【Author】 Li, Wanxin Meese, Collin Guo, Hao Nejad, Mark
CCF-B
【影响因子】9.551
【主题类别】
--
【Abstract】Platooning technologies enable trucks to drive cooperatively and automatically, providing benefits including less fuel consumption, greater road capacity, and safety. To establish trust during dynamic platooning formation, ensure vehicular data integrity, and guard platoons against potential attackers in mixed fleet environments, verifying any given vehicle's identity information before granting it access to join a platoon is pivotal. Besides, due to privacy concerns, truck owners may be reluctant to disclose private vehicular information, which can reveal their business data to untrusted third parties. To address these issues, this is the first study to propose an aggregated zero-knowledge proof and blockchain-empowered system for privacy-preserving identity verification in truck platooning. We provide the correctness proof and the security analysis of our proposed authentication scheme, highlighting its increased security and fast performance. The platooning formation procedure is re-designed to seamlessly incorporate the proposed authentication scheme, including the 1st catch-up and cooperative driving steps. The blockchain performs the role of verifier within the authentication scheme and stores platooning records on its digital ledger to guarantee data immutability and integrity. In addition, the proposed programmable access control policies enable truck companies to define who is allowed to access their platoon records. We implement the proposed system and perform extensive experiments on the Hyperledger platform. The results show that the blockchain can provide low latency and high throughput, the aggregated approach can offer a constant verification time of 500 milliseconds regardless of the number of proofs, and the platooning formation only takes seconds under different strategies. The experimental results demonstrate the feasibility of our design for use in real-world truck platooning.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchains; Authentication; Vehicle dynamics; Security; Data privacy; Companies; Privacy; Autonomous vehicles; blockchain; data privacy; identity verification; platooning; zero-knowledge proof
【发表时间】2023
【收录时间】2023-06-08
【文献类型】
【Author】 Choi, Tsan-Ming Chen, Jing Li, Guo Yue, Xiaohang
【影响因子】9.018
【主题类别】
--
【Abstract】Platforms are giants in today's operations. Companies like Amazon and eBay are huge enterprises which belong to top enterprises in the world. In this article, we discuss platform supply chain innovations in the blockchain era. We first search the literature and identify the level of popularity of the topic over the past years. Next, we review some closely related studies in the literature and introduce the featured papers in this IJPR special issue. After that, we identify research gaps, present the ABCDE framework and propose a future research agenda.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchain; platform supply chains; digital supply chains; disruptive technologies; ABCDE framework
【发表时间】2023
【收录时间】2023-06-08
【文献类型】
【影响因子】8.689
【主题类别】
区块链应用-实体经济-食品领域
【Abstract】PurposeWith the advent of new technologies, the integration of blockchain-enabled food supply chain (FSC) implementations is on the rise. Considering the multilateral, comprehensive and complex nature of the whole blockchain-enabled FSC implementation process, understanding knowledge management (KM) practices will add value. Prior literature shows that only a few studies have focused on this topic. As such, this study aims to identify and establish key KM enablers for blockchain-enabled FSC implementations. Design/methodology/approachThis study conducted a qualitative research approach. By conducting 22 in-depth interviews with experienced blockchain implementation experts in FSC contexts, this study provides interesting insights for academics and practitioners. FindingsThe results of the analysis highlighted eight critical KM enablers that directly influence blockchain-enabled FSC implementations. They include external enablers (i.e. regulation and market competition) as well as internal enablers (i.e. people - organizational learning, strategy and leadership, culture, information technology, organizational infrastructure, processes and activities). Originality/valueThis study is one of the few studies that identify KM enablers for blockchain-enabled FSC implementations. Considering the novelty of decentralized blockchain implementations in FSC and its importance in transforming silo-based knowledge exchange to a decentralized operational structure, this study attempts to identify factors that increase the efficiency of blockchain implementations in FSC contexts.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchain implementation; Food supply chain; Knowledge management enablers
【发表时间】2023
【收录时间】2023-06-08
【文献类型】 观点阐述
【DOI】 10.1108/JKM-07-2022-0586
【Author】 Treiblmaier, Horst Rejeb, Abderahman
【影响因子】7.875
【主题类别】
--
【Abstract】Blockchain technology has been suggested as a groundbreaking solution for disaster prevention and relief. However, there is a dearth of both practical applications and systematic academic research into how those existing blockchain solutions actually help to prevent disasters and/or alleviate their negative impacts. The purpose of this paper was to extend previous research by investigating existing blockchain solutions using a rigorous multiple case study approach. Based on stakeholder theory, a structured framework is developed that examines the roles of key stakeholders in disaster situations, illustrates organizations' motivations to deploy blockchain technology, identifies various use cases, lists the relevant blockchain properties, and highlights contingency factors for successful implementations. The findings demonstrate that blockchain applications can improve both disaster prevention as well as disaster relief efforts by streamlining information flows and augmenting the capabilities of core stakeholders. Furthermore, numerous propositions can be derived from the framework that can be used as starting points for further in-depth investigations. This study familiarizes practitioners with blockchain's potential for disaster management and provides academics with a theory-based foundation for future research.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】blockchain; distributed ledger technology; disaster case study; disaster preparedness; disaster prevention; disaster relief; stakeholder theory
