• 首页
  • 每日更新
  • 文献
  • 会议文献
  • 政策法规
  • 研究专题
  • 区块链游戏
logo 区块链前沿
  • 区块链前沿
  • 首页
  • 每日更新
  • 文献
  • 会议文献
  • 政策法规
  • 研究专题
  • 区块链游戏
  • 文章创新角色
  • 科研创新指数
  • 区块链领域本体
  • 热点主题挖掘
  • 主题展示
  • 专利文献
  • 排行榜
  • DAO治理
  • 文献上传
  • 积分获取规则
  • 大语言模型解析
  • 期刊发文分布
注册 登录

2022年09月22日 29篇

文献来源

  • 16
  • 13

主题分类

      • 5
      • 2
      • 1
      • 3
      • 1
      • 1
      • 1
      • 2
      • 1
      • 2
      • 2
      • 2
      • 3
      • 1
      • 1
      • 1
      • 1
      • 1
      • 1
      • 1
      • 1

文献类型

  • 14
  • 5
  • 6
  • 2
  • 2
筛选
订阅
<< 前一天 后一天 >>

SECURE AND TRUSTED COLLABORATIVE LEARNING BASED ON BLOCKCHAIN FOR ARTIFICIAL INTELLIGENCE OF THINGS

【Author】 Tang, Xiangyun Zhu, Liehuang Shen, Meng Peng, Jialiang Kang, Jiawen Niyato, Dusit Abd El-Latif, Ahmed A.

【影响因子】12.777

【主题类别】

区块链技术-协同技术-物联网

【Abstract】Empowered by promising artificial intelligence, the traditional Internet of Things is evolving into the Artificial Intelligence of Things (AIoT), which is an important enabling technology for Industry 4.0. Collaborative learning is a key technology for AIoT to build machine learning (ML) models on distributed datasets. However, there are two critical concerns of collaborative learning for AIoT: privacy leakage of sensitive data and dishonest computation. Specifically, data contains sensitive information of users, which cannot be openly shared for model learning. Furthermore, to protect the privacy of data or other selfish purposes, participants of collaborative learning may behave dishonestly, submitting dummy data or incorrect model computation. Therefore, it is important to guarantee privacy preservation of data and honest computation on collaborative learning. Our work tackles the two concerns wherein a model demander can securely train ML models with sensitive data and can regulate the computation of participants. To this end, we propose a secure and trusted collaborative learning framework called TrusCL. The framework guarantees privacy preservation via a delicate combination of homomorphic encryption (HE) and differential privacy (DP), achieving the trade-off between efficiency and accuracy. Furthermore, based on blockchain, in our design, the key steps of secure collaborative learning are recorded on blockchain so that malicious behaviors can be effectively tracked and choked in a timely manner to facilitate trusted computation. Experimental results validate the trade-off performance of TrusCL between model training efficiency and trained model accuracy.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】

【发表时间】2022

【收录时间】2022-09-22

【文献类型】 理论模型

【DOI】 10.1109/MWC.003.2100598

Blockchain and Industry 4.0 in Resilient Wireless Communications

【Author】 Sharma, Pradip Kumar Hafid, Abdelhakim Senhaji Rana, Omer Chandramouli, Rajarathnam Peng, Shuping

【影响因子】12.777

【主题类别】

区块链应用-实体经济-通信领域

【Abstract】

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】

【发表时间】2022

【收录时间】2022-09-22

【文献类型】 观点阐述

【DOI】

SCALABLE ON-CHAIN AND OFF-CHAIN BLOCKCHAIN FOR SHARING ECONOMY IN LARGE-SCALE WIRELESS NETWORKS

【Author】 Cai, Ting Chen, Wuhui Psannis, Kostas L. Goudos, Sotirios K. Yu, Yang Zheng, Zibin Wan, Shaohua

【影响因子】12.777

【主题类别】

区块链技术-协同技术-物联网

【Abstract】In the future sharing economy, billions of underutilized IoT devices will be deployed to enable a powerful and large-scale sharing market that produces economic, environmental, and social benefits. Given the fact that communications in numerous IoT devices through wireless links are unreliable, blockchain technology, as a promising solution, has emerged to achieve reliable and secure sharing services in a decentralized manner. However, applying blockchain in large-scale wireless networks confronts scalability challenges. This motivates us to propose a real-time, trusted data interactive, and fine-grained transaction supportable sharing framework, the core of which is a novel two-layer scaling blockchain design. In the on-chain layer, sharing-oriented sharding is employed to enable secure and efficient processing of macro-transactions on the chain. In the off-chain layer, cross-zone off-chain channels are set up to provide real-time sharing transactions with high-frequency micro-trading scenarios. Finally, a proof-of-concept case study of electric vehicle sharing data is implemented with experimental results to demonstrate the feasibility of our framework.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】

【发表时间】2022

【收录时间】2022-09-22

【文献类型】 实验仿真

【DOI】 10.1109/MWC.004.2100616

Exploiting Zero Knowledge Proof and Blockchains Towards the Enforcement of Anonymity, Data Integrity and Privacy (ADIP) in the IoT

