• 首页
  • 每日更新
  • 文献
  • 会议文献
  • 政策法规
  • 研究专题
  • 区块链游戏
logo 区块链前沿
  • 区块链前沿
  • 首页
  • 每日更新
  • 文献
  • 会议文献
  • 政策法规
  • 研究专题
  • 区块链游戏
  • 文章创新角色
  • 科研创新指数
  • 区块链领域本体
  • 热点主题挖掘
  • 主题展示
  • 专利文献
  • 排行榜
  • DAO治理
  • 文献上传
  • 积分获取规则
  • 大语言模型解析
  • 期刊发文分布
注册 登录

2022年07月24日 30篇

文献来源

  • 22
  • 8

主题分类

      • 1
      • 2
      • 1
      • 2
      • 1
      • 2
      • 1
      • 1
      • 5
      • 1
      • 2
      • 1
      • 1
      • 1
      • 1
      • 3
      • 2
      • 2

文献类型

  • 13
  • 7
  • 9
  • 1
筛选
订阅
<< 前一天 后一天 >>

Will nuclear polluted seafood stop selling in the blockchain-enabled market? Lessons from government punishment and social cognition for retailer's selling

【Author】 Zhao, Huida Liu, Jiaguo Zhao, Pengfei Chen, Jihong

【影响因子】7.001

【主题类别】

区块链应用-实体经济-环境领域

【Abstract】In April 2021, Japan's decision to dump nuclear wastewater into the ocean has raised worldwide attention. Therefore, to focus on seafood safety from firm and government in this event, we construct a game model to explore the technology-enabled ways to resolve conflict from domestic product and polluted product. Our analysis reveals the potential equilibrium strategy for the domestic product only and two types of products, respectively. Moreover, from the perspective of government punishment, the result shows the existing motivation of polluted product in the market. Finally, we also investigate the five aspects to find the changes of market share for domestic product, including customer choice, product freshness, market uncertainty, geographical distance, and shoddy product, respectively. In summary, this research provides management implications to resolve conflict between two types of products and to realize the multi-party balance of interests and technology-enabled value.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Nuclear polluted food; Government punishment; Social cognition; Equilibrium strategy; Blockchain-enabled market; Market share

【发表时间】2022

【收录时间】2022-07-24

【文献类型】 理论性文章

【DOI】 10.1016/j.marpolbul.2022.113608

Flexible Threshold Ring Signature in Chronological Order for Privacy Protection in Edge Computing

【Author】 Wang, Zhiwei Fan, Jiaxing

CCF-C

【影响因子】5.697

【主题类别】

区块链技术-核心技术-加密算法

【Abstract】Edge computing can process data at the network edge rather than in the remote cloud. To protect the security of the collected data, blockchain can be used in edge computing. Any request sent from an edge server requesting data storage is a transaction added into the blockchain, which should include the data owners' signature. For protecting the privacy of data owners, a threshold ring signature can be utilized for the blockchain. In this article, we propose a flexible threshold ring signature scheme in chronological order that has two advantages for solving the update problem and chronological problem in practice. Our scheme is a nontrivial extension of Yuen et al.'s signature scheme and has three security properties: unforgeability, anonymity, and chronological sorting. We prove our scheme without random oracles and test our scheme over the Intel Edison development platform simulating practical edge servers.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Flexible threshold; chronological order; ring signature; privacy protection; edge computing; blockchain

【发表时间】2022

【收录时间】2022-07-24

【文献类型】 实证性文章

【DOI】 10.1109/TCC.2020.2974954

State-of-the-art solutions of blockchain technology for data dissemination in smart cities: A comprehensive review

【Author】 Shari, Nur Fadhilah Mohd Malip, Amizah

CCF-C

【影响因子】5.047

【主题类别】

区块链应用-实体经济-其他

【Abstract】The concept of a smart city has been introduced to address the shortfalls of urbanization. The aid of technologies in smart cities is envisioned to be the key initiative to mitigate these challenges. However, the technologies exposure imposes challenging issues for the traditional centralized data dissemination schemes in smart cities. Consequently, smart city is undergoing a transition to a decentralized system through the implementation of blockchain technology. This paper presents an extensive survey of blockchain applicability for data dissemination in smart cities. We focus on the components of smart: transportation, healthcare, education, energy and building in smart cities and analyze state-of-the-art work on the integration of these components with blockchain. We discuss the advantages and shortcomings of existing literature and evaluate the performance efficiency and the extent of security and privacy achieved. The analysis leads to our new design of a secure smart city data dissemination framework using blockchain technology. To the best of our knowledge, this is the first comprehensive abstraction in the literature that can be utilized for the designation of future blockchain-smart cities data dissemination schemes with the inclusion of participating entities. Finally, we present open research issues and challenges and discuss future research directions.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain; Smart cities; Data dissemination; Security; Privacy

【发表时间】2022

【收录时间】2022-07-24

【文献类型】 综述

【DOI】 10.1016/j.comcom.2022.03.013

Blockchain on Security and Forensics Management in Edge Computing for IoT: A Comprehensive Survey

【Author】 Liao, Zhuofan Pang, Xiang Zhang, Jingyu Xiong, Bing Wang, Jin

CCF-C

【影响因子】4.758

【主题类别】

区块链技术-核心技术-加密算法

【Abstract】Security and forensics represent two key components for network management, especially to guarantee the trusted operation of massive access networks such as the Internet of Things (IoT). As a core technology to provide low latency and high communication for IoT, Mobile Edge Computing (MEC) pulls computing resources from remote cloud centers to devices. The process of MEC service involves three types of entities: devices, data generated by devices and digital evidence generated after the data interaction. These entities are fully distributed and difficult to protect through traditional, highly centralized security and authentication mechanisms. As a decentralized shared ledger and database, the emerging blockchain is considered to provide cooperative trust and collaborative action among multiple subjects while ensuring the integrity and confidentiality of data. Because of its anonymity, non-tampering and traceability, the blockchain arouses research on the combination of blockchain and edge computing for device security, data security and forensics in IoT. This survey analyzes the application of blockchain in MEC-IoT systems and mainly focuses on approaches and technologies to manage the security and forensics issues for IoT. Finally, we present open issues and prospects for future work and research directions.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchains; Internet of Things; Security; Servers; Data security; Quality of service; Protocols; Blockchain; mobile edge computing; IoT; security; forensics

