{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:20:46Z","timestamp":1750220446750,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":52,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,4]],"date-time":"2020-12-04T00:00:00Z","timestamp":1607040000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,4]]},"DOI":"10.1145\/3444370.3444594","type":"proceedings-article","created":{"date-parts":[[2021,1,5]],"date-time":"2021-01-05T06:32:34Z","timestamp":1609828354000},"page":"335-341","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Decentralization of DNS"],"prefix":"10.1145","author":[{"given":"Shi","family":"Yin","sequence":"first","affiliation":[{"name":"Cyberspace Advanced Technology Research Institute, Guangzhou, China, Cyberspace Security Research Center, Peng Cheng Laboratory, Shenzhen, China"}]},{"given":"Yu","family":"Teng","sequence":"additional","affiliation":[{"name":"Zhong Zi Hua Ke Traffic Construction Technology Co. Ltd, Beijing, China"}]},{"given":"Ning","family":"Hu","sequence":"additional","affiliation":[{"name":"Cyberspace Advanced Technology Research Institute, Guangzhou, China, Cyberspace Security Research Center, Peng Cheng Laboratory, Shenzhen, China"}]},{"given":"Xu Dong","family":"Jia","sequence":"additional","affiliation":[{"name":"Cyberspace Advanced Technology, GuangZhou University, Guangzhou, China, Cyberspace Security Research Center, Peng Cheng Laboratory, Shenzhen, China"}]}],"member":"320","published-online":{"date-parts":[[2021,1,4]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[Online]. Available: https:\/\/patents.google.com\/patent\/US8756340B2\/en  [Online]. Available: https:\/\/patents.google.com\/patent\/US8756340B2\/en"},{"key":"e_1_3_2_1_2_1","volume-title":"DNS-based ingress load balancing: An experimental evaluation. CoRR, abs\/1205.0820","author":"Kanuparthy P.","year":"2012","unstructured":"P. Kanuparthy , W. Matthews , and C. Dovrolis . DNS-based ingress load balancing: An experimental evaluation. CoRR, abs\/1205.0820 , 2012 . P. Kanuparthy, W. Matthews, and C. Dovrolis. DNS-based ingress load balancing: An experimental evaluation. CoRR, abs\/1205.0820, 2012."},{"key":"e_1_3_2_1_3_1","unstructured":"Pete Tenerillo \"Why DNS Based Global Server Load Balancing(GSLB) Doesn't Work\" Nov. 3 2004 XP002586093 URL: http:\/\/www.tenereillo.com\/GSLBPageOfShame.htm.  Pete Tenerillo \"Why DNS Based Global Server Load Balancing(GSLB) Doesn't Work\" Nov. 3 2004 XP002586093 URL: http:\/\/www.tenereillo.com\/GSLBPageOfShame.htm."},{"key":"e_1_3_2_1_4_1","unstructured":"RFC Research. [Online]. Available: https:\/\/www.rfc-editor.org\/search\/rfc_search_detail.php?title=DNS&pubstatus%5B%5D=Any&pub_date_type=any  RFC Research. [Online]. Available: https:\/\/www.rfc-editor.org\/search\/rfc_search_detail.php?title=DNS&pubstatus%5B%5D=Any&pub_date_type=any"},{"key":"e_1_3_2_1_5_1","volume-title":"DNS and BIND - help for system administrators: covers BIND 9.3 (5. ed.). O'Reilly","author":"Liu Cricket","year":"2006","unstructured":"Cricket Liu , Paul Albitz . DNS and BIND - help for system administrators: covers BIND 9.3 (5. ed.). O'Reilly 2006 , ISBN 978-0-596-10057-5, pp. I-XIX, 1--616. Cricket Liu, Paul Albitz. DNS and BIND - help for system administrators: covers BIND 9.3 (5. ed.). O'Reilly 2006, ISBN 978-0-596-10057-5, pp. I-XIX, 1--616."},{"key":"e_1_3_2_1_6_1","volume-title":"DNSSEC Operational Practices. RFC","author":"Kolkman O.","year":"2006","unstructured":"O. Kolkman and R. Gieben . DNSSEC Operational Practices. RFC 4641, Sept 2006 . O. Kolkman and R. Gieben. DNSSEC Operational Practices. RFC 4641, Sept 2006."