{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:51:33Z","timestamp":1772041893575,"version":"3.50.1"},"reference-count":41,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/www.elsevier.com\/legal\/tdmrep-license"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Simulation Modelling Practice and Theory"],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1016\/j.simpat.2019.101987","type":"journal-article","created":{"date-parts":[[2019,9,16]],"date-time":"2019-09-16T11:20:03Z","timestamp":1568632803000},"page":"101987","update-policy":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":39,"special_numbering":"C","title":["Blockchain based consensus checking in decentralized cloud storage"],"prefix":"10.1016","volume":"102","author":[{"given":"Zhiqin","family":"Zhu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/linproxy.fan.workers.dev:443\/https\/orcid.org\/0000-0001-9562-3865","authenticated-orcid":false,"given":"Guanqiu","family":"Qi","sequence":"additional","affiliation":[]},{"given":"Mingyao","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Yi","family":"Chai","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.simpat.2019.101987_bib0001","series-title":"Proceedings of 5th IEEE International Conference on Cloud Computing, Honolulu, HI, USA, June 24\u201329, 2012","first-page":"654","article-title":"DICB: dynamic intelligent customizable benign pricing strategy for cloud computing","author":"Tsai","year":"2012"},{"key":"10.1016\/j.simpat.2019.101987_bib0002","series-title":"2012 32nd International Conference on Distributed Computing Systems Workshops","first-page":"400","article-title":"A cost-effective intelligent configuration model in cloud computing","author":"Tsai","year":"2012"},{"key":"10.1016\/j.simpat.2019.101987_bib0003","series-title":"2013 IEEE Eleventh International Symposium on Autonomous Decentralized Systems (ISADS)","first-page":"1","article-title":"Choosing cost-effective configuration in cloud storage","author":"Tsai","year":"2013"},{"key":"10.1016\/j.simpat.2019.101987_bib0004","series-title":"Service-Oriented Computing and System Integration: Software, IoT, Big Data, and AI as Services","author":"Chen","year":"2018"},{"key":"10.1016\/j.simpat.2019.101987_bib0005","article-title":"From blockchain consensus back to byzantine consensus","author":"Gramoli","year":"2017","journal-title":"Future Gener. Comput. Syst."},{"issue":"8","key":"10.1016\/j.simpat.2019.101987_bib0006","doi-asserted-by":"crossref","first-page":"2575","DOI":"10.3390\/s18082575","article-title":"Blockchain and IoT integration: a systematic survey","volume":"18","author":"Panarello","year":"2018","journal-title":"Sensors"},{"key":"10.1016\/j.simpat.2019.101987_bib0007","series-title":"Computer Safety, Reliability, and Security","first-page":"235","article-title":"Byzantine fault tolerance, from theory to reality","author":"Driscoll","year":"2003"},{"key":"10.1016\/j.simpat.2019.101987_bib0008","series-title":"Proceedings of the Third Symposium on Operating Systems Design and Implementation","first-page":"173","article-title":"Practical byzantine fault tolerance","author":"Castro","year":"1999"},{"key":"10.1016\/j.simpat.2019.101987_bib0009","series-title":"Technical Report","article-title":"A Correctness Proof for a Practical Byzantine-Fault-Tolerant Replication Algorithm","author":"Castro","year":"1999"},{"issue":"4","key":"10.1016\/j.simpat.2019.101987_bib0010","doi-asserted-by":"crossref","first-page":"299","DOI":"10.1145\/98163.98167","article-title":"Implementing fault-tolerant services using the state machine approach: a tutorial","volume":"22","author":"Schneider","year":"1990","journal-title":"ACM Comput. Surv."},{"issue":"5","key":"10.1016\/j.simpat.2019.101987_bib0011","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1145\/1165389.945450","article-title":"The google file system","volume":"37","author":"Ghemawat","year":"2003","journal-title":"SIGOPS Oper. Syst. Rev."},{"key":"10.1016\/j.simpat.2019.101987_bib0012","series-title":"Proceedings of the 2010 IEEE 26th Symposium on Mass Storage Systems and Technologies (MSST)","first-page":"1","article-title":"The hadoop distributed file system","author":"Shvachko","year":"2010"},{"issue":"4","key":"10.1016\/j.simpat.2019.101987_bib0013","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1145\/1713254.1713276","article-title":"The case for ramclouds: scalable high-performance storage entirely in dram","volume":"43","author":"Ousterhout","year":"2010","journal-title":"SIGOPS Oper. Syst. Rev."