CCF-A
【影响因子】7.231
【主题类别】
区块链技术-核心技术-扩展方案
【Abstract】Blockchain is a technology with decentralization and immutability features and has been employed for auditing by many applications. However, immutability sometimes limits the application of blockchain technology. For example, vulnerable smart contracts on blockchain cannot be redacted due to immutability. The existing redactable blockchain solutions either have a low efficiency or violate the decentralization feature. Moreover, those solutions lack mechanisms for tracing redaction history and checking block consistency. In this paper, we present an efficient redactable blockchain with traceability in the decentralized setting. Specifically, we propose a decentralized chameleon hash function for redactable blockchain that every redaction must be approved by multiple blockchain nodes. We also design a redactable blockchain structure that maintains all redactions of a block and encodes the redacted blocks into an RSA accumulator. Then, we propose an efficient block consistency check protocol based on the RSA accumulator. Finally, we conduct experiments and compare our scheme with another decentralized redactable blockchain to demonstrate that our solution is efficient in practice.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchains; Hash functions; History; Proposals; Vegetation; Public key; Electronic mail; Redactable blockchain; decentralization; chameleon hash
【发表时间】2022
【收录时间】2022-08-28
【文献类型】 理论模型
【影响因子】3.476
【主题类别】
区块链技术-协同技术-物联网
【Abstract】In this study, a new blockchain protocol and a novel architecture that integrate the advantages offered by edge computing, artificial intelligence (AI), IoT end-devices, and blockchain were designed, developed, and validated. This new architecture has the ability to monitor the environment, collect data, analyze it, process it using an AI-expert engine, provide predictions and actionable outcomes, and finally share it on a public blockchain platform. For the use-case implementation, the pandemic caused by the wide and rapid spread of the novel coronavirus COVID-19 was used to test and evaluate the proposed system. Recently, various authors traced the spread of viruses in sewage water and studied how it can be used as a tracking system. Early warning notifications can allow governments and organizations to take appropriate actions at the earliest stages possible. The system was validated experimentally using 14 Raspberry Pis, and the results and analyses proved that the system is able to utilize low-cost and low-power flexible IoT hardware at the processing layer to detect COVID-19 and predict its spread using the AI engine, with an accuracy of 95%, and share the outcome over the blockchain platform. This is accomplished when the platform is secured by the honesty-based distributed proof of authority (HDPoA) and without any substantial impact on the devices' power sources, as there was only a power consumption increase of 7% when the Raspberry Pi was used for blockchain mining and 14% when used to produce an AI prediction.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchains; Internet of Things; Artificial intelligence; Security; Computer architecture; Smart contracts; Edge computing; Edge computing; blockchain protocol; the Internet of Things (IoT); flexible IoT hardware; artificial intelligence (AI); coronavirus disease (COVID-19)
【发表时间】2022
【收录时间】2022-08-28
【文献类型】 实证数据
【Author】 Arshad, Junaid Azad, Muhammad Ajmal Prince, Alousseynou Ali, Jahid Papaioannou, Thanasis G.
【影响因子】3.476
【主题类别】
区块链应用-虚拟经济-虚拟信用
【Abstract】Reputation systems are an important means to facilitate trustworthy interactions between on-and off-chain services and users. However, contemporary reputation systems are typically dependent on a trusted central authority to preserve privacy of raters or on adding noise into the user feedback. Moreover, the accuracy of reputation values relies on the integrity of user feedback or input; this feedback should not be tampered with or misused for other purposes. This paper presents blockchain-based reputation system named REPUTABLE (A Decentralized Reputation System for blockchain-based Ecosystems), which computes the reputation of service providers and external services within a blockchain ecosystem through decentralized on-chain and off-chain implementation. Specifically, REPUTABLE not only ensures privacy, but also reliability, integrity and accuracy of reputation values, while incurring minimal overhead. It also enables performing certain data or statistical analytics functions on user feedback, whilst preserving security, privacy, accountability and unlinkability of participants and their feedback. We present a proof-of-concept implementation and a demonstration of the REPUTABLE system. Finally, by means of formal and empirical evaluation, we show the effectiveness of our proposed system to preserve the anonymity of user feedback and the high performance of its blockchain-based implementation.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchains; Privacy; Ecosystems; Data privacy; Reliability; Peer-to-peer computing; Reputation; privacy; unlinkability; blockchain; trust
【发表时间】2022
【收录时间】2022-08-28
【文献类型】 实证数据
【影响因子】3.476
【主题类别】
区块链技术-核心技术-加密算法