【发表时间】2023
【收录时间】2023-06-08
【文献类型】
【DOI】 10.1111/jbl.12345
【Author】 Zhou, Yue Luo, Xin Zhou, MengChu
【影响因子】7.847
【主题类别】
--
【Abstract】Cryptocurrency, as a typical application scene of blockchain, has attracted broad interests from both industrial and academic communities. With its rapid development, the cryptocurrency transaction network embedding (CTNE) has become a hot topic. It embeds transaction nodes into low-dimensional feature space while effectively maintaining a network structure, thereby discovering desired patterns demonstrating involved users' normal and abnormal behaviors. Based on a wide investigation into the state-of-the-art CTNE, this survey has made the following efforts: 1) categorizing recent progress of CTNE methods, 2) summarizing the publicly available cryptocurrency transaction network datasets, 3) evaluating several widely-adopted methods to show their performance in several typical evaluation protocols, and 4) discussing the future trends of CTNE. By doing so, it strives to provide a systematic and comprehensive overview of existing CTNE methods from static to dynamic perspectives, thereby promoting further research into this emerging and important field.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Measurement; Systematics; Protocols; Big Data; Market research; Cryptocurrency; Blockchains; Big data analysis; cryptocurrency transaction network embedding (CTNE); dynamic network; network embedding; network representation; static network
【发表时间】2023
【收录时间】2023-06-08
【文献类型】
【DOI】 10.1109/JAS.2023.123450
【Author】 Sauer, Philipp C. Seuring, Stefan
【影响因子】5.435
【主题类别】
--
【Abstract】Systematic literature reviews (SLRs) have become a standard tool in many fields of management research but are often considerably less stringently presented than other pieces of research. The resulting lack of replicability of the research and conclusions has spurred a vital debate on the SLR process, but related guidance is scattered across a number of core references and is overly centered on the design and conduct of the SLR, while failing to guide researchers in crafting and presenting their findings in an impactful way. This paper offers an integrative review of the widely applied and most recent SLR guidelines in the management domain. The paper adopts a well-established six-step SLR process and refines it by sub-dividing the steps into 14 distinct decisions: (1) from the research question, via (2) characteristics of the primary studies, (3) to retrieving a sample of relevant literature, which is then (4) selected and (5) synthesized so that, finally (6), the results can be reported. Guided by these steps and decisions, prior SLR guidelines are critically reviewed, gaps are identified, and a synthesis is offered. This synthesis elaborates mainly on the gaps while pointing the reader toward the available guidelines. The paper thereby avoids reproducing existing guidance but critically enriches it. The 6 steps and 14 decisions provide methodological, theoretical, and practical guidelines along the SLR process, exemplifying them via best-practice examples and revealing their temporal sequence and main interrelations. The paper guides researchers in the process of designing, executing, and publishing a theory-based and impact-oriented SLR.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Management; Methodology; Replicability; Research process; Structured literature review; Systematic literature review
【发表时间】2023
【收录时间】2023-06-08
【文献类型】
【Author】 Fahmi, Aliya
CCF-C
【影响因子】3.732
【主题类别】
--
【Abstract】The triangular fermatean fuzzy sets integrated by fermatean fuzzy sets and triangular fuzzy variables are presented in this object. This paper presented a triangular fermatean fuzzy sets and operational laws. We define Einstein technique to TFFSs and define the multi-attribute group decision-making based on TOPSIS technique. We define the TFF-AHP-TOPSIS technique for particle swarm optimization. Then, a novel TF-Einstein-based multi-attribute group decision-making model combining the proposed aggregation operators and generalized distance is created. Their TFF-AHP-TOPSIS technique deliberated and a PIS and NIS are offered. Finally, a numerical example is based on TFF-AHP-TOPSIS technique. We advance examination the rationality and advantages of the proposed method through sensitivity analysis and reliability study. Multiple attribute decision-making expression main parts in our ordinary lifetime.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Particle swarm optimization; Triangular fuzzy set; Aggregation operators; Multi-attribute decision making; Triangular fermatean fuzzy TOPSIS system
【发表时间】2023
【收录时间】2023-06-08
【文献类型】
【Author】 Wu, Anmulin Guo, Yajun Guo, Yimin
CCF-C
【影响因子】3.488
【主题类别】
--
【Abstract】Blockchain technology can provide excellent support for identity authentication and access control mechanisms. In particular, blockchain technology can ensure that large amounts of confidential data generated by the Internet of Vehicles devices are stored and transmitted in a safe and reliable environment, which is the key to making system services optimal. In addition, mobile edge computing is the best solution for IoV applications to deal with low latency and limited computing and storage capacity of vehicle-mounted devices. Mobile edge computing can help IoV systems achieve a variety of functions and features, the most important of which is the ability to process terminal data in real-time. Even though the amount of data generated by IoV devices is growing rapidly, the system is still characterized by low latency and high efficiency. Because the communication between IoV devices is carried out in an untrusted environment, it is particularly important to design a secure and effective identity authentication scheme. Therefore, this paper proposes an efficient, safe, and time-sensitive authentication mechanism for devices on the Internet of Vehicles, which applies to a large number of scenarios. The mechanism is based on the blockchain concept and mobile edge computing technology. Security analysis shows that the proposed scheme meets the security requirements of the Internet of Vehicles and is resistant to many known attacks. By comparing with existing advanced IoT authentication schemes, the performance evaluation of the mechanism shows that the scheme enhances security features while reducing computation and communication overhead.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Internet of Vehicles; Blockchain; Mobile edge computing; Authentication mechanism; Privacy protection
