{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T05:10:11Z","timestamp":1751692211271,"version":"3.41.0"},"publisher-location":"Cham","reference-count":39,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319942889"},{"type":"electronic","value":"9783319942896"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-94289-6_10","type":"book-chapter","created":{"date-parts":[[2018,6,18]],"date-time":"2018-06-18T11:30:15Z","timestamp":1529321415000},"page":"151-165","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["A Decentralized Sharding Service Network Framework with Scalability"],"prefix":"10.1007","author":[{"given":"Shubin","family":"Cai","sequence":"first","affiliation":[]},{"given":"Ningsheng","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Zhong","family":"Ming","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,19]]},"reference":[{"key":"10_CR1","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. bitcoin.org (2009)"},{"key":"10_CR2","doi-asserted-by":"crossref","unstructured":"Luu, L., Narayanan, V., Zheng, C., et al.: A secure sharding protocol for open blockchains. In: ACM SIGSAC Conference on Computer and Communications Security, pp. 17\u201330. ACM (2016)","DOI":"10.1145\/2976749.2978389"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Marandi, P.J., Primi, M., Schiper, N., et al.: Ring Paxos: a high-throughput atomic broadcast protocol. In: IEEE\/IFIP International Conference on Dependable Systems and Networks, pp. 527\u2013536. IEEE (2010)","DOI":"10.1109\/DSN.2010.5544272"},{"key":"10_CR4","unstructured":"https:\/\/en.wikipedia.org\/wiki\/Proof-of-stake"},{"key":"10_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1007\/978-3-662-45472-5_28","volume-title":"Financial Cryptography and Data Security","author":"I Eyal","year":"2014","unstructured":"Eyal, I., Sirer, E.G.: Majority is not enough: bitcoin mining is vulnerable. In: Christin, N., Safavi-Naini, R. (eds.) FC 2014. LNCS, vol. 8437, pp. 436\u2013454. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-45472-5_28"},{"key":"10_CR6","unstructured":"Sompolinsky, Y., Zohar, A.: Accelerating bitcoin\u2019s transaction processing. Fast money grows on trees, not chains. Cryptology ePrint Archive, Report 2013\/881 (2013). http:\/\/eprint.iacr.org\/"},{"key":"10_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"528","DOI":"10.1007\/978-3-662-47854-7_33","volume-title":"Financial Cryptography and Data Security","author":"Y Lewenberg","year":"2015","unstructured":"Lewenberg, Y., Sompolinsky, Y., Zohar, A.: Inclusive block chain protocols. In: B\u00f6hme, R., Okamoto, T. (eds.) FC 2015. LNCS, vol. 8975, pp. 528\u2013547. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-47854-7_33"},{"key":"10_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/3-540-45748-8_24","volume-title":"Peer-to-Peer Systems","author":"JR Douceur","year":"2002","unstructured":"Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251\u2013260. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-45748-8_24"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Newsome, J., Shi, E., Song, D., Perrig, A.: The sybil attack in sensor networks: analysis and defenses. In: Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks, IPSN 2004, pp. 259\u2013268. ACM, New York (2004)","DOI":"10.1145\/984622.984660"},{"issue":"3","key":"10_CR10","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1145\/357172.357176","volume":"4","author":"L Lamport","year":"1982","unstructured":"Lamport, L., Shostak, R., Pease, M.: The Byzantine generals problem. ACM Trans. Program. Lang. Syst. 4(3), 382\u2013401 (1982)","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"10_CR11","doi-asserted-by":"publisher","first-page":"965","DOI":"10.1137\/1.9781611973075.78","volume-title":"Proceedings of the Twenty-First Annual ACM-SIAM Symposium on Discrete Algorithms","author":"Seth Gilbert","year":"2010","unstructured":"Gilbert, S., Kowalski, D.R.: Distributed agreement with optimal communication complexity. In: Proceedings of the Twenty-First Annual ACM-SIAM Symposium on Discrete Algorithms, pp. 965\u2013977. Society for Industrial and Applied Mathematics (2010)"},{"issue":"2","key":"10_CR12","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1145\/322186.322188","volume":"27","author":"M Pease","year":"1980","unstructured":"Pease, M., Shostak, R., Lamport, L.: Reaching agreement in the presence of faults. J. ACM 27(2), 228\u2013234 (1980)","journal-title":"J. ACM"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Toueg, S., Perry, K.J., Srikanth, T.K.: Fast distributed agreement (preliminary version). In: Proceedings of the Fourth Annual ACM Symposium on Principles of Distributed Computing, pp. 87\u2013101. ACM (1985)","DOI":"10.1145\/323596.323604"},{"key":"10_CR14","unstructured":"Eyal, I., Gencer, A.E., Sirer, E.G., et al.: Bitcoin-NG: a scalable blockchain protocol, pp. 45\u201359 (2015)"},{"key":"10_CR15","unstructured":"Ethereum Foundation. Ethereum\u2019s white paper (2014). https:\/\/github.com\/ethereum\/wiki\/wiki\/White-Paper"},{"key":"10_CR16","unstructured":"Andresen, G.: Bitcoin improvement proposal 101 (2015). https:\/\/github.com\/bitcoin\/bips\/blob\/master\/bip-0101.mediawiki"},{"key":"10_CR17","unstructured":"Garzik, J.: Bitcoin improvement proposal 102 (2015). https:\/\/github.com\/bitcoin\/bips\/blob\/master\/bip-0102.mediawiki"},{"key":"10_CR18","unstructured":"Castro, M.: Practical Byzantine fault tolerance and proactive recovery. In: Symposium on Operating Systems Design and Implementation, pp. 173\u2013186. USENIX Association (1999)"},{"key":"10_CR19","doi-asserted-by":"crossref","unstructured":"Guerraoui, R., Huc, F., Kermarrec, A.-M.: Highly dynamic distributed computing with Byzantine failures. In: Proceedings of the 2013 ACM Symposium on Principles of Distributed Computing, PODC 2013 (2013)","DOI":"10.1145\/2484239.2484263"},{"key":"10_CR20","doi-asserted-by":"publisher","first-page":"910","DOI":"10.1145\/31846.42229","volume":"34","author":"G Bracha","year":"1987","unstructured":"Bracha, G.: An O(log n) expected rounds randomized Byzantine generals protocol. J. ACM 34, 910\u2013920 (1987)","journal-title":"J. ACM"},{"issue":"2","key":"10_CR21","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/s00446-006-0005-x","volume":"19","author":"L Lamport","year":"2006","unstructured":"Lamport, L.: Fast paxos. Distrib. Comput. 19(2), 79\u2013103 (2006)","journal-title":"Distrib. Comput."},{"key":"10_CR22","unstructured":"Clement, A., Wong, E., Alvisi, L., Dahlin, M., Marchetti, M.: Making Byzantine fault tolerant systems tolerate Byzantine faults. In: Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation, pp. 153\u2013168. USENIX Association (2009)"},{"key":"10_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"464","DOI":"10.1007\/978-3-642-04355-0_47","volume-title":"Distributed Computing","author":"V King","year":"2009","unstructured":"King, V., Saia, J.: From almost everywhere to everywhere: Byzantine agreement with $$\\tilde{O}(n^{3\/2})$$ bits. In: Keidar, I. (ed.) DISC 2009. LNCS, vol. 5805, pp. 464\u2013478. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-04355-0_47"},{"key":"10_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/978-3-642-17679-1_18","volume-title":"Distributed Computing and Networking","author":"V King","year":"2011","unstructured":"King, V., Lonargan, S., Saia, J., Trehan, A.: Load balanced scalable Byzantine agreement through quorum building, with full information. In: Aguilera, M.K., Yu, H., Vaidya, N.H., Srinivasan, V., Choudhury, R.R. (eds.) ICDCN 2011. LNCS, vol. 6522, pp. 203\u2013214. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-17679-1_18"},{"key":"10_CR25","doi-asserted-by":"crossref","unstructured":"Braud-Santoni, N., Guerraoui, R., Huc, F.: Fast Byzantine agreement. In: Proceedings of the 2013 ACM Symposium on Principles of Distributed Computing, pp. 57\u201364. ACM (2013)","DOI":"10.1145\/2484239.2484243"},{"key":"10_CR26","doi-asserted-by":"publisher","first-page":"18:1","DOI":"10.1145\/1989727.1989732","volume":"58","author":"V King","year":"2011","unstructured":"King, V., Saia, J.: Breaking the $$O(n^2)$$ bit barrier: scalable Byzantine agreement with an adaptive adversary. J. ACM 58, 18:1\u201318:24 (2011)","journal-title":"J. ACM"},{"issue":"7","key":"10_CR27","doi-asserted-by":"publisher","first-page":"558","DOI":"10.1145\/359545.359563","volume":"21","author":"L Lamport","year":"1978","unstructured":"Lamport, L.: Time, clocks, and the ordering of events in a distributed system. Commun. ACM 21(7), 558\u2013565 (1978)","journal-title":"Commun. ACM"},{"key":"10_CR28","unstructured":"Cristian, F., Mishra, S.: The Pinwheel asynchronous atomic broadcast protocols. In: International Symposium on Autonomous Decentralized Systems (ISADS), Phoenix, Arizona, USA (1995)"},{"issue":"4","key":"10_CR29","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1145\/1041680.1041682","volume":"36","author":"X Defago","year":"2004","unstructured":"Defago, X., Schiper, A., Urban, P.: Total order broadcast and multicast algorithms: taxonomy and survey. ACM Comput. Surv. 36(4), 372\u2013421 (2004)","journal-title":"ACM Comput. Surv."