【Abstract】Many blockchain processes require pseudo-random numbers. This is especially true of blockchain consensus mechanisms that aim to fairly distribute the opportunity to propose new blocks between the participants in the system. The starting point for these processes is a source of randomness that participants cannot manipulate. This paper proposes two methods for embedding random number seeds in a blockchain data structure to serve as inputs to pseudo-random number generators. Because the output of a pseudo-random number generator depends deterministically on its seed, the properties of the seed are critical to the quality of the eventual pseudo-random number produced. Our protocol, B-Rand, embeds random number seeds that are confidential, tamper-resistant, unpredictable, collision-resistant, and publicly verifiable as part of every transaction. These seeds may then be used by transaction owners to participate in processes in the blockchain system that require pseudo-random numbers. Both the Single Secret and Double Secret B-Rand protocols are highly scalable with low space and computational cost, and the worst case is linear in the number of transactions per block.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchains; Generators; Consensus algorithm; Bitcoin; Stakeholders; Protocols; Peer-to-peer computing; B-Rand; blockchain; consensus algorithm; homomorphic encryption; pseudo-random number generation; random number seeds
【发表时间】2022
【收录时间】2022-08-28
【文献类型】 理论模型
【影响因子】3.476
【主题类别】
区块链治理-市场治理-数字货币
【Abstract】According to recent estimates, one bitcoin transaction consumes as much energy as 1.5 million Visa transactions. Why is bitcoin using so much energy? Most of the energy is used during the bitcoin mining process, which serves at least two significant purposes: a) distributing new cryptocurrency coins to the cryptoeconomy and b) securing the Bitcoin blockchain ledger. In reality, the comparison of bitcoin transactions to Visa transactions is not that simple. The amount of transactions in the Bitcoin network is not directly connected to the amount of bitcoin mining power nor the energy consumption of those mining devices; for example, it is possible to multiply the number of bitcoin transactions per second without increasing the mining power and the energy consumption. Bitcoin is not only "digital money for hackers". It has very promising future potential as a global reserve currency and a method to make the World Wide Web (WWW) immune to cyberattacks such as the Distributed Denial-of-Service attacks. This survey approached cryptocurrencies' various technological and environmental issues from many different perspectives. To make various cryptocurrencies, including bitcoin (BTC) and ether (ETH), greener and more justified, what technological solutions do we have? We found that cryptocurrency mining might be cleaner than is generally expected. There is also a plan to make a vast renewable energy source available by combining Ocean Thermal Energy Conversion and Bitcoin mining. There are plans to use unconventional computing methods (quantum computing, reversible computing, ternary computing, optical computing, analog computing) to solve some of the issues regarding the vast energy consumption of conventional computing (including cryptocurrency mining). We think using spare computing cycles for grid computing efforts is justified. For example, there are billions of smartphones in the world. Many smartphones are being recharged every day. If this daily recharging period of twenty to sixty minutes would be used for grid computing, for example, finding new cures to cancer, it would probably be a significant breakthrough for medical research simulations. We call cryptocurrency communities to research and develop grid computing and unconventional computing methods for the most significant cryptocurrencies: bitcoin (BTC) and ether (ETH).
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Bitcoin; Blockchains; Green products; Energy consumption; Air pollution; Peer-to-peer computing; Grid computing; Blockchain; DLT; cryptocurrency; bitcoin; green technology; sustainability; unconventional computing; climate change
【发表时间】2022
【收录时间】2022-08-28
【文献类型】 综述
【Author】 Rehman, Abdul Hassan, Mohd Fadzil Hooi, Yew Kwang Qureshi, Muhammad Aasim Shukla, Saurabh Susanto, Erwin Rubab, Saddaf Abdel-Aty, Abdel-Haleem
【影响因子】3.476
【主题类别】
区块链应用-实体经济-交通领域
【Abstract】Secure communication is the top concern of the Internet of Vehicles (IoV). The trust between nodes can have a considerable impact on ensuring IoV security. Therefore, the trustworthiness of a received message must be evaluated before acting upon it. A malicious node can broadcast bogus events to obtain network control. False reports and malicious vehicles render the network unreliable during emergencies. In this study, a unique trust framework is presented that considers most of the aspects of trust in IoV to accurately identify malicious nodes and events. Previous studies have proposed some trust models for VANETs, which have many deficiencies in serving IoV. In particular, they lack dynamism and practical implementations. All the existing models have two things in common, first they work on fixed parameters, and second, they use static scenarios. In contrast, the proposed framework is based on a context-awareness cognitive approach with artificial intelligence (AI) properties. The framework cognitively learns the environment from the received report and creates a context around an event. In addition to trust management (TM), the proposed framework offers a novel process for detecting and screening malicious nodes using anomaly outliers. The performance of the framework was examined using an experimental simulation. The proposed framework was compared with top benchmarks in the field. The results show inclining performance indicators. The proposed trust-management framework has the potential to serve as a component of IoV security.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Security; Context modeling; Data models; Blockchains; Vehicular ad hoc networks; Trust management; Computational modeling; Internet of Vehicles (IoV); trust management (TM); vehicular ad hoc network (VANET); context awareness
【发表时间】2022
【收录时间】2022-08-28
【文献类型】 实证数据
【Author】 Siddiqui, Shahbaz Hameed, Sufian Shah, Syed Attique Ahmad, Ijaz Aneiba, Adel Draheim, Dirk Dustdar, Schahram
【影响因子】3.476
【主题类别】
区块链技术-协同技术-物联网
