• 首页
  • 每日更新
  • 文献
  • 会议文献
  • 政策法规
  • 研究专题
  • 区块链游戏
logo 区块链前沿
  • 区块链前沿
  • 首页
  • 每日更新
  • 文献
  • 会议文献
  • 政策法规
  • 研究专题
  • 区块链游戏
  • 文章创新角色
  • 科研创新指数
  • 区块链领域本体
  • 热点主题挖掘
  • 主题展示
  • 专利文献
  • 排行榜
  • DAO治理
  • 文献上传
  • 积分获取规则
  • 大语言模型解析
  • 期刊发文分布
注册 登录

2022年03月31日 57篇

文献来源

  • 46
  • 11

主题分类

      • 12
      • 2
      • 2
      • 2
      • 2
      • 2
      • 1
      • 4
      • 1
      • 1
      • 1
      • 1
      • 2
      • 1
      • 1
      • 1
      • 1
      • 2
      • 1
      • 1
      • 2
      • 2
      • 2
      • 2
      • 1
      • 1
      • 1
      • 5

文献类型

  • 52
  • 5
筛选
订阅
<< 前一天 后一天 >>

The impact of a blockchain platform on trust in established relationships: a case study of wine supply chains

【Author】 Brookbanks, Mike Parry, Glenn

【影响因子】11.263

【主题类别】

区块链治理--

【Abstract】Purpose This paper examines the impact of a blockchain platform on the role and importance of trust in established buyer-supplier relationships. Design/methodology/approach A literature review provides insight into trust development in supply chains. Research uses a case study of two wine supply chains: the producers, importers, logistics companies and UK Government agencies. Semi-structured interviews determine how trust and trustworthiness develop in buyer-supplier relationships and the impact of a blockchain-based technology proof of concept on supply chain trust. Findings A blockchain-based platform introduces common trusted data, reducing data duplication and improving supply chain visibility. The platform supports trust building between parties but does not replace the requirements for organisations to establish a position of trust. Contrary to literature claims for blockchain trustless disintermediation, new intermediaries are introduced who need to be trusted. Research limitations/implications The case study presents challenges specific to UK customs borders, and research needs to be repeated in different contexts to establish if findings are generalisable. Practical implications A blockchain-based platform can improve supply chain efficiency and trust development but does not remove the need for trust and trust-building processes. Blockchain platform providers need to build a position of trust with all participants. Originality/value Case study research shows how blockchain facilitates but does not remove trust, trustworthiness and trust relationships in established supply chains. The reduction in information asymmetry and improved supply chain visibility provided by blockchain does not change the importance of trust in established buyer-supplier relationships or the trust-based policy of the UK Government at the customs border.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Visibility; Information asymmetry; Trust; Supply chain; Blockchain; Trust ecosystem

【发表时间】

【收录时间】2022-03-31

【文献类型】 期刊

【DOI】 10.1108/SCM-05-2021-0227

A Privacy-Preserving Storage Scheme for Logistics Data With Assistance of Blockchain

【Author】 Li, Hongzhi Han, Dezhi Tang, Mingdong

CCF-C

【影响因子】10.238

【主题类别】

区块链应用-物流领域-

【Abstract】In recent years, traditional logistics systems are developing toward intelligence based on the Internet of Things (IoT). Sensing devices throughout the logistics network provide strong support for smart logistics. However, due to the insufficient local computing and storage resources of IoT devices, logistics records with sensitive information are generally stored in a centralized cloud center, which could easily cause privacy leakage. In this study, we propose a blockchain-assisted secure storage scheme for logistics data. To be specific, this scheme can be briefly divided into two parts. The first part involves data generation and aggregation, session establishing, records encryption and storage, wherein a blockchain network is used to assist the cloud server with data storage, and smart contracts are deployed to provide reliable storage interfaces. In the second part, an efficient consensus mechanism is introduced to improve the efficiency of the consensus process. Also, the stored records can be securely audited by leveraging the deployed blockchain network. Finally, we analyze the security and privacy properties of this scheme and evaluate its performance in terms of computation and communication overhead by developing an experimental platform. The experimental results indicate that the performance of our scheme is acceptable.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Logistics; Blockchains; Internet of Things; Data privacy; Security; Cloud computing; Temperature distribution; Blockchain; consensus mechanism; logistics data; secure storage; smart logistics

【发表时间】2022

【收录时间】2022-03-31

【文献类型】 期刊

【DOI】 10.1109/JIOT.2021.3107846

IIoT Data Sharing Based on Blockchain: A Multileader Multifollower Stackelberg Game Approach

【Author】 Jiang, Yuna Zhong, Yi Ge, Xiaohu

CCF-C

【影响因子】10.238

【主题类别】

区块链技术-共识机制-

【Abstract】The evolution of the Industrial Internet of Things (IIoTs) greatly increases the volume of data generated by the connected IIoT devices. IIoT data are playing an increasingly important role in various industrial sectors. IIoT data sharing helps enterprises make better production decisions and respond to market changes timely. However, the distrust among IIoT entities and IIoT entities' distrust of data-sharing platforms may hinder the realization of data sharing. In this article, a decentralized IIoT data-sharing scheme based on blockchain and edge computing is proposed. A Proof of Storage and Transmission (PoST) consensus mechanism is proposed to meet data storage and transmission requirements of data owners in IIoT data-sharing networks. Based on the manufacture ties of data owners, shared data request probabilities are derived. The IIoT data sharing interactions between data owners and edge devices are modeled as a multiple-leader and multiple-follower Stackelberg game. The alternating direction method of multipliers (ADMMs) algorithm is used to obtain the optimal IIoT data sharing solutions in a distributed manner. Simulation results show that compared with the cooperative scheme, the total profit of edge devices is maximally increased by 59%, and the total utility of data owners is maximally increased by 52%.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Industrial Internet of Things; Blockchains; Games; Smart contracts; Memory; Distributed ledger; Access control; Alternating direction method of multipliers (ADMM) algorithm; blockchain; data sharing; Industrial Internet of Things (IIoTs); Stackelberg game

【发表时间】2022

【收录时间】2022-03-31

【文献类型】 期刊

【DOI】 10.1109/JIOT.2021.3103855

BCC: Blockchain-Based Collaborative Crowdsensing in Autonomous Vehicular Networks

【Author】 Hui, Yilong Huang, Yuanhao Su, Zhou Luan, Tom H. Cheng, Nan Xiao, Xiao Ding, Guoru

CCF-C

【影响因子】10.238

【主题类别】

区块链应用-交通领域-

【Abstract】The vehicular crowdsensing, which benefits from edge computing devices (ECDs) distributedly selecting autonomous vehicles (AVs) to complete the sensing tasks and collecting the sensing results, represents a practical and promising solution to facilitate the autonomous vehicular networks (AVNs). With frequent data transaction and rewards distribution in the crowdsensing process, how to design an integrated scheme which guarantees the privacy of AVs and enables the ECDs to earn rewards securely while minimizing the task execution cost (TEC) therefore becomes a challenge. To this end, in this article, we develop a blockchain-based collaborative crowdsensing (BCC) scheme to support secure and efficient vehicular crowdsensing in AVNs. In the BCC, by considering the potential attacks in the crowdsensing process, we first develop a secure crowdsensing environment by designing a blockchain-based transaction architecture to deal with privacy and security issues. With the designed architecture, we then propose a coalition game with a transferable reward to motivate AVs to cooperatively execute the crowdsensing tasks by jointly considering the requirements of the tasks and the available sensing resources of AVs. After that, based on the merge and split rules, a coalition formation algorithm is designed to help each ECD select a group of AVs to form the optimal crowdsensing coalition (OCC) with the target of minimizing the TEC. Finally, we evaluate the TEC of the task and the rewards of the ECDs by comparing the proposed scheme with other schemes. The results show that our scheme can lead to a lower TEC for completing crowdsensing tasks and bring higher rewards to ECDs than the conventional schemes.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Crowdsensing; Task analysis; Games; Sensors; Security; Privacy; Blockchains; Autonomous vehicular networks (AVNs); blockchain; coalition game; vehicular crowdsensing

【发表时间】2022

【收录时间】2022-03-31

【文献类型】 期刊

【DOI】 10.1109/JIOT.2021.3105547

zkRep: A Privacy-Preserving Scheme for Reputation-Based Blockchain System

【Author】 Huang, Chenyu Zhao, Yongjun Chen, Huangxun Wang, Xu Zhang, Qian Chen, Yanjiao Wang, Huaxiong Lam, Kwok-Yan

CCF-C

【影响因子】10.238

【主题类别】

区块链技术-隐私保护-

【Abstract】Reputation/trust-based blockchain systems have attracted considerable research interests for better integrating Internet of Things with blockchain in terms of throughput, scalability, energy efficiency, and incentive aspects. However, most existing works only consider static adversaries. Hence, they are vulnerable to slowly adaptive attackers, who can target validators with high reputation value to severely degrade the system performance. Therefore, we introduce zkRep, a privacy-preserving scheme tailored for reputation-based blockchains. Our basic idea is to hide both the identity and reputation of the validators by periodically changing the identity and reputation commitments (i.e., aliases), which makes it much more difficult for slowly adaptive attackers to identify validators with high reputation value. To realize this idea, we utilize privacy-preserving Pedersen-commitment-based reputation updating and leader election schemes that operate on concealed reputations within an epoch. We also introduce a privacy-preserving identity update protocol that changes the identity and time-window-based cumulative reputation commitments during each epoch transition. We have implemented and evaluated zkRep on the Amazon Web Service. The experimental results and analysis show that zkRep achieves great privacy-preserving features against slowly adaptive attacks with little overhead.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain; privacy-preserving; reputation

【发表时间】2022

【收录时间】2022-03-31

【文献类型】 期刊

【DOI】 10.1109/JIOT.2021.3105273

A Lightweight and Attack-Proof Bidirectional Blockchain Paradigm for Internet of Things

【Author】 Xu, Chenhao Qu, Youyang Luan, Tom H. Eklund, Peter W. Xiang, Yong Gao, Longxiang

CCF-C

【影响因子】10.238

【主题类别】

区块链应用-物联网领域-

【Abstract】Diverse technologies, such as machine learning and big data, have been driving the prosperity of the Internet of Things (IoT) and the ubiquitous proliferation of IoT devices. Consequently, it is natural that IoT becomes the driving force to meet the increasing demand for frictionless transactions. To secure transactions in IoT, blockchain is widely deployed since it can remove the necessity of a trusted central authority. However, the mainstream blockchain-based IoT payment platforms, dominated by Proof-of-Work (PoW) and Proof-of-Stake (PoS) consensus algorithms, face several major security and scalability challenges that result in system failures and financial loss. Among the three leading attacks in this scenario, double-spend attacks and long-range attacks threaten the tokens of blockchain users, while eclipse attacks target Denial of Service. To defeat these attacks, a novel bidirectional-linked blockchain (BLB) using chameleon hash functions is proposed, where bidirectional pointers are constructed between blocks. Furthermore, a new committee members auction (CMA) consensus algorithm is designed to improve the security and attack resistance of BLB while guaranteeing high scalability. In CMA, distributed blockchain nodes elect committee members through a verifiable random function. The smart contract uses Shamir's secret-sharing scheme to distribute the trapdoor keys to committee members. To better investigate BLB's resistance against double-spend attacks, an improved Nakamoto's attack analysis is presented. In addition, a modified entropy metric is devised to measure eclipse attack resistance across different consensus algorithms. Extensive evaluation results show the superior resistance against attacks and demonstrate high scalability of BLB compared with current leading paradigms based on PoS and PoW.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchains; Scalability; Consensus algorithm; Cryptography; Resistance; Internet of Things; Hash functions; Bidirectional blockchain; double-spend attack; eclipse attack; Internet of Things (IoT); long-range attack; scalability