【发表时间】2022

【收录时间】2022-07-24

【文献类型】 综述

【DOI】 10.1109/TNSM.2021.3122147

Quick Block Transport System for Scalable Hyperledger Fabric Blockchain Over D2D-Assisted 5G Networks

【Author】 Kim, Ryeong Hwan Noh, Hyunmin Song, Hwangjun Park, Gi Seok

CCF-C

【影响因子】4.758

【主题类别】

区块链技术-核心技术-区块传输

【Abstract】This paper presents a quick block transport system for scalable Hyperledger Fabric (HLF) blockchain over device-to-device (D2D)-assisted 5G networks. The objective of the proposed system is to increase the transaction throughput and further enable the application of the blockchain to delay-sensitive 5G services. To this end, the system rapidly disseminates the block data to all the peers on the blockchain network. The blockchain network is organized with mobile edge cloud (MEC) server and mobile peers in the 5G network. To ensure a scalable and reliable blockchain architecture, the core functionalities of the HLF blockchain are appropriately distributed among the mobile edge cloud and each mobile peer. The MEC server handles core functionalities for the blockchain network, such as block generation and membership management. In addition, it is responsible for gathering the network status of all peers and organizing the overlay structure to be utilized to rapidly propagate the block with a low network cost. On the other hand, the mobile peers handle the endorsing and validating functionalities to prevent block data tampering in the blockchain network. Furthermore, locality-aware device-to-device networking is utilized in 5G network coverage to achieve faster block dissemination. The proposed system is designed to work seamlessly in an existing HLF blockchain framework with consideration of scalability and compatibility. It is fully implemented using the open-source HLF and OpenAirInterface. To verify the effectiveness of the proposed block transport system, it was evaluated in an actual 5G network as well as 802.11 network. The experimental results verified its feasibility.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchains; Peer-to-peer computing; 5G mobile communication; Scalability; Reliability; Fabrics; Throughput; Blockchain; Hyperledger Fabric; Overlay Networks; D2D Communications; Mobile Edge Cloud; 5G Networks

【发表时间】2022

【收录时间】2022-07-24

【文献类型】 实证性文章

【DOI】 10.1109/TNSM.2021.3122923

Information Traceability Model for the Grain and Oil Food Supply Chain Based on Trusted Identification and Trusted Blockchain

【Author】 Zhang, Xin Li, Yue Peng, Xiangzhen Zhao, Zhiyao Han, Jiaqi Xu, Jiping

【影响因子】4.614

【主题类别】

区块链应用-实体经济-供应链

【Abstract】The grain and oil food supply chain has a complex structure, long turnover cycles, and many stakeholders, so it is challenging to maintain the security of this supply chain. A reliable traceability system for the whole grain and oil food supply chain will help to improve the quality and safety of these products, thus enhancing people's living standards. Driven by the trusted blockchain and trusted identity concepts, this paper constructs an information traceability model for the whole grain and oil food supply chain, and it describes how contract implementation and example verification are performed. First, an information traceability model framework of the whole grain and oil food supply chain is established based on the survey and analysis of the grain and oil food supply chain. Second, trusted identification, blockchain master-slave multi-chain storage, and trusted traceability mechanisms are designed. The trusted identification mechanism is used to track the data information of the whole grain and oil food supply chain. The blockchain master-slave multi-chain storage solves the problem of miscellaneous information caused by many links in the whole grain and oil supply chain, while the credible traceability mechanism ensures the credibility of information collection, storage, and transmission. Finally, based on the data flow, the model operation process is analyzed. Using the information traceability model, the grain and oil food trusted traceability system is designed and developed with the Hyperledger Fabric open-source framework, and a case study is conducted to verify the system. The results show that the model and system constructed in this study solve the problems of low data security and poor sharing, which exist widely in the traditional traceability mechanism, and enable the trusted uplink, storage, processing, and traceability of multi-source heterogeneous information in the lifecycle of the whole grain and oil food supply chain. The proposed system improves the granularity and accuracy of grain and oil food traceability, and provides support for the strategic security of grain stock.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】grain and oil food; information traceability model; trusted blockchain; trusted identification; Hyperledger Fabric; food safety

【发表时间】2022

【收录时间】2022-07-24

【文献类型】 理论性文章

【DOI】 10.3390/ijerph19116594

Fairness-Enabling Practices in Agro-Food Chain

【Author】 Samoggia, Antonella Beyhan, Zeynep

【影响因子】3.889

【主题类别】

区块链应用-实体经济-农牧领域

【Abstract】Fairness in the agro-food system is an increasingly important issue. Ensuring fair and ethical practices in the agro-food chain is essential for sustainable, effective, and resilient agro-food systems. Identifying and understanding fairness-enabling practices and existing business applications in the agro-food chain is crucial to create a sustainable system. This research study is an extensive literature review analyzing academic and grey literature. Thus, this study aims: (i) to conceptualize fairness in the agro-food system; (ii) to identify the fairness-enabling practices contributing to a fair agro-food system; and (iii) to explore existing agro-food chain business applications relevant to achieving a sustainable and fair agro-food chain. Fairness-enabling practices have a vital role in achieving fairness in the upstream and downstream operational stages of the agro-food chain. On the one hand, the upstream cycle includes many elements, from a ban on unfair trading practices to ethical treatment to farmers, from transparency through technology and innovation to ensuring fair remuneration. The key goal is to improve the position of farmers in the chain. The study considers the following five upstream focused business applications to enable fairness practices: blockchain, cooperatives, interbranch organizations, business applications for small-scale farmers, and Fairtrade. On the other hand, achieving success in the downstream operational stage of the chain depends on fairness-oriented consumer food choice, consumer intention to buy fair food, consumer perceived value of fair food, and increased information and transparency on agro-food costs and price. This paper takes into account two consumer-focused business applications which provide downstream fairness practices: dual entitlement and dynamic pricing. To conclude, agro-food chain actors should learn how to find profit in fairness, and turn fairness-related costs into profitable business models.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】fairness; ethics; business model; agro-food chain

