• 首页
  • 每日更新
  • 文献
  • 会议文献
  • 政策法规
  • 研究专题
  • 区块链游戏
logo 区块链前沿
  • 区块链前沿
  • 首页
  • 每日更新
  • 文献
  • 会议文献
  • 政策法规
  • 研究专题
  • 区块链游戏
  • 文章创新角色
  • 科研创新指数
  • 区块链领域本体
  • 热点主题挖掘
  • 主题展示
  • 专利文献
  • 排行榜
  • DAO治理
  • 文献上传
  • 积分获取规则
  • 大语言模型解析
  • 期刊发文分布
注册 登录

2022年12月21日 23篇

文献来源

  • 16
  • 7

主题分类

      • 1
      • 1
      • 1
      • 2
      • 1
      • 1
      • 1
      • 1
      • 1
      • 2
      • 1
      • 2
      • 2
      • 1
      • 1
      • 2
      • 1
      • 1

文献类型

  • 5
  • 6
  • 11
  • 1
筛选
订阅
<< 前一天 后一天 >>

Managing a blockchain-based platform ecosystem for industry-wide adoption: The case of TradeLens

【Author】 Jovanovic, Marin Kostic, Nikola Sebastian, Ina M. Sedej, Tomaz

【影响因子】10.884

【主题类别】

区块链治理-市场治理-技术采用

【Abstract】The proliferation of blockchain-based platform ecosystems in recent years has prompted scholars across various disciplines to explore the conditions leading to their successful deployment. However, developing a blockchain-based platform ecosystem creates various challenges for the platform sponsor that may influence industry-wide adoption and, ultimately, the platform's success. This study follows the development of TradeLens, a leading global shipping platform ecosystem underpinned by blockchain technology. We examine the factors affecting industry-wide adoption among global supply chain actors by unpacking platform value drivers and platform governance mechanisms identified at TradeLens. While the platform value hinges on the digitalization of workflows and the ecosystem leverage, the platform governance includes strategic (off-chain), technology (on-chain), and interoperability (on- and off-chain) governance - as mechanisms for effectively managing a blockchain-based platform ecosystem. This paper contributes to the literature on blockchain-based platform ecosystems and the platform literature.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain-based platforms; Platform ecosystems; Platform value; Platform governance; Interoperability governance; Technology governance

【发表时间】2022

【收录时间】2022-12-21

【文献类型】 实证数据

【DOI】 10.1016/j.techfore.2022.121981

An in-depth investigation of the performance characteristics of Hyperledger Fabric

【Author】 Guggenberger, Tobias Sedlmeir, Johannes Fridgen, Gilbert Luckow, Andre

【影响因子】7.180

【主题类别】

区块链技术-平台项目-Hyperledger Fabric

【Abstract】Private permissioned blockchains are deployed in ever greater numbers to facilitate cross-organizational processes in various industries, particularly in supply chain management. One popular example of this trend is Hyperledger Fabric. Compared to public permissionless blockchains, it promises improved performance and provides certain features that address key requirements of enterprises. However, also permissioned blockchains are still not as scalable as centralized systems, and due to the scarcity of theoretical results and empirical data, their real-world performance cannot be predicted with the necessary precision. We intend to address this issue by conducting an in-depth performance analysis of Hyperledger Fabric. The paper presents a detailed compilation of various performance characteristics using an enhanced version of the Distributed Ledger Performance Scan (DLPS). Researchers and practitioners alike can use the various performance properties identified and discussed as guidelines to better configure and implement their Hyperledger Fabric network. Likewise, they are encouraged to use the DLPS framework to conduct their measurements.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Benchmarking; Blockchain; Distributed ledger; Scalability; Supply chain; Throughput

【发表时间】2022

【收录时间】2022-12-21

【文献类型】 实验仿真

【DOI】 10.1016/j.cie.2022.108716

Blockchain acceptance rate prediction in the resilient supply chain with hybrid system dynamics and machine learning approach

