{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T22:37:42Z","timestamp":1772836662222,"version":"3.50.1"},"reference-count":37,"publisher":"Oxford University Press (OUP)","issue":"10","license":[{"start":{"date-parts":[[2020,5,8]],"date-time":"2020-05-08T00:00:00Z","timestamp":1588896000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/academic.oup.com\/journals\/pages\/open_access\/funder_policies\/chorus\/standard_publication_model"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61602435"],"award-info":[{"award-number":["61602435"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003995","name":"Natural Science Foundation of Anhui Province","doi-asserted-by":"publisher","award":["1708085QF153"],"award-info":[{"award-number":["1708085QF153"]}],"id":[{"id":"10.13039\/501100003995","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,10,19]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>The inability to scale is one of the most concerning problems looming in blockchain systems, where every node has to store all contents of the ledger database locally, leading to centralization and higher operation costs. In this paper, we propose a model named virtual block group (VBG), which aims at addressing the node storage scalability problem. Adopting the VBG model, each node only needs to store part of block data and saves the VBG storage index to distributed hash table by taking block data as a resource, thus improving the query efficiency of block data. With the incentive mechanism of block data storage, and the storage verification and audit mechanism of block data, the security and reliability of block data storage can be ensured. The analysis and calculation show that this model saves hard drive storage space of the node to a greater extent with a shorter time of requesting block data, in the premise of ensuring secure and reliable block data. Compared to other technologies such as sharding, our model does not change the consensus mechanism or the network topology and retains the reliability and security of the original blockchain system.<\/jats:p>","DOI":"10.1093\/comjnl\/bxaa046","type":"journal-article","created":{"date-parts":[[2020,4,3]],"date-time":"2020-04-03T11:08:25Z","timestamp":1585912105000},"page":"1524-1536","source":"Crossref","is-referenced-by-count":31,"title":["Virtual Block Group: A Scalable Blockchain Model with Partial Node Storage and Distributed Hash Table"],"prefix":"10.1093","volume":"63","author":[{"given":"Bin","family":"Yu","sequence":"first","affiliation":[{"name":"Hefei Institutes of Physical Science, Chinese Academy of Sciences, 350 Shushanhu Road Hefei 230031, Anhui, P. R. China"},{"name":"University of Science and Technology of China, No.96, JinZhai Road Baohe District, Hefei, Anhui, 230026, P.R. China"}]},{"given":"Xiaofeng","family":"Li","sequence":"additional","affiliation":[{"name":"Hefei Institutes of Physical Science, Chinese Academy of Sciences, 350 Shushanhu Road Hefei 230031, Anhui, P. R. China"},{"name":"University of Science and Technology of China, No.96, JinZhai Road Baohe District, Hefei, Anhui, 230026, P.R. China"}]},{"given":"He","family":"Zhao","sequence":"additional","affiliation":[{"name":"Hefei Institutes of Physical Science, Chinese Academy of Sciences, 350 Shushanhu Road Hefei 230031, Anhui, P. R. China"}]}],"member":"286","published-online":{"date-parts":[[2020,5,8]]},"reference":[{"key":"2020101408044228800_ref1","author":"Nakamoto","year":"2008"},{"key":"2020101408044228800_ref2","first-page":"216","article-title":"Data integrity protection method for microorganism sampling robots based on blockchain technology","volume":"43","author":"He","year":"2015","journal-title":"Huazhong Univ. of Sci. &. Tech. Natural Science Edition"},{"key":"2020101408044228800_ref3"},{"key":"2020101408044228800_ref4","year":"2017"},{"key":"2020101408044228800_ref5"},{"key":"2020101408044228800_ref6","author":"Unlimited"},{"key":"2020101408044228800_ref7"},{"key":"2020101408044228800_ref8","author":"Zyskind","year":"2015"},{"key":"2020101408044228800_ref9","article-title":"The DCS theorem","author":"Slepak","year":"2018"},{"key":"2020101408044228800_ref10","article-title":"The Bitcoin lightning network: scalable off-chain instant payments","author":"Poon","year":"2016"},{"key":"2020101408044228800_ref11","volume-title":"On the Scalability and Security of Bitcoin","author":"Decker","year":"2016"},{"key":"2020101408044228800_ref12","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1007\/978-3-319-69084-1_26","volume-title":"International Symposium on Stabilization, Safety, and Security of Distributed Systems, Boston, MA, USA, 5\u20138 