• 首页
  • 每日更新
  • 文献
  • 会议文献
  • 政策法规
  • 研究专题
  • 区块链游戏
logo 区块链前沿
  • 区块链前沿
  • 首页
  • 每日更新
  • 文献
  • 会议文献
  • 政策法规
  • 研究专题
  • 区块链游戏
  • 文章创新角色
  • 科研创新指数
  • 区块链领域本体
  • 热点主题挖掘
  • 主题展示
  • 专利文献
  • 排行榜
  • DAO治理
  • 文献上传
  • 积分获取规则
  • 大语言模型解析
  • 期刊发文分布
注册 登录

2023年04月25日 11篇

文献来源

  • 5
  • 6

主题分类

      • 2
      • 1
      • 2
      • 1
      • 1
      • 1
      • 1
      • 1
      • 1

文献类型

  • 3
  • 2
  • 3
  • 2
  • 1
筛选
订阅
<< 前一天 后一天 >>

Transparent and Tamper-Proof Event Ordering in the Internet of Things Platforms

【Author】 Rahman, Mahbubur Saifullah, Abusayeed

CCF-C

【影响因子】10.238

【主题类别】

区块链技术-协同技术-物联网

【Abstract】Today, the audit and diagnosis of the causal relationships between the events in a trigger-action-based event chain (e.g., why is a light turned on in a smart home?) in the Internet of Things (IoT) platforms are untrustworthy and unreliable. The current IoT platforms lack techniques for transparent and tamper-proof ordering of events due to their device-centric logging mechanism. In this article, we develop a framework that facilitates tamper-proof transparency and event order in an IoT platform by proposing a Blockchain protocol and adopting the vector clock system, both tailored for the resource-constrained heterogeneous IoT devices, respectively. To cope with the unsuited storage (e.g., ledger) and computing power (e.g., proof-of-work puzzle) requirements of the Blockchain in the commercial off-the-shelf IoT devices, we propose a partial consistent cut protocol and engineer a modular arithmetic-based lightweight proof of work puzzle, respectively. To the best of our knowledge, this is the first Blockchain designed for resource-constrained heterogeneous IoT platforms. Our event ordering protocol based on the vector clock system is also novel for the IoT platforms. We implement our framework using an IoT gateway and 30 IoT devices. We experiment with ten concurrent trigger-action-based event chains while each chain involves 20 devices, and each device participates in five different chains. The results show that our framework may order these events in 2.5 s while consuming approximately 140 mJ of energy per device. The results, hence, demonstrate the proposed platform as a practical choice for many IoT applications, such as smart home, traffic monitoring, and crime investigation.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Internet of Things; Protocols; Logic gates; Blockchains; Peer-to-peer computing; Monitoring; Bitcoin; Blockchain; event order; Internet of Things (IoT); wireless network

【发表时间】2023

【收录时间】2023-04-25

【文献类型】 实验仿真

【DOI】 10.1109/JIOT.2022.3222450

PartitionChain: A Scalable and Reliable Data Storage Strategy for Permissioned Blockchain

【Author】 Du, Zhengyi Pang, Xiongtao Qian, Haifeng

CCF-A

【影响因子】9.235

【主题类别】

区块链技术-核心技术-存储策略

【Abstract】Blockchain, a specific distributed database which maintains a list of data records against tampering and corruption, has aroused wide interests and become a hot topic in the real world. Nevertheless, the increasingly heavy storage consumption brought by the full-replication data storage mechanism, becomes a bottleneck to the system scalability. To address this problem, a reliable storage scheme named BFT-Store (Qi et al. 2020), integrating erasure coding with Byzantine Fault Tolerance (BFT), was proposed recently. While, three critical problems are still left open: (i) The complex re-initialization process of the blockchain when the number of nodes varies; (ii) The high computational overload of downloading data; (iii) The massive communication on the network. This paper proposes a better trade-off for blockchain storage scheme termed PartitionChain which addresses the above three problems, maintaining the merits of BFT-Store. First, our scheme allows the original nodes to merely update a single aggregate signature (e.g., 320 bits) when the number of nodes varies. Using aggregate signatures as the proof of the encoded data not only saves the storage costs but also gets rid of the trusted third party. Second, the computational complexity of retrieving data by decoding, compared to BFT-Store, is greatly reduced by about $2<^>{18}$218 times on each node. Third, the amount of transmitted data for recovering each block is reduced from $O(n)$O(n) (assuming $n$n is the number of nodes) to $O(1)$O(1), by partitioning each block into smaller pieces and applying Reed-Solomon coding to each block. Furthermore, this paper also introduces a reputation ranking system where the malicious behaviors of the nodes can be detected and marked, enabling PartitionChain to check the credits of each node termly and expel the nodes with misbehavior to the specific extent. Comparing with BFT-Store, our scheme allows blockchain system to suit dynamic network with higher efficiency and scalability.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchains; Encoding; Peer-to-peer computing; Decoding; Computational complexity; Aggregates; Scalability; Blockchain storage; reed-solomon coding; Byzantine fault tolerance; system scalability; dynamic network