【Author】 Roozkhosh, Pardis Pooya, Alireza Agarwal, Renu

【影响因子】7.032

【主题类别】

区块链应用-实体经济-供应链

【Abstract】In today's era, the importance and implementation of blockchain networks have become feasible as it improves the resilience of the supply chain network at all levels by clarifying information and creating security in the network, improving the speed of response, and gaining the trust of customers. This paper aims to investigate the behavior of the blockchain acceptance rate (BAR) in the home appliances flexible supply chain in Iran using. system dynamics (SD), which is used to better define the relationships between the variables of the model that are non-linearly connected. Through simulating the behavior of the BAR in the long term in the supply chain, whilst conducting sensitivity analysis, policy design, and validation, this model will be implemented for the years 2020 to 2030. Additionally, post-simulation, blockchain acceptance behavior will be assessed by having simulated data considered as input for studied Multi-Layer Perceptron (MLP) and Vector Regression (SVR) (data that have the highest correlation with BAR). The acceptance rate behavior is predicted with the help of machine learning methods to have the best behavior and prediction for the data of 2020-2022 since the prediction function is compared to daily real data obtained these years. The results show that in 2030, the BAR will be around 0.6 if the COVID-19 outbreak impact is medium, and if the considered policy designs are implemented, this rate will reach a maximum of 0.8. So paying attention to the creation and design of policies can achieve positive implications for increasing the resilience of the supply chain in the long run. Findings suggest that the SD-MLP method is better than the SD-SVR method as it has less error and can predict the better behavior of the BAR.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain; Prediction; System dynamics; MLP; SVR

【发表时间】

【收录时间】2022-12-21

【文献类型】 实证数据

【DOI】 10.1007/s12063-022-00336-x

Blockchain diffusion: the role of consulting firms

【Author】 Laaraj, Marroi Nakara, Walid A. Fosso Wamba, Samuel

【影响因子】6.846

【主题类别】

区块链应用-实体经济-传媒领域

【Abstract】Blockchain is one of the most promising technologies with a highly disruptive potential, yet many aspects of this innovation remain unclear in the current body of research. One of them is the whole adoption and diffusion process of blockchain technology, which needs more attention from researchers. This study has adopted a qualitative method to investigate the role of consultants in blockchain diffusion, relying on data from 14 semi-structured interviews conducted with blockchain consultants. The various roles of these key players were identified and challenges related to the technology analyzed by means of the Diffusion of Innovation Theory (DOI) and the Technology - Organization - Environment (TOE) framework. According to the results obtained, consultants' roles range from technology brokers to quality filters. The same results also revealed that the most important barriers to blockchain adoption and diffusion include the lack of knowledge and understanding of the technology, which contributes to promoting unconscious or forced adoption. This paper sheds light on how consulting firms and blockchain-oriented start-ups operate to impact the diffusion of blockchain while dismantling barriers to adoption.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Consulting firms; diffusion; Blockchain; TOE framework; diffusion of innovation theory

【发表时间】

【收录时间】2022-12-21

【文献类型】 实证数据

【DOI】 10.1080/09537287.2022.2153079

Secure Aerial Computing: Convergence of Mobile Edge Computing and Blockchain for UAV Networks

【Author】 Tang, Qingqing Fei, Zesong Zheng, Jianchao Li, Bin Guo, Lei Wang, Jing

【影响因子】6.239

【主题类别】

区块链应用-实体经济-无人机领域

【Abstract】The introduction of mobile edge computing (MEC) technology in unmanned aerial vehicle (UAV) networks can provide computing services for mobile users with or without communication infrastructure coverage. However, mobile users' privacy may be leaked during the computation offloading process due to the information interaction between UAVs and the migration of computation tasks between mobile users and UAVs. To this end, we propose a secure aerial computing architecture that integrates MEC and blockchain technology for UAV networks to effectively ensure the security and privacy of computation offloading between UAVs and mobile users. Under this architecture, a problem of joint optimization of user association, UAV trajectory, block processor scheduling, and computation resource allocation is formulated to minimize the weighted sum of the energy consumption and the delay in completing computation tasks and blockchain tasks processing. To handle this intractable issue, we first decouple the optimization variables and then separate the original problem into multiple subproblems to be solved alternately. In addition, we design a block coordinate descent (BCD)-based algorithm for user association and computation resource allocation, and a successive convex approximation (SCA)-based algorithm to optimize the trajectories of UAVs. Simulation results show that the proposed algorithm has better performance.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Unmanned aerial vehicle; mobile edge computing; blockchain; security; computation offloading

【发表时间】2022

【收录时间】2022-12-21

【文献类型】 理论模型

【DOI】 10.1109/TVT.2022.3189818

Secure and Efficient Blockchain-Assisted Authentication for Edge-Integrated Internet-of-Vehicles