},{"key":"10.1016\/j.simpat.2019.101987_bib0014","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1016\/j.simpat.2017.10.005","article-title":"Fault-diagnosis for reciprocating compressors using big data and machine learning","volume":"80","author":"Qi","year":"2018","journal-title":"Simul. Model. Pract. Theory"},{"key":"10.1016\/j.simpat.2019.101987_bib0015","doi-asserted-by":"crossref","first-page":"292","DOI":"10.1016\/j.simpat.2017.07.003","article-title":"A cloud-based triage log analysis and recovery framework","volume":"77","author":"Qi","year":"2017","journal-title":"Simul. Model. Pract. Theory"},{"key":"10.1016\/j.simpat.2019.101987_bib0016","series-title":"2016\u202fIEEE Symposium on Service-Oriented System Engineering, SOSE 2016, Oxford, United Kingdom, March 29\u2013April 2, 2016","first-page":"91","article-title":"LTBD: a triage framework","author":"Tsai","year":"2016"},{"key":"10.1016\/j.simpat.2019.101987_sbref0017","series-title":"Technical Report","article-title":"A Correctness Proof for a Practical Byzantine-Fault-Tolerant Replication Algorithm","author":"Castro","year":"1999"},{"key":"10.1016\/j.simpat.2019.101987_bib0018","series-title":"Proceedings of the 2014 USENIX Conference on USENIX Annual Technical Conference","first-page":"305","article-title":"In search of an understandable consensus algorithm","author":"Ongaro","year":"2014"},{"key":"10.1016\/j.simpat.2019.101987_bib0019","series-title":"14th International Symposium on Autonomous Decentralized Systems (ISADS), April 8\u201310, 2019, Utrecht, the Netherlands","article-title":"Blockchain based consensus checking in cloud storage","author":"Qi","year":"2019"},{"issue":"2","key":"10.1016\/j.simpat.2019.101987_bib0020","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1007\/s10619-008-7024-5","article-title":"Distributed real time database systems: background and literature review","volume":"23","author":"Shanker","year":"2008","journal-title":"Distrib. Parallel Databases"},{"key":"10.1016\/j.simpat.2019.101987_bib0021","series-title":"Distributed Systems","first-page":"97","author":"Hadzilacos","year":"1993"},{"key":"10.1016\/j.simpat.2019.101987_bib0022","series-title":"Proceedings of the 2005, American Control Conference, 2005.","first-page":"1859","article-title":"A survey of consensus problems in multi-agent coordination","volume":"3","author":"Ren","year":"2005"},{"issue":"1","key":"10.1016\/j.simpat.2019.101987_bib0023","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1016\/j.automatica.2007.04.020","article-title":"A new delay system approach to network-based control","volume":"44","author":"Gao","year":"2008","journal-title":"Automatica"},{"key":"10.1016\/j.simpat.2019.101987_bib0024","series-title":"Proceedings of the 12th International Conference on Principles of Distributed Systems","first-page":"22","article-title":"Byzantine consensus with unknown participants","author":"Alchieri","year":"2008"},{"issue":"3","key":"10.1016\/j.simpat.2019.101987_bib0025","doi-asserted-by":"crossref","first-page":"382","DOI":"10.1145\/357172.357176","article-title":"The byzantine generals problem","volume":"4","author":"Lamport","year":"1982","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"10.1016\/j.simpat.2019.101987_bib0026","series-title":"2018 IEEE Conference on Communications and Network Security (CNS)","first-page":"1","article-title":"Dynamic practical byzantine fault tolerance","author":"Hao","year":"2018"},{"key":"10.1016\/j.simpat.2019.101987_bib0027","series-title":"Middleware 2012","first-page":"436","article-title":"On the practicality of practical byzantine fault tolerance","author":"Chondros","year":"2012"},{"key":"10.1016\/j.simpat.2019.101987_sbref0028","article-title":"Practical synchronous byzantine consensus","author":"Ren","year":"2017","journal-title":"CoRR"},{"key":"10.1016\/j.simpat.2019.101987_bib0029","series-title":"2019 IEEE 9th International Conference on Electronics Information and Emergency Communication (ICEIEC)","first-page":"1","article-title":"An improvement of consensus fault tolerant algorithm applied to alliance