Open Access
ARTICLE
Enhancing Medical Data Sharing: A Cooperative Game Incentive Approach Based on Blockchain
School of Cyber Security and Computer, Hebei University, Baoding, 071000, China
* Corresponding Author: Shuo Huang. Email:
Computers, Materials & Continua 2025, 83(3), 5071-5089. https://doi.org/10.32604/cmc.2025.061507
Received 26 November 2024; Accepted 27 February 2025; Issue published 19 May 2025
Abstract
With the rapid development of medical data sharing, issues of privacy and ownership have become prominent, which have limited the scale of data sharing. To address the above challenges, we propose a blockchain-based data-sharing framework to ensure data security and encourage data owners to actively participate in sharing. We introduce a reliable attribute-based searchable encryption scheme that enables fine-grained access control of encrypted data and ensures secure and efficient data sharing. The revenue distribution model is constructed based on Shapley value to motivate participants. Additionally, by integrating the smart contract technology of blockchain, the search operation and incentive mechanism are automatically executed. Through revenue distribution analysis, the incentive effect and rationality of the proposed scheme are verified. Performance evaluation shows that, compared with traditional data-sharing models, our proposed framework not only meets data security requirements but also incentivizes more participants to actively participate in data sharing.Keywords
With the continuous improvement of digitalization levels and the large-scale production of medical data, the medical industry is facing an important transition. A wealth of medical data resources can be transformed into valuable knowledge that can help in scientific decision-making. As the advantages of cloud storage become more evident, an increasing number of organizations are opting to store their data in the cloud. Nevertheless, once organizations and individuals outsource their data to the cloud, they lose full control over it. Especially when data is stored in plaintext, semi-trusted cloud servers can pose a threat to data privacy. Consequently, the process of data sharing brings problems such as data sharing risk, data sharing cost, and data ownership, which makes many data owners reluctant to share data [1,2]. This poses a great challenge to facilitate medical data sharing.
Traditional data-sharing solutions face issues such as slow response times, data vulnerability to tampering, and insecure transmission. Existing cloud data-sharing schemes face the challenge of trusted but curious cloud servers, and data requesters worry about their private data being leaked or tampered with [3,4]. Traditional data-sharing schemes are no longer suitable for scenarios involving smart healthcare and the explosive growth of data in the cloud. With the continuous advancement of cloud storage technology, storing data in the cloud has become an emerging trend, and the security of transactions has become increasingly important. This necessitates guaranteeing that data users receive accurate and complete data after payment, while data owners receive appropriate returns when providing data. In data-driven multi-party collaboration models, ensuring the high integrity and reliability of data transactions has become a key factor for successful cooperation. Traditional solutions often rely on the involvement of authoritative third-party institutions, which not only impose additional costs on users but also usually regard these third parties as semi-trusted [5].
Blockchain technology’s emergence presents novel strategies for resolving the issues that data sharing confronts, and it has been effectively applied to data management [6,7]. The essence of blockchain is a distributed ledger. Firstly, the distributed feature of blockchain ensures the tamper-proofness of data sharing and circulation. Secondly, the automatic execution of smart contracts in blockchain could standardize the process to realize the transparency of rewards and punishments. Through the blockchain, all data transaction information can be traced one by one, which can not only ensure the integrity and ownership of data but also efficiently solve transaction conflicts. Consequently, integrating blockchain with data sharing can standardize the data management process and realize the right confirmation of shared data, to establish an open data-sharing ecosystem [8,9].
In data sharing, because the process of gathering information can be carried out independently by various organizations [10], there should be incentive measures to improve the service level and revenue. The Shapley value in cooperative game theory is commonly used to evaluate fair revenue distribution among participating entities based on individual contributions. An et al. [11] applied the Shapley value method for profit distribution in a three-stage system, promoting resource sharing and significantly optimizing the system’s overall performance.
Based on the existing work, we aim to design a data-sharing framework combining blockchain and Shapley value, which can realize collaborative sharing and data security [12]. Then, a dynamic incentive mechanism suitable for multi-party data sharing is designed using Shapley values, aiming to achieve a fair distribution of participants’ rewards. The mechanism adjusts incentives based on each data owner’s contribution at different stages, ensuring that all participants receive rewards corresponding to their contributions. The dynamic incentive mechanism not only motivates data owners to share more data but also enhances the quality of the data shared.
Overall, the main contributions of this paper are listed as follows:
• Based on the blockchain platform, we use attribute-based Searchable encryption (ABSE) technology to achieve fine-grained access control of on-chain encrypted data. Participants are authorized by the consortium blockchain to ensure data privacy and security. Given the potential threat to data security and privacy posed by cloud servers, our solution ensures that they only store encrypted data.
