{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T16:13:31Z","timestamp":1774541611850,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,7,10]],"date-time":"2023-07-10T00:00:00Z","timestamp":1688947200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Zhejiang Provincial Natural Science Foundation of China","award":["LZ23F020012"],"award-info":[{"award-number":["LZ23F020012"]}]},{"name":"National Key R&D Program of China","award":["2020YFB1005600"],"award-info":[{"award-number":["2020YFB1005600"]}]},{"name":"Beijing Natural Science Foundation","award":["M21031"],"award-info":[{"award-number":["M21031"]}]},{"name":"Natural Science Foundation of China","award":["U21A20467, 61932011, 61972019"],"award-info":[{"award-number":["U21A20467, 61932011, 61972019"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,7,10]]},"DOI":"10.1145\/3594556.3594610","type":"proceedings-article","created":{"date-parts":[[2023,9,12]],"date-time":"2023-09-12T21:34:46Z","timestamp":1694554486000},"page":"53-63","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["DCSS: A Smart Contract-based Data Continuous Storage Scheme"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0885-4022","authenticated-orcid":false,"given":"Kun","family":"Wang","sequence":"first","affiliation":[{"name":"Beihang University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6407-4194","authenticated-orcid":false,"given":"Qianhong","family":"Wu","sequence":"additional","affiliation":[{"name":"Beihang University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5732-2292","authenticated-orcid":false,"given":"Tianxu","family":"Han","sequence":"additional","affiliation":[{"name":"Beihang University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0951-8880","authenticated-orcid":false,"given":"Yujue","family":"Wang","sequence":"additional","affiliation":[{"name":"Hangzhou Innovation Institute, Beihang University, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-4487-0361","authenticated-orcid":false,"given":"Yingmiao","family":"Zhang","sequence":"additional","affiliation":[{"name":"Beijing Jiaotong University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9548-8306","authenticated-orcid":false,"given":"Bo","family":"Qin","sequence":"additional","affiliation":[{"name":"Renmin University of China, China"}]}],"member":"320","published-online":{"date-parts":[[2023,9,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660310"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315318"},{"key":"e_1_3_2_1_3_1","volume-title":"27th Annual Network and Distributed System Security Symposium. https:\/\/www.ndss-symposium.org\/ndss-paper\/proof-of-storage-time-efficiently-checking-continuous-data-availability\/","author":"Ateniese Giuseppe","unstructured":"Giuseppe Ateniese , Long Chen , Mohammad Etemad , and Qiang Tang . 2020. Proof of Storage-Time: Efficiently Checking Continuous Data Availability . In 27th Annual Network and Distributed System Security Symposium. https:\/\/www.ndss-symposium.org\/ndss-paper\/proof-of-storage-time-efficiently-checking-continuous-data-availability\/ Giuseppe Ateniese, Long Chen, Mohammad Etemad, and Qiang Tang. 2020. Proof of Storage-Time: Efficiently Checking Continuous Data Availability. In 27th Annual Network and Distributed System Security Symposium. https:\/\/www.ndss-symposium.org\/ndss-paper\/proof-of-storage-time-efficiently-checking-continuous-data-availability\/"},{"key":"e_1_3_2_1_4_1","volume-title":"Versioned, P2P File System. ArXiv abs\/1407.3561","author":"Benet Juan","year":"2014","unstructured":"Juan Benet . 2014. IPFS - Content Addressed , Versioned, P2P File System. ArXiv abs\/1407.3561 ( 2014 ). Juan Benet. 2014. IPFS - Content Addressed, Versioned, P2P File System. ArXiv abs\/1407.3561 (2014)."},{"key":"e_1_3_2_1_5_1","volume-title":"Annual international cryptology conference","author":"Boneh Dan","unstructured":"Dan Boneh , Joseph Bonneau , Benedikt B\u00fcnz , and Ben Fisch . 2018. Verifiable delay functions . In Annual international cryptology conference . Springer , 757\u2013788. Dan Boneh, Joseph Bonneau, Benedikt B\u00fcnz, and Ben Fisch. 2018. Verifiable delay functions. In Annual international cryptology conference. Springer, 757\u2013788."},{"key":"e_1_3_2_1_6_1","first-page":"712","article-title":"A Survey of Two Verifiable Delay Functions","volume":"2018","author":"Boneh Dan","year":"2018","unstructured":"Dan Boneh , Benedikt B\u00fcnz , and Ben Fisch . 2018 . A Survey of Two Verifiable Delay Functions . IACR Cryptol. ePrint Arch. 2018 (2018), 712 . Dan Boneh, Benedikt B\u00fcnz, and Ben Fisch. 