【Author】 Rasheed, Amar Mahapatra, Rabi N. Varol, Cihan Narashimha, Karpoor

【影响因子】6.595

【主题类别】

区块链技术-协同技术-物联网

【Abstract】In recent years, the Internet of Things (IoT) has been contemplated as the next technological advancement in the era of data communication and networking. However, although hundreds of new IoT platforms are introduced to the market every few months, the security of IoT ecosystems is still not fully understood. This paper discloses the architecture of a multilayer, multimode security system for the IoT. The proposed system is capable of providing multiple security solutions that support anonymous authentication, device privacy, data integrity, device sybil attack detection and IoT server spoofing attack detection. For IoT access control and authentication, our system can support two modes of operations, with one mode endorsing device privacy protection over the network and the second mode relinquishing device identity to establish data tracing during safety-critical IoT events. The new security system includes two innovative crypto approaches, zero knowledge proof (ZKP) and blockchains. IoT device anonymity was achieved via the multimode ZKP protocol, while data integrity and protection against sybil and IoT spoofing attacks were maintained via blockchains. Our threat analysis models showed that data modification and data injection attacks are not feasible. Probabilistic modeling of an IoT spoofing attack was performed in this paper, and the results show that our security system provides high resiliency against such attacks, with a probability approaching 1.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchains; Servers; Security; Medical services; Data privacy; Authentication; Internet of Things; Anonymity; blockchain; IoT; sybil attacks; ZKP

【发表时间】2022

【收录时间】2022-09-22

【文献类型】 理论模型

【DOI】 10.1109/TETC.2021.3099701

Ultra-Lightweight and Secure Blockchain-Assisted Charging Scheduling Scheme for Vehicular Edge Networks by Utilization of NanoPi NEO

【Author】 Shahidinejad, Ali Abbasinezhad-Mood, Dariush

【影响因子】6.239

【主题类别】

区块链应用-实体经济-交通领域

区块链技术-协同技术-边缘计算

【Abstract】In vehicular edge computing networks, electric vehicles can get charging services from edge servers through some road-side charging stations. Several recent studies have investigated how to deal with security requirements in these communications. Nevertheless, simultaneous provision of security and lightness, which is crucial for resource-constrained vehicles, is still an open issue. More critically, the anonymity from the perspective of honest-but-curious edge nodes has not been yet addressed. Thus, this paper proposes a novel ultra-lightweight framework for the secure and anonymous communications of vehicles during their charging reception by means of blockchain. Thanks to the blockchain technology, the accountability of electric vehicle possessors guaranteed. The proposed scheme has been validated in terms of security metrics and also implemented on two ARM-based platforms, one 32-bit ARM microcontroller and one 64-bit ARM processor. Further, its blockchain part has been deployed on a Hyperledger Fabric network. The obtained results besides the comparison with well-respected similar schemes acknowledge the usefulness and practicability of the presented scheme.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Servers; Electric vehicles; Blockchains; Authentication; Privacy; Edge computing; Smart contracts; Blockchain; Edge computing; Privacy; Secure communications; Vehicular networks

【发表时间】2022

【收录时间】2022-09-22

【文献类型】 实验仿真

【DOI】 10.1109/TVT.2022.3173076

Privacy Aware Internet of Medical Things Data Certification Framework on Healthcare Blockchain of 5G Edge

【Author】 Rahman, Mohammad Saidur Alabdulatif, Abdulatif Khalil, Ibrahim

CCF-C

【影响因子】5.047

【主题类别】

区块链应用-实体经济-医疗领域

区块链技术-协同技术-物联网

【Abstract】The 5G communication technology and edge computing jointly form 5G Edge and eliminate the constraints of Internet-of-Medical Things (IoMT) devices to facilitate several real-time healthcare services, including patient monitoring and diagnoses from anywhere. Nevertheless, the 5G Edge platform introduces risks of internal attacks to the data integrity and privacy of IoMT data. Hence, end users cannot trust data retrieved from the 5G Edge. This paper proposes a privacy-preserving search result certification framework for IoMT data on 5G and edge computing-assisted blockchain networks. The novelty of this paper is twofold. First, the proposed framework introduces a blockchain platform involving 5G Edge servers to ensure tamperproof data storage. In addition, an encrypted data storage model and a symmetric-key cryptography-based privacy-preserving search mechanism are developed for the 5G Edge blockchain. Second, the framework leverages an efficient multi-signature scheme to design a tamperproof search result certification mechanism for IoMT data on the blockchain of 5G Edge. Several experiments are conducted to evaluate the performance of the proposed framework.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Internet of Medical Things; IoMT data privacy; Smart medical systems; Blockchain; Privacy-preserving search; IoMT data integrity; Search result certification; Query result verification; Verifiable query; Multi-signature

【发表时间】2022

【收录时间】2022-09-22

【文献类型】 理论模型

【DOI】 10.1016/j.comcom.2022.06.013

Secure blockchain enabled Cyber- Physical health systems using ensemble convolution neural network classification

【Author】 Ramanan, M. Singh, Laxman Kumar, A. Suresh Suresh, A. Sampathkumar, A. Jain, Vishal Bacanin, Nebojsa

【影响因子】4.152

【主题类别】

区块链应用-实体经济-医疗领域

【Abstract】Breast cancer is the most widely recognized malignancy affecting women. The risk of death has been consistently associated with breast cancer. In addition, the cyber-physical system (CPS)is the processing and data transfer of physical processes. This study presents a safe, intrusive, blockchain-based data transfer using the CPS classification model in the health industry to overcome the problem. Considering the challenges in breast tumor classification, this paper accords a reasonable arrangement to examine the mammogram image to discover the detection and classification of various stages of cancer. The breast cancer detection images obtained from the mammogram were processed and experimentally evaluated for parameters such as a sensitivity of 90%, a specificity of 98%,and a classification accuracy of 98%.The results of the ensemble convolution neural network (E-CNN) classifier, such as VGG-16 and Inception-v3, which separates ordinary and unusual cases from the applied advanced mammographic image, will be projected by comparing the two existing methods.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Cyber-physical system; Cybersecurity; Blockchain; Breast cancer; Malignant