chain","author":"He","year":"2019"},{"key":"10.1016\/j.simpat.2019.101987_bib0030","series-title":"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","first-page":"1195","article-title":"High performance and scalable byzantine fault tolerance","author":"Jiang","year":"2019"},{"key":"10.1016\/j.simpat.2019.101987_bib0031","series-title":"2018 10th International Conference on Modelling, Identification and Control (ICMIC)","first-page":"1","article-title":"Research on consensus efficiency based on practical byzantine fault tolerance","author":"Zhang","year":"2018"},{"issue":"2","key":"10.1016\/j.simpat.2019.101987_bib0032","doi-asserted-by":"crossref","first-page":"655","DOI":"10.1109\/JSYST.2013.2271537","article-title":"An efficient Merkle-tree-based authentication scheme for smart grid","volume":"8","author":"Li","year":"2014","journal-title":"IEEE Syst. J."},{"key":"10.1016\/j.simpat.2019.101987_bib0033","series-title":"Progress in Cryptology \u2013 INDOCRYPT 2006","first-page":"349","article-title":"Cmss \u2013 an improved merkle signature scheme","author":"Buchmann","year":"2006"},{"key":"10.1016\/j.simpat.2019.101987_bib0034","series-title":"GvD, volume 1366 of CEUR Workshop Proceedings","first-page":"66","article-title":"Merkle hash tree based techniques for data integrity of outsourced data.","author":"Niaz","year":"2015"},{"key":"10.1016\/j.simpat.2019.101987_bib0035","series-title":"2013 International Conference on Security and Cryptography (SECRYPT)","first-page":"1","article-title":"Redactable signature scheme for tree-structured data based on Merkle tree","author":"Hirose","year":"2013"},{"key":"10.1016\/j.simpat.2019.101987_bib0036","series-title":"2019 International Conference on Robots Intelligent System (ICRIS)","first-page":"365","article-title":"Research on e-commerce user information encryption technology based on Merkle hash tree","author":"Li","year":"2019"},{"key":"10.1016\/j.simpat.2019.101987_bib0037","series-title":"2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","first-page":"43","article-title":"Mtfs: Merkle-tree-based file system","author":"Kan","year":"2019"},{"key":"10.1016\/j.simpat.2019.101987_bib0038","series-title":"2016 IEEE 24th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS)","first-page":"30","article-title":"Picky: Efficient and reproducible sharing of large datasets using merkle-trees","author":"Hintze","year":"2016"},{"key":"10.1016\/j.simpat.2019.101987_bib0039","series-title":"2017 23RD Annual International Conference in Advanced Computing and Communications (ADCOM)","first-page":"40","article-title":"A peer to peer money transfer using SHA256 and Merkle tree","author":"Dhumwad","year":"2017"},{"key":"10.1016\/j.simpat.2019.101987_sbref0040","series-title":"1980 IEEE Symposium on Security and Privacy","article-title":"Protocols for public key cryptosystems","author":"Merkle","year":"1980"},{"key":"10.1016\/j.simpat.2019.101987_bib0041","unstructured":"S. Nakamoto, Bitcoin: apeer-to-peer electronic cash system, \u201dhttps:\/\/linproxy.fan.workers.dev:443\/http\/bitcoin.org\/bitcoin.pdf\u201d, 2008."}],"container-title":["Simulation Modelling Practice and Theory"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/api.elsevier.com\/content\/article\/PII:S1569190X19301200?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/api.elsevier.com\/content\/article\/PII:S1569190X19301200?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T21:33:04Z","timestamp":1761600784000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/linkinghub.elsevier.com\/retrieve\/pii\/S1569190X19301200"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7]]},"references-count":41,"alternative-id":["S1569190X19301200"],"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1016\/j.simpat.2019.101987","relation":{},"ISSN":["1569-190X"],"issn-type":[{"value":"1569-190X","type":"print"}],"subject":[],"published":{"date-parts":[[2020,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Blockchain based consensus checking in decentralized cloud storage","name":"articletitle","label":"Article Title"},{"value":"Simulation Modelling Practice and Theory","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1016\/j.simpat.2019.101987","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2019 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"101987"}}