},{"key":"e_1_3_2_1_7_1","unstructured":"DNSSEC Deployment Report. [Online]. http:\/\/rick.eng.br\/dnssecstat\/  DNSSEC Deployment Report. [Online]. http:\/\/rick.eng.br\/dnssecstat\/"},{"key":"e_1_3_2_1_8_1","unstructured":"[Online]. https:\/\/www.sohu.com\/a\/419756712_313745  [Online]. https:\/\/www.sohu.com\/a\/419756712_313745"},{"issue":"5","key":"e_1_3_2_1_9_1","first-page":"1","article-title":"Research on DNS security threats and countermeasures[J].","volume":"9","author":"Yuan P P","year":"2018","unstructured":"Yuan P P , Wang C Q . Research on DNS security threats and countermeasures[J]. Cyberspace Security , 2018 , 9 ( 5 ): 1 -. Yuan P P, Wang C Q. Research on DNS security threats and countermeasures[J].Cyberspace Security, 2018, 9(5): 1-.","journal-title":"Cyberspace Security"},{"key":"e_1_3_2_1_10_1","article-title":"A Declaration of Independence of ccTLDs from Foreign Control, 9 Rich","volume":"4","author":"Hagen Kim G, von Arx","year":"2002","unstructured":"Kim G, von Arx & Gregory R. Hagen , Sovereign Domains : A Declaration of Independence of ccTLDs from Foreign Control, 9 Rich . J.L. & Tech. 4 ( 2002 ) Kim G, von Arx & Gregory R. Hagen, Sovereign Domains: A Declaration of Independence of ccTLDs from Foreign Control, 9 Rich. J.L. & Tech. 4 (2002)","journal-title":"J.L. & Tech."},{"key":"e_1_3_2_1_11_1","unstructured":"IANA Report on the Redelegation of the .ly Top Level Domain. [Online]. Available:http:\/\/www.iana.org\/reports\/2005\/ly-report-05aug2005.pdf  IANA Report on the Redelegation of the .ly Top Level Domain. [Online]. Available:http:\/\/www.iana.org\/reports\/2005\/ly-report-05aug2005.pdf"},{"key":"e_1_3_2_1_12_1","unstructured":"[Online]. Available:https:\/\/zh.wikipedia.org\/wiki\/2014%E5%B9%B4%E4%B8%AD%E5%9B%BD%E5%A4%A7%E9%99%86%E7%BD%91%E7%BB%9C%E5%BC%82%E5%B8%B8%E4%BA%8B%E4%BB%B6  [Online]. Available:https:\/\/zh.wikipedia.org\/wiki\/2014%E5%B9%B4%E4%B8%AD%E5%9B%BD%E5%A4%A7%E9%99%86%E7%BD%91%E7%BB%9C%E5%BC%82%E5%B8%B8%E4%BA%8B%E4%BB%B6"},{"key":"e_1_3_2_1_13_1","volume-title":"March","author":"Kak Avi","year":"2013","unstructured":"Avi Kak , \" Lecture 17 : DNS and the DNS Cache Poisoning Attack,\" Purdue University , March 2013 . Avi Kak, \"Lecture 17: DNS and the DNS Cache Poisoning Attack,\" Purdue University, March 2013."},{"issue":"7","key":"e_1_3_2_1_14_1","first-page":"2205","article-title":"A review of DNS security protection technology research","volume":"31","author":"Wang W T","year":"2020","unstructured":"Wang W T , Hu N, Liu B, Liu X, Li S D . A review of DNS security protection technology research . Journal of Software , 2020 , 31 ( 7 ): 2205 -- 2220 . Wang W T, Hu N, Liu B, Liu X, Li S D. A review of DNS security protection technology research. Journal of Software, 2020, 31(7): 2205--2220.","journal-title":"Journal of Software"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/646334.687812"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/850928.851905"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030194.1015504"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2808229"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"X. Wang K. Li H. Li Y. Li and Z. Liang. 2017. ConsortiumDNS: A Distributed Domain Name Service Based on Consortium Chain. In 2017 IEEE 19th International Conference on High Performance Computing and Communications; IEEE 15th International Conference on Smart City; IEEE 3rd International Conference on Data Science and Systems (HPCC\/SmartCity\/DSS). 617--620.  