【发表时间】2022

【收录时间】2022-09-22

【文献类型】 实验仿真

【DOI】 10.1016/j.compeleceng.2022.108058

Adoption of Federated Learning for Healthcare Informatics: Emerging Applications and Future Directions

【Author】 Patel, Vishwa Amitkumar Bhattacharya, Pronaya Tanwar, Sudeep Gupta, Rajesh Sharma, Gulshan Bokoro, Pitshou N. Sharma, Ravi

【影响因子】3.476

【主题类别】

区块链技术-协同技术-联邦学习

【Abstract】The smart healthcare system has improved the patients quality of life (QoL), where the records are being analyzed remotely by distributed stakeholders. It requires a voluminous exchange of data for disease prediction via the open communication channel, i.e., the Internet to train artificial intelligence (AI) models efficiently and effectively. The open nature of communication channels puts data privacy at high risk and affects the model training of collected data at centralized servers. To overcome this, an emerging concept, i.e., federated learning (FL) is a viable solution. It performs training at client nodes and aggregates their results to train the global model. The concept of local training preserves the privacy, confidentiality, and integrity of the patient's data which contributes effectively to the training process. The applicability of FL in the healthcare domain has various advantages, but it has not been explored to its extent. The existing surveys majorly focused on the role of FL in diverse applications, but there exists no detailed or comprehensive survey on FL in healthcare informatics (HI). We present a relative comparison of recent surveys with the proposed survey. To strengthen healthcare data privacy and increase the QoL of patients, we proposed an FL-based layered healthcare informatics architecture along with the case study on FL-based electronic health records (FL-EHR). We discuss the emerging FL models, and present the statistical and security challenges in FL adoption in medical setups. Thus, the review presents useful insights for both academia and healthcare practitioners to investigate FL application in HI ecosystems.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Medical services; Data privacy; Biological system modeling; Data models; Computational modeling; Servers; Bioinformatics; Blockchains; Informatics; Aggregation; Gradient methods; Collaborative work; Blockchain; federated learning; healthcare informatics; gradient; model aggregation

【发表时间】2022

【收录时间】2022-09-22

【文献类型】 综述

【DOI】 10.1109/ACCESS.2022.3201876

Towards the Classification of Self-Sovereign Identity Properties

【Author】 Cucko, Spela Becirovic, Seila Kamisalic, Aida Mrdovic, Sasa Turkanovic, Muhamed

【影响因子】3.476

【主题类别】

区块链技术-协同技术-隐私计算

【Abstract】Self-Sovereign Identity (SSI) is a novel and emerging, decentralized digital identity approach that enables entities to control and manage their digital identifiers and associated identity data while enhancing trust, privacy, security, and the many other properties identified and analyzed in this paper. The paper provides an overview and classification of the SSI properties, focusing on an in-depth analysis, furthermore, presenting a comprehensive collection of SSI properties that are important for the implementation of the SSI system. In addition, it explores the general SSI process flow, and highlights the steps in which individual properties are important. After the initial purification and classification phase, we then validated properties among experts in the field of Decentralized and Self-Sovereign Identity Management using an online questionnaire, which resulted in a final set of classified and verified SSI properties. The results can be used for further work on definition and standardization of the SSI field.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchains; Security; Data privacy; Privacy; Interoperability; Electrical engineering; Controllability; Classification; Digital systems; Classification; credential; decentralized; identified; identity; principles; properties; self-sovereign; verifiable

【发表时间】2022

【收录时间】2022-09-22

【文献类型】 观点阐述

【DOI】 10.1109/ACCESS.2022.3199414

Blockchain-Enabled Intrusion Detection and Prevention System of APTs Within Zero Trust Architecture

【Author】 Alevizos, Lampis Eiza, Max Hashem Ta, Vinh Thong Shi, Qi Read, Janet

【影响因子】3.476

【主题类别】

区块链治理-技术治理-区块链安全

【Abstract】In a world where organisations are embracing new IT working models such as Bring Your Own Device (BYOD) and remote working, the traditional mindset of defending the network perimeter is no longer sufficient. Zero Trust Architecture (ZTA) has recently emerged as a new security model in which the breach mindset dominates the threat model. By default, the ZTA considers any endpoint (i.e., device), user, or application to be untrusted until proven otherwise. Nonetheless, once proven by the endpoint, using Advanced Persistent Threats (APT), attackers can still take over an authenticated and authorised session via that endpoint. Therefore, they can perform several user/device centric malicious activities in addition to lateral movement rendering the endpoint the Achilles heel of ZTA. To effectively deter APT attack capabilities on the endpoints, this work proposes a Blockchain-enabled Intrusion Detection and Prevention System (BIDPS) that augments ZTA onto endpoints. The BIDPS aims to achieve two core outcomes: first, detect and prevent attackers' techniques and tactics as per MITRE's ATT&CK enterprise matrix earlier than the lateral movement stage, and secondly, strip trust out of the endpoint itself and place it on-chain, thus creating an immutable system of explicit trust. To evaluate the effectiveness of the BIDPS, a testbed was built where techniques of over ten APTs attacks were launched against the endpoint. BIDPS has a high rate of success defending against the launched attacks owing to its Blockchain's immutability, fortifying the detection/prevention processes.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchains; Monitoring; Peer-to-peer computing; Distributed ledger; Smart contracts; Intrusion detection; Computer architecture; Security; Advanced persistent threats; blockchain; endpoints; intrusion detection; intrusion prevention; security; MITRE's ATT&CK; zero trust