【Abstract】Internet of Things (IoT) is characterized as one of the leading actors for the next evolutionary stage in the computing world. IoT-based applications have already produced a plethora of novel services and are improving the living standard by enabling innovative and smart solutions. However, along with its rapid adoption, IoT technology also creates complex challenges regarding the management of IoT networks due to its resource limitations (computational power, energy, and security). Hence, it is urgently needed to refine the IoT-based application's architectures to robustly manage the overall IoT infrastructure. Software-defined networking (SDN) has emerged as a paradigm that offers software-based controllers to manage hardware infrastructure and traffic flow on a network effectively. SDN architecture has the potential to provide efficient and reliable IoT network management. This research provides a comprehensive survey investigating the published studies on SDN-based frameworks to address IoT management issues in the dimensions of fault tolerance, energy management, scalability, load balancing, and security service provisioning within the IoT networks. We conducted a Systematic Literature Review (SLR) on the research studies (published from 2010 to 2022) focusing on SDN-based IoT management frameworks. We provide an extensive discussion on various aspects of SDN-based IoT solutions and architectures. We elaborate a taxonomy of the existing SDN-based IoT frameworks and solutions by classifying them into categories such as network function virtualization, middleware, OpenFlow adaptation, and blockchain-based management. We present the research gaps by identifying and analyzing the key architectural requirements and management issues in IoT infrastructures. Finally, we highlight various challenges and a range of promising opportunities for future research to provide a roadmap for addressing the weaknesses and identifying the benefits from the potentials offered by SDN-based IoT solutions.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Internet of Things; Blockchains; Middleware; Load management; Computer architecture; Sensors; Security; Internet of Things (IoT); software-defined networking (SDN); SDN-based IoT management frameworks; systematic literature review; network function virtualization; OpenFlow; middleware; blockchain; security management; fault tolerance; load balancing; scalability; energy management
【发表时间】2022
【收录时间】2022-08-28
【文献类型】 综述
【影响因子】3.476
【主题类别】
区块链治理-市场治理-数字货币
【Abstract】The ever-increasing acceptance of cryptocurrencies has fueled applications beyond investment purposes. Crypto-payment is one such application that can bring radical changes to financial transactions in many industries, particularly e-commerce and online retail. However, characteristics of the technology such as transaction disintermediation, lack of central authority, and lack of adequate regulations may introduce new privacy and security concerns among the users. This coincides with another trend of rising individuals' concerns pertaining to information privacy and security issues in online transactions. The current paper investigates how consumer trust in crypto-payment, a key determinant of consumer intentions and relational exchanges over the long-term, is formed based on their perceptions towards privacy and security aspects of the technology. Using data from 327 survey participants, the study found that perceived information privacy risk, perceived anonymity, and perceived traceability of transactions are significant determinants of consumer trust in crypto-payment; but their perceptions of information security fraud risk have no significant effect. It also provided support for the hypothesis that perceived trust contributes to consumers' intention to adopt crypto-payment. The findings highlight the need to enhance consumer understanding and awareness of information privacy and potential security issues in crypto-payment as well as what needs to be done to address consumer concerns in this regard. The paper creates novel insights into the requirements of trust in crypto-payment services and the consequences of consumers' perceptions of privacy and security in this domain.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Security; Privacy; Bitcoin; Electronic commerce; Behavioral sciences; Investment; Industries; Adoption intentions; consumer trust; crypto-payment; e-commerce; information security; partial least squares structural equation modeling (PLS-SEM); privacy
【发表时间】2022
【收录时间】2022-08-28
【文献类型】 实证数据
【Author】 Lisi, Andrea Mukherjee, Prateeti De Santis, Laura Wu, Lei Lagutin, Dmitrij Kortesniemi, Yki
【影响因子】3.476
【主题类别】
区块链应用-实体经济-网安领域
【Abstract】The disclosure of security vulnerabilities plays an important role in notifying vendors and the public about flaws in digital systems. Among the proposed disclosure approaches, the most utilized is Responsible Disclosure, which still suffers from several disadvantages such as fostering a false sense of security among the end-users, allowing arbitrary delays in the disclosure process, and forcing the party reporting a vulnerability to identify themselves, which has been exploited by vendors through intimidation and malpractice. To address these issues, this paper presents an improved version of the Responsible Disclosure approach called Automated Responsible Disclosure (ARD) - a solution that leverages distributed ledgers and interledger technologies to automate the disclosure process while offering increased security, privacy, and transparency. A prototype implementation has been released as open-source software, and the evaluation of the solution shows that ARD is capable of addressing the key shortcomings in existing solutions and fostering more transparent disclosure practices.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Distributed ledger; Privacy; Computer bugs; Smart contracts; Public transportation; Prototypes; Peer-to-peer computing; Responsible disclosure; automated responsible disclosure; security vulnerability; privacy; distributed ledger; interledger; smart contract; chaincode