【发表时间】2022

【收录时间】2022-07-24

【文献类型】 综述

【DOI】 10.3390/su14116391

Blockchain for Governments: The Case of the Dubai Government

【Author】 Khan, Shafaq Shael, Mohammed Majdalawieh, Munir Nizamuddin, Nishara Nicho, Mathew

【影响因子】3.889

【主题类别】

区块链应用-实体经济-公共管理

【Abstract】Blockchain technology is an innovative technology with the potential of transforming cities by augmenting the building of resilient societies and enabling the emergence of more transparent and accountable governments. To understand the capabilities of blockchain, as well as its impact on the public sector, this study conducted a review of blockchain technology and its implementations by various governments around the globe. E-government evolution is analyzed, based on empirical evidence from a Dubai government entity in the United Arab Emirates (UAE), which has utilized blockchain technology for developing end-user services, relevant to the public sector. Benefits achieved and challenges to overcome in such blockchain-based pilot deployments are discussed. The findings of this study offer new insights for practitioners involved in bringing in innovations for the benefit of society, using blockchain technology. Furthermore, it provides insights into policy actions to be developed to address the future challenges and to improve already existing e-government policies. The results of this research will benefit all blockchain-based pilot deployments by providing guidance and knowledge on this immature yet developing technology.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】blockchain; e-government services; department of economic development; e-government policies; end-user services

【发表时间】2022

【收录时间】2022-07-24

【文献类型】 实证性文章

【DOI】 10.3390/su14116576

Sharing Economy for Tackling Crypto-Laundering: The Europol Associated 'Global Conference on Criminal Finances and Cryptocurrencies'

【Author】 Ilbiz, Ethem Kaunert, Christian

【影响因子】3.889

【主题类别】

区块链治理-市场治理-数字货币

【Abstract】This article examines the compatibility of the Global Conference on Criminal Finances and Cryptocurrencies with a sharing economy model. The analysis is based on the claims presented in Europol documents and public statements of Europol executives that this initiative serves as a platform for knowledge exchange and building professional networks between public and private actors to tackle crypto-laundering. The article investigates the validity of these statements with the most prominent sharing economy concepts: low barrier accessibility, transaction cost and trust-building. The article employs each sharing economy concept on two beneficiaries of the platform-law enforcement agencies (LEAs) and non-governmental organizations-while scaling the platform's sharing economy level. Based on Europol documents, an expert interview and participant observation of the 5th Global Cryptocurrency Conference, the article's core argument is that these cryptocurrency conferences can be categorized as a 'partial' sharing economy platform. They reduce the transaction cost for public and private actors to share knowledge about the latest trends and threats about crypto-laundering and reduce transaction costs for networking. However, co-founders should consider integrating robust trust-building mechanisms that allow low barrier entry to the conference, which will facilitate more inclusive and optimized public-private partnerships (P3).

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】sharing economy; crypto-laundering; Europol; public-private partnerships

【发表时间】2022

【收录时间】2022-07-24

【文献类型】 理论性文章

【DOI】 10.3390/su14116618

Blockchain for Future Wireless Networks: A Decade Survey

【Author】 Rathod, Tejal Jadav, Nilesh Kumar Alshehri, Mohammad Dahman Tanwar, Sudeep Sharma, Ravi Felseghi, Raluca-Andreea Raboaca, Maria Simona

【影响因子】3.847

【主题类别】

区块链应用-实体经济-通信领域

【Abstract】The emerging need for high data rate, low latency, and high network capacity encourages wireless networks (WNs) to build intelligent and dynamic services, such as intelligent transportation systems, smart homes, smart cities, industrial automation, etc. However, the WN is impeded by several security threats, such as data manipulation, denial-of-service, injection, man-in-the-middle, session hijacking attacks, etc., that deteriorate the security performance of the aforementioned WN-based intelligent services. Toward this goal, various security solutions, such as cryptography, artificial intelligence (AI), access control, authentication, etc., are proposed by the scientific community around the world; however, they do not have full potential in tackling the aforementioned security issues. Therefore, it necessitates a technology, i.e., a blockchain, that offers decentralization, immutability, transparency, and security to protect the WN from security threats. Motivated by these facts, this paper presents a WNs survey in the context of security and privacy issues with blockchain-based solutions. First, we analyzed the existing research works and highlighted security requirements, security issues in a different generation of WN (4G, 5G, and 6G), and a comparative analysis of existing security solutions. Then, we showcased the influence of blockchain technology and prepared an exhaustive taxonomy for blockchain-enabled security solutions in WN. Further, we also proposed a blockchain and a 6G-based WN architecture to highlight the importance of blockchain technology in WN. Moreover, the proposed architecture is evaluated against different performance metrics, such as scalability, packet loss ratio, and latency. Finally, we discuss various open issues and research challenges for blockchain-based WNs solutions.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】wireless networks; security; privacy; blockchain; distributed ledger technology

