{"issue":"6","key":"10.1016\/j.future.2023.08.010_b31","doi-asserted-by":"crossref","first-page":"4156","DOI":"10.1109\/TII.2019.2948094","article-title":"Differential privacy-based blockchain for industrial internet-of-things","volume":"16","author":"Gai","year":"2019","journal-title":"IEEE Trans. Ind. Inform."},{"key":"10.1016\/j.future.2023.08.010_b32","series-title":"On the renyi differential privacy of the shuffle model","author":"Girgis","year":"2021"},{"key":"10.1016\/j.future.2023.08.010_b33","series-title":"International Conference on Machine Learning","first-page":"5200","article-title":"SGD: General analysis and improved rates","author":"Gower","year":"2019"},{"key":"10.1016\/j.future.2023.08.010_b34","series-title":"Performance evaluation of differential privacy mechanisms in blockchain based smart metering","author":"Hassan","year":"2020"},{"key":"10.1016\/j.future.2023.08.010_b35","unstructured":"B. Jayaraman, D. Evans, Evaluating differentially private machine learning in practice, in: 28th {USENIX} Security Symposium ({USENIX} Security 19), 2019, pp. 1895\u20131912."},{"issue":"3","key":"10.1016\/j.future.2023.08.010_b36","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1109\/MNET.011.2000514","article-title":"A machine learning approach for blockchain-based smart home networks security","volume":"35","author":"Khan","year":"2020","journal-title":"IEEE Netw."},{"key":"10.1016\/j.future.2023.08.010_b37","series-title":"International Conference on Mobile Networks and Management","first-page":"30","article-title":"Towards developing network forensic mechanism for botnet activities in the iot based on machine learning techniques","author":"Koroniotis","year":"2017"},{"key":"10.1016\/j.future.2023.08.010_b38","doi-asserted-by":"crossref","DOI":"10.1016\/j.sysarc.2020.101954","article-title":"TP2SF: A Trustworthy Privacy-Preserving Secured Framework for sustainable smart cities by leveraging blockchain and machine learning","volume":"115","author":"Kumar","year":"2021","journal-title":"J. Syst. Archit."},{"key":"10.1016\/j.future.2023.08.010_b39","series-title":"2017 IEEE 30th Computer Security Foundations Symposium (CSF)","first-page":"263","article-title":"R\u00e9nyi differential privacy","author":"Mironov","year":"2017"},{"key":"10.1016\/j.future.2023.08.010_b40","series-title":"R\u2216\u2019enyi differential privacy of the sampled Gaussian mechanism","author":"Mironov","year":"2019"},{"key":"10.1016\/j.future.2023.08.010_b41","doi-asserted-by":"crossref","unstructured":"A. Qashlan, P. Nanda, X. He, Security and Privacy Implementation in Smart Home: Attributes Based Access Control and Smart Contracts, in: 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), IEEE, pp. 951\u2013958.","DOI":"10.1109\/TrustCom50675.2020.00127"},{"key":"10.1016\/j.future.2023.08.010_b42","series-title":"2019 IEEE Global Communications Conference","first-page":"1","article-title":"A blockchain model for fair data sharing in deregulated smart grids","author":"Samuel","year":"2019"},{"key":"10.1016\/j.future.2023.08.010_b43","series-title":"2017 IEEE Symposium on Security and Privacy (SP)","first-page":"3","article-title":"Membership inference attacks against machine learning models","author":"Shokri","year":"2017"},{"key":"10.1016\/j.future.2023.08.010_b44","series-title":"The 22nd International Conference on Artificial Intelligence and Statistics","first-page":"1226","article-title":"Subsampled r\u00e9nyi differential privacy and analytical moments accountant","author":"Wang","year":"2019"},{"issue":"6","key":"10.1016\/j.future.2023.08.010_b45","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1109\/MCC.2018.064181122","article-title":"Differentially private data sharing in a cloud federation with blockchain","volume":"5","author":"Yang","year":"2018","journal-title":"IEEE Cloud Comput."