【发表时间】2022
【收录时间】2022-08-28
【文献类型】 实证数据
【Author】 Javed, Muhammad Umar Jamal, Abid Alkhammash, Eman H. Hadjouni, Myriam Bahaj, Saeed Ali Javaid, Nadeem
【影响因子】3.476
【主题类别】
区块链应用-实体经济-能源领域
【Abstract】In the underlying work, the problems faced during message dissemination in the conventional Vehicular Energy Networks (VENs) like lack of security, breach of personal identities, absence of trust between vehicle owners, etc., are tackled. In this study, a Blockchain (BC) based announcement system is proposed for VENs to ensure secure and reliable announcement dissemination in the proposed network. The proposed system is a three-layered system comprising message dissemination layer, storage layer and BC layer. In the first layer, all the vehicles are registered through a Certificate Authority (CA), which ensures only the legitimate vehicles become part of the proposed network and interact with each other. Later, in the second layer, the data sent by the vehicles is stored at the artificial intelligence based Interplanetary File System (IPFS), which is incorporated with the Road Side Units (RSUs). This ensures reduction in storage cost and data availability. Besides, vehicle owners' privacy is ensured by concealing the real identities of the vehicles. Moreover, the hashes of the data stored in the IPFS are stored in BC in the third layer. Also, lightweight trustworthiness verification of the vehicles, reputation based incentivization and concealing predictable trends in vehicles' reputation scores are performed in the same layer. Overall, the novelty of the proposed work lies in the fact that the proposed system efficiently tackles different problems encountered in the existing systems simultaneously. Through extensive simulations, it is inferred that the computational time is reduced by 15-18% and the storage overhead is reduced by 80-85%, respectively when storing hash of data on the BC network as compared to storing actual data on the network.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Privacy; Security; Memory; Protocols; Blockchains; Authentication; Artificial intelligence; Blockchain; cuckoo filter; artificial intelligence based IPFS; message dissemination; privacy; vehicular energy network
【发表时间】2022
【收录时间】2022-08-28
【文献类型】 实验仿真
【Author】 Zala, Kirtirajsinh Thakkar, Hiren Kumar Jadeja, Rajendrasinh Singh, Priyanka Kotecha, Ketan Shukla, Madhu
【影响因子】3.476
【主题类别】
区块链应用-实体经济-能源领域
【Abstract】In the current digital era, personal data storage on public platforms is a major cause of concern with severe security and privacy ramifications. This is true especially in e-health data management since patient's health data must be managed following a slew of established standards. The Cloud Service Providers (CSPs) primarily provide computing and storage resources. However, data security in the cloud is still a major concern. In several instances, Blockchain technology rescues the CSPs by providing the robust security to the underlying data by encrypting data using the unique and secret keys. Each network user in Blockchain has its own unique and secret keys linked directly to the transaction keys as a digital signature to protect the data. However, Blockchain technology suffers from the latency and throughput issues in high workload scenarios. To overcome e-healthcare records privacy issues in a third-party cloud, we designed a Patient's E-Healthcare Records Management System (PRMS) that focuses on latency and throughput. A comprehensive performance analysis of PRMS is carried out on different third-party clouds to validate its applicability. Moreover, the proposed PRMS system is compared with Blockchain platforms such as Hyperledger Fabric v0.6 and Etherium 1.5.8 against latency and throughput by adjusting the workload for each platform up to 10,000 transactions per second. The proposed PRMS is compared to the Secure and Robust Healthcare-Based Blockchain (SRHB) approach using Yahoo Cloud Serving Benchmark (YCSB) and small bank datasets. The experimental results indicate that deploying PRMS on Amazon Web Services decreases System Execution Time (SET) and the Average Delay (AD) time by 2.4%, 8.33%, and 25.15%, 15.26%, respectively. Additionally, deploying PRMS on the Google Cloud Platform decreases System Execution Time (SET) and Average Delay (AD) by 2.27%, 2.4%, and 2.72%, 4.73% AD, respectively. The experimental results confirm the superiority of the PRMS under the high workload scenario over SRHB and its applicability in cloud data centers.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Cloud computing; Medical services; Blockchains; Security; Throughput; Electronic medical records; Data privacy; Electronic healthcare; Storage management; Cloud computing; e-health; privacy; information security; blockchain
【发表时间】2022
【收录时间】2022-08-28
【文献类型】 实证数据
【影响因子】3.476
【主题类别】
区块链应用-实体经济-工业领域
【Abstract】In today's turbulent and complex times, the importance of the functional security and continuity of critical infrastructure (CI) is of particular importance. The Industry 4.0 (I4.0) toolset contains many technologies that support CI or are an integral part thereof. The purpose of this paper is to examine the relationship between CI and I4.0. The goal will be achieved by (1) conducting a systematic literature review using VOSviewer, (2) identifying leading research topics using Latent Dirichlet Allocation, (3) mapping the results obtained and identifying possibilities for further research. Web of Science, Scopus, and a set of specific keywords were used to select peer-reviewed papers presenting evidence of the considered connections. Selected clusters and topics were used to build a reference framework formed by relations between CI and I4.0. The results revealed that despite the popularity of both issues, studies examining the mutual relations between the same are lacking. The added value of the article is that it organizes the knowledge related to relations between I4.0 and CI, and indicates the research areas that require further scrutiny. It is the first comprehensive literature review focusing specifically on CI & I4.0.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Security; Safety; Critical infrastructure; Fourth Industrial Revolution; Economics; Manufacturing; Blockchains; Bibliometrics; critical infrastructure; Industry 40; literature review; reference framework; smart manufacturing
