{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T04:48:05Z","timestamp":1758862085123},"publisher-location":"Cham","reference-count":42,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030340827"},{"type":"electronic","value":"9783030340834"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-34083-4_8","type":"book-chapter","created":{"date-parts":[[2019,11,3]],"date-time":"2019-11-03T19:02:54Z","timestamp":1572807774000},"page":"76-86","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Efficiency Issues and Solutions in Blockchain: A Survey"],"prefix":"10.1007","author":[{"given":"Atabaev","family":"Odiljon","sequence":"first","affiliation":[]},{"given":"Keke","family":"Gai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,1]]},"reference":[{"issue":"3","key":"8_CR1","doi-asserted-by":"publisher","first-page":"32103","DOI":"10.1007\/s11432-018-9451-y","volume":"62","author":"Z Guan","year":"2019","unstructured":"Guan, Z., Zhang, Y., Zhu, L., Wu, L., Yu, S.: EFFECT: an efficient flexible privacy-preserving data aggregation scheme with authentication in smart grid. Sci. China Inf. Sci. 62(3), 32103 (2019)","journal-title":"Sci. China Inf. Sci."},{"issue":"99","key":"8_CR2","first-page":"1","volume":"PP","author":"Y Duan","year":"2019","unstructured":"Duan, Y., Sun, X., Che, H., Cao, C., Li, Z., Yang, X.: Modelling data, information and knowledge for security protection of hybrid IoT and edge resources. IEEE Access PP(99), 1 (2019)","journal-title":"IEEE Access"},{"issue":"5","key":"8_CR3","doi-asserted-by":"publisher","first-page":"840","DOI":"10.1109\/TDSC.2016.2616861","volume":"15","author":"N Aitzhan","year":"2016","unstructured":"Aitzhan, N., Svetinovic, D.: Security and privacy in decentralized energy trading through multi-signatures, blockchain and anonymous messaging streams. IEEE Trans. Dependable Secur. Comput. 15(5), 840\u2013852 (2016)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"8_CR4","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1016\/j.future.2018.03.043","volume":"85","author":"K Gai","year":"2018","unstructured":"Gai, K., Qiu, M., Xiong, Z., Liu, M.: Privacy-preserving multi-channel communication in edge-of-things. Futur. Gener. Comput. Syst. 85, 190\u2013200 (2018)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Rizvi, S., Ryoo, J., Liu, Y., Zazworsky, D., Cappeta, A.: A centralized trust model approach for cloud computing. In: 2014 23rd Wireless and Optical Communication Conference, Newark, New Jersey, USA, pp. 1\u20136. IEEE (2014)","DOI":"10.1109\/WOCC.2014.6839923"},{"key":"8_CR6","first-page":"13","volume":"2018","author":"Z Song","year":"2018","unstructured":"Song, Z., et al.: Processing optimization of typed resources with synchronized storage and computation adaptation in fog computing. Wirel. Commun. Mob. Comput. 2018, 13 (2018)","journal-title":"Wirel. Commun. Mob. Comput."},{"issue":"99","key":"8_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TBDATA.2017.2705807","volume":"PP","author":"K Gai","year":"2017","unstructured":"Gai, K., Qiu, M., Zhao, H.: Privacy-preserving data encryption strategy for big data in mobile cloud computing. IEEE Trans. Big Data PP(99), 1 (2017)","journal-title":"IEEE Trans. Big Data"},{"key":"8_CR8","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1016\/j.jnca.2017.10.011","volume":"103","author":"K Gai","year":"2018","unstructured":"Gai, K., Qiu, M., Sun, X.: A survey on FinTech. J. Netw. Comput. Appl. 103, 262\u2013273 (2018)","journal-title":"J. Netw. Comput. Appl."},{"issue":"5","key":"8_CR9","doi-asserted-by":"publisher","first-page":"2431","DOI":"10.1109\/TSG.2017.2664043","volume":"8","author":"K Gai","year":"2017","unstructured":"Gai, K., Qiu, M., Ming, Z., Zhao, H., Qiu, L.: Spoofing-jamming attack strategy using optimal power distributions in wireless smart grid networks. IEEE Trans. Smart Grid 8(5), 2431\u20132439 (2017)","journal-title":"IEEE Trans. Smart Grid"},{"key":"8_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1007\/3-540-38424-3_32","volume-title":"Advances in Cryptology-CRYPT0\u2019 90","author":"S Haber","year":"1991","unstructured":"Haber, S., Stornetta, W.S.: How to time-stamp a digital document. In: Menezes, A.J., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol. 537, pp. 437\u2013455. Springer, Heidelberg (1991). \n                    https:\/\/doi.org\/10.1007\/3-540-38424-3_32"},{"key":"8_CR11","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008)"},{"issue":"3","key":"8_CR12","doi-asserted-by":"publisher","first-page":"2084","DOI":"10.1109\/COMST.2016.2535718","volume":"18","author":"F Tschorsch","year":"2016","unstructured":"Tschorsch, F., Scheuermann, B.: Bitcoin and beyond: a technical survey on decentralized digital currencies. IEEE Commun. Surv. Tutor. 