{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T05:30:19Z","timestamp":1743053419948,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":64,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662661451"},{"type":"electronic","value":"9783662661468"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-662-66146-8_1","type":"book-chapter","created":{"date-parts":[[2022,9,27]],"date-time":"2022-09-27T19:12:31Z","timestamp":1664305951000},"page":"1-34","update-policy":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Mutida: A Rights Management Protocol for\u00a0Distributed Storage Systems Without Fully Trusted Nodes"],"prefix":"10.1007","author":[{"given":"Bastien","family":"Confais","sequence":"first","affiliation":[]},{"given":"Gustavo","family":"Rostirolla","sequence":"additional","affiliation":[]},{"given":"Beno\u00eet","family":"Parrein","sequence":"additional","affiliation":[]},{"given":"J\u00e9r\u00f4me","family":"Lacan","sequence":"additional","affiliation":[]},{"given":"Fran\u00e7ois","family":"Marques","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,28]]},"reference":[{"issue":"SI","key":"1_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/844128.844130","volume":"36","author":"A Adya","year":"2003","unstructured":"Adya, A., et al.: Farsite: federated, available, and reliable storage for an incompletely trusted environment. SIGOPS Oper. Syst. Rev. 36(SI), 1\u201314 (2003). https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1145\/844128.844130","journal-title":"SIGOPS Oper. Syst. Rev."},{"key":"1_CR2","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1016\/j.cose.2019.06.010","volume":"86","author":"G Ali","year":"2019","unstructured":"Ali, G., Ahmad, N., Cao, Y., Asif, M., Cruickshank, H., Ali, Q.E.: Blockchain based permission delegation and access control in internet of things (BACI). Comput. Secur. 86, 318\u2013334 (2019). https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1016\/j.cose.2019.06.010","journal-title":"Comput. Secur."},{"issue":"2","key":"1_CR3","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1109\/JSYST.2014.2379646","volume":"11","author":"M Ali","year":"2017","unstructured":"Ali, M., et al.: SeDaSC: secure data sharing in clouds. IEEE Syst. J. 11(2), 395\u2013404 (2017). https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1109\/JSYST.2014.2379646","journal-title":"IEEE Syst. J."},{"key":"1_CR4","unstructured":"Andersen, M.P., et al.: WAVE: a decentralized authorization framework with transitive delegation. In: Proceedings of the 28th USENIX Conference on Security Symposium, pp. 1375\u20131392. SEC 2019, USENIX Association, USA (2019)"},{"key":"1_CR5","doi-asserted-by":"publisher","unstructured":"Androulaki, E., et al.: Hyperledger fabric: a distributed operating system for permissioned blockchains. In: Proceedings of the Thirteenth EuroSys Conference. EuroSys 2018, Association for Computing Machinery, NY (2018). https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1145\/3190508.3190538","DOI":"10.1145\/3190508.3190538"},{"key":"1_CR6","unstructured":"Angelis, S.D., Aniello, L., Baldoni, R., Lombardi, F., Margheri, A., Sassone, V.: PBFT vs proof-of-authority: applying the CAP theorem to permissioned blockchain. In: Italian Conference on Cyber Security(2018). https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/eprints.soton.ac.uk\/415083\/"},{"key":"1_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/3-540-48749-2_9","volume-title":"Secure Internet Programming","author":"T Aura","year":"1999","unstructured":"Aura, T.: Distributed access-rights management with delegation certificates. In: Vitek, J., Jensen, C.D. (eds.) Secure Internet Programming. LNCS, vol. 1603, pp. 211\u2013235. Springer, Heidelberg (1999). https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1007\/3-540-48749-2_9"},{"key":"1_CR8","doi-asserted-by":"publisher","unstructured":"Backes, M., Camenisch, J., Sommer, D.: Anonymous yet accountable access control. In: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, pp. 40\u201346. WPES 2005, Association for Computing Machinery, NY (2005). https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1145\/1102199.1102208","DOI":"10.1145\/1102199.1102208"},{"key":"1_CR9","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-04519-1_1","volume-title":"Cloud Computing and Services Science","author":"D Balouek","year":"2013","unstructured":"Balouek, D., et al.: Adding virtualization capabilities to the Grid\u20195000 testbed. In: Ivanov, I.I., van Sinderen, M., Leymann, F., Shan, T. (eds.) CLOSER 2012. CCIS, vol. 367, pp. 3\u201320. Springer, Cham (2013). https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1007\/978-3-319-04519-1_1"},{"key":"1_CR10","doi-asserted-by":"publisher","first-page":"196813","DOI":"10.1109\/ACCESS.2020.3034260","volume":"8","author":"AA Battah","year":"2020","unstructured":"Battah, A.A., Madine, M.M., Alzaabi, H., Yaqoob, I., Salah, K., Jayaraman, R.: Blockchain-based multi-party authorization for accessing IPFS encrypted data. IEEE Access 8, 196813\u2013196825 (2020). https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1109\/ACCESS.2020.3034260","journal-title":"IEEE Access"},{"key":"1_CR11","unstructured":"Benet, J.: IPFS - Content Addressed, Versioned, P2P File System. Tech. rep., Protocol Labs, Inc. (2014). https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/arxiv.org\/abs\/1407.3561"},{"key":"1_CR12","doi-asserted-by":"publisher","unstructured":"Breslau, L., Cao, P., Fan, L., Phillips, G., Shenker, S.: Web caching and Zipf-like distributions: evidence and implications. In: IEEE INFOCOM 1999. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No. 99CH36320), vol. 1, pp. 126\u2013134 (1999). https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1109\/INFCOM.1999.749260","DOI":"10.1109\/INFCOM.1999.749260"},{"key":"1_CR13","unstructured":"Chaudhary, P., Gupta, R., Singh, A., Majumder, P.: Analysis and comparison of various fully homomorphic encryption techniques. In: 2019 International Conference on Computing, Power and Communication Technologies (GUCON), pp. 58\u201362 (2019)"},{"key":"1_CR14","doi-asserted-by":"publisher","unstructured":"Chen, J., Ma, H.: Efficient decentralized attribute-based access control for cloud storage with user revocation. In: 2014 IEEE International Conference on Communications (ICC), pp. 3782\u20133787 (2014). https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1109\/ICC.2014.6883910","DOI":"10.1109\/ICC.2014.6883910"},{"key":"1_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1007\/978-3-642-12678-9_19","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2010","author":"SSM Chow","year":"2010","unstructured":"Chow, S.S.M., Weng, J., Yang, Y., Deng, R.H.: Efficient unidirectional proxy re-encryption. In: Bernstein, D.J., Lange, T. (eds.) AFRICACRYPT 2010. LNCS, vol. 6055, pp. 316\u2013332. Springer, Heidelberg (2010). https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1007\/978-3-642-12678-9_19"},{"key":"1_CR16","doi-asserted-by":"publisher","unstructured":"Chuat, L., Abdou, A., Sasse, R., Sprenger, C., Basin, D., Perrig, A.: SoK: delegation and revocation, the missing links in the web\u2019s chain of trust. In: 2020 IEEE European Symposium on Security and Privacy (EuroS P), pp. 624\u2013638 (2020). https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1109\/EuroSP48549.2020.00046","DOI":"10.1109\/EuroSP48549.2020.00046"},{"key":"1_CR17","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/s10207-007-0044-8","volume":"7","author":"J Crampton","year":"2008","unstructured":"Crampton, J., Khambhammettu, H.: Delegation in role-based access control. Int. J. Inf. Secur. 7, 123\u2013136 (2008). https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1007\/s10207-007-0044-8","journal-title":"Int. J. Inf. Secur."},{"key":"1_CR18","doi-asserted-by":"publisher","unstructured":"Dang, Q.: Secure hash standard (2015). https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.6028\/NIST.FIPS.180-4","DOI":"10.6028\/NIST.FIPS.180-4"},{"key":"1_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-36285-1_1","volume-title":"Database Theory \u2014 ICDT 2003","author":"N Daswani","year":"2003","unstructured":"Daswani, N., Garcia-Molina, H., Yang, B.: Open problems in data-sharing peer-to-peer systems. In: Calvanese, D., Lenzerini, M., Motwani, R. (eds.) ICDT 2003. LNCS, vol. 2572, pp. 1\u201315. Springer, Heidelberg (2003). https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1007\/3-540-36285-1_1"},{"key":"1_CR20","doi-asserted-by":"publisher","DOI":"10.1155\/2007\/13801","volume":"2007","author":"C Fontaine","year":"2007","unstructured":"Fontaine, C., Galand, F.: A survey of homomorphic encryption for nonspecialists. EURASIP J. Inf. Secur. 