【发表时间】2022

【收录时间】2022-03-31

【文献类型】 期刊

【DOI】 10.1109/JIOT.2021.3103275

LBlockchainE: A Lightweight Blockchain for Edge IoT-Enabled Maritime Transportation Systems

【Author】 Jiang, Yu Xu, Xiaolong Gao, Honghao Rajab, Adel D. Xiao, Fu Wang, Xinheng

CCF-B

【影响因子】9.551

【主题类别】

区块链应用-物流领域-

【Abstract】Blockchain can help edge IoT-enabled Maritime Transportation Systems (MTS) in solving its privacy and security problems. In this paper, a lightweight blockchain called LBlockchainE is designed for edge IoT-enabled MTS to guarantee the security of sensor data stored in an edge computing environment. To save the resources of edge servers on ship, a data placement strategy is proposed. To encourage edge servers to positively contribute to storing data generated by sensor devices, storage resource consumption is employed as an influencing parameter, and servers with abundant resources are selected for priority storage. The data placement strategy also takes care of the access delay between servers and selects the nodes with the least access and storage costs as the priority storage choice. LBlockchainE applies the low-energy-consumption characteristics of Proof of Stake to determine the ownership of bookkeeping rights through a small number of competitive calculations and the resources of the node. Experimental results indicate that compared with Ethereum, the consensus mechanism of LBlockchainE consumes less energy and occupies less storage space. On average, the new system uses 1.6% less time and consumes 78% less battery power compared with traditional blockchain systems. In comparison to the random storage, the best storage, and the optimal data storage strategies, the proposed strategy maintains the same message costs.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchains; Security; Servers; Internet of Things; Privacy; Marine vehicles; Costs; Edge IoT-enabled MTS; blockchain; edge computing; LBlockchainE; security

【发表时间】

【收录时间】2022-03-31

【文献类型】 期刊

【DOI】 10.1109/TITS.2022.3157447

Empowering Next-Generation IoT WLANs Through Blockchain and 802.11ax Technologies

【Author】 Abyaneh, Arezou Zamanyzadeh Zorba, Nizar Hamdaoui, Bechir

CCF-B

【影响因子】9.551

【主题类别】

区块链应用--

【Abstract】Blockchain emerges as a potential solution for enabling distributed management and accountability of wireless Internet of Thing (IoT) networks. In addition, blockchain offers increased IoT security, as it involves every single node around the network to verify and approve new transactions. On the other hand, IEEE 802.11ax, a recently concluded WiFi standard aimed at achieving high network efficiency, plays a key role for solving spectrum sharing and cross-technology coexistence among WiFi and 6G cellular users, one of the key challenges faced by next-generation wireless systems. In this paper, we leverage the power of blockchain and 802.11ax technologies to propose a medium access control (MAC) protocol design for future IoT wireless local area networks (WLANs), also referred to as wireless IoT-Blockchain networks setup. Our simulation results show that the proposed protocol design enhances transmission latency and achievable network throughput.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchains; Peer-to-peer computing; Wireless communication; Wireless sensor networks; Internet of Things; IEEE 802; 11ax Standard; Communication system security; Blockchain; proof-of-work; proof-of-stake; internet of things; 802; 11ax; medium access control; delay; throughput

【发表时间】

【收录时间】2022-03-31

【文献类型】 期刊

【DOI】 10.1109/TITS.2022.3153484

Federation in Dynamic Environments: Can Blockchain Be the Solution?

【Author】 Antevski, Kiril Bernardos, Carlos J.

【影响因子】9.030

【主题类别】

区块链应用-网络安全-

【Abstract】Deploying multi-domain network services is becoming a need for operators. However, achieving that in a real operational environment is not easy and requires the use of federation. Federation is a multi-domain concept that enables the use and orchestration of network services/resources to/from external administrative domains. In this article, we first characterize the federation concept and involved procedures, and then dive into the challenges that emerge when federation is performed in dynamic environments. To tackle these challenges, we propose the application of blockchain technology, identifying some associated high-level benefits. Last, we validate our proposed approach by conducting a small experimental scenario using Tendermint, an application-based blockchain.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchains; Telecommunication network management; Federated identity

【发表时间】2022

【收录时间】2022-03-31

【文献类型】 期刊

【DOI】 10.1109/MCOM.001.2100585

Permissionless and Permissioned, Technology-Focused and Business Needs-Driven: Understanding the Hybrid Opportunity in Blockchain Through a Case Study of Insolar

【Author】 Kim, Henry M. Turesson, Hjalmar Laskowski, Marek Bahreini, Amir Fard

【影响因子】8.702

【主题类别】

区块链治理--

【Abstract】Blockchains can be public, permissionless networks implementing novel cryptocurrency-based technology features or permissioned, interorganizational networks championed by industry consortia. Some ventures operationalize a hybrid of these two network types to enhance adoption of their blockchain platforms by broadening their base of stakeholders or facilitating interoperability between heterogeneous blockchains. In this article, we synthesize literature and industry writings to identify four hybrid blockchain architectures: hybrid blockchain approach, connected hybrid blockchain, interoperable blockchain architecture, and hard-forked blockchain for enterprise use. We then analyze these architectures along dimensions of semantic modeling support between private and public networks, data connectivity between networks, syntactic interoperability support between networks with heterogeneous codebases, governance model, and technical features. We find that hybrid blockchain ventures make trade-offs: support API's, tools, and customized development so that a codebase is useful for private and public networks or provide such support for interoperation between heterogeneous codebases. We then conduct a case study of an exemplar for a hybrid blockchain approach, the startup Insolar. We identify characteristics that have led Insolar to be idiosyncratically agile and effective in its blockchain development, which together with our architecture analysis may be timely and prescriptive as enterprises grow interested in addressing blockchain hybridity and interoperability.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain; Interoperability; Bitcoin; Stakeholders; Analytical models; Blockchain; blockchain interoperability; hybrid blockchains

【发表时间】2022

【收录时间】2022-03-31

【文献类型】 期刊

【DOI】 10.1109/TEM.2020.3003565

Fostering Customer Bargaining and E-Procurement Through a Decentralised Marketplace on the Blockchain

【Author】 Martins, Joao Parente, Manuel Amorim-Lopes, Mario Amaral, Luis Figueira, Goncalo Rocha, Pedro Amorim, Pedro

【影响因子】8.702

【主题类别】

区块链应用-电商领域-

【Abstract】Firms have available many forms of collaboration, including cooperatives or joint ventures, in this way leveraging their market power. Customers, however, are atomic agents with few mechanisms for collaborating, leading to an unbalanced buyer-supplier relationship and economic surpluses that shift to producers. Some group buying websites helped alleviate the problem by offering bulk discounts, but more advancements can be made with the emergence of technologies, such as the blockchain. In this article, we propose a customer-push e-marketplace built on top of Ethereum, where customers can aggregate their proposals, and suppliers try to outcompete each other in reverse auction bids to fulfil the order. Furthermore, smart contracts make it possible to automate many operational activities, such as payment escrows/release upon delivery confirmation, increasing the efficiency along the supply chain. The implementation of this network is expected to improve market efficiency by reducing transaction costs, time delays, and information asymmetry. Furthermore, concepts such as increased bargaining power and economies of scale, and their effects in buyer-supplier relationships, are also explored.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Contracts; Collaboration; Economics; Aggregates; Supply chains; Blockchain; buyer-supplier relationship; decentralized marketplace (DM); reputation system; supply chain management (SCM)

【发表时间】2022

【收录时间】2022-03-31

【文献类型】 期刊

【DOI】 10.1109/TEM.2020.3021242

Decentralized Blockchain-Based Trust Management Protocol for the Internet of Things

【Author】 Kouicem, Djamel Eddine Imine, Youcef Bouabdallah, Abdelmadjid Lakhlef, Hicham

CCF-A

【影响因子】6.791

【主题类别】

区块链应用-物联网领域-

【Abstract】The Internet of Things (IoT) is a network that integrates a variety of heterogeneous nodes, such as connected devices (sensors, robots, and smart phones...), connected cars, smart homes, etc. These smart objects communicate and collaborate in distributed and dynamic environments that are facing several security challenges. Trust management is one of the most important challenges in IoT. Existing trust management solutions do not meet the new requirements of IoT such as heterogeneity, mobility, and scalability. In this article, we propose a hierarchical and scalable blockchain-based trust management protocol with mobility support in massively distributed IoT systems. In our protocol, mobile smart objects disseminate trust information on service providers to the blockchain. Thus, all the objects will have a global view on each service provider in the architecture, which speeds up the trust evaluation process. In addition, our protocol is resilient against the most known malicious attacks such as bad-mouthing, ballot-stuffing, and cooperative attacks. We confirm the efficiency of our proposal through theoretical analysis and extensive simulations. Finally, we show that it outperforms existing solutions, especially in terms of scalability, mobility support, communication, and computation costs.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Trust management; internet of things; blockchain; fog computing; mobility support

【发表时间】2022

【收录时间】2022-03-31

【文献类型】 期刊

【DOI】 10.1109/TDSC.2020.3003232

Malware in the SGX Supply Chain: Be Careful When Signing Enclaves!

【Author】 Craciun, Vlad Felber, Pascal Mogage, Andrei Onica, Emanuel Pires, Rafael

CCF-A

【影响因子】6.791

【主题类别】

区块链技术-恶意软件检测-

【Abstract】Malware attacks are a significant part of the new software security threats detected each year. Intel Software Guard Extensions (SGX) are a set of hardware instructions introduced by Intel in their recent lines of processors that are intended to provide a secure execution environment for user-developed applications. To our knowledge, there was no serious attempt yet to overcome the SGX protection by exploiting the weaknesses in the software supply chain infrastructure, namely at the level of the development, build or signing servers. While SGX protection does not specifically take into consideration such threats, we show in the current article that a simple malware attack exploiting a separation between the build and signing processes can have a serious damaging impact, practically nullifying SGX integrity protection measures. We also explore two possible mitigations against the attack, one centralized leveraging SGX itself, and one distributed that relies on a smart contract deployed on a blockchain infrastructure. Our evaluation shows that both methods are feasible in practice and their added costs are acceptable for the offered protection.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Malware; Supply chains; Buildings; Servers; Software packages; Monitoring; Security; dependable software; supply chain; malware; SGX; blockchain

【发表时间】2022

【收录时间】2022-03-31

【文献类型】 期刊

【DOI】 10.1109/TDSC.2020.3024562

Intraday volume-return nexus in cryptocurrency markets: Novel evidence from cryptocurrency classification

【Author】 Yarovaya, Larisa Zieba, Damian

【影响因子】6.143

【主题类别】

区块链治理--

【Abstract】This paper analyses the volume-return relationships across the top 30 most traded cryptocurrencies from February 2018 to July 2019 using high-frequency intraday data. We use a novel approach for the classification of cryptocurrencies with respect to multiple qualitative factors, such as geographical location of headquarters, founder and founder's origin, platform on which the cryptocurrency is built, and consensus algorithm, among others. We identify significant bidirectional causalities between trading volume and returns at different high-frequency intervals; however, those linkages are weakening with decreasing data frequencies. The findings confirm the leading position of the Bitcoin trading volume in the cryptocurrency price formation. This evidence will help investors to design effective trading strategies in cryptocurrency markets providing useful insights from cryptocurrency categorisation.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Cryptocurrency classification; Bitcoin; Volume-return relationships; Granger causality