【发表时间】2022

【收录时间】2022-09-22

【文献类型】 观点阐述

【DOI】 10.1109/ACCESS.2022.3200165

A public blockchain consensus mechanism for fault-tolerant distributed computing in LEO satellite communications

【Author】 Zhang, Zhen Guo, Bing Zhu, Lidong Shen, Yan Qin, Chaoxia Li, Chengjie

【影响因子】3.170

【主题类别】

区块链技术-核心技术-共识机制

【Abstract】In LEO (Low Earth Orbit) satellite communication systems, the satellite network is made up of a large number of satellites, the dynamically changing network environment affects the results of distributed computing. In order to improve the fault tolerance rate, a novel public blockchain consensus mechanism that applies a distributed computing architecture in a public network is proposed. Redundant calculation of blockchain ensures the credibility of the results; and the transactions with calculation results of a task are stored distributed in sequence in Directed Acyclic Graphs (DAG). The transactions issued by nodes are connected to form a net. The net can quickly provide node reputation evaluation that does not rely on third parties. Simulations show that our proposed blockchain has the following advantages: 1. The task processing speed of the blockchain can be close to that of the fastest node in the entire blockchain; 2. When the tasks' arrival time intervals and demanded working nodes(WNs) meet certain conditions, the network can tolerate more than 50% of malicious devices; 3. No matter the number of nodes in the blockchain is increased or reduced, the network can keep robustness by adjusting the task's arrival time interval and demanded WNs.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】distributed computing; public blockchain network; consensus mechanism; credibility; fault-tolerance

【发表时间】2022

【收录时间】2022-09-22

【文献类型】 理论模型

【DOI】 10.23919/JCC.2022.07.010

Risk Evaluation and Forecast Behavior Analysis of Supply Chain Financing Based on Blockchain

【Author】 Rao, Qixuan Li, Weibin

CCF-C

【影响因子】2.146

【主题类别】

区块链治理-市场治理-市场分析

【Abstract】With the deepening of globalization and the improvement of the fineness of production division and cooperation, various forms of suppliers coexist, and the supply chain network becomes complex and fragmented. Traditional supply chain management mode and purchasing mechanism cannot respond to the changes of the times in time, and enterprises and suppliers cannot connect. As a new type of financial service, supply chain finance plays an important role in solving the financing difficulties and expensive problems of SMEs. However, in recent years, traditional supply chain finance has encountered many problems, and it has gradually become a trend to empower traditional supply chain finance with blockchain technology. This paper proposes a blockchain supply chain financing risk assessment and behavior prediction algorithm. By analyzing the development status of supply chain business, it puts forward corresponding preventive measures to effectively improve the efficiency of supply chain financing. Firstly, the paper puts forward the double-chain management system and constructs the double-chain management architecture and operation flow; Thirdly, the weighting method of enterprise financing risk evaluation index based on variance homogeneity test is put forward to explain; Finally, five enterprises are tested on the data set, and the performance of TPR, FPR, Precision, Recall, F-Measure, and Accuracy is compared. Different enterprises have the problem of supply chain financing risk.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】

【发表时间】2022

【收录时间】2022-09-22

【文献类型】 实证数据

【DOI】 10.1155/2022/7668474

Application of Edge Computing and Blockchain in Smart Agriculture System

【Author】 Feng, Yuhan

【影响因子】1.430

【主题类别】

区块链应用-实体经济-农牧领域

区块链技术-协同技术-边缘计算

【Abstract】The development of Internet technology provides a lot of convenience for the promotion of smart agriculture. At present, smart agriculture has gradually realized unmanned and automatic management, which can realize monitoring, supervision, and real-time image monitoring. However, the data in smart agriculture system cannot be guaranteed to be complete and vulnerable to attack. Based on this, this paper studies and analyzes the application of edge computing and blockchain in smart agriculture systems. Based on the simple analysis of the development of smart agriculture, the edge computing framework and the advantages of blockchain are used to build the framework system of smart agriculture. The classical architecture of edge computing and the confidentiality of blockchain are used to realize the analysis and storage of data. In view of the shortcomings of crop image overlap detection, it is proposed to detect the overlapping area and determine the feature points to analyze the image based on the edge computing and hash algorithm. In terms of data integrity, based on the advantages of blockchain, an edge data detection method based on short signature is proposed, and experiments are designed to analyze the accuracy and efiectiveness of the algorithm. The simulation results show that the image mosaic algorithm can extract the contour information of the image and realize the fast image matching. The edge data integrity calculation based on short signature can meet the requirements and shorten the response time.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】

【发表时间】2022

【收录时间】2022-09-22

【文献类型】 理论模型

【DOI】 10.1155/2022/7198624

A New Secure Crowdfunding Transaction Scheme Based on Blockchain

【Author】 Li, Guangshun Liang, Guopeng Wu, Junhua Jin, Zhenyu Feng, Wenzhen Yu, Kan