【发表时间】2022

【收录时间】2022-07-24

【文献类型】 综述

【DOI】 10.3390/s22114182

Addressing the Challenges of Electronic Health Records Using Blockchain and IPFS

【Author】 Pilares, Iris Cathrina Abacan Azam, Sami Akbulut, Serkan Jonkman, Mirjam Shanmugam, Bharanidharan

【影响因子】3.847

【主题类别】

区块链应用-实体经济-医疗领域

【Abstract】Electronic Health Records (EHR) are the healthcare sector's core digital strategy meant to improve the quality of care provided to patients. Despite the benefits afforded by this digital transformation initiative, adoption among healthcare organizations has been slower than desired. The sheer volume and sensitive nature of patient records compel these organizations to exercise a healthy amount of caution in implementing EHR. Cyberattacks have also increased the risks associated with non-optimal EHR implementations. An influx of high-profile data breaches has plagued the sector during the COVID-19 pandemic, which put the spotlight on EHR cybersecurity. One objective of this research project is to aid the acceleration of EHR adoption. Another objective is to ensure the robustness of the system to resist malicious attacks. For the former, a systematic review was used to unearth all the possible causes why the adoption of EHR has been anemic. In this paper, sixty-five existing proposed EHR solutions were analyzed and it was found that there are fourteen major challenges that need to be addressed to reduce friction and risk for health organizations. These were privacy, security, confidentiality, interoperability, access control, scalability, authentication, accessibility, availability, data storage, data ownership, data validity, data integrity, and ease of use. We propose EHRChain, a new framework that tackles all the listed challenges simultaneously to address the first objective while also being designed to achieve the second objective. It is enabled by dual-blockchains based on Hyperledger Sawtooth to allow patient data decentralization via a consortium blockchain and IPFS for distributed data storage.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】blockchain; cryptography; electronic health record; privacy; security; distributed file system

【发表时间】2022

【收录时间】2022-07-24

【文献类型】 理论性文章

【DOI】 10.3390/s22114032

A Systematic Review of Blockchain Applications

【Author】 Sunny, Farhana Akter Hajek, Petr Munk, Michal Abedin, Mohammad Zoynul Satu, Md. Shahriare Efat, Md. Iftekharul Alam Islam, Md. Jahidul

【影响因子】3.476

【主题类别】

区块链应用-实体经济-其他

【Abstract】For this study, the researchers conducted a systematic literature review to answer complex questions about the field of blockchain technology. We used an unbiased systematic review process to find works on blockchain-based applications and developed a Python code that searched various online databases. This paper provides an overview of the characteristics, mode of operation, and applications of blockchains in various domains such as transportation, commerce and industry, privacy and security, the financial sector, government, education, healthcare, and the Internet of Things (IoT). The aim was to identify the key research themes addressed in existing articles within each application domain and suggest future research directions for these domains. We analyzed a set of 750 articles published between 2015 and 2021 that dealt with blockchain applications. We found that financial management and security issues have been the main research focus since 2015. However, the use of blockchain in education has become a central research theme in 2021. Healthcare, IoT, and government applications have also grown in popularity. We furthermore analyzed some of the implementations of privacy mechanisms, as well as the challenges and future directions that need to be addressed for effective blockchain deployment. This study contributes to existing research by providing a comprehensive overview of blockchain application themes and their emerging areas for stakeholders in diverse sectors.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchains; Databases; Systematics; Security; Privacy; Medical services; Government; Blockchain; applications; business and industry; internet of things; privacy and security

【发表时间】2022

【收录时间】2022-07-24

【文献类型】 综述

【DOI】 10.1109/ACCESS.2022.3179690

Embedded Intelligence: State-of-the-Art and Research Challenges

【Author】 Seng, Kah Phooi Ang, Li-Minn

【影响因子】3.476

【主题类别】

区块链技术-协同技术-边缘计算

【Abstract】Recent years have seen deployments of increasingly complex artificial intelligent (AI) and machine learning techniques being implemented on cloud server architectures and embedded into edge computing devices for supporting Internet of Things (IoT) and mobile applications. It is important to note that these embedded intelligence (EI) deployments on edge devices and cloud servers have significant differences in terms of objectives, models, platforms and research challenges. This paper presents a comprehensive survey on EI from four aspects: (1) First, the state-of-the-art for EI using a set of evaluation criteria is proposed and reviewed; (2) Second, EI for both cloud server accelerators and low-complexity edge devices are discussed; (3) Third, the various techniques for EI are categorized and discussed from the system, algorithm, architecture and technology levels; and (4) The paper concludes with the lessons learned and the future prospects are discussed in terms of the key role EI is likely to play in emerging technologies and applications such as Industry 4.0. This paper aims to give useful insights and future prospects for the developments in this area of study and highlight the challenges for practical deployments.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Computer architecture; Artificial intelligence; Servers; Field programmable gate arrays; Classification algorithms; Energy efficiency; Cloud computing; Embedded systems; SoC; FPGA; GPU; parallel architecture; machine learning; deep learning; IoT; edge AI

【发表时间】2022

【收录时间】2022-07-24

【文献类型】 综述

【DOI】 10.1109/ACCESS.2022.3175574

Multimedia Automation Access Control of Big Data Open Resources Based on Blockchain