【发表时间】2022

【收录时间】2022-03-31

【文献类型】 期刊

【DOI】 10.1016/j.ribaf.2021.101592

A conceptual framework for designing blockchain technology enabled supply chains

【Author】 Oh, Jaeyoung Choi, Yunsik In, Joonhwan

【影响因子】5.992

【主题类别】

区块链治理--

【Abstract】Despite the growing popularity of blockchain technology (BT) applications in a supply chain (SC), the academic literature has failed to offer a complete picture of BT embedded in SC, hereafter referred to as BT-enabled SC, while focusing on BT's specifics. Against this backdrop, this paper aims to develop a conceptual framework by identifying BT's multifaceted features and clarifying their roles in designing BT-enabled SCs. Specifically, we delve into BT's extant definitions in business disciplines as a basis for identifying BT's key attributes and elucidate how these attributes can be incorporated into the design of BT-enabled SCs by introducing the framework that encompasses the strategic, configural, and operational spheres. This paper contributes to clarifying BT's conceptual boundary by framing BT as a stack of technologies and applications - seven dimensions. Based on seven dimensions, the proposed framework offers guidance on how to design BT-enabled SCs.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain; blockchain dimensions; supply chain management; blockchain technology-enabled supply chain

【发表时间】

【收录时间】2022-03-31

【文献类型】 期刊

【DOI】 10.1080/13675567.2022.2052824

Improved PBFT algorithm for high-frequency trading scenarios of alliance blockchain

【Author】 Tang, Song Wang, Zhiqiang Jiang, Jian Ge, Suli Tan, GaiFang

【影响因子】4.996

【主题类别】

区块链技术-共识算法-

【Abstract】With the continuous development of blockchain technology, the application scenarios of alliance blockchain are also increasing. The consensus algorithm can achieve distributed consensus among nodes in the network. At present, the practical byzantine fault tolerance algorithm (PBFT) consensus algorithm commonly used in alliance blockchain requires all nodes in the network to participate in the consensus process. Experiments show that when the number of consensus nodes in the system exceeds 100, the bandwidth consumption and consensus delay will greatly increase, resulting in the inability of PBFT to be applied. In scenes with many nodes. How to improve the performance of alliance blockchains safely and efficiently has become an urgent problem to be solved at present. For the PBFT commonly used in alliance blockchains, there are some problems, such as large communication overhead, simple selection of master nodes, and inability to expand and exit nodes dynamically in the network. This paper proposes an improved algorithm tPBFT (trust-based practical Byzantine algorithm), which is suitable for high-frequency trading scenarios of consortium chains. By introducing a trust equity scoring mechanism between nodes in the network, the list of consensus nodes can be dynamically adjusted. tPBFT simplifies the pre-prepare stage of the PBFT consensus process, and realizes the verification of the hash transaction list in the reply stage, thereby reducing the interaction overhead between network nodes. Theoretical analysis and experiments show that when the number of nodes in the network is greater than 30, with the further increase of the number of nodes, the improved tPBFT algorithm has a relatively large performance in terms of node communication overhead, consensus efficiency and scalability outperforms the PBFT algorithm.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】

【发表时间】2022

【收录时间】2022-03-31

【文献类型】 期刊

【DOI】 10.1038/s41598-022-08587-1

User Control of Personal mHealth Data Using a Mobile Blockchain App: Design Science Perspective

【Author】 Sengupta, Arijit Subramanian, Hemang

【影响因子】4.947

【主题类别】

区块链应用-医疗领域-

【Abstract】Background: Integrating pervasive computing with blockchain's ability to store privacy-protected mobile health (mHealth) data while providing Health Insurance Portability and Accountability Act (HIPAA) compliance is a challenge. Patients use a multitude of devices, apps, and services to collect and store mHealth data. We present the design of an internet of things (IoT)-based configurable blockchain with different mHealth apps on iOS and Android, which collect the same user's data. We discuss the advantages of using such a blockchain architecture and demonstrate 2 things: the ease with which users can retain full control of their pervasive mHealth data and the ease with which HIPAA compliance can be accomplished by providers who choose to access user data. Objective: The purpose of this paper is to design, evaluate, and test IoT-based mHealth data using wearable devices and an efficient, configurable blockchain, which has been designed and implemented from the first principles to store such data. The purpose of this paper is also to demonstrate the privacy-preserving and HIPAA-compliant nature of pervasive computing-based personalized health care systems that provide users with total control of their own data. Methods: This paper followed the methodical design science approach adapted in information systems, wherein we evaluated prior designs, proposed enhancements with a blockchain design pattern published by the same authors, and used the design to support IoT transactions. We prototyped both the blockchain and IoT-based mHealth apps in different devices and tested all use cases that formed the design goals for such a system. Specifically, we validated the design goals for our system using the HIPAA checklist for businesses and proved the compliance of our architecture for mHealth data on pervasive computing devices. Results: Blockchain-based personalized health care systems provide several advantages over traditional systems. They provide and support extreme privacy protection, provide the ability to share personalized data and delete data upon request, and support the ability to analyze such data. Conclusions: We conclude that blockchains, specifically the consensus, hasher, storer, miner architecture presented in this paper, with configurable modules and software as a service model, provide many advantages for patients using pervasive devices that store mHealth data on the blockchain. Among them is the ability to store, retrieve, and modify ones generated health care data with a single private key across devices. These data are transparent, stored perennially, and provide patients with privacy and pseudoanonymity, in addition to very strong encryption for data access. Firms and device manufacturers would benefit from such an approach wherein they relinquish user data control while giving users the ability to select and offer their own mHealth data on data marketplaces. We show that such an architecture complies with the stringent requirements of HIPAA for patient data access.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】blockchain; mobile apps; mining; HIPAA; personal health data; data privacy preservation; security; accuracy; transaction safety

【发表时间】2022

【收录时间】2022-03-31

【文献类型】 期刊

【DOI】 10.2196/32104

Compact Multiple Attribute-Based Signatures With Key Aggregation and Its Application

【Author】 Guo, Rui Li, Kemeng Li, Xiong Zhang, Yinghui Li, Xuelei

【影响因子】4.802

【主题类别】

区块链技术-密码学-

【Abstract】In blockchain-enabled applications, it is difficult to preserve privacy completely because of the openness of each signer's public key. In this article, an efficient multiattribute-based signature scheme with key aggregation (M-ABS-KA) is presented that supports a flexible threshold predicate. This construction aggregates the public keys and provides a compact signature that is verified as a group, which realizes faster batch verification than confirming them individually. Furthermore, both the multisignature scale and the public key length are independent of the number of signers and attributes in this scheme. To the best of our knowledge, this M-ABS-KA scheme is the first multi-ABS protocol with an aggregated public key and fast batch verification. Based on the hardness of the computational Diffie-Hellman problem, it is formally proven that the proposal achieves unforgeability in the random oracle model and enjoys signer privacy. Additionally, the performance is evaluated in theoretical and experimental analyses with other related ABS schemes, and the results show that it is feasible and efficient in storage, bandwidth, and computational cost. Finally, as an illustrative application, we design a framework of the blockchain-enabled electronic health records assessment system based on this presented M-ABS-KA scheme.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchains; Public key; Protocols; Privacy; Servers; Bitcoin; Research and development; Batch verification; blockchain; electronic health records (EHRs); key aggregation; multiple attribute-based signatures (ABS)

【发表时间】

【收录时间】2022-03-31

【文献类型】 期刊

【DOI】 10.1109/JSYST.2022.3148989

Privacy-Preserving Scheme With Account-Mapping and Noise-Adding for Energy Trading Based on Consortium Blockchain

【Author】 Zhang, Xiaoyan Jiang, Shunrong Liu, Yiliang Jiang, Tao Zhou, Yong

CCF-C

【影响因子】4.758

【主题类别】

区块链应用-能源领域-

【Abstract】The maturity in information technology and new energy technologies enables participants to generate, buy, and sell energy in energy trading systems. Although applying blockchain technology to energy trading has solved some drawbacks in traditional centralized energy systems, the openness and transparency characteristics make the trading records stored on the blockchain vulnerable to data-mining attacks that may cause indispensable privacy leakage. Due to high efficiency and low overhead, noise-addition is an appropriate solution for privacy preservation. Nonetheless, recent research on noise-addition needs to generate massive accounts, which brings a certain amount of waste and inconvenience for later regulation and management. To avoid the aforementioned issues, this paper proposes a consortium blockchain-enabled scheme to ensure the privacy of data stored on the blockchain and resist linking attacks initiated by data mining algorithms. Our scheme utilizes a dynamic partition algorithm to leverage an account mapping algorithm and a virtual token algorithm. Specifically, the account mapping algorithm utilizes a dynamic account allocation method to hide the trading distribution of active users. Furthermore, the virtual token algorithm applies Laplace noise to hide the actual energy consumption of inactive users and curb excessive accounts generation. Finally, we formally demonstrate the privacy and effectiveness of our proposed scheme in security analysis and experiment evaluations.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchains; Privacy; Heuristic algorithms; Batteries; Partitioning algorithms; Encryption; Differential privacy; Consortium blockchain; neighboring energy trading; privacy-preserving; account mapping; Laplace noise

【发表时间】2022

【收录时间】2022-03-31

【文献类型】 期刊

【DOI】 10.1109/TNSM.2021.3110980

A Blockchain-Powered Data Market for Multi-User Cooperative Search

【Author】 Jiang, Suhan Wu, Jie

CCF-C

【影响因子】4.758

【主题类别】

区块链技术-分布式存储-

【Abstract】Cloud computing provides a feasible solution to data outsourcing, and hence forming a cloud-based data market, where data users buy data from owners through querying cloud servers. However, it also incurs new privacy and security problems, as data is under a centralized third-party instead of the data owner's direct control. Existing data markets are also questioned on their inflexible and opaque pricing, where the value of data ownership and the cost of query searches are mixed. In this paper, we consider blockchain-based storage as a better choice to ensure safe data outsourcing since data is spread out across many data points. We propose an Ethereum-based data market that provides distributed storage and correct remote data search. We design a new pricing model, where each query will be charged by two parties: owner (paid for providing his data) and miner (rewarded by performing query searches). We study a new cooperative search scheme through a proxy to reduce cost on the user side. Given that each user query is charged based on its number of keywords, then a cooperative search can reduce user-side cost by combining multiple queries into a group so that overlapped keywords will only be charged for one time. To ensure user QoE, a combined query should not be significantly larger than any of its original queries in terms of the number of keywords. The total price is based on the total number of keywords in all groups. Since it is a cooperative model with shared resources, we also study various incentive properties on the user side, yielding a cost sharing mechanism to split joint cost in a truth-revealing and fair manner. We further extend our market with a set of substitute data owners and propose a double auction mechanism to match users and owners based on their requirements. Experiments have been conducted on real query trace to demonstrate the effectiveness of our proposed scheme.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Costs; Delays; Blockchains; Pricing; Smart contracts; Memory; Data models; Blockchain; cooperative search; cost model; cost sharing; double auction; grouping strategy

