{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T15:17:00Z","timestamp":1742915820293,"version":"3.40.3"},"publisher-location":"Cham","reference-count":80,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030573270"},{"type":"electronic","value":"9783030573287"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-57328-7_5","type":"book-chapter","created":{"date-parts":[[2021,1,4]],"date-time":"2021-01-04T22:03:06Z","timestamp":1609797786000},"page":"121-143","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["On the Feasibility of Byzantine Agreement to Secure Fog\/Edge Data Management"],"prefix":"10.1007","author":[{"given":"Ali","family":"Shoker","sequence":"first","affiliation":[]},{"given":"Houssam","family":"Yactine","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,5]]},"reference":[{"issue":"2","key":"5_CR1","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1109\/MC.2012.33","volume":"45","author":"D Abadi","year":"2012","unstructured":"Abadi, D.: Consistency tradeoffs in modern distributed database system design: cap is only part of the story. Computer 45(2), 37\u201342 (2012)","journal-title":"Computer"},{"issue":"5","key":"5_CR2","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1145\/1095809.1095817","volume":"39","author":"M Abd-El-Malek","year":"2005","unstructured":"Abd-El-Malek, M., Ganger, G.R., Goodson, G.R., Reiter, M.K., Wylie, J.J.: Fault-scalable byzantine fault-tolerant services. ACM SIGOPS Oper. Syst. Rev. 39(5), 59\u201374 (2005)","journal-title":"ACM SIGOPS Oper. Syst. Rev."},{"key":"5_CR3","unstructured":"Abraham, I., Malkhi, D., Nayak, K., Ren, L., Yin, M.: Sync HotStuff: simple and practical synchronous state machine replication"},{"key":"5_CR4","unstructured":"Aissi, S.: Method and apparatus for secure application execution. US Patent 9,317,689, 19 Apr 2016"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Bonomi, F., Milito, R., Zhu, J., Addepalli, S.: Fog computing and its role in the internet of things. In: Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, pp. 13\u201316 (2012)","DOI":"10.1145\/2342509.2342513"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Burckhardt, S., Gotsman, A., Yang, H., Zawirski, M.: Replicated data types: specification, verification, optimality. In: ACM Sigplan Not., vol. 49, pp. 271\u2013284. ACM, New York (2014)","DOI":"10.1145\/2578855.2535848"},{"key":"5_CR7","unstructured":"Cachin, C.: Architecture of the hyperledger blockchain fabric. In: Workshop on Distributed Cryptocurrencies and Consensus Ledgers, vol. 310 (2016)"},{"issue":"4","key":"5_CR8","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1145\/571637.571640","volume":"20","author":"M Castro","year":"2002","unstructured":"Castro, M., Liskov, B.: Practical Byzantine fault tolerance and proactive recovery. ACM Trans. Comput. Syst. 20(4), 398\u2013461 (2002)","journal-title":"ACM Trans. Comput. Syst."},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"Chen, L., Xu, L., Shah, N., Gao, Z., Lu, Y., Shi, W.: On security analysis of proof-of-elapsed-time (PoET). In: International Symposium on Stabilization, Safety, and Security of Distributed Systems, pp. 282\u2013297. Springer, Berlin (2017)","DOI":"10.1007\/978-3-319-69084-1_19"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Clement, A., Kapritsos, M., Lee, S., Wang, Y., Alvisi, L., Dahlin, M., Riche, T.: Upright cluster services. In: Proceedings of the ACM SIGOPS 22nd Symposium on Operating Systems Principles, pp. 