{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:59:13Z","timestamp":1740142753171,"version":"3.37.3"},"reference-count":36,"publisher":"Oxford University Press (OUP)","issue":"8","license":[{"start":{"date-parts":[[2021,5,8]],"date-time":"2021-05-08T00:00:00Z","timestamp":1620432000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/academic.oup.com\/journals\/pages\/open_access\/funder_policies\/chorus\/standard_publication_model"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61602435"],"award-info":[{"award-number":["61602435"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003995","name":"Natural Science Foundation of Anhui Province","doi-asserted-by":"publisher","award":["1708085QF153"],"award-info":[{"award-number":["1708085QF153"]}],"id":[{"id":"10.13039\/501100003995","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Major Project of Science and Technology of Anhui Province","award":["16030901057"],"award-info":[{"award-number":["16030901057"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,8,11]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>Blockchain has attracted tremendous attention from both the academia and the capital market. The insertion of data in a blockchain known as anchoring makes data verifiable and independently auditable and has many potential applications. The objective of this paper is to introduce a dynamic cross-chain anchoring framework for snapshotting users\u2019 data into multiple public blockchains with the help of smart contracts. This paper starts by proposing the framework and depicting the components and workflow. Second, we design a target chain selection algorithm that combines the states of different blockchains. Using the algorithm, users can dynamically select a suitable public blockchain for anchoring tasks. Third, the virtual chain protocol is presented and achieves data anchoring orderly and integrally. Analyzation and evaluation show that the framework can enhance user experience, robustness and performance.<\/jats:p>","DOI":"10.1093\/comjnl\/bxab052","type":"journal-article","created":{"date-parts":[[2021,5,9]],"date-time":"2021-05-09T11:07:57Z","timestamp":1620558477000},"page":"2164-2182","source":"Crossref","is-referenced-by-count":0,"title":["DCAF: Dynamic Cross-Chain Anchoring Framework using Smart Contracts"],"prefix":"10.1093","volume":"65","author":[{"given":"Weidong","family":"Wang","sequence":"first","affiliation":[{"name":"Hefei Institutes of Physical Science , , Hefei 230031, China"},{"name":"Chinese Academy of Sciences , , Hefei 230031, China"}]},{"given":"Xiaofeng","family":"Li","sequence":"additional","affiliation":[{"name":"Hefei Institutes of Physical Science , , Hefei 230031, China"},{"name":"Chinese Academy of Sciences , , Hefei 230031, China"}]},{"given":"He","family":"Zhao","sequence":"additional","affiliation":[{"name":"Hefei Institutes of Physical Science , , Hefei 230031, China"},{"name":"Chinese Academy of Sciences , , Hefei 230031, China"}]}],"member":"286","published-online":{"date-parts":[[2021,5,8]]},"reference":[{"volume-title":"How much data is generated each day","year":"2019","author":"Jeff","key":"2022081612471186300_ref1"},{"volume-title":"Verifying a Record as Part of an Operation to Modify the Record","year":"2011","author":"Kalos","key":"2022081612471186300_ref2"},{"key":"2022081612471186300_ref3","doi-asserted-by":"crossref","first-page":"305","DOI":"10.1145\/2110363.2110399","volume-title":"Proceedings of the 2nd ACM SIGHT International Health Informatics Symposium","author":"King","year":"2012"},{"key":"2022081612471186300_ref4","first-page":"6","article-title":"Blockchain technology: Beyond bitcoin","volume":"2","author":"Crosby","year":"2016","journal-title":"Applied Innovation"},{"volume-title":"Handbook of Applied Cryptography","year":"1997","author":"Menezes","key":"2022081612471186300_ref5"},{"key":"2022081612471186300_ref6","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1016\/S1361-3723(13)70101-5","article-title":"The problem with bitcoin","volume":"2013","author":"Bradbury","year":"2013","journal-title":"Computer Fraud & Security"},{"volume-title":"Understanding the dao attack","year":"2016","author":"Siegel","key":"2022081612471186300_ref7"},{"volume-title":"Ethereum: A secure decentralised generalised transaction ledger","year":"2014","author":"Wood","key":"2022081612471186300_ref8"},{"volume-title":"Bitcoin: A peer-to-peer electronic cash system","year":"2009","author":"Nakamoto","key":"2022081612471186300_ref9"},{"key":"2022081612471186300_ref10","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1109\/MC.2017.3571047","article-title":"Blockchain technology infinance","volume":"50","author":"Treleaven","year":"2017","journal-title":"Computer"},{"key":"2022081612471186300_ref11","doi-asserted-by":"crossref","first-page":"305","DOI":"10.1007\/s10916-019-1430-2","article-title":"Med-PPPHIS: Blockchain-based personal healthcare information system for National Physique Monitoring and scientific exercise guiding","volume":"43","author":"Zhou","year":"2019","journal-title":"J. Med. Syst."},{"key":"2022081612471186300_ref12","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1504\/IJCAT.2019.100300","article-title":"EverSSDI: Blockchain-based framework for verification, authorisation and recovery of self-sovereign identity using smart contracts","volume":"60","author":"Zhou","year":"2019","journal-title":"Int. J. Comput. Appl. Technol."