{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T08:06:15Z","timestamp":1768550775909,"version":"3.49.0"},"reference-count":38,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,12,14]],"date-time":"2025-12-14T00:00:00Z","timestamp":1765670400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,14]],"date-time":"2025-12-14T00:00:00Z","timestamp":1765670400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172441,62172449"],"award-info":[{"award-number":["62172441,62172449"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,12,14]]},"DOI":"10.1109\/icpads67057.2025.11322936","type":"proceedings-article","created":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T20:36:54Z","timestamp":1768423014000},"page":"01-10","source":"Crossref","is-referenced-by-count":0,"title":["Haina Storage: Large-Scale and Secure Decentralized Storage for Files in Private Cloud"],"prefix":"10.1109","author":[{"given":"Zijian","family":"Zhou","sequence":"first","affiliation":[{"name":"School of Software, Xinjiang University,Urumqi,China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Caimei","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Artificial Intelligence and Big Data, Hefei University,Hefei,China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xiaoheng","family":"Deng","sequence":"additional","affiliation":[{"name":"School of Electronic Information, Central South University,Changsha,China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hairong","family":"Lin","sequence":"additional","affiliation":[{"name":"School of Electronic Information, Central South University,Changsha,China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jianhao","family":"Lu","sequence":"additional","affiliation":[{"name":"Third Research Institute of the Ministry of Public Security,Shanghai,China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shaohua","family":"Wan","sequence":"additional","affiliation":[{"name":"Shenzhen Institute for Advanced Study, University of Electronic Science and Technology of China,Shenzhen,China"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3081826"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3228908"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.002.2300610"},{"key":"ref4","volume-title":"Huge cloud market sees a strong bounce in growth rate for the second consecutive quarter: Synergy research group","author":"Group","year":"2024"},{"key":"ref5","article-title":"2022 state of the cloud report","volume-title":"Flexera","author":"Flexera","year":"2022"},{"key":"ref6","volume-title":"2018 google data breach","author":"Wikipedia","year":"2024"},{"key":"ref7","author":"Nakamoto","year":"2008","journal-title":"Bitcoin: A peer-to-peer electronic cash system"},{"key":"ref8","first-page":"2018","article-title":"Sia: Simple decentralized storage","volume":"8","author":"Vorick","year":"2014","journal-title":"Retrieved May"},{"key":"ref9","author":"Wilkinson","year":"2014","journal-title":"Storj a peer-to-peer cloud storage network"},{"key":"ref10","volume-title":"Swarm-storage and communication infrastructure for a self-sovereign digital society","author":"Team","year":"2021"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2023.3323155"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3403954"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICCBB.2018.8756348"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2757955"},{"key":"ref15","article-title":"Storage needs for blockchain technology","volume-title":"IBM","author":"Storage","year":"2018"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1700879"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2021.102970"},{"key":"ref18","author":"Benet","year":"2014","journal-title":"Ipfs - content addressed, versioned, p2p file system"},{"key":"ref19","first-page":"2024\/182","article-title":"Filedes: A secure, scalable and succinct decentralized encrypted storage network","volume-title":"Cryptology ePrint Archive","author":"Xu","year":"2024"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2023.3288760"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2022.3224764"},{"key":"ref22","author":"Back","year":"2002","journal-title":"Hashcash-a denial of service counter-measure"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1093\/rfs\/hhaa075"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48000-7_29"},{"key":"ref25","article-title":"NFS: Network File System Protocol specification","volume-title":"RFC 1094","year":"1989"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45336-9_40"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44702-4_4"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-26948-7_14"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/tc.2011.221"},{"issue":"1999","key":"ref30","first-page":"173","article-title":"Practical byzantine fault tolerance","volume":"99","author":"Castro","year":"1999","journal-title":"OsDI"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-021-22256-3"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2023.3245638"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2023.3321712"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/access.2023.3296781"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2023.3265979"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-89137-4_16"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1738"},{"key":"ref38","article-title":"Information technology - Security techniques - Encryption algorithms - Part 3: Block ciphers amendment 1: Sm4","year":"2021","journal-title":"International Organization for Standardization"}],"event":{"name":"2025 IEEE 31th International Conference on Parallel and Distributed Systems (ICPADS)","location":"Hefei, China","start":{"date-parts":[[2025,12,14]]},"end":{"date-parts":[[2025,12,18]]}},"container-title":["2025 IEEE 31th International Conference on Parallel and Distributed Systems (ICPADS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11322805\/11322871\/11322936.pdf?arnumber=11322936","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T07:09:04Z","timestamp":1768460944000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11322936\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,14]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/icpads67057.2025.11322936","relation":{},"subject":[],"published":{"date-parts":[[2025,12,14]]}}}