{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T16:56:20Z","timestamp":1742921780918,"version":"3.40.3"},"publisher-location":"Cham","reference-count":99,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031493607"},{"type":"electronic","value":"9783031493614"}],"license":[{"start":{"date-parts":[[2023,12,14]],"date-time":"2023-12-14T00:00:00Z","timestamp":1702512000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,12,14]],"date-time":"2023-12-14T00:00:00Z","timestamp":1702512000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-49361-4_8","type":"book-chapter","created":{"date-parts":[[2023,12,13]],"date-time":"2023-12-13T05:02:31Z","timestamp":1702443751000},"page":"133-171","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Algorithmic Aspects of\u00a0Distributed Hash Tables on\u00a0Cloud, Fog, and\u00a0Edge Computing Applications: A Survey"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4632-6511","authenticated-orcid":false,"given":"Aristeidis","family":"Karras","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4253-7661","authenticated-orcid":false,"given":"Christos","family":"Karras","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8490-6544","authenticated-orcid":false,"given":"Nikolaos","family":"Schizas","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1825-5565","authenticated-orcid":false,"given":"Spyros","family":"Sioutas","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1425-5138","authenticated-orcid":false,"given":"Christos","family":"Zaroliagis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,12,14]]},"reference":[{"issue":"1","key":"8_CR1","doi-asserted-by":"publisher","first-page":"130","DOI":"10.21123\/bsj.2019.16.1.0130","volume":"16","author":"MM Abed","year":"2019","unstructured":"Abed, M.M., Younis, M.F.: Developing load balancing for IoT-cloud computing based on advanced firefly and weighted round robin algorithms. Baghdad Sci. J. 16(1), 130\u2013139 (2019)","journal-title":"Baghdad Sci. J."},{"issue":"2","key":"8_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2632296","volume":"47","author":"SA Abid","year":"2014","unstructured":"Abid, S.A., Othman, M., Shah, N.: A survey on DHT-based routing for large-scale mobile ad hoc networks. ACM Comput. Surv. (CSUR) 47(2), 1\u201346 (2014)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"8_CR3","doi-asserted-by":"publisher","unstructured":"Alladi, T., Chamola, V., Rodrigues, J.J.P.C., Kozlov, S.A.: Blockchain in smart grids: a review on different use cases. Sensors 19(22) (2019). https:\/\/doi.org\/10.3390\/s19224862. https:\/\/www.mdpi.com\/1424-8220\/19\/22\/4862","DOI":"10.3390\/s19224862"},{"issue":"4","key":"8_CR4","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1145\/1041680.1041681","volume":"36","author":"S Androutsellis-Theotokis","year":"2004","unstructured":"Androutsellis-Theotokis, S., Spinellis, D.: A survey of peer-to-peer content distribution technologies. ACM Comput. Surv. (CSUR) 36(4), 335\u2013371 (2004)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Backes, M., Goldberg, I., Kate, A., Toft, T.: Adding query privacy to robust DHTs. In: Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, pp. 30\u201331 (2012)","DOI":"10.1145\/2414456.2414473"},{"key":"8_CR6","doi-asserted-by":"publisher","unstructured":"Balatsouras, C.P., Karras, A., Karras, C., Tsolis, D., Sioutas, S.: WiCHORD: a chord protocol application on P2P LoRa wireless sensor networks. In: 2022 13th International Conference on Information, Intelligence, Systems & Applications (IISA), pp. 1\u20138 (2022). https:\/\/doi.org\/10.1109\/IISA56318.2022.9904339","DOI":"10.1109\/IISA56318.2022.9904339"},{"key":"8_CR7","unstructured":"Benet, J.: IPFS - content addressed, versioned, P2P file system. CoRR abs\/1407.3561 (2014). arxiv.org\/abs\/1407.3561"},{"issue":"1","key":"8_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2020.102397","volume":"58","author":"D Berdik","year":"2021","unstructured":"Berdik, D., Otoum, S., Schmidt, N., Porter, D., Jararweh, Y.: A survey on blockchain for information systems management and security. Inf. Process. Manag. 58(1), 102397 (2021)","journal-title":"Inf. Process. Manag."},{"key":"8_CR9","doi-asserted-by":"publisher","unstructured":"Bonvin, N., Papaioannou, T.G., Aberer, K.: A self-organized, fault-tolerant and scalable replication scheme for cloud storage. In: Proceedings of the 1st ACM Symposium on Cloud Computing, SoCC 2010, pp. 205\u2013216. Association for Computing Machinery, New York, NY, USA (2010). https:\/\/doi.org\/10.1145\/1807128.1807162","DOI":"10.1145\/1807128.1807162"},{"key":"8_CR10","unstructured":"Cassandra, A.: Apache Cassandra. 