{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T19:33:06Z","timestamp":1743017586033,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":31,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811527760"},{"type":"electronic","value":"9789811527777"}],"license":[{"start":{"date-parts":[[2019,12,23]],"date-time":"2019-12-23T00:00:00Z","timestamp":1577059200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-2777-7_60","type":"book-chapter","created":{"date-parts":[[2020,1,24]],"date-time":"2020-01-24T12:02:45Z","timestamp":1579867365000},"page":"740-746","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A Novel Exploration for Blockchain in Distributed File Storage"],"prefix":"10.1007","author":[{"given":"Zuoting","family":"Ning","sequence":"first","affiliation":[]},{"given":"Lu","family":"Li","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Liang","sequence":"additional","affiliation":[]},{"given":"Yifeng","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Qi","family":"Fu","sequence":"additional","affiliation":[]},{"given":"Hongjun","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,12,23]]},"reference":[{"key":"60_CR1","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/4236.957894","volume":"5","author":"S Rhea","year":"2001","unstructured":"Rhea, S., et al.: Maintenance-free global data storage. IEEE Internet Comput. 5, 40\u201349 (2001)","journal-title":"IEEE Internet Comput."},{"key":"60_CR2","unstructured":"Bhagwan, R., Tati, K., Cheng, Y.-C., Savage, S., Voelker, G.M.: Total recall: system support for automated availability management. In: NSDI (2004)"},{"key":"60_CR3","unstructured":"Dabek, F., Li, J., Sit, E., Robertson, J., Kaashoek, M., Morris, R.: Designing a DHT for low latency and high throughput (2004)"},{"issue":"6","key":"60_CR4","doi-asserted-by":"publisher","first-page":"2809","DOI":"10.1109\/TIT.2006.874535","volume":"52","author":"AG Dimakis","year":"2006","unstructured":"Dimakis, A.G., Prabhakaran, V., Ramchandran, K.: Decentralized erasure codes for distributed networked storage. IEEE Trans. Inf. Theory 52(6), 2809\u20132816 (2006)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"60_CR5","doi-asserted-by":"crossref","unstructured":"Kamra, A., Feldman, J., Misra, V., Rubenstein, D.: Growth codes: maximizing sensor network data persistence. In: ACM SIGCOMM (2006)","DOI":"10.1145\/1159913.1159943"},{"key":"60_CR6","unstructured":"Rhea, S., Eaton, P., Geels, D., Weatherspoon, H., Zhao, B., Kubiatowicz, J.: Pond: the OceanStore prototype. In: Proceedings of USENIX File and Storage Technologies (FAST) (2003)"},{"key":"60_CR7","doi-asserted-by":"crossref","unstructured":"Weatherspoon, H., Kubiatowicz, J.D.: Erasure coding vs. replication: a quantitiative comparison. In: Proceedings of IPTPS (2002)","DOI":"10.1007\/3-540-45748-8_31"},{"key":"60_CR8","doi-asserted-by":"crossref","unstructured":"Gkantsidis, C., Rodriguez, P.: Cooperative security for network coding file distribution. In: IEEE INFOCOM (2006)","DOI":"10.1109\/INFOCOM.2006.233"},{"key":"60_CR9","doi-asserted-by":"crossref","unstructured":"Ho, T., Leong, B., Koetter, R., Meard, M., Effros, M., Karger, D.: Byzantine modification detection in multicast networks using randomized network coding. In: ISIT (2004)","DOI":"10.1109\/ISIT.2005.1523691"},{"key":"60_CR10","doi-asserted-by":"crossref","unstructured":"Jaggi, S., Langberg, M., Katti, S., Ho, T., Katabi, D., Meard, M.: Resilient network coding in the presence of Byzantine adversaries. In: IEEE INFOCOM (2007)","DOI":"10.1109\/ISIT.2007.4557281"},{"key":"60_CR11","unstructured":"Krohn, M.N., Freedman, M.J., Mazieres, D.: On-the-fly verification of rateless erasure codes for efficient content distribution. In: Proceedings of the IEEE Symposium on Security and Privacy, Berkeley, CA, USA, 9\u201312 May 2004, pp. 226\u2013240 (2004)"},{"key":"60_CR12","doi-asserted-by":"crossref","unstructured":"Bolosky, W.J., Douceur, J.R., Ely, D., Theimer, M.: Feasibility of a serverless distributed file system deployed on an existing set of desktop PCs. In: Proceedings of SIGMETRICS (2000)","DOI":"10.1145\/339331.339345"},{"key":"60_CR13","doi-asserted-by":"crossref","unstructured":"Dabek, F., Kaashoek, F., Karger, D., Morris, R., Stoica, I.: Wide-area cooperative storage with CFS. In: Proceedings of ACM SOSP (2001)","DOI":"10.1145\/502034.502054"},{"key":"60_CR14","doi-asserted-by":"crossref","unstructured":"Rowstron, A., Druschel, P.: Storage management and caching in past, a large-scale, persistent peer-to-peer storage utility. In: Proceedings of ACM SOSP (2001)","DOI":"10.1145\/502034.502053"},{"key":"60_CR15","unstructured":"Weatherspoon, H., Chun, B.-G., So, C.W., Kubiatowicz, J.: Long-term data maintenance in wide-area storage systems: a quantitative approach, Technical report, UC Berkeley, UCB\/CSD-05-1404, July 2005"},{"key":"60_CR16","unstructured":"Blake, C., Rodrigues, R.: High availability, scalable storage, dynamic peer networks: pick two. In: Proceedings of HOTOS (2003)"},{"key":"60_CR17","unstructured":"Chun, B.