277\u2013290. ACM, New York (2009)","DOI":"10.1145\/1629575.1629602"},{"issue":"086","key":"5_CR11","first-page":"1","volume":"2016","author":"V Costan","year":"2016","unstructured":"Costan, V., Devadas, S.: Intel SGX explained. IACR Cryptol. ePrint Arch. 2016(086), 1\u2013118 (2016)","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"5_CR12","unstructured":"Cowling, J., Myers, D., Liskov, B., Rodrigues, R., Shrira, L.: HQ replication: a hybrid quorum protocol for Byzantine fault tolerance. In: Proceedings of the 7th symposium on Operating Systems Design and Implementation, pp. 177\u2013190 (2006)"},{"issue":"4","key":"5_CR13","doi-asserted-by":"publisher","first-page":"2233","DOI":"10.1109\/TII.2014.2300753","volume":"10","author":"L Da Xu","year":"2014","unstructured":"Da Xu, L., He, W., Li, S.: Internet of things in industries: a survey. IEEE Trans. Ind. Inform. 10(4), 2233\u20132243 (2014)","journal-title":"IEEE Trans. Ind. Inform."},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Douceur, J.R.: The Sybil attack. In: International Workshop on Peer-to-Peer Systems, pp. 251\u2013260. Springer, Berlin (2002)","DOI":"10.1007\/3-540-45748-8_24"},{"key":"5_CR15","unstructured":"Duong, T., Fan, L., Zhou, H.-S.: 2-hop blockchain: combining proof-of-work and proof-of-stake securely. Cryptol. ePrint Arch. Report 2016\/716 (2016)"},{"key":"5_CR16","doi-asserted-by":"crossref","unstructured":"Dwork, C., Naor, M.: Pricing via processing or combatting junk mail. In: Annual International Cryptology Conference, pp. 139\u2013147. Springer, Berlin (1992)","DOI":"10.1007\/3-540-48071-4_10"},{"issue":"2","key":"5_CR17","doi-asserted-by":"publisher","first-page":"374","DOI":"10.1145\/3149.214121","volume":"32","author":"MJ Fischer","year":"1985","unstructured":"Fischer, M.J., Lynch, N.A., Paterson, M.S.: Impossibility of distributed consensus with one faulty process. J. ACM 32(2), 374\u2013382 (1985)","journal-title":"J. ACM"},{"key":"5_CR18","unstructured":"Friedman, R, Licher, R.: Hardening cassandra against Byzantine failures. arXiv preprint arXiv:1610.02885 (2016)"},{"issue":"4","key":"5_CR19","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1109\/TDSC.2007.70208","volume":"4","author":"I Gashi","year":"2007","unstructured":"Gashi, I., Popov, P., Strigini, L.: Fault tolerance via diversity for off-the-shelf products: a study with SQL database servers. IEEE Trans. Dependable Secure Comput. 4(4), 280\u2013294 (2007)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"5_CR20","doi-asserted-by":"crossref","unstructured":"Gervais, A., Karame, G.O., W\u00fcst, K., Glykantzis, V., Ritzdorf, H., Capkun, S.: On the security and performance of proof of work blockchains. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 3\u201316 (2016)","DOI":"10.1145\/2976749.2978341"},{"key":"5_CR21","doi-asserted-by":"crossref","unstructured":"Gilad, Y., Hemo, R., Micali, S., Vlachos, G., Zeldovich, N.: Algorand: scaling Byzantine agreements for cryptocurrencies. In: Proceedings of the 26th Symposium on Operating Systems Principles, pp. 51\u201368 (2017)","DOI":"10.1145\/3132747.3132757"},{"issue":"2","key":"5_CR22","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1145\/564585.564601","volume":"33","author":"S Gilbert","year":"2002","unstructured":"Gilbert, S, Lynch, N.: Brewer\u2019s conjecture and the feasibility of consistent, available, partition-tolerant web services. SIGACT News 33(2), 51\u201359 (2002)","journal-title":"SIGACT