13 (2014). http:\/\/planetcassandraorg\/what-is-apache-cassandra"},{"key":"8_CR11","unstructured":"Condie, T., Kacholia, V., Sank, S., Hellerstein, J.M., Maniatis, P.: Induced churn as shelter from routing-table poisoning. In: NDSS (2006)"},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"Confais, B., Lebre, A., Parrein, B.: An object store service for a fog\/edge computing infrastructure based on IPFS and a scale-out NAS. In: 2017 IEEE 1st International Conference on Fog and Edge Computing (ICFEC), pp. 41\u201350. IEEE (2017)","DOI":"10.1109\/ICFEC.2017.13"},{"issue":"1","key":"8_CR13","doi-asserted-by":"publisher","first-page":"657","DOI":"10.1109\/COMST.2016.2611524","volume":"19","author":"C Cooper","year":"2016","unstructured":"Cooper, C., Franklin, D., Ros, M., Safaei, F., Abolhasan, M.: A comparative survey of VANET clustering techniques. IEEE Commun. Surv. Tutorials 19(1), 657\u2013681 (2016)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"8_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/978-3-540-45172-3_3","volume-title":"Peer-to-Peer Systems II","author":"F Dabek","year":"2003","unstructured":"Dabek, F., Zhao, B., Druschel, P., Kubiatowicz, J., Stoica, I.: Towards a common API for structured peer-to-peer overlays. In: Kaashoek, M.F., Stoica, I. (eds.) IPTPS 2003. LNCS, vol. 2735, pp. 33\u201344. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-45172-3_3"},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"D\u2019Angelo, M., Caporuscio, M.: SA-Chord: a self-adaptive P2P overlay network. In: 2018 IEEE 3rd International Workshops on Foundations and Applications of Self* Systems (FAS* W), pp. 118\u2013123. IEEE (2018)","DOI":"10.1109\/FAS-W.2018.00035"},{"key":"8_CR16","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1016\/j.cosrev.2018.01.001","volume":"27","author":"A De Salve","year":"2018","unstructured":"De Salve, A., Mori, P., Ricci, L.: A survey on privacy in decentralized online social networks. Comput. Sci. Rev. 27, 154\u2013176 (2018)","journal-title":"Comput. Sci. Rev."},{"key":"8_CR17","doi-asserted-by":"crossref","unstructured":"DeCandia, G., et al.: Dynamo: Amazon\u2019s highly available key-value store. In: ACM SIGOPS Operating Systems Review, vol. 41, pp. 205\u2013220. ACM (2007)","DOI":"10.1145\/1323293.1294281"},{"key":"8_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/978-3-319-19662-6_21","volume-title":"Ad-hoc, Mobile, and Wireless Networks","author":"FF Demertzis","year":"2015","unstructured":"Demertzis, F.F., Karopoulos, G., Xenakis, C., Colarieti, A.: Self-organised key management for the smart grid. In: Papavassiliou, S., Ruehrup, S. (eds.) ADHOC-NOW 2015. LNCS, vol. 9143, pp. 303\u2013316. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-19662-6_21"},{"key":"8_CR19","doi-asserted-by":"publisher","unstructured":"Egala, B.S., Pradhan, A.K., Dey, P., Badarla, V., Mohanty, S.P.: Fortified-chain 2.0: intelligent blockchain for decentralized smart healthcare system. IEEE Internet Things J., 1 (2023). https:\/\/doi.org\/10.1109\/JIOT.2023.3247452","DOI":"10.1109\/JIOT.2023.3247452"},{"key":"8_CR20","doi-asserted-by":"publisher","unstructured":"El-Salakawy, G., Abu El-Kheir, M.: Blockchain-based data management in vehicular networks. In: 2020 2nd Novel Intelligent and Leading Emerging Sciences Conference (NILES), pp. 146\u2013151 (2020). https:\/\/doi.org\/10.1109\/NILES50944.2020.9257890","DOI":"10.1109\/NILES50944.2020.9257890"},{"key":"8_CR21","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/s11276-012-0461-0","volume":"19","author":"G Fersi","year":"2013","unstructured":"Fersi, G., Louati, W., Ben Jemaa, M.: Distributed hash table-based routing and data management in wireless sensor networks: a survey. Wireless Netw. 19, 219\u2013236 (2013)","journal-title":"Wireless Netw."