<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Modeling and implementation of a secure freelance platform based on Ethereum smart contracts⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Svitlana Popereshnyak</string-name>
          <email>spopereshnyak@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Maksym Bielikov</string-name>
          <email>bielikov.maksym@lll.kpi.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Anton Bur</string-name>
          <email>bur.anton@lll.kpi.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Blockchain</institution>
          ,
          <addr-line>Freelance platform, Ethereum smart contracts, Decentralized arbitration, Fraud risk assessment, DAO (Decentralized Autonomous Organization)</addr-line>
          ,
          <institution>Secure financial transactions, Internet of Everything, Microservices architecture, Solidity development</institution>
          ,
          <addr-line>Blockchain-based marketplaces1</addr-line>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>MoMLeT-2025: 7th International Workshop on Modern Machine Learning Technologies</institution>
          ,
          <addr-line>June, 14, 2025, Lviv-Shatsk</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute”</institution>
          ,
          <addr-line>37, Prospect Beresteiskyi, Kyiv, 03056</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>0000</fpage>
      <lpage>0002</lpage>
      <abstract>
        <p>The rapid growth of the freelance market and the adoption of blockchain technologies have created new opportunities for decentralized and secure financial management. Traditional freelance platforms often suffer from high transaction fees, lack of transparency, and centralized control, leading to increased risks of fraud and contractual disputes. This paper presents the modeling and implementation of a secure freelance platform that integrates Ethereum smart contracts to automate financial transactions and improve trust between users. The study analyzes existing centralized and decentralized freelance platforms, formulates functional and non-functional requirements, and proposes a microservices-based architecture for the web application. Smart contracts were developed using Solidity to ensure automated, tamper-proof payment execution. Security, performance, and scalability tests were conducted to validate the system's robustness. A novel mathematical model for fraud risk assessment in smart contract-based transactions was introduced, taking into account users' financial ratings and behavioral patterns. Additionally, a decentralized arbitration mechanism using DAO (Decentralized Autonomous Organization) principles was implemented to resolve disputes fairly and transparently. The results demonstrate that integrating blockchain technologies into freelance platforms significantly enhances transaction security, reduces operational costs, and mitigates fraud risks, offering practical applications for startups, IT companies, and freelance marketplaces.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>is expected that it will be in demand among freelancers, service customers and companies looking
for performers for various projects.</p>
      <p>Thus, the relevance of the development is determined by the need to implement the latest
technologies to solve current problems in the freelance sector, which, in turn, will contribute to
increasing trust between market participants.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Domain analysis</title>
      <p>
        Freelancing, or working on-demand without permanent employment, is one of the fastest growing
forms of employment in the world today. According to Demandsage 2024 statistics [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], there are
approximately 1.57 billion freelancers in the world out of a total workforce of 3.38 billion. The main
advantages of freelancing are flexible schedules, the ability to work on a variety of projects, and
reduced operating costs for the employer. However, platform users currently face a number of
problems that make it difficult for them to interact effectively. In particular, traditional freelance
platforms are often characterized by:




high commissions for intermediary services;
lack of transparency in the terms of order fulfillment;
risks of fraud and delays in payment;
limited access to the global market due to financial or legal barriers.
      </p>
      <p>Blockchain allows you to overcome these problems. This is a decentralized data storage
technology that provides transparency, immutability and automation of transaction execution using
smart contracts. A smart contract is a program code that automatically executes the terms of a
transaction between parties without the participation of intermediaries. The most common platform
for developing smart contracts is Ethereum.</p>
      <p>Developing a decentralized freelance platform with the integration of Ethereum smart contracts
to ensure transparency, security and automation of financial transactions will allow:




</p>
      <p>Improve the reliability of transactions by automatically executing the terms of smart
contracts.</p>
      <p>Reduce financial costs by eliminating intermediaries and optimizing commission fees.