News"},{"issue":"2","key":"5_CR23","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1145\/564585.564601","volume":"33","author":"S Gilbert","year":"2002","unstructured":"Gilbert, S, Lynch, N.: Brewer\u2019s conjecture and the feasibility of consistent, available, partition-tolerant web services. ACM SIGACT News 33(2), 51\u201359 (2002)","journal-title":"ACM SIGACT News"},{"key":"5_CR24","doi-asserted-by":"publisher","first-page":"760","DOI":"10.1016\/j.future.2017.09.023","volume":"107","author":"V Gramoli","year":"2020","unstructured":"V. Gramoli, From blockchain consensus back to Byzantine consensus. Future Gener. Comput. Syst. 107, 760\u2013769 (2020)","journal-title":"Future Gener. Comput. Syst."},{"key":"5_CR25","unstructured":"Gueta, G.G., Abraham, I., Grossman, S., Malkhi, D., Pinkas, B., Reiter, M.K., Seredinschi, D.-A., Tamir, O., Tomescu, A. Sbft: a scalable decentralized trust infrastructure for blockchains. arXiv preprint arXiv:1804.01626 (2018)"},{"key":"5_CR26","doi-asserted-by":"crossref","unstructured":"Gupta, I., Van Renesse, R., Birman, K.P.: A probabilistically correct leader election protocol for large groups. In: International Symposium on Distributed Computing, pp. 89\u2013103. Springer, Berlin (2000)","DOI":"10.1007\/3-540-40026-5_6"},{"key":"5_CR27","unstructured":"https:\/\/digiconomist.net\/bitcoin-energy-consumption"},{"key":"5_CR28","doi-asserted-by":"crossref","unstructured":"Han, R., Gramoli, V., Xu, X.: Evaluating blockchains for IoT. In: 2018 Ninth IFIP International Conference on New Technologies, Mobility and Security (NTMS), pp. 1\u20135. IEEE, Piscataway (2018)","DOI":"10.1109\/NTMS.2018.8328736"},{"key":"5_CR29","unstructured":"Hanke, T., Movahedi, M., Williams, D.: Dfinity technology overview series, consensus system. arXiv preprint arXiv:1805.04548 (2018)"},{"issue":"5","key":"5_CR30","doi-asserted-by":"publisher","first-page":"748","DOI":"10.1016\/j.ijinfomgt.2016.05.002","volume":"36","author":"IAT Hashem","year":"2016","unstructured":"Hashem, I.A.T., Chang, V., Anuar, N.B., Adewole, K., Yaqoob, I., Gani, A., Ahmed, E., Chiroma, H.: The role of big data in smart city. Int. J. Inf. Manag. 36(5), 748\u2013758 (2016)","journal-title":"Int. J. Inf. Manag."},{"key":"5_CR31","unstructured":"IEEE Standards Association: IEEE standard for adoption of openfog reference architecture for fog computing (2019). https:\/\/standards.ieee.org\/standard\/1934-2018.html"},{"issue":"11","key":"5_CR32","first-page":"1","volume":"11","author":"YC Hu","year":"2015","unstructured":"Hu, Y.C., Patel, M., Sabella, D., Sprecher, N., Young, V.: Mobile edge computing-a key technology towards 5G. ETSI White Paper 11(11), 1\u201316 (2015)","journal-title":"ETSI White Paper"},{"issue":"3","key":"5_CR33","doi-asserted-by":"publisher","first-page":"4660","DOI":"10.1109\/JIOT.2018.2875542","volume":"6","author":"J Kang","year":"2018","unstructured":"Kang, J., Yu, R., Huang, X., Wu, M., Maharjan, S., Xie, S., Zhang, Y.: Blockchain for secure and efficient data sharing in vehicular edge computing and networks. IEEE Internet of Things J. 6(3), 4660\u20134670 (2018)","journal-title":"IEEE Internet of Things J."