},{"key":"10.1016\/j.future.2023.08.010_b46","doi-asserted-by":"crossref","first-page":"103275","DOI":"10.1109\/ACCESS.2019.2931982","article-title":"A self-controllable and balanced data sharing model","volume":"7","author":"Dong","year":"2019","journal-title":"IEEE Access"},{"key":"10.1016\/j.future.2023.08.010_b47","series-title":"International Conference on Critical Infrastructure Protection","first-page":"113","article-title":"Protecting infrastructure data via enhanced access control, blockchain and differential privacy","author":"Alnemari","year":"2018"},{"key":"10.1016\/j.future.2023.08.010_b48","series-title":"International Conference on Theory and Applications of Models of Computation","first-page":"1","article-title":"Differential privacy: A survey of results","author":"Dwork","year":"2008"},{"key":"10.1016\/j.future.2023.08.010_b49","series-title":"Theory of Cryptography Conference","first-page":"635","article-title":"Concentrated differential privacy: Simplifications, extensions, and lower bounds","author":"Bun","year":"2016"},{"key":"10.1016\/j.future.2023.08.010_b50","series-title":"Concentrated differential privacy","author":"Dwork","year":"2016"},{"issue":"10","key":"10.1016\/j.future.2023.08.010_b51","doi-asserted-by":"crossref","first-page":"2475","DOI":"10.1109\/TIFS.2018.2819134","article-title":"Learning the truth privately and confidently: Encrypted confidence-aware truth discovery in mobile crowdsensing","volume":"13","author":"Zheng","year":"2018","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.future.2023.08.010_b52","doi-asserted-by":"crossref","unstructured":"M. Abadi, A. Chu, I. Goodfellow, H.B. McMahan, I. Mironov, K. Talwar, L. Zhang, Deep learning with differential privacy, in: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016, pp. 308\u2013318.","DOI":"10.1145\/2976749.2978318"},{"key":"10.1016\/j.future.2023.08.010_b53","series-title":"International Conference on Machine Learning","first-page":"7634","article-title":"Poission subsampled r\u00e9nyi differential privacy","author":"Zhu","year":"2019"},{"key":"10.1016\/j.future.2023.08.010_b54","series-title":"2018 IEEE 31st Computer Security Foundations Symposium","first-page":"268","article-title":"Privacy risk in machine learning: Analyzing the connection to overfitting","author":"Yeom","year":"2018"},{"issue":"9","key":"10.1016\/j.future.2023.08.010_b55","doi-asserted-by":"crossref","first-page":"6092","DOI":"10.1109\/TII.2020.2974555","article-title":"A trustworthy privacy preserving framework for machine learning in industrial iot systems","volume":"16","author":"Arachchige","year":"2020","journal-title":"IEEE Trans. Ind. Inform."},{"key":"10.1016\/j.future.2023.08.010_b56","doi-asserted-by":"crossref","unstructured":"M. Abadi, TensorFlow: learning functions at scale, in: Proceedings of the 21st ACM SIGPLAN International Conference on Functional Programming, 2016, pp. 1\u20131.","DOI":"10.1145\/2951913.2976746"}],"container-title":["Future Generation Computer Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167739X23003102?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167739X23003102?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,3,22]],"date-time":"2024-03-22T00:56:14Z","timestamp":1711068974000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167739X23003102"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1]]},"references-count":56,"alternative-id":["S0167739X23003102"],"URL":"https:\/\/doi.org\/10.1016\/j.future.2023.08.010","relation":{},"ISSN":["0167-739X"],"issn-type":[{"value":"0167-739X","type":"print"}],"subject":[],"published":{"date-parts":[[2024,1]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Differential privacy model for blockchain based smart home architecture","name":"articletitle","label":"Article Title"},{"value":"Future Generation Computer Systems","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.future.2023.08.010","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2023 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}]}}