【影响因子】14.944
【主题类别】
区块链应用-实体经济-环境领域
【Abstract】Carbon markets could hasten climate change mitigation by driving investment towards efficient decarbon-ization activities, but they face problems around trust, transparency, and uptake. Blockchain offers a foundational technology upon which new carbon markets can be built which address these shortcomings. This sector is still nascent, fragmented, and clouded by technology hype, all of which obscures objective judgement of its performance and suitability. Here, we survey the current blockchain ecosystem, identifying 39 organizations that are developing blockchain solutions for carbon markets across four use cases: emissions-trading schemes, voluntary carbon markets, Article 6 of the Paris Agreement, and the Carbon Offsetting and Reduction Scheme for International Aviation (CORSIA). We develop and apply a technology readiness level (TRL) scale, and we find that most projects are still proofs of concept (TRL % 3); however, one system has now reached maturity (TRL 9). Addressing the common barriers that face developers could allow more blockchain solutions to mature and potentially facilitate globalized carbon markets with greater efficiency, transparency, and accessibility.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】
【发表时间】2022
【收录时间】2022-08-31
【文献类型】 观点阐述
CCF-A
【影响因子】11.019
【主题类别】
区块链治理-技术治理-区块链安全
【Abstract】Blockchain, an emerging paradigm of secure and shareable computing, is a systematic integration of 1) chain structure for data verification and storage, 2) distributed consensus algorithms for generating and updating data, 3) cryptographic techniques for guaranteeing data transmission and access security, and 4) automated smart contracts for data programming and operations. However, the progress and promotion of Blockchain have been seriously impeded by various security issues in blockchain-based applications. Furthermore, previous research on blockchain security has been mostly technical, overlooking considerable business, organizational, and operational issues. To address this research gap from the perspective of information systems, we review blockchain security research in three levels, namely, the process level, the data level, and the infrastructure level, which we refer to as the PDI model of blockchain security. In this survey, we examine the state of blockchain security in the literature. Based on the insights obtained from this initial analysis, we then suggest future directions of research in blockchain security, shedding light on urgent business and industrial concerns in related computing disciplines.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Security; Blockchain; Smart contracts; Business; Computer architecture; Organizations; Encryption; Blockchain security; process security; data security; consensus algorithm; smart contract
【发表时间】2022
【收录时间】2022-08-31
【文献类型】 综述
【DOI】 10.1109/TSC.2020.3038641
CCF-A
【影响因子】11.019
【主题类别】
区块链技术-核心技术-核心技术集
【Abstract】Network function virtualization (NFV) is a promising technology to make 5G networks flexible and agile. NFV decreases operators' OPEX and CAPEX by decoupling the physical hardware from the functions they perform. In NFV, users' service request can be viewed as a service function chain (SFC) consisting of several virtual network functions (VNFs) which are connected through virtual links. Resource allocation in NFV is done through a centralized authority called NFV Orchestrator (NFVO). This centralized authority suffers from some drawbacks such as single point of failure and security. Blockchain (BC) technology is able to address these problems by decentralizing resource allocation. The drawbacks of NFVO in NFV architecture and the exceptional BC characteristics to address these problems motivate us to focus on NFV resource allocation to users' SFCs without the need for an NFVO. To this end, we assume there are two types of users: users who send SFC requests (SFC requesting users) and users who perform mining process (miner users). For SFC requesting users, we formulate NFV resource allocation (NFV-RA) problem as a multi-objective problem to minimize the energy consumption and utilized resource cost, simultaneously. To address this problem, we propose an Approximation-based Resource Allocation algorithm (ARA) using Majorization-Minimization approximation method to convexify NFV-RA problem. Furthermore, due to the high complexity of ARA algorithm, we propose a low complexity Hungarian-based Resource Allocation (HuRA) algorithm using Hungarian algorithm for server allocation. Through the simulation results, we show that our proposed ARA and HuRA algorithms achieve near-optimal performance with lower computational complexity. Also, ARA algorithm outperforms the existing algorithms in terms of number of active servers, energy consumption, and average latency. Moreover, the mining process is the foundation of BC technology. In wireless networks, mining is performed by resource-limited mobile users. Since the mining process requires high computational complexity, miner users cannot perform it alone. So, in this article, we assume that miner users can perform mining process with participating of other users. For mining process, the problem of minimizing the energy consumption and cost of users' processing resources is formulated as a linear programming problem that can be optimally solved in polynomial time.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Delays; Servers; Resource management; Energy consumption; Smart contracts; Data centers; Computer architecture; Network function virtualization; blockchain; virtual network function; consensus mechanism; mining
【发表时间】2022
【收录时间】2022-08-31
【文献类型】 理论模型
【DOI】 10.1109/TSC.2021.3050717
【Author】 Andreina, Sebastien Bohli, Jens-Matthias Karame, Ghassan O. Li, Wenting Marson, Giorgia Azzurra
CCF-A
【影响因子】11.019
【主题类别】
区块链技术-核心技术-共识机制
【Abstract】Proof of Stake (PoS) blockchain protocols emerged as a promising alternative to the largely energy-wasteful proof of work mechanisms currently in place. In contrast to computing power, however, "stake" is a virtual resource that can be replicated or reused, opening the door to attack vectors that have no counterpart in a PoW setting, and are much harder to defeat. We present PoTS (Proof of TEE-Stake), a novel PoS protocol that leverages properties of trusted execution environments (TEEs) to limit the attack surface of malicious validators, and employs techniques such as forward security to guarantee protection against posterior-corruption attacks. We show that PoTS is secure against nothing at stake, grinding, and long range attacks down to realistic hardware assumptions on TEE and well-established cryptographic assumptions, and retains reasonable security even in face of compromised TEEs. We evaluate the performance of our proposal by means of implementation. Our evaluation results demonstrate that PoTS offers an excellent trade-off between security and performance.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Protocols; Blockchain; Cryptography; Peer-to-peer computing; History; Hardware; Prototypes; Blockchain security; proof of stake; trusted execution environments
【发表时间】2022
【收录时间】2022-08-31
【文献类型】 实证数据
【DOI】 10.1109/TSC.2020.3038950
CCF-A
【影响因子】11.019
【主题类别】
区块链技术-协同技术-隐私计算
【Abstract】Crowdsourcing has attracted widespread attention in recent years and developed into various applications. An indispensable service of crowdsourcing systems is task recommendation, which means tasks should be accurately recommended to the workers with aligned interests. However, existing systems rely on their separate servers to conduct recommendation services, resulting in computing resources locked inside each isolated system. Moreover, due to the wide attacking surfaces of traditional centralized servers setting, existing systems are subject to single points of failure or malicious data breaches. Therefore, failure to address these inherent limitations properly will hinder the wide adoption of crowdsourcing. In this article, we propose and implement FedCrowd, the first federated and privacy-preserving crowdsourcing platform by using blockchain technology. Our main idea is to employ the smart contract as a trusted platform for systems to release encrypted tasks, and carefully craft matching protocols to enable efficient task recommendations in the ciphertext domain. Our task-matching protocols are highly customized for the decentralized settings, where users can securely perform keyword and range-based queries over federated task indexes without sharing secret keys. We formally analyze the security strengths and complete the prototype implementation on Ethereum. Experiment results demonstrate the feasibility and usability of the FedCrowd platform.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Task analysis; Crowdsourcing; Blockchain; Smart contracts; Encryption; Crowdsourcing; privacy-preserving; decentralized application; searchable encryption; blockchain
【发表时间】2022