},{"key":"5_CR34","doi-asserted-by":"crossref","unstructured":"Kiayias, A., Russell, A., David, B., Oliynykov, R.: Ouroboros: a provably secure proof-of-stake blockchain protocol. In: Annual International Cryptology Conference, pp. 357\u2013388. Springer, Berlin (2017)","DOI":"10.1007\/978-3-319-63688-7_12"},{"key":"5_CR35","doi-asserted-by":"crossref","unstructured":"Kokoris-Kogias, E., Jovanovic, P., Gasser, L., Gailly, N., Syta, E., Ford, B.: Omniledger: a secure, scale-out, decentralized ledger via sharding. In: 2018 IEEE Symposium on Security and Privacy (SP), pp. 583\u2013598. IEEE, Piscataway (2018)","DOI":"10.1109\/SP.2018.000-5"},{"key":"5_CR36","doi-asserted-by":"crossref","unstructured":"Kotla, R., Alvisi, L., Dahlin, M., Clement, A., Wong, E.: Zyzzyva: speculative Byzantine fault tolerance. ACM Trans. Comput. Syst. 27(4), 7:1\u20137:39 (2010)","DOI":"10.1145\/1658357.1658358"},{"key":"5_CR37","unstructured":"Kwon, J.: Tendermint: consensus without mining. Draft v. 0.6, fall 1(11) (2014)"},{"issue":"2","key":"5_CR38","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1145\/1773912.1773922","volume":"44","author":"A Lakshman","year":"2010","unstructured":"Lakshman, A., Malik, P.: Cassandra: a decentralized structured storage system. ACM SIGOPS Oper. Syst. Rev. 44(2), 35\u201340 (2010)","journal-title":"ACM SIGOPS Oper. Syst. Rev."},{"issue":"7","key":"5_CR39","doi-asserted-by":"publisher","first-page":"558","DOI":"10.1145\/359545.359563","volume":"21","author":"L Lamport","year":"1978","unstructured":"Lamport, L.: Time, clocks, and the ordering of events in a distributed system. Commun. ACM 21(7), 558\u2013565 (1978)","journal-title":"Commun. ACM"},{"issue":"4","key":"5_CR40","first-page":"18","volume":"32","author":"L Lamport","year":"2001","unstructured":"Lamport, L., et al. Paxos made simple. ACM Sigact News 32(4), 18\u201325 (2001)","journal-title":"ACM Sigact News"},{"issue":"3","key":"5_CR41","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1145\/357172.357176","volume":"4","author":"L Lamport","year":"1982","unstructured":"Lamport, L., Shostak, R., Pease, M.: The Byzantine generals problem. ACM Trans. Program. Lang. Syst. 4(3), 382\u2013401 (1982)","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"5_CR42","doi-asserted-by":"crossref","unstructured":"Lamport, L., Shostak, R., Pease, M.: The Byzantine generals problem. In: Concurrency: The Works of Leslie Lamport, pp. 203\u2013226 (2019)","DOI":"10.1145\/3335772.3335936"},{"key":"5_CR43","doi-asserted-by":"crossref","unstructured":"Luu, L., Narayanan, V., Zheng, C., Baweja, K., Gilbert, S., Saxena, P.: A secure sharding protocol for open blockchains. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 17\u201330 (2016)","DOI":"10.1145\/2976749.2978389"},{"key":"5_CR44","unstructured":"Mazieres, D.: The Stellar consensus protocol: a federated model for internet-level consensus. Stellar Dev. Found. 32 (2015)."},{"key":"5_CR45","doi-asserted-by":"crossref","unstructured":"Milutinovic, M., He, W., Wu, H., Kanwal, M.: Proof of luck: an efficient blockchain consensus protocol. In: Proceedings of the First Workshop on System Software for Trusted Execution, pp. 1\u20136 (2016)","DOI":"10.1145\/3007788.3007790"},{"key":"5_CR46","doi-asserted-by":"publisher","first-page":"931","DOI":"10.1016\/j.procs.2016.07.275","volume":"93","author":"I Mohanraj","year":"2016","unstructured":"Mohanraj, I., Ashokumar, K., Naren, J.: Field monitoring and automation using IoT in agriculture domain. Proc. Comput. Sci. 93, 931\u2013939 (2016)","journal-title":"Proc. Comput. Sci."