2007, 013801 (2007). https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1155\/2007\/13801","journal-title":"EURASIP J. Inf. Secur."},{"key":"1_CR21","doi-asserted-by":"publisher","unstructured":"Gasser, M., McDermott, E.: An architecture for practical delegation in a distributed system. In: 2012 IEEE Symposium on Security and Privacy, p. 20. IEEE Computer Society, Los Alamitos, CA (1990). https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1109\/RISP.1990.63835","DOI":"10.1109\/RISP.1990.63835"},{"key":"1_CR22","unstructured":"Gatling Corp: Gatling (2021). https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/gatling.io\/. Accessed 28 June 2021"},{"issue":"2","key":"1_CR23","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1016\/S1361-3723(01)02011-5","volume":"2001","author":"B Gengler","year":"2001","unstructured":"Gengler, B.: Content protection for recordable media (CPRM). Comput. Fraud Secur. 2001(2), 5\u20136 (2001). https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1016\/S1361-3723(01)02011-5","journal-title":"Comput. Fraud Secur."},{"key":"1_CR24","doi-asserted-by":"crossref","unstructured":"Hardt, D., et al.: The OAuth 2.0 authorization framework (2012)","DOI":"10.17487\/rfc6749"},{"key":"1_CR25","unstructured":"Heckmann, O., Bock, A., Mauthe, A., Steinmetz, R.: The eDonkey file-sharing network. In: Dadam, P., Reichert, M. (eds.) Informatik 2004, Informatik verbindet, Band 2, Beitr\u00e4ge der 34. Jahrestagung der Gesellschaft f\u00fcr Informatik e.V. (GI), pp. 224\u2013228. Gesellschaft f\u00fcr Informatik e.V., Bonn (2004)"},{"key":"1_CR26","unstructured":"Henningsen, S., Rust, S., Florian, M., Scheuermann, B.: Crawling the IPFS network. In: 2020 IFIP Networking Conference (Networking), pp. 679\u2013680 (2020)"},{"issue":"1","key":"1_CR27","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1109\/MCOM.2017.1600521CM","volume":"55","author":"C Hesselman","year":"2017","unstructured":"Hesselman, C., Moura, G.C., De Oliveira Schmidt, R., Toet, C.: Increasing DNS security and stability through a control plane for top-level domain operators. IEEE Commun. Mag. 55(1), 197\u2013203 (2017). https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1109\/MCOM.2017.1600521CM","journal-title":"IEEE Commun. Mag."},{"key":"1_CR28","unstructured":"Tran, H., Hitchens, M., Varadharajan, V., Watters, P.: A trust based access control framework for P2P file-sharing systems. In: Proceedings of the 38th Annual Hawaii International Conference on System Sciences, p. 302c (2005)"},{"key":"1_CR29","doi-asserted-by":"publisher","unstructured":"Jawad, M., Alvarado, P.S., Valduriez, P.: Design of PriServ, a privacy service for DHTs. In: Proceedings of the 2008 International Workshop on Privacy and Anonymity in Information Society, pp. 21\u201325. PAIS 2008, Association for Computing Machinery, NY (2008). https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1145\/1379287.1379293","DOI":"10.1145\/1379287.1379293"},{"key":"1_CR30","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1007\/978-3-642-01244-0_25","volume-title":"Emerging Challenges for Security, Privacy and Trust","author":"H Jin","year":"2009","unstructured":"Jin, H., Lotspiech, J.: Broadcast encryption for differently privileged. In: Gritzalis, D., Lopez, J. (eds.) SEC 2009. IAICT, vol. 297, pp. 283\u2013293. Springer, Heidelberg (2009). https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1007\/978-3-642-01244-0_25"},{"key":"1_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"517","DOI":"10.1007\/11836810_37","volume-title":"Information Security","author":"M Katzarova","year":"2006","unstructured":"Katzarova, M., Simpson, A.: Delegation in a distributed healthcare context: a survey of current approaches. In: Katsikas, S.K., L\u00f3pez, J., Backes, M., Gritzalis, S., Preneel, B. (eds.) ISC 2006. LNCS, vol. 4176, pp. 517\u2013529. Springer, Heidelberg (2006). https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1007\/11836810_37"},{"issue":"1","key":"1_CR32","doi-asserted-by":"publisher","first-page":"64","DOI":"10.4018\/IJCAC.2020010105","volume":"10","author":"S Kaushik","year":"2020","unstructured":"Kaushik, S., Gandhi, C.: Capability based outsourced data access control with assured file deletion and efficient revocation with trust factor in cloud computing. Int. J. Cloud Appl. Comput. 