【影响因子】1.278

【主题类别】

区块链技术-核心技术-扩展方案

【Abstract】Online crowdfunding, an innovative model based on "Internet + Finance", is a hot spot for financing via Internet. Crowdfunding based on blockchain is an emerging economic phenomenon and becomes one of the most advanced risk financing strategies. However, crowdfunding transactions face security threats due to identity leaks, quantum attacks and the untraceable nature of blind signatures, which facilitate criminal activity. Different from the previous works, which ignored the importance of traceability, in this paper, we establish a blockchain-empowered secure crowdfunding architecture and propose an anti-quantum partially blind signature algorithm based on the verifiable identity of both sides. Specially, for one thing, the private key decided by user identity is generated by lattice-based sample matrix, and the privacy of user identity can be ensured and traced by the rejection sampling theorem. For another thing, we design an improved krill herd algorithm (IKHA) to increase the credit factor of fundraisers for dealing with project investment issues. The simulation evaluates the correctness and effectiveness of our theoretical analyses. Compared with the current popular schemes, the proposed IKH algorithm has a higher convergence speed and can optimize investment efficiency.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain; crowdfunding; partially blind signature (PBS); improved krill herd algorithm

【发表时间】

【收录时间】2022-09-22

【文献类型】 实验仿真

【DOI】 10.1142/S0218126622502826

AHI: Smart Logistics for Autonomous Transport Using IoT and Blockchain Technology

【Author】 Wang, Bin Wang, Yan-Li

CCF-C

【影响因子】0.563

【主题类别】

区块链应用-实体经济-交通领域

区块链技术-协同技术-物联网

【Abstract】In order to improve the transportation effect of the autonomous transportation logistics system, this paper combines the Internet of Things and blockchain technology to construct an intelligent logistics system, and establishes the principle of deterministic deviation compensation based on the two-point method. Moreover, this paper calculates two deterministic deviations through the known coordinates of the starting and ending points and compensates them into the heading angle and pitch angle measured by the inertial navigation system respectively. Further, this paper uses the basic formula of dead reckoning to calculate the trajectory after compensation to achieve the effect of improving positioning accuracy. Finally, this paper constructs an autonomous transportation intelligent logistics system based on the Internet of Things and blockchain technology. The experimental research results show that the simulation effect of the autonomous transportation intelligent logistics system based on the Internet of Things and blockchain technology is very good.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Internet of things; blockchain; autonomous transportation; intelligent logistics

【发表时间】

【收录时间】2022-09-22

【文献类型】 理论模型

【DOI】 10.1142/S0218843021500064

Blockchain-based Authentication and Proof-of-Reputation Mechanism for Trust Data Sharing in Internet of Vehicles

【Author】 Bai, Xiao Chen, Shanzhi Shi, Yan Liang, Chengzhi Lv, Xiaochen

【影响因子】0.400

【主题类别】

区块链技术-协同技术-边缘计算

【Abstract】Mobile edge computing (MEC) technology with storage and computing capabilities and deployed at the edge of the network, is widely used to solve the problems of high bandwidth, low latency and high mobility for the Internet of vehicles (IoV). Edge computing servers are generally deployed on road side unit (RSU). However, since the vehicles need to share data and collaborate on computations through RSUs, RSUs may be attacked by malicious vehicles which take up RSU resources or gain control of RSU. Therefore, a trust management system needs to be designed to build a secure and trustworthy MEC data-sharing envi-ronment in IoV. Most of the previous studies have centralized authen-tication of vehicle identity through certificate authority (CA), which has the risk of privacy leakage. In addition, in the previously proposed blockchain-based distributed trust management schemes, the consensus mechanism consumes huge resources. Therefore, this paper proposes an autonomous and controllable distributed authentication scheme based on decentralized identifier (DID) to ensure the credibility of the vehi-cle's identity, and a novel proof-of-reputation consensus mechanism based on blockchain to enhance trust management for RSU. And this paper considers the capability and reputation value of RSU and uses the deep reinforcement learning algorithm to adjust the assignment of ver-ification nodes, block size and block interval in order to maximize the transaction throughput and improve system scalability and efficiency. The experiment shows that our scheme has good results for building a trusted data sharing system for vehicular networks.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain; reputation management; authentication; PBFT; markov decision process; internet of vehicles

【发表时间】2022

【收录时间】2022-09-22

【文献类型】 理论模型

【DOI】 10.32908/ahswn.v53.8647

基于区块链的文本翻译安全交易方案研究

【作者】 李功丽;乔煊煊;胡建刚;

【作者单位】河南师范大学计算机与信息工程学院;智慧商务与物联网技术河南省工程实验室(河南师范大学);

【文献来源】计算机工程与应用

【复合影响因子】2.348

【综合影响因子】1.606

【主题类别】

区块链应用-实体经济-翻译领域

【摘要】针对现有翻译交易方案在竞拍翻译高保密性文本时无法保障其安全性、翻译成本与进程不易控制及译后纠纷处理困难等问题,提出了一种基于区块链智能合约的新型匿名反向拍卖(New anonymous reverse auction,NARA)交易模型。该模型采用匿名参与机制保护用户隐私,利用反向竞拍机制合理控制翻译成本,并进一步使用拆分式数据交互(Split data interaction,SDI)提升翻译文本交互时的安全性。同时该方案采用一种自动化货币支付算法,约束交易双方诚信参与,并解决翻译纠纷问题。最后通过安全分析证明该方案的安全性,实验结果证实了交易模型的有效性。

【关键词】翻译交易;;区块链;;智能合约;;翻译安全;;匿名拍卖

【文献类型】 理论模型

【DOI】

【发表时间】2022-09-22

基于交易构造和转发机制的区块链网络隐蔽通信方法

【作者】 熊礼治;朱蓉;付章杰;

【作者单位】南京信息工程大学计算机学院软件学院网络空间安全学院;数字取证教育部工程研究中心;