},{"key":"10_CR30","doi-asserted-by":"crossref","unstructured":"Ekwall, R., Schiper, A., Urban, P.: Token-based atomic broadcast using unreliable failure detectors. In: Proceedings of the International Symposium on Reliable Distributed Systems (SRDS), pp. 52\u201365 (2004)","DOI":"10.1109\/RELDIS.2004.1353003"},{"key":"10_CR31","unstructured":"Fritzke, U., Ingels, P., Mostefaoui, A., Raynal, M.: Faulttolerant total order multicast to asynchronous groups. In: Proceedings of International Symposium on Reliable Distributed Systems (SRDS), pp. 578\u2013585 (1998)"},{"key":"10_CR32","unstructured":"Hadzilacos, V., Toueg, S.: Fault-tolerant broadcasts and related problems. In: Distributed Systems, Chap. 5, 2nd edn. Addison-Wesley (1993)"},{"key":"10_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1007\/BFb0056492","volume-title":"Distributed Computing","author":"F Pedone","year":"1998","unstructured":"Pedone, F., Schiper, A.: Optimistic atomic broadcast. In: Kutten, S. (ed.) DISC 1998. LNCS, vol. 1499, pp. 318\u2013332. Springer, Heidelberg (1998). https:\/\/doi.org\/10.1007\/BFb0056492"},{"key":"10_CR34","doi-asserted-by":"crossref","unstructured":"Poke, M., Hoefler, T., Glass, C.W.: AllConcur: leaderless concurrent atomic broadcast. In: International Symposium on High-Performance Parallel and Distributed Computing, pp. 205\u2013218. ACM (2017)","DOI":"10.1145\/3078597.3078598"},{"key":"10_CR35","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1504\/IJTIS.2018.090770","volume":"6","author":"O Hueber","year":"2018","unstructured":"Hueber, O.: The blockchain and the sidechain innovations for the electronic commerce beyond the Bitcoin\u2019s framework. Int. J. Transit. Innov. Syst. 6, 88\u2013102 (2018)","journal-title":"Int. J. Transit. Innov. Syst."},{"issue":"3","key":"10_CR36","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1504\/IJAUDIT.2017.10007789","volume":"3","author":"LCD Oliveira","year":"2017","unstructured":"Oliveira, L.C.D., Simoyama, F.D.O., Grigg, I., et al.: Triple entry ledgers with blockchain for auditing. Int. J. Audit. Technol. 3(3), 163 (2017)","journal-title":"Int. J. Audit. Technol."},{"key":"10_CR37","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1504\/IJCSE.2016.078441","volume":"13","author":"S Feld","year":"2014","unstructured":"Feld, S., Sch\u00f6nfeld, M., Werner, M.: Traversing Bitcoin\u2019s P2P network: insights into the structure of a decentralized currency. Int. J. Comput. Sci. Eng. 13, 122\u2013131 (2014)","journal-title":"Int. J. Comput. Sci. Eng."},{"issue":"1","key":"10_CR38","first-page":"55","volume":"8","author":"A Ouaguid","year":"2018","unstructured":"Ouaguid, A., Abghour, N., Ouzzif, M.: A novel security framework for managing Android permissions using blockchain technology. Int. J. Cloud Appl. Comput. (IJCAC) 8(1), 55\u201379 (2018)","journal-title":"Int. J. Cloud Appl. Comput. (IJCAC)"},{"key":"10_CR39","doi-asserted-by":"crossref","unstructured":"Asharaf, S., Adarsh, S.: Advanced topics in blockchains. In: Decentralized Computing Using Blockchain Technologies and Smart Contracts: Emerging Research and Opportunities (2017)","DOI":"10.4018\/978-1-5225-2193-8"}],"container-title":["Lecture Notes in Computer Science","Web Services \u2013 ICWS 2018"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-94289-6_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T04:57:11Z","timestamp":1751691431000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-94289-6_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319942889","9783319942896"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-94289-6_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"19 June 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICWS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Web Services","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Seattle, WA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icws2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/icws.org\/2018\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"www.confhub.com","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"116","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"31","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"27% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}