},{"key":"8_CR22","unstructured":"Freedman, M.J., Freudenthal, E., Mazieres, D.: Democratizing content publication with coral. In: NSDI, vol. 4, p. 18 (2004)"},{"key":"8_CR23","unstructured":"Geambasu, R., Falkner, J., Gardner, P., Kohno, T., Krishnamurthy, A., Levy, H.M.: Experiences building security applications on DHTs. Technical report, UW-CSE-09-09-01 (2009)"},{"key":"8_CR24","doi-asserted-by":"crossref","unstructured":"Gedeon, J., Meurisch, C., Bhat, D., Stein, M., Wang, L., M\u00fchlh\u00e4user, M.: Router-based brokering for surrogate discovery in edge computing. In: 2017 IEEE 37th International Conference on Distributed Computing Systems Workshops (ICDCSW), pp. 145\u2013150. IEEE (2017)","DOI":"10.1109\/ICDCSW.2017.61"},{"key":"8_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13638-016-0659-4","volume":"2016","author":"SM Ghaleb","year":"2016","unstructured":"Ghaleb, S.M., Subramaniam, S., Zukarnain, Z.A., Muhammed, A.: Mobility management for IoT: a survey. EURASIP J. Wirel. Commun. Netw. 2016, 1\u201325 (2016)","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"key":"8_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1007\/978-3-540-45172-3_15","volume-title":"Peer-to-Peer Systems II","author":"I Gupta","year":"2003","unstructured":"Gupta, I., Birman, K., Linga, P., Demers, A., van Renesse, R.: Kelips: building an efficient and stable P2P DHT through increased memory and background overhead. In: Kaashoek, M.F., Stoica, I. (eds.) IPTPS 2003. LNCS, vol. 2735, pp. 160\u2013169. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-45172-3_15"},{"key":"8_CR27","doi-asserted-by":"publisher","unstructured":"Gupta, R.K., Hada, R., Sudhir, S.: 2-tiered cloud based content delivery network architecture: an efficient load balancing approach for video streaming. In: 2017 International Conference on Signal Processing and Communication (ICSPC), pp. 431\u2013435 (2017). https:\/\/doi.org\/10.1109\/CSPC.2017.8305885","DOI":"10.1109\/CSPC.2017.8305885"},{"key":"8_CR28","unstructured":"Hassanzadeh-Nazarabadi, Y., Boshrooyeh, S.T., Otoum, S., Ucar, S., \u00d6zkasap, \u00d6.: DHT-based communications survey: architectures and use cases. CoRR abs\/2109.10787 (2021). arxiv.org\/abs\/2109.10787"},{"key":"8_CR29","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/j.jpdc.2020.10.008","volume":"149","author":"Y Hassanzadeh-Nazarabadi","year":"2021","unstructured":"Hassanzadeh-Nazarabadi, Y., K\u00fcp\u00e7\u00fc, A., \u00d6zkasap, \u00d6.: Interlaced: fully decentralized churn stabilization for skip graph-based DHTs. J. Parallel Distrib. Comput. 149, 13\u201328 (2021)","journal-title":"J. Parallel Distrib. Comput."},{"issue":"3","key":"8_CR30","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1007\/s00224-004-1146-6","volume":"37","author":"K Hildrum","year":"2004","unstructured":"Hildrum, K., Kubiatowicz, J.D., Rao, S., Zhao, B.Y.: Distributed object location in a dynamic network. Theory Comput. Syst. 37(3), 405\u2013440 (2004)","journal-title":"Theory Comput. Syst."},{"key":"8_CR31","doi-asserted-by":"crossref","unstructured":"Ito, M., Saito, A., Nishizeki, T.: Secret sharing scheme realizing general access structure. Electron. Commun. Japan (Part III: Fundam. Electron. Sci.) 72(9), 56\u201364 (1989)","DOI":"10.1002\/ecjc.4430720906"},{"key":"8_CR32","unstructured":"Jastaniah, K., Zhang, N., Mustafa, M.A.: Efficient privacy-friendly and flexible IoT data aggregation with user-centric access control. arXiv preprint arXiv:2203.00465 (2022)"},{"key":"8_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1007\/978-3-540-45172-3_9","volume-title":"Peer-to-Peer Systems II","author":"MF Kaashoek","year":"2003","unstructured":"Kaashoek, M.F., Karger, D.R.: Koorde: a simple degree-optimal distributed hash table. In: Kaashoek, M.F., Stoica, I. (eds.) IPTPS 2003. LNCS, vol. 2735, pp. 98\u2013107. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-45172-3_9"},{"issue":"2","key":"8_CR34","doi-asserted-by":"publisher","first-page":"319","DOI":"10.14232\/actacyb.289938","volume":"25","author":"MB Kamel","year":"2021","unstructured":"Kamel, M.B., Ligeti, P., Reich, C.: Lamred: location-aware and decentralized multi-layer resource discovery for IoT. Acta Cybernet. 25(2), 319\u2013349 (2021)","journal-title":"Acta Cybernet."},{"key":"8_CR35","doi-asserted-by":"crossref","unstructured":"Karagiannis, V.: Compute node communication in the fog: survey and research challenges. In: Proceedings of the Workshop on Fog Computing and the IoT, pp. 36\u201340 (2019)","DOI":"10.1145\/3313150.3313224"},{"key":"8_CR36","doi-asserted-by":"publisher","unstructured":"Karras, A., Karras, C., Giotopoulos, K.C., Tsolis, D., Oikonomou, K., Sioutas, S.: Peer to peer federated learning: towards decentralized machine learning on edge devices. In: 2022 7th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM), pp. 1\u20139 (2022). https:\/\/doi.org\/10.1109\/SEEDA-CECNSM57760.2022.9932980","DOI":"10.1109\/SEEDA-CECNSM57760.2022.9932980"},{"key":"8_CR37","doi-asserted-by":"publisher","unstructured":"Karras, A., Karras, C., Giotopoulos, K.C., Tsolis, D., Oikonomou, K., Sioutas, S.: Federated edge intelligence and edge caching mechanisms. Information 14(7) (2023). https:\/\/doi.org\/10.3390\/info14070414. https:\/\/www.mdpi.com\/2078-2489\/14\/7\/414","DOI":"10.3390\/info14070414"},{"key":"8_CR38","doi-asserted-by":"crossref","unstructured":"Katz, J., Lindell, Y.: Introduction to Modern Cryptography. CRC Press (2020)","DOI":"10.1201\/9781351133036"},{"key":"8_CR39","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1007\/s12083-013-0232-4","volume":"8","author":"H Kavalionak","year":"2015","unstructured":"Kavalionak, H., Carlini, E., Ricci, L., Montresor, A., Coppola, M.: Integrating peer-to-peer and cloud computing for massively multiuser online games. Peer-to-Peer Network. Appl. 8, 301\u2013319 (2015)","journal-title":"Peer-to-Peer Network. Appl."},{"key":"8_CR40","doi-asserted-by":"crossref","unstructured":"Kleinberg, J.: The small-world phenomenon: an algorithmic perspective. In: Proceedings of the Thirty-Second Annual ACM Symposium on Theory of Computing, pp. 163\u2013170. ACM (2000)","DOI":"10.1145\/335305.335325"},{"issue":"6798","key":"8_CR41","doi-asserted-by":"publisher","first-page":"845","DOI":"10.1038\/35022643","volume":"406","author":"JM Kleinberg","year":"2000","unstructured":"Kleinberg, J.M.: Navigation in a small world. Nature 406(6798), 845 (2000)","journal-title":"Nature"},{"key":"8_CR42","doi-asserted-by":"publisher","unstructured":"Klophaus, R.: Riak core: building distributed applications without shared state. In: ACM SIGPLAN Commercial Users of Functional Programming, CUFP 2010. Association for Computing Machinery, New York, NY, USA (2010). https:\/\/doi.org\/10.1145\/1900160.1900176","DOI":"10.1145\/1900160.1900176"},{"key":"8_CR43","doi-asserted-by":"publisher","unstructured":"Kuhn, E., Mordinyi, R., Goiss, H.D., Bessler, S., Tomic, S.: A P2P network of space containers for efficient management of spatial-temporal data in intelligent transportation scenarios. In: 2009 Eighth International Symposium on Parallel and Distributed Computing, pp. 218\u2013225 (2009). https:\/\/doi.org\/10.1109\/ISPDC.2009.27","DOI":"10.1109\/ISPDC.2009.27"},{"key":"8_CR44","doi-asserted-by":"publisher","unstructured":"Kumar, R., Marchang, N., Tripathi, R.: Distributed off-chain storage of patient diagnostic reports in healthcare system using IPFS and blockchain. In: 2020 International Conference on COMmunication Systems & NETworkS (COMSNETS), pp. 1\u20135 (2020). https:\/\/doi.org\/10.1109\/COMSNETS48256.2020.9027313","DOI":"10.1109\/COMSNETS48256.2020.9027313"},{"key":"8_CR45","doi-asserted-by":"crossref","unstructured":"Li, T., et al. ZHT: a light-weight reliable persistent dynamic scalable zero-hop distributed hash table. In: 2013 IEEE 27th International Symposium on Parallel & Distributed Processing (IPDPS), pp. 775\u2013787. IEEE (2013)","DOI":"10.1109\/IPDPS.2013.110"},{"issue":"1","key":"8_CR46","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1109\/TSG.2019.2920836","volume":"11","author":"JN Liu","year":"2019","unstructured":"Liu, J.N., Weng, J., Yang, A., Chen, Y., Lin, X.: Enabling efficient and privacy-preserving aggregation communication and function query for fog computing-based smart grid. IEEE Trans. Smart Grid 11(1), 247\u2013257 (2019)","journal-title":"IEEE Trans. Smart Grid"},{"key":"8_CR47","doi-asserted-by":"crossref","unstructured":"Liu, Z., Guo, J., Yang, W., Fan, J., Lam, K.Y., Zhao, J.: Privacy-preserving aggregation in federated learning: a survey. IEEE Trans. Big Data (2022)","DOI":"10.1109\/TBDATA.2022.3190835"},{"issue":"7","key":"8_CR48","doi-asserted-by":"publisher","first-page":"2452","DOI":"10.3390\/s21072452","volume":"21","author":"F Loukil","year":"2021","unstructured":"Loukil, F., Ghedira-Guegan, C., Boukadi, K., Benharkat, A.N.: Privacy-preserving IoT data aggregation based on blockchain and homomorphic encryption. Sensors 21(7), 2452 (2021)","journal-title":"Sensors"},{"key":"8_CR49","unstructured":"Manku, G.S., Bawa, M., Raghavan, P., et al.: Symphony: distributed hashing in a small world. In: USENIX Symposium on Internet Technologies and Systems, p. 10 (2003)"},{"key":"8_CR50","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/3-540-45748-8_5","volume-title":"Peer-to-Peer Systems","author":"P Maymounkov","year":"2002","unstructured":"Maymounkov, P., Mazi\u00e8res, D.: Kademlia: a peer-to-peer information system based on the XOR metric. In: Druschel, P., Kaashoek, F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 53\u201365. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-45748-8_5"},{"key":"8_CR51","doi-asserted-by":"crossref","unstructured":"Micheloni, A., Fuchs, K.P., Herrmann, D., Federrath, H.: Laribus: privacy-preserving detection of fake SSL certificates with a social P2P notary network. In: 2013 International Conference on Availability, Reliability and Security, pp. 1\u201310. IEEE (2013)","DOI":"10.1109\/ARES.2013.7"},{"issue":"1","key":"8_CR52","first-page":"60","volume":"2","author":"S Milgram","year":"1967","unstructured":"Milgram, S.: The small world problem. Psychol. Today 2(1), 60\u201367 (1967)","journal-title":"Psychol. Today"},{"key":"8_CR53","doi-asserted-by":"publisher","unstructured":"Nakagawa, I., et al.: DHT extension of m-cloud - scalable and distributed privacy preserving statistical computation on public cloud. In: 2015 IEEE 39th Annual Computer Software and Applications Conference, vol. 3, pp. 682\u2013683 (2015). https:\/\/doi.org\/10.1109\/COMPSAC.2015.94","DOI":"10.1109\/COMPSAC.2015.94"},{"key":"8_CR54","doi-asserted-by":"crossref","unstructured":"Nakayama, T., Asaka, T.: Peer-to-peer bidirectional streaming using mobile edge computing. In: 2017 Fifth International Symposium on Computing and Networking (CANDAR), pp. 263\u2013266. IEEE (2017)","DOI":"10.1109\/CANDAR.2017.38"},{"key":"8_CR55","unstructured":"Name, A.: TomP2P, a P2P-based key-value pair storage library (2012). https:\/\/tomp2p.net\/. Accessed: insert-the-date-you-accessed-the-website"},{"key":"8_CR56","doi-asserted-by":"crossref","unstructured":"Napoli, A., et al.: Enabling router bypass and saving cost using point-to-multipoint transceivers for traffic aggregation. In: Optical Fiber Communication Conference, pp. W3F\u20135. Optica Publishing Group (2022)","DOI":"10.1364\/OFC.2022.W3F.5"},{"key":"8_CR57","doi-asserted-by":"crossref","unstructured":"Orda, L.D., Jensen, T.V., Gehrke, O., Bindner, H.W.: Efficient routing for overlay networks in a smart grid context. In: SMARTGREENS, pp. 131\u2013136 (2019)","DOI":"10.5220\/0007717702510258"},{"issue":"1","key":"8_CR58","doi-asserted-by":"publisher","first-page":"589","DOI":"10.1109\/JIOT.2021.3083136","volume":"9","author":"C Peng","year":"2021","unstructured":"Peng, C., Luo, M., Wang, H., Khan, M.K., He, D.: An efficient privacy-preserving aggregation scheme for multidimensional data in IoT. IEEE Internet Things J. 9(1), 589\u2013600 (2021)","journal-title":"IEEE Internet Things J."},{"key":"8_CR59","doi-asserted-by":"publisher","unstructured":"Petrasch, R., Hentschke, R.: Cloud storage hub: data management for IoT and industry 4.0 applications: towards a consistent enterprise information management system. In: 2016 Management and Innovation Technology International Conference (MITicon), pp. MIT-108\u2013MIT-111 (2016). https:\/\/doi.org\/10.1109\/MITICON.2016.8025236","DOI":"10.1109\/MITICON.2016.8025236"},{"key":"8_CR60","doi-asserted-by":"publisher","unstructured":"Plaxton, C.G., Rajaraman, R., Richa, A.W.: Accessing nearby copies of replicated objects in a distributed environment. In: Proceedings of the Ninth Annual ACM Symposium on Parallel Algorithms and Architectures, SPAA 1997, pp. 311\u2013320. ACM, New York, NY, USA (1997). https:\/\/doi.org\/10.1145\/258492.258523","DOI":"10.1145\/258492.258523"},{"issue":"3","key":"8_CR61","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/s002240000118","volume":"32","author":"CG Plaxton","year":"1999","unstructured":"Plaxton, C.G., Rajaraman, R., Richa, A.W.: Accessing nearby copies of replicated objects in a distributed environment. Theory Comput. Syst. 32(3), 241\u2013280 (1999)","journal-title":"Theory Comput. Syst."},{"key":"8_CR62","doi-asserted-by":"crossref","unstructured":"Ratnasamy, S., Francis, P., Handley, M., Karp, R., Shenker, S.: A scalable content-addressable network (2001)","DOI":"10.1145\/383059.383072"},{"issue":"3","key":"8_CR63","doi-asserted-by":"publisher","first-page":"1778","DOI":"10.1109\/TSC.2022.3190375","volume":"16","author":"P Ren","year":"2023","unstructured":"Ren, P., Liu, L., Qiao, X., Chen, J.: Distributed edge system orchestration for web-based mobile augmented reality services. IEEE Trans. Serv. Comput. 16(3), 1778\u20131792 (2023). https:\/\/doi.org\/10.1109\/TSC.2022.3190375","journal-title":"IEEE Trans. Serv. Comput."