• We propose a dynamic and fair multi-party data-sharing incentive mechanism based on Shapley value. Unlike traditional schemes, it’s automatically executed by blockchain smart contracts, ensuring system reliability and consistency. In medical data sharing, the Shapley value method accurately measures each party’s contribution and distributes revenues reasonably, promoting more efficient and fair medical data sharing.
The rest of the paper is organized as follows. We present the related work in Section 2 and Section 3 introduces the preliminaries. Section 4 describes the system model of ours. Incentive mechanisms using cooperative game theory are proposed in Section 5. Performance analysis is presented in Section 6. At last, we summarize the paper in Section 7.
Data sharing has attracted much attention due to its convenience and economy. Numerous medical data-sharing schemes exist. Yang et al. [13] proposed a medical data-sharing service platform from the perspectives of medical data collection, sharing, and management, and then realized a medical data sharing system BDMISS based on cloud storage. Sahai et al. [14] introduced the concept of Attribute-Based Encryption (ABE) in 2005, enabling fine-grained access control over ciphertexts. In the context of smart healthcare and data outsourcing, Mamta et al. [15] combined ABE with searchable encryption, called ABSE, to achieve fine-grained access control and keyword search capabilities. Abdelfattah et al. [16] proposed a scheme based on the medical cloud, which uses cloud servers to achieve fairness in data trading. Zhang et al. [17] studied a verifiable ABSE scheme, which introduces a third-party and shared multi-owner mechanism to achieve the verifiability of search results. However, the two schemes proposed in [16,17] rely on semi-trusted cloud servers, and storing data on the cloud may lead to privacy leakage for users [3]. Moreover, malicious cloud servers could exploit outsourced data, such as intentionally tampering with data or providing false information.
Blockchain has gained widespread attention in data sharing due to its advantages such as decentralization and immutability [18,19]. Das et al. [20] proposed a blockchain-based incentive minimization scheme. In Delay Tolerant Networks (DTNs), this scheme optimizes incentive distribution by combining resource and efficient caching routing protocols to prevent malicious node behaviors. Azaria et al. [9] proposed MedRec, a decentralized record supervision system for electronic medical records based on blockchain technology, which provides secure access to diagnostic data and comprehensive, immutable logs. Shrestha et al. [21] proposed a blockchain-based platform that enables users to benefit from the data-sharing process while ensuring the integrity of transaction data.
However, although these schemes use blockchain to ensure transaction reliability, they suffer from issues of low system efficiency and heavy computational burdens on the user side. There is an urgent need for more efficient and secure solutions for medical data sharing. Mamta et al. [22] proposed a blockchain-based cloud-assisted computing scheme, which uses the consortium chain for system initialization and partial search token generation. Although shifting a large amount of computation to consensus nodes alleviates the computational burden on users, these nodes also need to perform additional calculations. In another scheme, Su et al. [23] used two smart contracts to verify the correctness of the search results and used the computing power of the cloud server to improve the efficiency. However, the existing blockchain consensus algorithms incur relatively high computational overheads and are not suitable for high-frequency data-sharing scenarios. Therefore, it is necessary to adopt improved consensus algorithms to enhance the system’s efficiency.
In practice, data owners may be reluctant to share data due to privacy concerns or other factors. Therefore, to incentivize data owners, it is essential to design a fair and reasonable incentive mechanism to ensure that data owners receive the corresponding revenues they deserve. The theories used to design incentive mechanisms in data sharing mainly include auction theory, contract theory, and evolutionary game theory.
Zhao et al. [24] put forward an incentive mechanism, which is designed to facilitate the online selection of workers in real-time scenarios. Nevertheless, due to the diversity of tasks and multiple other factors during the auction process, the reverse auction fails to adapt to complex requirements. In the Internet of Vehicles, due to the trust issues in the traditional crowdsourcing incentive mechanism, Chen et al. [25] proposed a quality-driven auction incentive mechanism, which uses a consortium blockchain to ensure the integrity and traceability of the data. Kazmi et al. [26] proposed an incentive mechanism based on contract theory to encourage vehicles to participate in resource sharing, thereby reducing the resource burden of the vehicular network and maximizing social welfare. Liu et al. [27] constructed an incentive model for enterprise data-sharing, and utilized evolutionary game theory to explore the evolutionary strategies in various conditions.