-G., et al.: Efficient replica maintenance for distributed storage systems. In: NSDI (2006)"},{"key":"60_CR18","doi-asserted-by":"crossref","unstructured":"Tati, K., Voelker, G.M.: On object maintenance in peer-to-peer systems. In: Proceedings of IPTPS (2006)","DOI":"10.1007\/b104020"},{"key":"60_CR19","doi-asserted-by":"crossref","unstructured":"Godfrey, P.B., Shenker, S., Stoica, I.: Minimizing churn in distributed systems. In: Proceedings of ACM SIGCOMM (2006)","DOI":"10.1145\/1159913.1159931"},{"key":"60_CR20","volume-title":"Blockchain: Blueprint for a New Economy","author":"M Swan","year":"2015","unstructured":"Swan, M.: Blockchain: Blueprint for a New Economy. O\u2019Reilly Media Inc., Newton (2015)"},{"issue":"2012","key":"60_CR21","first-page":"28","volume":"1","author":"NS Bitcoin","year":"2008","unstructured":"Bitcoin, N.S.: A peer-to-peer electronic cash system. Consulted 1(2012), 28 (2008)","journal-title":"Consulted"},{"issue":"2","key":"60_CR22","doi-asserted-by":"publisher","first-page":"e86197","DOI":"10.1371\/journal.pone.0086197","volume":"9","author":"D Kondor","year":"2014","unstructured":"Kondor, D., P\u00f3sfai, M., Csabai, I., Vattay, G.: Do the rich get richer? An empirical analysis of the Bitcoin transaction network. PloS One 9(2), e86197 (2014). https:\/\/doi.org\/10.1371\/journal.pone.0086197. PMID: 24505257","journal-title":"PloS One"},{"key":"60_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/3-540-45748-8_5","volume-title":"Peer-to-Peer Systems","author":"P Maymounkov","year":"2002","unstructured":"Maymounkov, P., Mazi\u00e8res, D.: Kademlia: a peer-to-peer information system based on the XOR metric. In: Druschel, P., Kaashoek, F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 53\u201365. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-45748-8_5"},{"key":"60_CR24","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1111\/j.1540-6261.1961.tb02789.x","volume":"16","author":"W Vickrey","year":"1961","unstructured":"Vickrey, W.: Counterspeculation, auctions, and competitive sealed tenders. J. Finance 16, 8\u201337 (1961)","journal-title":"J. Finance"},{"key":"60_CR25","unstructured":"Wood, G.: Ethereum: a secure decentralized transaction ledger. http:\/\/gavwood.com\/paper.pdf"},{"key":"60_CR26","doi-asserted-by":"crossref","unstructured":"Ben-Sasson, E., et al.: Zerocash: decentralized anonymous payments from Bitcoin. In: S&P (2014)","DOI":"10.1109\/SP.2014.36"},{"issue":"2012","key":"60_CR27","first-page":"28","volume":"1","author":"S Nakamoto","year":"2008","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. Consulted 1(2012), 28 (2008)","journal-title":"Consulted"},{"key":"60_CR28","doi-asserted-by":"crossref","unstructured":"Cleve, R.: Limits on the security of coin flips when half the processors are faulty. In: STOC (1986)","DOI":"10.1145\/12130.12168"},{"key":"60_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/978-3-662-46494-6_10","volume-title":"Theory of Cryptography","author":"G Asharov","year":"2015","unstructured":"Asharov, G., Beimel, A., Makriyannis, N., Omri, E.: Complete characterization of fairness in secure two-party computation of boolean functions. In: Dodis, Y., Nielsen, J.B. (eds.) TCC 2015. LNCS, vol. 9014, pp. 199\u2013228. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-46494-6_10"},{"key":"60_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1007\/978-3-662-44381-1_24","volume-title":"Advances in Cryptology \u2013 CRYPTO 2014","author":"I Bentov","year":"2014","unstructured":"Bentov, I., Kumaresan, R.: How to use bitcoin to design fair protocols. In: Garay, J.A., Gennaro, R. (eds.) CRYPTO 2014. LNCS, vol. 8617, pp. 421\u2013439. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-44381-1_24"},{"key":"60_CR31","doi-asserted-by":"crossref","unstructured":"Kumaresan, R., Bentov, I.: How to use bitcoin to incentivize correct computations. In: CCS (2014)","DOI":"10.1145\/2660267.2660380"}],"container-title":["Communications in Computer and Information Science","Blockchain and Trustworthy Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-2777-7_60","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,12]],"date-time":"2022-10-12T19:41:56Z","timestamp":1665603716000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-15-2777-7_60"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,23]]},"ISBN":["9789811527760","9789811527777"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-2777-7_60","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019,12,23]]},"assertion":[{"value":"23 December 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BlockSys","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Blockchain and Trustworthy Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 December 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 December 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"blocksys2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/blocksys.info\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}