{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:03:28Z","timestamp":1750309408277,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,10,27]],"date-time":"2023-10-27T00:00:00Z","timestamp":1698364800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,27]]},"DOI":"10.1145\/3650215.3650327","type":"proceedings-article","created":{"date-parts":[[2024,4,16]],"date-time":"2024-04-16T22:11:20Z","timestamp":1713305480000},"page":"633-638","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Research on Data storage Security based on Blockchain technology and distributed storage technology"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-4561-0745","authenticated-orcid":false,"given":"Shanqi","family":"Zheng","sequence":"first","affiliation":[{"name":"State Grid Liaoning Information and Communication Company, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-5099-3198","authenticated-orcid":false,"given":"Yushi","family":"Zhang","sequence":"additional","affiliation":[{"name":"State Grid Liaoning Electric Power Supply Co., Ltd., China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-2786-8937","authenticated-orcid":false,"given":"Xiaobo","family":"Huang","sequence":"additional","affiliation":[{"name":"State Grid Liaoning Electric Power Supply Co., Ltd., China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-8710-6939","authenticated-orcid":false,"given":"Wei","family":"Sun","sequence":"additional","affiliation":[{"name":"State Grid Liaoning Electric Power Supply Co., Ltd., China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-4189-8813","authenticated-orcid":false,"given":"Jingxin","family":"Zhang","sequence":"additional","affiliation":[{"name":"State Grid Liaoning Electric Power Supply Co., Ltd., China"}]}],"member":"320","published-online":{"date-parts":[[2024,4,16]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"106","volume":"5","author":"Dynamic Data Storage Security Cao Shiming","year":"2020","unstructured":"Cao Shiming Research on Dynamic Data Storage Security Mechanism Based on Blockchain Technology [J] Communication World, 2020, (5): 106-107.","journal-title":"Communication World"},{"key":"e_1_3_2_1_2_1","first-page":"205","volume":"3","author":"Shuang Han","year":"2018","unstructured":"Han Shuang, Pu Baoming, Li Shunxi, The Application of Blockchain Technology in Secure Transactions of Digital Assets [J] Computer System Applications, 2018, (3): 205-209.","journal-title":"Computer System Applications"},{"key":"e_1_3_2_1_3_1","volume-title":"Research on E-Government Big Data Security Sharing Based on Blockchain[J]. Journal of Information Security Research","author":"Yong","year":"2018","unstructured":"Yong J, Xu X, Gang W, Research on E-Government Big Data Security Sharing Based on Blockchain[J]. Journal of Information Security Research, 2018."},{"issue":"2","key":"e_1_3_2_1_4_1","first-page":"87","volume":"6","author":"Jin LI","year":"2020","unstructured":"LI Jin, WU Songxin, ZHANG Senlin, Trusted Storage Mechanism of Distributed Electric Energy Data Based on Blockchain [J]. Chinese Journal of Network and Information Security, 2020, 6(2): 87-95.","journal-title":"Chinese Journal of Network and Information Security"},{"key":"e_1_3_2_1_5_1","volume-title":"Blockchain-based Reliable Storage and Secure Sharing Algorithm Research [D]","author":"Yue FU","year":"2019","unstructured":"FU Yue. Blockchain-based Reliable Storage and Secure Sharing Algorithm Research [D]. Beijing: Peking University, 2019."},{"key":"e_1_3_2_1_6_1","volume-title":"Blockchain Technology Frontier Report","author":"China Institute of Communications.","year":"2020","unstructured":"China Institute of Communications. Blockchain Technology Frontier Report, 2020. [EB\/OL]. http:\/\/www.china-cic.cn\/detail\/22\/15\/2829, 2020-12-04."