【Author】 Shen, Meng Lu, Hao Wang, Fei Liu, Huisen Zhu, Liehuang

【影响因子】6.239

【主题类别】

区块链应用-实体经济-交通领域

【Abstract】Edge-Integrated Internet-of-Vehicles (IoV) sinks service to edge nodes, which responses quickly to vehicles' requests and alleviates the burden of cloud servers. In such scenario, the entities of IoV need to be mutually authenticated since potential attacks can impersonate edge nodes to send false instructions to vehicles, or impersonate legitimate service subscribers to get free-ride IoV services. Furthermore, due to the high mobility characteristics of vehicles, frequent authentication is required between vehicles and edge nodes. We hope that the authentication process can be conducted efficiently to ensure the continuous service. Existing works cannot balance the security and efficiency well. This is still an issue worthy of discussion. In this article, we propose SEA, a secure and efficient blockchain-assisted authentication scheme for IoV. SEA achieves mutual authentication among vehicles, edge nodes and cloud servers. Specifically, the cloud server is only involved when vehicles are initially authenticated. And edge nodes realize the authentication of vehicles by querying the authentication result recorded by cloud on the blockchain, which significantly reduces the cryptographic computation overhead and eliminates network communication delay. Besides, session keys between any two entities involved are negotiated, which can secure sensitive data of vehicles. Extensive experiments have been conducted to show the security and efficiency of SEA.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain; identity authentication; Internet-of-Vehicles

【发表时间】2022

【收录时间】2022-12-21

【文献类型】 理论模型

【DOI】 10.1109/TVT.2022.3194008

A Privacy-Preserving and Transparent Identity Management Scheme for Vehicular Social Networking

【Author】 Khan, Salabat Luo, Fei Zhang, Zijian Rahim, Mussadiq Abdul Khan, Siraj Qadri, Syed Furqan Wu, Kaishun

【影响因子】6.239

【主题类别】

区块链应用-实体经济-交通领域

【Abstract】Vehicular social networking is expected to become a reality soon, where secure and privacy-preserving identity management is a prerequisite. Various organizations and studies have recommended using Vehicular Public-key Infrastructure (VPKI) to securely and privately manage vehicles' identities. However, the existing VPKI schemes still do not deal with identity management in vehicular social networking. In this work, we propose a Privacy-Preserving Identity Management (PPTIM) scheme for vehicular social networking to securely and privately manage vehicles' social identities. PPTIM builds on the transparency log (distributed ledger) proposals for web PM, but it addresses challenges specific to vehicular social networking. All pseudo-social identities, pseudonym certificates issued against pseudo-social identities, revocation process, and revocation status validation are conducted on a transparency log. With an efficient data structure named the Accumulation Tree (AT), we extend the conventional transparency log to offer trustworthy pseudonym certificate validation without relying on the Certificate Revocation Lists (CRLs). In addition, PPTIM strengthens the security of vehicular social networking by protecting vehicles to a greater extent from being duped by malicious pseudonym certificates through logging and constant monitoring. Finally, performance and security analysis show the cost-effectiveness and security of PPTIM.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Accountability; intelligent transportation system (ITS); transparency; vehicular public-key infrastructure (VPKI); vehicular social networking

【发表时间】2022

【收录时间】2022-12-21

【文献类型】 实证数据

【DOI】 10.1109/TVT.2022.3190908

A multi-method study on the barriers of the blockchain technology application in the cold supply chains

【Author】 Chavalala, Makungu Meriot Bag, Surajit Pretorius, Jan Harm Christiaan Rahman, Muhammad Sabbir

【影响因子】5.661

【主题类别】

区块链技术-协同技术-物联网

【Abstract】PurposeThe cold supply chain industry is still emerging and digital transformation is in the nascent stage in this industry. This paper argues that there are various barriers to implementing blockchain technology in the cold supply chain and aims to develop and validate a model for overcoming key barriers to implementing blockchain technology in the cold supply chain.Design/methodology/approachThe adoption of blockchain technology was proposed through interpretive structural modeling (ISM) and further it is validated using structural equation modeling (SEM).FindingsIn this study, ten key barriers to implementing blockchain technology in the cold supply chain were identified, modelled and analysed. Poor leadership style of top management was found to be the most important barriers to implementing blockchain technology in the cold supply chain. The results of SEM indicate that all the paths are supported. The findings showcase the barriers responsible for the lack of blockchain technology infrastructure that ultimately impacts the cold supply chains.Practical implicationsThis study highlights the fact that the fate of blockchain technology infrastructure development depends on the leadership style of top management. Demonstrating good leadership style by top management can help overcome the barriers. A good leader pulls the entire team instead of pushing the team. A good leader can guide the entire team to improve IT governance, financial investment, digital footprint, digital readiness, skills and collaboration with service providers to implement blockchain technology. Not only that, a good leader provides mental strength to the team and helps overcome the fear of implementing blockchain in the cold supply chain. A good leader demonstrates good administrative skills and focus on security and privacy policies.Originality/valueThis is a novel contribution towards analysing the key barriers to implementing blockchain technology in the South African cold supply chain using the integrated ISM-MICMAC and SEM approach.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain technology; Barriers; Cold supply chain; South Africa; ISM; SEM