X. Wang K. Li H. Li Y. Li and Z. Liang. 2017. ConsortiumDNS: A Distributed Domain Name Service Based on Consortium Chain. In 2017 IEEE 19th International Conference on High Performance Computing and Communications; IEEE 15th International Conference on Smart City; IEEE 3rd International Conference on Data Science and Systems (HPCC\/SmartCity\/DSS). 617--620.","DOI":"10.1109\/HPCC-SmartCity-DSS.2017.83"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE.2018.8326118"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/3026959.3026977"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.09.037"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/558412"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/1009382.1009757"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/647883.738262"},{"key":"e_1_3_2_1_26_1","volume-title":"The Case for Pushing DNS,\" in Proc. of Hotnets-IV","author":"Handley M.","year":"2005","unstructured":"M. Handley and A. Greenhalgh , \" The Case for Pushing DNS,\" in Proc. of Hotnets-IV , 2005 . M. Handley and A. Greenhalgh, \"The Case for Pushing DNS,\" in Proc. of Hotnets-IV, 2005."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/964723.383072"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/502059.502054"},{"key":"e_1_3_2_1_29_1","first-page":"001014","volume-title":"24th Can. Conf. Electr. Comput. Engineering(CCECE)","author":"Abu-Amara M.","year":"2011","unstructured":"M. Abu-Amara , F. Azzedin , F. A. Abdulhameed , A. Mahmoud , and M. H. Sqalli , \" Dynamic peer-to-peer (P2P) solution to counter malicious higher domain name system (DNS) nameservers,\" in Proc . 24th Can. Conf. Electr. Comput. Engineering(CCECE) , May 2011 , pp. 001014 -- 001018 . M. Abu-Amara, F. Azzedin, F. A. Abdulhameed, A. Mahmoud, and M. H. Sqalli, \"Dynamic peer-to-peer (P2P) solution to counter malicious higher domain name system (DNS) nameservers,\" in Proc. 24th Can. Conf. Electr. Comput. Engineering(CCECE), May 2011, pp. 001014--001018."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2002.808407"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251175.1251183"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAE.2011.5952823"},{"key":"e_1_3_2_1_33_1","volume-title":"Computer Cd Software & Applications","author":"Liu","year":"2012","unstructured":"Liu Y. Common Problems Analysis and Solutions on P2P Network Technology[J] . Computer Cd Software & Applications , 2012 . Liu Y. Common Problems Analysis and Solutions on P2P Network Technology[J]. Computer Cd Software & Applications, 2012."},{"issue":"4","key":"e_1_3_2_1_34_1","first-page":"481","article-title":"The state of the art and future trends[J]","volume":"42","author":"Yuan","year":"2016","unstructured":"Yuan Y, Wang F Y. Blockchain : The state of the art and future trends[J] . Acta Automatica Sinica , 2016 , 42 ( 4 ): 481 -- 494 (in Chinese). Yuan Y,Wang F Y. Blockchain:The state of the art and future trends[J]. Acta Automatica Sinica, 2016, 42(4):481--494(in Chinese).","journal-title":"Acta Automatica Sinica"},{"key":"e_1_3_2_1_35_1","unstructured":"Namecoin. [Online]. Available:https:\/\/namecoin.info.  Namecoin. [Online]. Available:https:\/\/namecoin.info."},{"key":"e_1_3_2_1_36_1","unstructured":"Ethereum Name Service \"Introduction: Ethereum Name Service \" ens.domains.[Online]. Available: https:\/\/docs.ens.domains.  Ethereum Name Service \"Introduction: Ethereum Name Service \" ens.domains.[Online]. Available: https:\/\/docs.ens.domains."