【发表时间】2022
【收录时间】2022-08-28
【文献类型】 综述
【Author】 Ahmad, Zubair Almaspoor, Zahra Khan, Faridoon Alhazmi, Sharifah E. El-Morshedy, M. Ababneh, O. Y. Al-Omari, Amer Ibrahim
【影响因子】2.739
【主题类别】
区块链治理-市场治理-市场分析
【Abstract】Cryptocurrency is a digital currency and also exists in the form of coins. It has turned out as a leading method for peer-to-peer online cash systems. Due to the importance and increasing influence of Bitcoin on business and other related sectors, it is very crucial to model or predict its behavior. Therefore, in recent, numerous researchers have attempted to understand and model the behaviors of cryptocurrency exchange rates. In the practice of actuarial and financial studies, heavy-tailed distributions play a fruitful role in modeling and describing the log returns of financial phenomena. In this paper, we propose a new family of distributions that possess heavy-tailed characteristics. Based on the proposed approach, a modified version of the logistic distribution, namely, a new modified exponential-logistic distribution is introduced. To illustrate the new modified exponential-logistic model, two financial data sets are analyzed. The first data set represents the log-returns of the Bitcoin exchange rates. Whereas, the second data set represents the log-returns of the Ethereum exchange rates. Furthermore, to forecast the high volatile behavior of the same datasets, we apply dual machine learning algorithms, namely Artificial neural network and support vector regression. The effectiveness of these models is evaluated against self exciting threshold autoregressive model.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】logistic distribution; heavy -tailed distributions; X family; cryptocurrency; artificial; neural networks; support vector regression
【发表时间】2022
【收录时间】2022-08-28
【文献类型】 理论模型
【Author】 Lin, Shaochen Liu, Xuyang Ma, Xiujuan Mao, Hongliang Zhang, Zijian Khan, Salabat Zhu, Liehuang
【影响因子】1.604
【主题类别】
区块链技术-核心技术-共识机制
【Abstract】Nakamoto consensus is prevailing in the world largest blockchain-based cryptocurrency systems, such as Bitcoin and Ethereum. Since then, various attempts have been studied to attack Nakamoto consensus worldwide. In recent years, network delay has won more attention for making inconsistent ledgers in blockchain-based applications by virtue of attacking Nakamoto consensus. However, so far as we know, most of the existing works mainly focus on constructing inconsistent ledgers for blockchain systems, but not offering fine-grained theoretical analysis for how to optimize the success probability by flexibly dividing computational power and network delay from the viewpoint of adversary. The paper first utilizes network delay and the partition of controlled computation power of honest miners for making forks as long as possible. Then, formally analysis is provided to show the success probability of the proposed attack, and compute the optimal network delay and splitting for adversarial computation power in theory. Finally, simulation experiments validate the correctness of the formal analysis.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】network delay; Nakamoto consensus; blockchain
【发表时间】2022
【收录时间】2022-08-28
【文献类型】 实证数据
【DOI】 10.3934/era.2022191
【影响因子】1.526
【主题类别】
区块链治理-市场治理-市场分析
【Abstract】Blockchain is emerging as a powerful technological force that promises to change society's status quo. The UAE has taken a proactive approach to blockchain innovation and development. With the framing of blockchain as a sociotechnical system, blockchain initiatives in the UAE are critically examined in terms of prospects, challenges, and implications for future digital societies. Blockchain developmental trajectories are analysed from a sociotechnical lens, i.e., societal, technological, industrial, and economic trends that characterise the interfaces and interaction among people, organisations, technology, and society, eliciting underlying potential influences of cultural, ethical, and legal rhetoric. Despite strong initiatives, a series of challenges, such as trust, privacy, and transparency, has emerged as blockchain begins to develop its full potential. With these issues, sociotechnical concerns have increased regarding how to respond to the possible consequences that such a policy choice would entail, how to govern blockchains, and how to create a sustainable blockchain ecosystem. The socio-political ramifications of UAE blockchains are critically assessed to establish key features and conceptualise issues to unlock opportunities to guarantee a sociotechnical approach to blockchains.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchain; trust; sociotechnical perspective; sociotechnical blockchain; UAE
【发表时间】2022
【收录时间】2022-08-28
【文献类型】 观点阐述
【DOI】 10.1504/IJTM.2022.124616
【Author】 Du, Ruizhong Gao, Yan Liu, Cui
CCF-C
【影响因子】0.575
【主题类别】
区块链技术-协同技术-机器学习