【发表时间】2023

【收录时间】2023-04-25

【文献类型】 实验仿真

【DOI】 10.1109/TKDE.2021.3136556

EHDHE: Enhancing security of healthcare documents in IoT-enabled digital healthcare ecosystems using blockchain

【Author】 Sharma, Pratima Namasudra, Suyel Crespo, Ruben Gonzalez Parra-Fuente, Javier Trivedi, Munesh Chandra

CCF-B

【影响因子】8.233

【主题类别】

区块链应用-实体经济-医疗领域

【Abstract】Nowadays, blockchain technology is one of the advanced technologies to ensure the security of users' sensitive or confidential data. Blockchain technology plays a vital role in various appli-cations like artificial intelligence, supply chain, cloud computing, the healthcare sector, and many more. It helps the healthcare domain to get benefitted from its many advanced features, such as confidentiality, decentralization, security, and privacy. Also, the Internet of Things (IoT) devices connect with the healthcare systems, and the healthcare sector application software further communicates with the IT industry. The blockchain-based IoT systems have significantly impacted the healthcare sector by enhancing security, privacy, transparency, and efficiency, providing better business opportunities. Moreover, traditional healthcare systems face severe security and privacy problems, such as phishing, masquerades, identity theft, and many others. Thus, a secure blockchain-based Proposed Application (PA) is designed to generate, maintain, and validate healthcare certificates. The PA acts as a communication medium between the backend blockchain network and application entities like hospitals, patients, doctors, and IoT devices to create and verify medical certificates. It also ensures various security features, namely confi-dentiality, authentication, and access control, using the concept of smart contracts. The comparative and performance analysis of the proposed work shows that it provides a more effective solution than the existing schemes.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain; Decentralized Application; Medical Certificate; Ethereum

【发表时间】2023

【收录时间】2023-04-25

【文献类型】 理论模型

【DOI】 10.1016/j.ins.2023.01.148

DBSDS: A dual-blockchain security data sharing model with supervision and privacy-protection

【Author】 Zhang, Yuqing Ma, Zhaofeng Luo, Shoushan Wang, Shushuang Duan, Pengfei Liu, Xiao

【影响因子】1.831

【主题类别】

区块链应用-实体经济-其他

【Abstract】With the rapid development of big data technology and applications, sharing and supervision of massive data have become the demand of industry development. As an emerging technology, blockchain, with excellent characteristics, can promote the prosperity and development of the data-sharing industry. However, the existing blockchain may lead to some privacy and security issues due to its transparency and lack of supervision. Hence, a secure data sharing model with supervision and privacy protection, named DBSDS, was proposed, which supports illegal content supervision and users revocation, and possesses flexible and fine-grained access control on data sharing. Firstly, it introduces a dual-blockchain architecture, one blockchain is used to ensure the integrity and traceability of private data and another is utilized to supervise illegal users so that they can no longer upload and share private data. Secondly, a key tracing tree was built and correspondingly different key generation strategies for different users were designed, which endows regulators with supervision capabilities. Finally, combined ABPER-KS algorithm, both privacy protection and fine-grained access control on private data can be accomplished. Furthermore, security analysis and performance comparison manifest that DBSDS is safe and owns better performance, and scheme implementation and experimental analysis indicate the practicality of DBSDS.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】dual-blockchain; privacy protection; proxy re-encryption; supervised data sharing

【发表时间】

【收录时间】2023-04-25

【文献类型】 实验仿真

【DOI】 10.1002/cpe.7706

A secure and efficient authentication and multimedia data sharing approach in IoT-healthcare

