{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T03:48:19Z","timestamp":1771472899596,"version":"3.50.1"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2021,4,2]],"date-time":"2021-04-02T00:00:00Z","timestamp":1617321600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,4,2]],"date-time":"2021-04-02T00:00:00Z","timestamp":1617321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Sign Process Syst"],"published-print":{"date-parts":[[2021,7]]},"DOI":"10.1007\/s11265-021-01645-3","type":"journal-article","created":{"date-parts":[[2021,4,2]],"date-time":"2021-04-02T07:02:26Z","timestamp":1617346946000},"page":"753-768","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Big Data Architecture for Scalable and Trustful DNS based on Sharded DAG Blockchain"],"prefix":"10.1007","volume":"93","author":[{"given":"Wenyu","family":"Chen","sequence":"first","affiliation":[]},{"given":"Xue","family":"Yang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6875-7155","authenticated-orcid":false,"given":"Haikuo","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yanzhi","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Zihan","family":"Pang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,4,2]]},"reference":[{"key":"1645_CR1","doi-asserted-by":"crossref","unstructured":"Schomp, K., Callahan, T., Rabinovich, M., & Allman, M. (2014). Assessing dns vulnerability to record injection. In Faloutsos, M., & Kuzmanovic, A. (Eds.) Passive and active measurement (pp. 214\u2013223). Cham: Springer International Publishing.","DOI":"10.1007\/978-3-319-04918-2_21"},{"issue":"3","key":"1645_CR2","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1145\/2500098.2500100","volume":"43","author":"T Callahan","year":"2013","unstructured":"Callahan, T., Allman, M., & Rabinovich, M. (2013). On modern dns behavior and properties. SIGCOMM Computer Communication Review, 43(3), 7\u201315.","journal-title":"SIGCOMM Computer Communication Review"},{"key":"1645_CR3","unstructured":"Kalodner, H. A., Carlsten, M., Ellenbogen, P., Bonneau, J., & Narayanan, A. (2015). An empirical study of namecoin and lessons for decentralized namespace design. In 14Th annual workshop on the economics of information security, WEIS 2015, delft, the netherlands, 22-23 june."},{"key":"1645_CR4","unstructured":"Ali, M., Nelson, J., Shea, R., & Freedman, M.J. (2016). Blockstack: A global naming and storage system secured by blockchains. In Proceedings of the 2016 USENIX conference on usenix annual technical conference, USENIX ATC \u201916 (pp. 181\u2013194). USA: USENIX Association."},{"key":"1645_CR5","doi-asserted-by":"crossref","unstructured":"Wang, W., Hu, N., & Liu, X. (2019). Blockzone: A blockchain-based DNS storage and retrieval scheme. In Sun, X., Pan, Z., & Bertino, E. (Eds.) Artificial intelligence and security - 5th international conference, ICAIS 2019, July 26-28, 2019, Proceedings, Part IV, volume 11635 of Lecture Notes in Computer Science (pp. 155\u2013166). New York: Springer.","DOI":"10.1007\/978-3-030-24268-8_15"},{"key":"1645_CR6","doi-asserted-by":"crossref","unstructured":"Liu, J., Li, B., Chen, L., Hou, M., Xiang, F., & Wang, P. (2018). A data storage method based on blockchain for decentralization DNS. In Third IEEE international conference on data science in cyberspace, DSC 2018, June 18-21, 2018 (pp. 189\u2013196). Guangzhou: IEEE.","DOI":"10.1109\/DSC.2018.00035"},{"key":"1645_CR7","unstructured":"CNNIC. (2019). Statistical Report on China\u2019s Internet Development (in Chinese)."},{"key":"1645_CR8","doi-asserted-by":"crossref","unstructured":"Vixie, P., Thomson, S., Rekhter, Y., & Bound, J. (1997). Dynamic updates in the domain name system (dns update). RFC 2136, RFC Editor.","DOI":"10.17487\/rfc2136"},{"key":"1645_CR9","doi-asserted-by":"crossref","unstructured":"Arends, R., Austein, R., Larson, M., Massey, D., & Rose, S. (2005). Dns security introduction and requirements. RFC 4033, RFC Editor.","DOI":"10.17487\/rfc4033"},{"key":"1645_CR10","unstructured":"Qiu, M.K., Zhang, K., & Huang, M.L. (2004). An empirical study of web interface design on small display devices. In 2004 IEEE\/WIC\/ACM international conference on web intelligence (WI 2004), 20-24 September 2004 (pp. 29\u201335). Beijing: IEEE Computer Society."