【Abstract】Current website defacement detection methods often ignore security and credibility in the detection process. Furthermore, with the gradual development of dynamic websites, false positives and underreports of website defacement have periodically occurred. Therefore, to enhance the credibility of website defacement detection and reduce the false-positive rate and the false-negative rate of website defacement, this paper proposes a fine-grained trust detection scheme called WebTD, that combines machine learning and blockchain. WebTD consists of two parts: an analysis layer and a verification layer. The analysis layer is the key to improving the success rate of website defacement detection. This layer mainly uses the naive Bayes (NB) algorithm to decouple and segment different types of web page content, and then preprocess the segmented data to establish a complete analysis model. Second, the verification layer is the key to establishing a credible detection mechanism. WebTD develops a new blockchain model and proposes a multi-value verification algorithm to achieve a multilayer detection mechanism for the blockchain. In addition, to quickly locate and repair the defaced data of the website, the Merkle tree (MT) algorithm is used to calculate the preprocessed data. Finally, we evaluate WebTD against two state-of-the-art research schemes. The experimental results and the security analysis show that WebTD not only establishes a credible web service detection mechanism but also keeps the detection success rate above 98%, which can effectively ensure the integrity of the website.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Website defacement; trusted detection; naive Bayes; blockchain; Merkle tree
【发表时间】2022
【收录时间】2022-08-28
【文献类型】 实证数据
【Author】 Budania, Priyanka Lodha, Gaurav Garvita
【影响因子】0.000
【主题类别】
区块链技术-平台项目-数字货币
【Abstract】Digital money linked to large-scale economics can cause a re-bundling of funds coupled with a range of payment services,and data services that promote differentiation interoperability platforms.Digital money is becoming more and more interesting, in every field of finance. The increasing number of publications covering the issue and news items covering digital money demonstrates that the phenomenon of digital money is receiving increased attention. However, this nascent technology has now become more dubious and ambiguous there is still a major influence to be achievedbest example of it is cryptocurrencies. This paper aims to study how cryptocurrency is different fromdigital moneyand in what terms they are similar.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Digital Money; Cryptocurrency; fiat currency; Digital Wallet
【发表时间】2022
【收录时间】2022-08-28
【文献类型】 观点阐述
【影响因子】0.000
【主题类别】
区块链应用-虚拟经济-金融领域
【Abstract】The purpose of this research is to identify the components of the supply chain financing model based on blockchain technology, relying on the views of experts related to the field of electronic education at the level of higher education institutions of the country, and also prioritizing the factors relative to each other. The current research is applied in terms of purpose, descriptive-exploratory in terms of data collection, and qualitative-quantitative in terms of data nature. Based on this, first, with the aim of collecting qualitative data, after reviewing the literature related to the research topic, a framework for posing questions for interviews with experts was formulated. In the following, using the judgmental purposeful sampling method, the opinions of 15 executive experts with experience in DigiKala Company and academic experts familiar with blockchain technology and financing were used until the theoretical saturation stage. The conducted interviews were coded with Clark and Brown's six-step inductive theme analysis method. Based on this, 63 cases of speech evidence identified from the text of the interviews were labeled in the form of 17 primary codes. Then, the primary codes were categorized into five sub-themes and finally, two main themes. In the following, in order to validate the results of the interviews and confirm the research components, a questionnaire and fuzzy Delphi method were used, Also, in order to theoretically validate the research model in terms of comprehensiveness, uniqueness, coherence and integrity, as well as proportionality, the questionnaire tool was used, and for its analysis, the sample t-test and SPSS software were used. Based on the results of the research in the Delphi section, all five sub-themes or questions of the Delphi questionnaire were approved by the research experts. The results of the sample T-Tech test also confirmed the theoretical validity of the research model in terms of the aforementioned four characteristics.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】financing; supply chain; blockchain
【发表时间】2022
【收录时间】2022-08-28
【文献类型】 实证数据
【影响因子】0.000
【主题类别】
区块链技术-协同技术-云计算
【Abstract】A compromised method by into the blockchain into the cloud storage accepted at provided in a private way, which cannot be seen as a true, is discovered. The cloud server and the data privacy of users are necessary to encrypt the data before outsourcing the cloud in order to realize secure keyword search over encrypted data. Additionally, it is believed that the cloud server would emphasize the value of keeping the data in a public chain right away. We present a system that utilizes blockchain technology to offer safe distributed data storage together with keyword search functionality. We introduce a system that makes use of blockchain technology to offer secure distributed data storage with a keyword search service. The system enables the client to upload their content to cloud nodes and ensures data availability using cryptographically encrypted form distributions the data techniques. reputable keyword search method using encrypted data without the involvement of a third party. Furthermore, even if the user or the cloud is evil, the use of blockchain technology and hash functions allows for the fair payment of search costs without the introduction of a third party. Our research of TKSE's security and effectiveness shows that it is both secure and effective, making it appropriate for cloud computing.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Login; Registration; Create Secret Key; Authentication Scheme; Two-Side Verification
【发表时间】2022
【收录时间】2022-08-28
【文献类型】 实验仿真
【影响因子】0.000