},{"key":"5_CR47","doi-asserted-by":"publisher","DOI":"10.2307\/j.ctvjsf522","volume-title":"Game Theory","author":"RB Myerson","year":"2013","unstructured":"Myerson, R.B.: Game Theory. Harvard University Press, Cambridge (2013)"},{"key":"5_CR48","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008)"},{"key":"5_CR49","unstructured":"Ongaro, D., Ousterhout, J.: In search of an understandable consensus algorithm. In: USENIX Annual Technical Conference, pp. 305\u2013319 (2014)"},{"key":"5_CR50","unstructured":"OpenFog Consortium Architecture Working Group et al. Openfog reference architecture for fog computing. OPFRA001 20817, 162 (2017)"},{"key":"5_CR51","volume-title":"Blockchain technology: principles and applications","author":"M Pilkington","year":"2016","unstructured":"Pilkington, M.: Blockchain technology: principles and applications. In: Research Handbook on Digital Transformations. Edward Elgar Publishing, Cheltenham (2016)"},{"key":"5_CR52","unstructured":"Poon, J., Dryja, T.: The bitcoin lightning network: scalable off-chain instant payments (2016)"},{"issue":"5","key":"5_CR53","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1109\/MNET.2017.1700030","volume":"31","author":"J Ren","year":"2017","unstructured":"Ren, J., Guo, H., Xu, C., Zhang, Y.: Serving at the edge: a scalable IoT architecture based on transparent computing. IEEE Netw. 31(5), 96\u2013105 (2017)","journal-title":"IEEE Netw."},{"key":"5_CR54","doi-asserted-by":"crossref","unstructured":"Ronen, E., Shamir, A.: Extended functionality attacks on IoT devices: the case of smart lights. In: 2016 IEEE European Symposium on Security and Privacy (EuroS&P), pp. 3\u201312. IEEE, Piscataway (2016)","DOI":"10.1109\/EuroSP.2016.13"},{"issue":"4","key":"5_CR55","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1109\/MCE.2016.2590118","volume":"5","author":"D Sabella","year":"2016","unstructured":"Sabella, D., Vaillant, A., Kuure, P., Rauschenbach, U., Giust, F.: Mobile-edge computing architecture: the role of MEC in the Internet of Things. IEEE Consum. Electron. Mag. 5(4), 84\u201391 (2016)","journal-title":"IEEE Consum. Electron. Mag."},{"issue":"1","key":"5_CR56","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/MC.2017.9","volume":"50","author":"M Satyanarayanan","year":"2017","unstructured":"Satyanarayanan, M.: The emergence of edge computing. Computer 50(1), 30\u201339 (2017)","journal-title":"Computer"},{"issue":"4","key":"5_CR57","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/MPRV.2009.82","volume":"8","author":"M Satyanarayanan","year":"2009","unstructured":"Satyanarayanan, M., Bahl, P., Caceres, R., Davies, N.: The case for VM-based cloudlets in mobile computing. IEEE Pervasive Comput. 8(4), 14\u201323 (2009)","journal-title":"IEEE Pervasive Comput."},{"key":"5_CR58","doi-asserted-by":"crossref","unstructured":"Shapiro, M., Pregui\u00e7a, N., Baquero, C., Zawirski, M.: A comprehensive study of convergent and commutative replicated data types (2011)","DOI":"10.1007\/978-3-642-24550-3_29"},{"key":"5_CR59","doi-asserted-by":"crossref","unstructured":"Shapiro, M., Pregui\u00e7a, N., Baquero, C., Zawirski, M.: Conflict-free replicated data types. In: Proceedings of the 13th International Conference on Stabilization, Safety, and Security of Distributed Systems, SSS\u201911, pp. 386\u2013400. Springer, Berlin (2011)","DOI":"10.1007\/978-3-642-24550-3_29"},{"key":"5_CR60","doi-asserted-by":"crossref","unstructured":"Shoker, A.: Sustainable blockchain through proof of exercise. In: 2017 IEEE 16th International Symposium on Network Computing and Applications (NCA), pp. 1\u20139. IEEE, Piscataway (2017)","DOI":"10.1109\/NCA.2017.8171383"},{"key":"5_CR61","unstructured":"Shoker, A., Leitao, J., Van Roy, P., Meiklejohn, C.: Lightkone: towards general purpose computations on the edge. White Paper published on http:\/\/www.lightkone.eu 40 (2016)"},{"key":"5_CR62","doi-asserted-by":"crossref","unstructured":"Shoker, A., Yactine, H., Baquero, C.: As secure as possible eventual consistency: work in progress. In: Proceedings of the Third International Workshop on Principles and Practice of Consistency for Distributed Data, PaPoC \u201917, pp. 5:1\u20135:5. ACM, New York (2017)","DOI":"10.1145\/3064889.3064895"},{"key":"5_CR63","unstructured":"Singh, A., Fonseca, P., Kuznetsov, P., Rodrigues, R., Maniatis, P.Singh, A., Fonseca, P., Kuznetsov, P., Rodrigues, R. and Maniatis, P.: Zeno: eventually consistent Byzantine-fault tolerance. In: Proceedings of the Sixth USENIX Symposium on Networked Systems Design and Implementation, NSDI\u201909, pp. 169\u2013184. USENIX Association, Berkeley (2009)"},{"key":"5_CR64","doi-asserted-by":"crossref","unstructured":"Soliman, M., Abiodun, T., Hamouda, T., Zhou, J., Lung, C.H.: Smart home: integrating internet of things with web services and cloud computing. In: 2013 IEEE Fifth International Conference on Cloud Computing Technology and Science, vol. 2, pp. 317\u2013320. IEEE, Piscataway (2013)","DOI":"10.1109\/CloudCom.2013.155"},{"issue":"12","key":"5_CR65","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/MCOM.2016.1600492CM","volume":"54","author":"X Sun","year":"2016","unstructured":"Sun, X., Ansari, N.: EdgeIoT: mobile edge computing for the Internet of Things. IEEE Commun. Mag. 54(12), 22\u201329 (2016)","journal-title":"IEEE Commun. Mag."},{"key":"5_CR66","doi-asserted-by":"publisher","first-page":"766","DOI":"10.1109\/ACCESS.2016.2529723","volume":"4","author":"Y Sun","year":"2016","unstructured":"Sun, Y., Song, H., Jara, A.J., Bie, R.: Internet of Things and big data analytics for smart and connected communities. IEEE Access 4, 766\u2013773 (2016)","journal-title":"IEEE Access"},{"issue":"3","key":"5_CR67","first-page":"34","volume":"3","author":"H Sundmaeker","year":"2010","unstructured":"Sundmaeker, H., Guillemin, P., Friess, P., Woelffl\u00e9, S.: Vision and challenges for realising the Internet of Things. Cluster Eur. Res. Projects Internet of Things Eur. Commission 3(3), 34\u201336 (2010)","journal-title":"Cluster Eur. Res. Projects Internet of Things Eur. Commission"},{"key":"5_CR68","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1016\/j.erss.2018.06.009","volume":"44","author":"J Truby","year":"2018","unstructured":"Truby, J.: Decarbonizing bitcoin: Law and policy choices for reducing the energy consumption of blockchain technologies and digital currencies. Energy Res. Soc. Sci. 44, 399\u2013410 (2018)","journal-title":"Energy Res. Soc. Sci."},{"issue":"6","key":"5_CR69","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1145\/1323293.1294268","volume":"41","author":"B Vandiver","year":"2007","unstructured":"Vandiver, B., Balakrishnan, H., Liskov, B., Madden, S.: Tolerating Byzantine faults in transaction processing systems using commit barrier scheduling. SIGOPS Oper. Syst. Rev. 41(6), 59\u201372 (2007)","journal-title":"SIGOPS Oper. Syst. Rev."