【发表时间】2022

【收录时间】2022-03-31

【文献类型】 期刊

【DOI】 10.1109/TNSM.2021.3125604

Blockchain-Enabled Resource Trading and Deep Reinforcement Learning-Based Autonomous RAN Slicing in 5G

【Author】 Boateng, Gordon Owusu Ayepah-Mensah, Daniel Doe, Daniel Mawunyo Mohammed, Abegaz Sun, Guolin Liu, Guisong

CCF-C

【影响因子】4.758

【主题类别】

区块链技术-共识机制-

【Abstract】The advent of radio access network (RAN) slicing is envisioned as a new paradigm for accommodating different virtualized networks on a single infrastructure in 5G and beyond. Consequently, infrastructure providers (InPs) desire virtualized networks to share their subleased resources for effective resource management. Nonetheless, security and privacy challenges in the wireless network deter operators from collaborating with one another for resource trading. Lately, blockchain technology has received overwhelming attention for secure resource trading thanks to its security features. This paper proposes a novel hierarchical framework for blockchain-based resource trading among peer-to-peer (P2P) mobile virtual network operators (MVNOs), for autonomous resource slicing in 5G RAN. Specifically, a consortium blockchain network that supports hyperledger smart contract (SC) is deployed to set up secure resource trading among seller and buyer MVNOs. With the aim of designing a fair incentive mechanism, we model the pricing and demand problem of the seller and buyers as a two-stage Stackelberg game, where the seller MVNO is the leader and buyer MVNOs are followers. To achieve a Stackelberg equilibrium (SE) for the formulated game, a dueling deep Q-network (Dueling DQN) scheme is designed to achieve optimal pricing and demand policies for autonomous resource allocation at negotiation interval. Comprehensive simulation results analysis prove that the proposed scheme reduces double spending attacks by 12% in resource trading settings, and maximizes the utilities of players. The proposed scheme also outperforms deep Q-Network (DQN), Q-learning (QL) and greedy algorithm (GA), in terms of slice and system level satisfaction and resource utilization.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchains; Resource management; 5G mobile communication; Games; Dynamic scheduling; Security; Pricing; Blockchain; deep reinforcement learning; network slicing; resource trading; stackelberg game; 5G

【发表时间】2022

【收录时间】2022-03-31

【文献类型】 期刊

【DOI】 10.1109/TNSM.2021.3124046

NetChain: A Blockchain-Enabled Privacy-Preserving Multi-Domain Network Slice Orchestration Architecture

【Author】 He, Guobiao Su, Wei Gao, Shuai Liu, Ningchun Das, Sajal K.

CCF-C

【影响因子】4.758

【主题类别】

区块链技术-密码学-

【Abstract】Multi-domain networking slice orchestration is an essential technology for the programmable and cloud-native 5G network. However, existing research solutions are either based on the impractical assumption that operators will reveal all the private network information or time-consuming secure multi-party computation which is only applicable to limited computation scenarios. To provide agile and privacy-preserving end-to-end network slice orchestration services, this paper proposes NetChain, a multi-domain network slice orchestration architecture based on blockchain and trusted execution environment. Correspondingly, we design a novel consensus algorithm CoNet to ensure the strong security, scalability, and information consistency of NetChain. In addition, a bilateral evaluation mechanism based on game theory is proposed to guarantee fairness and Quality of Experience by suppressing the malicious behaviors during multi-domain network slice orchestration. Finally, the prototype of NetChain is implemented and evaluated on the Microsoft Azure Cloud with confidential computing. Experiment results show that NetChain has good performance and security under the premise of privacy-preserving.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Security; Computer architecture; Privacy; Scalability; Blockchains; Faces; Consensus algorithm; Multi-domain network slicing; privacy-preserving; blockchain; TEE

【发表时间】2022

【收录时间】2022-03-31

【文献类型】 期刊

【DOI】 10.1109/TNSM.2021.3110057

Decentralized On-Chain Data Access via Smart Contracts in Ethereum Blockchain

【Author】 Chishti, Mohd Sameen Sufyan, Farhan Banerjee, Amit

CCF-C

【影响因子】4.758

【主题类别】

区块链技术-智能合约-

【Abstract】Smart contracts in Ethereum blockchain network are self-executable scripts used for managing tokenized assets and access rights between different entities on the blockchain network. They are significant addition to blockchain technology for achieving data transparency and reliability in maintaining the digital relationship between two or more entities. However, the smart contract is in its nascent stage and suffers from various limitations, including immutability and code secrecy. In this paper, we address the inability of smart contracts to access the on-chain data. The smart contract currently fetches the on-chain data by taking external oracle assistance, which can be compromised to influence the customers. To address the issue, we propose a decentralized mechanism for accessing the blockchain data directly from the smart contracts by indexing single or multiple parameters of a transaction in each block using the Merkle-Patricia Trie (MPT). The idea is to increase the data transparency of blockchain applications. The paper provides a sequential search methodology that can retrieve transactions from N blocks, satisfying specific conditions, in O(N). The complexity is further reduced to O(N/k) by partitioning the blockchain data into k disjoint subsets to achieve parallelism in the search procedure. We experimentally verify the effectiveness of the proposed methodology with a case study on the Ethereum blockchain data.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Smart Contract; On-Chain Data; Sequential and Parallel Query Processing; Merkle-Patricia Trie (MPT)

【发表时间】2022

【收录时间】2022-03-31

【文献类型】 期刊

【DOI】 10.1109/TNSM.2021.3120912

Federated Learning with Blockchain Assisted Image Classification for Clustered UAV Networks

【Author】 Abunadi, Ibrahim Althobaiti, Maha M. Al-Wesabi, Fahd N. Hilal, Anwer Mustafa Medani, Mohammad Hamza, Manar Ahmed Rizwanullah, Mohammed Zamani, Abu Serwar

【影响因子】3.860

【主题类别】

区块链应用-无人机-

【Abstract】The evolving "Industry 4.0" domain encompasses a collection of future industrial developments with cyber-physical systems (CPS), Internet of things (IoT), big data, cloud computing, etc. Besides, the industrial Internet of things (IIoT) directs data from systems for monitoring and controlling the physical world to the data processing system. A major novelty of the IIoT is the unmanned aerial vehicles (UAVs), which are treated as an efficient remote sensing technique to gather data from large regions. UAVs are commonly employed in the industrial sector to solve several issues and help decision making. But the strict regulations leading to data privacy possibly hinder data sharing across autonomous UAVs. Federated learning (FL) becomes a recent advancement of machine learning (ML) which aims to protect user data. In this aspect, this study designs federated learning with blockchain assisted image classification model for clustered UAV networks (FLBIC-CUAV) on IIoT environment. The proposed FLBIC-CUAV technique involves three major processes namely clustering, blockchain enabled secure communication and FL based image classification. For UAV cluster construction process, beetle swarm optimization (BSO) algorithm with three input parameters is designed to cluster the UAVs for effective communication. In addition, blockchain enabled secure data transmission process take place to transmit the data from UAVs to cloud servers. Finally, the cloud server uses an FL with Residual Network model to carry out the image classification process. A wide range of simulation analyses takes place for ensuring the betterment of the FLBIC-CUAV approach. The experimental outcomes portrayed the betterment of the FLBIC-CUAV approach over the recent state of art methods.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】UAV networks; clustering; secure communication; blockchain; federated learning; image classification

【发表时间】2022

【收录时间】2022-03-31

【文献类型】 期刊

【DOI】 10.32604/cmc.2022.025473

A Systematic Review on Machine Learning and Deep Learning Models for Electronic Information Security in Mobile Networks

【Author】 Gupta, Chaitanya Johri, Ishita Srinivasan, Kathiravan Hu, Yuh-Chung Qaisar, Saeed Mian Huang, Kuo-Yi

【影响因子】3.847

【主题类别】

区块链技术--

【Abstract】Today's advancements in wireless communication technologies have resulted in a tremendous volume of data being generated. Most of our information is part of a widespread network that connects various devices across the globe. The capabilities of electronic devices are also increasing day by day, which leads to more generation and sharing of information. Similarly, as mobile network topologies become more diverse and complicated, the incidence of security breaches has increased. It has hampered the uptake of smart mobile apps and services, which has been accentuated by the large variety of platforms that provide data, storage, computation, and application services to end-users. It becomes necessary in such scenarios to protect data and check its use and misuse. According to the research, an artificial intelligence-based security model should assure the secrecy, integrity, and authenticity of the system, its equipment, and the protocols that control the network, independent of its generation, in order to deal with such a complicated network. The open difficulties that mobile networks still face, such as unauthorised network scanning, fraud links, and so on, have been thoroughly examined. Numerous ML and DL techniques that can be utilised to create a secure environment, as well as various cyber security threats, are discussed. We address the necessity to develop new approaches to provide high security of electronic data in mobile networks because the possibilities for increasing mobile network security are inexhaustible.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】network; information security; cyber security; artificial intelligence; machine learning; deep learning; threats; cyber-attacks; vulnerabilities

【发表时间】2022

【收录时间】2022-03-31

【文献类型】 期刊

【DOI】 10.3390/s22052017

Elastic Resource Allocation Against Imbalanced Transaction Assignments in Sharding-Based Permissioned Blockchains

【Author】 Huang, Huawei Yue, Zhengyu Peng, Xiaowen He, Liuding Chen, Wuhui Dai, Hong-Ning Zheng, Zibin Guo, Song

CCF-A

【影响因子】3.757

【主题类别】

区块链技术-分布式存储-

【Abstract】This article studies the PBFT-based sharded permissioned blockchain, which executes in either a local datacenter or a rented cloud platform. In such permissioned blockchain, the transaction (TX) assignment strategy could be malicious such that the network shards may possibly receive imbalanced transactions or even bursty-TX injection attacks. An imbalanced transaction assignment brings serious threats to the stability of the sharded blockchain. A stable sharded blockchain can ensure that each shard processes the arrived transactions timely. Since the system stability is closely related to the blockchain throughput, how to maintain a stable sharded blockchain becomes a challenge. To depict the transaction processing in each network shard, we adopt the Lyapunov Optimization framework. Exploiting drift-plus-penalty (DPP) technique, we then propose an adaptive resource-allocation algorithm, which can yield the near-optimal solution for each network shard while the shard queues can also be stably maintained. We also rigorously analyze the theoretical boundaries of both the system objective and the queue length of shards. The numerical results show that the proposed algorithm can achieve a better balance between resource consumption and queue stability than other baselines. We particularly evaluate two representative cases of bursty-TX injection attacks, i.e., the continued attacks against all network shards and the drastic attacks against a single network shard. The evaluation results show that the DPP-based algorithm can well alleviate the imbalanced TX assignment, and simultaneously maintain high throughput while consuming fewer resources than other baselines.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchains; Protocols; Stability analysis; Throughput; Numerical stability; Bitcoin; Scalability; System stability; sharded blockchain; queueing theory; imbalanced transaction assignment

【发表时间】2022

【收录时间】2022-03-31

【文献类型】 期刊

【DOI】 10.1109/TPDS.2022.3141737

VigilRx: A Scalable and Interoperable Prescription Management System Using Blockchain

【Author】 Taylor, Alixandra Kugler, Austin Marella, Praneeth Babu Dagher, Gaby G.