2018. A Survey of Two Verifiable Delay Functions. IACR Cryptol. ePrint Arch. 2018 (2018), 712.","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653686"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655015"},{"key":"e_1_3_2_1_9_1","unstructured":"Reinsel David Gantz John and Rydning John. 2018. The Digitization of the World From Edge to Core. https:\/\/www.seagate.com\/files\/www-content\/our-story\/trends\/files\/idc-seagate-dataage-whitepaper.pdf.  Reinsel David Gantz John and Rydning John. 2018. The Digitization of the World From Edge to Core. https:\/\/www.seagate.com\/files\/www-content\/our-story\/trends\/files\/idc-seagate-dataage-whitepaper.pdf."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-34578-5_10"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11203-9_21"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00457-5_8"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Morris\u00a0J Dworkin. 2015. SHA-3 standard: Permutation-based hash and extendable-output functions.  Morris\u00a0J Dworkin. 2015. SHA-3 standard: Permutation-based hash and extendable-output functions.","DOI":"10.6028\/NIST.FIPS.202"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17653-2_21"},{"key":"e_1_3_2_1_15_1","volume-title":"PERUN: Virtual payment channels over cryptographic currencies.IACR Cryptol. ePrint Arch. 2017","author":"Dziembowski Stefan","year":"2017","unstructured":"Stefan Dziembowski , Lisa Eckey , Sebastian Faust , and Daniel Malinowski . 2017 . PERUN: Virtual payment channels over cryptographic currencies.IACR Cryptol. ePrint Arch. 2017 (2017), 635. Stefan Dziembowski, Lisa Eckey, Sebastian Faust, and Daniel Malinowski. 2017. PERUN: Virtual payment channels over cryptographic currencies.IACR Cryptol. ePrint Arch. 2017 (2017), 635."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00020"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243856"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2022.3190487"},{"key":"e_1_3_2_1_19_1","unstructured":"Charles Goldberg. 2020. A Graceful Solution for Preventing Amazon S3 Data Leaks. https:\/\/www.linkedin.com\/pulse\/graceful-solution-preventing-amazon-s3-data-leaks-charles-goldberg\/.  Charles Goldberg. 2020. A Graceful Solution for Preventing Amazon S3 Data Leaks. https:\/\/www.linkedin.com\/pulse\/graceful-solution-preventing-amazon-s3-data-leaks-charles-goldberg\/."},{"key":"e_1_3_2_1_20_1","volume-title":"iCloud. Retrieved","author":"Apple Inc.","year":"2023","unstructured":"Apple Inc. 2023. iCloud. Retrieved February 1, 2023 from https:\/\/www.apple.com.cn\/icloud\/ Apple Inc.2023. iCloud. Retrieved February 1, 2023 from https:\/\/www.apple.com.cn\/icloud\/"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315317"},{"key":"e_1_3_2_1_22_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system. https:\/\/bitcoin.org\/bitcoin.pdf.","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto . 2008 . Bitcoin: A peer-to-peer electronic cash system. https:\/\/bitcoin.org\/bitcoin.pdf. Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. https:\/\/bitcoin.org\/bitcoin.pdf."},{"key":"e_1_3_2_1_23_1","unstructured":"Raiden Network. 2019. Raiden Network 3.0.1 Documentation. https:\/\/raiden-network.readthedocs.io\/en\/stable\/.  Raiden Network. 2019. Raiden Network 3.0.1 Documentation. https:\/\/raiden-network.readthedocs.io\/en\/stable\/."},{"key":"e_1_3_2_1_24_1","unstructured":"Nir Ohfeld and Sagi Tzadik. 2021. ChaosDB: How we hacked thousands of Azure customers\u2019 databases. https:\/\/www.wiz.io\/blog\/chaosdb-how-we-hacked-thousands-of-azure-customers-databases.  Nir Ohfeld and Sagi Tzadik. 2021. ChaosDB: How we hacked thousands of Azure customers\u2019 databases. https:\/\/www.wiz.io\/blog\/chaosdb-how-we-hacked-thousands-of-azure-customers-databases."},{"key":"e_1_3_2_1_25_1","volume-title":"10th innovations in theoretical computer science conference (itcs","author":"Pietrzak Krzysztof","year":"2019","unstructured":"Krzysztof Pietrzak . 2018. Simple verifiable delay functions . In 10th innovations in theoretical computer science conference (itcs 2019 ). Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik . Krzysztof Pietrzak. 2018. Simple verifiable delay functions. In 10th innovations in theoretical computer science conference (itcs 2019). Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik."},{"key":"e_1_3_2_1_26_1","unstructured":"Joseph Poon and Thaddeus Dryja. 2016. The bitcoin lightning network: Scalable off-chain instant payments. https:\/\/www.bitcoinlightning.com\/wp-content\/uploads\/2018\/03\/lightning-network-paper.pdf.  