【收录时间】2022-08-31
【文献类型】 理论模型
【DOI】 10.1109/TSC.2020.3031061
CCF-A
【影响因子】11.019
【主题类别】
区块链技术-协同技术-物联网
【Abstract】To support the increasing computation-intensive applications in the Internet of Things (IoT), edge computing is introduced to provide mobile devices computing resources for performing low-latency tasks. Therefore, how to design an effective and secure computing resource allocation mechanism is attracting increasing attention. A lot of works have been done to design an effective computational resource market for IoT, but the problems of vulnerability and inefficiency still exist. In this article, we propose a two-level Stackelberg game-based computing resource trading mechanism for mobile IoT devices with a credit-based payment approach, which is implemented by smart contracts on blockchain. In our model, the Stackelberg game consists of two levels, i.e., leader-level and user-level. In the leader-level, the computing service provider (CSP) and its agent constitute a composite leader. The agent purchases computing resource from CSP on credit and acts as a broker among leader-level and user-level reselling these computing resources to users. In the user-level, every user experiences social externality, which means users are interdependent. The leader-level subgame makes credit payment easier by making loaning and trading become a joint credit payment. The user-level subgame makes the market more active and closer to reality by introducing social externality. Besides, smart contracts can prevent malicious behaviors such as delay payment. We also conduct equilibrium analysis and prove the existence and uniqueness of the Nash equilibrium in our Stackelberg game-based model. Finally, we conduct numerical experiments to evaluate the cost of smart contracts and the performance of each entity with the proposed pricing mechanism.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Contracts; Computational modeling; Resource management; Games; Internet of Things; Computing resource trading; edge-cloud computing; Stackelberg game; social externality; smart contract; mobile blockchain
【发表时间】2022
【收录时间】2022-08-31
【文献类型】 实证数据
【DOI】 10.1109/TSC.2020.3024729
【Author】 Catania, Leopoldo Grassi, Stefano
【影响因子】7.022
【主题类别】
区块链治理-市场治理-市场分析
【Abstract】This paper studies the behavior of cryptocurrencies' financial time series, of which Bitcoin is the most prominent example. The dynamics of these series are quite complex, displaying extreme observations, asymmetries, and several nonlinear characteristics that are difficult to model and forecast. We develop a new dynamic model that is able to account for long memory and asymmetries in the volatility process, as well as for the presence of time-varying skewness and kurtosis. The empirical application, carried out on 606 cryptocurrencies, indicates that a robust filter for the volatility of cryptocurrencies is strongly required. Forecasting results show that the inclusion of time-varying skewness systematically improves volatility, density, and quantile predictions at different horizons. (C) 2021 International Institute of Forecasters. Published by Elsevier B.V. All rights reserved.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Cryptocurrency; Bitcoin; Score-driven model; Density prediction; Volatility prediction; Leverage effect; Long memory; Higher-order moments
【发表时间】2022
【收录时间】2022-08-31
【文献类型】 实证数据
【影响因子】5.281
【主题类别】
区块链技术-核心技术-共识机制
【Abstract】This letter studies the task offloading in reputation-based consortium blockchain networks, where the tasks are transmitted to Edge Computing Servers (ECSs) due to limited resources. We propose a novel Delegated Proof of Stake (DPoS) consensus mechanism in which validation nodes (including active nodes and backup nodes) are voted based on their reputation. The incentive identifies the reputation and the consensus delay as two major factors determining the reward. A three-stage Stackelberg game is developed to jointly minimize cost of the users and maximize utilities of the master node and the validation nodes. We analyze the unique Stackelberg equilibrium exists in the proposed game by the backward induction. The simulation results demonstrate that the designed incentive is feasible for trust management, and the proposed consensus has lower delay and higher decentralization compared with the traditional DPoS.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Delays; Blockchains; Task analysis; Games; Energy consumption; Quality of service; Smart contracts; Consortium blockchain; reputation; task offloading; edge computing; Stackelberg game
