{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T05:45:56Z","timestamp":1772516756050,"version":"3.50.1"},"reference-count":103,"publisher":"Association for Computing Machinery (ACM)","issue":"7","license":[{"start":{"date-parts":[[2024,4,9]],"date-time":"2024-04-09T00:00:00Z","timestamp":1712620800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2024,7,31]]},"abstract":"<jats:p>Blockchain offers immutability, transparency, and security in a decentralised way for many applications, including finance, supply chain, and the Internet of Things (IoT). Due to its popularity and widespread adoption, it has started to process an enormous number of transactions, placing an ever-growing demand for storage. As the technology gains more popularity, the storage requirements of blockchain will increase, necessitating storage optimisation solutions. Proposed solutions for blockchain storage efficiency range from reducing the degree of data replication to redacting or compressing data. Each of these storage optimisation categories involves a complex interplay with the timing of blockchain data processing and mining, yet no existing survey analyses these dimensions. This article surveys the state-of-the-art blockchain storage optimisations and categorises them into replication-based, redaction-based, and content-based optimisations. Replication-based optimisations focus on reducing duplication of blockchain data shared among participants after committing data on the blockchain ledger. Redaction-based optimisations allow users to modify or delete data already committed on the ledger in various ways, while content-based optimisations compress data before or after committing it to the ledger. We analyse and evaluate these solutions in the aspects of security, decentralisation, and scalability. We present the advantages and disadvantages of the existing blockchain storage optimisations and comprehensively compare them. Additionally, we discuss the opportunities and challenges for future work to optimise blockchain storage.<\/jats:p>","DOI":"10.1145\/3645104","type":"journal-article","created":{"date-parts":[[2024,2,8]],"date-time":"2024-02-08T12:08:10Z","timestamp":1707394090000},"page":"1-27","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":68,"title":["Blockchain Data Storage Optimisations: A Comprehensive Survey"],"prefix":"10.1145","volume":"56","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0060-5184","authenticated-orcid":false,"given":"Jun Wook","family":"Heo","sequence":"first","affiliation":[{"name":"Queensland University of Technology, Brisbane, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5944-1335","authenticated-orcid":false,"given":"Gowri Sankar","family":"Ramachandran","sequence":"additional","affiliation":[{"name":"Queensland University of Technology, Brisbane, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6789-6353","authenticated-orcid":false,"given":"Ali","family":"Dorri","sequence":"additional","affiliation":[{"name":"Queensland University of Technology, Brisbane, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7517-0782","authenticated-orcid":false,"given":"Raja","family":"Jurdak","sequence":"additional","affiliation":[{"name":"Queensland University of Technology, Brisbane, Australia"}]}],"member":"320","published-online":{"date-parts":[[2024,4,9]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC47524.2020.9031204"},{"key":"e_1_3_1_3_2","first-page":"111","volume-title":"IEEE European Symposium on Security and Privacy (EuroS&P\u201917)","author":"Ateniese Giuseppe","year":"2017","unstructured":"Giuseppe Ateniese, Bernardo Magri, Daniele Venturi, and Ewerton Andrade. 2017. Redactable blockchain\u2013or\u2013rewriting history in Bitcoin and friends. In IEEE European Symposium on Security and Privacy (EuroS&P\u201917). IEEE, 111\u2013126."},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/BCCA55292.2022.9922019"},{"key":"e_1_3_1_5_2","first-page":"1","volume-title":"IEEE\/ACIS 16th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing (SNPD\u201915)","author":"Beikverdi Alireza","year":"2015","unstructured":"Alireza Beikverdi and JooSeok Song. 2015. Trend of centralization in Bitcoin\u2019s distributed network. In IEEE\/ACIS 16th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing (SNPD\u201915). IEEE, 1\u20136."},{"key":"e_1_3_1_6_2","first-page":"781","volume-title":"23rd USENIX Security Symposium (USENIX Security\u201914)","author":"Ben-Sasson Eli","year":"2014","unstructured":"Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, and Madars Virza. 