Increase the level of trust through the use of blockchain, which makes it impossible to forge
transactions.</p>
      <p>Optimize risk management using a mathematical model for assessing fraudulent
transactions.</p>
      <p>Improve the convenience of interaction between customers and executors through an
automated task execution control system.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Literature review</title>
      <p>
        The continuous development of freelance marketplaces, alongside the rising demand for secure,
efficient, and transparent digital interactions, has driven significant research efforts into blockchain
integration, risk management, and intelligent system architectures. Blockchain has emerged as a
leading technology to enhance trust and security in decentralized environments. Hatim et al. [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]
proposed a blockchain-based Internet of Vehicles (BIoV) framework to ensure data integrity and
transparency within smart cities, demonstrating the effectiveness of decentralized trust mechanisms
— a concept equally critical for freelance platforms aiming to reduce fraud and enforce transparent
transactions.
      </p>
      <p>
        In the context of blockchain-driven economic models, Sukkrajang et al. [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] designed a trade
distance and pricing system for electric vehicle charging stations, using blockchain to secure and
verify transactions. Their work underscores blockchain’s potential to automate and safeguard
financial operations — a fundamental requirement for freelance ecosystems handling user payments.
      </p>
      <p>
        The integration of blockchain with machine learning for compliance and monitoring purposes
has been studied by Shaik et al. [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], who applied intelligent algorithms to enhance regulatory
compliance in blockchain-based supply chains. Their findings reveal that machine learning can
significantly strengthen fraud detection and risk management capabilities, which is highly relevant
for freelance platforms seeking to automate user evaluation and transaction security.
      </p>
      <p>
        Concerns over data integrity in decentralized infrastructures were addressed by Ravishankar et
al. [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], who developed a blockchain-backed database to protect against data tampering in cloud
computing environments. This reinforces the potential advantages of integrating blockchain into
freelance marketplaces to ensure reliable user data management and transaction histories.
      </p>
      <p>
        Despite its strengths, blockchain technology also introduces new security vulnerabilities. Ismail
and Reza [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] analyzed blockchain-specific risks in supply chains, emphasizing the necessity of
comprehensive risk assessment and robust system design — key considerations in building a secure
freelance service platform.
      </p>
      <p>
        Hartmann et al. [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] explored the role of blockchain in decentralized finance and crowdfunding,
revealing that blockchain significantly enhances trust and reduces intermediary costs, supporting its
application for minimizing operational expenses on freelance platforms.
      </p>
      <p>
        Applications of blockchain to critical infrastructure, such as rail transit systems, were
demonstrated by Li et al. [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], showing how blockchain enables secure, real-time management. Their
results offer insights for freelance platforms requiring real-time contract execution and service
verification.
      </p>
      <p>
        Further, Ribeiro and Barbosa [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] introduced a blockchain-specific risk analysis methodology,
highlighting the importance of multi-factor risk evaluation when developing decentralized
applications — directly informing the fraud prevention model proposed in this study.
      </p>
      <p>
        Additional studies on secure cryptographic methods [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] and efficient cloud data processing
strategies [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] outline the broader technological challenges involved, emphasizing the need for
secure, scalable freelance management solutions.
      </p>
      <p>While previous studies have highlighted the transformative potential of blockchain and
intelligent systems in various domains, the specific application of AI-driven multi-factor risk
assessment models in combination with blockchain-based smart contracts for freelance service
management remains insufficiently explored.</p>
      <p>The development presented in this study directly addresses these challenges by integrating
Ethereum smart contracts to automate payments and improve the security and transparency of
freelance interactions. The proposed solution aims to create a decentralized freelance platform that:



</p>
      <p>Dynamically evaluates the risks of financial transactions based on user ratings, behavioral
factors, and financial indicators using a newly proposed risk assessment model;
Automates freelancer selection and task verification through secure smart contracts;
Implements a decentralized arbitration system using DAO (Decentralized Autonomous
Organizations) principles to resolve disputes fairly and efficiently;</p>
      <p>Optimizes commission costs through adaptive transaction timing mechanisms.</p>
      <p>The research thus aims to design an effective, transparent, and secure freelance environment,
leveraging the advantages of blockchain technologies for enhanced financial interaction between
users. By applying object-oriented design methods, blockchain analysis, cryptographic techniques,
and machine learning algorithms, the platform ensures scalable, secure, and efficient freelance
service management. This work contributes to the advancement of intelligent decentralized
marketplaces and offers practical applications for startups, IT companies, and freelance exchanges
seeking to enhance their operational security and efficiency.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Description of business processes</title>
      <p>As part of the development of a web application for a freelance platform with payment via the
Ethereum blockchain, key business processes were identified and described. They cover the main
stages of user interaction with the system, such as registration, authorization, and order fulfillment.