18(3), 2084\u20132123 (2016)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"6","key":"8_CR13","doi-asserted-by":"publisher","first-page":"3154","DOI":"10.1109\/TII.2017.2709784","volume":"13","author":"J Kang","year":"2017","unstructured":"Kang, J., Yu, R., Huang, X., Maharjan, S., Zhang, Y., Hossain, E.: Enabling localized peer-to-peer electricity trading among plug-in hybrid electric vehicles using consortium blockchains. IEEE Trans. Ind. Inform. 13(6), 3154\u20133164 (2017)","journal-title":"IEEE Trans. Ind. Inform."},{"key":"8_CR14","doi-asserted-by":"publisher","first-page":"9239","DOI":"10.1109\/ACCESS.2016.2645904","volume":"4","author":"J Zhang","year":"2016","unstructured":"Zhang, J., Xue, N., Huang, X.: A secure system for pervasive social network-based healthcare. IEEE Access 4, 9239\u20139250 (2016)","journal-title":"IEEE Access"},{"issue":"3","key":"8_CR15","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1109\/MNET.2018.1700344","volume":"32","author":"H Liu","year":"2018","unstructured":"Liu, H., Zhang, Y., Yang, T.: Blockchain-enabled security in electric vehicles cloud and edge computing. IEEE Netw. 32(3), 78\u201383 (2018)","journal-title":"IEEE Netw."},{"issue":"16","key":"8_CR16","doi-asserted-by":"publisher","first-page":"3548","DOI":"10.1109\/TII.2019.2893433","volume":"5","author":"K Gai","year":"2019","unstructured":"Gai, K., Wu, Y., Zhu, L., Qiu, M., Shen, M.: Privacy-preserving energy trading using consortium blockchain in smart grid. IEEE Trans. Ind. Inform. 5(16), 3548\u20133558 (2019)","journal-title":"IEEE Trans. Ind. Inform."},{"key":"8_CR17","doi-asserted-by":"crossref","unstructured":"Li, H., Gai, K., Fang, Z., Zhu, L., Xu, L., Jiang, P.: Blockchain-enabled data provenance in cloud datacenter reengineering. In: Proceedings of the 2019 ACM International Symposium on Blockchain and Secure Critical Infrastructure, pp. 47\u201355. ACM (2019)","DOI":"10.1145\/3327960.3332382"},{"issue":"2","key":"8_CR18","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1145\/2979677","volume":"16","author":"K Gai","year":"2017","unstructured":"Gai, K., Qiu, L., Chen, M., Zhao, H., Qiu, M.: SA-EAST: security-aware efficient data transmission for ITS in mobile heterogeneous cloud computing. ACM Trans. Embed. Comput. Syst. 16(2), 60 (2017)","journal-title":"ACM Trans. Embed. Comput. Syst."},{"key":"8_CR19","doi-asserted-by":"publisher","first-page":"15310","DOI":"10.1109\/ACCESS.2019.2895327","volume":"7","author":"Y Fu","year":"2019","unstructured":"Fu, Y., Zhu, J.: Big production enterprise supply chain endogenous risk management based on blockchain. IEEE Access 7, 15310\u201315319 (2019)","journal-title":"IEEE Access"},{"key":"8_CR20","doi-asserted-by":"publisher","first-page":"32700","DOI":"10.1109\/ACCESS.2018.2846779","volume":"6","author":"M Uddin","year":"2018","unstructured":"Uddin, M., Stranieri, A., Gondal, I., Balasubramanian, V.: Continuous patient monitoring with a patient centric agent: a block architecture. IEEE Access 6, 32700\u201332726 (2018)","journal-title":"IEEE Access"},{"issue":"1","key":"8_CR21","doi-asserted-by":"publisher","first-page":"695","DOI":"10.1109\/TWC.2018.2885266","volume":"18","author":"M Liu","year":"2018","unstructured":"Liu, M., Yu, F., Teng, Y., Leung, V., Song, M.: Distributed resource allocation in blockchain-based video streaming systems with mobile edge computing. IEEE Trans. Wirel. Commun. 