},{"key":"8_CR64","doi-asserted-by":"crossref","unstructured":"Riabi, I., Saidane, L.A., Ayed, H.K.B.: A proposal of a distributed access control over fog computing: the its use case. In: 2017 International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks (PEMWN), pp. 1\u20137. IEEE (2017)","DOI":"10.23919\/PEMWN.2017.8308029"},{"key":"8_CR65","doi-asserted-by":"publisher","unstructured":"Rodrigues, A.S., Rizzetti, T.A., Canha, L.N., Milbradt, R.G., Appel, S.F., Duarte, Y.S.: Implementing a distributed firewall using a DHT network applied to smart grids. In: 2016 51st International Universities Power Engineering Conference (UPEC), pp. 1\u20135 (2016). https:\/\/doi.org\/10.1109\/UPEC.2016.8113985","DOI":"10.1109\/UPEC.2016.8113985"},{"key":"8_CR66","doi-asserted-by":"crossref","unstructured":"Roehrs, A., da Costa, C.A., da Rosa Righi, R.: OmniPHR: a distributed architecture model to integrate personal health records. J. Biomed. Inform. 71, 70\u201381 (2017)","DOI":"10.1016\/j.jbi.2017.05.012"},{"key":"8_CR67","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1007\/3-540-45518-3_18","volume-title":"Middleware 2001","author":"A Rowstron","year":"2001","unstructured":"Rowstron, A., Druschel, P.: Pastry: scalable, decentralized object location, and routing for large-scale peer-to-peer systems. In: Guerraoui, R. (ed.) Middleware 2001. LNCS, vol. 2218, pp. 329\u2013350. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-45518-3_18"},{"key":"8_CR68","doi-asserted-by":"publisher","unstructured":"Saberi, M.A., Adda, M., Mcheick, H.: Break-glass conceptual model for distributed EHR management system based on blockchain, IPFS and ABAC. Procedia Comput. Sci. 198, 185\u2013192 (2022). https:\/\/doi.org\/10.1016\/j.procs.2021.12.227. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1877050921024662. 12th International Conference on Emerging Ubiquitous Systems and Pervasive Networks\/11th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare","DOI":"10.1016\/j.procs.2021.12.227"},{"issue":"1","key":"8_CR69","first-page":"35","volume":"15","author":"W Saeed","year":"2021","unstructured":"Saeed, W., Ahmad, Z., Jehangiri, A.I., Mohamed, N., Umar, A.I., Ahmad, J.: A fault tolerant data management scheme for healthcare internet of things in fog computing. KSII Trans. Internet Inf. Syst. (TIIS) 15(1), 35\u201357 (2021)","journal-title":"KSII Trans. Internet Inf. Syst. (TIIS)"},{"key":"8_CR70","unstructured":"Santos, J., Wauters, T., Volckaert, B., De Turck, F.: Towards dynamic fog resource provisioning for smart city applications. In: 2018 14th International Conference on Network and Service Management (CNSM), pp. 290\u2013294. IEEE (2018)"},{"key":"8_CR71","unstructured":"Sharma, R., Chan, C.A., Leckie, C.: Evaluation of centralised vs distributed collaborative intrusion detection systems in multi-access edge computing. In: 2020 IFIP Networking Conference (Networking), pp. 343\u2013351. IEEE (2020)"},{"key":"8_CR72","doi-asserted-by":"publisher","first-page":"19912","DOI":"10.1109\/ACCESS.2018.2822693","volume":"6","author":"M Siddula","year":"2018","unstructured":"Siddula, M., Li, L., Li, Y.: An empirical study on the privacy preservation of online social networks. IEEE Access 6, 19912\u201319922 (2018)","journal-title":"IEEE Access"},{"key":"8_CR73","unstructured":"Simi\u0107, M., Stojkov, M., Sladi\u0107, G., Milosavljevi\u0107, B.: Edge computing system for large-scale distributed sensing systems. In: ICIST, pp. 36\u201339 (2018)"},{"key":"8_CR74","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1016\/j.jpdc.2020.05.009","volume":"144","author":"K Sonbol","year":"2020","unstructured":"Sonbol, K., \u00d6zkasap, \u00d6., Al-Oqily, I., Aloqaily, M.: EdgeKV: decentralized, scalable, and consistent storage for the edge. J. Parallel Distrib. Comput. 144, 28\u201340 (2020)","journal-title":"J. Parallel Distrib. Comput."},{"key":"8_CR75","doi-asserted-by":"crossref","unstructured":"Song, J., Gu, T., Ge, Y., Mohapatra, P.: Smart contract-based computing resources trading in edge computing. In: 2020 IEEE 31st Annual International Symposium on Personal, Indoor and Mobile Radio Communications, pp. 1\u20137. IEEE (2020)","DOI":"10.1109\/PIMRC48278.2020.9217122"},{"key":"8_CR76","unstructured":"Stevens, M.M.J., et al.: Attacks on hash functions and applications. Mathematical Institute, Faculty of Science, Leiden University (2012)"},{"key":"8_CR77","doi-asserted-by":"publisher","unstructured":"Stoica, I., Morris, R., Karger, D., Kaashoek, M.F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup service for internet applications. SIGCOMM Comput. Commun. Rev. 31, 149\u2013160 (2001). https:\/\/doi.org\/10.1145\/964723.383071","DOI":"10.1145\/964723.383071"},{"key":"8_CR78","unstructured":"Tanenbaum, A.S., Steen, M.: Distributed systems [sl] (2007)"},{"issue":"1","key":"8_CR79","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1109\/JIOT.2017.2767381","volume":"5","author":"G Tanganelli","year":"2017","unstructured":"Tanganelli, G., Vallati, C., Mingozzi, E.: Edge-centric distributed discovery and access in the internet of things. IEEE Internet Things J. 5(1), 425\u2013438 (2017)","journal-title":"IEEE Internet Things J."