【影响因子】3.476

【主题类别】

区块链应用-医疗领域-

【Abstract】Achieving interoperability between healthcare providers is a major challenge. Current systems for managing prescription records suffer from data siloing, unnecessary record duplication, and slow record transfers. In many systems, patients do not retain control over their prescription data. Instead, they must use an intermediary to access or transfer their records. Furthermore, record transfers suffer from differing standards between providers, outdated communication methods, and information blocking. Solving these problems necessitates the creation of an interoperable prescription management system. Realizing such a system requires considering security, efficiency, scalability, and other challenges. Recent regulatory actions attempt to address these challenges, but fundamental issues persist. This paper proposes a patient-centric and interoperable prescription system that ensures patient control, prevents information blocking, and improves transfer efficiency. We call our solution VigilRx-a system that uses blockchain and smart contracts to manage prescriptions. Stakeholders exist as one of three role-based smart contracts within the system: patient, prescriber, or pharmacy. These role contracts ensure the system is patient-centric by assigning ownership of prescription records directly to patients. Our smart contracts also ensure the system's interoperability, as we use a standardized prescription contract to ensure records can be easily managed. VigilRx's use of blockchain also promotes transparency by providing patients an explicit list of parties that hold permission to access their records. Use of existing software patterns allows the system to adapt as needed. We implement VigilRx and show that it is both scalable and efficient.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchains; Stakeholders; Medical services; Databases; Smart contracts; Access control; Software; Blockchain; electronic health records; Ethereum; healthcare; prescriptions; smart contracts

【发表时间】2022

【收录时间】2022-03-31

【文献类型】 期刊

【DOI】 10.1109/ACCESS.2022.3156015

Cryptomining malware detection based on edge computing-oriented multi-modal features deep learning

【Author】 Lian, Wenjuan Nie, Guoqing Kang, Yanyan Jia, Bin Zhang, Yang

【影响因子】3.170

【主题类别】

区块链技术-挖矿检测-

【Abstract】In recent years, with the increase in the price of cryptocurrencies, the number of malicious cryptomining software has increased significantly. With their powerful spreading ability, cryptomining malware can unknowingly occupy our resources, harm our interests, and damage more legitimate assets. However, although current traditional rule-based malware detection methods have a low false alarm rate, they have a relatively low detection rate when faced with a large volume of emerging malware. Even though common machine learning-based or deep learning-based methods have certain ability to learn and detect unknown malware, the characteristics they learn are single and independent, and cannot be learned adaptively. Aiming at the above problems, we propose a deep learning model with multi-input of multi-modal features, which can simultaneously accept digital features and image features on different dimensions. The model in turn includes parallel learning of three sub-models and ensemble learning of another specific sub-model. The four sub-models can be processed in parallel on different devices and can be further applied to edge computing environments. The model can adaptively learn multi-modal features and output prediction results. The detection rate of our model is as high as 97.01% and the false alarm rate is only 0.63%. The experimental results prove the advantage and effectiveness of the proposed method.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Feature extraction; Deep learning; Malware; Histograms; Predictive models; Gray-scale; Computational modeling; cryptomining malware; multi-modal; ensemble learning; deep learning; edge computing

【发表时间】2022

【收录时间】2022-03-31

【文献类型】 期刊

【DOI】 10.23919/JCC.2022.02.014

Research on Agricultural Product Traceability Technology (Economic Value) Based on Information Supervision and Cloud Computing

【Author】 Wang, Rongkuan Chen, Xi

【影响因子】3.120

【主题类别】

区块链应用-产品溯源-

【Abstract】Traditional agricultural product traceability system adopts centralized storage, and the traceability process is solidified, which results in the low reliability of traceability results and the poor flexibility of the system. Aiming to solve this problem, blockchain technology is applied to supply chain traceability, and a supply chain traceability system based on sidechain technology is proposed. Goods management, information sharing, and product traceability in supply chain are realized through Ethereum smart contract. The sidechain technology is adopted to expand Ethereum so that it can meet the needs of practical applications. The experiment results show that the proposed system has a transaction function and information sharing function. Compared with similar trading systems, the proposed system has more advantages in throughput and security.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】

【发表时间】2022

【收录时间】2022-03-31

【文献类型】 期刊

【DOI】 10.1155/2022/4687639

Modified Lamport Merkle Digital Signature blockchain framework for authentication of internet of things healthcare data

【Author】 Mehbodniya, Abolfazl Webber, Julian L. Neware, Rahul Arslan, Farrukh Pamba, Raja Varma Shabaz, Mohammad

CCF-C

【影响因子】2.812

【主题类别】

区块链应用-医疗领域-

【Abstract】Medical internet of things (IoT) includes various devices, sensor, machines, equipment which exchange data over wide network. Industry 5.0 and 5G technology have ramped mIoT data and cost-effective sensors. There is sudden upsurge in the medical IoT for enhancing the medical care. Integration of cloud server for data storage and cloud computing has led to the emergence of time and cost-effective management of medical resources and improved patient lifestyle. However, cloud data is always at risk of data leak and malicious attack by unwanted users for their personal gains and agenda. With the increase of data exchange in the medical field, there is an urgency of keeping all the transaction safe and secure. There is a growing malicious data attacks and vulnerability. Therefore, to overcome such situations, the proposed model is a step towards sustainable technology. Keeping the focus on cost effective data security, the present work has developed a framework of modified Lamport Merkle Digital Signature method for signature generation and verification. It makes use of central healthcare controller (CHC) which determine the root of generated signature along with verification and authentication. For verification, the validation hash public key with generate key is required to validate the signature. This led to the efficient, cost effective and faster security when compared to the existing methods.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】blockchain technology; central healthcare controller; cost effective; LMDS

【发表时间】

【收录时间】2022-03-31

【文献类型】 期刊

【DOI】 10.1111/exsy.12978

COVID-19 and the volatility interlinkage between bitcoin and financial assets

【Author】 Maghyereh, Aktham Abdoh, Hussein

【影响因子】2.647

【主题类别】

区块链治理--

【Abstract】We investigate the effects of COVID-19 on volatility connectedness between bitcoin and five traditional financial assets from the gold, oil, foreign exchange, stock, and bond markets, employing high-frequency data. The empirical analyses are carried out using the wavelet coherence approach and dynamic frequency-domain connectedness method. Our results generally indicate that the volatility dynamics between bitcoin and the financial assets are weak or negative before the pandemic while they become positive during the pandemic times for most of the assets. Further, the volatility connectedness for bitcoin-gold and bitcoin-foreign exchange pairs is most significant in the short term, while it is significant in the intermediate term for bitcoin-oil and bitcoin-equity pairs during the pandemic. We examine optimal portfolios to hedge Bitcoin shocks at multiple investment horizons during the pandemic. We find that most of these financial assets perform as a good hedger against Bitcoin shocks in the short and long term but not in the medium term.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】COVID-19; Wavelet coherence; Volatility interdependence; Bitcoin; Dynamic Frequency-domain connectedness

【发表时间】

【收录时间】2022-03-31

【文献类型】 期刊

【DOI】 10.1007/s00181-022-02223-7

INFLUENCE OF BLOCKCHAIN AND SMART CONTRACTS ON PARTNERS' TRUST, VISIBILITY, COMPETITIVENESS, AND ENVIRONMENTAL PERFORMANCE IN MANUFACTURING SUPPLY CHAINS

【Author】 Chen, Ping-Kuo He, Qiu-Rui Chu, Shiping

【影响因子】2.596

【主题类别】

区块链治理--

【Abstract】This study investigates the influence of blockchain and smart contracts on partners' trust, increasing visibility, competitiveness, and environmental performance when implemented in manufacturing supply chains. Partial least squares (PLS) was the main method used to test and verify the research model and hypotheses. According to the test results, blockchain and smart contracts positively influence partners' trust. Increasing trust produces a positive effect on increasing visibility, further promoting competitiveness and environmental performance. However, the vulnerability of smart contracts still causes information security concerns. If smart contracts are adopted for an extended time, partners will worry about problems of information vulnerability stemming from the smart contract, further reducing trust and affecting visibility. Regarding academic implications, this study not only proves the relationship between blockchain, smart contracts, partners' trust, increasing visibility, competitiveness, and environmental performance. In addition, we also proved the vulnerability of smart contracts; our test results fill these gaps. Regarding practical implications, with extended contract periods, partners may expand their doubt in the smart contract and reduce information sharing, further affecting visibility. Manufacturers are reminded that smart contracts may carry hidden trouble that disrupts the relationship between partners' trust and visibility.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】supply chain; blockchain; smart contract; trust; visibility; competitiveness; environ-mental performance

【发表时间】

【收录时间】2022-03-31

【文献类型】 期刊

【DOI】 10.3846/jbem.2022.16431

Improved Byzantine Fault-Tolerant Algorithm Based on Alliance Chain

【Author】 Gao, Wuqi Mu, Wubin Huang, Shanshan Wang, Man Li, Xiaoyan

CCF-C

【影响因子】2.146

【主题类别】

区块链技术-共识算法-

【Abstract】Alliance chain is a typical multicenter block chain and is easily implemented, so it is supported by more and more enterprises and governments. This paper analyzes the advantages and disadvantages of the Practical Byzantine Fault Tolerance (PBFT) in the alliance chain application scene. Aiming at the low efficiency of multinode consensus of the PBFT algorithm, the C-Raft-PBFT consensus algorithm is proposed. By integrating the Raft algorithm and the PBFT algorithm with the credit mechanism, designing node credit evaluation and grading protocols, and increasing Byzantine node detection based on feedback mechanism and other methods, the system efficiency is improved. The experiment results show that the improved algorithm has better throughput and lower delay, and the system's fault tolerance is also improved. Among them, the delay is reduced by 1.93 seconds on average; in the case of an increase in system nodes, the number of nodes in the experimental data is between 200 and 225, and the throughput is increased by 6.46% on average.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】

【发表时间】2021

【收录时间】2022-03-31

【文献类型】 期刊

【DOI】 10.1155/2021/8455180

BEvote: Bitcoin-Enabled E-Voting Scheme with Anonymity and Robustness

【Author】 Lu, Ning Xu, Xin Choi, Chang Fei, Tianlong Shi, Wenbo

CCF-C

【影响因子】1.968

【主题类别】

区块链应用-政务领域-

【Abstract】When building the large-scale distributed decision control system based on mobile terminal devices (MTDs), electronic voting (E-voting) is a necessary technique to settle the dispute among parties. Due to the inherent insecurity of Internet, it is difficult for E-voting to attain complete fairness and robustness. In this study, we argue that Bitcoin blockchain offers better options for a more practical E-voting. We first present a coin mixing-based E-voting system model, which can cut off the relationship between the voter's real identity and its Bitcoin address to achieve strong anonymity. Moreover, we devise a secret sharing-based E-voting protocol, which can prevent voting number from being leaked ahead and further realize strong robustness. We establish the probable security theory to prove its security. In addition, we use the experimental evaluation to demonstrate its efficiency.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】

