{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,20]],"date-time":"2025-12-20T22:08:14Z","timestamp":1766268494322,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,1,10]],"date-time":"2020-01-10T00:00:00Z","timestamp":1578614400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,1,10]]},"DOI":"10.1145\/3377049.3377083","type":"proceedings-article","created":{"date-parts":[[2020,3,20]],"date-time":"2020-03-20T20:40:32Z","timestamp":1584736832000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Secured Blockchain Based Decentralised Internet"],"prefix":"10.1145","author":[{"given":"S. M. Habibul Mursaleen","family":"Chowdhury","sequence":"first","affiliation":[{"name":"Department of Computer Science, American International University-Bangladesh, Dhaka, Bangladesh"}]},{"given":"Ferdous","family":"Jahan","sequence":"additional","affiliation":[{"name":"Department of Computer Science, American International University-Bangladesh, Dhaka, Bangladesh"}]},{"given":"Sarawat Murtaza","family":"Sara","sequence":"additional","affiliation":[{"name":"Department of Computer Science, American International University-Bangladesh, Dhaka, Bangladesh"}]},{"given":"Dip","family":"Nandi","sequence":"additional","affiliation":[{"name":"Department of Computer Science, American International University-Bangladesh, Dhaka, Bangladesh"}]}],"member":"320","published-online":{"date-parts":[[2020,3,20]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"1","volume-title":"Back to the Future?","author":"Barabas N.","year":"2017","unstructured":"C.Barabas, N.Narula, E.Zuckerman,\"Defending Internet Freedom through Decentralization: Back to the Future?\", pp. 1--113, August 2017."},{"key":"e_1_3_2_1_2_1","first-page":"1","volume-title":"an open and decentralized research data tool","author":"Robinson J.A.","year":"2018","unstructured":"D.C.Robinson, J.A.Hand, M.B.Madsen,.K.R.McKelvey,\"The Dat Project, an open and decentralized research data tool\", pp.1--4, October 2018."},{"key":"e_1_3_2_1_3_1","unstructured":"C.Faife \"The Decentralized Web Explained(in Words You can understand) 27 November 2018."},{"key":"e_1_3_2_1_4_1","volume-title":"The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences","author":"Liang A","year":"2008","unstructured":"S.H.L.Liang,\"A New Fully Decentralized Scalable Peer-to-peer Gis Architecture\", The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences. Vol. XXXVII. Part B4. Beijing 2008."},{"key":"e_1_3_2_1_5_1","volume-title":"Creative Commons Attribution-ShareAlike 4.0 International License","author":"Top","year":"2017","unstructured":"OWASP Top 10 -2017, The Ten Most Critical Web Application Security Risks, Creative Commons Attribution-ShareAlike 4.0 International License, 2017"},{"key":"e_1_3_2_1_6_1","unstructured":"S.Jahid I.Hoque M.Hafiz \"Security Issues Of Web Server\" pp.1--4."},{"volume-title":"February 19, 2004.","author":"Brewer","key":"e_1_3_2_1_7_1","unstructured":"J.Brewer,\"Web Server Vulnerabilities and a Defense in Depth Strategy Using the Squid Proxy\", pp. 2--24, February 19, 2004."},{"key":"e_1_3_2_1_8_1","unstructured":"G.Llorca-Abad L Cano-Oron \"How Social Networks and Data Brokers Trade with pPrivate Data\" pp.1--21 December 2016."},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of IOE Graduate Conference","author":"Chhetri E.L.","year":"2017","unstructured":"L.Chhetri, E.L.Chhetri,\"Securing Web Application and finding security vulnerabilities, a case study on school management system\", Proceedings of IOE Graduate Conference, 2017,00.1--6."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"S.Wang Y.Zhang Y.Zhang \"A Blockchain-Based Framework for Data Sharing With Fine-Grained Access Control in Decentralized Storage Systems\" pp.1--14 29 June 2018.","DOI":"10.1109\/ACCESS.2018.2851611"},{"key":"e_1_3_2_1_11_1","first-page":"1","volume-title":"Blockchain-Secured Cloud Storage\" in IEEE 11Th Internatioan Conference on Cloud Computing(CLOUD)","author":"Tang Q","year":"2018","unstructured":"Y.Tang, Q, Zou, J.Chen, K.Li,\"ChainFS: Blockchain-Secured Cloud Storage\" in IEEE 11Th Internatioan Conference on Cloud Computing(CLOUD). pp.1--17, July 2018."