【发表时间】2023
【收录时间】2023-06-08
【文献类型】
【Author】 Fu, Yuxia Shao, Jun Huang, Qingjia Zhou, Qihang Feng, Huamin Jia, Xiaoqi Wang, Ruiyi Feng, Wenzhi
CCF-C
【影响因子】3.488
【主题类别】
--
【Abstract】Due to the identification functionality, identity authentication is the first and primary security step in many information systems. There exist many works dedicated to giving secure identity authentication. However, most of the existing schemes suffer from at least one of the following problems: heavy account management, single point of failure, and privacy leakage. To tackle these challenges, we propose two blockchain-based identity authentication schemes in this paper. One is based on the famous Diffie-Hellman key exchange protocol and is efficient but with user-verifier interaction. The other utilizes the ring signature, which is non-interactive with a small computational cost. Besides the traditional security properties, such as unforgeability and identity anonymity, our proposed schemes can hold non-transferability, i.e., the verifier cannot prove the user's identity authentication to any third party. At last, the extensive experimental results demonstrate that our proposals are practical and efficient.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Identity authentication; Privacy preservation; Single Sign-On; Ring signature; Diffie-Hellman key exchange
【发表时间】2023
【收录时间】2023-06-08
【文献类型】
CCF-C
【影响因子】3.488
【主题类别】
--
【Abstract】The explosive growth of the IoT continues to change the way people live, followed by a plethora of IoT-based scenarios resources and applications, such as smart homes, smart grids, and smart transportation. In these scenarios, many IoT nodes form a complex the distributed system through the network, and these devices must have synchronized clocks to work together to complete distributed tasks. However, considering the limited processing ability of IoT devices, it is hard to calibrate their clocks directly through external trusted time sources. This paper proposes a scheme for IoT clock calibration under rational assumptions. The scheme introduces the IoT cloud server as an internal time source and provides calibration service for edge devices through communication links. In order to preserve and trace the service behavior to punish dishonest participants, the scheme combines blockchain technology for transaction verification and distributed storage. To ensure that the cloud server can always fulfill the protocol correctly, the scheme applies game theory to analyze the different benefits of the participants in the system based on different policies. Meanwhile, we design a new reward and punishment mechanism to motivate rational players to maximize their utility. In addition, the results of the scheme's Bayesian game analysis show that there is a Nash equilibrium in the system.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchain; Internet of things; Game theory; Time calibration
【发表时间】2023
【收录时间】2023-06-08
【文献类型】
【Author】 Hu, Shengzhou Li, Wenhao Zhong, Tingting He, Hua
CCF-C
【影响因子】3.488
【主题类别】
--
【Abstract】In cloud environment, attribute-based key agreement (AB-KA) protocol can be applied in the practical scenario of achieving session key by mutual attribute authentication. The adopted attribute-based encryption (ABE) technology for attribute authentication in the traditional AB-KA protocols only depict the simple operation of attributes, such as AND, OR, Threshold, etc. The traditional ABE access structures, just like polynomial function, Linear Secret Sharing Scheme (LSSS), AND-gate etc., hardly depict the complex attribute relationships. Hence, the existing protocols based on such ABE schemes cannot depict the entities' authentication of complex attribute relations, such as that the average value of 30 attributes is greater than or equal to 80. For solving the problem, we introduce the technology of attribute predicate (AP) for enhancing the entity authentication function. AP constructs the comprehensive attribute calculation with various operations, such as arithmetic operations, relational operations, string operations, etc. Besides, there is another problem, that is, the power of attribute authority (AA) in traditional AB-KA protocol is highly concentrated, which easily suffers from single point failure or privacy leakage. Blockchain has the advantages of decentralization, anti-tamper, traceability and distributed database. To effectively prevent the security problems in the single centralized authorization mode and avoid the corresponding performance bottleneck, we tried to apply consortium blockchain (CB) to construct AB-KA protocol. A two-party key agreement protocol with and-gate attribute-predicate encryption on blockchain (AG-APE-BC-KA) was proposed in the paper. Attribute-based access control processes can be traced by recording and viewing the access authorization and access processes via the CB technology. The proposed scheme adopted AP to depict more general and flexible attribute relationship for generating the session key of communication users. It also enhanced the tracking of AA's authority and data security on cloud storage. Under the decision q-parallel bilinear Diffie-Hellman exponent (q-PBDHE) hypothesis, the protocol is securely proved to be true under the attribute-based BJM (Black-Johnson-Menezes) model. The protocol with CB has high efficiency and better security. In particular, it completely satisfies many scenarios needing the complex attribute authentication.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Attribute predication encryption; Key agreement; And-gate multi-value; Protocol; Blockchain
