{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T10:28:28Z","timestamp":1771064908472,"version":"3.50.1"},"reference-count":84,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,9,28]]},"DOI":"10.23919\/mipro48935.2020.9245189","type":"proceedings-article","created":{"date-parts":[[2020,11,6]],"date-time":"2020-11-06T16:51:34Z","timestamp":1604681494000},"page":"1934-1940","source":"Crossref","is-referenced-by-count":4,"title":["The Relevance Of Blockchain With Dew Computing: A Review"],"prefix":"10.23919","author":[{"given":"Rexford Nii Ayitey","family":"Sosu","sequence":"first","affiliation":[]},{"given":"Chindanur Narendra","family":"Babu","sequence":"additional","affiliation":[]},{"given":"Samuel Akwasi","family":"Frimpong","sequence":"additional","affiliation":[]},{"given":"John","family":"Essuman","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/LT.2018.8368494"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1504\/IJWGS.2018.095647"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-23404-1_12"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOTS.2018.00034"},{"key":"ref76","article-title":"A Detail Review on Cloud, Fog and Dew Computing","author":"kukreja","year":"2016","journal-title":"Int J Sci Eng Technol Res"},{"key":"ref77","first-page":"34","article-title":"Dewblock: A Blockchain System Based on Dew Computing","volume":"3","author":"wang","year":"2018","journal-title":"Proc 3rd Int Work Dew Comput"},{"key":"ref74","first-page":"53","volume":"14","author":"ray","year":"2019","journal-title":"Dew Computing A New Era of Computing Implying Minimization Over Internetwork Backhaul"},{"key":"ref39","first-page":"653","article-title":"A Survey of Blockchain Security Issues and Challenges","volume":"1919","author":"gupta","year":"2017","journal-title":"Int J Netw Secur"},{"key":"ref75","article-title":"Scalable Distributed Computing Hierarchy: Cloud, Fog and Dew Computing","author":"skala","year":"2015","journal-title":"Open Journal of Cloud Computing"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2906637"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.12694\/scpe.v17i2.1157"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/BDCloud-SocialCom-SustainCom.2016.92"},{"key":"ref33","first-page":"1","article-title":"Improvement of the DPoS Consensus Mechanism in Blockchain Based on Vague Sets","volume":"pp","author":"xu","year":"2019","journal-title":"IEEE Trans Ind Informatics"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00040"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-67816-0_17"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/UEMCON.2017.8249088"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3286978.3287023"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3343147.3343160"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.3390\/jrfm12040177"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2935149"},{"key":"ref60","doi-asserted-by":"crossref","DOI":"10.1016\/j.jnca.2019.02.027","article-title":"Blockchain in healthcare applications: Research challenges and opportunities","author":"mcghin","year":"2019","journal-title":"Journal of Network and Computer Applications"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.23919\/ELINFOCOM.2019.8706434"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-3914-5_21"},{"key":"ref63","year":"2020","journal-title":"6 Trends Showing How Blockchain is Changing Social Media"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2925010"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/3022227.3022325"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3316481"},{"key":"ref65","year":"2020","journal-title":"Blockchain A New Solution for the Media and Entertainment Industry - By 8 Decimal Capital"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-48478-5"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3167020.3167058"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1016\/j.respol.2019.103865"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.06.018"},{"key":"ref69","article-title":"Eclipse attacks on Bitcoin&#x2019;s peer-to-peer network","author":"heilman","year":"2015","journal-title":"Proceedings of the 24th USENIX Security Symposium"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.31269\/triplec.v14i1.692"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICAIIC.2019.8669067"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/GIOTS.2017.8016213"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ISRITI.2018.8864381"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.10.021"},{"key":"ref24","article-title":"Securing Majority-Attack in Blockchain Using Machine Learning and Algorithmic Game Theory: A Proof of Work","author":"dey","year":"2019","journal-title":"2018 10th Computer Science and Electronic Engineering Conference CEEC 2018 - Proceedings"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978341"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3194113.3194116"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-51280-4_27"},{"key":"ref50","article-title":"Bitcoin: An Innovative Alternative Digital Currency","author":"grinberg","year":"2012","journal-title":"Hast Sci Technol Law J"},{"key":"ref51","year":"2019","journal-title":"Proceeding with caution - a survey on central bank