},{"key":"e_1_3_2_1_12_1","volume-title":"IEEE 11Th Internatioan Conference on Blockchain (Blockchain-2018)","author":"Steichen B.B.F.","year":"2018","unstructured":"M.Steichen, B.B.F.Pontiveros, R.Norvill, W.Shbair.\"Blockchain-Based, Decentralized Access Control for IPFS\", in IEEE 11Th Internatioan Conference on Blockchain (Blockchain-2018), Halifax, Canada, July 2018."},{"key":"e_1_3_2_1_13_1","first-page":"1","volume-title":"Blockchain-Secured Cloud Storage\" in IEEE 11Th Internatioan Conference on Cloud Computing(CLOUD)","author":"Tang Q","year":"2018","unstructured":"Y.Tang, Q, Zou, J.Chen, K.Li,\"ChainFS: Blockchain-Secured Cloud Storage\" in IEEE 11Th Internatioan Conference on Cloud Computing(CLOUD). pp. 1--17, July 2018."},{"key":"e_1_3_2_1_14_1","volume-title":"IEEE 11Th Internatioan Conference on Blockchain (Blockchain-2018)","author":"Steichen B.B.F.","year":"2018","unstructured":"M.Steichen, B.B.F.Pontiveros, R.Norvill, W.Shbair.\"Blockchain-Based, Decentralized Access Control for IPFS\", in IEEE 11Th Internatioan Conference on Blockchain (Blockchain-2018), Halifax, Canada, July 2018."},{"key":"e_1_3_2_1_15_1","first-page":"1","volume-title":"Proceedings on Privacy Enhancing Technologies;","author":"Troncoso M.","year":"2017","unstructured":"C.Troncoso, M.Isaakidis, G.Danezis, H.Halpin,\"Systematizing Decentralization and Privacy:Lessons from 15 Years of Research and Deployments\", Proceedings on Privacy Enhancing Technologies; pp.1--23, 2017"},{"key":"e_1_3_2_1_16_1","first-page":"1","volume-title":"Back to the Future?","author":"Barabas N.","year":"2017","unstructured":"C.Barabas, N.Narula, E.Zuckerman,\"Defending Internet Freedom through Decentralization: Back to the Future?\", pp. 1--113, August 2017."},{"key":"e_1_3_2_1_17_1","unstructured":"D.Thain C.Moretti P.Madrid P.Snowberger J.Hemmes \"The Consequences of Decentralized Security in a Cooperative Storage System\".pp.1--12."},{"issue":"6","key":"e_1_3_2_1_18_1","first-page":"1","article-title":"Decentralized resource management for a distributed continuous media server","volume":"13","author":"Shahabi F.","year":"2002","unstructured":"C.Shahabi, F.Banaei-Kashani,\"Decentralized resource management for a distributed continuous media server\", in IEEE Transactions on Parallel and Distributed Systems, vol 13, NO.6, pp.1--19, June 2002.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"e_1_3_2_1_19_1","unstructured":"Douglas Thain Christopher Moretti Paul Madrid Philip Snowberger and Jeffrey Hemmes Department of Computer Science and Engineering University of Notre Dame The Consequences of Decentralized Security in a Cooperative Storage System"},{"key":"e_1_3_2_1_20_1","first-page":"1","volume-title":"Decentralized Server Selection for Cloud Services","author":"Wendell J.W.","unstructured":"P. Wendell, J.W. Jiang, M.J. Freedman, J. Rexford.\" DONAR: Decentralized Server Selection for Cloud Services\", pp.1--12"},{"key":"e_1_3_2_1_21_1","first-page":"1","volume-title":"Decentralization of Application Software\", inCommunications of the ACM","author":"Schuff R.S.","year":"2001","unstructured":"D.Schuff, R.S.Louis,\"Centralization vs. Decentralization of Application Software\", inCommunications of the ACM, Vol.44, No.6.pp.1--6, June 2001."}],"event":{"name":"ICCA 2020: International Conference on Computing Advancements","acronym":"ICCA 2020","location":"Dhaka Bangladesh"},"container-title":["Proceedings of the International Conference on Computing Advancements"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3377049.3377083","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3377049.3377083","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:50Z","timestamp":1750202630000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3377049.3377083"}},"subtitle":["A Proposed New Internet"],"short-title":[],"issued":{"date-parts":[[2020,1,10]]},"references-count":21,"alternative-id":["10.1145\/3377049.3377083","10.1145\/3377049"],"URL":"https:\/\/doi.org\/10.1145\/3377049.3377083","relation":{},"subject":[],"published":{"date-parts":[[2020,1,10]]},"assertion":[{"value":"2020-03-20","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}