Abstract
Traditional digital copyright protection relies on centralized authorities, which often lacks transparency and struggle to guarantee data security during ownership transfer. Furthermore, ownership changes require re-confirmation of copyrightwhich costs more time and wastes storage resources. Here a blockchain-based digital copyright transaction scheme is proposed which supports data redaction. Here multi-center chameleon hashing is used for modifying the copyright information in the transaction process. At the same time, a flexible and controllable permission node management mechanism is designed, proposed and implemented here and the optimized attribute encryption mechanism is used for providing the security protection for the node private key. The experimental results and security analysis have shown that the scheme has satisfied the data confidentiality of the copyright transferor, resistance to malicious nodes, and the confidentiality and accountability of the private key of the chameleon hash. In the scenario with more permission nodes, the private key broadcast in the node exit stage has higher efficiency and flexibility, so it’s effective in ensuring data confidentiality of the copyright transferor, resistance to malicious nodes, and the confidentiality and accountability of the private key of the chameleon hash in Blockchain based Internet of Things (BIoT) systems and it can be further used in Blockchain based Industrial Internet of Things (BIIOT) of present time.
Data availability
All data are in the paper.
References
Nakamoto, S. Bitcoin: A peer-to-peer electronic cash system, [Online] (2008). Available: https://bitcoin.org/bitcoin.pdf, [Accessed: Mar. 3, 2026].
Monostori, L. et al. Cyber-physical systems in manufacturing. CIRP Ann. 65 (2), 621–641. https://doi.org/10.1016/j.cirp.2016.06.005 (2016).
Li, Z., Barenji, A. V. & Huang, G. Q. Toward a Blockchain cloud manufacturing system as a peer to peer distributed network platform. Robot Comput. Integr. Manuf. 54, 133–144. https://doi.org/10.1016/j.rcim.2018.05.011 (2018).
Yu, T., Lin, Z. & Tang, Q. Blockchain: The introduction and its application in financial accounting. J. Corp. Acc. Finance. 29 (4), 37–47. https://doi.org/10.1002/jcaf.22365 (2018).
Vora, J. et al. Bheem: A Blockchain-based framework for securing electronic health records. In 2018 IEEE Globecom Workshops (GC Wkshps). 1–6. https://doi.org/10.1109/GLOCOMW.2018.8644088 (2018).
Sethi, A. & Sethi, S. Flexibility in manufacturing: A survey. Int. J. Flex. Manuf. Syst. 2 (4). https://doi.org/10.1007/BF00186471 (1990).
Lee, J., Kao, H. A. & Yang, S. Service innovation and smart analytics for Industry 4.0 and big data environment. Procedia CIRP. 16, 3–8. https://doi.org/10.1016/j.procir.2014.02.001 (2014).
Lee, J., Bagheri, B. & Kao, H. A. A Cyber-Physical Systems architecture for Industry 4.0-based manufacturing systems. Manuf. Lett. 3, 18–23. https://doi.org/10.1016/j.mfglet.2014.12.001 (2015).
Yang, L. Industry 4.0: A survey on technologies, applications and open research issues. J. Ind. Inf. Integr. 6, 1–10. https://doi.org/10.1016/j.jii.2017.04.005 (2017).
Xu, X. From cloud computing to cloud manufacturing. Robot Comput. Integr. Manuf. 28, 75–86. https://doi.org/10.1016/j.rcim.2011.07.002 (2012).
Palma, L. M. et al. Blockchain and smart contracts for higher education registry in brazil. Int. J. Netw. Manag. 29(3), e2061. https://doi.org/10.1002/nem.2061 (2019).
Zissis, D. & Lekkas, D. Addressing cloud computing security issues. Futur Gener Comput. Syst. 28 (3), 583–592. https://doi.org/10.1016/j.future.2010.12.006 (2012).
Swan, M. Rezension Blockchain: Blueprint for a New Economy. HMD 55, 1362–1364. https://doi.org/10.1365/s40702-018-00468-4 (2015).
Bhattacharjya, A., Zhong, X., Wang, J. & Xing, L. Security Challenges and Concerns of Internet of Things (IoT), In: (eds Guo, S. & Zeng, D.) Cyber-Physical Systems: Architecture, Security and Application, EAI/Springer Innovations in Communication and Computing, Springer, Cham: 153–185.