However, contract theory assumes that both parties have complete knowledge of all key information in the contract, and in data sharing, the data owner may not be able to fully understand the intention of the data consumer. Evolutionary game theory usually considers the evolutionary process with a long time scale, which makes it difficult to adapt to the rapidly changing data-sharing environment. The assumption based on individual rationality may ignore other influencing factors. Therefore, in multi-participant data-sharing, it is necessary to find a suitable mechanism that can encourage data owners to participate in sharing and ensure fair distribution of benefits.
Cooperative game theory is an effective tool for designing the desired incentive mechanisms. The Shapley value is commonly used in models of contribution-based revenue distribution. Ying et al. [28] proposed CHASER, an incentive mechanism specifically developed for blockchain-based Edge-assisted Mobile Crowd-sensing (BEMCS) systems. CHASER can meet incentive requirements such as budget balance, bilateral individual rationality, and high social welfare, attracting more participants. Under the federated learning framework, Yang et al. [29] proposed Weighted Truncation (WT) to improve the state-of-the-art Shapley Value algorithm for the scenario of industrial safety inspection data joint modeling. This is aimed at eliminating unnecessary computations. Our work is to provide a contribution-based revenue distribution method for multi-participant data-sharing collaboration and encourage them to share data.
For better understanding, this section first presents some notations applied in the presented scheme in Table 1. Then, the background knowledge and relevant technologies that will be used are introduced.

In multi-party data sharing, measuring each participant’s contribution is key to ensuring fair revenue distribution. The Shapley value from cooperative game theory effectively addresses this issue by focusing on evaluating each participant’s marginal contribution in multi-party collaboration. This method embodies the principles of cooperation and effectively encourages the positive participation of all members [30].
Suppose the set of participants is denoted as
Therefore, the contribution of the participant to the coalition is represented by the value function
Definition 1. We define the marginal contribution of participant
In cooperation, as participants gradually join the coalition, the marginal contribution of each participant within the coalition will also change. According to the variation of the value function
Definition 2. The Shapley value is defined by
where
Shapley value quantifies the contribution of each participant in a cooperative scenario by accumulating their marginal contributions. Our main work is to design an incentive mechanism suitable for multi-party data-sharing scenarios using Shapley value theory.
3.2 Blockchain and Smart Contract
The essence of blockchain is a decentralized distributed ledger, jointly maintained and managed by multiple decentralized nodes within the network. Through consensus algorithms, the nodes achieve synchronization and sharing of the ledger. Currently, blockchain technology is being widely studied and applied in fields such as Internet finance, e-healthcare, the Internet of Things, and cloud computing. Consortium blockchain based on the Practical Byzantine Fault Tolerance (PBFT) algorithm has advantages such as fault tolerance, strong consistency, privacy protection, and low latency, which can provide participants with a secure, reliable, and efficient data-sharing platform [31].
The smart contract, proposed by computer scientist Nick Szabo in 1994, is an automatically executable program code that is transparent and immutable on the blockchain and has been applied in various fields. Smart contracts ensure the security, transparency, and reliability of contracts through the decentralized feature of blockchain [32,33].
Therefore, we utilize blockchain technology as the infrastructure for data-sharing. This facilitates the verification of historical transactions and ensures security and privacy during the data-sharing process. By combining incentive mechanisms and smart contract technology, fair distribution of interests among participants can be achieved without assuming the honesty of a third party. Smart contractsensure the reliability, consistency, and verifiability of the incentive mechanism.

Figure 1: System model of medical data sharing
As shown in Fig. 1, the framework is composed of five entities. It provides a platform for all participants to achieve data sharing and revenue distribution.
1) Trust Authority (TA): TA is regarded as completely trustworthy by the rest of the participants. It generates public parameters
2) Data Owner (DO): DOs are those who own electronic health records (EHRs) and are willing to take part in the data-sharing process. DO encrypts EHRs and keywords using the
3) Data User (DU): DUs encompass entities like data users, such as doctors, hospitals, and research institutions. To retrieve EHRs with specific keywords, the DU sends a request to the blockchain network. This request contains the set of attributes of DU as well as the target keyword of the search operation. At the same time, the symmetric key of the relevant ciphertext can be obtained only after the transaction is completed. Then, DU decrypts the intermediate ciphertext obtained from the Cloud Service Provider.
4) Cloud Service Provider (CSP): CSP possesses powerful storage and computing capabilities. It can efficiently address the storage challenges faced by the blockchain. It can be utilized to store encrypted data and perform pre-decryption tasks. In this way, it can not only significantly enhance the execution efficiency of the solution but also effectively reduce the processing burden on the user side.