【发表时间】2022
【收录时间】2022-08-31
【文献类型】 理论模型
【DOI】 10.1109/LWC.2022.3177431
【Author】 Zhang, Ying
【影响因子】3.120
【主题类别】
区块链应用-实体经济-教育领域
【Abstract】Music creation and its promotion are encouraged both in music education and through activities organized in the context of artistic creation as part of the education in question. Although copyright registration is the primary way authors protect their rights, this is not feasible in most cases, as the processes take a long time to complete and incur high costs. We utilize modern innovative technologies and their developments in copyright protection matters to increase security and trust in music education. In particular, an advanced model of ensuring the methods and innovation produced in music education processes is proposed, using blockchain technology and smart contracts. But given that, even in an advanced system like the proposed one, authentication evidence can be easily intercepted, this work proposes a single and robust identification scheme based on an innovative zero-knowledge proof (ZNP) system, which allows one side of communication to convince the other of its validity.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】
【发表时间】2022
【收录时间】2022-08-31
【文献类型】 理论模型
【DOI】 10.1155/2022/9922167
【Author】 Xue, Yudai Wang, Jinsong
CCF-C
【影响因子】1.968
【主题类别】
区块链技术-核心技术-加密算法
【Abstract】With the fast development of the industrial Internet, its interconnectivity poses new challenges for the cooperation of industrial entities. Cooperation among these entities is built on trust, and trust is based on high-quality industrial products at reasonable prices. A traceability system can play an essential role in objectively reflecting the production process and promoting this trust. However, traditional traceability systems often have data privacy issues. Because traceability data are collected or generated during the production process (namely, production-related data), they could be considered privacy data. Several researchers have introduced privacy protection schemes into the traceability system, such as authentication or encryption. Nevertheless, when a privacy protection scheme is established, the original data are disclosed to the legal user of the system, but the data may still be leaked intentionally or unintentionally. Except for data privacy issues, a traditional traceability system can be vulnerable to network attacks, data unavailability, and reliability issues. The authors conducted a study to overcome these shortcomings, and this paper reports the results. We built a traceability prototype system using a blockchain protocol and a zero-knowledge proof method. First, we built a blockchain to record key production process data, aiming to maintain data reliability and availability. Second, through an analysis of traceability purpose using production knowledge, the traceability purpose could be divided into multiple provable statements. By introducing privacy protection through a zero-knowledge proof, the traceability process was converted to proving relative statements. Finally, the statements were validated by a smart contract that provided openness and reliability during the traceability process. Analysis has shown that our approach could meet the requirements for high security and privacy. In addition, the paper also discusses the calculation cost of the traceability process to show our work's viability. The traceability system described in this paper creates new possibilities for constructing a healthy and reliable trust relationship between production entities to provide further support in the development of the industrial Internet.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】
【发表时间】2022
【收录时间】2022-08-31
【文献类型】 实证数据
【DOI】 10.1155/2022/5842371
【Author】 Qin, Yi Hu, Qin Yu, Dong-Xiao Cheng, Xiu-Zhen
CCF-B
【影响因子】1.871
【主题类别】
区块链技术-平台项目-数字货币
