{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T02:57:57Z","timestamp":1763348277090,"version":"3.37.3"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2020,8,5]],"date-time":"2020-08-05T00:00:00Z","timestamp":1596585600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,5]],"date-time":"2020-08-05T00:00:00Z","timestamp":1596585600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61972018"],"award-info":[{"award-number":["61972018"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61932014"],"award-info":[{"award-number":["61932014"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Key Research and Development Program of China","award":["2017YFB0802502"],"award-info":[{"award-number":["2017YFB0802502"]}]},{"name":"National Cryptography Development Fund through project","award":["MMJJ20170106"],"award-info":[{"award-number":["MMJJ20170106"]}]},{"DOI":"10.13039\/501100012558","name":"Science and Technology on Information Assurance Laboratory","doi-asserted-by":"crossref","award":["61421120305162112006"],"award-info":[{"award-number":["61421120305162112006"]}],"id":[{"id":"10.13039\/501100012558","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61672083"],"award-info":[{"award-number":["61672083"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61532021"],"award-info":[{"award-number":["61532021"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61472429"],"award-info":[{"award-number":["61472429"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61402029"],"award-info":[{"award-number":["61402029"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61702028"],"award-info":[{"award-number":["61702028"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61571024"],"award-info":[{"award-number":["61571024"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"planning fund project of ministry of education","award":["12YJAZH136"],"award-info":[{"award-number":["12YJAZH136"]}]},{"DOI":"10.13039\/501100012401","name":"Beijing Science and Technology Planning Project","doi-asserted-by":"publisher","award":["4132056"],"award-info":[{"award-number":["4132056"]}],"id":[{"id":"10.13039\/501100012401","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2021,1]]},"DOI":"10.1007\/s12083-020-00967-6","type":"journal-article","created":{"date-parts":[[2020,8,5]],"date-time":"2020-08-05T18:02:40Z","timestamp":1596650560000},"page":"225-239","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Themis: An accountable blockchain-based P2P cloud storage scheme"],"prefix":"10.1007","volume":"14","author":[{"given":"Yiming","family":"Hei","sequence":"first","affiliation":[]},{"given":"Yizhong","family":"Liu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1548-2666","authenticated-orcid":false,"given":"Dawei","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jianwei","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Qianhong","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,5]]},"reference":[{"key":"967_CR1","doi-asserted-by":"crossref","unstructured":"Chen K, Lang W, Zheng K, Ouyang W (2015) Research on the cloud storage security in big data era. In: 2015 international conference on applied science and engineering innovation, Atlantis Press, pp 659\u2013664","DOI":"10.2991\/asei-15.2015.124"},{"key":"967_CR2","doi-asserted-by":"crossref","unstructured":"Zhou R, Chen H, Li T (2015) Towards lightweight and swift storage resource management in big data cloud era. In: Proceedings of the 29th ACM on international conference on supercomputing, ICS\u201915, Newport Beach\/Irvine, CA, USA, June 08 - 11, 2015, pp 133\u2013142","DOI":"10.1145\/2751205.2751230"},{"issue":"6","key":"967_CR3","doi-asserted-by":"publisher","first-page":"1065","DOI":"10.1109\/JSAC.2014.2328098","volume":"32","author":"JG Andrews","year":"2014","unstructured":"Andrews JG, Buzzi S, Choi W, Hanly SV, Lozano A, Soong AC, Zhang JC (2014) What will 5g be?. IEEE Journal on Selected Areas in Communications 32(6):1065\u20131082","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"1","key":"967_CR4","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1109\/MC.2012.1","volume":"45","author":"D Song","year":"2012","unstructured":"Song