Bhattacharjya, A., Zhong, X., Wang, J. & Xing, L. Secure IoT Structural design for Smart Cities, In Smart Cities Cybersecurity and Privacy, Elsevier: 187–201.
Bhattacharjya, A., Zhong, X., Wang, J. & Xing, L. Present Scenarios of IoT Projects with Security Aspects Focused, In: (eds Farsi, M., Daneshkhah, A., Hosseinian-Far, A. & Jahankhani, H.) Digital Twin Technologies and Smart Cities. Internet of Things (Technology, Communications and Computing), Springer, Cham: 95–122, https://doi.org/10.1007/978-3-030-18732-3_7.
Bhattacharjya, A., Zhong, X., Wang, J. & Xing, L. CoAP—Application Layer Connection-Less Lightweight Protocol for the Internet of Things (IoT) and CoAP-IPSEC Security with DTLS Supporting CoAP, In: (eds Farsi, M., Daneshkhah, A. & Hosseinian-Far, A.) Jahankhani H. Digital Twin Technologies and Smart Cities. Internet of Things (Technology, Communications and Computing), Springer, Cham: 151–175, https://doi.org/10.1007/978-3-030-18732-3_9.
IBM Blockchain based on Hyperledger Fabric from the Linux Foundation. [Online]. Available:. (2017). https://www.ibm.com/Blockchain/hyperledger. [Accessed: Feb. 9, 2025].
Developer Hub, I. O. T. A. [Online]. (2017). Available: https://www.iota.org/research/meetthe-tangle. [Accessed: Feb. 9, 2026].
Pustišek, M. & Kos, A. Approaches to Front-End IoT Application Development for the Ethereum Blockchain. Procedia Comput. Sci. vol. 129, 410–419. https://doi.org/10.1016/j.procs.2018.03.017 (2018).
Viktor Trón, F. L. & Ethereum Specification [Online]. (2015). Available: https://github.com/ethereum/go-ethereum/wiki/Ethereum-Specification. [Accessed: Feb. 9, 2025].
Kim, M. et al. Blockchain-Enabled Maximum Evacuation System Using Hybrid Voting in Zero Trust Hiking Trail and Mountainous Terrain, IEEE Internet Things J., 12, 5, 5847–5858, https://doi.org/10.1109/JIOT.2024.3490560. (2025).
Crosby, M. et al. Blockchain technology: Beyond bitcoin, Applied Innovation, no.2, pp.(6–10). [Online]. (2016). Available: https://scet.berkeley.edu/wp-content/uploads/AIR-2016-Blockchain.pdf. [Accessed: Feb. 9, 2026].
Bailis, P. et al. Research for practice: cryptocurrencies, Blockchains, and smart contracts; hardware for deep learning. Commun. ACM. 60 (5), 48–51. https://doi.org/10.1145/3024928 (2017).
Aste, T., Tasca, P. & Centre, U. C. L. Blockchain technologies: The foreseeable impact on society and industry. Computer 50(9), 18–28. https://doi.org/10.1109/MC.2017.3571064 (2017).
Cachin, C. & Vukoli, M. Blockchains Consensus Protocols in the Wild, arXiv preprint arXiv:1707.01873. https://doi.org/10.48550/arXiv.1707.01873 (2017).
Iota. a cryptocurrency for Internet-of-Things. url: https://iota.org/.
Tangle. url: https://iota.org/IOTA_Whitepaper.pdf.
Bano, S. et al. Consensus in the Age of Blockchains. In Proceedings of the 1st ACM Conference on Advances in Financial Technologies, pp. 183–198. https://doi.org/10.1145/3318041.3355458 (2019).
Wang, W. et al. A survey on consensus mechanisms and mining strategy management in Blockchain networks. IEEE Access. 7, 22328–22370. https://doi.org/10.1109/ACCESS.2019.2896108 (2019).
Banerjee, M., Lee, J. & Raymond Choo, K. K. A Blockchain future for internet of things security: a position paper. Digit. Commun. Networks. 4 (3), 149–160. https://doi.org/10.1016/j.dcan.2017.10.006 (2017).