Let us consider in more detail the order fulfillment process, for which a BPMN model was
built (Fig. 1.)</p>
      <p>Description of the order execution sequence (Figure 1):




the customer creates a task on the platform website, a smart contract is generated to the
address of his wallet, which blocks the amount of money he has set (the budget for execution);
the customer can cancel the order. This can be done both on the website of the web
application and by calling the cancellation function independently on the blockchain via a
crypto wallet. In this case, the money will be unlocked and the smart contract will be
considered completed;
the customer will wait until one of the freelancers takes the order on our platform. And when
this happens, he will receive a corresponding message. The customer must either reject or
accept the freelancer who wants to perform the task. As soon as the performer has been
selected, a record is created in the blockchain. The security of the election is guaranteed,
because the “take order” function can only be called from the wallet that was used to initiate
the smart contract;
the freelancer, in turn, can refuse to perform the task by calling the “cancel order” function
through a wallet connected to the platform, but this will worsen his rating. Then, the
customer will be able to wait and choose another freelancer, or cancel his task. Automatic
cancellation will work when the deadline set by the customer is completed;
the freelancer must attach the files of the completed task. The customer will check them and,
if they agree, the money will be transferred to the performer. If a conflict arises, the platform
administrator gets involved, who must check the chat history and decide whether the
freelancer has completed the task assigned to him. If so, the money is sent to the performer
and the smart contract is considered completed. If not, the administrator communicates with
the parties to the conflict about whether to allow the current freelancer to make changes to
the task and continue working. In case of agreement, the performer must attach new files to
the task in time before the deadline or refuse to perform it;
if the parties to the conflict do not reach an agreement, the administrator decides whether to
allow the freelancer to take new orders on the platform and has the right to block him. The
task performer is canceled from the smart contract. The customer can wait for a new
freelancer. However, if the task is no longer relevant, he can cancel it. The money will be
unblocked and the smart contract will be considered completed.</p>
    </sec>
    <sec id="sec-5">
      <title>5. Mathematical model for assessing the risk of fraudulent transactions in smart contracts</title>
      <p>Create fake accounts in order to receive an advance payment without completing the task.
Use deliberately dishonest work evaluation mechanisms.</p>
      <p>Conduct transactions between their own accounts to artificially increase the rating.
- Resort to manipulations with refunds due to vulnerabilities in smart contracts.</p>
      <sec id="sec-5-1">
        <title>5.1. Statement of the problem</title>
        <p>Decentralized freelance platforms that use Ethereum smart contracts are at risk of fraud from both
contractors and clients. Attackers can:






=  ∙  ( ) + 
∙  ( ,  ) + 
∙  ( ) +  ∙  ( ) + 
∙  ( ).</p>
        <p>(1)
where</p>
        <p>are weighting factors that determine the importance of the respective factor.</p>
        <p>Here are the formulas for the risk functions:</p>
        <p>To minimize these risks, we have developed a mathematical model that allows us to estimate the
likelihood of fraud in real time by analyzing the behavioral and financial parameters of users.</p>
      </sec>
      <sec id="sec-5-2">
        <title>5.2. Model input parameters and fraud risk formalization</title>
        <p>The following parameters are used to assess the risk of a fraudulent transaction:
User rating R (0 ≤ R ≤ 1) is the average score given by customers.</p>
        <p>Number of successfully executed contracts 
is an indicator of the contractor's experience.</p>
        <p>The number of unfulfilled contracts</p>
        <p>is the frequency of contract violations.</p>
        <p>Account lifetime S (in days) is the duration of activity on the platform.
Average task completion time</p>
        <p>(in hours) - compared to the average for the platform.</p>
        <p>Cryptocurrency wallet balance B (in ETH) - the financial stability of the performer.
We also enter thresholds:</p>
        <p>— the average time for completing tasks on the platform.
,</p>
        <p>– are the limits of normal contract execution.</p>
        <sec id="sec-5-2-1">
          <title>Probability of fraud ( ) is defined as the sum of weighted risk functions: Rating factor:</title>
          <p>( ) = 1 −  .</p>
          <p>The lower the rating, the higher the risk of fraud.</p>
          <p>The factor of execution history:
 ( ,  ) =</p>
          <p>+</p>
          <p>.