【发表时间】2021

【收录时间】2022-03-31

【文献类型】 期刊

【DOI】 10.1155/2021/9988646

Blockchain-Assisted Trust Management Scheme for Securing VANETs

【Author】 Ahmed, Waheeb Wu, Di Mukathie, Daniel

【影响因子】0.972

【主题类别】

区块链应用-交通领域-

【Abstract】The main goal of VANETs is to improve the safety of all road users. Therefore, the accuracy and trustworthiness of messages transmitted in VANETs are essential, given that life may rely on them. VANETs are provided with basic security services through the use of public key infrastructure-based authentication. However, the trust of users is still an open issue in VANETs. It is important to prevent bogus message attacks from internal vehicles as well as protect vehicle privacy. In this paper, we propose a trust management scheme that ensures trust in VANETs while maintaining vehicle privacy. The trust scheme establishes trust between vehicles where a trust value is assigned to every vehicle based on its behavior and messages are accepted only from vehicles whose trust value is greater than a threshold, therefore, protecting VANETs from malicious vehicles and eliminating bogus messages. If a traffic event happens, vehicles upload event messages to the reachable roadside unit (RSU). Once the RSU has confirmed that the event happened, it announces the event to vehicles in its vicinity and records it into the blockchain. Using this mechanism, RSUs are prevented from sending fake or unverified event notifications. Simulations are carried out in the context of bogus message attacks to evaluate the trust scheme's reliability and efficiency. The results of the simulation indicate that the proposed scheme outperforms the compared schemes and is highly resistant to bogus message attacks.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】VANET; Trust management; Blockchain; Bogus message attack; Privacy

【发表时间】2022

【收录时间】2022-03-31

【文献类型】 期刊

【DOI】 10.3837/tiis.2022.02.013

A Secure Subscription-Push Service Scheme Based on Biockchain and Edge Computing for IoT

【Author】 Deng, Yinjuan Wang, Shangping Zhang, Qian Zhang, Duo

【影响因子】0.972

【主题类别】

区块链应用-网络安全-

【Abstract】As everything linking to the internet, people can subscribe to various services from a service provider to facilitate their lives through the Internet of Things (IoT). An obligatory thing for the service provider is that they should push the service data safely and timely to multiple IoT terminal devices regularly after the IoT devices accomplishing the service subscription. In order to control the service message received by the legal devices as while as keep the confidentiality of the data, the public key encryption algorithm is utilized. While the existing public encryption algorithms for push service are too complicated for IoT devices, and almost of the current subscription schemes based on push mode are relying on centralized organization which may suffer from centralized entity corruption or single point of failure. To address these issues, we design a secure subscription-push service scheme based on blockchain and edge computing in this article, which is decentralized with secure architecture for the subscription and push of service. Furthermore, inspired by broadcast encryption and multicast encryption, a new encryption algorithm is designed to manage the permissions of IoT devices together with smart contract, and to protect the confidentiality of push messages, which is suitable for IoT devices. The edge computing nodes, in the new system architecture, maintain the blockchain to ensure the impartiality and traceability of service subscriptions and push messages, meanwhile undertake some calculations for IoT devices with limited computing power. The legalities of subscription services are guaranteed by verifying subscription tags on the smart contract. Lastly, the analysis indicates that the scheme is reliable, and the proposed encryption algorithm is safe and efficient.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain; Edge Computing; Encryption Algorithm; Internet of Things Devices; Subscription-Push Service

【发表时间】2022

【收录时间】2022-03-31

【文献类型】 期刊

【DOI】 10.3837/tiis.2022.02.005

Model to Program and Blockchain Approaches for Business Processes and Workflows in Finance

【Author】 Kherbouche, Meriem Pisoni, Galena Molnar, Balint

【影响因子】0.000

【主题类别】

区块链应用-金融领域-

【Abstract】Business process modeling and verification have become an essential way to control and assure organizational evolution. We overview the opportunities for the application of blockchain in Business Process Management and Modeling in Finance and we focus on in-depth analysis of claim process in insurance as a use case. We investigate the utilization of blockchain technology for model checking of Workflow, Business Processes to ensure consistency, integrity, and security in a dynamically changing business environment. We create a UML profile for the blockchain, then we combine it with a UML activity diagram followed by a verification using Petri nets to guarantee a distributed computing system and scalable with mutable data. Our paper creates a unified picture of the approaches towards business processes modeling used in the financial industry organized around the set of premises intending to develop a future research agenda for blockchain business process modeling, specifically for the financial industry domain.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Model-to-Program; blockchain; business process; workflow; activity diagram; business intelligence; organizational science; innovation; business model

【发表时间】2022

【收录时间】2022-03-31

【文献类型】 期刊

【DOI】 10.3390/asi5010010

CRYPTOCURRENCY AS AN INSTRUMENT OF TERRORIST FINANCING

【Author】 Dyntu, Valeriia Dykyj, Oleg

【影响因子】0.000

【主题类别】

区块链技术-区块链数据分析-

【Abstract】The purpose of the article is to explain the use of cryptocurrency as a terrorist financing tool. This article has emphasized the ways, which terrorists appraise for being a reliable fundraising means and their adoption. Methodology. For the purposes of the study, the methods of scientific abstraction, synthesis, observation, generalization, as well as the method of induction of literature and legal documents were used to determine the features of bitcoin, promoting and preventing its use for terrorism financing. Results. The development of the Internet and electronic devices has radically changed all spheres of human life, including criminal activity. Digitalization has led to the improvement of ordinary crimes and the emergence of new types of crime, which, in principle, cannot exist without special digital electronic devices. Among the first implementers of new technologies were terrorists, who took advantage of digitalization to increase profitability. Thus, terrorists have now significantly increased their attention to cryptocurrency as a digital means of payment, namely Bitcoin. Bitcoin has a number of features that have attracted the attention of criminals as a way to evade responsibility for a crime. In particular, decentralization avoids the need for confirmation by a central authority, and pseudo-anonymity provides a certain level of anonymity. In addition, terrorists are aware that Bitcoin's confidentiality is extremely fragile and needs to be enhanced. The paper analyzes several ways to enhance anonymity, such as software that anonymizes traffic and prevents IP identification, peer-to-peer mixers, centralized mixing services (tumbler), and other approaches. It is worth emphasizing that for the fight against crime, the main issue is the de-anonymization of the Bitcoin owner/user, which allows the identification of the criminal. Currently, law enforcement agencies use direct and indirect de-anonymization, proliferation analysis, quantitative analysis, time analysis, and transactional network analysis, among others, to achieve the above goal, which are discussed in detail in this article. In addition, agencies around the world investigated and uncovered terrorist groups and their financial facilitators. Specifically, on August 13, 2020, the U.S. Department of Justice's Office of Public Affairs announced "the largest cryptocurrency seizure in the context of terrorism in history." To investigate the agenda, the legal documents of those investigations that contain information about the terrorist fund-raising mechanism were examined and analyzed. The legal documents revealed that these investigations used the aforementioned de-anonymization approaches.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】cryptocurrency; Bitcoin; terrorism-financing; criminal investigation; de-anonymization

【发表时间】2021

【收录时间】2022-03-31

【文献类型】 期刊

【DOI】 10.30525/2256-0742/2021-7-5-67-72

Analysis of different artificial neural networks for Bitcoin price prediction

【Author】 Aghashahi, Mahsa Bamdad, Shahrooz

【影响因子】0.000

【主题类别】

区块链治理--

【Abstract】Predicting the future price of the currency has always been considered one of the most challenging issues. In this paper, we utilize different artificial neural networks (ANNs), including Feedforwardnet, Fitnet, and Cascade networks, and predict the future price of Bitcoin. This paper discusses how a combination of technical attributes, like price-related and lagged features, as inputs of the neural networks, are used to raise the prediction capabilities that directly impact into the final profitability. For empirical analysis, this paper uses the data of the Bitcoin price for a period of 9 months (1.1.2018 - 30.9.2018) available on www.coindesk.com. Using a ten-fold cross-validation method, this paper finds the optimal number of hidden neurons for different train functions in each ANN based on error measures, including mean squared error (MSE), mean absolute error (MAE) and mean absolute percentage error (MAPE). Then, the Bitcoin price is predicted, and results are compared based on the amount of R to find out which ANN leads to a better prediction. Finally, this paper concludes that the Fitnet network with trainlm function and 30 hidden neurons outweighs the others. This paper assesses the models' performance and how specific setups produce principled and stable predictions for beneficial trading.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Bitcoin; Digital currency market; Artificial neural networks; Data analytics

【发表时间】

【收录时间】2022-03-31

【文献类型】 期刊

【DOI】 10.1080/17509653.2022.2032442

How blockchain technology can be a sustainable infrastructure for the agrifood supply chain in developing countries

【Author】 Kumar, Anup Srivastava, Santosh Kumar Singh, Sarbjit

【影响因子】0.000

【主题类别】

区块链应用-农牧领域-

【Abstract】Purpose This study aims to formulate a conceptual sustainable framework for developing a trusted, reliable, scalable, transparent, traceable and sustainable agri-food supply chain in a developing country so that it minimizes wastage and increases the efficiency levels of agri-produce and its usage. Design/methodology/approach This study uses a rigorous review of extant literature, case studies and the interview method for theory building, using blockchain technology (BT) as a subject. Further, the study builds a framework to relate blockchain solutions to the challenges faced by the agri-supply chain. Notably, the use of BT in the agri-food supply chain is a relatively new area of study. Findings Limitations of using BT 3.0 in a diverse supply chain like the food sector, especially in a developing country such as India, may be overcome by adopting BT 4.0 and could change the country's face by controlling inefficiencies and ensuring transparency, helping in good governance, improving the humanitarian supply chain and integrating the bottom of the pyramid to the main economy. Based on the findings, this study proposes BT 4.0 for the agri-supply chain in India to deal with the current issues of demand-supply gap, wastages of agri-produce, unequal distribution of profit among agriproduct producers and logistics suppliers and ensuring sustainability. Research limitations/implications Results in this study have been derived from a specific demographic condition in India. Future research with other demographic conditions may be replicated. BT is a new technology product, and its effectiveness is yet to be established. Practical implications The outcome of this study provides the application of BT 4.0 in the area of the agri-food supply chain. The BT 4.0 framework has been developed on studying a few cases that either implemented BT or were in the testing phase. The benefits of the agri-food supply chain vis-a-vis its overall social well-being may be achieved on the successful implementation of the framework, despite existing complexities in the food supply chain. Further research on this subject may help the other dimensions of the complexity of adopting BT 4.0. Both practitioners and policymakers from developing countries can, therefore, use the findings of this study to analyze BT 4.0 and address the concerns of the agri-food supply chain. Originality/value This research paper has proposed a conceptual framework of BT 4.0, which is a completely new technology. It is fairly transparent, and therefore sustainable supply chain practices may be achieved easily.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain technology; Agri-supply chain; Transparency; Sustainability; Supplier or partner selection; Process design; Service design; Both

【发表时间】

【收录时间】2022-03-31

【文献类型】 期刊

【DOI】 10.1108/JGOSS-08-2021-0058

Blockchain-based Data Storage Security Architecture for e-Health Care Systems: A Case of Government of Tanzania Hospital Management Information System