【Abstract】Scalability has long been a major challenge of cryptocurrency systems, which is mainly caused by the delay in reaching consensus when processing transactions on-chain. As an effective mitigation approach, the payment channel networks (PCNs) enable private channels among blockchain nodes to process transactions off-chain, relieving long-time waiting for the online transaction confirmation. The state-of-the-art studies of PCN focus on improving the efficiency and availability via optimizing routing, scheduling, and initial deposits, as well as preventing the system from security and privacy attacks. However, the behavioral decision dynamics of blockchain nodes under potential malicious attacks is largely neglected. To fill this gap, we employ the game theory to study the characteristics of channel interactions from both the micro and macro perspectives under the situation of channel depletion attacks. Our study is progressive, as we conduct the game-theoretic analysis of node behavioral characteristics from individuals to the whole population of PCN. Our analysis is complementary, since we utilize not only the classic game theory with the complete rationality assumption, but also the evolutionary game theory considering the limited rationality of players to portray the evolution of PCN. The results of numerous simulation experiments verify the effectiveness of our analysis.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】blockchain; payment channel network; game theory
【发表时间】2022
【收录时间】2022-08-31
【文献类型】 实验仿真
【Author】 Toubiana, Raphaelle Macdonald, Millie Rajananda, Sivananda Lokvenec, Tale Kingsley, Thomas C. Romero-Brufau, Santiago
【影响因子】0.000
【主题类别】
区块链应用-实体经济-政务领域
【Abstract】Electronic vaccine certificates (EVC) for COVID-19 vaccination are likely to become widespread. Blockchain (BC) is an electronic immutable distributed ledger and is one of the more common proposed EVC platform options. However, the principles of blockchain are not widely understood by public health and medical professionals. We attempt to describe, in an accessible style, how BC works and the potential benefits and drawbacks in its use for EVCs. Our assessment is BC technology is not well suited to be used for EVCs. Overall, blockchain technology is based on two key principles: the use of cryptography, and a distributed immutable ledger in the format of blockchains. While the use of cryptography can provide ease of sharing vaccination records while maintaining privacy, EVCs require some amount of contribution from a centralized authority to confirm vaccine status; this is partly because these authorities are responsible for the distribution and often the administration of the vaccine. Having the data distributed makes the role of a centralized authority less effective. We concluded there are alternative ways to use cryptography outside of a BC that allow a centralized authority to better participate, which seems necessary for an EVC platform to be of practical use.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】blockchain (BC); electronic vaccination record; electronic vaccine certificate; cryptography; COVID-19; clinical informatics
【发表时间】2022
【收录时间】2022-08-31
【文献类型】 观点阐述
【Author】 Miao, Jia
【影响因子】
【主题类别】
区块链技术-核心技术-加密算法
【Abstract】The data transmission in the vehicle network is easily interfered with by the outside world, which makes the security of data access difficult to provide in order to meet the actual needs. Therefore, a data security access control algorithm for an electric vehicle network based on blockchain technology is proposed. Using the double-chain architecture of an alliance chain-private chain in a blockchain, the distributed database of data communication for vehicle networking is constructed. In the process of vehicle network communication, the long short-term memory neural network is introduced to analyze the risk of communication behavior. A generator and discriminator are used to avoid communication risk behavior and realize secure access to data. The experimental results show that the success rate of data tampering is lower than 0.09 when this design method is used to deal with external intrusion, and it has high security.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】blockchain technology; generate countermeasure network; attribute matching
【发表时间】2022
【收录时间】2022-08-31
【文献类型】 理论模型
【DOI】 10.3390/wevj13070111
【作者】 齐荣;鲁静;李毅;杨庆;程晗蕾;
【作者单位】远光软件股份有限公司;
【文献来源】建筑经济
【复合影响因子】
【综合影响因子】
【主题类别】
区块链应用-实体经济-能源领域
【摘要】电力工程结算场景中存在着结算数据中心化存储安全性低且缺少自动化结算流程所带来的资金安全问题。为了解决资金安全问题,基于国家重点支持的区块链技术,提出区块链解决方案,避免结算数据中心化存储的风险,且利用智能合约技术来高效地实现自动化结算。因此,这样可以解决电力工程结算场景中存在的资金安全问题,以实现保障资金安全的目标。
【关键词】区块链;;电力工程结算;;资金安全
【文献类型】 理论模型
【发表时间】2022-08-31
【作者】 夏曼曼;赵利;赵乐萌;聂倩钰;
【作者单位】中国矿业大学力学与土木工程学院;广州理工学院建筑工程学院;
【文献来源】建筑经济
【复合影响因子】
【综合影响因子】
【主题类别】
区块链应用-实体经济-供应链
【摘要】以装配式建筑为研究对象,结合区块链技术的特点,考虑将区块链、供应链二者进行双链融合,并引入信任关系作为中介变量,深入探究区块链技术对装配式建筑供应链绩效的影响机制。通过对来自175份建筑供应链上所涉及的企业的问卷调查,采用结构方程模型进行了实证研究。结果表明,区块链技术的适用性均可正向影响装配式建筑供应链上的信任和绩效,但对绩效的影响的间接作用大于直接作用,即区块链技术主要借助于信任关系发挥的中介作用。
【关键词】区块链技术;;装配式建筑;;供应链绩效;;信任关系
【文献类型】 实证数据
【发表时间】2022-08-31