D, Shi E, Fischer I, Shankar U (2012) Cloud data protection for the masses. IEEE Computer 45(1):39\u201345","journal-title":"IEEE Computer"},{"issue":"1","key":"967_CR5","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1007\/s00145-015-9216-2","volume":"30","author":"D Cash","year":"2017","unstructured":"Cash D, K\u00fcp\u00e7\u00fc A, Wichs D (2017) Dynamic proofs of retrievability via oblivious RAM. J Cryptology 30(1):22\u201357","journal-title":"J Cryptology"},{"key":"967_CR6","doi-asserted-by":"crossref","unstructured":"Shi E, Stefanov E, Papamanthou C (2013) Practical dynamic proofs of retrievability. In: 2013 ACM SIGSAC conference on computer and communications security, CCS\u201913, Berlin, Germany, November 4-8, 2013, pp 325\u2013336","DOI":"10.1145\/2508859.2516669"},{"key":"967_CR7","doi-asserted-by":"crossref","unstructured":"Wang Q, Wang C, Li J, Ren K, Lou W (2009) Enabling public verifiability and data dynamics for storage security in cloud computing, in: Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings, pp 355\u2013370","DOI":"10.1007\/978-3-642-04444-1_22"},{"issue":"4","key":"967_CR8","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1007\/s10619-014-7151-0","volume":"32","author":"R Mukundan","year":"2014","unstructured":"Mukundan R, Madria SK, Linderman M (2014) Efficient integrity verification of replicated data in cloud using homomorphic encryption. Distributed and Parallel Databases 32(4):507\u2013 534","journal-title":"Distributed and Parallel Databases"},{"issue":"3","key":"967_CR9","doi-asserted-by":"publisher","first-page":"676","DOI":"10.1109\/TIFS.2016.2631951","volume":"12","author":"Y Zhang","year":"2017","unstructured":"Zhang Y, Xu C, Liang X, Li H, Mu Y, Zhang X (2017) Efficient public verification of data integrity for cloud storage systems from indistinguishability obfuscation. IEEE Trans Information Forensics and Security 12(3):676\u2013688","journal-title":"IEEE Trans Information Forensics and Security"},{"key":"967_CR10","unstructured":"Wilkinson S, Boshevski T, Brandoff J, Buterin V (2014) Storj a peer-to-peer cloud storage network. https:\/\/storj.io\/storj.pdf"},{"key":"967_CR11","unstructured":"Vorick D, Champine L (2014) Sia: Simple decentralized storage. https:\/\/sia.tech\/sia.pdf"},{"key":"967_CR12","unstructured":"Benet J (2014) IPFS - content addressed, versioned, P2P file system. 1407.3561"},{"key":"967_CR13","unstructured":"Benet J, Greco N (2018) Filecoin: a decentralized storage network. https:\/\/filecoin.io\/"},{"key":"967_CR14","doi-asserted-by":"crossref","unstructured":"Ben-Sasson E, Chiesa A, Genkin D, Tromer E, Virza M (2013) Snarks for c: verifying program executions succinctly and in zero knowledge. In: Advances in cryptology - CRYPTO 2013 - 33rd annual cryptology conference, santa barbara, CA, USA, August 18-22, 2013, Proceedings, Part II, pp 90\u2013108","DOI":"10.1007\/978-3-642-40084-1_6"},{"key":"967_CR15","unstructured":"Nakamoto S, et al. (2008) Bitcoin: a peer-to-peer electronic cash system https:\/\/bitcoin.org\/bitcoin.pdf"},{"key":"967_CR16","doi-asserted-by":"crossref","unstructured":"Szabo N Formalizing and securing relationships on public networks, First Monday 2 (9)","DOI":"10.5210\/fm.v2i9.548"},{"key":"967_CR17","unstructured":"Poon J, Dryja T (2016) The bitcoin lightning network: Scalable off-chain instant payments https:\/\/lightning.network\/lightning-network-paper.pdf"},{"key":"967_CR18","doi-asserted-by":"publisher","unstructured":"Bonneau J, Miller A, Clark J, Narayanan A, Kroll JA, Felten EW (2015) Sok: Research perspectives and challenges for bitcoin and cryptocurrencies. In: 2015 IEEE symposium on security and privacy, SP 2015, San Jose, CA, USA, May 17-21, 2015, pp 104\u2013121. https:\/\/doi.org\/10.1109\/SP.2015.14","DOI":"10.1109\/SP.2015.14"},{"key":"967_CR19","unstructured":"Garay JA, Kiayias A (2018) Sok: A consensus taxonomy in the blockchain era. https:\/\/eprint.iacr.org\/2018\/754.pdf"},{"key":"967_CR20","doi-asserted-by":"crossref","unstructured":"Garay JA, Kiayias A, Leonardos N (2015) The bitcoin backbone protocol: Analysis and applications. In: Advances in cryptology - EUROCRYPT 