{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T23:34:38Z","timestamp":1743118478466,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031299261"},{"type":"electronic","value":"9783031299278"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-29927-8_14","type":"book-chapter","created":{"date-parts":[[2023,4,7]],"date-time":"2023-04-07T12:02:50Z","timestamp":1680868970000},"page":"175-186","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Towards a\u00a0Blockchain and\u00a0Fog-Based Proactive Data Distribution Framework for\u00a0ICN"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1751-2569","authenticated-orcid":false,"given":"Somnath","family":"Mazumdar","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8759-5603","authenticated-orcid":false,"given":"Thomas","family":"Dreibholz","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,4,8]]},"reference":[{"key":"14_CR1","doi-asserted-by":"crossref","unstructured":"AbdAllah, E.G., Zulkernine, M., Hassanein, H.S.: DACPI: a decentralized access control protocol for information-centric networking. In: IEEE International Conference on Communications, pp. 1\u20136. IEEE (2016)","DOI":"10.1109\/ICC.2016.7511198"},{"key":"14_CR2","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1016\/j.jnca.2015.06.011","volume":"56","author":"I Abdullahi","year":"2015","unstructured":"Abdullahi, I., Arif, S., Hassan, S.: Survey on caching approaches in information-centric networking. J. Netw. Comput. Appl. 56, 48\u201359 (2015)","journal-title":"J. Netw. Comput. Appl."},{"issue":"7","key":"14_CR3","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MCOM.2012.6231276","volume":"50","author":"B Ahlgren","year":"2012","unstructured":"Ahlgren, B., Dannewitz, C., Imbrenda, C., Kutscher, D., Ohlman, B.: A survey of information-centric networking. IEEE Commun. Mag. 50(7), 26\u201336 (2012)","journal-title":"IEEE Commun. Mag."},{"key":"14_CR4","unstructured":"Androulaki, E., et al.: A distributed operating system for permissioned blockchains. In: 13th EuroSys Conference, EuroSys\u201918. Association for Computing Machinery (2018)"},{"key":"14_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2020.102840","volume":"171","author":"K Asaf","year":"2020","unstructured":"Asaf, K., Rehman, R.A., Kim, B.S.: Blockchain technology in named data networks: a detailed survey. J. Netw. Comput. Appl. 171, 1\u201315 (2020)","journal-title":"J. Netw. Comput. Appl."},{"key":"14_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.comnet.2019.106888","volume":"164","author":"M Conti","year":"2019","unstructured":"Conti, M., Hassan, M., Lal, C.: BlockAuth: blockchain-based distributed producer authentication in ICN. Comput. Netw. 164, 1\u201315 (2019)","journal-title":"Comput. Netw."},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Fotiou, N., Polyzos, G.C.: Decentralized name-based security for content distribution using blockchains. In: IEEE Conference on Computer Communications Workshops, pp. 415\u2013420. IEEE (2016)","DOI":"10.1109\/INFCOMW.2016.7562112"},{"key":"14_CR8","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/j.bjp.2013.12.035","volume":"61","author":"EG Gran","year":"2014","unstructured":"Gran, E.G., Dreibholz, T., Kvalbein, A.: NorNet core - a multi-homed research testbed. Comput. Netw. 61, 75\u201387 (2014)","journal-title":"Comput. Netw."},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"Guo, J., Wang, M., Chen, B., Yu, S., Zhang, H., Zhang, Y.: Enabling blockchain applications over named data networking. In: International Conference on Communications, pp. 1\u20136. IEEE (2019)","DOI":"10.1109\/ICC.2019.8761919"},{"key":"14_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.techfore.2020.120303","volume":"161","author":"H Jeon","year":"2020","unstructured":"Jeon, H., Seo, W., Park, E., Choi, S.: Hybrid machine learning approach for popularity prediction of newly released contents of online video streaming services. Technol. Forecast. Soc. Chang. 161, 1\u201317 (2020)","journal-title":"Technol. Forecast. Soc. Chang."},{"key":"14_CR11","doi-asserted-by":"crossref","unstructured":"Jin, T., Zhang, X., Liu, Y., Lei, K.: Blockndn: a bitcoin blockchain decentralized system over named data networking. In: International Conference on Ubiquitous and Future Networks, pp. 75\u201380. IEEE (2017)","DOI":"10.1109\/ICUFN.2017.7993751"},{"issue":"12","key":"14_CR12","doi-asserted-by":"publisher","first-page":"2933","DOI":"10.1109\/TIFS.2017.2725229","volume":"12","author":"D Kim","year":"2017","unstructured":"Kim, D., Bi, J., Vasilakos, A.V., Yeom, I.: Security of cached content in NDN. IEEE Trans. Inf. Forensics Secur. 12(12), 2933\u20132944 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"14_CR13","unstructured":"Kohnfelder, L., Garg, P.: The Threats to Our Products. Microsoft Interface, Microsoft Corporation 33 (1999)"},{"issue":"5","key":"14_CR14","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1109\/MNET.2019.1800299","volume":"33","author":"H Li","year":"2019","unstructured":"Li, H., Wang, K., Miyazaki, T., Xu, C., Guo, S., Sun, Y.: Trust-enhanced content delivery in blockchain-based information-centric networking. IEEE Netw. 33(5), 183\u2013189 (2019)","journal-title":"IEEE Netw."