5) Blockchain (BC): BC employed is a consortium blockchain. This type of blockchain serves as a repository for keyword ciphertext, and its access is restricted solely to consortium members. Inside the BC network, the consensus nodes are made up of various hospitals and research institutions. Once a user submits a request, these consensus nodes execute the algorithm to reach consensus. Subsequently, they conduct a search for the relevant index according to the provided attribute set and keywords.
1)
2)
3)
4)
5)
6)
7)
8) RegisterSC: The smart contract, deployed by the TA, is responsible for handling user registration requests. When the user initiates a registration request, the contract verifies the user’s identity, calls
9) SearchSC: DO deploys this smart contract. Once the smart contract detects that the consensus nodes have attained a consensus-in other words, when the output of the
10) IncentivizeSC: TA deploys this smart contract. Once the user initiates a transaction, the contract is triggered. This contract automatically distributes benefits derived from transactional data to participants according to their contributions to the data-sharing collaboration. The exact allocation method and mechanism details are covered in Section 5.
The workflow is shown in Fig. 2 and mainly consists of four stages. The details are as follows.

Figure 2: The workflow of system model
Step 1: This stage mainly includes system initialization and registration.
1) Given a bilinear mapping
2) Define
3) After that, it selects
1) TA randomly selects
2) Then, it randomly selects a number
3) Finally, the secret key
Remark: Based on real identity authentication, it ensures the uniqueness and legitimacy of each identity, which makes our scheme resistant to Sybil attacks.
Step 2: This stage mainly includes data plaintext encryption and keyword encryption:
1) DO randomly choose
2) For
1) DO selects a secret value
2) First, DU executes the secret sharing algorithm and selects a polynomial
X is defined as the set of leaf nodes within the access tree T. Starting from the root node
(b) Compute
Finally, the encrypted index is generated as
Step 3: The main components of this stage are the generation of the trapdoor and keyword search:
Trapdoor generation: The algorithm is executed by DU when the search keyword set
1) DU randomly choose
2) For each attribute,
Finally, the search trapdoor
Consensus: DU initiates a data request to the blockchain network, and consensus nodes execute the following algorithm to return the consensus result.
1) Then, for
2) The calculation of
If
(b) If
Keyword search: Given an index
1) When node
If
(b) If
When
(a) If
(b) If
where
When the user’s set of attributes meets the requirements of the access tree, recursively calculate to obtain the final execution result as
Step 4: Data decryption and verification:
After the SearchSC is executed, IncentiveSC is triggered to calculate the contribution of each participant based on the Shaplay value, and the rewards are distributed accordingly. DU then obtains the corresponding encrypted file from CSP and executes the decryption algorithm
Blockchain records relevant transactions through a distributed ledger. Due to its tamper-proof feature, the traceability of transaction data is achieved. This traceability not only ensures the integrity of the data but also safeguards the data ownership, effectively resolving transaction conflicts.
5 Incentive Mechanism for Data Sharing Based on Cooperative Game
In this section, we initially introduce the proposed cooperation model and explore how to measure each participant’s contribution to the data-sharing process. Subsequently, we offer a detailed explanation of achieving fair revenue distribution through contribution-based incentive mechanisms.
The decentralized data-sharing framework and its revenue distribution process have been systematically elaborated above. With the development of digitalization, data users have become more stringent in their requirements for the reliability and verifiability of shared data. Encouraging users to share more high-quality data has become a pressing issue. Therefore, it is necessary to design an incentive mechanism suitable for multi-party data-sharing scenarios, ensuring fair revenue distribution, motivating data owners to collaborate actively, and improving the quality of shared data.
We categorize participants into three types: data owners, blockchain networks, and data users. The set of participants is

Figure 3: The cooperation model based on Blockchain
In our proposed scheme, points are used as incentive tokens. These points can be accumulated and later exchanged for services or benefits within the consortium, fostering a positive feedback loop for data sharing. When a data user (DU) requests data from the blockchain, the network performs a search after reaching a consensus. Rewards are then distributed based on the contributions of the participants, thereby encouraging active participation in data sharing.
5.2 Methods for Measuring the Value of Medical Data
This subsection aims to evaluate the contributions of each participant in the process of data sharing. It is assumed that the contribution of the data provided by each participant is reflected in the incremental improvement of the overall data quality. Therefore, we choose a generic metric to measure the dataset as a signifier of the value function in Eq. (2). In this research, information entropy (IE) is used to relate the value of medical data to the volume of data. This method can measure data’s value in the process of data-sharing, and further calculate the contribution of participants in data sharing. In the data-sharing model, we use IE as a measure of value, which is based on both the quantity and quality of shared data.