Baliga, A. Understanding Blockchain Consensus Models. April, [Online]. (2017). Available: https://www.persistent.com/wp-content/uploads/2017/04/WP-Understanding-Blockchain-Consensus-Models.pdf. [Accessed: Feb. 9, 2025].
Pilkington, M. Blockchain technology: principles and applications, Research handbook on digital transformations, pp. 225–253. https://doi.org/10.4337/9781784717766.00019 (2016).
Sankar, L. S., Sindhu, M. & Sethumadhavan, M. Survey of consensus protocols on Blockchain applications, In 4th international conference on advanced computing and communication systems (ICACCS). IEEE, pp.1–5. https://doi.org/10.1109/ICACCS.2017.8014672 (2017).
Underwood, S. Blockchain beyond bitcoin. Commun. ACM. 59 (11), 15–17. https://doi.org/10.1145/2994581 (2016).
Seibold Sigrid and Samman, George Consensus:Immutable agreement for the Internet of value, KPMG. [Online]. (2016). Available: https://assets.kpmg.com/content/dam/kpmg/pdf/2016/06/kpmgBlockchain-consensus-mechanism.pdf. [Accessed: Feb. 9, 2026].
Mukhopadhyay, U. et al. A brief survey of cryptocurrency systems, In Proceedings of the 14th annual conference on privacy, security and trust (PST). IEEE, pp. 745–752, (2016). https://doi.org/10.1109/PST.2016.7906988.
Awasthi, D. et al. A comprehensive review on optimization-based image watermarking techniques for copyright protection. Expert Syst. Appl. 242 (122830). https://doi.org/10.1016/j.eswa.2023.122830 (2024).
Chung, T. Y. et al. Digital watermarking for copyright protection of MPEG2 compressed video. IEEE Trans. Consum. Electron. 44 (3), pp895–901. https://doi.org/10.1109/30.713211 (1998).
Bhattacharjya, A., Zhong, X. & Wang, J. Strong, efficient and reliable personal messaging peer to peer architecture based on hybrid RSA. In Proceedings of The International Conference on Internet of Things and Cloud Computing (ICC), pp. 1–5. https://doi.org/10.1145/2896387.2896431 (2016).
Bhattacharjya, A. et al. An end-to-end user two-way authenticated double encrypted messaging scheme based on hybrid RSA for the future internet architectures. International J. Inform. Comput. Security. 10, 63–79. https://doi.org/10.1504/IJICS.2018.089593 (2018).
Bhattacharjya, A. & Zhong, X. al.Hybrid RSA-based highly efficient, reliable and strong personal full mesh networked messaging scheme. Int. J. Inf. Comput. Secur. 10 (4), 418–436. https://doi.org/10.1504/IJICS.2018.095341 (2018).
Bhattacharjya, A. et al. On mapping of address and port using translation. Int. J. Inf. Comput. Secur. 11(3), 214–232. https://doi.org/10.1504/IJICS.2019.099419 (2019).
Feng, L. I. U., Jie, Y. A. N. G. & Jiayin, Q. I. Survey on blockchain privacy protection techniques in cryptography. Chin. J. Netw. Inform. Secur. 8 (4), 29–44. https://doi.org/10.11959/j.issn.2096-109x.2022054 (2022).
Marinov, M., Kalmukov, Y. & Valova, I. Content-Based Image Retrieval: Impact of image resolution on the search accuracy and results ordering. In International Conference Automatics and Informatics (ICAI), 2021, pp. 72–75. https://doi.org/10.1109/ICAI52893.2021.9639858 (2021).
Zhang, Q. et al. Digital image copyright protection method based on blockchain and zero trust mechanism. Multimedia Tools Appl. 83, 77267–77302. https://doi.org/10.1007/s11042-024-18514-3 (2024).
T B, R S, K B, et al. Proxy re-encryption approach to avoid illegal content sharing in cloud. In 6th International Conference on Intelligent Computing and Control Systems (ICICCS), 2022, pp. 618–623. https://doi.org/10.1109/ICICCS53718.2022.9788263 (2022).
Lee, K. et al. The Design of a DRM System Using PKI and a Licensing Agent. Netw. Parallel Comput. 611–617. https://doi.org/10.1007/978-3-540-30141-790 (2004).