【发表时间】

【收录时间】2022-12-21

【文献类型】 实验仿真

【DOI】 10.1108/JEIM-06-2022-0209

A blockchain-based confidentiality-preserving approach to traceability in Industry 4.0

【Author】 Mullet, Valentin Sondi, Patrick Ramat, Eric

【影响因子】3.563

【主题类别】

区块链应用-实体经济-工业领域

【Abstract】Industry 4.0 involves major changes in manufacturing process management. Both the Internet of Things and cloud computing allow online interactions between third parties, such as providers, customers and suppliers, with the traceability system of a factory. Several blockchain-based approaches have been proposed to increase confidence in traceability data and reinforce trust. However, the transparency brought may be at the cost of risks to factory's confidential data exposure. This paper investigates the way these critical data, which are necessary to post-assembly audit, could be included into traceability data, and validated through the related transactions by the third parties, without compromising their confidentiality. Accordingly, this proposal includes the description of a blockchain-based traceability system and its implementation using the Multichain platform. In addition to its confidentiality-preserving feature, we discuss the way energy consumption and storage volume induced could be managed so as to favor its effective adoption by manufacturing factories.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Traceability; Industry 4; 0; Confidentiality; Blockchain

【发表时间】

【收录时间】2022-12-21

【文献类型】 理论模型

【DOI】 10.1007/s00170-022-10431-9

Dual-channel capsule generation adversarial network based blockchain technology for a secured dynamic optimal routing in mobile ad hoc network

【Author】 Vanitha, V. Anand, Sujatha Jamuna Radhamani, V Rajalakshmi, N. R.

【影响因子】3.310

【主题类别】

区块链技术-协同技术-深度学习

【Abstract】Mobile ad hoc network (MANET) routing is allocated packets to the base station. It preserves the routing buttressing and the efficiency of MANET. None of effective approaches presented so far averting spiteful node occurrences. To overcome this issue, in this article, dual-channel capsule generation adversarial network (DCCGAN) optimized with arithmetic optimization algorithm is proposed for blockchain based trusted distributed routing scheme in MANET (DCCGAN-AOA-BC-MANET). The proposed approach offers the distributed trust module for routing nodes in MANETs that is proof-of-authority through blockchain. Here, the token is engendered for the packet stream admittances with the secret key transmitted to every routing mobile node, also it offers the optimum path for data transmission. The trusted distributed optimum routing information is distributed based upon proposed blockchain based MANET. The proposed approach is simulated utilizing NS-3 tool. The performance metrics, such as delay performance, average delay, average latency, average energy consume, BC token transactions throughput. The simulation of proposed DCCGAN-AOA-BC-MANET method provides 76.26%, 65.57%, 80.32%, and 42.9% lower transaction latency, 73.06%, 63.82%, 85.56%, and 38.84% lower energy consumption compared to the existing methods.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】

【发表时间】

【收录时间】2022-12-21

【文献类型】 实验仿真

【DOI】 10.1002/ett.4692

Health data privacy through homomorphic encryption and distributed ledger computing: an ethical-legal qualitative expert assessment study

【Author】 Scheibner, James Ienca, Marcello Vayena, Effy

【影响因子】2.834

【主题类别】

区块链应用-实体经济-健康领域

【Abstract】Background: Increasingly, hospitals and research institutes are developing technical solutions for sharing patient data in a privacy preserving manner. Two of these technical solutions are homomorphic encryption and distributed ledger technology. Homomorphic encryption allows computations to be performed on data without this data ever being decrypted. Therefore, homomorphic encryption represents a potential solution for conducting feasibility studies on cohorts of sensitive patient data stored in distributed locations. Distributed ledger technology provides a permanent record on all transfers and processing of patient data, allowing data custodians to audit access. A significant portion of the current literature has examined how these technologies might comply with data protection and research ethics frameworks. In the Swiss context, these instruments include the Federal Act on Data Protection and the Human Research Act. There are also institutional frameworks that govern the processing of health related and genetic data at different universities and hospitals. Given Switzerland's geographical proximity to European Union (EU) member states, the General Data Protection Regulation (GDPR) may impose additional obligations. Methods: To conduct this assessment, we carried out a series of qualitative interviews with key stakeholders at Swiss hospitals and research institutions. These included legal and clinical data management staff, as well as clinical and research ethics experts. These interviews were carried out with two series of vignettes that focused on data discovery using homomorphic encryption and data erasure from a distributed ledger platform. Results: For our first set of vignettes, interviewees were prepared to allow data discovery requests if patients had provided general consent or ethics committee approval, depending on the types of data made available. Our interviewees highlighted the importance of protecting against the risk of reidentification given different types of data. For our second set, there was disagreement amongst interviewees on whether they would delete patient data locally, or delete data linked to a ledger with cryptographic hashes. Our interviewees were also willing to delete data locally or on the ledger, subject to local legislation. Conclusion: Our findings can help guide the deployment of these technologies, as well as determine ethics and legal requirements for such technologies.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Data protection; Privacy preserving technologies; Qualitative research; Vignettes; Interviews; Distributed ledger technology; Homomorphic encryption