},{"key":"1645_CR11","doi-asserted-by":"publisher","first-page":"20632","DOI":"10.1109\/ACCESS.2018.2809426","volume":"6","author":"Q Lin","year":"2018","unstructured":"Lin, Q., Yan, H., Huang, Z., Chen, W., Shen, J., & Tang, Y. (2018). An id-based linearly homomorphic signature scheme and its application in blockchain. IEEE Access, 6, 20632\u2013 20640.","journal-title":"IEEE Access"},{"issue":"12","key":"1645_CR12","doi-asserted-by":"publisher","first-page":"3344","DOI":"10.1109\/TITS.2016.2543263","volume":"17","author":"M Zhu","year":"2016","unstructured":"Zhu, M., Liu, X., Tang, F., Qiu, M., Shen, R., Shu, W. W., & Wu, M. (2016). Public vehicles for future urban transportation. IEEE Transactions on Intelligent Transportation Systems, 17 (12), 3344\u20133353.","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"issue":"1","key":"1645_CR13","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/s11265-006-0002-0","volume":"46","author":"M Qiu","year":"2007","unstructured":"Qiu, M., Jia, Z., Xue, C., Shao, Z., & Sha, E. H. (2007). Voltage assignment with guaranteed probability satisfying timing constraint for real-time multiproceesor DSP. Journal of VLSI Signal Processing, 46 (1), 55\u201373.","journal-title":"Journal of VLSI Signal Processing"},{"key":"1645_CR14","doi-asserted-by":"crossref","unstructured":"Zhang, Q., Huang, T., Zhu, Y., & Qiu, M. (2013). A case study of sensor data collection and analysis in smart city: Provenance in smart food supply chain. Int. J. Distributed Sens. Networks, 9.","DOI":"10.1155\/2013\/382132"},{"key":"1645_CR15","doi-asserted-by":"crossref","unstructured":"Bencic, F.M., & Zarko, I.P. (2018). Distributed ledger technology: Blockchain compared to directed acyclic graph. In 38th IEEE international conference on distributed computing systems, ICDCS 2018, July 2-6, 2018 (pp. 1569\u20131570). Vienna: IEEE Computer Society.","DOI":"10.1109\/ICDCS.2018.00171"},{"issue":"1","key":"1645_CR16","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MCOM.2017.1600349CM","volume":"55","author":"W Dai","year":"2017","unstructured":"Dai, W., Qiu, M., Qiu, L., Chen, L., & Wu, A. (2017). Who moved my data? privacy protection in smartphones. Communications Magazine, 55(1), 20\u201325.","journal-title":"Communications Magazine"},{"key":"1645_CR17","unstructured":"Chung, T., van Rijswijk-Deij, R., Chandrasekaran, B., Choffnes, D.R., Levin, D., Maggs, B.M., Mislove, A., & Wilson, C. (2017). A longitudinal, end-to-end view of the DNSSEC ecosystem. In Kirda, E., & Ristenpart, T. (Eds.) 26th USENIX security symposium, USENIX Security 2017, August 16-18, 2017 (pp. 1307\u20131322). Vancouver: USENIX Association."},{"key":"1645_CR18","unstructured":"Park, K., Pai, V.S., Peterson, L.L., & Wang, Z. (2004). Codns: Improving DNS performance and reliability via cooperative lookups. In Brewer, E.A., & Chen, P. (Eds.) 6th symposium on operating system design and implementation (OSDI 2004), December 6-8, 2004 (pp. 199\u2013214). San Francisco: USENIX Association."},{"key":"1645_CR19","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1016\/j.procs.2020.02.134","volume":"169","author":"D Bagay","year":"2020","unstructured":"Bagay, D. (2020). Blockchain-based dns building. Procedia Computer Science, 169, 187\u2013191. Postproceedings of the 10th Annual International Conference on Biologically Inspired Cognitive Architectures, BICA 2019 (Tenth Annual Meeting of the BICA Society), held August 15-19 2019 in Seattle, Washington, USA.","journal-title":"Procedia Computer Science"},{"key":"1645_CR20","doi-asserted-by":"crossref","unstructured":"Gai, K., Qiu, M., & Zhao, H. (2016). Security-Aware