2014. Succinct Non-interactive zero knowledge for a Von Neumann architecture. In 23rd USENIX Security Symposium (USENIX Security\u201914). 781\u2013796."},{"key":"e_1_3_1_7_2","unstructured":"Juan Benet. 2014. IPFS - Content Addressed Versioned P2P File System. arxiv:1407.3561 [cs.NI]."},{"key":"e_1_3_1_8_2","volume-title":"Filecoin: A Decentralized Storage Network","author":"Benet J.","year":"2017","unstructured":"J. Benet and N. Greco. 2017. Filecoin: A Decentralized Storage Network. Whitepaper. Protocol Labs. Retrieved from https:\/\/filecoin.io\/filecoin.pdf"},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102656"},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/SOSE.2019.00031"},{"key":"e_1_3_1_11_2","unstructured":"Blockchair. 2022. Blockchain explorer analytics and web services. Retrieved from https:\/\/blockchair.com\/bitcoin"},{"key":"e_1_3_1_12_2","first-page":"1","article-title":"Mina: Decentralized Cryptocurrency at Scale","author":"Bonneau Joseph","year":"2020","unstructured":"Joseph Bonneau, Izaak Meckler, Vanishree Rao, and Evan Shapiro. 2020. Mina: Decentralized Cryptocurrency at Scale. Whitepaper New York University O (1) Labs, New York, NY, 1\u201347.","journal-title":"New York University O (1) Labs, New York, NY"},{"key":"e_1_3_1_13_2","first-page":"152","volume-title":"IACR International Workshop on Public Key Cryptography","author":"Camenisch Jan","year":"2017","unstructured":"Jan Camenisch, David Derler, Stephan Krenn, Henrich C. P\u00f6hls, Kai Samelin, and Daniel Slamanig. 2017. Chameleon-hashes with ephemeral trapdoors. In IACR International Workshop on Public Key Cryptography. Springer, 152\u2013182."},{"key":"e_1_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-0059-2_6"},{"key":"e_1_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2020.05.001"},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.04.028"},{"key":"e_1_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.frl.2017.12.006"},{"key":"e_1_3_1_18_2","doi-asserted-by":"crossref","unstructured":"Kyle Croman Christian Decker Ittay Eyal Adem Efe Gencer Ari Juels Ahmed Kosba Andrew Miller Prateek Saxena Elaine Shi Emin G\u00fcn Sirer Dawn Song and Roger Wattenhofer. 2016. On scaling decentralized blockchains: (A Position Paper). In International Conference on Financial Cryptography and Data Security Springer 106\u2013125.","DOI":"10.1007\/978-3-662-53357-4_8"},{"key":"e_1_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2920987"},{"key":"e_1_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2019.00132"},{"key":"e_1_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3143147"},{"key":"e_1_3_1_22_2","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1007\/978-3-662-58820-8_6","volume-title":"International Workshops on Financial Cryptography and Data Security (FC\u201918)","author":"Delgado-Segura Sergi","year":"2019","unstructured":"Sergi Delgado-Segura, Cristina P\u00e9rez-Sola, Guillermo Navarro-Arribas, and Jordi Herrera-Joancomart\u00ed. 2019. Analysis of the Bitcoin UTXO set. In International Workshops on Financial Cryptography and Data Security (FC\u201918). Springer, 78\u201391."},{"key":"e_1_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.08.021"},{"key":"e_1_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.23919\/SpliTech49282.2020.9243728"},{"key":"e_1_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1145\/3054977.3055003"},{"key":"e_1_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.10.002"},{"key":"e_1_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2017.7917634"},{"key":"e_1_3_1_28_2","first-page":"367","volume-title":"IEEE European Symposium on Security and Privacy Workshops (EuroS&PW\u201919)","author":"Florian Martin","year":"2019","unstructured":"Martin Florian, Sebastian Henningsen, Sophie Beaucamp, and Bj\u00f6rn Scheuermann. 2019. Erasing data from blockchain nodes. In IEEE European Symposium on Security and Privacy Workshops (EuroS&PW\u201919). IEEE, 367\u2013376."},{"key":"e_1_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2018.8619082"},{"key":"e_1_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3119639"},{"key":"e_1_3_1_31_2","doi-asserted-by":"publisher","unstructured":"Karan Singh Garewal. 2020. Cryptocurrency Transaction Processing. Apress Berkeley CA 113\u2013136. 10.1007\/978-1-4842-5893-4_9","DOI":"10.1007\/978-1-4842-5893-4_9"},{"key":"e_1_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.3390\/math8010131"},{"key":"e_1_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSENG.2018.8638208"},{"issue":"8","key":"e_1_3_1_34_2","article-title":"Thai perception on Litecoin value","volume":"8","author":"Gibbs Toby","year":"2014","unstructured":"Toby Gibbs and Suwaree Yordchim. 