【发表时间】2022

【收录时间】2022-12-21

【文献类型】 实证数据

【DOI】 10.1186/s12910-022-00852-2

Contract-based scheme for computational resource allocation in cloud-assisted parked vehicular edge computing

【Author】 Cheng, Zhixu Zhang, Jing Song, Tiecheng Hu, Jing

【影响因子】2.379

【主题类别】

区块链技术-协同技术-边缘计算

【Abstract】Having shown promising performance with high flexibility and efficiency in vehicular edge computing (VEC) network, the parked vehicles (PVs) received an increasing number of attentions in recent years. However, PVs' residual battery power restricts their running time. In addition, there is still no alternate resource pool for the PVs to cope with the emergencies in the previous VEC framework. To alleviate these problems, we model a cloud-assisted parked vehicular edge computing (PVEC) framework, in which the PVs are classified based on their residual battery power. PVs corporate with the cloud servers (CSs) for the computational resources provision. In addition, we formulate the utilities of the service provider (SP) and PVs and design a contract-based resource allocation problem for the maximization of the SP's utility. Considering that it is intractable to solve the optimization problem directly, the primal problem is simplified and decoupled into two sub-problems. To design the optimal contracts, we solve the sub-problems by Lagrangian multiplier method and dual function. Simulation results prove that the utilities of PVs can reach to the maximum when they choose the contract corresponding to their types. In addition, the simulation results illustrate the superiority of proposed scheme over previous schemes in improving the utilities of the SP and social welfare.(c) 2022 Elsevier B.V. All rights reserved.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Parked vehicular edge computing (PVEC); Cloud assistance; Incentive mechanism; Contract theory

【发表时间】2022

【收录时间】2022-12-21

【文献类型】 理论模型

【DOI】 10.1016/j.phycom.2022.101916

A multikey fully homomorphic encryption privacy protection protocol based on blockchain for edge computing system

【Author】 Liao, Junguo Wang, Haifeng Wu, June

【影响因子】1.831

【主题类别】

区块链技术-协同技术-同态加密

【Abstract】In order to protect private data in edge computing system and ensure that ciphertexts encrypted under different keys can be processed in the cloud, we propose a privacy protection protocol for edge computing, which is based on blockchain technology and multikey fully homomorphic encryption (MFHE). By constructing a Merkle hash tree and saving the Merkle root node to the blockchain, the integrity of the data in edge nodes is protected. For the data with high computational complexity in edge nodes, the GSW fully homomorphic encryption scheme is employed to process the encrypted private data of a single edge node by the CMS. The LinkAlgo algorithm is applied to link different keys by the relation between them, which enables the CMS to process the encrypted private data of multiple edge nodes. The security analysis and performance evaluation of the proposed privacy protection protocol show that our protocol has high security and good efficiency.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】blockchain; edge computing; multikey fully homomorphic encryption; privacy protection

【发表时间】

【收录时间】2022-12-21

【文献类型】 实验仿真

【DOI】 10.1002/cpe.7539

BandBlock: Bandwidth allocation in blockchain-empowered UAV-based heterogeneous networks

【Author】 Venkateswarararao, Kuna Kumar, Pratik Solanki, Akash Swain, Pravati

【影响因子】1.622

【主题类别】

区块链应用-实体经济-无人机领域

【Abstract】The 5G mobile network is promising to handle the dynamic traffic demands of user equipment (UE). Unmanned aerial vehicles (UAVs) equipped with wireless transceivers can act as flying base stations in heterogeneous networks to ensure the quality of service of UE. However, it is challenging to efficiently allocate limited bandwidth to UE due to dynamic traffic demands and low network coverage. In this study, a blockchain-enabled bandwidth allocation framework is proposed for secure bandwidth trading. Furthermore, the proposed framework is based on the Cournot oligopoly game theoretical model to provide the optimal solution; that is, bandwidth is allocated to different UE based on the available bandwidth at UAV-assisted-based stations (UBSs) with optimal profit. The Cournot oligopoly game is performed between UBSs and cellular base stations (CBSs). Utility functions for both UBSs and CBSs are introduced on the basis of the available bandwidth, total demand of CSBs, and cost of providing cellular services. The proposed framework prevents security attacks and maximizes the utility functions of UBSs and CBSs.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】5G; bandwidth allocation; blockchain; game theory; UAV communication; 6G