In this process, information entropy is an indicator to measure the degree of uncertainty or confusion of data. We abstract it as a method for comprehensively evaluating data volume and data quality. Applying information entropy to the volume and quality of shared data enables us to better understand each participant’s contribution to the overall data-sharing process. Specifically, the higher the amount of shared data and data quality of participants, the greater their contribution to revenue. This indicates that data quality is as crucial as data volume, and low-quality data will undermine the overall contribution, regardless of its quantity. Thus, by leveraging information entropy to measure the contribution of participants, a new way is provided to assess the value of shared medical data and infer the contribution of participants to revenue accordingly.
The information entropy of player
where
During multi-party data sharing, the initial coalition is seen as the state having the most significant effect on the system’s overall performance. To better reflect the relative contributions of different participants, we introduce a weighted Shapley model. Specifically, by adjusting the weights, we consider the unique contributions made by members of the initial coalition in aspects such as coalition establishment, coordination, and attraction of other members. We aim to explore the incentive effects of the model on different types of participants by adjusting the weights of the initial coalition participants’ information entropy, that is when
The weighted model was dynamically adjusted to explore its impact on the distribution of participants’ revenue, improving the fairness of revenue distribution and participants’ enthusiasm. However, to ensure the rationality and fairness of the proposed method, we must continuously adjust and optimize it while taking into account the interests of all parties.
5.3 Revenue Distribution of Cooperation Model
We have designed an incentive mechanism based on Shapley values, utilizing the method described in Section 5.2 to calculate participants’ marginal contributions in cooperation, aiming to effectively incentivize participants and fairly distribute profits.
Let’s presume that data owner
We measure the contribution to the IE of each participant through
Given any model system
where
We denote
Theorem 1 (Shapley value allocated to participants)
Assume a set of data owners
where the normalized Shapley values
The revenue
Theorem 2 (Consistency of Shapley value allocation)
In the cooperative game framework, the total revenue distribution of the coalition must satisfy the collective rationality axiom, meaning that the sum of the Shapley values of all participants is exactly equal to the total revenue of the coalition, denoted as
For participants
To validate the rationality and performance of the proposed solution, we conducted numerical evaluations using the following hardware specifications: Intel Core i5-8500HQ CPU, the processor speed is 3.0 GHz, and the RAM is 8 GB. The Java Pairing-Based Cryptography Library (JPBC) [34] was employed to assess the fundamental cryptographic operations. We conducted multiple runs of various algorithms under different attribute counts to assess the computational overhead at each stage. Subsequently, theoretical analysis and simulation experiments validated the effectiveness and rationality of the incentive mechanism.
We conducted a functional comparison of the proposed scheme and existing studies, summarizing their key features in Table 2.

6.2 Algorithm Efficiency and Smart Contract Cost
In Figs. 4 and 5, we show the overhead of the algorithms and smart contracts in different stages respectively. In the experimental analysis, we evaluated the computational overhead associated with three critical attribute-related operations in the data-sharing scheme: key generation, encryption, and search. In Section 4.3, we detail the construction of each algorithm and experimentally confirm the linear growth between attribute count and execution time. As shown in Fig. 4, the execution time of each algorithm shows a linear growth trend under different scales of attributes. It is worth noting that even when the scale of attributes reaches 25, the execution time of each operation remains within 0.5 seconds, which is acceptable in most application scenarios. In Fig. 5, we use gas as a metric to measure the overhead of smart contracts and the graph shows the gas overhead of RegisterSC, SearchSC, and IncentiveSC. The deployment cost is one-time and the highest, while the transaction cost consists of the execution cost and the basic transaction cost.

Figure 4: Computation overhead of algorithms

Figure 5: Consumption of smart contracts
Since the consensus mechanism of the consortium blockchain primarily employs Practical Byzantine Fault Tolerance (PBFT), as discussed in references [22] and [23], it is worth noting that PBFT is a consensus algorithm with a complexity of
To evaluate the performance of the consensus algorithm, we tested the time required to reach consensus under different node scales, as shown in Fig. 6. Within the PBFT framework, we reconstructed the consensus mechanisms from references [22] and [23] to ensure consistency in experimental conditions. It is noteworthy that scheme [23] requires consensus nodes to act as proxies for executing user-side computations, which results in a time overhead similar to that of [22], but with higher resource consumption. Experimental results show that when the number of nodes exceeds 10, the overhead of traditional schemes [22] and [23] increases exponentially. In contrast, the consensus mechanism designed in this work, based on Shamir’s secret sharing, exhibits a linear increase in time overhead as the node scale grows, significantly improving consensus efficiency, and making it more suitable for the demands of healthcare IoT scenarios.