【Author】 Zhao, Nan Su, Hui Han, QingSheng Zhao, Yan

【影响因子】3.120

【主题类别】

区块链技术-协同技术-大数据

【Abstract】In order to better mine the value of data, the author proposes a research on the automatic access control of big data open resources multimedia based on blockchain and introduces big data access control BBAC-BD (blockchain-based access control mechanism for big data environment). The author designed a strategy management contract based on the Bloom filter, as a probabilistic data structure with extremely high space utilization efficiency and proposed the strategic management contract (PAP CONTRACT) and the strategic decision contract (PDP CONTRACT). In this way, the nontampering, auditability, and verifiability of the access control information are guaranteed; then, the access control method based on smart contracts is adopted to realize the user-driven, whole-process transparent, and dynamic and automatic access control of big data resources. The simulation results show that the greater the ratio of n/k, the better the optimization effect, and the greater the ratio, the lower the corresponding misjudgment rate, but it will also take up more space costs. At the same time, the true value of the false positive rate is generally less than the theoretical value of the false positive rate. When the performance of Hash (strategy to retrieve) is better, the result of Hash distribution is more uniform. Under the condition of m = 3, the misjudgment rate acceptable for the expected use can be achieved, and the increase in the number of Hashes will not bring a significant increase in revenue. Freed from the traditional model of providing access control services based on third parties, solve the problem of transparency of authority judgments; at the same time, through smart contracts, based on the strategy published by the resource owner on the blockchain, realize automatic access control to big data resources; and make the judicial process more flexible and the judgment result more credible. The BBAC-BD mechanism realizes a safe, reliable, and transparent new access control architecture, and it can effectively promote the safe circulation and sharing of big data.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】

【发表时间】2022

【收录时间】2022-07-24

【文献类型】 理论性文章

【DOI】 10.1155/2022/4410075

Innovative Mode of Logistics Management of "Internet of Things plus Blockchain"-Integrated E-Commerce Platform

【Author】 Yujie, Hou Qiuxia, Hao

【影响因子】3.120

【主题类别】

区块链应用-实体经济-电商领域

【Abstract】The innovation of logistics management mode plays a great role in promoting the operation timeliness of an e-commerce platform. The question of how to realize the research on the innovation mode of logistics management of the e-commerce platform with the integration of "Internet of things + blockchain" is the current development trend. Based on this, this paper studies the influencing factors of logistics management of an e-commerce platform under the discrete analysis strategy of "Internet of things + blockchain." First, the logistics management analysis model of an e-commerce platform integrating "Internet of things + blockchain" is proposed. The dynamic correlation function is used to simulate the logistics information in the e-commerce platform. Through the extreme value of the dynamic correlation function curve in the detection process, the operation signal is restored, and then its logistics management is analyzed. Second, the influencing factors in the logistics management of the e-commerce platform are analyzed, comprehensive analysis is done by using the "Internet of things + blockchain" integration model, the dynamic logistics information in the operation of the e-commerce platform is accurately gathered, and the multidimensional hierarchical method is used for quality evaluation. Finally, the effectiveness of the logistics management analysis model of the e-commerce platform is verified by many experiments.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】

【发表时间】2022

【收录时间】2022-07-24

【文献类型】 理论性文章

【DOI】 10.1155/2022/7766228

Assuring Anonymity and Privacy in Electronic Voting with Distributed Technologies Based on Blockchain

【Author】 Neziri, Vehbi Shabani, Isak Dervishi, Ramadan Rexha, Blerim

【影响因子】2.838

【主题类别】

区块链技术-核心技术-加密算法

【Abstract】Anonymity and privacy in the electoral process are mandatory features found in any democratic society, and many authors consider these fundamental civil liberties and rights. During the election process, every voter must be identified as eligible, but after casting a vote, the voter must stay anonymous, assuring voter and vote unlinkability. Voter anonymity and privacy are the most critical issues and challenges of almost all electronic voting systems. However, vote immutability must be assured as well, which is a problem in many new democracies, and Blockchain as a distributed technology meets this data immutability requirement. Our paper analyzes current solutions in Blockchain and proposes a new approach through the combination of two different Blockchains to achieve privacy and anonymity. The first Blockchain will be used for key management, while the second will store anonymous votes. The encrypted vote is salted with a nonce, hashed, and finally digitally signed with the voter's private key, and by mixing the timestamp of votes and shuffling the order of cast votes, the chances of linking the vote to the voter will be reduced. Adopting this approach with Blockchain technology will significantly transform the current voting process by guaranteeing anonymity and privacy.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】privacy; anonymity; electronic voting; Blockchain; vote; distributed technologies

【发表时间】2022

【收录时间】2022-07-24

【文献类型】 理论性文章

【DOI】 10.3390/app12115477

Privacy-Preserving Data Mining on Blockchain-Based WSNs

【Author】 Hrovatin, Niki Tosic, Aleksandar Mrissa, Michael Kavsek, Branko

【影响因子】2.838

【主题类别】

区块链技术-协同技术-隐私计算

【Abstract】Currently, the computational power present in the sensors forming a wireless sensor network (WSN) allows for implementing most of the data processing and analysis directly on the sensors in a decentralized way. This shift in paradigm introduces a shift in the privacy and security problems that need to be addressed. While a decentralized implementation avoids the single point of failure problem that typically applies to centralized approaches, it is subject to other threats, such as external monitoring, and new challenges, such as the complexity of providing decentralized implementations for data mining algorithms. In this paper, we present a solution for privacy-aware distributed data mining on wireless sensor networks. Our solution uses a permissioned blockchain to avoid a single point of failure in the system. Contracts are used to construct an onion-like structure encompassing the Hoeffding trees and a route. The onion-routed query conceals the network identity of the sensors from external adversaries, and obfuscates the actual computation to hide it from internally compromised nodes. We validate our solution on a use case related to an air quality-monitoring sensor network. We compare the quality of our model against traditional models to support the feasibility and viability of the solution.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】WSN; air quality; privacy; blockchain; data mining

【发表时间】2022

【收录时间】2022-07-24

【文献类型】 理论性文章

【DOI】 10.3390/app12115646

A Brief Review on Internet of Things, Industry 4.0 and Cybersecurity

【Author】 Rudenko, Roman Pires, Ivan Miguel Oliveira, Paula Barroso, Joao Reis, Arsenio