18(1), 695\u2013708 (2018)","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"8_CR22","doi-asserted-by":"crossref","unstructured":"Tsai, W., Bai, X., Yu, L.: Design issues in permissioned blockchains for trusted computing. In: 2017 IEEE Symposium on Service-Oriented System Engineering, San Francisco, USA, pp. 153\u2013159. IEEE (2017)","DOI":"10.1109\/SOSE.2017.32"},{"key":"8_CR23","doi-asserted-by":"crossref","unstructured":"Xu, Y., Huang, Y.: MWPoW-multi-winner proof of work consensus protocol: an immediate block-confirm solution and an incentive for common devices to join blockchain. In: 2018 IEEE International Conference on Parallel and Distributed Processing with Applications, Ubiquitous Computing and Communications, Big Data and Cloud Computing, Social Computing and Networking, Sustainable Computing and Communications, Melbourne, Australia, pp. 964\u2013971. IEEE (2018)","DOI":"10.1109\/BDCloud.2018.00141"},{"key":"8_CR24","unstructured":"http:\/\/cointelegraph.com\/"},{"key":"8_CR25","doi-asserted-by":"crossref","unstructured":"Kokoris-Kogias, E., Jovanovic, P., Gasser, L., Gailly, N., Syta, E., Ford, B.: OmniLedger: a secure, scale-out, decentralized ledger via sharding. In: 2018 IEEE Symposium on Security and Privacy, San Francisco, CA, USA, pp. 583\u2013598. IEEE (2018)","DOI":"10.1109\/SP.2018.000-5"},{"key":"8_CR26","doi-asserted-by":"crossref","unstructured":"Zaman, M., Shen, T., Min, M.: Proof of sincerity: a new lightweight consensus approach for mobile blockchains. In: 2019 16th IEEE Annual Consumer Communications and Networking Conference, Las Vegas, NV, USA, pp. 1\u20134. IEEE (2019)","DOI":"10.1109\/CCNC.2019.8651742"},{"key":"8_CR27","doi-asserted-by":"crossref","unstructured":"Sakakibara, Y., Tokusashi, Y., Morishima, S., Matsutani, H.: Accelerating blockchain transfer system using FPGA-based NIC. In: 2018 IEEE International Conference on Parallel and Distributed Processing with Applications, Ubiquitous Computing and Communications, Big Data and Cloud Computing, Social Computing and Networking, Sustainable Computing and Communications, Melbourne, Australia, pp. 171\u2013178. IEEE (2018)","DOI":"10.1109\/BDCloud.2018.00037"},{"key":"8_CR28","doi-asserted-by":"publisher","first-page":"58381","DOI":"10.1109\/ACCESS.2019.2914223","volume":"7","author":"L Bai","year":"2019","unstructured":"Bai, L., Hu, M., Liu, M., Wang, J.: BPIIoT: a light-weighted blockchain-based platform for industrial IoT. IEEE Access 7, 58381\u201358393 (2019)","journal-title":"IEEE Access"},{"key":"8_CR29","doi-asserted-by":"publisher","first-page":"39273","DOI":"10.1109\/ACCESS.2019.2906637","volume":"7","author":"T Zhou","year":"2019","unstructured":"Zhou, T., Li, X., Zhao, H.: DLattice: a permission-less blockchain based on DPoS-BA-DAG consensus for data tokenization. IEEE Access 7, 39273\u201339287 (2019)","journal-title":"IEEE Access"},{"key":"8_CR30","doi-asserted-by":"publisher","first-page":"38437","DOI":"10.1109\/ACCESS.2018.2851611","volume":"6","author":"S Wang","year":"2018","unstructured":"Wang, S., Zhang, Y., Zhang, Y.: A blockchain-based framework for data sharing with fine-grained access control in decentralized storage systems. IEEE Access 6, 38437\u201338450 (2018)","journal-title":"IEEE Access"},{"key":"8_CR31","doi-asserted-by":"publisher","first-page":"43758","DOI":"10.1109\/ACCESS.2018.2861944","volume":"6","author":"B Zhao","year":"2018","unstructured":"Zhao, B., Fan, P., Ni, M.: Mchain: a blockchain-based VM measurements secure storage approach in IaaS cloud with enhanced integrity and controllability. IEEE Access 6, 43758\u201343769 (2018)","journal-title":"IEEE Access"},{"issue":"1","key":"8_CR32","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1109\/TC.2018.2860009","volume":"68","author":"J Liu","year":"2018","unstructured":"Liu, J., Li, W., Karame, G., Asokan, N.: Scalable byzantine consensus via hardware-assisted secret sharing. IEEE Trans. Comput. 68(1), 139\u2013151 (2018)","journal-title":"IEEE Trans. Comput."},{"key":"8_CR33","doi-asserted-by":"publisher","first-page":"22970","DOI":"10.1109\/ACCESS.2018.2814624","volume":"6","author":"M Dai","year":"2018","unstructured":"Dai, M., Zhang, S., Wang, H., Jin, S.: A low storage room requirement framework for distributed ledger in blockchain. IEEE Access 6, 22970\u201322975 (2018)","journal-title":"IEEE Access"},{"issue":"11","key":"8_CR34","doi-asserted-by":"publisher","first-page":"11008","DOI":"10.1109\/TVT.2018.2866365","volume":"67","author":"M Liu","year":"2018","unstructured":"Liu, M., Yu, F., Teng, Y., Leung, V., Song, M.: Computation offloading and content caching in wireless blockchain networks with mobile edge computing. IEEE Trans. Veh. Technol. 