10(1), 64\u201384 (2020). https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.4018\/IJCAC.2020010105","journal-title":"Int. J. Cloud Appl. Comput."},{"key":"1_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1007\/978-3-319-29883-2_9","volume-title":"Data Privacy Management, and Security Assurance","author":"O Kieselmann","year":"2016","unstructured":"Kieselmann, O., Kopal, N., Wacker, A.: A novel approach to data revocation on the internet. In: Garcia-Alfaro, J., Navarro-Arribas, G., Aldini, A., Martinelli, F., Suri, N. (eds.) DPM\/QASA -2015. LNCS, vol. 9481, pp. 134\u2013149. Springer, Cham (2016). https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1007\/978-3-319-29883-2_9"},{"key":"1_CR34","doi-asserted-by":"publisher","unstructured":"Lasla, N., Younis, M., Znaidi, W., Ben Arbia, D.: Efficient distributed admission and revocation using blockchain for cooperative its. In: 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS), pp. 1\u20135 (2018). https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1109\/NTMS.2018.8328734","DOI":"10.1109\/NTMS.2018.8328734"},{"key":"1_CR35","unstructured":"Legout, A., Urvoy-Keller, G., Michiardi, P.: Understanding BitTorrent: an experimental perspective. Technical report, Inria (2005). https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/hal.inria.fr\/inria-00000156"},{"key":"1_CR36","doi-asserted-by":"crossref","unstructured":"Lesueur, F., Me, L., Tong, V.V.T.: An efficient distributed PKI for structured P2P networks. In: 2009 IEEE Ninth International Conference on Peer-to-Peer Computing, pp. 1\u201310 (2009)","DOI":"10.1109\/P2P.2009.5284491"},{"key":"1_CR37","doi-asserted-by":"crossref","unstructured":"Liu, J., Li, X., Ye, L., Zhang, H., Du, X., Guizani, M.: BPDS: a blockchain based privacy-preserving data sharing for electronic medical records. In: 2018 IEEE Global Communications Conference (GLOBECOM), pp. 1\u20136 (2018)","DOI":"10.1109\/GLOCOM.2018.8647713"},{"issue":"1","key":"1_CR38","doi-asserted-by":"publisher","first-page":"1","DOI":"10.13052\/jcsm2245-1439.411","volume":"4","author":"K Manousakis","year":"2015","unstructured":"Manousakis, K., et al.: Torrent-based dissemination in infrastructure-less wireless networks. J. Cyber Secur. Mobil. 4(1), 1\u201322 (2015)","journal-title":"J. Cyber Secur. Mobil."},{"key":"1_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/3-540-45748-8_5","volume-title":"Peer-to-Peer Systems","author":"P Maymounkov","year":"2002","unstructured":"Maymounkov, P., Mazi\u00e8res, D.: Kademlia: a peer-to-peer information system based on the XOR metric. In: Druschel, P., Kaashoek, F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 53\u201365. Springer, Heidelberg (2002). https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1007\/3-540-45748-8_5"},{"key":"1_CR40","doi-asserted-by":"publisher","unstructured":"Merkle, R.C.: Protocols for public key cryptosystems. In: 1980 IEEE Symposium on Security and Privacy, p. 122 (1980). https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1109\/SP.1980.10006","DOI":"10.1109\/SP.1980.10006"},{"key":"1_CR41","unstructured":"Miller, S.P., Neuman, B.C., Schiller, J.I., Saltzer, J.H.: Kerberos authentication and authorization system. In: In Project Athena Technical Plan (1988)"},{"key":"1_CR42","doi-asserted-by":"publisher","unstructured":"Mockapetris, P.: Domain names - concepts and facilities. RFC 1034 (1987). https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.17487\/RFC1034","DOI":"10.17487\/RFC1034"},{"key":"1_CR43","doi-asserted-by":"publisher","unstructured":"Muralidharan, S., Ko, H.: An InterPlanetary file system (IPFS) based IoT framework. In: 2019 