【影响因子】2.690

【主题类别】

区块链技术-协同技术-物联网

【Abstract】The advance of industrialization regarding the optimization of production to obtain greater productivity and consequently generate more profits has led to the emergence of Industry 4.0, which aims to create an environment called smart manufacturing. On the other hand, the Internet of Things is a global network of interrelated physical devices, such as sensors, actuators, intelligent applications, computers, mechanical machines, objects, and people, becoming an essential part of the Internet. These devices are data sources that provide abundant information on manufacturing processes in an industrial environment. A concern of this type of system is processing large sets of data and generating knowledge. These challenges often raise concerns about security, more specifically cybersecurity. Good cybersecurity practices make it possible to avoid damage to production lines and information. With the growing increase in threats in terms of security, this paper aims to carry out a review of existing technologies about cybersecurity in intelligent manufacturing and an introduction to the architecture of the IoT and smart manufacturing.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】cybersecurity; industry; Internet of Things; literature review

【发表时间】2022

【收录时间】2022-07-24

【文献类型】 综述

【DOI】 10.3390/electronics11111742

A Chemical Analysis of Hybrid Economic Systems-Tokens and Money

【Author】 Pardi, Anabele-Linda Paolucci, Mario

【影响因子】2.592

【主题类别】

区块链治理-市场治理-数字货币

【Abstract】With the influence of digital technology in our daily lives continuously growing, we investigate methods with the purpose of assessing the stability, sustainability, and design of systems of token economies that include tokens and conventional currencies. Based on a chemical approach, we model markets with a minimum number of variables and compare the transaction rates, stability, and token design properties at different levels of tokenisation. The kinetic study reveals that in certain conditions, if the price of a product contains both conventional money and tokens, one can treat this combination as one composite currency. The dynamic behaviour of the analysed systems is proven to be dynamically stable for the chosen models. Moreover, by applying the supply and demand law to recalculate the prices of products, the necessity of previous knowledge of certain token attributes-token divisibility and token-money exchange rates-emerges. The chemical framework, along with the analytic methods that we propose, is flexible enough to be adjusted to a variety of conditions and offer valuable information about economic systems.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】digital technology; blockchain; cryptoeconomic design; economic system; chemical analysis; tokens; token engineering

【发表时间】2021

【收录时间】2022-07-24

【文献类型】 实证性文章

【DOI】 10.3390/math9202607

Cryptographic-Biometric Self-Sovereign Personal Identities

【Author】 Drusinsky, Doron

【影响因子】2.256

【主题类别】

区块链技术-核心技术-加密算法

【Abstract】This article describes a hybrid of self-sovereign identities (SSIs), cryptographic authentication, and biometric authentication, which allows remote yet secure proof of identity, all while addressing privacy concerns. The proposed technique addresses cooperative attacks, which are unique to the SSI embodiment of blockchain technology.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】

【发表时间】2022

【收录时间】2022-07-24

【文献类型】 实证性文章

【DOI】 10.1109/MC.2022.3164527

Blockchain-Envisioned Secure Authentication Approach in AIoT: Applications, Challenges, and Future Research

【Author】 Wazid, Mohammad Das, Ashok Kumar Park, Youngho

CCF-C

【影响因子】2.146

【主题类别】

区块链技术-协同技术-物联网

【Abstract】The Artificial Intelligence of Things (AIoT) is the amalgamation of Artificial Intelligence (AI) methods and the Internet of Things (IoT) infrastructure, which are deployed there to improve the overall performance of the system. AIoT can be deployed to achieve more efficient IoT operations; thereby can improve human-machine interactions and provide better data analysis. AI methods can be used to transform IoT data into useful information for the better decision-making processes, and it further increases the overall usability of the system. AIoT frameworks are very useful and applicable in a variety of applications, like security and surveillance system, smart home, intelligent transportation system, smart farming, secure and safe healthcare monitoring, industrial automation and control, eCommerce, logistics operations and control, and many more. However, AIoT frameworks may have issues related to data security and privacy as they are vulnerable to various types of information security-related attacks. These issues further cause the serious consequences, like the unauthorized data leakage and data update. Blockchain is a specific type of database. It is a digital ledger of transactions, which is duplicated and distributed across the entire network of computer systems. It stores data in the form of some blocks, which are then chained together. Blockchain is tamper proof and provides more security as compared to the traditional security mechanisms. Hence, blockchain can be integrated in various AIoT applications to provide more security. A generalized blockchain-envisioned secure authentication framework for AIoT has been proposed. The adversary model of blockchain-envisioned secure authentication framework for AIoT is also highlighted that covers most of the potential threats of a kind of communication environment. Various applications of the proposed framework are also discussed. Furthermore, different issues and challenges of the proposed framework are highlighted. In the end, we also provide some future research directions relevant to the proposed framework.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】

【发表时间】2021

【收录时间】2022-07-24

【文献类型】 综述

【DOI】 10.1155/2021/3866006

Research on Privacy Data Protection Based on Trusted Computing and Blockchain

【Author】 Zhu, Linkai Peng, Sheng Cai, Zhiming Liu, Wenjian He, Chunjiang Tang, Weikang

CCF-C

【影响因子】1.968

【主题类别】

区块链技术-协同技术-隐私计算

【Abstract】Aiming at the problems of low protection accuracy and long time consumption in traditional privacy data protection methods, a privacy data protection method based on trusted computing and blockchain is proposed. Set up the Internet node secure transmission protocol through the trusted node uplink transmission protocol and the downlink transmission protocol, and according to the transmission protocol, combined with the blockchain technology, the ECC elliptic curve encryption algorithm is used to encrypt the amount of data existing in the blockchain, and the AES symmetric encryption algorithm is used to encrypt the private data that exists in the nonblockchain, thereby completing the protection of network private data. The simulation experiment results show that the privacy data protection accuracy of the proposed method is higher and the work efficiency is faster.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】