},{"issue":"1","key":"5_CR70","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1145\/1435417.1435432","volume":"52","author":"W Vogels","year":"2009","unstructured":"Vogels, W.: Eventually consistent. Commun. ACM 52(1), 40\u201344 (2009)","journal-title":"Commun. ACM"},{"key":"5_CR71","doi-asserted-by":"crossref","unstructured":"Vukoli\u0107, M.: The quest for scalable blockchain fabric: Proof-of-work vs. BFT replication. In: International Workshop on Open Problems in Network Security, pp. 112\u2013125. Springer, Berlin (2015)","DOI":"10.1007\/978-3-319-39028-4_9"},{"key":"5_CR72","doi-asserted-by":"crossref","unstructured":"Watanabe, H., Fujimura, S., Nakadaira, A., Miyazaki, Y., Akutsu, A., Kishigami, J.: Blockchain contract: securing a blockchain applied to smart contracts. In: 2016 IEEE International Conference on Consumer Electronics (ICCE), pp. 467\u2013468. IEEE, Piscataway (2016)","DOI":"10.1109\/ICCE.2016.7430693"},{"key":"5_CR73","first-page":"1","volume":"151","author":"G Wood","year":"2014","unstructured":"Wood, G.: Ethereum: a secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper 151, 1\u201332 (2014)","journal-title":"Ethereum Project Yellow Paper"},{"key":"5_CR74","unstructured":"Yarabarla, S.: LWW (2017). https:\/\/www.oreilly.com\/library\/view\/learning-apache-cassandra\/"},{"key":"5_CR75","doi-asserted-by":"crossref","unstructured":"Yi, S., Hao, Z., Qin, Z., Li, Q.: Fog computing: platform and applications. In: 2015 Third IEEE Workshop on Hot Topics in Web Systems and Technologies (HotWeb), pp. 73\u201378. IEEE, Piscataway (2015)","DOI":"10.1109\/HotWeb.2015.22"},{"key":"5_CR76","doi-asserted-by":"crossref","unstructured":"Zhang, Y., He, D., Choo, K.K.R.: BaDs: blockchain-based architecture for data sharing with ABS and CP-ABE in IoT. Wirel. Commun. Mobile Comput. 2018, 2783658 (2018)","DOI":"10.1155\/2018\/2783658"},{"key":"5_CR77","doi-asserted-by":"crossref","unstructured":"Zhao, W.: Application-aware Byzantine fault tolerance. In: 2014 IEEE 12th International Conference on Dependable, Autonomic and Secure Computing, pp. 45\u201350. IEEE, Piscataway (2014)","DOI":"10.1109\/DASC.2014.17"},{"key":"5_CR78","doi-asserted-by":"publisher","first-page":"101044","DOI":"10.1016\/j.aei.2020.101044","volume":"43","author":"Z Zhao","year":"2020","unstructured":"Zhao, Z., Lin, P., Shen, L., Zhang, M., Huang, G.Q.: IoT edge computing-enabled collaborative tracking system for manufacturing resources in industrial park. Adv. Eng. Inf. 43, 101044 (2020)","journal-title":"Adv. Eng. Inf."},{"key":"5_CR79","unstructured":"Zhao, W., Chai, H.: Byzantine fault tolerance for services with commutative operations. In SCC. IEEE, Piscataway (2014)"},{"key":"5_CR80","doi-asserted-by":"crossref","unstructured":"Zhaofeng, M., Xiaochang, W., Jain, D.K., Khan, H., Hongmin, G., Zhen, W.: A blockchain-based trusted data management scheme in edge computing. IEEE Trans. Ind. Inf. 16(3), 2013\u20132021","DOI":"10.1109\/TII.2019.2933482"}],"container-title":["Advances in Information Security","Fog\/Edge Computing For Security, Privacy, and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-57328-7_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,5]],"date-time":"2021-01-05T09:00:42Z","timestamp":1609837242000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-57328-7_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030573270","9783030573287"],"references-count":80,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-57328-7_5","relation":{},"ISSN":["1568-2633","2512-2193"],"issn-type":[{"type":"print","value":"1568-2633"},{"type":"electronic","value":"2512-2193"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"5 January 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}