 ( ) =</p>
          <p>− 
−</p>
          <p>.
 ( ) = 
 ( ) = 
,
,
Crypto wallet balance factor:</p>
        </sec>
        <sec id="sec-5-2-2">
          <title>Account age factor:</title>
          <p>If  
verification.</p>
          <p>If 0.4 ≤ 
is required.</p>
          <p>If  
Add 1 to the denominator to avoid dividing by zero.</p>
          <p>The factor of contract execution time:

Not all factors have the same impact on fraud. For example:</p>
          <p>Low rating and a large number of unfulfilled contracts are key indicators.
(2)
(3)
(4)
(5)
(6)
If the performer completes a task much faster or slower than normal, this may be an anomaly.
where  is a parameter that determines the sensitivity to low balances.</p>
          <p>where  is a coefficient that determines the risk of new accounts.</p>
        </sec>
      </sec>
      <sec id="sec-5-3">
        <title>5.3. Thresholds and decision-making</title>
        <p>Based on the obtained value of</p>
        <p>, the system determines the risk level of the transaction:
≥ 0.7is a high risk of fraud, the transaction is blocked or requires additional
&lt; 0.7 — moderate risk, additional verification of identity or deposit of funds
&lt; 0.4 — low risk, the transaction is allowed without restrictions.</p>
      </sec>
      <sec id="sec-5-4">
        <title>5.4. Rationale for choosing weighting factors</title>
        <p>In the model for assessing the risk of fraudulent transactions in smart contracts, the probability of
fraud is calculated using the formula (1), where  ,  ,  ,  , 
are weighting factors that
determine the impact of each factor on the overall risk level.</p>
        <p>Basic principles for choosing weighting factors.</p>
        <p>Normalization of the sum of weights. To avoid distortion of the results, the sum of the
weighting factors should be equal to 1: 
+ 
+ 
+ 
+ 
= 1.</p>
        <p>Consideration of the real impact of factors.</p>
        <p>This distribution of weights ensures that rating and contract history have the greatest impact,
while less important factors (balance, account age) receive lower coefficients.</p>
      </sec>
      <sec id="sec-5-5">
        <title>5.5. Risk factor analysis and model comparison</title>
        <p>Let us consider the impact of various factors on the probability of fraud in smart contracts (Fig. 2,
Fig. 3.):</p>
        <p>In Fig. 2. a) demonstrates the dependence of user rating on the probability of fraud - the higher
the rating, the lower the probability of fraud. Fig. 2. b) demonstrates the dependence of transaction
history on the probability of fraud - the more unfulfilled contracts, the higher the risk. Fig. 2. c)
demonstrates the impact of execution time on the likelihood of fraud - abnormally fast or too slow
execution of tasks may indicate fraud.</p>
        <p>In Fig. 3. a) demonstrates the dependence of the wallet balance on the probability of fraud - a low
balance increases the risk, as fraudsters rarely keep large amounts.</p>
        <p>In Fig. 3. b) demonstrates the dependence of the age of the transaction account on the probability
of fraud - new accounts have a higher risk of fraud, which gradually decreases with increasing time
of existence.</p>
        <p>Let's look at how the probability of fraud in the two models (traditional and proposed) changes
depending on the user's rating (Figure 4).</p>
        <p>Red dots (traditional model) — a simple linear approach that determines the risk of fraud based
solely on the user's rating. Blue dots (proposed model) — takes into account additional factors, which
allows for a more accurate risk assessment.</p>
        <p>As you can see, the traditional model ignores users with low balances and new accounts, which
can lead to fraud. The proposed model takes into account additional parameters, reducing false
positives and false negatives.</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>6. Software architecture</title>
      <p>The software architecture is based on a microservice approach using the principles of
DomainDriven Design. The main architectural pattern is Layered Architecture. This allows for scalability,
flexibility, and ease of system maintenance.</p>
      <p>Consider the third level of the C4 diagram (Figure 5), which describes the internal components of
containers. Each microservice has controllers that accept requests and interact with services. The
GRPC protocol is used to interact between microservices, the JSON/HTTPS protocol is used for
external interaction with the API, and SMTP is used to send emails.</p>
      <p>For payment via the Ethereum blockchain, the integration is performed using the Web3.js library,
which allows you to interact with smart contracts. Smart contracts provide payment automation and
guarantee transparency and data integrity.</p>
      <p>An external SMTP mail service is used to send emails (registration, password recovery,
notifications). Integration security is provided through the OAuth2 authentication mechanism.</p>
      <p>Requests for text generation, as well as for validation of created orders, use the third-party API
of the Groq service, which provides access to the LLM model. The connection is made via the HTTPS
protocol.</p>
      <p>The choice of database technologies is also based on the requirements for system functionality
and reliability. PostgreSQL is used for the authorization microservice, as this DBMS ensures high
integrity and security of user data, especially when storing sensitive information such as passwords
and tokens. Redis is used for caching and storing temporary data, such as active session tokens or
verification codes. This technology allows you to quickly retrieve data by storing it in RAM.</p>