digital currency"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/ICCMA.2019.00027"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.3390\/electronics8060679"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/bs.adcom.2018.03.006"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/s40258-018-0412-8"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/JAS.2017.7510736"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2690902"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2019.03.003"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-812282-2.00014-0"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0163477"},{"key":"ref11","article-title":"Use of Blockchain in Malicious Activity Detection for Improving Security","author":"rao","year":"2020","journal-title":"Int J Adv Sci Technol"},{"key":"ref40","year":"2020","journal-title":"What Different Types of Blockchains are There? | Dragonchain - Blockchain as a Service"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s40565-018-0418-0"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.5772\/intechopen.86530"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3390\/s20133621"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.23919\/TST.2017.8195353"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.12.006"},{"key":"ref16","article-title":"Definition and categorization of dew computing","author":"wang","year":"2016","journal-title":"Open Journal of Cloud Computing"},{"key":"ref81","first-page":"1","article-title":"A novel approach for securely processing information on dew sites (Dew computing) in collaboration with cloud computing: An approach toward latest research trends on Dew computing","author":"patel","year":"2018","journal-title":"2017 Nirma Univ Int Conf Eng NUiCONE 2017"},{"key":"ref17","author":"fisher","year":"2016","journal-title":"Doing More with the Dew A New Approach to Cloud-Dew Architecture"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2020.100184"},{"key":"ref18","first-page":"1","article-title":"Definition and Categorization of Dew Computing","volume":"3","author":"wang","year":"2016","journal-title":"Open Journal of Cloud Computing"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1504\/IJCC.2015.071717"},{"key":"ref19","author":"wang","year":"2018","journal-title":"What is Post-cloud Computing ?"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-5523-2_32"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.4324\/9780429319297-4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.22495\/jgr_v6_i1_p5"},{"key":"ref6","article-title":"In blockchain we trust - MIT Technology Review","author":"casey","year":"2018","journal-title":"MIT Technology Review"},{"key":"ref5","author":"w\u00fcst","year":"2018","journal-title":"Do you need a Blockchain?"},{"key":"ref8","article-title":"Ensuring data integrity using blockchain technology","author":"zikratov","year":"2017","journal-title":"14th Conference of Open Innovation Association FRUCT"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2015.27"},{"key":"ref49","article-title":"Ethereum State Transition Function","author":"buterin","year":"2018","journal-title":"Etherum"},{"key":"ref9","article-title":"Blockchain Technology Explained - Beyond Bitcoin","author":"crosby","year":"2015","journal-title":"Sutardja Cent Entrep Technol Tech Rep"},{"key":"ref46","article-title":"Performance analysis of ethereum transactions in private blockchain","author":"rouhani","year":"2018","journal-title":"Proceedings of the IEEE International Conference on Software Engineering and Service Sciences ICSESS"},{"key":"ref45","doi-asserted-by":"crossref","DOI":"10.1002\/isaf.1417","article-title":"Configuring blockchain architectures for transaction information in blockchain consortiums: The case of accounting and supply chain systems","author":"o\u2019leary","year":"2017","journal-title":"Intelligent Systems in Accounting Finance & Management"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-812282-2.00007-3"},{"key":"ref47","article-title":"Public versus Private Blockchains. Part 2: Permissionless Blockchains","author":"garzik","year":"2015","journal-title":"BitFury"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.55"},{"key":"ref41","year":"2020","journal-title":"Everything You Need to Know About Public Private and Consortium Blockchain"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2018.8500557"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2017.8038517"}],"event":{"name":"2020 43rd International Convention on Information, Communication and Electronic Technology (MIPRO)","location":"Opatija, Croatia","start":{"date-parts":[[2020,9,28]]},"end":{"date-parts":[[2020,10,2]]}},"container-title":["2020 43rd International Convention on Information, Communication and Electronic Technology (MIPRO)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9245088\/9245075\/09245189.pdf?arnumber=9245189","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,13]],"date-time":"2021-01-13T00:10:22Z","timestamp":1610496622000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9245189\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,28]]},"references-count":84,"URL":"https:\/\/doi.org\/10.23919\/mipro48935.2020.9245189","relation":{},"subject":[],"published":{"date-parts":[[2020,9,28]]}}}