【Author】 Mnyawi, Richard Kombe, Cleverence Sam, Anael Nyambo, Devotha

【影响因子】0.000

【主题类别】

区块链应用-医疗领域-

【Abstract】Health information systems (HIS) are facing security challenges on data privacy and confidentiality. These challenges are based on centralized system architecture creating a target for malicious attacks. Blockchain technology has emerged as a trending technology with the potential to improve data security. Despite the effectiveness of this technology, still HIS are suffering from a lack of data privacy and confidentiality. This paper presents a blockchain-based data storage security architecture integrated with an e-Health care system to improve its security. The study employed a qualitative research method where data were collected using interviews and document analysis. Execute-order-validate Fabric's storage security architecture was implemented through private data collection, which is the combination of the actual private data stored in a private state, and a hash of that private data to guarantee data privacy. The key findings of this research show that data privacy and confidentiality are attained through a private data policy. Network peers are decentralized with blockchain only for hash storage to avoid storage challenges. Cost-effectiveness is achieved through data storage within a database of a Hyperledger Fabric. The overall performance of Fabric is higher than Ethereum. Ethereum's low performance is due to its execute-validate architecture which has high computation power with transaction inconsistencies. E-Health care system administrators should be trained and engaged with blockchain architectural designs for health data storage security. Health policymakers should be aware of blockchain technology and make use of the findings. The scientific contribution of this study is based on; cost-effectiveness of secured data storage, the use of hashes of network data stored in each node, and low energy consumption of Fabric leading to high performance.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain; Hyperledger Fabric; data storage security architecture; confidentiality; integrity

【发表时间】2022

【收录时间】2022-03-31

【文献类型】 期刊

【DOI】 10.22937/IJCSNS.2022.22.3.46

Ballot Blockchain System Design and Development on Ethereum Platform

【Author】 Fu, Meng-Hsuan Lee, An-Shyang

【影响因子】0.000

【主题类别】

区块链技术-智能合约-

【Abstract】Ballots are often held for fair decisions such as party theme selecting; however, the existing traditional ballots have some problems involving amount of human resources, cost of places, equipment, time and traffic, and repeated procedures. In order to solve the aforementioned issues, a ballot blockchain system is designed and implemented based on the smart contract of Ethereum. It is designed on the core blockchain technologies of the decentralized ledger technology, using a secure hash algorithm, anonymous user, incorruptible data, and adopting a public blockchain. The ballot blockchain system is implemented based on the MetaMask verification and the Remix interface development environment. The smart contract plays the role of the decision maker for controlling ballot activities instead of numerous human tasks. All ballot transactions are recorded in the ballot blockchain permanently when the ballot is completed. The aim of the ballot blockchain system is to achieve a fair, less time-consuming, secured, and transparent environment.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Anonymity; Consensus Algorithm; Cryptography; Distributed Computing; Flexible Voting; Incorruptibility; Online Voting; Secure Hash Algorithm

【发表时间】2022

【收录时间】2022-03-31

【文献类型】 期刊

【DOI】 10.4018/IJSDA.287115

Blockchain as a General-Purpose Technology: Patentometric Evidence of Science, Technologies, and Actors

【Author】 Ozcan, Sercan Unalan, Serhan

【影响因子】8.702

【主题类别】

综述--

【Abstract】Blockchain is considered to be a general-purpose technology (GPT) by many scholars. However, previous studies offer no proof that Blockchain is a GPT. Thus, approximately 2500 Blockchain-related patent data are investigated by deploying the mixed-method approach, using patentometrics with the support of semi-structured interviews conducted with Blockchain experts. This article investigates six main GPT indicators: pervasiveness, improvement, spawning, prevalence, reallocation of resources, and inclusive democratization. Overall, the results demonstrate that Blockchain has not yet become a GPT, though it already shows some GPT characteristics. There are six specific findings: 1) Blockchain shows pervasive characteristics; 2) Blockchain is capable of further improvement; 3) Blockchain facilitates and encourages the creation of innovations; 4) several countries with strong R&D capabilities, particularly China and the United States, are showing the prevalence of Blockchain technology; 5) the Blockchain landscape is witnessing greater participation of "younger" companies; and 6) Blockchain is strongly related to the Information and Communication Technology domain with the potential of inclusivity and democratization. China and the United States have the potential to influence the future development of Blockchain technology. This article is assumed to be of great interest to a broad spectrum of stakeholders, such as scholars and policymakers.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Technological innovation; Economics; Patents; Interviews; Business; Blockchain; distributed ledger technologies; general-purpose technology; Patentometrics; technology analysis

【发表时间】2022

【收录时间】2022-03-31

【文献类型】 综述

【DOI】 10.1109/TEM.2020.3008859

A Survey on Blockchain-Based Telecommunication Services Marketplaces

【Author】 Tkachuk, Roman-Valentyn Ilie, Dragos Tutschku, Kurt Robert, Remi

CCF-C

【影响因子】4.758

【主题类别】

综述--

【Abstract】Digital marketplaces were created recently to accelerate the delivery of applications and services to customers. Their appealing feature is to activate and dynamize the demand, supply, and development of digital goods, applications, or services. By being an intermediary between producer and consumer, the primary business model for a marketplace is to charge the producer with a commission on the amount paid by the consumer. However, most of the time, the commission is dictated by the marketplace facilitator itself and creates an imbalance in value distribution, where producer and consumer sides suffer monetarily. In order to eliminate the need for a centralized entity between the producer and consumer, a blockchain-based decentralized digital marketplace concept was introduced. It provides marketplace actors with the tools to perform business transactions in a trusted manner and without the need for an intermediary. In this work, we provide a survey on Telecommunication Services Marketplaces (TSMs) which employ blockchain technology as the main trust enabling entity in order to avoid any intermediaries. We provide an overview of scientific and industrial proposals on the blockchain-based online digital marketplaces at large, and TSMs in particular. We consider in this study the notion of telecommunication services as any service enabling the capability for information transfer and, increasingly, information processing provided to a group of users by a telecommunications system. We discuss the main standardization activities around the concepts of TSMs and provide particular use-cases for the TSM business transactions such as SLA settlement. Also, we provide insights into the main foundational services provided by the TSM, as well as a survey of the scientific and industrial proposals for such services. Finally, a prospect for future developments is given.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchains; Business; Distributed ledger; Communications technology; Proposals; Internet of Things; Telecommunication services; Digital marketplace; telecommunication services marketplace; blockchain technology; communication service provider; distributed ledger technology

【发表时间】2022

【收录时间】2022-03-31

【文献类型】 综述

【DOI】 10.1109/TNSM.2021.3123680

Research Trends, Challenges, and Emerging Topics in Digital Forensics: A Review of Reviews

【Author】 Casino, Fran Dasaklis, Thomas K. Spathoulas, Georgios P. Anagnostopoulos, Marios Ghosal, Amrita Borocz, Istvan Solanas, Agusti Conti, Mauro Patsakis, Constantinos

【影响因子】3.476

【主题类别】

综述--

【Abstract】Due to its critical role in cybersecurity, digital forensics has received significant attention from researchers and practitioners alike. The ever increasing sophistication of modern cyberattacks is directly related to the complexity of evidence acquisition, which often requires the use of several technologies. To date, researchers have presented many surveys and reviews on the field. However, such articles focused on the advances of each particular domain of digital forensics individually. Therefore, while each of these surveys facilitates researchers and practitioners to keep up with the latest advances in a particular domain of digital forensics, the global perspective is missing. Aiming to fill this gap, we performed a qualitative review of all the relevant reviews in the field of digital forensics, determined the main topics on digital forensics topics and identified their main challenges. Despite the diversity of topics and methods, there are several common problems that are faced by almost all of them, with most of them residing in evidence acquisition and pre-processing due to counter analysis methods and difficulties of collecting data from devices, the cloud etc. Beyond pure technical issues, our study highlights procedural issues in terms of readiness, reporting and presentation, as well as ethics, highlighting the European perspective which is traditionally stricter in terms of privacy. Our extensive analysis paves the way for closer collaboration among researcher and practitioners among different topics of digital forensics.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Digital forensics; Systematics; Forensics; Market research; Internet; Computer crime; Standards; Digital forensics; cybersecurity; review of reviews; forensic investigations; meta review

【发表时间】2022

【收录时间】2022-03-31

【文献类型】 综述

【DOI】 10.1109/ACCESS.2022.3154059

Blockchain for deep learning: review and open challenges

【Author】 Shafay, Muhammad Ahmad, Raja Wasim Salah, Khaled Yaqoob, Ibrar Jayaraman, Raja Omar, Mohammed

【影响因子】2.303

【主题类别】

综述--

【Abstract】Deep learning has gained huge traction in recent years because of its potential to make informed decisions. A large portion of today's deep learning systems are based on centralized servers and fall short in providing operational transparency, traceability, reliability, security, and trusted data provenance features. Also, training deep learning models by utilizing centralized data is vulnerable to the single point of failure problem. In this paper, we explore the importance of integrating blockchain technology with deep learning. We review the existing literature focused on the integration of blockchain with deep learning. We classify and categorize the literature by devising a thematic taxonomy based on seven parameters; namely, blockchain type, deep learning models, deep learning specific consensus protocols, application area, services, data types, and deployment goals. We provide insightful discussions on the state-of-the-art blockchain-based deep learning frameworks by highlighting their strengths and weaknesses. Furthermore, we compare the existing blockchain-based deep learning frameworks based on four parameters such as blockchain type, consensus protocol, deep learning method, and dataset. Finally, we present important research challenges which need to be addressed to develop highly trustworthy deep learning frameworks.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Deep learning; AI; Machine learning; Federated learning; Blockchain; Ethereum; Smart contracts; Security; Transparency

【发表时间】

【收录时间】2022-03-31

【文献类型】 综述

【DOI】 10.1007/s10586-022-03582-7

应对元宇宙挑战:数据安全综合治理三维结构范式

【作者】 高一乘;杨东;

【作者单位】中国人民大学区块链研究院;中国人民大学交叉科学研究院;

【文献来源】行政管理改革

【复合影响因子】3.269

【综合影响因子】1.666

【主题类别】

区块链治理--

【摘要】目前,我国国内数据安全承受着多方面的风险,既有数字平台对数据、流量的垄断,又有它们对数据的剥削和滥用。数据被认为是数字时代的“石油”,但数据的传播效率远远大于石油,对于数据资源的管控已经不能使用传统工业时代管理有形资产的方式。作为数字经济中独立的、新兴的法律客体,数据安全不仅需要多部法律法规协同保护,更需要回到“平台、数据、算法三维结构”(PDA范式)并利用基础设施原则、区块链、双维监管进行综合治理。面向元宇宙时代,数据安全治理模式并不存在统一的模式,而是在数据开发利用和数据保护之间展开,以达成三元价值目标融合。在该范式主导的数据安全治理体系之下,有助于建立统一规范的数据管理制度,统一国内数字市场,落实全国一盘棋政策;另一方面为全球数据安全治理贡献中国方案。

【关键词】数据安全;;数字经济;;元宇宙;;基础设施;;双维监管;;区块链

【文献类型】 期刊

【DOI】 10.14150/j.cnki.1674-7453.2022.03.008

【发表时间】2022-03-31

基于区块链技术的高校图书馆学术文献数据服务研究

【作者】 田涌;

【作者单位】河南省图书馆;

【文献来源】图书馆工作与研究

【复合影响因子】2.830

【综合影响因子】2.536

【主题类别】

区块链应用--

【摘要】目前,高校图书馆学术文献数据服务在数据录入、分析、保存与传输方面存在较大问题。这些问题极大制约了图书馆知识服务可持续发展。高校图书馆发挥区块链技术在数据管理方面的优势,能够有效解决学术文献数据服务的瓶颈制约。本文在分析基于区块链技术的高校图书馆学术文献数据服务价值基础上,提出了具有可行性的策略建议:依托区块链点对点网络分布式录入学术文献数据,利用区块链共识机制增强学术文献数据分析实效性,凭借区块链账户与存储模型提高学术文献数据保存效率,通过区块链加密签名算法严防学术文献数据传输失窃。