2014. Thai perception on Litecoin value. Int. J. Soc., Behav., Educ., Econ., Busin. Industr. Eng. 8, 8 (2014), 2613\u20135.","journal-title":"Int. J. Soc., Behav., Educ., Econ., Busin. Industr. Eng."},{"key":"e_1_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.1080\/23799927.2020.1842808"},{"key":"e_1_3_1_36_2","first-page":"106","volume-title":"7th International Workshop on Enterprise Applications and Services in the Finance Industry (FinanceCom\u201914)","author":"Haferkorn Martin","year":"2015","unstructured":"Martin Haferkorn and Josu\u00e9 Manuel Quintana Diaz. 2015. Seasonality and interconnectivity within cryptocurrencies\u2014An analysis on the basis of Bitcoin, Litecoin and Namecoin. In 7th International Workshop on Enterprise Applications and Services in the Finance Industry (FinanceCom\u201914). Springer, 106\u2013120."},{"key":"e_1_3_1_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3007251"},{"key":"e_1_3_1_38_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3069877"},{"key":"e_1_3_1_39_2","first-page":"430","volume-title":"International Conference on Future Information Technology and Management Engineering","volume":"1","author":"He Qinlu","year":"2010","unstructured":"Qinlu He, Zhanhuai Li, and Xiao Zhang. 2010. Data deduplication techniques. In International Conference on Future Information Technology and Management Engineering, Vol. 1. IEEE, 430\u2013433."},{"key":"e_1_3_1_40_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICBC54727.2022.9805518"},{"key":"e_1_3_1_41_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3224735"},{"key":"e_1_3_1_42_2","doi-asserted-by":"publisher","DOI":"10.1145\/3441692"},{"key":"e_1_3_1_43_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.07.016"},{"key":"e_1_3_1_44_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMPTELIX.2017.8003959"},{"key":"e_1_3_1_45_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICIIP47207.2019.8985677"},{"key":"e_1_3_1_46_2","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC-SmartCity-DSS.2017.61"},{"key":"e_1_3_1_47_2","doi-asserted-by":"publisher","DOI":"10.1109\/EIECS53707.2021.9588047"},{"key":"e_1_3_1_48_2","doi-asserted-by":"publisher","DOI":"10.1038\/s41597-022-01254-0"},{"key":"e_1_3_1_49_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3068753"},{"key":"e_1_3_1_50_2","doi-asserted-by":"publisher","DOI":"10.1109\/GreenCom-iThings-CPSCom.2013.199"},{"key":"e_1_3_1_51_2","first-page":"1","volume-title":"IEEE 17th International Symposium on Network Computing and Applications (NCA\u201918)","author":"Malik Sidra","year":"2018","unstructured":"Sidra Malik, Salil S. Kanhere, and Raja Jurdak. 2018. ProductChain: Scalable blockchain framework to support provenance in supply chains. In IEEE 17th International Symposium on Network Computing and Applications (NCA\u201918). IEEE, 1\u201310."},{"key":"e_1_3_1_52_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICoAC.2014.7229702"},{"key":"e_1_3_1_53_2","doi-asserted-by":"publisher","DOI":"10.1109\/IC2E.2018.00070"},{"key":"e_1_3_1_54_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-58387-6_23"},{"key":"e_1_3_1_55_2","first-page":"298","volume-title":"IFIP Networking Conference (Networking\u201920)","author":"Matzutt Roman","year":"2020","unstructured":"Roman Matzutt, Benedikt Kalde, Jan Pennekamp, Arthur Drichel, Martin Henze, and Klaus Wehrle. 2020. How to securely prune Bitcoin\u2019s blockchain. In IFIP Networking Conference (Networking\u201920). IEEE, 298\u2013306."},{"key":"e_1_3_1_56_2","doi-asserted-by":"publisher","DOI":"10.1109\/SMC.2017.8123011"},{"key":"e_1_3_1_57_2","article-title":"Bitcoin: A peer-to-peer electronic cash system","author":"Nakamoto Satoshi","year":"2009","unstructured":"Satoshi Nakamoto. 2009. Bitcoin: A peer-to-peer electronic cash system. Retrieved from https:\/\/bitcoin.org\/en\/bitcoin-paper","journal-title":"R"},{"key":"e_1_3_1_58_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2021.07.035"},{"key":"e_1_3_1_59_2","first-page":"157","volume-title":"International Conference on Information Processing in Sensor Networks","author":"Nath Suman","year":"2009","unstructured":"Suman Nath. 2009. Energy efficient sensor data logging with amnesic flash storage. In International Conference on Information Processing in Sensor Networks. IEEE, 157\u2013168."