{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:02:38Z","timestamp":1773615758126,"version":"3.50.1"},"reference-count":27,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.3103\/s0146411624701219","type":"journal-article","created":{"date-parts":[[2025,3,14]],"date-time":"2025-03-14T14:22:57Z","timestamp":1741962177000},"page":"1422-1428","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Development of a Method for Ensuring Data Integrity in Edge Computing Networks Based on Blockchain Technology"],"prefix":"10.3103","volume":"58","author":[{"given":"I. R.","family":"Fedorov","sequence":"first","affiliation":[]},{"given":"A. A.","family":"Kovalev","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2025,3,14]]},"reference":[{"key":"7808_CR1","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1117\/12.672842","volume":"6274","author":"J.S. Smith","year":"2006","unstructured":"Smith, J.S., Dean, B.H., and Haghani, Sh., Distributed computing architecture for image-based wavefront sensing and 2D FFTs, Proc. SPIE, 2006, vol. 6274, pp. 178\u2013194. https:\/\/doi.org\/10.1117\/12.672842","journal-title":"Proc. SPIE"},{"key":"7808_CR2","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1145\/2831347.2831354","volume":"45","author":"P. Garcia-Lopez","year":"2015","unstructured":"Garcia-Lopez, P., Montresor, A., Epema, D., Datta, A., Higashino, T., Iamnitchi, A., Barcellos, M., Felber, P., and Riviere, E., Edge-centric computing: Vision and challenges, ACM SIGCOMM Comput. Commun. Rev., 2015, vol. 45, no. 5, pp. 37\u201342. https:\/\/doi.org\/10.1145\/2831347.2831354","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"7808_CR3","doi-asserted-by":"publisher","first-page":"637","DOI":"10.1109\/jiot.2016.2579198","volume":"3","author":"W. Shi","year":"2016","unstructured":"Shi, W., Cao, J., Zhang, Q., Li, Yo., and Xu, L., Edge computing: Vision and challenges, IEEE Internet Things J., 2016, vol. 3, no. 5, pp. 637\u2013646. https:\/\/doi.org\/10.1109\/jiot.2016.2579198","journal-title":"IEEE Internet Things J."},{"key":"7808_CR4","doi-asserted-by":"publisher","first-page":"3453","DOI":"10.1109\/comst.2018.2855563","volume":"20","author":"I. Stellios","year":"2018","unstructured":"Stellios, I., Kotzanikolaou, P., Psarakis, M., Alcaraz, C., and Lopez, J., A survey of IoT-enabled cyberattacks: Assessing attack paths to critical infrastructures and services, IEEE Commun. Surv. Tutorials, 2018, vol. 20, no.\u00a04, pp. 3453\u20133495. https:\/\/doi.org\/10.1109\/comst.2018.2855563","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"7808_CR5","doi-asserted-by":"publisher","first-page":"18209","DOI":"10.1109\/ACCESS.2018.2820162","volume":"6","author":"J. Zhang","year":"2018","unstructured":"Zhang, J., Chen, B., Zhao, Ya., Cheng, X., and Hu, F., Data security and privacy-preserving in edge computing paradigm: Survey and open issues, IEEE Access, 2018, vol. 6, pp. 18209\u201318237. https:\/\/doi.org\/10.1109\/ACCESS.2018.2820162","journal-title":"IEEE Access"},{"key":"7808_CR6","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1007\/s11280-011-0138-0","volume":"15","author":"K. Yang","year":"2012","unstructured":"Yang, K. and Jia, X., Data storage auditing service in cloud computing: Challenges, methods and opportunities, World Wide Web, 2012, vol. 15, no. 4, pp. 409\u2013428. https:\/\/doi.org\/10.1007\/s11280-011-0138-0","journal-title":"World Wide Web"},{"key":"7808_CR7","doi-asserted-by":"publisher","unstructured":"Wang, C., Wang, Q., Ren, K., and Lou, W., Privacy-preserving public auditing for data storage security in cloud computing, 