【发表时间】

【收录时间】2022-12-21

【文献类型】 理论模型

【DOI】 10.4218/etrij.2022-0212

A model for evaluating the impediments to secure and trustworthy IoT environment: a software industry study

【Author】 Tripathi, Akansha Kushwaha, Madan

【影响因子】0.000

【主题类别】

区块链技术-协同技术-物联网

【Abstract】PurposeIn the existing era, the Internet of Things (IoT) can be considered entirely as a system of embedding intelligence. The transverse character of IoT systems and various components associated with the arrangement of IoT systems have confronted impediments in the form of security and trust. There is a requirement to efficiently secure the IoT environment. The present study recommends a framework for impediments to secure and trustworthy IoT environments.Design/methodology/approachThe present study identifies thirteen potential impediments to secure and trustworthy IoT environment. Further, a framework is developed employing Total Interpretive Structural Model (TISM) and Cross-Impact Matrix Multiplication Applied to Classification (MICMAC) approach. The integrated approach is employed as TISM organizes inter-relations among the identified impediments, while MICMAC analysis organizes interpretations related to the driving and dependence power of the impediments.FindingsThe results from the study represents that security of IoT from arbitrary attacks is the impediment that has attained the highest driving power. The impediments such as "security of IoT from arbitrary attacks", "profiling" and "trust and prominence structure" are identified at the top level in the analysis.Research limitations/implicationsThe previous studies highlight the facilitating contribution of IoT on various devices but neglect the impediments that can contribute towards a safe and trustworthy IoT environment. Also, the present study has its limitations as it depends upon the experts' recommendations and suggestions.Originality/valueThe existing framework could be beneficial in constructing policies and suggestions to efficiently cater the impediments to a secure and trustworthy IoT environment.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Internet of things (IoT) environment; Security; Blockchain; Impediments; Total interpretive structural modeling (TISM); Cross-Impact Matrix Multiplication Applied to Classification (MICMAC)

【发表时间】

【收录时间】2022-12-21

【文献类型】 理论模型

【DOI】 10.1108/MEQ-07-2022-0195

Application of blockchain technology in autonomous electricity transaction and settlement at the end of distribution network

【Author】 Xing, Ziya Liu, Boyu

【影响因子】0.000

【主题类别】

区块链应用-实体经济-电力领域

【Abstract】With the deepening of the concept of low-carbon environmental protection, the use of renewable energy in social production has become more and more popular. More and more consumers in the distribution network have begun to change their identities to become consumers with the continuous reform of the electricity sales side. Electricity trading and settlement methods in the electricity market directly affect the relevant income of market entities, so a fair and reasonable settlement mechanism is an important factor for the normal operation of the electricity market. Electricity trading refers to the buying and selling of electricity commodities and services, including electricity trading, auxiliary service trading, and transmission rights trading. With the expansion of the electricity market, how to deal with the deviation of electricity is also a difficult problem that requires electricity settlement. This paper aimed to study the application of blockchain technology in the autonomous electricity transaction and settlement at the end of the distribution network. It was expected to use the blockchain technology to set up related transaction mechanisms, provide new solutions for electricity transaction and settlement, and improve the efficiency and fairness of electricity settlement. Blockchain technology does not rely on additional third-party management agencies or hardware facilities, and there is no central control. Except for the self-contained blockchain itself, through distributed accounting and storage, each node realizes information self-verification, transmission and management. On the basis of sorting out the principles of electricity balance and electricity price formation, this paper proposed a contract decomposition method with a higher degree of fit, and revealed the settlement principle of deviation electricity in the electricity market environment. Aiming at the application scenario of blockchain in the energy Internet, an energy trading platform based on blockchain was designed, and the test results showed the feasibility of blockchain in electricity settlement scenarios. The experimental results of this paper showed that in the traditional electricity purchase fee settlement, the average transaction price is stable at 0.6 yuan/KWh. In the blockchain settlement process, the electricity purchase is 25 yuan when the electricity purchase is 50 KWh. Therefore, blockchain settlement is used more frequently in the market, and the profits are higher.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】blockchain technology; distributed power generation; electricity trading; end of distribution network; trade settlement