【文献来源】通信学报

【复合影响因子】2.347

【综合影响因子】1.740

【主题类别】

区块链应用-实体经济-通信领域

【摘要】针对现有存储型区块链网络隐蔽通信方案存在含密交易多副本、永久存储的问题,以及现有时间型方案隐藏容量低的问题,提出了一种基于交易构造和转发机制的区块链网络隐蔽通信方法。首先发送方借助交易构造机制创建无效交易,并将秘密信息嵌入其中,再利用交易转发机制向邻居节点发送无效交易,形成隐蔽通信信道模型,使含密交易在节点间传播且不存于区块链账本中,达到信息隐蔽安全传输的目的。实验结果表明,传输容量高于现有方案,单次通信时间减少至2.5 s。

【关键词】隐蔽通信;;区块链网络;;比特币交易构造;;比特币交易转发;;无效交易

【文献类型】 实验仿真

【DOI】

【发表时间】2022-09-22

基于区块链的审计监管云平台构建

【作者】 胡翠华;罗嘉滨;李岩;王清玉;

【作者单位】上海立信会计金融学院信息管理学院;上海立信会计金融学院会计学院;

【文献来源】科技管理研究

【复合影响因子】2.157

【综合影响因子】1.277

【主题类别】

区块链应用-实体经济-审计领域

【摘要】打破现有基于区块链技术有关监管平台应用局限,本着“绿色审计”理念,在安全性、可靠性、标准化原则下,基于华为云区块链底层技术构建审计监管云平台,包括基础设施层、智能合约层、平台应用层和政府监管层等具有跨层功能的架构,通过应用P2P网络技术、分布式账本、更加开放的许可链结构、密码算法技术等设计去中心化的网络系统,并提出运用时间戳技术、密码学技术、共识机制和智能合约为四核的审计监管云平台建设路径,为推动我国审计行业变革、监管科技基础能力建设提供参考。

【关键词】财务审计;;区块链;;审计监管云平台;;数字化监管;;绿色审计

【文献类型】 理论模型

【DOI】

【发表时间】2022-09-22

区块链何以构建诚信社会:结构条件、实践逻辑与限度

【作者】 梁官宵;

【作者单位】北京邮电大学;

【文献来源】征信

【复合影响因子】1.934

【综合影响因子】0.959

【主题类别】

区块链应用-实体经济-公共管理

【摘要】区块链构建诚信社会受技术逻辑和社会逻辑的双重支配。一方面,陌生人社会、风险社会的发展和数字社会的到来,为区块链构建诚信社会奠定了结构基础;另一方面,区块链为解决个体化、不确定性和数字化的社会环境下的信任达成问题提供了技术支撑。研究发现,区块链凭借自身技术特性生成了一种新的信任形式。在形态上,它是一种分布式共享型信任;在内在结构上,它是一种可计算的数字信任。从社会秩序性质和状态看,区块链构建了一个重“信”轻“诚”的社会秩序,社会的人文性受到技术理性的挤压。数字的利维坦和技术的发展性预示着区块链构建诚信社会的限度,以及技术与社会的有机协调是发展和运用技术的应有之义。

【关键词】区块链;;诚信社会;;信任;;诚信;;数字社会;;数字信任

【文献类型】 观点阐述

【DOI】

【发表时间】2022-09-22

区块链赋能个人破产后信用监管的理论阐释与制度创新

【作者】 闫晴;马苗;

【作者单位】合肥工业大学文法学院;

【文献来源】征信

【复合影响因子】1.934

【综合影响因子】0.959

【主题类别】

区块链治理-法律治理-区块链监管制度

【摘要】个人破产制度已开始运行,然而个人破产后信用监管尚存在立法完备度偏低、监管部门权责模糊、信息管控能力偏弱、差异化监管模式缺失以及监督机制乏力等问题。近年来,区块链技术在多领域广泛应用,其技术特性与个人破产后信用监管制度逻辑契合,可提高个人破产后信用监管的结果公信力与实践效能并优化信用监管秩序。我国应积极提升个人破产后信用监管的立法完备度,明确监管部门权责,提升信息管控能力,构建差异化监管模式,加大监督力度,从而助力被监管主体早日恢复经济再生能力,优化市场经济环境。

【关键词】信用监管;;区块链;;个人破产;;多元共治

【文献类型】 观点阐述

【DOI】

【发表时间】2022-09-22

FedSharing:一种双区块链激励驱动的数据分享联邦学习框架

【作者】 陈乔松;许文杰;何小阳;丁小月;孙开伟;邓欣;王进;

【作者单位】重庆邮电大学计算机科学与技术学院数据工程与可视计算重庆市重点实验室;重庆邮电大学自动化学院/工业互联网学院智慧能源技术研究中心;

【文献来源】计算机应用研究

【复合影响因子】1.888

【综合影响因子】1.138

【主题类别】

区块链技术-协同技术-联邦学习

【摘要】联邦学习(Federated Learning,FL)能够在不丢失数据所有权的同时依托隐私保护技术实现安全的分布式模型训练,但是其也具有中心化、缺乏公平激励等问题。区块链(Blockchain)本质上来说是一种分布式数据库,具有去中心化、信任公证等特点,但是其也具有网络吞吐量小、资源浪费等关键问题。针对上述技术方法的问题与特点,本篇论文提出了FedSharing,一种双区块链激励驱动的数据分享联邦学习框架。分别构建主链与侧链:主链使用交易封装联邦学习中交换的全局参数,同时结合链上智能合约和链下扩容技术建立梯度状态通道;侧链提出了一种新型的修正Shapley值工作量证明算法(PoFS),修正传统Shapley值计算中成员平等性前提,将联邦学习中成员合作历史诚信度这一影响联盟利益的因素纳入考量。测试结果表明:梯度状态通道较于智能合约去中心化方案每轮次时间平均降低4~5s,PoFS共识下激励分配比例更符合公平实际。