Tirkel, A. Z. et al. Electronic watermark. In Digital Image Computing, Technology and Applications (DICTA’93), pp. 666–673. (1993).
Hemdan, E. E. D. An efficient and robust watermarking approach based on single value decompression, multilevel DWT, and wavelet fusion with scrambled medical images. Multimedia Tools Appl. 80 (2), 1749–1777. https://doi.org/10.1007/s11042-020-09769-7 (2021).
Xiang, S. J. & Yang, L. Robust and reversible image watermarking algorithm in homomorphic encrypted domain. J. Softw. 29 (4), 957–972. https://doi.org/10.13328/j.cnki.jos.005406 (2018).
Kadian, P., Arora, S. M. & Arora, N. Robust Digital Watermarking Techniques for Copyright Protection of Digital Data: A Survey. Wireless Pers. Commun. 118 (4), 3225–3249. https://doi.org/10.1007/s11277-021-08177-w (2021).
Shen, M. et al. Content-based multi-source encrypted image retrieval in clouds with privacy preservation. Future Generation Comput. Syst. 109, 621–632. https://doi.org/10.1016/j.future.2018.04.089 (2020).
Yingying, L. I., Jianfeng, M. A. & Yinbin, M. I. A. O. Encrypted image retrieval in multi-key settings based on edge computing. J. Commun. 41 (4), 14–26. https://doi.org/10.11959/j.issn.1000-436x.2020086 (2020).
Guo, J. et al. Blockchain-enabled digital rights management for multimedia resources of online education. Multimedia Tools Appl. 79, 9735–9755. https://doi.org/10.1007/s11042-019-08059-1 (2020).
Ku, W. & Chi, C. H. Survey on the technological aspects of digital rights management. In Information Security: 7th International Conference, pp. 391–403. (2004). https://doi.org/10.1007/978-3-540-30144-8_33.
Subramanya, S. R. & Yi, B. K. Digital rights management. IEEE Potentials. 25 (2), 31–34. https://doi.org/10.1109/mp.2006.1649008 (2006).
Zhu, P. et al. Using blockchain technology to enhance the traceability of original achievements. IEEE Trans. Eng. Manage. 1–15. https://doi.org/10.1109/TEM.2021.3066090 (2021).
Yang, Y. et al. A Video Copyright Transaction Traceability Method Based on Mother-Child Blockchain. In the 3rd International Conference on Blockchain Technology and Applications, pp. 1–6, 2021. https://doi.org/10.1145/3446983.3446984 (2020).
Bachani, V., Wan, Y. & Bhattacharjya, A. Preferential DPoS: a scalable blockchain schema for high-freuency transaction. = AMCIS 2022 TREOs. 36. https://aisel.aisnet.org/treos_amcis2022/36.
Gu, H., Shang, J., Wang, P., Mi, J. & Bhattacharjya, A. A secure protocol authentication method based on the strand space model for blockchain-based industrial internet of things. Symmetry-Basel 16(7), 851. https://doi.org/10.3390/sym16070851 (2024).
Kumar, J. R. et al. Blockchain based traceability in computer peripherals in universities scenarios. In 3rd International Conference on Electronic and Electrical Engineering and Intelligent System (ICE3IS). IEEE, 2023. https://doi.org/10.1109/ICE3IS59323.2023.10335420 (2023).
Si, P. et al. Distributed sender scheduling for multimedia transmission in wireless mobile peer to-peer networks. IEEE Trans. Wireless Commun. 8, 4594–4603. https://doi.org/10.1109/twc.2009.080550 (2009).
Huang, J. et al. Towards Secure Industrial IoT: Blockchain System With Credit-Based Consensus Mechanism. IEEE Trans. Industr. Inf. 15, 3680–3689. https://doi.org/10.1109/TII.2019.2903342 (2019).
Zheng, Z. et al. An overview on smart contracts: Challenges, advances and platforms. Future Generation Comput. Syst. 105, 475–491. https://doi.org/10.1016/j.future.2019.12.019 (2020).
Zou, W. et al. Smart Contract Development: Challenges and Opportunities. IEEE Trans. Software Eng. 47 (10), 2084–2106. https://doi.org/10.1109/TSE.2019.2942301 (2021).