2010 Proceedings IEEE INFOCOM, San Diego, CA, 2010, IEEE, 2010, pp. 1\u20139. https:\/\/doi.org\/10.1109\/infcom.2010.5462173","DOI":"10.1109\/infcom.2010.5462173"},{"key":"7808_CR8","doi-asserted-by":"publisher","first-page":"847","DOI":"10.1109\/tpds.2010.183","volume":"22","author":"Q. Wang","year":"2011","unstructured":"Wang, Q., Wang, C., Ren, K., Lou, W., and Li, J., Enabling public auditability and data dynamics for storage security in cloud computing, IEEE Trans. Parallel Distrib. Syst., 2011, vol. 22, no. 5, pp. 847\u2013859. https:\/\/doi.org\/10.1109\/tpds.2010.183","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"7808_CR9","doi-asserted-by":"publisher","first-page":"1717","DOI":"10.1109\/tpds.2012.278","volume":"24","author":"K. Yang","year":"2013","unstructured":"Yang, K. and Jia, X., An efficient and secure dynamic auditing protocol for data storage in cloud computing, IEEE Trans. Parallel Distrib. Syst., 2013, vol. 24, no. 9, pp. 1717\u20131726. https:\/\/doi.org\/10.1109\/tpds.2012.278","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"7808_CR10","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1016\/j.ins.2015.09.004","volume":"380","author":"M. Sookhak","year":"2017","unstructured":"Sookhak, M., Gani, A., Khan, M.Kh., and Buyya, R., Dynamic remote data auditing for securing big data storage in cloud computing, Inf. Sci. (N. Y.), 2017, vol. 380, pp. 101\u2013116. https:\/\/doi.org\/10.1016\/j.ins.2015.09.004","journal-title":"Inf. Sci. (N. Y.)"},{"key":"7808_CR11","doi-asserted-by":"publisher","first-page":"2572","DOI":"10.1109\/tifs.2016.2587242","volume":"11","author":"J. Li","year":"2016","unstructured":"Li, J., Zhang, L., Liu, J.K., Qian, H., and Dong, Zh., Privacy-preserving public auditing protocol for low-performance end devices in cloud, IEEE Trans. Inf. Forensics Secur., 2016, vol. 11, no. 11, pp. 2572\u20132583. https:\/\/doi.org\/10.1109\/tifs.2016.2587242","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"7808_CR12","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.jnca.2016.08.017","volume":"77","author":"Ch. Lin","year":"2017","unstructured":"Lin, Ch., Shen, Zh., Chen, Q., and Sheldon, F.T., A data integrity verification scheme in mobile cloud computing, J. Network Comput. Appl., 2017, vol. 77, pp. 146\u2013151. https:\/\/doi.org\/10.1016\/j.jnca.2016.08.017","journal-title":"J. Network Comput. Appl."},{"key":"7808_CR13","unstructured":"Nakamoto, S. et al., Bitcoin: A peer-to-peer electronic cash system, 2008. https:\/\/bitcoin.org\/bitcoin.pdf. Cited December 17, 2022."},{"key":"7808_CR14","unstructured":"A next generation smart contract & decentralized application platform, 2014. https:\/\/blockchainlab.com\/ pdf\/Ethereum_white_paper-a_next_generation_smart_contract_and_decentralized_application_platform-vitalik-buterin.pdf. Cited February 14, 2023."},{"key":"7808_CR15","unstructured":"ERC-721: Non-Fungible Token Standard, 2018. https:\/\/eips.ethereum.org\/EIPS\/eip-721. Cited September 14, 2022."},{"key":"7808_CR16","doi-asserted-by":"publisher","first-page":"6900","DOI":"10.1109\/ACCESS.2017.2778504","volume":"6","author":"W. Yu","year":"2018","unstructured":"Yu, W., Liang, F., He, X., Hatcher, W.G., Lu, Ch., Lin, J., and Yang, X., A survey on the edge computing for the Internet of Things, IEEE Access, 2018, vol. 6, pp. 6900\u20136919. https:\/\/doi.org\/10.1109\/ACCESS.2017.2778504","journal-title":"IEEE Access"},{"key":"7808_CR17","doi-asserted-by":"publisher","unstructured":"Luo, Ch., Xu, L., Li, D., and Wu, W., Edge computing integrated with blockchain technologies, Complexity and Approximation, Du, D.Z. and Wang, J., Eds., Lecture Notes in Computer Science, vol. 12000, Cham: Springer, 2020, pp. 268\u2013288. https:\/\/doi.org\/10.1007\/978-3-030-41672-0_17","DOI":"10.1007\/978-3-030-41672-0_17"},{"key":"7808_CR18","unstructured":"PPCoin: Peer-to-peer crypto-currency with proof-of-stake, 2012. https:\/\/decred.org\/research\/king2012.pdf. Cited February 27, 2023."