},{"key":"e_1_3_1_60_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102940"},{"key":"e_1_3_1_61_2","article-title":"On-chain IoT data modification in blockchains","author":"Niya Sina Rafati","year":"2021","unstructured":"Sina Rafati Niya, Julius Willems, and Burkhard Stiller. 2021. On-chain IoT data modification in blockchains. arXiv preprint arXiv:2103.10756 (2021).","journal-title":"arXiv preprint arXiv:2103.10756"},{"key":"e_1_3_1_62_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSESS.2018.8663851"},{"key":"e_1_3_1_63_2","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1007\/978-3-319-70278-0_12","volume-title":"International Workshops on Financial Cryptography and Data Security (FC\u201917)","author":"O\u2019Connor Russell","year":"2017","unstructured":"Russell O\u2019Connor and Marta Piekarska. 2017. Enhancing Bitcoin transactions with covenants. In International Workshops on Financial Cryptography and Data Security (FC\u201917). Springer, 191\u2013198."},{"key":"e_1_3_1_64_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-018-1044-9"},{"key":"e_1_3_1_65_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICOSST.2018.8632193"},{"key":"e_1_3_1_66_2","unstructured":"Andrew Poelstra. 2016. Mimblewimble. White paper (2016). https:\/\/download.wpsoftware.net\/bitcoin\/wizardry\/mimblewimble.pdf"},{"key":"e_1_3_1_67_2","article-title":"Blockchain mutability: Challenges and proposed solutions","author":"Politou Eugenia","year":"2019","unstructured":"Eugenia Politou, Fran Casino, Efthymios Alepis, and Constantinos Patsakis. 2019. Blockchain mutability: Challenges and proposed solutions. IEEE Trans. Emerg. Topics Comput. 9, 4 (2019), 1972\u20131986.","journal-title":"IEEE Trans. Emerg. Topics Comput."},{"key":"e_1_3_1_68_2","article-title":"\\(\\mu\\) chain: How to forget without hard forks","author":"Puddu Ivan","year":"2017","unstructured":"Ivan Puddu, Alexandra Dmitrienko, and Srdjan Capkun. 2017. \\(\\mu\\) chain: How to forget without hard forks. IACR Cryptology ePrint Archive 2017\/106 (2017).","journal-title":"IACR Cryptology ePrint Archive 2017\/106"},{"key":"e_1_3_1_69_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2959599"},{"key":"e_1_3_1_70_2","doi-asserted-by":"publisher","DOI":"10.1109\/BLOC.2019.8751291"},{"key":"e_1_3_1_71_2","article-title":"Blockchain for the IoT: Opportunities and challenges","author":"Ramachandran Gowri Sankar","year":"2018","unstructured":"Gowri Sankar Ramachandran and Bhaskar Krishnamachari. 2018. Blockchain for the IoT: Opportunities and challenges. arXiv preprint arXiv:1805.02818 (2018).","journal-title":"arXiv preprint arXiv:1805.02818"},{"key":"e_1_3_1_72_2","article-title":"Blockchain in supply chain: Opportunities and design considerations","author":"Ramachandran Gowri Sankar","year":"2021","unstructured":"Gowri Sankar Ramachandran, Sidra Malik, Shantanu Pal, Ali Dorri, Volkan Dedeoglu, Salil Kanhere, and Raja Jurdak. 2021. Blockchain in supply chain: Opportunities and design considerations. arXiv preprint arXiv:2108.12032 (2021).","journal-title":"arXiv preprint arXiv:2108.12032"},{"key":"e_1_3_1_73_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISC2.2018.8656952"},{"key":"e_1_3_1_74_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICACITE51222.2021.9404625"},{"issue":"3","key":"e_1_3_1_75_2","article-title":"The CIA strikes back: Redefining confidentiality, integrity and availability in security.","volume":"10","author":"Samonas Spyridon","year":"2014","unstructured":"Spyridon Samonas and David Coss. 2014. The CIA strikes back: Redefining confidentiality, integrity and availability in security. J. Inf. Syst. Secur. 10, 3 (2014).","journal-title":"J. Inf. Syst. Secur."},{"key":"e_1_3_1_76_2","doi-asserted-by":"publisher","DOI":"10.1093\/ijlit\/eaz009"},{"issue":"1","key":"e_1_3_1_77_2","article-title":"Blockchain and privacy protection in the case of the European general data protection regulation (GDPR): A delphi study","volume":"1","author":"Schwerin Simon","year":"2018","unstructured":"Simon Schwerin. 2018. Blockchain and privacy protection in the case of the European general data protection regulation (GDPR): A delphi study. J. Brit. Blockchain Assoc. 1, 1 (2018).","journal-title":"J. Brit. Blockchain Assoc."},{"key":"e_1_3_1_78_2","doi-asserted-by":"publisher","DOI":"10.1145\/3403954"},{"key":"e_1_3_1_79_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.05.047"},{"key":"e_1_3_1_80_2","doi-asserted-by":"publisher","DOI":"10.1109\/CCAA.2015.7148470"},{"key":"e_1_3_1_81_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2020.105454"},{"key":"e_1_3_1_82_2","doi-asserted-by":"crossref","first-page":"206","DOI":"10.1007\/978-3-319-75650-9_14","volume-title":"10th International Symposium on Foundations and Practice of Security (FPS\u201917)","author":"Tikhomirov Sergei","year":"2018","unstructured":"Sergei Tikhomirov. 