【关键词】联邦学习;;区块链;;状态通道;;激励机制;;Shapley值

【文献类型】 实验仿真

【DOI】 10.19734/j.issn.1001-3695.2022.05.0277

【发表时间】2022-09-22

区块链隐私威胁及保护机制研究

【作者】 王群;李馥娟;倪雪莉;夏玲玲;梁广俊;

【作者单位】江苏警官学院计算机信息与网络安全系;江苏省电子数据取证分析工程研究中心;

【文献来源】计算机工程

【复合影响因子】1.808

【综合影响因子】1.289

【主题类别】

区块链技术-核心技术-隐私保护

【摘要】脱胎于比特币的区块链技术,借助于密码学、共识算法、激励机制、P2P网络、分布式账本、智能合约等关键技术,在没有第三方权威机构参与的互不信任网络环境中,实现了对事务记录的分布式一致性、不可篡改性、可溯源性等功能,构成了一种崭新的可信、安全、可编程的网络生态。与此同时,支撑区块链自身功能实现的相关技术及机制也带来了隐私安全问题。将隐私作为个人数据的一个子集进行研究,从而将区块链数据主要划分为事务数据和区块数据两种类型,并通过对区块链数据的解构以及对所得信息的关联,分析隐藏在数据的隐私信息。首先,以数据为研究对象,重点从数据传输方式和数据结构方面介绍了区块链数据构成;其次,在分析了区块链数据特点的基础上,综合对隐私的理解、度量和泄露途径等因素,给出了区块链隐私的定义,并从身份隐私、数据隐私和网络隐私等方面进行了分析;随后,针对区块链身份、网络和数据,重点讨论了区块链隐私保护中的关键技术;最后,指出了区块链隐私威胁及保护机制存在的挑战和研究方向。

【关键词】区块链;;隐私保护;;混币技术;;信息隐藏;;通道隔离

【文献类型】 综述

【DOI】 10.19678/j.issn.1000-3428.0064343

【发表时间】2022-09-22

基于智能合约非同质化代币的去中心化匿名身份认证模型

【作者】 黄金荣;刘百祥;张亮;张展鹏;

【作者单位】复旦大学计算机科学技术学院;上海市区块链工程技术研究中心;

【文献来源】计算机工程

【复合影响因子】1.808

【综合影响因子】1.289

【主题类别】

区块链技术-核心技术-智能合约

区块链应用-虚拟经济-NFT

【摘要】在传统的互联网环境下,服务商的用户系统相互独立。为了使用各种场景下的应用服务,人们不得不注册大量的账号,面临着不可控的信息泄露风险和繁杂信息更新流程。为了打破这种数字身份之间相互隔离的局面,让用户掌控自己的数字身份,许多去中心化身份(DID)认证机制被提出,然而现有的DID方案给用户带来了密钥管理的负担,而且这些方案都假设已经存在由一组凭证发行者组成的生态系统,这并不能与现有的互联网生态兼容。为此,提出一种基于智能合约和非同质化代币的数字身份认证方案,方案阐述了数字身份和数字账户的概念,说明了两者的区别和它们的关联;使用分层确定性钱包技术生成并管理用户的数字身份和数字账户的密钥;方案充分兼容了现有互联网服务商的用户系统和认证机制,将数字账户以非同质化代币的形式保存在区块链上,通过零知识的手段隐藏了用户账户的真实信息;将单点登录(SSO)中的认证方由可信的第三方替换为区块链上的智能合约,实现了类似SSO的“一次认证,处处登录”机制。在以太坊测试链上对该方案进行实验证明了,该方案能够有效实现去中心化场景下的单点登录功能,且具有良好的可用性、匿名性和安全性。

【关键词】单点登录;;智能合约;;去中心化身份;;非同质化代币;;区块链

【文献类型】 理论模型

【DOI】 10.19678/j.issn.1000-3428.0064244

【发表时间】2022-09-22

基于负载均衡的Hyperledger Fabric共识机制研究

【作者】 贺鹏飞;范鹏飞;尹千慧;王中训;张桐敬;梁大伟;

【作者单位】烟台大学物理与电子信息学院;华能山东烟台发电有限公司烟台发电厂;烟台市食品药品检测中心;

【文献来源】计算机工程

【复合影响因子】1.808

【综合影响因子】1.289

【主题类别】

区块链技术-平台项目-Hyperledger Fabric

【摘要】Hyperledger Fabric将业务逻辑进行解耦,提升灵活性的同时存在一些性能瓶颈问题,满足不了部分业务快速增长带来的需求。为解决这一问题,对背书、排序、提交三个阶段进行分析,定位性能瓶颈问题至背书阶段的提案分发方式中,基于负载均衡算法提出了动态负载反馈的性能优化方案。该方案综合考虑多种性能指标,设计了节点负载和节点权值的量化方法,并通过多次采集负载数据,计算并分析选取合适的周期T和影响权重,保证了周期的合理性,精确衡量了各指标对于负载的影响。方案以T为周期更新算法参数,根据节点权值,通过加权轮询算法将交易提案分发至当前权重最大的节点进行背书。采用官方测试工具Caliper对优化前后进行测试,测试结果表明链码交易吞吐量提升了17.53%,平均时延下降了6.7%;链码查询吞吐量提高了15.84%,平均时延降低了18.2%。经测试,该方案通过周期性更新节点权值,实现了节点负载的动态均衡,提高了Hyperledger Fabric的请求处理性能。