【发表时间】2023
【收录时间】2023-06-08
【文献类型】
【影响因子】3.462
【主题类别】
--
【Abstract】Blockchain technology (BCT) adoption in banks can bring resilience and make banking operations sustainable in terms of security in times of increased risks and uncertainty. Along this line, this study aims to identify and model the critical success factors (CSFs) of blockchain technology adoption for sustainable and resilient banking operations. Seventeen CSFs were identified from the literature and semi-structured interviews. After that, 15 CSFs were confirmed through the fuzzy Delphi method, and cause-effect relationships were developed through the Decision-Making Trial and Evaluation Laboratory method. Findings of the study highlighted that ease of local and international legislation and regulation and user data privacy are the most significant CSFs of blockchain technology, and these demand a high level of attention from management and decision-makers to realise sustainability and resilience in the banking sector. The study will guide practitioners and policymakers in understanding the importance of CSFs and thereby help devise a strategy for successful blockchain technology adoption in the banking sector.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchain; Sustainability; Resilience; Banking sector; Technology adoption
【发表时间】2023
【收录时间】2023-06-08
【文献类型】
【Author】 Shrivastava, Santosh
【影响因子】3.319
【主题类别】
--
【Abstract】PurposeThis study aims to identify the trending topics, emerging themes and future research directions in supply chain management (SCM) through multiple source of data. The insights would be of use to academics, practitioners and policymakers to leverage latest developments in addressing current and future challenges. Design/methodology/approachThis study uses a multiple source of data such as published literature and social media data including supply chain blogs and forums contents on business-to-business (B2B) firms to identify trending topics, emerging themes and future research directions in SCM. Topic modeling, a machine learning technique, is used to derive the topics and themes. Examining supply chain blogs and forums offer a valuable perspective on current issues and challenges faced by B2B firms. By analyzing the content of these online discussions, the study identifies emerging themes and topics of interest to practitioners and researchers. FindingsThe study synthesizes 1,648 published articles and more than 1.3 lakh tweets, discussions and expert views from social media, including various blogs and supply chain forums, and identifies six themes, of which three are trending, and the other three are emerging themes in the supply chain. Rather than aggregate implications, the study integrates findings from two databases and proposes a framework encompassing the drivers, processes and impacts on each theme and derives promising avenues for future research. Originality/valuePrior literature has majorly used published research articles and reports as a primary source of information to identify the trending theme and emerging topics. To the best of the authors' knowledge, this is the first study of its kind to examine the potential value of information from social media, such as blogs, websites, forums and published literature to discover new supply chain trends and themes related to B2B firms and derive encouraging possibilities for future research.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Supply chain blogs; Supply chain forums; Social media; Topic modeling; Business-to-business; Multiple database
【发表时间】2023
【收录时间】2023-06-08
【文献类型】
CCF-C
【影响因子】3.317
【主题类别】
--
【Abstract】This study examines the organizational adoption of blockchain technology (BCT) by synthesizing empirical findings reported in 37 studies using a meta-analysis of bivariate relationships. An extended technology-organization-environment (TOE) framework is applied to examine the antecedents and outcomes of BCT adoption. Our results show that various technological, organizational, and environmental factors influence BCT adoption, including technology compatibility, perceived ease of use, top management support, and coercive pressure. Overall, technological factors had a stronger impact than organizational and environmental factors concerning BCT adoption. Further, our analysis identifies the outcomes of BCT adoption, including improvements in operational performance, innovation capability, and sustainability. BCT adoption has the strongest impact on operational performance. Our study contributes to the existing literature by offering a comprehensive and synthesized overview of the antecedents and outcomes of BCT adoption.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Meta-analysis; blockchain technology; TOE framework
【发表时间】2023
【收录时间】2023-06-08
【文献类型】
【影响因子】3.000
【主题类别】
--
【Abstract】Blockchain is a key technology to realize decentralized trust management. In recent studies, sharding-based blockchain models are proposed and applied to the resource-constrained Internet of Things (IoT) scenario, and machine learning-based models are presented to improve the query efficiency of the sharding-based blockchains by classifying hot data and storing them locally. However, in some scenarios, these presented blockchain models cannot be deployed because the block features used as input in the learning method are privacy. In this paper, we propose an efficient privacy-preserving blockchain storage method for the IoT environment. The new method classifies hot blocks based on the federated extreme learning machine method and saves the hot blocks through one of the sharded blockchain models called ElasticChain. The features of hot blocks will not be read by other nodes in this method, and user privacy is effectively protected. Meanwhile, hot blocks are saved locally, and data query speed is improved. Furthermore, in order to comprehensively evaluate a hot block, five features of hot blocks are defined, including objective feature, historical popularity, potential popularity, storage requirements and training value. Finally, the experimental results on synthetic data demonstrate the accuracy and efficiency of the proposed blockchain storage model.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchain; Federated learning; Extreme learning machine; Privacy protection; Edge nodes