},{"key":"2022081612471186300_ref13","first-page":"2150","article-title":"Data capitalization method based on blockchain smart contract for internet of things","volume":"52","author":"Sheng","year":"2018","journal-title":"J Zhejiang University (Engineering Science)"},{"key":"2022081612471186300_ref14","first-page":"2620","article-title":"Archival data protection and sharing method based on blockchain","volume":"30","author":"Tan","year":"2019","journal-title":"Ruan Jian Xue Bao\/J Software"},{"key":"2022081612471186300_ref15","doi-asserted-by":"crossref","first-page":"1815","DOI":"10.1016\/j.procs.2018.05.140","article-title":"Blockchain technology for security issues and challenges in IoT","volume":"132","author":"Kumar","year":"2018","journal-title":"Procedia Computer Science"},{"volume-title":"On public and private plockchains","year":"2015","author":"Buterin","key":"2022081612471186300_ref16"},{"key":"2022081612471186300_ref17","doi-asserted-by":"crossref","first-page":"1204","DOI":"10.1109\/ICTC.2018.8539529","volume-title":"2018 International Conference on Information and Communication Technology Convergence (ICTC)","author":"Kim","year":"2018"},{"key":"2022081612471186300_ref18","first-page":"1649","article-title":"Research on the progress in cross-chain technology of blockchains","volume":"30","author":"Li","year":"2019","journal-title":"Ruan Jian Xue Bao\/J Software"},{"key":"2022081612471186300_ref19","first-page":"45","volume-title":"13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16)","author":"Eyal","year":"2016"},{"key":"2022081612471186300_ref20","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1145\/3132747.3132757","volume-title":"Proceedings of the 26th Symposium on Operating Systems Principles","author":"Gilad","year":"2017"},{"article-title":"Dfinity technology overview series, consensus system","year":"2018","author":"Hanke","key":"2022081612471186300_ref21"},{"key":"2022081612471186300_ref22","doi-asserted-by":"crossref","first-page":"39273","DOI":"10.1109\/ACCESS.2019.2906637","article-title":"DLattice: A permission-less blockchain based on DPoS-BA-DAG consensus for data tokenization","volume":"7","author":"Zhou","year":"2019","journal-title":"IEEE Access"},{"key":"2022081612471186300_ref23","first-page":"1160","article-title":"Structured data management method based on scalable Blockchain storage","volume":"39","author":"Yu","year":"2019","journal-title":"Transactions of Beijing Institute of Technology"},{"key":"2022081612471186300_ref24","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1109\/SP.1980.10006","volume-title":"1980 IEEE Symposium on Security and Privacy","author":"Merkle","year":"1980"},{"volume-title":"Mastering Ethereum: Building Smart Contracts and DAPPS","year":"2018","author":"Antonopoulos","key":"2022081612471186300_ref25"},{"volume-title":"Proof of Existence, certificando documentos con Bitcoin","year":"2013","author":"Juli\u00e1n","key":"2022081612471186300_ref26"},{"volume-title":"Chainpoint\u2013A Scalable Protocol for Anchoring Data in the Blockchain and Generating Blockchain Receipts","year":"2016","author":"Vaughn","key":"2022081612471186300_ref27"},{"volume-title":"Factom: Business Processes Secured by Immutable Audit Trails on the Blockchain","year":"2014","author":"Snow","key":"2022081612471186300_ref28"},{"volume-title":"How Does Po.et Work","year":"2018","author":"Geoff","key":"2022081612471186300_ref29"},{"key":"2022081612471186300_ref30","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1080\/00224065.1986.11979014","article-title":"The exponentially weighted moving average","volume":"18","author":"Hunter","year":"1986","journal-title":"J. Qual. Technol."},{"key":"2022081612471186300_ref31","first-page":"653","article-title":"A survey of blockchain security issues and challenges","volume":"19","author":"Lin","year":"2017","journal-title":"IJ Network Security"},{"key":"2022081612471186300_ref32","article-title":"A survey on the security of blockchain systems","author":"Li","year":"2017","journal-title":"Futur. Gener. Comput. Syst."},{"key":"2022081612471186300_ref33","first-page":"92","volume-title":"International Conference on Blockchain","author":"Liu","year":"2018"},{"volume-title":"Filecoin: A decentralized storage network","year":"2018","author":"Benet","key":"2022081612471186300_ref34"},{"volume-title":"Storj a peer-to-peer cloud storage network","year":"2014","author":"Wilkinson","key":"2022081612471186300_ref35"},{"volume-title":"Sia: Simple decentralized storage","year":"2014","author":"Vorick","key":"2022081612471186300_ref36"}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/academic.oup.com\/comjnl\/article-pdf\/65\/8\/2164\/45329592\/bxab052.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/comjnl\/article-pdf\/65\/8\/2164\/45329592\/bxab052.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,16]],"date-time":"2022-08-16T12:47:52Z","timestamp":1660654072000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/comjnl\/article\/65\/8\/2164\/6272097"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,8]]},"references-count":36,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2021,5,8]]},"published-print":{"date-parts":[[2022,8,11]]}},"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxab052","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"type":"print","value":"0010-4620"},{"type":"electronic","value":"1460-2067"}],"subject":[],"published-other":{"date-parts":[[2022,8]]},"published":{"date-parts":[[2021,5,8]]}}}