【发表时间】

【收录时间】2022-12-21

【文献类型】 理论模型

【DOI】 10.1515/ijeeps-2022-0224

基于区块链技术的高校“业财资税”新格局构建

【作者】 刘丽;霍海伟;张菀麟;

【作者单位】河北农业大学;

【文献来源】会计之友

【复合影响因子】3.676

【综合影响因子】0.776

【主题类别】

区块链应用-实体经济-财会领域

【摘要】文章首先探讨了构建基于区块链技术的高校“业财资税”新格局的意义,指出区块链技术具有打破“部门墙”、推翻“数据篱”与破解IT产品和管理“两张皮”的作用,可驱动高校“业财资税”新格局构建。其次针对高校“业财资税”新格局构建目标,提出了基于区块链技术的高校“业财资税”新格局框架,从最终流程演示来看,该框架对高校“业财资税”深度融合、提升管理效率、强化流程严谨性具有重要作用。最后提出配备独立资税中台系统、推动管控到赋能方向转变、实施闭环式管理方案、采用加密私钥数据安全模式等应用建议,以促进高校“业财资税”新格局畅通发展。

【关键词】区块链技术;;高等院校;;“业财资税”新格局;;闭环式管理

【文献类型】 观点阐述

【DOI】

【发表时间】2022-12-21

区块链在农险内部审计中的应用探讨

【作者】 杜爽;

【作者单位】赤峰学院经济与管理学院;

【文献来源】财会通讯

【复合影响因子】2.924

【综合影响因子】0.416

【主题类别】

区块链应用-实体经济-审计领域

【摘要】本文基于区块链独有的技术特性,将其合理应用于农险审计工作场景之中,以实现农险审计工作内容和技术水平的拓宽与提升。首先,从理论层面出发,明确并总结区块链为农险内部审计工作带来的机遇与挑战。其次,依托于AH农险公司推出的肉鸭养殖险项目,充分分析了应用区块链前公司农险业务内部审计暴露的问题,并以此为基础聚焦其内部审计应用区块链所做出的调整和变化。

【关键词】农险内部审计;;区块链技术;;时间戳;;不可篡改性

【文献类型】 理论模型

【DOI】 10.16144/j.cnki.issn1002-8072.2022.23.013

【发表时间】2022-12-21

基于区块链技术的微电网市场多元储能共享协调优化运行

【作者】 谢连芳;张越;

【作者单位】国网四川省电力公司绵阳供电公司;中国电力工程顾问集团西南电力设计院有限公司;

【文献来源】电力系统及其自动化学报

【复合影响因子】2.455

【综合影响因子】1.861

【主题类别】

区块链应用-实体经济-电力领域

【摘要】为不断激发多元储能资源价值,支撑多微电网系统多样化参与电力辅助服务市场的交易和运营,提出含优化匹配功能的多微电网共享储能优化调度方法。首先,基于区块链在去中心化、信息安全等方面与多元储能的交易管理有着天然匹配优势,设计了基于区块链构建的多微电网共享储能优化调度架构;然后,响应分时电价,综合考虑多元储能的能量交互和获利最大化,优化日前储能调度计划应用,平抑微电网功率波动并满足净储能充放电需求;优化日内储能调度计划应用,最大化微电网经济效益。最后,算例表明该方法可有效提升多微电网系统能源利用率、提升经济收益。

【关键词】多元共享储能;;区块链;;多微电网;;智能合约;;调度优化

【文献类型】 理论模型

【DOI】 10.19635/j.cnki.csu-epsa.001156

【发表时间】2022-12-21

基于中继链的联盟链跨链监管机制

【作者】 陆艺仁;朱友文;

【作者单位】南京航空航天大学计算机科学与技术学院;

【文献来源】计算机工程与应用

【复合影响因子】2.348

【综合影响因子】1.606

【主题类别】

区块链治理-技术治理-跨链监管

【摘要】近年来联盟链在物流溯源、数据交易等领域发挥了重大作用,但是由于联盟链的底层实现差异较大,导致链与链之间无法形成有效的数据共享,跨链技术是打破联盟链数据孤岛现状的重要手段。现有的跨链技术无法满足联盟链跨链监管的需求,没有对跨链请求和链间互操作划分明确的权限,链与链之间合约调用可能导致跨链过程中出现恶意篡改账本数据的情况,无法较好适用于跨链监管场景。针对上述问题,面向联盟链跨链监管需求。本文提出了一种基于中继链的联盟链上计算跨链监管机制,通过对接入链身份进行分级,保证了跨链操作的安全性,利用模块化设计实现了跨链的可扩展性;设计了可用于跨链监管的通信消息协议,保证了监管过程中的安全性。最后,我们将所提方案和现有机制进行了对比分析,并通过模拟实验验证了所提方案运行效率的实用性。