【关键词】工业互联网;;区块链;;Hyperledger Fabric;;共识机制;;负载均衡

【文献类型】 理论模型

【DOI】 10.19678/j.issn.1000-3428.0064348

【发表时间】2022-09-22

基于激励驱动的轻量级隐私位置证明协议

【作者】 杨俊明;尹超;杨铮;

【作者单位】重庆理工大学计算机科学与工程学院;西南大学计算机与信息科学学院;

【文献来源】计算机工程

【复合影响因子】1.808

【综合影响因子】1.289

【主题类别】

区块链技术-核心技术-智能合约

【摘要】基于位置服务的发展给人们带来便利的同时,引发的安全问题也日益凸显。去中心化位置证明方案依赖分布式的见证者协助位置证明,但是见证者参与位置证明时不仅消耗自身资源,还面临着位置隐私泄露的风险,所以现实中大部分见证者不会主动参与到位置证明中。为了吸引见证者的参与,提出基于激励驱动的轻量级隐私位置证明协议。在该方案中,首先利用非对称时间基一次性口令和隐私位置接近性检测协议构建一个高效且具有位置隐私的轻量级位置证明方案,证明者和见证者使用基于哈希承诺方案将产生的口令和隐私位置证明请求结合起来,计算位置承诺上传到区块链网络中。然后采用智能合约技术构建一种基于贡献度的激励机制,依据见证者做出的有效位置证明和无效位置证明计算实际贡献度,并且通过部署在区块链网络中的激励机制支付奖励,促使见证者积极参与位置证明。最后对该方案进行性能评估,实验结果表明该激励机制总计Gas花费0.128×10~(-2)Ether,验证了该激励机制对去中心化位置证明方案的有效性和可行性。

【关键词】位置服务;;位置证明;;时间基一次性口令;;智能合约;;位置隐私;;激励机制

【文献类型】 理论模型

【DOI】 10.19678/j.issn.1000-3428.0064729

【发表时间】2022-09-22

基于区块链技术嵌入式的新型农产品流通链优化

【作者】 李棘;

【作者单位】沈阳农业大学;

【文献来源】商业经济研究

【复合影响因子】

【综合影响因子】

【主题类别】

区块链应用-实体经济-农牧领域

【摘要】随着农产品流通需求加大及其流通过程中面临的传统流通模式的弊端,对农产品流通领域供应体系升级变得迫在眉睫。如今区块链技术的落地应用与农产品流通需求存在多重耦合,很大程度上解决国内农产品流通存在的如贸易信任、信息传输、主体协调以及溯源困难等较为突出的问题。因此,为了促进区块链技术在农产品流通中各业务链中的应用,本文首先对农产品市场的发展规模及该技术在农产品流通中落地应用现状进行追溯,对其核心业务存在的问题与区块链应用优势进行分析。在此基础上针对农产品流通领域中具备可实现“区块链+”落地场景,如农产品交易、农产品物流、农产品溯源、农产品流通中金融服务等核心业务链进行区块嵌入式优化设计。最后针对“区块链+农产品流通”整体应用面临的潜在风险给出相应措施。

【关键词】区块链;;新型农产品流通体系;;业务链优化;;运行风险规避

【文献类型】 理论模型

【DOI】

【发表时间】2022-09-22

区块链发展对企业创新影响的实证

【作者】 钟海燕;周文渊;

【作者单位】三峡大学经济与管理学院;

【文献来源】统计与决策

【复合影响因子】

【综合影响因子】

【主题类别】

区块链治理-市场治理-企业创新

【摘要】文章从交易成本理论视角考察了区块链发展对企业创新行为的影响效应及其机制。结果表明,区块链发展对企业创新投入和创新产出都具有明显的“促进效应”,即企业所在城市区块链发展水平越高,其企业创新能力越强。进一步检验发现,区块链发展主要通过降低交易成本这条渠道影响企业创新。异质性分析结果表明,区块链发展促进企业创新的作用在高科技行业和民营外资企业表现得更为明显。在当前受新冠肺炎疫情影响实体经济增速放缓的背景下,只有持续推进区块链发展、重塑企业经营生态格局,才能为实体经济高质量发展提供源源不断的创新活力,从而推动创新型国家建设。

【关键词】区块链;;企业创新;;交易成本

【文献类型】 实证数据

【DOI】 10.13546/j.cnki.tjyjc.2022.16.032

【发表时间】2022-09-22

基于区块链技术的农产品深度溯源系统建设思考和设计方案

【作者】 卞立平;孙爱东;孙晓明;刘贤金;

【作者单位】江苏省农业科学院农产品质量安全与营养研究所;

【文献来源】江苏农业学报

【复合影响因子】

【综合影响因子】

【主题类别】

区块链应用-实体经济-农牧领域

【摘要】针对常规农产品追溯过程中存在的数据可信度低、关联追溯难等问题,以联盟链为基础,设计构建了一套适用于农产品的追溯系统。通过节点权限管理、数据加密上链、数据存储、基于节点关联度的哈希匹配检索等模块,能够在整个供应链流程中实现真实可信、全面完整、安全高效的多级深度追溯,有效提高了农产品追溯信息的可信度、深度和广度,具有的广泛的适用范围和较好的应用前景。

【关键词】溯源;;联盟链;;农产品;;多级关联检索

【文献类型】 理论模型

【DOI】

【发表时间】2022-09-22

在线标注

备案号: 苏ICP备17025947号-5

评论回复