IEEE International Conference on Consumer Electronics (ICCE), pp. 1\u20132 (2019). https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1109\/ICCE.2019.8662002","DOI":"10.1109\/ICCE.2019.8662002"},{"key":"1_CR44","doi-asserted-by":"publisher","unstructured":"Naehrig, M., Lauter, K., Vaikuntanathan, V.: Can homomorphic encryption be practical? In: Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop, pp. 113\u2013124. CCSW 2011, Association for Computing Machinery, NY (2011). https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1145\/2046660.2046682","DOI":"10.1145\/2046660.2046682"},{"issue":"9","key":"1_CR45","doi-asserted-by":"publisher","first-page":"2248","DOI":"10.1109\/TPDS.2021.3058963","volume":"32","author":"Y Nakatani","year":"2021","unstructured":"Nakatani, Y.: Structured allocation-based consistent hashing with improved balancing for cloud infrastructure. IEEE Trans. Parallel Distrib. Syst. 32(9), 2248\u20132261 (2021). https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1109\/TPDS.2021.3058963","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"1_CR46","doi-asserted-by":"publisher","unstructured":"Politou, E., Alepis, E., Patsakis, C.: Forgetting personal data and revoking consent under the GDPR: challenges and proposed solutions. J. Cybersecur. 4(1), tyy001 (2018). https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1093\/cybsec\/tyy001","DOI":"10.1093\/cybsec\/tyy001"},{"key":"1_CR47","doi-asserted-by":"publisher","first-page":"956","DOI":"10.1016\/j.future.2020.06.037","volume":"112","author":"E Politou","year":"2020","unstructured":"Politou, E., Alepis, E., Patsakis, C., Casino, F., Alazab, M.: Delegated content erasure in IPFS. Future Gener. Comput. Syst. 112, 956\u2013964 (2020). https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1016\/j.future.2020.06.037","journal-title":"Future Gener. Comput. Syst."},{"issue":"4","key":"1_CR48","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1002\/ett.4460050406","volume":"5","author":"B Preneel","year":"1994","unstructured":"Preneel, B.: Cryptographic hash functions. Eur. Trans. Telecommun. 5(4), 431\u2013448 (1994)","journal-title":"Eur. Trans. Telecommun."},{"key":"1_CR49","unstructured":"Protocol Labs: IPFS (2021). https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/ipfs.io\/. Accessed 28 June 2021"},{"issue":"3","key":"1_CR50","doi-asserted-by":"publisher","first-page":"1156","DOI":"10.1093\/rfs\/hhaa075","volume":"34","author":"F Saleh","year":"2020","unstructured":"Saleh, F.: Blockchain without waste: proof-of-stake. Rev. Financ. Stud. 34(3), 1156\u20131190 (2020). https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1093\/rfs\/hhaa075","journal-title":"Rev. Financ. Stud."},{"key":"#cr-split#-1_CR51.1","unstructured":"Sari, L., Sipos, M.: FileTribe: blockchain-based secure file sharing on IPFS. In: European Wireless 2019"},{"key":"#cr-split#-1_CR51.2","unstructured":"25th European Wireless Conference, pp. 1-6 (2019)"},{"key":"1_CR52","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"374","DOI":"10.1007\/978-3-030-22312-0_26","volume-title":"ICT Systems Security and Privacy Protection","author":"T Schnitzler","year":"2019","unstructured":"Schnitzler, T., D\u00fcrmuth, M., P\u00f6pper, C.: Towards contractual agreements for revocation of online data. In: Dhillon, G., Karlsson, F., Hedstr\u00f6m, K., Z\u00faquete, A. (eds.) SEC 2019. IAICT, vol. 562, pp. 374\u2013387. Springer, Cham (2019). https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1007\/978-3-030-22312-0_26"},{"issue":"11","key":"1_CR53","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 22(11), 612\u2013613 (1979). https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1145\/359168.359176","journal-title":"Commun. ACM"},{"key":"1_CR54","doi-asserted-by":"crossref","unstructured":"Steichen, M., Fiz, B., Norvill, R., Shbair, W., State, R.: Blockchain-based, decentralized access control for IPFS. In: 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), pp. 1499\u20131506 (2018)","DOI":"10.1109\/Cybermatics_2018.2018.00253"},{"issue":"1","key":"1_CR55","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1109\/TNET.2002.808407","volume":"11","author":"I Stoica","year":"2003","unstructured":"Stoica, I., et al.