Figure 6: Computation overhead of consensus [22,23]
6.3 Performances of the Proposed Incentive Mechanism
6.3.1 Influence of Data Contribution and Rationality
We initially performed a theoretical analysis of the proposed method. By adjusting the weights of key parameters in the coalition based on the cooperative model in Section 5.1, where
Fig. 7 shows the information entropy, Shapley value, and corresponding revenue percentage for four players sharing the dataset when the coalition size

Figure 7: The Shapley value revenue under the unit model with different IE
In Fig. 8, we consider when the initial coalition is regarded as the state with the greatest impact on the overall system performance, denoted as state

Figure 8: The relationship between revenue and
6.3.2 Incentive Mechanism Simulation Experiment Analysis
To evaluate the proposed incentive mechanism, this study simulated scenarios of data sharing and conducted simulation experiments. Taking an example of a platform with 50 medical institutions and 1500 artificially simulated medical data records, as the experiments progressed, each medical institution decided whether to increase the quantity of shared data based on the profits obtained.
In the experimental simulations, we compared two different incentive mechanisms: the first one is the incentive mechanism based on fixed value, where participants can only receive predetermined rewards. This mechanism is simple to implement but may lack the ability to motivate participants to improve data quality or quantity. The second one is the incentive mechanism proposed in this paper based on cooperative game theory, which allocates revenue according to the actual contributions of participants. This can better reflect the value of each participant’s contribution.
As shown in Fig. 9, the changes in the amount of shared data in the system over time under different incentive mechanisms are displayed. We can observe a significant growth trend in medical data in the system as time progresses. Under the incentive mechanism based on cooperative game theory, where profits are fairly distributed based on participants’ contributions, this differentiated reward mechanism motivates participants. Compared to fixed-value incentive mechanisms, incentive mechanisms based on cooperative game theory can achieve more efficient and flexible revenue distribution, which helps promote data sharing and enhance cooperation efficiency.

Figure 9: The comparison (a) between proposed incentive mechanisms and fixed value (b) incentive mechanisms. (a) Shared data volume; (b) data owner participation ratios
In this research, we design a data-sharing scheme based on attribute-based searchable encryption and the Shapley value method to meet the practical data-sharing requirements. The scheme supports fine-grained access control over encrypted data. Moreover, it achieves dynamic and fair distribution of revenues to data-sharing participants and guarantees fairness and traceability of transactions with the help of blockchain technology. Compared with other schemes, our scheme is more suitable for the multi-party medical data-sharing scenario. Through performance analysis and simulation experiments, this method can encourage more data owners to participate in data-sharing and enhance the security and fairness of the sharing process. We believe that this work has positive implications for multi-party data-sharing. In future work, we will investigate other factors influencing contribution distribution and user motivation, to make the incentive mechanism more reasonable and fair.
Acknowledgement: I would like to express my heartfelt gratitude to Professor Xiaohui Yang for his guidance and support throughout the research process. I also thank the other classmates for their valuable suggestions in the study. Lastly, we appreciate the valuable comments from the editor and anonymous reviewers, which helped improve the paper.
Funding Statement: This work was supported by the Natural Science Foundation of Hebei Province of China (F2021201052).
Author Contributions: Shuo Huang: Conceptualization, Methodology, Validation, Writing—original draft, Formal analysis. Xiaohui Yang: Conceptualization, Methodology, Validation, Writing—original draft. All authors reviewed the results and approved the final version of the manuscript.
Availability of Data and Materials: No datasets were utilized or analyzed in the course of this research.
Ethics Approval: Not applicable.
Conflicts of Interest: The authors declare no conflicts of interest to report regarding the present study.