},{"key":"8_CR80","doi-asserted-by":"crossref","unstructured":"Tanganelli, G., Vallati, C., Mingozzi, E.: A fog-based distributed look-up service for intelligent transportation systems. In: 2017 IEEE 18th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), pp. 1\u20136. IEEE (2017)","DOI":"10.1109\/WoWMoM.2017.7974357"},{"key":"8_CR81","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1007\/978-3-319-38904-2_28","volume-title":"Cloud Computing","author":"T Tiendrebeogo","year":"2016","unstructured":"Tiendrebeogo, T.: A cloud computing system using virtual hyperbolic coordinates for services distribution. In: Zhang, Y., Peng, L., Youn, C.-H. (eds.) CloudComp 2015. LNICST, vol. 167, pp. 269\u2013279. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-38904-2_28"},{"issue":"1","key":"8_CR82","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2593512","volume":"47","author":"AN Toosi","year":"2014","unstructured":"Toosi, A.N., Calheiros, R.N., Buyya, R.: Interconnected cloud computing environments: challenges, taxonomy, and survey. ACM Comput. Surv. (CSUR) 47(1), 1\u201347 (2014)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"8_CR83","doi-asserted-by":"publisher","unstructured":"Tracey, D., Sreenan, C.: Using a DHT in a peer to peer architecture for the internet of things. In: 2019 IEEE 5th World Forum on Internet of Things (WF-IoT), pp. 560\u2013565 (2019). https:\/\/doi.org\/10.1109\/WF-IoT.2019.8767261","DOI":"10.1109\/WF-IoT.2019.8767261"},{"key":"8_CR84","doi-asserted-by":"crossref","unstructured":"Varshney, P., Simmhan, Y.: Demystifying fog computing: characterizing architectures, applications and abstractions. In: 2017 IEEE 1st International Conference on Fog and Edge Computing (ICFEC), pp. 115\u2013124. IEEE (2017)","DOI":"10.1109\/ICFEC.2017.20"},{"key":"8_CR85","unstructured":"Varvello, M., Azurmendi, I.Q., Nappa, A., Papadopoulos, P., Pestana, G., Livshits, B.: VPN0: a privacy-preserving decentralized virtual private network. arXiv preprint arXiv:1910.00159 (2019)"},{"issue":"8","key":"8_CR86","doi-asserted-by":"publisher","first-page":"6535","DOI":"10.1109\/JIOT.2022.3153653","volume":"10","author":"C Wang","year":"2023","unstructured":"Wang, C., Cai, Z., Li, Y.: Sustainable blockchain-based digital twin management architecture for IoT devices. IEEE Internet Things J. 10(8), 6535\u20136548 (2023). https:\/\/doi.org\/10.1109\/JIOT.2022.3153653","journal-title":"IEEE Internet Things J."},{"key":"8_CR87","doi-asserted-by":"publisher","unstructured":"Wu, T., Yeoh, P.L., Jourjon, G., Thilakarathna, K.: MapChain: a DHT-based dual-blockchain data structure for large-scale IoT systems. In: 2021 IEEE 7th World Forum on Internet of Things (WF-IoT), pp. 177\u2013182 (2021). https:\/\/doi.org\/10.1109\/WF-IoT51360.2021.9595910","DOI":"10.1109\/WF-IoT51360.2021.9595910"},{"key":"8_CR88","doi-asserted-by":"publisher","unstructured":"Xie, X.L., Wang, Q., Wang, P.: Design of smart container cloud based on DHT. In: 2017 13th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD), pp. 2971\u20132975 (2017). https:\/\/doi.org\/10.1109\/FSKD.2017.8393255","DOI":"10.1109\/FSKD.2017.8393255"},{"key":"8_CR89","doi-asserted-by":"publisher","first-page":"1025","DOI":"10.1007\/s12083-014-0295-x","volume":"8","author":"J Xiong","year":"2015","unstructured":"Xiong, J., Li, F., Ma, J., Liu, X., Yao, Z., Chen, P.S.: A full lifecycle privacy protection scheme for sensitive data in cloud computing. Peer-to-Peer Network. Appl. 8, 1025\u20131037 (2015)","journal-title":"Peer-to-Peer Network. Appl."},{"key":"8_CR90","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1109\/TIFS.2022.3140657","volume":"17","author":"Y Yang","year":"2022","unstructured":"Yang, Y., Zhang, L., Zhao, Y., Choo, K.K.R., Zhang, Y.: Privacy-preserving aggregation-authentication scheme for safety warning system in fog-cloud based VANET. IEEE Trans. Inf. Forensics Secur. 