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE ACM Trans. Netw. 11(1), 17\u201332 (2003). https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1109\/TNET.2002.808407","journal-title":"IEEE ACM Trans. Netw."},{"key":"1_CR56","unstructured":"The Linux Foundation: Kubernetes (2021). https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/kubernetes.io\/. Accessed 28 June 2021"},{"issue":"2","key":"1_CR57","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1883612.1883615","volume":"43","author":"G Urdaneta","year":"2011","unstructured":"Urdaneta, G., Pierre, G., Steen, M.V.: A survey of DHT security techniques. ACM Comput. Surv. 43(2), 1\u201349 (2011). https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1145\/1883612.1883615","journal-title":"ACM Comput. Surv."},{"key":"1_CR58","doi-asserted-by":"publisher","first-page":"38437","DOI":"10.1109\/ACCESS.2018.2851611","volume":"6","author":"S Wang","year":"2018","unstructured":"Wang, S., Zhang, Y., Zhang, Y.: A blockchain-based framework for data sharing with fine-grained access control in decentralized storage systems. IEEE Access 6, 38437\u201338450 (2018)","journal-title":"IEEE Access"},{"key":"1_CR59","doi-asserted-by":"publisher","unstructured":"Wang, X., Sun, X., Sun, G., Luo, D.: CST: P2P anonymous authentication system based on collaboration signature. In: 2010 5th International Conference on Future Information Technology, pp. 1\u20137 (2010). https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1109\/FUTURETECH.2010.5482740","DOI":"10.1109\/FUTURETECH.2010.5482740"},{"issue":"3","key":"1_CR60","doi-asserted-by":"publisher","first-page":"39","DOI":"10.3390\/computers7030039","volume":"7","author":"R Xu","year":"2018","unstructured":"Xu, R., Chen, Y., Blasch, E., Chen, G.: BlendCAC: a smart contract enabled decentralized capability-based access control mechanism for the IoT. Computers 7(3), 39 (2018). https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.3390\/computers7030039","journal-title":"Computers"},{"key":"1_CR61","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/978-3-319-97289-3_15","volume-title":"Knowledge Management and Acquisition for Intelligent Systems","author":"W Yang","year":"2018","unstructured":"Yang, W., Garg, S., Raza, A., Herbert, D., Kang, B.: Blockchain: trends and future. In: Yoshida, K., Lee, M. (eds.) PKAW 2018. LNCS (LNAI), vol. 11016, pp. 201\u2013210. Springer, Cham (2018). https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1007\/978-3-319-97289-3_15"},{"issue":"4","key":"1_CR62","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2908557","volume":"12","author":"Y Yang","year":"2016","unstructured":"Yang, Y., Zhu, J.: Write Skew and Zipf distribution: evidence and implications. ACM Trans. Storage 12(4), 1\u201319 (2016). https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1145\/2908557","journal-title":"ACM Trans. Storage"},{"issue":"1","key":"1_CR63","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/JSAC.2003.818784","volume":"22","author":"B Zhao","year":"2004","unstructured":"Zhao, B., Huang, L., Stribling, J., Rhea, S., Joseph, A., Kubiatowicz, J.: Tapestry: a resilient global-scale overlay for service deployment. IEEE J. Sel. Areas Commun. 22(1), 41\u201353 (2004). https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1109\/JSAC.2003.818784","journal-title":"IEEE J. Sel. Areas Commun."}],"container-title":["Lecture Notes in Computer Science","Transactions on Large-Scale Data- and Knowledge-Centered Systems LII"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-66146-8_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,27]],"date-time":"2022-09-27T19:13:28Z","timestamp":1664306008000},"score":1,"resource":{"primary":{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/link.springer.com\/10.1007\/978-3-662-66146-8_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783662661451","9783662661468"],"references-count":64,"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1007\/978-3-662-66146-8_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"28 September 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}