【发表时间】2023
【收录时间】2023-06-08
【文献类型】
【影响因子】3.000
【主题类别】
--
【Abstract】Blockchain can be used to solve the problem of mutual trust between different institutions. However, when migrating data from a traditional system to a blockchain system, the order of data transactions is difficult to determine and the data transactions on the chain can not be modified. Therefore, it is necessary to build an on-chain repairing mechanism for multi-party data migration. In this paper, an on-chain repairing system for multi-party data migration is designed to realize the multi-party data migration, the block data repairing, and the data auditing. The multi-party data migration is utilized to determine the order of data transactions, and the order determining during data transaction is solved by setting up transaction pools and sorting transactions of the same institution or different institutions. The controlled data repairing strategy is utilized to repair the error data in the blockchain based on the chameleon-hash algorithm. The data repairing audit strategy is used to ensure the controllable data repairing. Compared with the Hyperledge Fabric, the additional cost for multi-party data migration of our method is not more than 10%.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchain; Online migration; Transaction sequencing; Data repairing; Block auditing
【发表时间】2023
【收录时间】2023-06-08
【文献类型】
【影响因子】2.838
【主题类别】
--
【Abstract】Vehicle ad-hoc network (VANET) is interconnected through message forwarding and exchanging among vehicle nodes. Due to its highly dynamic topology and its wireless and heterogeneous communication mode, VANET is more vulnerable to security threats from multiple parties. Compared to entity-based security authentication, it is essential to consider how to protect the security of the data itself. Existing studies have evaluated the reliability of interactive data through reputation quantification, but there are still some issues in the design of secure reputation management schemes, such as its low efficiency, poor security, and unreliable management. Aiming at the above-mentioned issues, in this paper we propose an effective VANET model with a secure reputation based on a blockchain, and it is called the double-layer blockchain-based reputation evaluation & management model (DBREMM). In the DBREMM, we design a reputation management model based on two parallel blockchains that work collaboratively, and these are called the event chain and reputation chain. A complete set of reputation evaluation schemes is presented. Our schemes can reduce observation errors and improve evaluation reliability during trust computation by using direct trust calculation based on the multi-factor Bayesian inference. Additionally, we propose an indirect trust calculation based on the historical accumulated reputation value with an attenuation factor, and a secure a reputation fusion scheme based on the number threshold with the fluctuation factor, which can reduce the possibility of attacks, such as collusive attacks and false information injection. Theoretical analysis and extensive simulation experiments reflect the DBREMM's security algorithm effectiveness, accuracy, and ability to resist several attacks.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】VANET; blockchain; reputation evaluation
【发表时间】2023
【收录时间】2023-06-08
【文献类型】
【DOI】 10.3390/app13095733
【Author】 Kerrison, Steve Jusak, Jusak Huang, Tao
【影响因子】2.690
【主题类别】
--
【Abstract】Internet of Things (IoT) and blockchains are enabling technologies for modern healthcare applications, offering the improved monitoring of patient health and higher data integrity guarantees. However, in rural settings, communication reliability can pose a challenge that constrains real-time data usage. Additionally, the limited computation and communication resources of IoT sensors also means that they may not participate directly in blockchain transactions, reducing trust. This paper proposes a solution to these challenges, enabling the use of blockchain-based IoT healthcare devices in low-bandwidth rural areas. This integrated system, named hybrid channel healthcare chain (HC2), uses two communication channels: short-range communication for device authorisation and bulk data transfer, and long-range the radio for light-weight monitoring and event notifications. Both channels leverage the same cryptographic identity information, and through the use of a cloud-based digital twin, the IoT device is able to sign its own transactions, without disclosing the key to said twin. Patient data are encrypted end to end between the IoT device and data store, with the blockchain providing a reliable record of the data lifecycle. We contribute a model, analytic evaluation and proof of concept for the HC2 system that demonstrates its suitability for the stated scenarios by reducing the number of long-range radio packets needed by 87x compared to a conventional approach.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】blockchain; digital twin; Internet of Things; healthcare; encryption; privacy; rural; LPWAN
【发表时间】2023
【收录时间】2023-06-08
【文献类型】
【影响因子】2.690
【主题类别】
--