Liang, W. et al. A dual-chain digital copyright registration and transaction system based on blockchain technology. Blockchain Trustworthy Syst. 702–714. https://doi.org/10.1007/978-981-15-2777-7_57 (2021).
Zhang, C. et al. A trustworthy industrial data management scheme based on redactable blockchain. J. Parallel Distrib. Comput. vol,152, 167–176. https://doi.org/10.1016/j.jpdc.2021.02.026 (2021).
Huang, K. et al. Building Redactable Consortium Blockchain for Industrial Internet-of Things. IEEE Trans. Industr. Inf. 15 (6), 3670–3679. https://doi.org/10.1109/TII.2019.2901011 (2019).
Ateniese, G. et al. Redactable Blockchain – or – Rewriting History in Bitcoin and Friends, in 2017 IEEE European Symposium on Security and Privacy (EuroS&P), pp.111–126, [Online]. (2017). Available: https://doi.org/10.1109/EuroSP.2017.37 [Accessed: Feb. 9, 2025].
LI, P. L., XU H X, MA T J, MU & Y H. Research on Fault-correcting Blockchain Technology. J. Cryptologic Res. 5 (5), 501–509. https://doi.org/10.13868/j.cnki.jcr.000259 (2018).
Fan, S. & Chen, Y. Editable Blockchain Scheme Based on Shamir Chameleon Hash Secret Sharing. In IEEE 6th Information Technology and Mechatronics Engineering Conference (ITOEC), vol.6, pp.1125–1128. https://doi.org/10.1109/ITOEC53115.2022.9734554 (2022).
Xiaoqi, Z. H. A. O., Zhenghao, Z. H. A. N. G. & Yong, L. I. An Editable and Accountable Blockchain Scheme. J. Cyber Secur. 7 (5), 19–28. https://doi.org/10.19363/J.cnki.cn10-1380/tn.2022.09.02 (2022).
Wei-Long, L. V. et al. Research on Verifiable Blockchain Ledger Redaction Method for Trusted Consortium. Chin. J. Comput. 44 (10), 2016–2032. https://doi.org/10.11897/SP.J.1016.2021.0201 (2021).
Acknowledgements
The authors have reviewed and edited the output and take full responsibility for the content of this publication. This work was supported in part by the High-Level Research Initiation Foundation for Introduction of Talents of Nanjing Institute of Technology under Grant (YKJ202312) and the General program of philosophy and social science research in colleges and universities of Jiangsu Province (2024SJYB0333).
Funding
This work was supported in part by the High-Level Research Initiation Foundation for Introduction of Talents of Nanjing Institute of Technology under Grant (YKJ202312) and the General program of philosophy and social science research in colleges and universities of Jiangsu Province (2024SJYB0333).
Author information
Authors and Affiliations
Contributions
Conceptualization, L.C., A.B.,Y.S, Z.W., Z.S. and Y.Y.; methodology, L.C., A.B., and Y.S.; software, L.C., A.B., and Y.S.; validation, L.C., A.B., and Y.S.; formal analysis, L.C., A.B., Y.S., Z.W., Z.S. and Y.Y.; investigation, L.C., A.B., and Y.S.; resources, L.C., A.B., and Y.S.; data curation, L.C., A.B., and Y.S.; writing—original draft preparation, L.C., A.B.,Y.S, Z.W., Z.S. and Y.Y.; writing—review and, L.C., A.B., Y.S, Z.W., Z.S. and Y.Y.; visualization, L.C., A.B., and Y.S.; supervision, L.C., A.B., and Y.S.; project administration, L.C., A.B., and Y.S.; funding acquisition, L.C., A.B., and Y.S. All authors have read and agreed to the published version of the manuscript.
Corresponding authors
Ethics declarations
Competing interests
The authors declare no competing interests.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.
About this article
Cite this article
Chen, L., Bhattacharjya, A., Sun, Y. et al. Multi-center chameleon hashing based Blockchain integrated digital copyright transaction scheme for data redacting in Blockchain based IoT systems. Sci Rep (2026). https://doi.org/10.1038/s41598-026-45111-1
Received:
Accepted:
Published:
DOI: https://doi.org/10.1038/s41598-026-45111-1