},{"issue":"12","key":"e_1_3_2_1_7_1","first-page":"46","volume":"36","author":"Jiying WU","year":"2019","unstructured":"WU Jiying, DU Cong, MA Zhiyuan, Blockchain Architecture Design for Food Traceability System [J]. Computer Applications and Software, 2019, 36(12): 46-50.","journal-title":"Computer Applications and Software"},{"issue":"1","key":"e_1_3_2_1_8_1","first-page":"296","volume":"36","author":"Jingyuan LI","year":"2019","unstructured":"LI Jingyuan, FAN Xianghui, WANG Ying. Design of Economy Privacy Protection Mechanism Based on Blockchain [J]. Computer Applications and Software, 2019, 36(1): 296-301.","journal-title":"Computer Applications and Software"},{"key":"e_1_3_2_1_9_1","volume-title":"Audita: A Blockchainbased Auditing Framework for Off-chain Storage [EB\/OL]. https:\/\/eprint.iacr.org\/2019\/1345.pdf","author":"FRANCATI D, ATENIESE","year":"2020","unstructured":"FRANCATI D, ATENIESE G, FAYE A, Audita: A Blockchainbased Auditing Framework for Off-chain Storage [EB\/OL]. https:\/\/eprint.iacr.org\/2019\/1345.pdf, 2020, 10, 08."},{"key":"e_1_3_2_1_10_1","volume-title":"IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA). May 16-18","author":"Blockstore RUJ S, RAHMAN M S, BASU A","year":"2018","unstructured":"RUJ S, RAHMAN M S, BASU A, Blockstore: A Secure Decentralized Storage Framework on Blockchain [C]\/\/ IEEE. 2018, IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA). May 16-18, Krakow, Poland. New Jersey: IEEE Computer Society, 2018: 1096\u20131103."},{"issue":"2","key":"e_1_3_2_1_11_1","first-page":"458","volume":"39","author":"Lin GE","year":"2019","unstructured":"GE Lin, JI Xinsheng, JIANG Tao. Security Mechanism for Internet of Things Information Sharing Based on Blockchain Technoloty [J]. Journal of Computer Applications, 2019, 39(2): 458-463.","journal-title":"Journal of Computer Applications"},{"issue":"17","key":"e_1_3_2_1_12_1","first-page":"41","volume":"55","author":"Yanli LIANG","year":"2020","unstructured":"LIANG Yanli, LING Jie. Encrypted Data Sharing Scheme in Cloud Storage Based on Blockchain[J]. Computer Engineering and Applications, 2020, 55(17): 41-47.","journal-title":"Computer Engineering and Applications"},{"issue":"4","key":"e_1_3_2_1_13_1","first-page":"742","volume":"54","author":"Jiye WANG","year":"2017","unstructured":"WANG Jiye, GAO Lingchao, DONG Aiqiang, Blockchain Based Data Security Sharing Network Architecture Research [J]. Journal of Computer Research and Development, 2017, 54(4): 742-749.","journal-title":"Journal of Computer Research and Development"},{"issue":"9","key":"e_1_3_2_1_14_1","first-page":"2620","volume":"30","author":"Haibo TAN","year":"2019","unstructured":"TAN Haibo, ZHOU Tong, ZHAO He, Archival Data Protection and Sharing Method Based on Blockchain [J]. Journal of Software, 2019, 30(9): 2620-2635.","journal-title":"Journal of Software"},{"key":"e_1_3_2_1_15_1","volume-title":"A Provable Data Possession Scheme with Data Hierarchy in Cloud[C]\/\/ Inscrypt","author":"Changlu LIN","year":"2016","unstructured":"LIN Changlu, LUO Fucai, WANG Huaxiong, A Provable Data Possession Scheme with Data Hierarchy in Cloud[C]\/\/ Inscrypt, 2016.12th International Conference on Information Security and Cryptology, November 4-6, 2016, Beijing, China. Berlin: Springer, 2016: 301-321."}],"event":{"name":"ICMLCA 2023: 2023 4th International Conference on Machine Learning and Computer Application","acronym":"ICMLCA 2023","location":"Hangzhou China"},"container-title":["2023 4th International Conference on Machine Learning and Computer Application"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3650215.3650327","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3650215.3650327","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:58:04Z","timestamp":1750294684000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3650215.3650327"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,27]]},"references-count":15,"alternative-id":["10.1145\/3650215.3650327","10.1145\/3650215"],"URL":"https:\/\/doi.org\/10.1145\/3650215.3650327","relation":{},"subject":[],"published":{"date-parts":[[2023,10,27]]},"assertion":[{"value":"2024-04-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}