【Abstract】Cloud computing is a disruptive technology that has transformed the way people access and utilize computing resources. Due to the diversity of services and complexity of environments, there is widespread interest in how to securely and efficiently authenticate users under the same domain. However, many traditional authentication methods involve untrusted third parties or overly centralized central authorities, which can compromise the security of the system. Therefore, it is crucial to establish secure authentication channels within trusted domains. In this context, we propose a secure and efficient authentication protocol, HIDA (Hyperledger Fabric Identity Authentication), for the cloud computing environment. Specifically, by introducing federated chain technology to securely isolate entities in the trust domain, and combining it with zero-knowledge proof technology, users' data are further secured. In addition, Subsequent Access Management allows users to prove their identity by revealing only brief credentials, greatly improving the efficiency of access. To ensure the security of the protocol, we performed a formal semantic analysis and proved that it can effectively protect against various attacks. At the same time, we conducted ten simulations to prove that the protocol is efficient and reliable in practical applications. The research results in this paper can provide new ideas and technical support for identity authentication in a cloud environment and provide a useful reference for realizing the authentication problem in cloud computing application scenarios.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】cloud computing; federated chains; zero-knowledge proofs; formal formalized semantic analysis
【发表时间】2023
【收录时间】2023-06-08
【文献类型】
【Author】 Chi, Yeguang Hao, Wenyan Hu, Jiangdong Ran, Zhenkai
【影响因子】2.350
【主题类别】
--
【Abstract】We investigate the cross-section asset-pricing patterns of major cryptocurrencies from 2017 to 2021. We show that the basis, momentum, and basis-momentum factors earn statistically significant excess returns, a result consistent with the findings reported in the commodity futures literature. The basis is the strongest signal predicting cross-sectional differences in cryptocurrency futures returns; the momentum-induced risk premium is not statistically powerful, whereas the basis momentum-induced risk premium disappears when accounting for the basis-induced risk premium. Daily factor returns are statistically much stronger than weekly factor returns. Monthly factor returns are nonsignificant.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】
【发表时间】2023
【收录时间】2023-06-08
【文献类型】
【DOI】 10.1002/fut.22425
【Author】 Goswami, Anjali Rana, Saurabh Chhikara, Deepak
【影响因子】2.336
【主题类别】
--
【Abstract】The primary goal of vehicular networks is to increase vehicle safety as well as transportation efficiency with the application of wireless communications technology. Therefore, it is crucial to develop an effective data distribution mechanism that notifies vehicles of significant safety incidents. Two recent developments that could assist a vehicular network in this regard include geospatial and blockchain technology. With the help of distributed nodes and geo-locations made possible by blockchain technology, it is possible to investigate the patterns of participants both spatially and geographically. The primary objective of this work is to create, implement, and evaluate an effective dynamic authentication scheme for a geospatially enabled vehicular network using blockchain technology. The proposed scheme's security and correctness are demonstrated using the random oracle model and the study of performance shows that it meets the requirement of less communication and computation overhead. It is also proven secure against active as well as a passive adversary. However, precise informal security analysis and verification have been done using widely adopted "Automated Validation of Internet Security Protocol and Application"(AVISPA) tool. The proposed scheme's suitability for a vehicular system is demonstrated by its performance and security analysis.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Vehicular network; Geospatial; Blockchain technology; Authentication; Security
【发表时间】2023
【收录时间】2023-06-08
【文献类型】
【影响因子】2.303
【主题类别】
--
【Abstract】The healthcare sector is continuously evolving, and it is anticipated that the next healthcare model would be information-focused. Cloud computing technology can help the sector handle heterogeneous sources of data and the effective convergence of data. Due to security and privacy considerations, it is challenging to transfer a medical record from multiple hospital databases. Consequently, the article proposed a blockchain-based patient information management system by using the Blockchain-based Privacy-Preserving and Robust Healthcare data (BPPRH). This transfers the medical data to the patient through the cloud more securely. The cloud is modelled with the hypervisor and VMs. During the data transmission or storage in the cloud, there are several attacks like ransomware, malicious insiders, Man-in-the-middle attack, malware injection attacks, and Denial-of-Service attacks (DoS) occur in the network. Modified Fuzzy Particle Swarm Optimization (MFPSO) is presented to detect these threats. After detecting the attacks, Edge-Cloud-based Collaborative Systems (ECCS) prevent the data from attackers with the use of Regularized Maximum Likelihood Estimation, Inverse Network, and Shadow Model Reconstruction models. The results showed that the system provides better security with high accuracy of 99.32% respectively. The proposed Blockchain-based architecture is designed to contribute to the healthcare management systems' robustness and to avoid recorded security limitations in commonly used systems for smart healthcare respectively.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchain-based Privacy-Preserving and Robust Healthcare data (BPPRH); Modified Fuzzy Particle Swarm Optimization (MFPSO); Hypervisor; Virtual machines (VMs); Edge-Cloud based Collaborative Systems (ECCS); Healthcare data; Cloud computing
【发表时间】2023
【收录时间】2023-06-08
【文献类型】
【影响因子】1.583
【主题类别】
--