2015 - 34th annual international conference on the theory and applications of cryptographic techniques, sofia, bulgaria, April 26-30, 2015, Proceedings, Part II, pp 281\u2013 310","DOI":"10.1007\/978-3-662-46803-6_10"},{"key":"967_CR21","doi-asserted-by":"publisher","unstructured":"Pass R, Seeman L, Shelat A (2017) Analysis of the blockchain protocol in asynchronous networks. In: Advances in cryptology - EUROCRYPT 2017 - 36th annual international conference on the theory and applications of cryptographic techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part II, pp 643\u2013673. https:\/\/doi.org\/10.1007\/978-3-319-56614-6_22","DOI":"10.1007\/978-3-319-56614-6_22"},{"key":"967_CR22","doi-asserted-by":"publisher","first-page":"12295","DOI":"10.1109\/ACCESS.2018.2799205","volume":"6","author":"Y Zhao","year":"2018","unstructured":"Zhao Y, Li Y, Mu Q, Yang B, Yu Y (2018) Secure pub-sub: Blockchain-based fair payment with reputation for reliable cyber physical systems. IEEE Access 6:12295\u201312303","journal-title":"IEEE Access"},{"key":"967_CR23","doi-asserted-by":"publisher","first-page":"33159","DOI":"10.1109\/ACCESS.2019.2903271","volume":"7","author":"Y Hu","year":"2019","unstructured":"Hu Y, Manzoor A, Ekparinya P, Liyanage M, Thilakarathna K, Jourjon G, Seneviratne A (2019) A delay-tolerant payment scheme based on the ethereum blockchain. IEEE Access 7:33159\u201333172","journal-title":"IEEE Access"},{"issue":"3","key":"967_CR24","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1080\/0194262X.2018.1474838","volume":"37","author":"A-T P\u00e3nescu","year":"2018","unstructured":"P\u00e3nescu A-T, Manta V (2018) Smart contracts for research data rights management over the ethereum blockchain network. Science & Technology Libraries 37(3):235\u2013245","journal-title":"Science & Technology Libraries"},{"key":"967_CR25","doi-asserted-by":"crossref","unstructured":"Hong S (2019) P2p networking based internet of things (iot) sensor node authentication by blockchain. Peer-to-Peer Networking and Applications, pp 1\u201311","DOI":"10.1007\/s12083-019-00739-x"},{"issue":"4","key":"967_CR26","doi-asserted-by":"publisher","first-page":"983","DOI":"10.1007\/s12083-016-0456-1","volume":"10","author":"Y Zhang","year":"2017","unstructured":"Zhang Y, Wen J (2017) The iot electric business model: Using blockchain technology for the internet of things. Peer-to-Peer Networking and Applications 10(4):983\u2013994","journal-title":"Peer-to-Peer Networking and Applications"},{"key":"967_CR27","doi-asserted-by":"crossref","unstructured":"Chen Y, Li H, Li K, Zhang J (2017) An improved P2P file system scheme based on IPFS and blockchain. In: 2017 IEEE international conference on big data, BigData 2017, Boston, MA, USA, December 11-14, 2017, pp 2652\u20132657","DOI":"10.1109\/BigData.2017.8258226"},{"key":"967_CR28","unstructured":"Buterin V (2014) A next-generation smart contract and decentralized application platform. https:\/\/whitepaperdatabase.com\/wp-content\/uploads\/2017\/09\/Ethereum-ETH-whitepaper.pdf"},{"key":"967_CR29","doi-asserted-by":"crossref","unstructured":"Merkle RC (1980) Protocols for public key cryptosystems. In: Proceedings of the 1980 IEEE symposium on security and privacy, Oakland, California, USA, April 14-16, 1980, pp 122\u2013134","DOI":"10.1109\/SP.1980.10006"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-020-00967-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-020-00967-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-020-00967-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,5]],"date-time":"2021-08-05T00:09:15Z","timestamp":1628122155000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-020-00967-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,5]]},"references-count":29,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["967"],"URL":"https:\/\/doi.org\/10.1007\/s12083-020-00967-6","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2020,8,5]]},"assertion":[{"value":"1 March 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 July 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 August 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}