67(11), 11008\u201311021 (2018)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"99","key":"8_CR35","first-page":"1","volume":"PP","author":"K Gai","year":"2019","unstructured":"Gai, K., Wu, Y., Zhu, L., Xu, L., Zhang, Y.: Permissioned blockchain and edge computing empowered privacy-preserving smart grid networks. IEEE Internet Things J. PP(99), 1 (2019)","journal-title":"IEEE Internet Things J."},{"key":"8_CR36","doi-asserted-by":"crossref","unstructured":"Xin, W., Zhang, T., Hu, C., Tang, C., Liu, C., Chen, Z.: On scaling and accelerating decentralized private blockchains. In: 2017 IEEE 3rd International Conference on Big Data Security on Cloud, IEEE International Conference on High Performance and Smart Computing, and IEEE International Conference on Intelligent Data and Security, Beijing, China, pp. 267\u2013271. IEEE (2017)","DOI":"10.1109\/BigDataSecurity.2017.25"},{"issue":"4","key":"8_CR37","doi-asserted-by":"publisher","first-page":"870","DOI":"10.1109\/TPDS.2018.2871449","volume":"30","author":"C Xu","year":"2018","unstructured":"Xu, C., et al.: Making big data open in edges: a resource-efficient blockchain-based approach. IEEE Trans. Parallel Distrib. Syst. 30(4), 870\u2013882 (2018)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"8_CR38","doi-asserted-by":"crossref","unstructured":"Borge, M., Kokoris-Kogias, E., Jovanovic, P., Gasser, L., Gailly, N., Ford, B.: Proof-of-personhood: redemocratizing permissionless cryptocurrencies. In: 2017 IEEE European Symposium on Security and Privacy Workshops, San Francisco, California, USA, pp. 23\u201326. IEEE (2017)","DOI":"10.1109\/EuroSPW.2017.46"},{"key":"8_CR39","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1016\/j.future.2018.09.019","volume":"91","author":"L Zhu","year":"2019","unstructured":"Zhu, L., Wu, Y., Gai, K., Choo, K.K.R.: Controllable and trustworthy blockchain-based cloud data management. Futur. Gener. Comput. Syst. 91, 527\u2013535 (2019)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"8_CR40","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.jnca.2015.05.016","volume":"59","author":"K Gai","year":"2016","unstructured":"Gai, K., Qiu, M., Zhao, H., Tao, L., Zong, Z.: Dynamic energy-aware cloudlet-based mobile cloud computing model for green computing. J. Netw. Comput. Appl. 59, 46\u201354 (2016)","journal-title":"J. Netw. Comput. Appl."},{"key":"8_CR41","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1016\/j.jpdc.2017.08.001","volume":"111","author":"K Gai","year":"2018","unstructured":"Gai, K., Qiu, M., Zhao, H.: Energy-aware task assignment for mobile cyber-enabled applications in heterogeneous cloud computing. J. Parallel Distrib. Comput. 111, 126\u2013135 (2018)","journal-title":"J. Parallel Distrib. Comput."},{"issue":"4","key":"8_CR42","doi-asserted-by":"publisher","first-page":"3059","DOI":"10.1109\/JIOT.2018.2830340","volume":"5","author":"K Gai","year":"2018","unstructured":"Gai, K., Choo, K.K.R., Qiu, M., Zhu, L.: Privacy-preserving content-oriented wireless communication in Internet-of-Things. IEEE Internet Things J. 5(4), 3059\u20133067 (2018)","journal-title":"IEEE Internet Things J."}],"container-title":["Lecture Notes in Computer Science","Smart Blockchain"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-34083-4_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,3]],"date-time":"2019-11-03T19:07:51Z","timestamp":1572808071000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-34083-4_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030340827","9783030340834"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-34083-4_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"1 November 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SmartBlock","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Smart Blockchain","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Birmingham","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 October 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 October 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"smartblock2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.cloud-conf.net\/smartblock\/2019\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"100","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"13","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"13% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}