},{"issue":"2","key":"14_CR15","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1109\/TIFS.2014.2365742","volume":"10","author":"Q Li","year":"2014","unstructured":"Li, Q., Zhang, X., Zheng, Q., Sandhu, R., Fu, X.: LIVE: lightweight integrity verification and content access control for named data networking. IEEE Trans. Inf. Forensics Secur. 10(2), 308\u2013320 (2014)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"6","key":"14_CR16","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MCOM.2019.1800718","volume":"57","author":"R Li","year":"2019","unstructured":"Li, R., Asaeda, H.: A blockchain-based data life-cycle protection framework for information-centric networks. IEEE Commun. Mag. 57(6), 20\u201325 (2019)","journal-title":"IEEE Commun. Mag."},{"key":"14_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2019.102444","volume":"149","author":"Q Lyu","year":"2020","unstructured":"Lyu, Q., Qi, Y., Zhang, X., Liu, H., Wang, Q., Zheng, N.: SBAC: a secure blockchain-based access control framework for information-centric networking. J. Netw. Comput. Appl. 149, 1\u201317 (2020)","journal-title":"J. Netw. Comput. Appl."},{"issue":"1","key":"14_CR18","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/TDSC.2017.2672991","volume":"16","author":"S Misra","year":"2017","unstructured":"Misra, S., Tourani, R., Natividad, F., Mick, T., Majd, N.E., Huang, H.: AccConF: an access control framework for leveraging in-network cached data in the ICN-enabled wireless edge. IEEE Trans. Dependable Secure Comput. 16(1), 5\u201317 (2017)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"14_CR19","unstructured":"Nazarian, A., Arana, M., Prestegard, D.L.: Blockchain configuration for secure content delivery. Patents (2021)"},{"key":"14_CR20","doi-asserted-by":"crossref","unstructured":"Pelle, I., Czentye, J., D\u00f3ka, J., Sonkoly, B.: Towards latency sensitive cloud native applications: a performance study on AWS. In: IEEE 12th International Conference on Cloud Computing, pp. 272\u2013280. IEEE (2019)","DOI":"10.1109\/CLOUD.2019.00054"},{"key":"14_CR21","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.cosrev.2016.01.001","volume":"19","author":"D Saxena","year":"2016","unstructured":"Saxena, D., Raychoudhury, V., Suri, N., Becker, C., Cao, J.: Named data networking: a survey. Comput. Sci. Rev. 19, 15\u201355 (2016)","journal-title":"Comput. Sci. Rev."},{"key":"14_CR22","doi-asserted-by":"crossref","unstructured":"Tan, X., Huang, C., Ji, L.: Access control scheme based on combination of blockchain and XOR-coding for ICN. In: 5th International Conference on Cyber Security and Cloud Computing\/4th International Conference on Edge Computing and Scalable Cloud, pp. 160\u2013165. IEEE (2018)","DOI":"10.1109\/CSCloud\/EdgeCom.2018.00036"},{"key":"14_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2021.103329","volume":"200","author":"QT Thai","year":"2022","unstructured":"Thai, Q.T., Ko, N., Byun, S.H., Kim, S.M.: Design and implementation of NDN-based ethereum blockchain. J. Netw. Comput. Appl. 200, 1\u201318 (2022)","journal-title":"J. Netw. Comput. Appl."},{"key":"14_CR24","doi-asserted-by":"crossref","unstructured":"Wissingh, B., Wood, C.A., Afanasyev, A., Zhang, L., Oran, D., Tschudin, C.: Information-centric networking (ICN): content-centric networking (CCNx) and named data networking (NDN) terminology. Informational RFC 8793, IETF (2020)","DOI":"10.17487\/RFC8793"},{"issue":"11","key":"14_CR25","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/MCOM.2018.1701147","volume":"56","author":"Z Zhang","year":"2018","unstructured":"Zhang, Z., et al.: An overview of security support in named data networking. IEEE Commun. Mag. 56(11), 62\u201368 (2018)","journal-title":"IEEE Commun. Mag."}],"container-title":["Lecture Notes in Computer Science","Parallel and Distributed Computing, Applications and Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-29927-8_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,7]],"date-time":"2023-04-07T12:05:18Z","timestamp":1680869118000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-29927-8_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031299261","9783031299278"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-29927-8_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"8 April 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PDCAT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Parallel and Distributed Computing: Applications and Technologies","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sendai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 December 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 December 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pdcat2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.hpc.is.tohoku.ac.jp\/pdcat2022\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Open","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"95","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"16","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"25% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}