17, 317\u2013331 (2022)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"8_CR91","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1016\/j.sysarc.2019.02.009","volume":"98","author":"A Yousefpour","year":"2019","unstructured":"Yousefpour, A., et al.: All one needs to know about fog computing and related edge computing paradigms: a complete survey. J. Syst. Architect. 98, 289\u2013330 (2019)","journal-title":"J. Syst. Architect."},{"issue":"2","key":"8_CR92","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1145\/2185376.2185383","volume":"42","author":"P Zave","year":"2012","unstructured":"Zave, P.: Using lightweight modeling to understand chord. ACM SIGCOMM Comput. Commun. Rev. 42(2), 49\u201357 (2012)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"8_CR93","doi-asserted-by":"publisher","unstructured":"Zhang, H., Goel, A., Govindan, R.: Incrementally improving lookup latency in distributed hash table systems. SIGMETRICS Perform. Eval. Rev. 31(1), 114\u2013125 (2003). https:\/\/doi.org\/10.1145\/885651.781042","DOI":"10.1145\/885651.781042"},{"issue":"1","key":"8_CR94","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/JSAC.2003.818784","volume":"22","author":"BY Zhao","year":"2004","unstructured":"Zhao, B.Y., Huang, L., Stribling, J., Rhea, S.C., Joseph, A.D., Kubiatowicz, J.D.: Tapestry: a resilient global-scale overlay for service deployment. IEEE J. Sel. Areas Commun. 22(1), 41\u201353 (2004)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"3","key":"8_CR95","doi-asserted-by":"publisher","first-page":"2013","DOI":"10.1109\/TII.2019.2933482","volume":"16","author":"M Zhaofeng","year":"2020","unstructured":"Zhaofeng, M., Xiaochang, W., Jain, D.K., Khan, H., Hongmin, G., Zhen, W.: A blockchain-based trusted data management scheme in edge computing. IEEE Trans. Industr. Inf. 16(3), 2013\u20132021 (2020). https:\/\/doi.org\/10.1109\/TII.2019.2933482","journal-title":"IEEE Trans. Industr. Inf."},{"key":"8_CR96","first-page":"67","volume":"2011","author":"R Zhelev","year":"2011","unstructured":"Zhelev, R., Georgiev, V.: A DHT-based scalable and fault-tolerant cloud information service. UBICOMM 2011, 67 (2011)","journal-title":"UBICOMM"},{"issue":"18","key":"8_CR97","doi-asserted-by":"publisher","first-page":"4485","DOI":"10.1002\/cpe.3795","volume":"28","author":"J Zhou","year":"2016","unstructured":"Zhou, J., Fan, J., Jia, J.: A cost-efficient resource provisioning algorithm for DHT-based cloud storage systems. Concurrency Comput. Pract. Exp. 28(18), 4485\u20134506 (2016)","journal-title":"Concurrency Comput. Pract. Exp."},{"key":"8_CR98","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/978-3-662-44917-2_22","volume-title":"Network and Parallel Computing","author":"J Zhou","year":"2014","unstructured":"Zhou, J., He, W.: A novel resource provisioning model for DHT-based cloud storage systems. In: Hsu, C.-H., Shi, X., Salapura, V. (eds.) NPC 2014. LNCS, vol. 8707, pp. 257\u2013268. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-44917-2_22"},{"issue":"1","key":"8_CR99","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2894761","volume":"49","author":"X Zuo","year":"2016","unstructured":"Zuo, X., Iamnitchi, A.: A survey of socially aware peer-to-peer systems. ACM Comput. Surv. (CSUR) 49(1), 1\u201328 (2016)","journal-title":"ACM Comput. Surv. (CSUR)"}],"container-title":["Lecture Notes in Computer Science","Algorithmic Aspects of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-49361-4_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,13]],"date-time":"2023-12-13T05:05:34Z","timestamp":1702443934000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-49361-4_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,14]]},"ISBN":["9783031493607","9783031493614"],"references-count":99,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-49361-4_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023,12,14]]},"assertion":[{"value":"14 December 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ALGOCLOUD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Algorithmic Aspects of Cloud Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Amsterdam","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The Netherlands","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 September 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 September 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"algocloud2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/algo-conference.org\/2023\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"13","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"54% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}