[1]Mansouri Y, Toosi A N, Buyya R. Data storage management in cloud environments: Taxonomy, survey, and future directions[J]. ACM Computing Surveys (CSUR), 2017, 50(6): 151[2]Bennett T R, Gans N, Jafari R. Datadriven synchronization for InternetofThings systems[J]. ACM Trans on Embedded Computing Systems (TECS), 2017, 16(3): 124[3]Ge C, Liu Z, Fang L. A blockchain based decentralized data security mechanism for the Internet of things[J]. Journal of Parallel and Distributed Computing, 2020, 141: 19[4]Fauzi M A, Paiman N, Othman Z. Bitcoin and cryptocurrency: Challenges, opportunities and future works[J]. The Journal of Asian Finance, Economics and Business, 2020, 7(8): 695704[5]Kuznetsov A, Oleshko I, Tymchenko V, et al. Performance analysis of cryptographic hash functions suitable for use in blockchain[J]. International Journal of Computer Network and Information Security, 2021, 13(2): 115[6]Yadav A K, Agarwal A. A distributed architecture for transactions synchronization in distributed database systems[J]. International Journal on Computer Science and Engineering, 2010, 2(6): 19841991[7]Jabbar S, Lloyd H, Hammoudeh M, et al. Blockchainenabled supply chain: Analysis, challenges, and future directions[J]. Multimedia Systems, 2021, 27: 787806[8]Chen X, Zhang F, Susilo W, et al. Identitybased chameleon hashing and signatures without key exposure[J]. Information Sciences, 2014, 265: 198210[9]任艳丽, 翟梦娟, 胡明琪. 支持恶意惩罚的公平可编辑区块链方案[J]. 西安电子科技大学学报, 2023, 50(1): 203212[10]张彦华, 陈岩, 刘西蒙, 等. 标准模型下基于格的变色龙签名方案[J]. 电子与信息学报, 2024, 46(7): 30023009[11]冯朝胜, 秦志光, 袁丁. 云数据安全存储技术[J]. 计算机学报, 2015, 38(1): 150163[12]黄刘生, 田苗苗, 黄河. 大数据隐私保护密码技术研究综述[J]. 软件学报, 2015, 26(4): 945959 |