【Abstract】Ontology generation is a process of relationship analysis and representation for multiple data categories using automatic or semi-automatic approaches. Thus, the main contribution of this paper is the design of a blockchain-based secure and efficient ontology generation model for multiple data genres using augmented stratification (BOGMAS) that can overcome existing issues. The BOGMAS model uses a semi-supervised approach for ontology generation from almost any structured or unstructured dataset. This model uses a combination of linear support vector machine, and extra trees stratifies for variance estimation, which makes the model highly efficient, and reduces redundant features from the output ontology. The generated ontology is represented using an incremental OWL (W3C Web Ontology Language) format, which assists in dynamically sizing the ontology depending on incoming data. The performance of the proposed BOGMAS model is evaluated in terms of precision and recall of representation, memory usage, computational complexity, and accuracy of attack detection. It is observed that the proposed model is highly efficient in terms of precision, recall and accuracy performance, but has incrementally higher computational complexity and delay of ontology formation when compared with existing approaches. Due to this incremental increase in delay, the proposed model is observed to be applicable for a wide variety of real-time scenarios, which include but are not limited to, medical ontology generation, sports ontology generation, and internet of things ontology generation with high-security levels.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Ontology; Blockchain; Correlation; Security; OWL; Augmented; Stratification
【发表时间】2023
【收录时间】2023-06-08
【文献类型】
【影响因子】1.287
【主题类别】
--
【Abstract】Stablecoins address the problem of high volatility of non-stable cryptocurrencies. They all share a similar goal - to provide a non-volatile medium of exchange in the digital asset market. However, they differ in their characteristics and popularity. Therefore, the aim of this article is to determine what factors are associated with more popular stablecoins based on the cross-sectional data. The study uses a unique dataset compiled from multiple Internet sources. The results indicate that the USD peg, the number of crypto exchanges listing a particular stablecoin, the number of trading pairs in which this stablecoin is included, and the link to a crypto exchange are more relevant than the type of stablecoin, the availability of its whitepaper and its age.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Stablecoin; cryptocurrency; success factors; crypto exchange; ANOVA
【发表时间】2023
【收录时间】2023-06-08
【文献类型】
【Author】 Alsudani, Mustafa Qahtan Jaber, Mustafa Musa Malik, R. Q. Abd, Sura Khalil Ali, Mohammed Hasan Alkhayyat, Ahmed Khalaf, G. A.
CCF-C
【影响因子】1.261
【主题类别】
--
【Abstract】Electronic health records are essential and sensitive since they include vital information and are routinely exchanged across several parties, such as hospitals and private clinics. These data must remain accurate, current, secret, and available only to authorized parties. Integrating these data improves the accuracy and cost-effectiveness of the present health data administration framework. Electronic Medical Records (EMRs) are now kept utilizing the structure of the client/server via whom patient data information is maintained in the hospital. Multiple hospitals use the same database to track a single patient. These limitations prevent a custom health system from providing various associated experts and patients with a cohesive, integrated, secure, and confidential medical history. Modern healthcare systems are distinguished by their complexity and expense. However, this may be mitigated by enhanced health record management and Blockchain technology. The Blockchain's data availability, confidence, and security characteristics have a bright future in healthcare services, giving solutions to the issues of the traditional customer/server architecture EMR management platform: intricacy, confidence, dependability, compatibility, and anonymity. An e-health record management based on Internet of Medical Things (EHRM-IoMT) is proposed in this paper. This paper explores and analyzes Blockchain efficiency and customer/server paradigms. The findings show that a patient-centred strategy may achieve remarkable success utilizing Blockchain. Moreover, the immutable and accurate data of persons in Blockchain may enable healthcare practitioners to better forecast and aid with diagnosis utilizing the IoMT via machine learning and artificial intelligence.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】e-Health; Blockchain; Internet of Medical Things; health information management
【发表时间】2023
【收录时间】2023-06-08
【文献类型】
【Author】 Singh, Japjeet Bowala, Sulalitha Thavaneswaran, Aerambamoorthy Thulasiram, Ruppa Mandal, Saumen
【影响因子】
【主题类别】
--
【Abstract】The forecasting problems in Computational Finance involve modelling the vagueness and imprecision inherent to the financial markets. Fuzzy set theory has a unique ability to quantitatively and qualitatively model and analyze such problems. Volatility forecasting plays an important role in financial risk management and in option pricing. Recently, there has been a growing interest in data-driven volatility models and neurovolatility models for risk forecasting of stocks and index funds. However, even these state-of-the-art models do not take into account the fuzzy volatility in their risk forecasts. Cryptocurrencies are a novel financial asset class based on the Blockchain technology. Cryptocurrencies have gained popularity among retail investors as a financial asset with high risks and high returns. The extremely volatile nature of cryptocurrencies (compared to traditional assets) makes forecasting their volatility more challenging. A simple algorithmic trading approach, Simple Moving Average (SMA) crossover strategy, is used to calculate the Algo returns. This paper provides fuzzy forecasts of the volatility of Algo returns using the data-driven Exponentially Weighted Moving Average (DD-EWMA) and neuro models for six major cryptocurrencies. We also compute and compare fuzzy volatility forecasts of four major tech stocks and Chicago Board Options Exchange's (CBOE) volatility index (VIX) using DD-EWMA and neuro models. Our experimental results show that the data-driven models produce better forecasts for cryptocurrencies as compared to the neuro models, while for the regular stocks and indexes, no such definitive conclusion could be drawn.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Fuzzy intervals; Cryptocurrency; Volatility Forecasting; Data-driven volatility; Neuro-volatility; Sharpe ratio; Algo return; Simple Moving Average
【发表时间】2022
【收录时间】2023-06-08
【文献类型】
【Author】 Rathi, Nilesh Gopinath, K.