【主题类别】
区块链应用-虚拟经济-金融领域
【Abstract】Crowd funding fraud prevention using blockchain - Blockchain is shared that facilitates the process of recording transactions and tracking assests in in a network. virtually anything of value can be tracked and traded on block chain network, Generally People who are interested in a project can donate by making an online transaction. The donated money goes to the project manager, which he uses to complete the project or to make a product. This existing method of online crowdfunding has a major drawback. It does not allow contributors to have control over the money they have contributed. Since in the existing method the project manager has all the control over the money contributed he can very easily perform malicious activities. Here we address this problem faced by the existing online crowdfunding platforms by using ethereum network and smart contract. The development of Block chain technology has allowed businesses to build decentralized models. It has derived new methods to conduct transactions and make agreements. One of the technologies that propose an alternative to the traditional model is the smart contract. A smart contract is similar to a contract in the physical world, but it is digital and represented by a tiny computer program stored in a block chain.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchain; Centralised & Decentralised Systems; Smart Contract
【发表时间】2022
【收录时间】2022-08-28
【文献类型】 理论模型
【影响因子】0.000
【主题类别】
区块链应用-实体经济-公共管理
【Abstract】Structuring an electronic voting system which fulfills the legitimate requirements of representatives has been a challenge for a long time. Conducting the free, systematic and impartial election is the vital goal of every democracy nation. Every country follows a different voting system from old paper ballot system to electronic voting system. The main problem is location and accessibility, people are suffering to go to their native place polling booth for casting their vote. This needs to be considered as every people's vote plays a significant role in deciding the right leaders. Blockchain technology offers the transparency and security requisites for the impartial election. It is a complete decentralized, immutable ledger system. The online voting system allows the voters to cast their vote from any place at any time which leads to increasing the voters participation count. The objective of the project is to create a voting system which provides transparency and security using Blockchain technology, the Python flask tool is used for setting up a local blockchain network over an network.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchain; Smart Contract; Voting system; Decentralized application; E-voting
【发表时间】2022
【收录时间】2022-08-28
【文献类型】 理论模型
【Author】 Shtalenkova, Kseniya
【影响因子】0.000
【主题类别】
区块链应用-虚拟经济-NFT
【Abstract】The aim of this paper is to investigate the visual significance of money in the context of dematerialization when money loses its material form and becomes invisible. In this vein, currency design helps to assess the meaning of the visual, important for exchange on the symbolic level. It is crucial to divide exactly the visual as representations implied in visual narratives of currency design, and the visible as physical features of money issued during certain historical periods. Paradoxically, while the visible embodies the abstract idea of money circulating in the material world, the visual promotes ideologized images of reality, substituting reality itself. And once money becomes immaterial, the economic value becomes a pure social convention, but the value of possessing money gains phantasmatic features grounded in digitized visual imagery like, for instance, NFT artworks, while material money transcends its economic functionality and gains the value of the cultural artifact.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】currency design; dematerialization; money; value; visual
【发表时间】2022
【收录时间】2022-08-28
【文献类型】 观点阐述
【DOI】 10.24101/logos.2022.43
【影响因子】0.000
【主题类别】
区块链应用-实体经济-医疗领域
【Abstract】In the context of COVID-19 pandemic, the rapid roll-out of a vaccine and the implementation of a worldwide immunization campaign is critical, but its success will depend on the availability of an operational and transparent distribution chain that can be audited by all relevant stakeholders. In this paper, we discuss how blockchain technology can help in several aspects of COVID-19 vaccination scheme. We present a system in which blockchain technology is used to guaranty data integrity and immutability of beneficiary registration for vaccination, avoiding identity thefts and impersonations. Smart contracts are defined to monitor and track the proper vaccine distribution conditions against the safe handling rules defined by vaccine producers enabling the awareness of all network peers. For vaccine administration, a transparent and tamper-proof solution for side effects self-reporting is provided considering beneficiary and administrated vaccine association. A prototype was implemented using the Ethereum test network, Ropsten, considering the COVID-19 vaccine distribution conditions. The results obtained for each on-chain operation can be checked and validated on the Etherscan. In terms of throughput and scalability, the proposed blockchain system shows promising results while the estimated cost in terms of gas for vaccination scenario based on real data remains within reasonable limits.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Vaccines; Blockchain; COVID-19; Pandemics; Immune system; Smart contracts; Supply chains; Blockchain; COVID-19; immunization programs; data integrity and immutability; smart contracts; vaccine distribution; transparency and audit
【发表时间】2021
【收录时间】2022-08-28
【文献类型】 实验仿真
【影响因子】0.000
【主题类别】
区块链应用-实体经济-交通领域