【发表时间】2021

【收录时间】2022-07-24

【文献类型】 理论性文章

【DOI】 10.1155/2021/6274860

复旦大学“服务计算与区块链技术前沿”国内外知名学者学术报告会成功举行

【作者】

【作者单位】复旦大学;

【文献来源】信息网络安全

【复合影响因子】1.887

【综合影响因子】0.804

【主题类别】

区块链技术-核心技术-核心技术集

【摘要】2022年4月10日,由复旦大学计算机学院网络空间安全学科方向承办的第四期“国内外知名学者学术报告”(Fudan CSF3-GLS)——“服务计算与区块链技术前沿”学术报告活动,在线上成功举行。本次活动由网络空间安全学科方向的吕智慧教授主持,邀请了浙江大学的尹建伟教授与中山大学的郑子彬教授围绕服务计算与区块链领域的关键技术和发展趋势开展专题学术报告与交流。本次活动也是CCF服务计算专委会走进复旦大学的一次活动,吸引了460多名师生参与。

【关键词】服务计算;复旦大学;区块链技术;报告会;

【文献类型】 会议概要

【DOI】

【发表时间】2022-07-24

基于区块链的属性加密多授权机构安全模型研究

【作者】 崔皓宇;马利民;王佳慧;张伟;

【作者单位】北京信息科技大学网络文化与数字传播北京市重点实验室;北京信息科技大学计算机学院;国家信息中心信息与网络安全部;

【文献来源】信息网络安全

【复合影响因子】1.887

【综合影响因子】0.804

【主题类别】

区块链技术-核心技术-加密算法

【摘要】云环境中属性加密算法可以有效实现数据云存储的细粒度访问控制,基于单授权机构的属性加密算法可能存在单点故障、密钥分发困难等问题,基于多授权机构的属性加密算法则存在通信开销大、授权机构不可信等问题。针对上述问题,文章提出一种基于区块链的属性加密多授权机构安全访问控制模型。首先,多个授权机构联合参与属性密钥生成和安全传输,避免了密钥关键信息的泄露;其次,通过共识机制和滑动窗口机制动态调节授权机构数量,防止单点故障,实现负载均衡。理论分析和实验数据表明,文章所提的方案能够有效保障数据安全,提高授权机构可信性、可靠性以及可审计性。

【关键词】区块链;;属性加密;;多授权机构

【文献类型】 理论性文章

【DOI】

【发表时间】2022-07-24

基于区块链的隐私信用数据受限共享技术研究

【作者】 刘嘉微;马兆丰;王姝爽;罗守山;

【作者单位】北京邮电大学网络空间安全学院;

【文献来源】信息网络安全

【复合影响因子】1.887

【综合影响因子】0.804

【主题类别】

区块链技术-核心技术-核心技术集

【摘要】随着当前信用体系的发展,信用数据数字化是推动社会信用建设的必然选择。当前用户信用数据主要是以明文形式存储在中心化的信用机构中,存在共享难、安全性差的问题。由于区块链具有可追溯、不可篡改的特性,这为信用领域提供了一种新型的分布式存储解决方案。文章结合区块链、同态加密算法、访问控制算法和非对称算法,提出了一个数据受限共享与隐私保护的区块链模型,模型中通过调用ECC非对称算法对信用数据进行加密后发送到云服务器中;在云端引入SEAL库中的CKKS算法进行同态加密,解决了密文计算开销大的痛点;以区块链证书颁发中心作为可信第三方,完成改进后的访问控制算法CP-ABE的初始化、密钥生成与分发;然后将信用数据存证在区块链上。本文模型实现的系统可确保用户权限的细粒度访问控制与隐私保护。功能和性能评测表明,文章所提方法在数字信用领域中的隐私保护、信用存证、访问控制等方面具有重要的参考意义与应用价值,应用系统吞吐量及区块链TPS能够满足实际应用性能需要。

【关键词】数字信用;;区块链;;同态加密;;访问控制;;非对称加密

【文献类型】 实证性文章

【DOI】

【发表时间】2022-07-24

基于跨链交互的网络安全威胁情报共享方案

【作者】 冯景瑜;张琪;黄文华;韩刚;

【作者单位】西安邮电大学无线网络安全技术国家工程实验室;

【文献来源】信息网络安全

【复合影响因子】1.887

【综合影响因子】0.804

【主题类别】

区块链技术-核心技术-跨链与多链

【摘要】随着数字化转型逐步深入各行业,网络边界正逐渐淡化,网络安全威胁情报共享成为保护信息化基础设施安全的必要手段之一。针对单链威胁情报共享存在的查询和交易性能瓶颈问题,文章在多链模式基础上提出跨区块链交互的威胁情报共享方案。通过设计情报链、监管链和积分链的多链模型,防止内部成员恶意利用情报,有效提升参与方共享意愿及情报共享效率。为保障跨链交互的一致性,采用哈希锁定的跨链机制构建智能合约,确保多链间信息互换安全。考虑到威胁信息具有海量、多元、异构的特性,文章设计了一种情报处理机制,对威胁信息进行统一描述转换。最后在国产开源跨链平台WeCross上进行实验,证明了该方案的有效性。

【关键词】区块链;;威胁情报共享;;跨链交互;;智能合约

【文献类型】 理论性文章

【DOI】

【发表时间】2022-07-24

以太坊智能合约定理证明中的形式化规约研究综述

【作者】 华景煜;黄达明;

【作者单位】南京大学计算机科学与技术系;

【文献来源】信息网络安全

【复合影响因子】1.887

【综合影响因子】0.804

【主题类别】

区块链技术-核心技术-智能合约

【摘要】以太坊智能合约的形式化验证是目前的研究热点,在各种形式化验证方法中,定理证明方法具有误报少、可以处理大状态空间等优点。定理证明需要强大的形式化规约表达能力作为基础。文章对现有以太坊智能合约的定理证明研究中使用的形式化规约表达方法进行综述,从智能合约开发语言和区块链内生语义的建模、智能合约安全属性和功能属性的形式化规约表达、自动定理证明和交互式定理证明的选择等角度对形式化规约方法进行比较和讨论,并指出目前的困难和未来的研究方向。