      <p>Particular attention is paid to system security, especially in terms of authorization and protection
of user data. The use of two-factor authentication through emails and TOTP, as well as captcha
protection, is necessary to prevent unauthorized access. To ensure the secure storage of sensitive
information, encryption technologies are used at the database level, as well as the use of the bcrypt
library for password hashing.</p>
      <p>The secure gRPC protocol is used to transfer data between microservices because it has many
advantages. Firstly, gRPC allows for high data exchange speeds through the use of the HTTP/2
protocol, which supports multithreading and efficient connection management. This is especially
important in a microservice architecture, where each microservice must connect to others to perform
complex operations. In addition, gRPC uses serialization of the Buffers protocol, which reduces the
amount of data transferred and increases the efficiency of request processing. This reduces the delay
time between requests and responses, which improves overall system performance.</p>
      <p>To interact with the API, users use the HTTPS protocol, which provides a high level of security
when transferring data between clients and the server. HTTPS uses the TLS protocol to encrypt data,
which guarantees protection against information interception and man-in-the-middle attacks.
HTTPS also provides server authentication, which helps to avoid request forgery and promotes trust
in the API by users. In addition, HTTPS is the standard for interacting through web browsers, which
ensures compatibility with a wide range of browsers and ensures that the connection remains secure
when the network changes or users switch to new devices.</p>
    </sec>
    <sec id="sec-7">
      <title>7. Data security analysis</title>
      <p>Data security analysis in the Web application of a freelance platform paid through the Ethereum
blockchain takes into account potential risks and provides protection against common threats
through the integration of modern security technologies.</p>
      <p>Among the possible attacks that can be directed at the system are SQL injections, cross-site
scripting (XSS) attacks, brute force attacks (DDoS), phishing, exploitation of vulnerabilities in
thirdparty software, attacks on blockchain wallets, and data interception through Man-in-the-Middle.</p>
      <p>To protect against SQL injections, the system uses parameterized queries and ORM tools that
minimize the risk of executing malicious commands in the database. XSS vulnerabilities are
neutralized by thoroughly checking and cleaning incoming data, as well as encrypting confidential
information before it is displayed on the frontend.</p>
      <p>To combat brute force attacks, the registration and authorization stages use a limit on the number
of login attempts, captchas, and two-factor authentication. Phishing risks are minimized by
encrypting data via SSL TLS and creating an interface that includes direct warnings to users about
possible threats. Up-to-date software updates reduce the risk of exploiting vulnerabilities in
thirdparty libraries and frameworks.</p>
      <p>To protect the integration with blockchain wallets, we have implemented algorithms for signing
transactions, encrypting private keys, and interacting only through official APIs. Protection against
Man-in-the-Middle attacks is provided through the use of HTTPS.</p>
      <p>The integrity and confidentiality of data is maintained by encrypting the storage of confidential
information (passwords, tokens) using the AES-256 and bcrypt algorithms.</p>
    </sec>
    <sec id="sec-8">
      <title>8. Conclusions</title>
      <p>The aim of the development was to increase the reliability and security of data processing using
Ethereum blockchain technologies. As a result, we created a web application that provides efficient
and secure interaction between freelancers and customers, automation of many routine processes,
including task verification, using the LLM model. All functional requirements have been successfully
implemented, and the system provides a high level of security, efficiency in transaction processing,
and support for transparency of financial transactions. The development meets all the requirements
and is competitive in the market of freelance platforms working with blockchain technologies. Thus,
the goal has been achieved.</p>
      <p>The study analyzed modern centralized and decentralized freelance platforms and identified their
key disadvantages, such as high fees, centralized management of financial flows, lack of transparency
of transactions, and the risk of fraud. To solve these problems, a web-based freelance platform
application with the integration of Ethereum smart contracts is proposed, which provides payment
automation, protection against manipulation, and secure interaction between customers and
contractors.</p>
      <p>The company has developed a mathematical model for assessing the risk of fraudulent
transactions that takes into account user ratings, task history, crypto wallet balance, and other
factors. This model allows us to identify potentially fraudulent accounts and transactions, reducing
the risks for platform participants.</p>
      <p>An adaptive fee management mechanism has been implemented to optimize costs when
interacting with the Ethereum blockchain, increasing the efficiency of transactions. A system of
automated arbitration involving decentralized autonomous organizations (DAOs) was implemented
to resolve disputes between customers and contractors.</p>
      <p>The results obtained and the developed software are the basis for creating a competitive freelance
platform that can be used in the market for secure interaction between freelancers and customers.