References
1. Zhang H, Fan W, Wang J. Bidirectional utilization of blockchain and privacy computing: issues, progress, and challenges. J Netw Comput Appl. 2024;222(9):103795. doi:10.1016/j.jnca.2023.103795. [Google Scholar] [CrossRef]
2. Zhang H, Liu W. Research on the application of blockchain in the safe and trusted sharing of Government data. In: 2023 2nd International Conference on Artificial Intelligence and Blockchain Technology (AIBT); 2023; Zibo, China. p. 52–5. [Google Scholar]
3. Hei Y, Liu Y, Li D, Liu J, Wu Q. Themis: an accountable blockchain-based P2P cloud storage scheme. Peer Peer Netw Appl. 2020;14(1):225–39. doi:10.1007/s12083-020-00967-6. [Google Scholar] [CrossRef]
4. Singh A, Chatterjee K. Securing smart healthcare system with edge computing. Comput Secur. 2021;108(1):102353. doi:10.1016/j.cose.2021.102353. [Google Scholar] [CrossRef]
5. Wang H. Identity-based distributed provable data possession in multicloud storage. IEEE Transact Serv Comput. 2015;8(2):328–40. doi:10.1109/TSC.2014.1. [Google Scholar] [CrossRef]
6. Fan K, Wang S, Ren Y, Li H, Yang Y. MedBlock: efficient and secure medical data sharing via blockchain. J Med Syst. 2018 Aug;42(8):1–11. doi:10.1007/s10916-018-0993-7. [Google Scholar] [PubMed] [CrossRef]
7. Nakamoto S. Bitcoin: a peer-to-peer electronic cash system; 2008. [Online]. [cited 2024 Mar 7]. Available from: https://bitcoin.org/bitcoin.pdf [Google Scholar]
8. Chi J, Li Y, Huang J, Liu J, Jin Y, Chen C, et al. A secure and efficient data sharing scheme based on blockchain in industrial Internet of Things. J Netw Comput Appl. 2020;167(3):102710. doi:10.1016/j.jnca.2020.102710. [Google Scholar] [CrossRef]
9. Azaria A, Ekblaw A, Vieira T, Lippman A. MedRec: using blockchain for medical data access and permission management. In: 2016 2nd International Conference on Open and Big Data (OBD); 2016; Vienna, Austria. p. 5–30. [Google Scholar]
10. Huang Q, Huang S, Gao C. A differentiated service based incentive mechanism in P2P file-sharing systems. In: 2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007); 2007; Dalian, China. p. 419–24. [Google Scholar]
11. An Q, Wen Y, Ding T, Li Y. Resource sharing and payoff allocation in a three-stage system: integrating network DEA with the Shapley value method. Omega. 2019;85(1):16–25. doi:10.1016/j.omega.2018.05.008. [Google Scholar] [CrossRef]
12. Zhu L, Dong H, Shen M, Gai K. An incentive mechanism using shapley value for blockchain-based medical data sharing. In: 2019 IEEE 5th International Conference on Big Data Security on Cloud (BigDataSecurityIEEE International Conference on High Performance and Smart Computing, (HPSC) and IEEE International Conference on Intelligent Data and Security (IDS); 2019; Washington, DC, USA . p. 113–8. [Google Scholar]
13. Yang Y, Chen T. Analysis and visualization implementation of medical big data resource sharing mechanism based on deep learning. IEEE Access. 2019;7:156077–88. doi:10.1109/ACCESS.2019.2949879. [Google Scholar] [CrossRef]
14. Sahai A, Waters B. Fuzzy identity-based encryption. In: Cramer R, editor. Advances in cryptology–EUROCRYPT 2005. Berlin/Heidelberg: Springer; 2005. p. 457–73. [Google Scholar]
15. Mamta, Gupta BB, Lytras MD. Fog-enabled secure and efficient fine-grained searchable data sharing and management scheme for IoT-based healthcare systems. IEEE Trans Eng Manag. 2022;71:1–13. [Google Scholar]
16. Abdelfattah S, Baza M, Mahmoud MMEA, Fouda MM, Abualsaud KA, Guizani M. Multidata-owner searchable encryption scheme over medical cloud data with efficient access control. IEEE Syst J. 2022;16(3):5067–78. doi:10.1109/JSYST.2021.3123956. [Google Scholar] [CrossRef]
17. Zhang Y, Zhu T, Guo R, Xu S, Cui H, Cao J. Multi-keyword searchable and verifiable attribute-based encryption over cloud data. IEEE Transact Cloud Comput. 2023;11(1):971–83. doi:10.1109/TCC.2021.3119407. [Google Scholar] [CrossRef]
18. Shen W, Hu T, Zhang C, Ma S. Secure sharing of big digital twin data for smart manufacturing based on blockchain. J Manufact Syst. 2021;61(7775):338–50. doi:10.1016/j.jmsy.2021.09.014. [Google Scholar] [CrossRef]