Joseph Poon and Thaddeus Dryja. 2016. The bitcoin lightning network: Scalable off-chain instant payments. https:\/\/www.bitcoinlightning.com\/wp-content\/uploads\/2018\/03\/lightning-network-paper.pdf."},{"key":"e_1_3_2_1_27_1","volume-title":"Filecoin: A Decentralized Storage Network. https:\/\/filecoin.io\/filecoin.pdf.","author":"Labs Protocol","year":"2017","unstructured":"Protocol Labs . 2017 . Filecoin: A Decentralized Storage Network. https:\/\/filecoin.io\/filecoin.pdf. Protocol Labs. 2017. Filecoin: A Decentralized Storage Network. https:\/\/filecoin.io\/filecoin.pdf."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-012-9129-2"},{"key":"e_1_3_2_1_29_1","volume-title":"APPLE STATEMENT ON CELEBRITY HACKING: Our Systems Weren\u2019t Breached. Retrieved","author":"Shontell Alyson","year":"2014","unstructured":"Alyson Shontell . 2014 . APPLE STATEMENT ON CELEBRITY HACKING: Our Systems Weren\u2019t Breached. Retrieved February 1, 2023 from https:\/\/www.businessinsider.com\/apple-statement-on-celebrity-hacking-2014-9 Alyson Shontell. 2014. APPLE STATEMENT ON CELEBRITY HACKING: Our Systems Weren\u2019t Breached. Retrieved February 1, 2023 from https:\/\/www.businessinsider.com\/apple-statement-on-celebrity-hacking-2014-9"},{"key":"e_1_3_2_1_30_1","unstructured":"Jeremy Spilman. 2013. Anti DoS for tx replacement. https:\/\/lists.linuxfoundation.org\/pipermail\/bitcoin-dev\/2013-April\/002433.html.  Jeremy Spilman. 2013. Anti DoS for tx replacement. https:\/\/lists.linuxfoundation.org\/pipermail\/bitcoin-dev\/2013-April\/002433.html."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2017.155"},{"key":"e_1_3_2_1_32_1","volume-title":"Sia: Simple decentralized storage. Retrieved May 8","author":"Vorick David","year":"2014","unstructured":"David Vorick and Luke Champine . 2014 . Sia: Simple decentralized storage. Retrieved May 8 (2014), 2018. David Vorick and Luke Champine. 2014. Sia: Simple decentralized storage. Retrieved May 8 (2014), 2018."},{"key":"e_1_3_2_1_33_1","volume-title":"Identity-based data outsourcing with comprehensive auditing in clouds","author":"Wang Yujue","year":"2016","unstructured":"Yujue Wang , Qianhong Wu , Bo Qin , Wenchang Shi , Robert\u00a0 H Deng , and Jiankun Hu. 2016. Identity-based data outsourcing with comprehensive auditing in clouds . IEEE transactions on information forensics and security 12, 4 ( 2016 ), 940\u2013952. Yujue Wang, Qianhong Wu, Bo Qin, Wenchang Shi, Robert\u00a0H Deng, and Jiankun Hu. 2016. Identity-based data outsourcing with comprehensive auditing in clouds. IEEE transactions on information forensics and security 12, 4 (2016), 940\u2013952."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11203-9_19"},{"key":"e_1_3_2_1_35_1","unstructured":"Dai Wei. 2023. Crypto++ Library 8.7. https:\/\/www.cryptopp.com\/.  Dai Wei. 2023. Crypto++ Library 8.7. https:\/\/www.cryptopp.com\/."},{"key":"e_1_3_2_1_36_1","unstructured":"Vogels Werner. 2021. Diving Deep on S3 Consistency.https:\/\/www.allthingsdistributed.com\/2021\/04\/s3-strong-consistency.html.  Vogels Werner. 2021. Diving Deep on S3 Consistency.https:\/\/www.allthingsdistributed.com\/2021\/04\/s3-strong-consistency.html."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17659-4_13"},{"key":"e_1_3_2_1_38_1","unstructured":"Shawn Wilkinson Tome Boshevski Josh Brandoff and Vitalik Buterin. 2014. Storj A Peer-to-Peer Cloud Storage Network. https:\/\/www.storj.io\/storj2014.pdf.  Shawn Wilkinson Tome Boshevski Josh Brandoff and Vitalik Buterin. 2014. Storj A Peer-to-Peer Cloud Storage Network. https:\/\/www.storj.io\/storj2014.pdf."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3233780"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2022.3213353"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/WI.2018.000-8"}],"event":{"name":"ASIA CCS '23: ACM Asia Conference on Computer and Communications Security","location":"Melbourne VIC Australia","acronym":"ASIA CCS '23","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3594556.3594610","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3594556.3594610","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:09:07Z","timestamp":1750183747000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3594556.3594610"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,10]]},"references-count":41,"alternative-id":["10.1145\/3594556.3594610","10.1145\/3594556"],"URL":"https:\/\/doi.org\/10.1145\/3594556.3594610","relation":{},"subject":[],"published":{"date-parts":[[2023,7,10]]},"assertion":[{"value":"2023-09-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}