},{"key":"7808_CR19","unstructured":"Storj: Decentralized cloud storage, 2018. https:\/\/www.storj.io. Cited February 2, 2023."},{"key":"7808_CR20","unstructured":"Florincoin. Github implementation, 2019. https:\/\/github.com\/florincoin\/florincoin. Cited February 13, 2022."},{"key":"7808_CR21","unstructured":"Ericsson. Data integrity assurance user guide, 2016. https:\/\/web.wedotechnologies.com\/hubfs\/5_Events\/ WUGS\/WUG_Americas17\/7.%20WUGAmericas17%20Peter%20Prakash.pdf. Cited February 13, 2022."},{"key":"7808_CR22","unstructured":"Guardtime. Keyless signature infrastructure. Guide, 2017. https:\/\/m.guardtime.com\/files\/KSI_data_sheet_201509.pdf. Cited February 13, 2022."},{"key":"7808_CR23","doi-asserted-by":"publisher","unstructured":"Bezzateev, S.V. and Fedorov, I.R., Blockchain technology in 5G networks, Nauchn.-Tekh. Vestn. Inf. Tekhnol., Mekh. Opt., 2020, no. 4, pp. 472\u2013484. https:\/\/doi.org\/10.17586\/2226-1494-2020-20-4-472-484","DOI":"10.17586\/2226-1494-2020-20-4-472-484"},{"key":"7808_CR24","doi-asserted-by":"publisher","unstructured":"Gangadevi, K. and Renuga Devi, R., A survey on data integrity verification schemes using blockchain technology in cloud computing environment, IOP Conf. Ser.: Mater. Sci. Eng., 1110, vol. 1110, no. 1, p. 012011. https:\/\/doi.org\/10.1088\/1757-899x\/1110\/1\/012011","DOI":"10.1088\/1757-899x\/1110\/1\/012011"},{"key":"7808_CR25","doi-asserted-by":"publisher","unstructured":"Yin, M., Malkhi, D., Reiter, M.K., Golan-Gueta, G., and Abraham, I., HotStuff: BFT consensus in the lens of blockchain, arXiv Preprint, 2019. https:\/\/doi.org\/10.48550\/arXiv.1803.05069","DOI":"10.48550\/arXiv.1803.05069"},{"key":"7808_CR26","unstructured":"Castro, M. and Liskov, B., Practical Byzantine fault tolerance, Proceedings of the Third Symposium on Operating Systems Design and Implementation (OSDI 99), New Orleans, 199, USENIX Association, 1999, pp. 173\u2013186."},{"key":"7808_CR27","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1145\/3579845","volume":"55","author":"J. Xu","year":"2023","unstructured":"Xu, J., Wang, C., and Jia, X., A survey of blockchain consensus protocols, ACM Comput. Surv., 2023, vol. 55, no. 13s, p. 278. https:\/\/doi.org\/10.1145\/3579845","journal-title":"ACM Comput. Surv."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411624701219.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411624701219","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411624701219.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:04:10Z","timestamp":1773612250000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411624701219"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12]]},"references-count":27,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["7808"],"URL":"https:\/\/doi.org\/10.3103\/s0146411624701219","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12]]},"assertion":[{"value":"22 June 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 July 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 September 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 March 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors of this work declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}