【Abstract】With the development of advanced information and communication technology, the traditional centralized service model alone no longer meets the increasing demand of data exchange in intelligent transportation systems (ITS). While Internet of Vehicles (IoV) technology has been introduced to achieve more advanced ITS, there are still some unsettled issues such as flexibility and fault tolerance. The conventional centralized approach for ITS is vulnerable to the single point of failure, and lack of flexibility due to its dependence on a trusted third party (TTP). The emergence of blockchain technology provides a potential direction to address these problems. However, due to varying vehicle densities, it is challenging to select the best blockchain parameters to satisfy the application requirements. In this paper, we propose a multi-channel blockchain scheme that can use the best parameters in accordance with the vehicle density. The proposed scheme first defines multiple blockchain channels where each channel is optimized for a certain vehicle density level. Then, the system selects the best channel according to the vehicle density, and the application requirements on the transaction throughput and latency. We use extensive simulations to show that the proposed blockchain scheme achieves a significantly better performance as compared with existing baselines.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchain; Vehicular ad hoc networks; Peer-to-peer computing; Cloud computing; Distributed ledger; Transportation; Edge computing; Blockchain; IoV; hyperledger fabric; channel management
【发表时间】2021
【收录时间】2022-08-28
【文献类型】 实验仿真
【Author】 Shu, Min Song, Ruiqiang Zhu, Wei
【影响因子】
【主题类别】
区块链治理-市场治理-数字货币
【Abstract】In this study, the Log-Periodic Power Law Singularity (LPPLS) model is adopted for real-time identification and monitoring of Bitcoin bubbles and crashes using different time scale data, and the modified Lagrange regularization method is proposed to alleviate the impact of potential LPPLS model over-fitting to better estimate bubble start time and market regime change. The goal here is to determine the nature of the bubbles and crashes (i.e., whether they are endogenous due to their own price evolution or exogenous due to external market and/or policy influences). A systematic market event analysis is performed and correlated to the Bitcoin bubbles detected. Based on the daily LPPLS confidence indictor from 1 December 2019 to 24 June 2021, this analysis has disclosed that the Bitcoin boom from November 2020 to mid-January 2021 is an endogenous bubble, stemming from the self-reinforcement of cooperative herding and imitative behaviors of market players, while the price spike from mid-January 2021 to mid-April 2021 is likely an exogenous bubble driven by extrinsic events including a series of large-scale acquisitions and adoptions by well-known institutions such as Visa and Tesla. Finally, the utilities of multi-resolution LPPLS analysis in revealing both short-term changes and long-term states have also been demonstrated in this study.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】bitcoin bubble; log-periodic power law singularity (LPPLS); LPPLS confidence indicator; cryptocurrency; financial bubble and crash; modified Lagrange regularization method
【发表时间】2021
【收录时间】2022-08-28
【文献类型】 实证数据
【DOI】 10.3390/stats4040056
【作者】 张文超;袁磊;闫若;远航;
【作者单位】广西师范大学教育学部;广西教育信息化发展研究中心;广西师范大学体育与健康学院;
【文献来源】远程教育杂志
【复合影响因子】8.227
【综合影响因子】5.174
【主题类别】
区块链应用-虚拟经济-元宇宙
区块链应用-实体经济-教育领域
【摘要】自数字技术营造出栩栩如生的虚拟世界以来,基于虚拟场景交互的沉浸式体验已成为人们一种重要的生活方式。无论是本世纪初诞生的“第二人生”游戏场景中的探索,还是刚兴起的学习元宇宙中的学习体验,让沉浸式学习日益成为一种崭新的学习方式。然而,现有的沉浸式学习研究大多拘泥于原有的游戏化学习,还很少从学习元宇宙的场域来审视与探索。与此同时,沉浸式学习方式的演进,目前还缺乏一个理论框架以支撑、指导相关的教与学实践。为此,在梳理从游戏化学习到学习元宇宙的发展脉络的基础上,探索学习元宇宙赋能沉浸式学习的形式,提炼出相关特征:学习主体虚拟性、学习体验具身心流性、学习情境多样性、学习社区协同性。进而构建由技术机制、入口机制、活动机制、监控机制、评价机制所组成的沉浸式学习新框架。这一新框架在未来教育实践中的价值,主要体现在游戏化学习、个性化学习、跨学科学习、非正式学习等教学场景中的融合与赋能。
【关键词】游戏化学习;;沉浸式学习;;元宇宙;;学习元宇宙;;沉浸式学习框架
【文献类型】 观点阐述
【发表时间】2022-08-28
【作者】 余越凡;周晓云;杨现民;
【作者单位】江苏师范大学智慧教育学院;
【文献来源】远程教育杂志
【复合影响因子】8.227
【综合影响因子】5.174
【主题类别】
区块链应用-虚拟经济-元宇宙
区块链应用-实体经济-教育领域
【摘要】线上线下融合(Online-Merge-Offline,OMO)教学作为教育领域发展的重要趋势,囿于缺少全场景、全方位、全渠道无缝联通的学习空间,仍处于探索初期。兼具媒介属性、场域属性以及生态属性的元宇宙赋能线上线下融合学习空间,有望满足线上线下融合教学对全场景、全结构优势融合以及对效率与个性化均衡发展的需求。基于元宇宙的线上线下融合学习空间,具备全联通的结构化条件、多元可塑的内容存储结构,且能够提供一体化学习体验和智慧化学习支持服务。其构建应在遵循连通性、可用性、共建性和伦理约束等原则的基础上,按照物理空间、元宇宙空间以及混合现实空间的场所结构进行设计,并运用沉浸式交互设备、全媒体访问设备等多元技术中介支持虚实主客体间的联通关系。线上线下融合学习空间的应用还需要有相应的教学模式的支持,其教学目标也应从知识技能习得向高阶思维能力培养转变。此外,线上线下融合学习空间的教学活动,还应兼顾显性知识与隐性知识、平衡规模化教学与个性化发展,以促进其高质量发展。
【关键词】学习空间;;线上线下融合;;元宇宙;;教学模式;;线上线下融合教学
【文献类型】 观点阐述
【发表时间】2022-08-28
【作者】 贡振国;
【作者单位】大河报;
【文献来源】新闻爱好者
【复合影响因子】1.116
【综合影响因子】0.531
【主题类别】
区块链应用-虚拟经济-元宇宙
【摘要】数字技术的进步带来了元宇宙概念的产生,国内外互联网力量纷纷入局元宇宙。通过从元宇宙带来的新技术、新交互、新产业出发,阐述分析了媒体应如何顺应发展大势,充分运用新技术新应用为融媒转型寻找新路径,更有力地推动优化城市治理体系,助推区域产业高质量发展。
【关键词】元宇宙;;技术赋能;;新闻传播;;文旅文创融合;;媒体+政务商务服务
【文献类型】 观点阐述
【发表时间】2022-08-28
【作者】 胡祥科;陈静;
【作者单位】中国长江三峡集团有限公司档案中心;中国长江三峡集团有限公司科学技术研究院;
【文献来源】北京档案
【复合影响因子】0.836
【综合影响因子】0.607
【主题类别】
区块链应用-实体经济-能源领域
【摘要】该文结合水电工程档案管理的特点,研究了如何将区块链应用在水电工程电子档案管理中,以实现电子档案的防伪存证和可追溯性,同时提出通过对水电工程电子档案设计全局唯一编码,并结合倒排索引构建技术,提升电子档案的追溯、查询效率的可行路径,以供档案管理人员参考。
【关键词】区块链应用;;水电工程档案;;计算机应用
【文献类型】 实证数据
【发表时间】2022-08-28
【作者】 张伟君;张林;
【作者单位】同济大学法学院;
【文献来源】中国出版
【复合影响因子】
【综合影响因子】
【主题类别】
区块链治理-市场治理-欺诈犯罪
【摘要】擅自铸造数字作品非同质权益凭证(NFT数字作品)进行出售侵犯著作权人何种专有权利,理论上存在发行权和信息网络传播权两种不同的观点。NFT数字作品的出售虽然更接近于发行行为,但以发行权控制存在“无作品载体”的法律障碍;以信息网络传播权规制虽然可以消除这个法律障碍,但是,一方面这个权利难以契合著作权人遭受的实际损害,也难以进一步控制非法铸造的NFT数字作品的转售行为;另一方面因为发行权一次用尽原则难以适用,交易合同就可以任意阻碍合法铸造的NFT的转售和流通,这会带来更多的法律问题。将发行权的控制范围予以扩张解释后适用于NFT数字作品交易是更为合理的选择。
【关键词】数字作品;;NFT;;发行权;;信息网络传播权;;权利用尽
【文献类型】 观点阐述
【发表时间】2022-08-28
【作者】 邓建国;刘博;
【作者单位】复旦大学新闻学院;
【文献来源】中国出版
【复合影响因子】
【综合影响因子】
【主题类别】
区块链应用-虚拟经济-元宇宙
【摘要】媒介变迁重塑新闻实践,带来全新产品化思维。在技术驱动下,新闻业界在媒介融合和转型方面进行了有益探索和锐意创新,而产品化是新闻创新的一个重要领域,其本质是“以用户为中心”的新闻传播观念的变革。平台社会的到来促进了信息服务的聚合与价值生产市场的拓展,带来了新闻生产流程与消费市场的实践转向;新媒介技术和用户需求两者的叠加影响催生了形态多维的新闻产品;作为下一代互联网,元宇宙的迅猛发展指向了关注用户具身体验、关系连接和场景创新的新闻产品未来图景。因此,提升产品化思维,专业新闻机构从单一的新闻内容生产者转变为“新闻产品设计师”是新闻创新的重要方向。
【关键词】新闻产品;;新闻创新;;用户新闻学;;元宇宙
【文献类型】 观点阐述
【发表时间】2022-08-28