},{"key":"e_1_3_2_1_37_1","volume-title":"WEIS","author":"Kroll J. A.","year":"2013","unstructured":"J. A. Kroll , I. C. Davey , and E. W. Felten . The economics of bitcoin mining, or bitcoin in the presence of adversaries . In WEIS 2013 . J. A. Kroll, I. C. Davey, and E. W. Felten. The economics of bitcoin mining, or bitcoin in the presence of adversaries. In WEIS 2013."},{"volume-title":"Unravelling ariadne's thread: Exploring the threats of decentralised dns,\" IEEE Access","author":"C. Patsakis","key":"e_1_3_2_1_38_1","unstructured":"C. Patsakis et al. \" Unravelling ariadne's thread: Exploring the threats of decentralised dns,\" IEEE Access , p. to appear, 2020. C. Patsakis et al. \"Unravelling ariadne's thread: Exploring the threats of decentralised dns,\" IEEE Access, p. to appear, 2020."},{"key":"e_1_3_2_1_39_1","unstructured":"EMCDNS. [Online]. Available: https:\/\/emercoin.com\/.  EMCDNS. [Online]. Available: https:\/\/emercoin.com\/."},{"key":"e_1_3_2_1_40_1","unstructured":"PeerName. [Online].Available:https:\/\/peername.com\/.  PeerName. [Online].Available:https:\/\/peername.com\/."},{"key":"e_1_3_2_1_41_1","article-title":"Proof of stake with casper the friendly finality gadget protocol for fair validation consensus in ethereum","author":"Jain A.","unstructured":"A. Jain , \" Proof of stake with casper the friendly finality gadget protocol for fair validation consensus in ethereum ,\" Int. J. Sci. Res. Comput. Sci., Eng. Inf. Technol., to be published. A. Jain, \"Proof of stake with casper the friendly finality gadget protocol for fair validation consensus in ethereum,\" Int. J. Sci. Res. Comput. Sci., Eng. Inf. Technol., to be published.","journal-title":"Int. J. Sci. Res. Comput. Sci., Eng. Inf. Technol., to be published."},{"key":"e_1_3_2_1_42_1","first-page":"75","volume-title":"Milan","author":"Jin T.","year":"2017","unstructured":"T. Jin , X. Zhang , Y. Liu , and K. Lei , \" BlockDND: A bitcoin blockchain decentralized system over named data networking,\" in 2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN) , Milan , Italy , Jul. 2017 , pp. 75 -- 80 . T. Jin, X. Zhang, Y. Liu, and K. Lei, \"BlockDND: A bitcoin blockchain decentralized system over named data networking,\" in 2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN), Milan, Italy, Jul. 2017, pp. 75--80."},{"key":"e_1_3_2_1_43_1","first-page":"189","volume-title":"DSC","author":"Liu J.","year":"2018","unstructured":"J. Liu , B. Li , L. Chen , M. Hou , F. Xiang , and P. Wang , \" A data storage method based on blockchain for decentralization DNS,\" in In proceeding of the Third IEEE International Conference on Data Science in Cyberspacem , DSC , 2018 , pp. 189 -- 196 . J. Liu, B. Li, L. Chen, M. Hou, F. Xiang, and P. Wang, \"A data storage method based on blockchain for decentralization DNS,\" in In proceeding of the Third IEEE International Conference on Data Science in Cyberspacem, DSC, 2018, pp. 189--196."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/BLOC.2019.8751464"},{"key":"e_1_3_2_1_45_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system. Tech report","author":"Nakamoto Satoshi","year":"2009","unstructured":"Satoshi Nakamoto . Bitcoin: A peer-to-peer electronic cash system. Tech report , 2009 . https:\/\/bitcoin.org\/bitcoin.pdf. Satoshi Nakamoto. Bitcoin: A peer-to-peer electronic cash system. Tech report, 2009. https:\/\/bitcoin.org\/bitcoin.pdf."