efficient mass distributed storage approach for cloud systems in big data. In 2016 IEEE 2Nd international conference on big data security on cloud, BigDataSecurity, IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS) (pp. 140\u2013145).","DOI":"10.1109\/BigDataSecurity-HPSC-IDS.2016.68"},{"issue":"3","key":"1645_CR21","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/MCOMSTD.2018.1800023","volume":"2","author":"E Karaarslan","year":"2018","unstructured":"Karaarslan, E., & Adiguzel, E. (2018). Blockchain based DNS and PKI solutions. IEEE Commun Stand. Mag., 2(3), 52\u201357.","journal-title":"IEEE Commun Stand. Mag."},{"issue":"3","key":"1645_CR22","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1109\/MCOM.2018.1700274","volume":"56","author":"M Chen","year":"2018","unstructured":"Chen, M., Zhang, Y., Qiu, M., Guizani, N., & Hao, Y. (2018). SPHA: Smart personal health advisor based on deep analytics. IEEE Communications Magazine, 56(3), 164\u2013169.","journal-title":"IEEE Communications Magazine"},{"key":"1645_CR23","doi-asserted-by":"crossref","unstructured":"Gilad, Y., Hemo, R., Micali, S., Vlachos, G., & Zeldovich, N. (2017). Algorand: Scaling byzantine agreements for cryptocurrencies. In Proceedings of the 26th symposium on operating systems principles, October 28-31, 2017 (pp. 51\u201368). Shanghai: ACM.","DOI":"10.1145\/3132747.3132757"},{"key":"1645_CR24","unstructured":"Li, C., Li, P., Xu, W., Long, F., & Yao, A. C. (2018). Scaling nakamoto consensus to thousands of transactions per second. CoRR, arXiv:abs\/1805.03870."},{"key":"1645_CR25","unstructured":"Baird, L. (2016). The swirlds hashgraph consensus algorithm: Fair, fast, byzantine fault tolerance. Tech Reports SWIRLDS-TR-2016-01, Swirlds."},{"key":"1645_CR26","doi-asserted-by":"crossref","unstructured":"Vigneri, L., Welz, W., Gal, A., & Dimitrov, V. (2019). Achieving fairness in the tangle through an adaptive rate control algorithm. In IEEE international conference on blockchain and cryptocurrency, ICBC 2019, May 14-17, 2019 (pp. 146\u2013148). Seoul: IEEE.","DOI":"10.1109\/BLOC.2019.8751358"},{"key":"1645_CR27","unstructured":"LeMahieu, C. (2018). Nano: A feeless distributed cryptocurrency network."},{"key":"1645_CR28","unstructured":"T., R. (2018). Snowflake to avalanche : A novel metastable consensus protocol family for cryptocurrencies team rocket."},{"issue":"5","key":"1645_CR29","doi-asserted-by":"publisher","first-page":"589","DOI":"10.1109\/TNET.2002.803905","volume":"10","author":"J Jung","year":"2002","unstructured":"Jung, J., Sit, E., Balakrishnan, H., & Morris, R. T. (2002). DNS Performance and the effectiveness of caching. IEEE\/ACM Transactions on Networking, 10(5), 589\u2013603.","journal-title":"IEEE\/ACM Transactions on Networking"}],"container-title":["Journal of Signal Processing Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11265-021-01645-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11265-021-01645-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11265-021-01645-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,14]],"date-time":"2021-06-14T17:10:04Z","timestamp":1623690604000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11265-021-01645-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,2]]},"references-count":29,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2021,7]]}},"alternative-id":["1645"],"URL":"https:\/\/doi.org\/10.1007\/s11265-021-01645-3","relation":{},"ISSN":["1939-8018","1939-8115"],"issn-type":[{"value":"1939-8018","type":"print"},{"value":"1939-8115","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,4,2]]},"assertion":[{"value":"22 December 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 January 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 February 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 April 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}