【关键词】联盟链;;跨链;;监管;;智能合约

【文献类型】 实验仿真

【DOI】

【发表时间】2022-12-21

基于完美二叉树通信拓扑的拜占庭容错共识算法

【作者】 李淑芝;熊伟志;邓小鸿;王智强;刘惠文;

【作者单位】江西理工大学信息工程学院;赣南科技学院电子信息工程学院;赣州市云计算与大数据重点实验室;

【文献来源】电子与信息学报

【复合影响因子】1.870

【综合影响因子】1.481

【主题类别】

区块链技术-核心技术-共识机制

【摘要】针对实用拜占庭容错算法(PBFT)中主节点可预测、通信复杂度高和作恶节点缺少惩罚机制的问题,该文提出一种基于完美二叉树通信拓扑的联盟链拜占庭容错算法(PBT-BFT)。首先设计了信誉评估模型对节点的行为进行评估,同时提出了基于信誉的可验证随机函数(R-VRF),使得随机抽取概率与信誉值呈正相关,保证了拥有不同信誉值的节点抽签的公平性和随机性。然后,设计了完美二叉树通信拓扑,将通信复杂度降低至线性复杂度,同时提出了轮换主节点和流水线工作机制,提高了共识效率。实验结果表明,与PBFT相比,平均吞吐量提高了121.6%,平均时延降低了73.8%,能够很好地适用于大规模网络节点的联盟链。

【关键词】完美二叉树;;通信拓扑;;共识机制;;拜占庭容错

【文献类型】 实验仿真

【DOI】

【发表时间】2022-12-21

基于区块链的可信主侧多链绿色食品追溯平台构建研究

【作者】 何静;陈晓娜;

【作者单位】上海海洋大学经济管理学院;

【文献来源】食品工业科技

【复合影响因子】

【综合影响因子】

【主题类别】

区块链应用-实体经济-供应链

【摘要】区块链技术具有去中心化、不可篡改、可追溯等特性,将区块链技术应用于绿色食品追溯中,有助于解决信息不对称、不可信带来的绿色食品的质量安全问题。然而随着绿色食品供应链的网络化、复杂化发展,溯源信息越来越多,对于绿色食品的追溯平台提出了更高的要求。本文引入区块链侧链,构建可信的主侧多链绿色食品追溯平台,通过侧链对主链进行扩容,提高其存储能力,并使用布隆过滤器改进后的Bmerkle树,提高溯源的查询效率,最后以具体的绿色食品为例分析追溯平台的运行流程。可信主侧多链追溯平台的构建能够消除复杂供应链网络中的信息不对称,保障追溯信息的真实可信,进而增强消费者对绿色食品的消费信心;同时能够扩充单条链的存储能力、提高溯源查询效率,保障隐私数据的私密性,希望能够为区块链技术在追溯系统中的应用提供参考。

【关键词】区块链技术;;可信主侧多链追溯平台;;绿色食品;;供应链网络;;食品安全

【文献类型】 理论模型

【DOI】 10.13386/j.issn1002-0306.2022070391

【发表时间】2022-12-21

简短关联可编辑环签名及其区块链修正应用

【作者】 王杰昌;刘玉岭;张平;刘牧华;李杰;

【作者单位】郑州大学体育学院体育大数据中心;中国科学院信息工程研究所;河南科技大学数学与统计学院;

【文献来源】北京航空航天大学学报

【复合影响因子】

【综合影响因子】

【主题类别】

区块链技术-核心技术-认证机制

【摘要】关联可编辑环签名可提升区块链的匿名性,防止双花攻击,修正区块链数据,但其签名大小随环成员的增多而增大。针对该问题,结合已有关联可编辑环签名和简短关联环签名方案,先利用动态累加器对环成员的公钥进行累加计算,然后依据原知识证明签名构造出新的知识证明签名,进而提出简短关联可编辑环签名方案,最后基于该签名又提出了新的区块链修正协议。在随机谕言机模型下,证明了签名具有不可伪造性、匿名性、关联性。性能评估表明,随着环成员的增多,已有签名的大小在增大,而本签名的不变;同时此类签名所消耗的时间均在增多,而本签名的时间增速较缓且最少。

【关键词】知识证明签名;;动态累加器;;简短关联可编辑环签名;;时间更新变色龙哈希;;区块链修正

【文献类型】 理论模型

【DOI】 10.13700/j.bh.1001-5965.2022.0557

【发表时间】2022-12-21

在线标注

备案号: 苏ICP备17025947号-5

评论回复