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.14"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3212998"},{"key":"e_1_3_2_1_48_1","unstructured":"Simplified name verification protocol. http:\/\/blockstack.org\/docs\/light-clients  Simplified name verification protocol. http:\/\/blockstack.org\/docs\/light-clients"},{"issue":"4","key":"e_1_3_2_1_49_1","article-title":"An autonomous open root resolution architecture for domain name system in the internet[J]","volume":"2","author":"ZHANG Y, XIA C D, FANG B X","year":"2017","unstructured":"ZHANG Y, XIA C D, FANG B X , et al. An autonomous open root resolution architecture for domain name system in the internet[J] . Journal of Cyber Security , 2017 , 2 ( 4 )(in Chinese). ZHANG Y, XIA C D, FANG B X, et al. An autonomous open root resolution architecture for domain name system in the internet[J]. Journal of Cyber Security, 2017, 2 (4)(in Chinese).","journal-title":"Journal of Cyber Security"},{"issue":"12","key":"e_1_3_2_1_50_1","first-page":"35","article-title":"Discussion on Autonomous Root Domain Name System Based on National Union from \"Network Sovereignty","volume":"2014","author":"Binxing Fang","unstructured":"Fang Binxing . Discussion on Autonomous Root Domain Name System Based on National Union from \"Network Sovereignty \". Information Security and Communications Privacy , 2014 ( 12 ): 35 -- 38 (in Chinese with English abstract). Fang Binxing. Discussion on Autonomous Root Domain Name System Based on National Union from \"Network Sovereignty\". Information Security and Communications Privacy, 2014(12):35--38 (in Chinese with English abstract).","journal-title":"Information Security and Communications Privacy"},{"key":"e_1_3_2_1_51_1","volume-title":"May 3-5","author":"F.","year":"2013","unstructured":"Musiani, F. A Decentralized Domain Name System? User-Controlled Infrastructure as Alternative Internet Governance. Presented at the 8th Media In Transition (MiT8) conference , May 3-5 , 2013 , Massachusetts Institute of Technology, Cambridge , MA. 2013 Available as draft at http:\/\/web.mit.edu\/comm-forum\/mit8\/papers\/Musiani_DecentralizedDNS_MiT8Paper.pdf Musiani, F. A Decentralized Domain Name System? User-Controlled Infrastructure as Alternative Internet Governance. Presented at the 8th Media In Transition (MiT8) conference, May 3-5, 2013, Massachusetts Institute of Technology, Cambridge, MA. 2013 Available as draft at http:\/\/web.mit.edu\/comm-forum\/mit8\/papers\/Musiani_DecentralizedDNS_MiT8Paper.pdf"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOMSTD.2018.1800023"}],"event":{"name":"CIAT 2020: 2020 International Conference on Cyberspace Innovation of Advanced Technologies","sponsor":["Sun Yat-Sen University","CARLETON UNIVERSITY INSTITUTE FOR INTERDISCIPLINARY STUDIES","Beijing University of Posts and Telecommunications","Guangdong University of Technology Guangdong University of Technology","Deakin University"],"location":"Guangzhou China","acronym":"CIAT 2020"},"container-title":["Proceedings of the 2020 International Conference on Cyberspace Innovation of Advanced Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3444370.3444594","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3444370.3444594","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:47:44Z","timestamp":1750193264000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3444370.3444594"}},"subtitle":["Old Problems and New Challenges"],"short-title":[],"issued":{"date-parts":[[2020,12,4]]},"references-count":52,"alternative-id":["10.1145\/3444370.3444594","10.1145\/3444370"],"URL":"https:\/\/doi.org\/10.1145\/3444370.3444594","relation":{},"subject":[],"published":{"date-parts":[[2020,12,4]]},"assertion":[{"value":"2021-01-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}