【Author】 Yempally, Sangeetha Singh, Sanjay Kumar Sarveshwaran, Velliangiri

【影响因子】

【主题类别】

区块链应用-实体经济-医疗领域

【Abstract】Currently, healthcare services are encountering challenges, particularly in developing countries wherein remote areas encounter a lack of highly developed hospitals and doctors. IoT devices produce enormous security-sensitive data; therefore, device security is considered an important concept. The main aim of this work is to formulate a secure key generation process in the data-sharing approach by exploiting the Rider Horse Herd Optimization Algorithm (RHHO). Here, eight phases, like the initialization phase, registration phase, key generation phase, login phase, data protection phase, authentication phase, verification phase, and data decryption phase are exploited for secure and efficient authentication and multimedia data sharing. The proposed RHHO model is the integration of the Rider Optimization Algorithm (ROA) and Horse herd Optimization Algorithm (HOA). The proposed RHHO model achieved enhanced performance with a computation cost of 0.235, an accuracy of 0.935and memory usage of 2.425 MB.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Internet of things; blockchain; healthcare; authentication; multimedia data sharing; Rider Optimization Algorithm; Horse herd Optimization Algorithm; Rider Horse herd Optimization Algorithm

【发表时间】

【收录时间】2023-04-25

【文献类型】 理论模型

【DOI】 10.1080/13682199.2023.2180140

区块链技术在企业价值链成本管理中的应用

【作者】 王卫星;徐育红;

【作者单位】常州大学;

【文献来源】财会通讯

【复合影响因子】2.924

【综合影响因子】0.416

【主题类别】

区块链应用-实体经济-企业管理

【摘要】新经济背景下,企业价值创造方式呈现实时化、信息化、网络化等新特征,传统成本管理方法难以满足企业高质量发展需求。区块链技术的应用能够为企业提供更精准可靠的成本信息,提高价值链上下游企业协作效率,赋能企业降本增效。但区块链技术在价值链成本管理中的应用仍面临着技术支撑乏力、企业参与动力不足、智力支持薄弱、监管机制滞后等现实问题,制约区块链技术的应用落地,需要从企业和政府两个层面着手共同促进区块链技术与企业价值链成本管理有机融合。

【关键词】区块链技术;;价值链成本管理;;作业成本法;;成本协同;;价值实现

【文献类型】 观点阐述

【DOI】 10.16144/j.cnki.issn1002-8072.2023.08.014

【发表时间】2023-04-25

区块链技术应用与企业融资约束

【作者】 高太光;王奎;

【作者单位】黑龙江科技大学管理学院;哈尔滨工业大学管理学院;黑龙江省交易集团博士后工作站;

【文献来源】财会月刊

【复合影响因子】2.910

【综合影响因子】0.683

【主题类别】

区块链应用-实体经济-财会领域

【摘要】区块链技术作为一项极具颠覆性的新兴数字技术,在推动技术革新和产业转型升级中具有举足轻重的作用。以2014~2021年沪深两市A股上市企业为研究对象,采用倾向得分匹配—双重差分模型(PSMDID)实证检验区块链技术应用对企业融资约束的影响。研究发现:区块链技术的应用能有效缓解企业融资约束,并且通过降低信息不对称水平和增加短期负债发挥作用。异质性检验表明:区块链技术应用对企业融资约束的减轻作用在非国有、股权较为集中、客户集中度较低、处于市场化水平较高区域的样本中更明显。该研究结论为企业积极引入区块链技术以缓解自身融资约束问题提供了经验证据。

【关键词】区块链技术;;融资约束;;倾向得分匹配-双重差分模型;;异质性

【文献类型】 实证数据

【DOI】

【发表时间】2023-04-25

物联网中结合计算卸载和区块链的综述

【作者】 门瑞;樊书嘉;阿喜达;杜邵昱;樊秀梅;

【作者单位】西安理工大学自动化与信息工程学院;陇东学院信息工程学院;清华大学计算机科学与技术学院;

【文献来源】计算机应用

【复合影响因子】2.197

【综合影响因子】1.475

【主题类别】

区块链技术-协同技术-物联网

【摘要】随着移动通信技术的快速发展和智能终端的不断普及,将终端设备的计算密集型任务卸载至边缘服务器,能够解决终端设备算力不足的问题。然而,计算卸载技术分布式的属性使终端设备和边缘服务器面临较大的安全隐患。区块链技术能为计算卸载系统提供安全的资源交易环境,两者的结合可解决物联网中资源不足和各类安全问题。因此对物联网中计算卸载和区块链技术结合应用的研究成果进行综述。首先分析了计算卸载技术和区块链技术结合的应用场景和系统功能,然后归纳了区块链技术在计算卸载系统中解决的主要问题及使用的关键技术,并对区块链系统中的计算卸载策略的制定方式、优化目标及优化算法进行分类总结,最后提出了二者结合使用中存在的问题,并展望了未来的发展方向。