【关键词】以太坊;;智能合约;;形式化规约;;形式化验证;;定理证明

【文献类型】 综述

【DOI】

【发表时间】2022-07-24

区块链数据保密查询的不经意传输方案

【作者】 刘新;胡翔瑜;徐刚;陈秀波;

【作者单位】内蒙古科技大学信息工程学院;北方工业大学信息科学与技术学院;北京邮电大学网络与交换技术国家重点实验室信息安全中心;

【文献来源】计算机工程

【复合影响因子】1.808

【综合影响因子】1.289

【主题类别】

区块链技术-协同技术-隐私计算

【摘要】随着区块链的发展,用户的数据安全和隐私保护问题受到广泛关注。目前存在用户查询数据时由于区块链的透明化和公开化,使全网的每个节点都可以获取查询者的数据信息,从而导致个人隐私和查询数据泄漏等问题。针对此问题,结合链上-链下数据存储方式,提出了区块链数据保密查询的不经意传输方案,实现了用户和查询者的隐私保护,能有效的识别恶意节点,同时证明了方案的正确性和安全性。该方案改进了现有链上-链下相结合的存储方式,引入重加密节点进行海量数据的存储和传输,确保用户数据的完整性、可靠性和可验证性,同时降低了用户的存储空间。在隐私保护方面,方案利用不经意传输方式,使数据查询方在区块链上获取数据后,全网和各个节点不知道查询者获取了哪一个数据,保护了查询方的敏感隐私。方案中链上-链下存储方式与不经意传输均采用椭圆曲线加密算法,链下每个重加密节点仅需要512nt比特的存储空间,链上每个区块大小仅为1024nt比特,查询者完成一次区块链上的不经意传输仅需要2n+2k次椭圆曲线乘法运算。该方案与现有方案相比具有存储空间小、计算复杂度低等优势,并具有实用价值。

【关键词】区块链;;保密查询;;链上-链下存储模型;;不经意传输;;椭圆曲线加密算法

【文献类型】 理论性文章

【DOI】 10.19678/j.issn.1000-3428.0063861

【发表时间】2022-07-24

一种基于区块链的无人机集群协作监测框架设计

【作者】 翁越男;魏小平;刘洋;韩楠;魏盛杰;刘雯;林羽丰;乔少杰;

【作者单位】成都信息工程大学软件工程学院;四川数辰科技有限公司;成都携恩科技有限公司;四川音乐学院数字媒体艺术四川省重点实验室;四川省大数据中心;

【文献来源】无线电工程

【复合影响因子】

【综合影响因子】

【主题类别】

区块链应用-实体经济-通信领域

【摘要】提出了一个新型无人机(Unmanned Aerial Vehicle, UAV)集群协作监测公共卫生事件的监测框架,并讨论了该框架中UAV执行的任务类型与流程。针对UAV集群通信面临的复杂度高、资源消耗大以及安全性低等挑战,引入区块链技术来提升其高效性与安全性,提出了一种改进的拜占庭容错(Improved Byzantine Fault Tolerant, IBFT)算法,该算法具有最小的成本和资源并具备可扩展性和普适性。在正常情况下使用f+1个节点,在通信故障情况下使用2f+1个节点,而拜占庭容错算法使用3f+1个节点。实验结果表明,所提算法相比于其他对比算法,具有更高的吞吐量和更低的共识时延,能有效保证UAV集群协作监测紧急公共卫生事件,为疫情防控提供一种新手段。

【关键词】无人机集群;;区块链;;公共卫生事件;;共识算法;;疫情防控

【文献类型】 理论性文章

【DOI】

【发表时间】2022-07-24

基于区块链的农产品质量安全可信溯源系统研究

【作者】 刘双印;雷墨鹥兮;徐龙琴;李景彬;孙传恒;杨信廷;

【作者单位】仲恺农业工程学院智慧农业创新研究院;广东省高校智慧农业工程技术研究中心;石河子大学机械电气工程学院;国家农业信息化工程技术研究中心;

【文献来源】农业机械学报

【复合影响因子】

【综合影响因子】

【主题类别】

区块链应用-实体经济-农牧领域

【摘要】为解决现有农产品质量溯源系统存在的数据中心化存储、数据易篡改和数据信任等问题,以及保障农产品质量安全、维护消费者权益和提高生产企业品牌竞争力,在分析农产品产业链业务流程和区块链关键技术的基础上,设计了农产品可信溯源区块结构,确保农产品溯源数据不可伪造和安全可信;提出了“On-Chain+Off-Chain”农产品质量安全溯源信息协同管理存储策略,解决农产品溯源区块链网络中各节点数据存储压力大、查询效率低和数据爆炸等问题;采用Kafka共识机制实现多主体参与的共识操作,提供实时数据高吞吐量和低延时的处理能力;制定了农产品溯源智能合约规则集和合约触发条件,确保农产品数据的可靠性和溯源平台的公信力;基于Hyperledger Fabric区块链平台研制了农产品质量安全可信溯源系统,并对红茶产品质量安全溯源进行验证分析。结果表明,本文研制的农产品质量安全可信溯源系统,解决了农产品产业链生产、加工和流通多节点之间数据安全和溯源信息真实可信等问题,取得了较好的应用效果。

【关键词】农产品;;可信溯源系统;;区块链;;共识机制;;智能合约

【文献类型】 实证性文章

【DOI】

【发表时间】2022-07-24

在线标注

备案号: 苏ICP备17025947号-5

评论回复