November","author":"Burchert","year":"2017"},{"key":"2020101408044228800_ref13","author":"Home \u2013 Hyperledger","year":"2019"},{"key":"2020101408044228800_ref14","article-title":"Enabling blockchain innovations with pegged sidechains","author":"Back","year":"2014"},{"key":"2020101408044228800_ref15","first-page":"31","article-title":"The road to scalable blockchain designs","volume":"42","author":"Bano","year":"2017","journal-title":"USENIX;login"},{"key":"2020101408044228800_ref16","author":"Clifford","year":"2016"},{"key":"2020101408044228800_ref17","article-title":"Sharding document","author":"Buterin","year":"2019"},{"key":"2020101408044228800_ref18","article-title":"IPFS - content addressed, versioned, P2P file system (DRAFT 3)","author":"Benet","year":"2014"},{"key":"2020101408044228800_ref19","article-title":"Sia: simple decentralized storage","author":"Vorick","year":"2014"},{"key":"2020101408044228800_ref20","article-title":"Storj - decentralized cloud storage","author":"Wilkinson","year":"2014"},{"key":"2020101408044228800_ref21","article-title":"Metadisk: blockchain-based decentralized file storage application","author":"Wilkinson","year":"2014"},{"key":"2020101408044228800_ref22","article-title":"DHT protocol","author":"Loewenstern","year":"2017"},{"key":"2020101408044228800_ref23","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1145\/964723.383072","article-title":"A scalable content-addressable network","volume":"31","author":"Ratnasamy","year":"2001","journal-title":"ACM SIGCOMM Comp. Comm. Rev."},{"key":"2020101408044228800_ref24","first-page":"329","volume-title":"IFIP\/ACM International Conference on Distributed Systems Platforms and Open Distributed Processing","author":"Rowstron","year":"2001"},{"key":"2020101408044228800_ref25","first-page":"195","volume-title":"International Workshop on Peer-to-Peer Systems 2004","author":"Karp","year":"2004"},{"key":"2020101408044228800_ref26","first-page":"1","volume-title":"Peer-to-Peer Computing (P2P), IEEE Thirteenth International Conference on Peer-to-peer Computing, Trento, Italy, 9\u201311 September","author":"Wang","year":"2013"},{"key":"2020101408044228800_ref27","author":"Blockmeta","year":"2019"},{"key":"2020101408044228800_ref28","article-title":"Peer ID conventions","author":"Harrison","year":"2016"},{"key":"2020101408044228800_ref29","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1109\/TNET.2002.808407","article-title":"Chord: a scalable peer-to-peer lookup service for Internet applications","volume":"11","author":"Stoica","year":"2003","journal-title":"IEEE\/ACM Transaction on Networking"},{"key":"2020101408044228800_ref30","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1109\/SP.1980.10006","volume-title":"1980 IEEE Symposium on Security and Privacy","author":"Merkle","year":"1980"},{"key":"2020101408044228800_ref31","first-page":"369","author":"Merkle","year":"1988"},{"key":"2020101408044228800_ref32","author":"Why Every Bitcoin User Should Understand SPV Security","year":"2017"},{"key":"2020101408044228800_ref33","first-page":"53","article-title":"Kademlia: A Peer-to-Peer Information System Based on the XOR Metric. In Druschel P., Kaashoek F., Rowstron A. (eds) Peer-to-Peer Systems. IPTPS 2002. Lecture Notes in Computer Science, vol 2429.","author":"Maymounkov","year":"2002"},{"key":"2020101408044228800_ref34","year":"2017"},{"key":"2020101408044228800_ref35","article-title":"Nano: a feeless distributed cryptocurrency network","author":"LeMahieu","year":"2017"},{"key":"2020101408044228800_ref36","article-title":"Raiden network 0.100.3 Documentation","year":"2019"},{"key":"2020101408044228800_ref37","article-title":"A next-generation smart contract and decentralized application platform","author":"Ethereum White Paper","year":"2015"}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/comjnl\/article-pdf\/63\/10\/1524\/33876444\/bxaa046.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"http:\/\/academic.oup.com\/comjnl\/article-pdf\/63\/10\/1524\/33876444\/bxaa046.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T12:06:00Z","timestamp":1602677160000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/comjnl\/article\/63\/10\/1524\/5828295"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5,8]]},"references-count":37,"journal-issue":{"issue":"10","published-online":{"date-parts":[[2020,5,8]]},"published-print":{"date-parts":[[2020,10,19]]}},"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxaa046","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"value":"0010-4620","type":"print"},{"value":"1460-2067","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2020,10]]},"published":{"date-parts":[[2020,5,8]]}}}