【关键词】物联网;;计算卸载;;资源管理;;卸载决策;;区块链;;共识算法

【文献类型】 综述

【DOI】

【发表时间】2023-04-25

论数字藏品的双重属性、金融风险与监管因应

【作者】 刘飞虎;马其家;

【作者单位】对外经济贸易大学法学院;

【文献来源】经贸法律评论

【复合影响因子】

【综合影响因子】

【主题类别】

区块链治理-法律治理-NFT立法

【摘要】数字藏品由数字艺术品和非同质化通证(NFT)构成,兼具商品属性和金融属性。数字艺术品是数字藏品作为商品的价值基础,而NFT为数字藏品提供资产性、流动性以及资金融通等功能。数字藏品交易模式中,交易标的以资产证券化、标准化合约形式交易,交易主体真实身份认证缺失,交易结算货币所承载的经济利益无序流动,交易场所的基础设施和基本制度建设不足,这会为洗钱、市场操纵炒作以及集资诈骗等非法金融活动提供便利。为兼顾数字藏品产业发展与金融风险防范,应当坚持保护数字艺术品作为商品所承载的合法财产权益,严格限定数字藏品中基础资产的类别;坚持将NFT作为商品权属凭证技术工具的定位,严格限制对数字藏品权属的分割;坚持规范有序前提下探索数字藏品流动规则,构建数字藏品交易方的身份认证制度,采用数字人民币作为数字藏品结算货币,推动科学定价机制和市场基础设施建设,以及增加多主体的信息披露义务和重视消费者教育。

【关键词】数字藏品;;非同质化通证;;数字版权;;文化数字化

【文献类型】 观点阐述

【DOI】

【发表时间】2023-04-25

区块链视角下档案数据质量管理路径研究

【作者】 王平;陈秀秀;李沐妍;侯景瑞;

【作者单位】武汉大学信息资源研究中心;武汉大学信息管理学院;中国人民大学档案事业发展研究中心;英国拉夫堡大学计算机系;

【文献来源】档案学研究

【复合影响因子】

【综合影响因子】

【主题类别】

区块链应用-实体经济-档案领域

【摘要】随着档案事业“数据革命”的全面开展,档案数据质量管理的重要性不言而喻。区块链以其可信技术优势为档案数据质量管理提供了实现契机。本文对国内外数据质量管理指标与档案领域规范进行编码分析,提炼档案数据来源、内容、过程、环境质量这4个一级要素及其17个二级质量要素,并以此分析对应的主体、客体、业务和环境方面的档案数据质量管理需求。基于已提炼的档案数据质量要素,从区块链技术视角构建来源可靠、内容可用、过程可控和环境可信的档案数据质量管理路径,并提出预防技术风险、控制源头审核、优化应用支撑及反馈用户需求方面的实施保障策略,以期明晰档案数据管理症结,优化档案数据质量管理,满足社会公众对档案数据质量的高要求。

【关键词】档案数据;;数据质量;;区块链

【文献类型】 实证数据

【DOI】 10.16065/j.cnki.issn1002-1620.2023.02.016

【发表时间】2023-04-25

作为亚文化资本的NFT数字藏品及其交往实践意义

【作者】 陈龙;经羽伦;

【作者单位】苏州大学传媒学院;

【文献来源】湖南师范大学社会科学学报

【复合影响因子】

【综合影响因子】

【主题类别】

区块链应用-虚拟经济-NFT

【摘要】NFT数字藏品作为一种亚文化资本,正支配着青年群体的网络亚文化生产和交往行动.以趣味为基础货币,NFT数字藏品构筑起一个充满流动的、包罗万象的网络亚文化的趣味圈层,区隔随之发生在不同圈层、代际以及社会内部其它共同体成员之间.围绕NFT数字藏品展开的交往实践亦存在新的意义:其一,弱关系的连接被前所未有地激发,不同身份的青年群体在NFT数字藏品的交往实践中完成关系的聚拢与升级,最终集结成以弱关系为核心的网络社会;其二,NFT数字藏品连接起不同的趣缘圈层,个体在圈层间的行动不受生态隔离的限制,流动性使得多重身份的超个体并不局限在特定的共同体之中,基于个体自由意志的交往实践成为常态;其三,在以数字媒介与万物互联为基础的NFT数字藏品的交往中,物质与精神交往的界限消弭,二者生成互嵌模式,相融相生.

【关键词】NFT数字藏品;;亚文化资本;;趣味圈层;;区隔;;交往实践

【文献类型】 观点阐述

【DOI】 10.19503/j.cnki.1000-2529.2023.02.012

【发表时间】2023-04-25

在线标注

备案号: 苏ICP备17025947号-5

评论回复