【影响因子】
【主题类别】
--
【Abstract】Blockchain technology is finding applications not only in the cryptocurrency world but also in sectors like healthcare, IoT etc. However, before it can replace centralized counterparts like VISA or PayPal, its transaction throughput has to increase multiple orders of magnitude from its current throughput. Sharding is one solution for increasing the transaction rate but it weakens the underlying security guarantees. Coded sharding uses information-theoretic approaches to scale blockchains without compromising security. Deploying coded sharding at webscale remains a challenge since it incurs bottlenecks like decoding very large Reed-Solomon codes of length of as much as 2(18). In this work, we propose a new method that leverages verifiable computing as an alternative to costly decoding strategies. We also simulate a simple balance checking application using our approach to check the feasibility of using verifiable computing with coded sharding. As its overheads are lower, we report transaction rates of 2806 tx/sec on commodity hardware. We also report the throughput of coded sharding based on verifiable computing by varying parameters such as the number of shards, users handled by each shard and complexity of verification used.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】
【发表时间】2023
【收录时间】2023-06-08
【文献类型】
【作者】 张辉;曾雄;梁正;
【作者单位】清华大学公共管理学院;清华大学人工智能国际治理研究院;
【文献来源】科学学研究
【复合影响因子】4.752
【综合影响因子】2.998
【主题类别】
--
【摘要】针对当前元宇宙的发展态势和理论研究,本文重新界定了元宇宙的概念内涵。元宇宙的样态本源可追溯至数字化数据,其技术源头则是各类数字化数据生成技术。根据数字样态的作用场域和虚实世界互动过程的主体跨域性等两个拓扑维度,可将元宇宙划分为四类阶段性形态:纯数字化世界、数字孪生世界、虚实互构世界和虚实协同世界。将元宇宙置于数字样态的整体演进历程中发现其四种发展形态之间的演化机理,即,纯数字化世界与传统网络空间紧密相关而成为元宇宙创新的首选之地,数字孪生世界的元宇宙侧重于工业实在世界,虚实互构世界综合了纯数字化世界和数字孪生世界的结构与功能,虚实协同世界则是人类数字化观念革新的驱使下虚实互构世界的高级形态。本文澄清了元宇宙的概念内涵、形态发展与演变机理,为后续的产业政策制定和治理体系建构提供了学理基础。
【关键词】元宇宙;;虚拟世界;;现实世界;;演变机理
【文献类型】
【发表时间】2023-06-08
【作者】 钱慧;郑朝晖;荣宝俊;王健翔;
【作者单位】苏州大学计算机科学与技术学院;苏州大学江苏省网络空间安全工程实验室;
【文献来源】小型微型计算机系统
【复合影响因子】1.734
【综合影响因子】1.304
【主题类别】
--
【摘要】随着区块链技术的发展,作为其核心技术的共识算法也成为了很多学者的研究热点,良好的共识算法可以有效解决区块链的安全性、扩展性、能耗代价和性能效率等问题.本文选取Raft共识算法作为研究对象,针对Raft算法领导者选举中由于投票分裂而造成选举延时问题,提出了一种基于PoW的高效率共识算法--RPFT共识算法.该算法首先利用PoW共识算法成功选取出高效率的副领导者节点;其次为每一个节点赋予一个等待时间,并根据节点行为调整等待时间;最后,引入等待时间选举模型,结合PoW共识算法优化Raft算法投票选举,快速选举出高效的领导者节点.实验结果表明,新提出的RPFT算法对比Raft算法在选举速度上提高了75%左右;在共识效率方面,RPFT算法共识效率提高了40%.
【关键词】Raft;;投票分裂;;PoW;;RPFT;;等待时间选举模型
【文献类型】
【发表时间】2023-06-08
【作者】 徐健;徐坚;魏思奇;赵保成;肖潇;李国忠;
【作者单位】长江科学院空间信息技术应用研究所;武汉市智慧流域工程技术研究中心;长江科学院流域水资源与生态环境科学湖北省重点实验室;
【文献来源】长江科学院院报
【复合影响因子】
【综合影响因子】
【主题类别】
--
【摘要】当水利信息化进入大数据时代,遇到的最大难题,可能不是信息不足,而是信息的过载;可能不是信息的“触手可及”,而是信息的孤岛问题。区块链是一种去中心化的分布式账本,确认后的数据块一旦上链就很难篡改,上链后的数据块均带有时间戳,可以避免在非涉密数据管理过程中出现数据孤岛、数据质量低、数据泄露等情况。结合区块链技术去中心化、不可篡改、可追溯的特性,探究其在智慧水利体系建设中的应用前景,在水利数据安全与共享、水利业务应用、智慧水利综合管理平台3个层面阐述相关应用,并指出了区块链在水利应用中存在的风险和挑战。研究表明区块链技术为水利信息化、智能化带来新的突破,有助于打破行业数据共享壁垒,促进数据共建共享。
【关键词】区块链技术;;智慧水利;;水利大数据;;数据共建共享;;水利信息化
【文献类型】
【发表时间】2023-06-08