{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T21:48:08Z","timestamp":1730238488959,"version":"3.28.0"},"reference-count":63,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100002742","name":"BHU, India","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002742","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5]]},"DOI":"10.1109\/icde53745.2022.00306","type":"proceedings-article","created":{"date-parts":[[2022,8,2]],"date-time":"2022-08-02T19:18:41Z","timestamp":1659467921000},"page":"3236-3240","source":"Crossref","is-referenced-by-count":4,"title":["A Journey from Commit Processing in Distributed Databases to Consensus in Blockchain"],"prefix":"10.1109","author":[{"given":"Kamal","family":"Kant","sequence":"first","affiliation":[{"name":"M. M. M. University of Technology,“2025” Dept. of Computer Sc. & Engg.,Gorakhpur,India"}]},{"given":"Sarvesh","family":"Pandey","sequence":"additional","affiliation":[{"name":"MMV, BHU,“Supervised by” Dept. of Computer Science,Varanasi,India"}]},{"given":"Udai","family":"Shanker","sequence":"additional","affiliation":[{"name":"M. M. M. U. T.,“Supervised by” Dept. of Computer Sc. & Engg.,Gorakhpur,India"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/571637.571640"},{"key":"ref38","article-title":"Practical Byzantine Fault Tolerance","author":"konnov","year":"1999","journal-title":"Proc Third Symp Operating Systems and Implementation"},{"journal-title":"Tech Rep","article-title":"EOS. IO technical white paper v2","year":"2018","key":"ref33"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2935149"},{"key":"ref31","first-page":"297","article-title":"Securing Proof-of-Stake Blockchain Protocols","author":"wenting li","year":"0","journal-title":"Data Privacy Management Cryptocurrencies and Blockchain Technology-ESORICS 2017 International Workshops DPM 2017 and CBT 2017 Proceedings"},{"key":"ref30","first-page":"1545","article-title":"Comparative analysis of blockchain consensus algorithms","author":"zagar","year":"2018","journal-title":"41st International Convention on Information and Communication Technology Electronics and Microelectronics (MIPRO)"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/1658357.1658358"},{"key":"ref36","article-title":"On public and private blockchains","volume":"7","author":"buterin","year":"2015","journal-title":"Ethereum Blog"},{"key":"ref35","first-page":"1","author":"salimitari","year":"2018","journal-title":"A survey on consensus protocols in blockchain for iot networks"},{"journal-title":"Mastering Blockchain","year":"2017","author":"bashir","key":"ref34"},{"key":"ref60","first-page":"1","author":"yin","year":"2018","journal-title":"HotStuff BFT Consensus in the Lens of Blockchain"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/ICCISci.2019.8716424"},{"key":"ref61","first-page":"34","volume":"42","author":"bentov","year":"2014","journal-title":"Proof of activity Extending bitcoin's proof of work via proof of stake"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/3007788.3007790"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1093\/rfs\/hhaa075"},{"key":"ref27","first-page":"1","author":"buterin","year":"2017","journal-title":"Casper the Friendly Finality Gadget"},{"key":"ref29","first-page":"357","article-title":"Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol","author":"aggelos kiayias","year":"0","journal-title":"Advances in Cryptology (CRYPTO)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s10619-006-8594-8"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s10619-008-7024-5"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2016.07.001"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2017.506"},{"key":"ref21","first-page":"436","article-title":"Majority is not Enough: Bitcoin Mining is Vulnerable","author":"e","year":"0","journal-title":"Intl Conf on Financial Crypto and Data Security"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCT.2010.5640475"},{"key":"ref23","first-page":"51","article-title":"Consortium blockchains: Overview, applications and challenges","volume":"11","author":"omar dib","year":"2018","journal-title":"Int'l J Advances in Telecomm"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2896108"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978341"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCS.2017.8014672"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataCongress.2017.85"},{"journal-title":"Simplified scp","year":"2019","author":"mazi\u00e8res","key":"ref59"},{"journal-title":"The Stellar Consensus Protocol A Federated Model for Internet-level Consensus","year":"2015","author":"stellar","key":"ref58"},{"key":"ref57","article-title":"The ripple protocol consensus algorithm","volume":"5","author":"schwartz","year":"2014","journal-title":"Ripple Labs Inc White Paper"},{"journal-title":"Analysis of the XRP Ledger Consensus Protocol","year":"2018","author":"chase","key":"ref56"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/EDCC.2012.32"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2017.23"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2013.53"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2014.43"},{"key":"ref10","article-title":"Bitcoin: A Peer-to-Peer Electronic Cash System","author":"nakamoto","year":"2008","journal-title":"Decentralized Bus Rev"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.csbj.2019.01.010"},{"key":"ref40","first-page":"18","article-title":"Paxos Made Simple","author":"lamport","year":"0","journal-title":"Int Conf Wavelet Act Media Technol Inf Process"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2017.12.005"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.bushor.2018.08.012"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2018.10.004"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2903554"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2018.11.006"},{"key":"ref17","first-page":"38","article-title":"Blockchain Technology: Principles and Applications","volume":"16","author":"kate","year":"2018","journal-title":"IEEE Secur Priv"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2018.3111245"},{"journal-title":"Universal Identifier Theory","year":"2020","author":"smith","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2019.100215"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3152494.3167976"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3216122.3216161"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-73200-4_51"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-021-09112-9"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-020-03530-5"},{"key":"ref49","article-title":"The Bitcoin Question: Currency versus Trust-less Transfer Technology","author":"blundell-wignall","year":"2014","journal-title":"OECD Workshop"},{"key":"ref9","first-page":"437","article-title":"How to Time-Stamp a Digital Document","author":"stornetta","year":"1990","journal-title":"Advances in Cryptology-CRYPTO'90"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.55"},{"key":"ref45","article-title":"A fistful of bitcoins: characterizing payments among men with no names","author":"papamanthou","year":"0","journal-title":"IEEE Symposium on Security and Privacy (SP)"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-5546-6_6"},{"journal-title":"User privacy in the public bitcoin blockchain","year":"2014","author":"barcelo","key":"ref47"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660379"},{"key":"ref41","first-page":"257","article-title":"Research on consistency of distributed system based on Paxos algorithm","author":"shi","year":"0","journal-title":"International Conference on Wavelet Active Media Technology and Information Processing (ICWAMTIP)"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/AIEEE.2018.8592253"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44774-1_12"}],"event":{"name":"2022 IEEE 38th International Conference on Data Engineering (ICDE)","start":{"date-parts":[[2022,5,9]]},"location":"Kuala Lumpur, Malaysia","end":{"date-parts":[[2022,5,12]]}},"container-title":["2022 IEEE 38th International Conference on Data Engineering (ICDE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9835153\/9835154\/09835325.pdf?arnumber=9835325","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,22]],"date-time":"2022-08-22T16:02:29Z","timestamp":1661184149000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9835325\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5]]},"references-count":63,"URL":"https:\/\/doi.org\/10.1109\/icde53745.2022.00306","relation":{},"subject":[],"published":{"date-parts":[[2022,5]]}}}