19. Zou R, Lv X, Zhao J. SPChain: blockchain-based medical data sharing and privacy-preserving eHealth system. Inform Process Manag. 2021;58(4):102604. doi:10.1016/j.ipm.2021.102604. [Google Scholar] [CrossRef]
20. Das N, Basu S, Bit SD. Incentive minimization using energy and buffer efficient routing protocol over Blockchain enabled DTN. Peer-to-Peer Network Applicat. 2024;17(5):3239–54. doi:10.1007/s12083-024-01737-4. [Google Scholar] [CrossRef]
21. Shrestha AK, Vassileva J. Blockchain-based research data sharing framework for incentivizing the data owners. In: Chen S, Wang H, Zhang LJ, editors. Blockchain–ICBC 2018. Cham: Springer; 2018. p. 259–66. [Google Scholar]
22. Mamta, Gupta BB, Li KC, Leung VCM, Psannis KE, Yamaguchi S. Blockchain-assisted secure fine-grained searchable encryption for a cloud-based healthcare cyber-physical system. IEEE/CAA J Automat Sinica. 2021;8(12):1877–90. doi:10.1109/JAS.2021.1004003. [Google Scholar] [CrossRef]
23. Su J, Zhang L, Mu Y. BA-RMKABSE: blockchain-aided ranked multi-keyword attribute-based searchable encryption with hiding policy for smart health system. Future Generat Comput Syst. 2022;132(10):299–309. doi:10.1016/j.future.2022.01.021. [Google Scholar] [CrossRef]
24. Zhao D, Li XY, Ma H. Budget-feasible online incentive mechanisms for crowdsourcing tasks truthfully. IEEE/ACM Transact Network. 2016;24(2):647–61. doi:10.1109/TNET.2014.2379281. [Google Scholar] [CrossRef]
25. Chen W, Chen Y, Chen X, Zheng Z. Toward secure data sharing for the IoV: a quality-driven incentive mechanism with on-chain and off-chain guarantees. IEEE Int Things J. 2020;7(3):1625–40. doi:10.1109/JIOT.2019.2946611. [Google Scholar] [CrossRef]
26. Kazmi SMA, Dang TN, Yaqoob I, Manzoor A, Hussain R, Khan A, et al. A novel contract theory-based incentive mechanism for cooperative task-offloading in electrical vehicular networks. IEEE Transact Intell Transport Syst. 2022;23(7):8380–95. doi:10.1109/TITS.2021.3078913. [Google Scholar] [CrossRef]
27. Liu R, Huang M, Yu Y. Incentive mechanism and simulation of data sharing in blockchain based on evolutionary game. In: 2022 International Conference on Information Technology, Communication Ecosystem and Management (ITCEM); 2022; Bangkok, Thailand. p. 146–52. [Google Scholar]
28. Ying C, Jin H, Li J, Si X, Luo Y. Incentive mechanism design via smart contract in blockchain-based edge-assisted crowdsensing. Frontiers Comput Sci. 2025;19(3):193802. doi:10.1007/s11704-024-3542-1. [Google Scholar] [CrossRef]
29. Yang C, Liu J, Sun H, Li T, Li Z. WTDP-shapley: efficient and effective incentive mechanism in federated learning for intelligent safety inspection. IEEE Transact Big Data. 2024;10(6):1028–37. doi:10.1109/TBDATA.2022.3198733. [Google Scholar] [CrossRef]
30. Jiang X, Wang L, Cao B, Fan X. Benefit distribution and stability analysis of enterprises’ technological innovation cooperation alliance. Comput Indust Eng. 2021;161(5):107637. doi:10.1016/j.cie.2021.107637. [Google Scholar] [CrossRef]
31. Xu Y, Zhang C, Wang G, Qin Z, Zeng Q. A blockchain-enabled deduplicatable data auditing mechanism for network storage servicesy. IEEE Transact Emerg Top Comput. 2021;9(3):1421–32. doi:10.1109/TETC.2020.3005610. [Google Scholar] [CrossRef]
32. Lone AH, Naaz R. Applicability of Blockchain smart contracts in securing Internet and IoT: a systematic literature review. Comput Sci Rev. 2021;39(1):100360. doi:10.1016/j.cosrev.2020.100360. [Google Scholar] [CrossRef]
33. Xuan S, Zheng L, Chung I, Wang W, Man D, Du X, et al. An incentive mechanism for data sharing based on blockchain with smart contracts. Comput Elect Eng. 2020;83(1):106587. doi:10.1016/j.compeleceng.2020.106587. [Google Scholar] [CrossRef]
34. De Caro A, Iovino V. jPBC: Java pairing based cryptography. In: 2011 IEEE Symposium on Computers and Communications (ISCC); 2011; Kerkyra, Greece . p. 850–5. [Google Scholar]
Cite This Article
Copyright © 2025 The Author(s). Published by Tech Science Press.This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.


Submit a Paper
Propose a Special lssue
View Full Text
Download PDF
Downloads
Citation Tools