【关键词】高校图书馆;;学术文献数据;;区块链

【文献类型】 期刊

【DOI】 10.16384/j.cnki.lwas.2022.03.015

【发表时间】2022-03-31

元宇宙:数字化生存的逻辑探究与反思

【作者】 张蓝姗;史玮珂;

【作者单位】北京邮电大学数字媒体与设计艺术学院;

【文献来源】当代传播

【复合影响因子】2.202

【综合影响因子】0.967

【主题类别】

区块链治理--

【摘要】元宇宙作为一个颠覆性概念,近来受到世界范围内的广泛关注,在学界、业界和投资界纷纷掀起热潮。元宇宙概念的流行背后显示着人类对于开拓生存空间的本能追求,蕴含着媒体迭代与构建新型社交关系的需求,同时受到商业资本扩张与虚拟经济发展的推动作用。元宇宙有着颠覆和重构社会结构和人类生存方式的潜在力量,因此需要对其可能带来的空间、时间和自我异化问题进行反思,在全新的技术语境下建立人类共有的统一价值体系。

【关键词】元宇宙;;数字化身;;媒介革命;;虚拟经济;;异化

【文献类型】 期刊

【DOI】

【发表时间】2022-03-31

区块链技术在供应链金融中的应用研究——基于链码实现和隐私保护

【作者】 王海全;杨扬;易庆玲;

【作者单位】中国人民银行南宁中心支行;中国人民银行北海市中心支行;

【文献来源】金融发展研究

【复合影响因子】1.896

【综合影响因子】0.741

【主题类别】

区块链应用-金融领域-

【摘要】区块链技术具有分布式和可追溯性特点,将其融入供应链金融将有效提升中小企业融资效率。本文认为区块链技术融入供应链金融具有较强应用优势,同时也存在诸多推广障碍,如数据节点被破解、系统资金损失难以被人为暂停、联合监管机制尚未建立等。本文尝试基于链码实现、隐私保护和数字加密设计,构建安全加密的区块链供应链金融系统,并针对区块链技术在供应链金融中的行业应用提出“三主体、两保障、两监管”的政策建议。

【关键词】区块链;;供应链金融;;链码实现;;隐私保护

【文献类型】 期刊

【DOI】 10.19647/j.cnki.37-1462/f.2022.03.010

【发表时间】2022-03-31

虚构现实与娱乐反思——影游联动影响下的媒介交互之变

【作者】 赵益;

【作者单位】西安工程大学新媒体艺术学院;

【文献来源】当代电影

【复合影响因子】0.809

【综合影响因子】0.335

【主题类别】

区块链应用-文化领域-

【摘要】本文以全景视频游戏、文本交互游戏、场景还原电影、角色互动视频、线下角色扮演游戏等虚构现实作品作为切入点,思考电影与游戏之间新的美学交互特征,以及娱乐诉求严肃化深刻化转向带来的反思。同时,电影和游戏的产业化联动通过区块链技术及加密算法积极拓展艺术经济领域的行业边界,在通讯换代和机器信任转移机制下,通过媒介交互实现产业结构升级,并引发新的经济增长点。

【关键词】虚构现实;;娱乐反思;;影游联动;;媒介交互

【文献类型】 期刊

【DOI】

【发表时间】2022-03-31

加密货币与股票市场风险相关性研究

【作者】 周卫华;李一诺;谭静;

【作者单位】中国财政科学研究院;

【文献来源】中国软科学

【复合影响因子】

【综合影响因子】

【主题类别】

区块链治理--

【摘要】随着加密货币价格不断攀升和市值剧烈波动,加密货币挖矿和交易所蕴藏的高风险已引起监管部门高度关注。本文选取2014年1月至2021年5月比特币和纳斯达克综合指数的交易数据,基于比特币的价格波动趋势,将样本划分为2014—2017年、2018—2019年、2020—2021年3个样本组,使用收益率和收益率的波动率两类指标,研究比特币与股票市场风险的相关性。基于长短窗口期内的格兰杰因果检验和基于GED分布的GARCH模型回归后,发现:在比特币价格剧烈波动时期,比特币收益率与纳斯达克综合指数收益率显著正相关;自2018年比特币价格出现高位震荡后,比特币收益率的波动率与纳斯达克综合指数收益率的波动率显著正相关。本文的研究证明比特币与股票市场存在价格联动,比特币对股票市场收益率有预测作用,比特币市场风险可以传导至股票市场。

【关键词】比特币;;股票市场;;收益率;;市场风险

【文献类型】 期刊

【DOI】

【发表时间】2022-03-31

区块链赋能下多元化发展对企业风险承担水平的影响——基于数字经济时代视角

【作者】 徐晨阳;陈艳娇;王会金;

【作者单位】南京审计大学政府审计学院;

【文献来源】中国软科学

【复合影响因子】

【综合影响因子】

【主题类别】

区块链应用-企业管理-

【摘要】在企业选择新型多元化发展模式后,如何依托数字化区块链技术赋能,提升企业风险管理能力,为企业微观层面的风险识别、防范及应对治理提供思路与方向,是值得研究的重大理论和实践问题。基于数字经济背景,探究区块链赋能下多元化发展对企业风险承担水平的影响,选取我国2016—2019年A股上市公司数据研究发现:多元化发展降低了企业的风险承担水平,特别是在模式异质多元化、生态系统多元化及国有企业中;非国有企业依托区块链技术赋能,缓冲了多元化对企业风险承担水平的抑制作用;内部控制在多元化发展抑制企业风险承担水平作用中发挥了制衡作用;代理成本则作为中介路径传导了多元化发展对企业风险承担水平的抑制作用。基于上述发现,结合数字化转型的现实背景,提出探索我国企业依托区块链赋能、寻找提升风险承担能力可行路径的政策建议。

【关键词】多元化发展;;企业风险承担水平;;区块链赋能;;数字经济

【文献类型】 期刊

【DOI】

【发表时间】2022-03-31

科幻的未来是“元宇宙”吗

【作者】 彭超;

【作者单位】中国石油大学(北京)体育与人文艺术学院;

【文献来源】中国图书评论

【复合影响因子】

【综合影响因子】

【主题类别】

区块链治理--

【摘要】技术更新、媒介变革、时代症候为科幻小说提供沃土,并深刻影响着科幻小说的转型。科幻小说呈现出“向内转”的倾向,直面人类对未来文明的焦虑与恐惧,探讨人类整体的未来命运转向。“元宇宙”是被科幻小说创造出来的概念,成为被资本热捧的对象,它没有对现实宇宙进行挑战、颠覆与超越,相反,它将真实的生命个体从真实的世界中割裂出来,并带来新的危机。对元宇宙的讨论并不是一味地批判,而是试图打开认知的多重视角,在更为广阔的视野下观察和思考人类文明的未来。

【关键词】科幻;;元宇宙;;未来

【文献类型】 期刊

【DOI】

【发表时间】2022-03-31

数字版权平台反垄断的区块链之道

【作者】 臧志彭;张文娟;

【作者单位】华东政法大学传播学院;

【文献来源】中国出版

【复合影响因子】

【综合影响因子】

【主题类别】

区块链应用-版权保护-

【摘要】数字版权平台反垄断早已成为国际热点和难点问题,数字版权平台较传统平台而言具有更强的限制竞争能力,而目前以事中事后为主的反垄断框架体系难以从根本上动摇数字版权平台的垄断根基。区块链分布式去中心化的底层技术特征和优势,与数字版权平台反垄断目标天然契合,使得将其运用到数字版权平台反垄断中具有正当性。研究发现,区块链通过低成本信息验证打破了传统“第三方信任”而建构新的信任机制以破除垄断前提,并在此基础上探索建构以创作者为核心的新型版权生态、数字版权全价值链权属证明机制、点对点的数字版权价值交易新模式和可跨链全通路高效率的强监管体系等四个方面的创新路径。

【关键词】区块链;;数字平台;;反垄断;;版权监管

【文献类型】 期刊

【DOI】

【发表时间】2022-03-31

网络数字化时代恐怖组织的融资方式与特点及应对

【作者】 朱素梅;

【作者单位】国际关系学院国际政治系;

【文献来源】阿拉伯世界研究

【复合影响因子】

【综合影响因子】

【主题类别】

区块链治理--

【摘要】资金是恐怖组织赖以生存的基础。从目前世界各地主要恐怖组织获取资金情况看,其主要资金来源为非法活动、“合法”活动以及慈善机构和非盈利组织的捐赠等。这些筹资手段对恐怖组织来说各有利弊,相比“合法”活动较强的安全性,非法手段风险较大且容易失去民众的支持。但非法活动无需太多技巧,操作简单且容易获利,因而是恐怖组织最常用的融资手段。随着国际金融反恐的推进,恐怖组织获取资金的渠道不断被发现和阻断,这迫使恐怖组织根据反恐形势变化不断调整融资策略,其资金来源日益多元化,并呈现出新的特点:恐怖组织融资趋向低额化,互联网成为恐怖组织筹资的重要平台,利用虚拟货币进行融资成为一个值得关注的新趋势。新冠疫情以来,“伊斯兰国”等恐怖势力反弹,其募集资金的能力持续强大,新型恐怖组织在恐怖融资的渠道和手段等方面比传统恐怖组织更有“创意”、更为多元。为应对新形势下恐怖组织融资的挑战,应通过国际和地区合作以及在技术层面采取措施,并从意识形态和社会层面予以治理。

【关键词】网络数字化;;恐怖组织融资;;虚拟货币;;反恐国际合作;;社会治理

【文献类型】 期刊

【DOI】

【发表时间】2022-03-31

元宇宙技术综述

【作者】 王文喜;周芳;万月亮;宁焕生;

【作者单位】北京科技大学计算机与通信工程学院;北京锐安科技有限公司;北京市网络空间数据分析与应用工程技术研究中心;晋中学院;

【文献来源】工程科学学报

【复合影响因子】

【综合影响因子】

【主题类别】

综述--

【摘要】元宇宙作为一个新兴的概念受到了产业界、学术界、媒体界及公众的广泛关注,国内外众多公司也纷纷在“元宇宙”领域布局,但布局的背后离不开强大的技术支持。本文从技术维度深入剖析元宇宙。首先,从科学与技术的角度论述元宇宙的概念及内涵,并总结了目前从业者、专家以及学者对元宇宙的不同见解。其次,概述了元宇宙相关关键技术,包括网络及运算技术(5G、6G、物联网、云计算、雾计算及边缘计算)、管理技术(能耗管理、资源管理、会话管理及时空一致性管理)、虚实对象连接、建模与管理技术(X联网、身份建模、社会计算、去中心化管理技术)、虚实空间交互与融合技术(拓展现实、电子游戏技术、脑机接口技术)等。元宇宙不宜称为新技术,而是IT新技术的综合运用。技术的进步与发展,将为元宇宙的实现和应用奠定坚实的基础,同时元宇宙的发展也会促进现有技术的升级换代。最后,展望了元宇宙发展面临的诸多挑战,以清晰认识、理智决策、稳步探索元宇宙。

【关键词】元宇宙;;去中心化;;虚拟世界;;现实世界;;虚实融合

【文献类型】 综述

【DOI】 10.13374/j.issn2095-9389.2022.01.15.003

【发表时间】2022-03-31

在线标注

备案号: 苏ICP备17025947号-5

评论回复