The results of the study can be used to create secure decentralized platforms in the field of
freelancing, e-commerce, and financial technologies.</p>
    </sec>
    <sec id="sec-9">
      <title>Declaration on Generative AI</title>
      <p>During the preparation of this work, the authors used AI program Chat GPT 4.0 for correction of
text grammar. After using this tool, the authors reviewed and edited the content as needed and take
full responsibility for the publication’s content.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1] Freelance statistics 2024 -
          <article-title>number of freelancers &amp; industry size</article-title>
          .
          <source>DemandSage</source>
          . URL: https://www.demandsage.com/freelance-statistics/ .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>S. M.</given-names>
            <surname>Hatim</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. J.</given-names>
            <surname>Elias</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. M.</given-names>
            <surname>Ali</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Jasmis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. A.</given-names>
            <surname>Aziz</surname>
          </string-name>
          and
          <string-name>
            <given-names>S.</given-names>
            <surname>Mansor</surname>
          </string-name>
          ,
          <article-title>"Blockchain-based Internet of Vehicles (BIoV): An Approach Towards Smart Cities Development," 2020 5th IEEE International Conference on Recent Advances and Innovations in Engineering (ICRAIE), Jaipur</article-title>
          , India,
          <year>2020</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          , doi: 10.1109/ICRAIE51050.
          <year>2020</year>
          .
          <volume>9358355</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>K.</given-names>
            <surname>Sukkrajang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Duangsoithong</surname>
          </string-name>
          and
          <string-name>
            <given-names>K.</given-names>
            <surname>Chalermyannont</surname>
          </string-name>
          ,
          <article-title>"Trade Distance and Price Model for Electric Vehicle Charging using Blockchain-based Technology,"</article-title>
          2021 18th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information
          <string-name>
            <surname>Technology (ECTI-CON</surname>
            <given-names>)</given-names>
          </string-name>
          ,
          <source>Chiang Mai, Thailand</source>
          ,
          <year>2021</year>
          , pp.
          <fpage>964</fpage>
          -
          <lpage>967</lpage>
          , doi: 10.1109/ECTI-CON51831.
          <year>2021</year>
          .
          <volume>9454741</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>A. S.</given-names>
            <surname>Shaik</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Mahima</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Sravanthi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H. M.</given-names>
            <surname>Ali</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Agarwal</surname>
          </string-name>
          and
          <string-name>
            <surname>D. G. V,</surname>
          </string-name>
          <article-title>"Machine Learning Applications for Enhancing Regulatory Compliance in Blockchain-Based Supply Chains," 2024 International Conference on IoT, Communication and Automation Technology (ICICAT), Gorakhpur</article-title>
          , India,
          <year>2024</year>
          , pp.
          <fpage>1239</fpage>
          -
          <lpage>1243</lpage>
          , doi: 10.1109/ICICAT62666.
          <year>2024</year>
          .