2018. Ethereum: State of knowledge and research perspectives. In 10th International Symposium on Foundations and Practice of Security (FPS\u201917). Springer, 206\u2013221."},{"key":"e_1_3_1_83_2","article-title":"Swap, Swear, and Swindle: Incentive System for Swarm","author":"Tr\u00f3n Viktor","year":"2016","unstructured":"Viktor Tr\u00f3n, Aron Fischer, D\u00e1niel A. Nagy, Zsolt Felf\u00f6ldi, and Nick Johnson. 2016. Swap, Swear, and Swindle: Incentive System for Swarm. Technical Report, Ethersphere Orange Papers 1 (2016).","journal-title":"Technical Report, Ethersphere Orange Papers 1"},{"key":"e_1_3_1_84_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2535718"},{"key":"e_1_3_1_85_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-5953-8_12"},{"key":"e_1_3_1_86_2","unstructured":"David Vorick and Luke Champine. 2014. Sia: Simple Decentralized Storage. Retrieved May 8 2014. https:\/\/sia.tech\/sia.pdf"},{"key":"e_1_3_1_87_2","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1007\/978-3-319-39028-4_9","volume-title":"International Workshop on Open Problems in Network Security (iNetSec\u201915)","author":"Vukoli\u0107 Marko","year":"2016","unstructured":"Marko Vukoli\u0107. 2016. The quest for scalable blockchain fabric: Proof-of-work vs. BFT replication. In International Workshop on Open Problems in Network Security (iNetSec\u201915). Springer, 112\u2013125."},{"key":"e_1_3_1_88_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3127187"},{"key":"e_1_3_1_89_2","unstructured":"Shawn Wilkinson Tome Boshevski Josh Brandoff and Vitalik Buterin. 2014. Storj a peer-to-peer cloud storage network. White Paper. https:\/\/www.storj.io\/storj2014.pdf"},{"key":"e_1_3_1_90_2","unstructured":"Gavin Wood. 2014. Ethereum: A secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper 151 2014 (2014) 1\u201332."},{"key":"e_1_3_1_91_2","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1800290"},{"key":"e_1_3_1_92_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISC246665.2019.9071766"},{"key":"e_1_3_1_93_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2018.00025"},{"key":"e_1_3_1_94_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2022.10.029"},{"key":"e_1_3_1_95_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2894727"},{"key":"e_1_3_1_96_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2022.3233448"},{"issue":"1","key":"e_1_3_1_97_2","first-page":"1","article-title":"A service-oriented blockchain system with virtualization","volume":"1","author":"Yu Fei Richard","year":"2019","unstructured":"Fei Richard Yu and Ying He. 2019. A service-oriented blockchain system with virtualization. Trans. Blockch. Technol. Applic. 1, 1 (2019), 1\u201310.","journal-title":"Trans. Blockch. Technol. Applic."},{"key":"e_1_3_1_98_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2829141"},{"key":"e_1_3_1_99_2","doi-asserted-by":"publisher","DOI":"10.1145\/3404512.3404522"},{"key":"e_1_3_1_100_2","doi-asserted-by":"publisher","DOI":"10.1002\/int.22502"},{"key":"e_1_3_1_101_2","first-page":"1184","volume-title":"Chinese Automation Congress (CAC\u201918)","author":"Zhang Xiaojing","year":"2018","unstructured":"Xiaojing Zhang, Rui Qin, Yong Yuan, and Fei-Yue Wang. 2018. An analysis of blockchain-based Bitcoin mining difficulty: Techniques and principles. In Chinese Automation Congress (CAC\u201918). IEEE, 1184\u20131189."},{"key":"e_1_3_1_102_2","doi-asserted-by":"publisher","DOI":"10.1109\/WI.2018.000-8"},{"key":"e_1_3_1_103_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2967218"},{"key":"e_1_3_1_104_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2016.142"}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3645104","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3645104","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:03:27Z","timestamp":1750291407000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3645104"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,9]]},"references-count":103,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2024,7,31]]}},"alternative-id":["10.1145\/3645104"],"URL":"https:\/\/doi.org\/10.1145\/3645104","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,4,9]]},"assertion":[{"value":"2022-09-07","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-01-31","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-04-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}