          <volume>10923070</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>B.</given-names>
            <surname>Ravishankar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Kulkarni</surname>
          </string-name>
          and
          <string-name>
            <given-names>M. V.</given-names>
            <surname>Vishnudas</surname>
          </string-name>
          ,
          <article-title>"Notice of Removal: Blockchain-based Database to Ensure Data Integrity in Cloud Computing Environments," 2020 International Conference on Mainstreaming Block Chain Implementation (ICOMBI), Bengaluru</article-title>
          , India,
          <year>2020</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          , doi: 10.23919/ICOMBI48604.
          <year>2020</year>
          .
          <volume>9203500</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>S.</given-names>
            <surname>Ismail</surname>
          </string-name>
          and
          <string-name>
            <given-names>H.</given-names>
            <surname>Reza</surname>
          </string-name>
          ,
          <article-title>"</article-title>
          <source>Security Challenges of Blockchain-Based Supply Chain Systems," 2022 IEEE 13th Annual Ubiquitous Computing, Electronics &amp; Mobile Communication Conference (UEMCON)</source>
          , New York, NY, NY, USA,
          <year>2022</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          , doi: 10.1109/UEMCON54665.
          <year>2022</year>
          .
          <volume>9965682</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>F.</given-names>
            <surname>Hartmann</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Grottolo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Wang</surname>
          </string-name>
          and
          <string-name>
            <surname>M. I. Lunesu</surname>
          </string-name>
          ,
          <article-title>"Alternative Fundraising: Success Factors for Blockchain-Based vs</article-title>
          .
          <source>Conventional Crowdfunding," 2019 IEEE International Workshop on Blockchain Oriented Software Engineering (IWBOSE)</source>
          , Hangzhou, China,
          <year>2019</year>
          , pp.
          <fpage>38</fpage>
          -
          <lpage>43</lpage>
          , doi: 10.1109/IWBOSE.
          <year>2019</year>
          .
          <volume>8666515</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>H.</given-names>
            <surname>Li</surname>
          </string-name>
          et al.,
          <article-title>"Blockchain-Based Data Management and Control System in Rail Transit Security Scenario,"</article-title>
          <source>2024 IEEE 11th International Conference on Cyber Security and Cloud Computing (CSCloud)</source>
          , Shanghai, China,
          <year>2024</year>
          , pp.
          <fpage>19</fpage>
          -
          <lpage>23</lpage>
          , doi: 10.1109/CSCloud 62866.
          <year>2024</year>
          .
          <volume>00011</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>S. L.</given-names>
            <surname>Ribeiro</surname>
          </string-name>
          and
          <string-name>
            <given-names>I. A</given-names>
            .
            <surname>de Paiva Barbosa</surname>
          </string-name>
          ,
          <article-title>"Risk Analysis Methodology to Blockchain-based Solutions," 2020 2nd Conference on Blockchain Research &amp; Applications for Innovative Networks</article-title>
          and
          <source>Services (BRAINS)</source>
          , Paris, France,
          <year>2020</year>
          , pp.
          <fpage>59</fpage>
          -
          <lpage>60</lpage>
          , doi: 10.1109/ BRAINS49436.
          <year>2020</year>
          .
          <volume>9223309</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>S.</given-names>
            <surname>Popereshnyak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Novikov</surname>
          </string-name>
          ,
          <string-name>
            <surname>Y.</surname>
          </string-name>
          <article-title>Zhdanova Cryptographic system security approaches by monitoring the random numbers generation</article-title>
          .
          <source>(2024) CEUR Workshop Proceedings</source>
          ,
          <volume>3826</volume>
          , pp.
          <fpage>301</fpage>
          -
          <lpage>309</lpage>
          . doi:
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>M.</given-names>
            <surname>Reshetniak</surname>
          </string-name>
          ,
          <string-name>
            <surname>S.</surname>
          </string-name>
          <article-title>Popereshnyak Method for accessing and processing multimedia content in a cloud environment</article-title>
          . (
          <year>2019</year>
          ) 2019 IEEE
          <string-name>
            <given-names>International</given-names>
            <surname>Scientific-Practical</surname>
          </string-name>
          <string-name>
            <surname>Conference</surname>
          </string-name>
          : Problems of Infocommunications Science and Technology, PIC S and T 2019 - Proceedings, art. no.
          <issue>9061463</issue>
          , pp.
          <fpage>71</fpage>
          -
          <lpage>76</lpage>
          . doi:
          <volume>10</volume>
          .1109/PICST47496.
          <year>2019</year>
          .9061463
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>