• 首页
  • 每日更新
  • 文献
  • 会议文献
  • 政策法规
  • 研究专题
  • 区块链游戏
logo 区块链前沿
  • 区块链前沿
  • 首页
  • 每日更新
  • 文献
  • 会议文献
  • 政策法规
  • 研究专题
  • 区块链游戏
  • 文章创新角色
  • 科研创新指数
  • 区块链领域本体
  • 热点主题挖掘
  • 主题展示
  • 专利文献
  • 排行榜
  • DAO治理
  • 文献上传
  • 积分获取规则
  • 大语言模型解析
  • 期刊发文分布
注册 登录

2024年11月07日 13篇

文献来源

  • 7
  • 6

主题分类

      • 1
      • 1
      • 1
      • 1
      • 3
      • 1
      • 1
      • 1
      • 1
      • 1
      • 1

文献类型

  • 1
  • 4
  • 1
  • 5
  • 2
筛选
订阅
<< 前一天 后一天 >>

A systematic review on security aspects of fog computing environment: Challenges, solutions and future directions

【Author】 Kaur, Navjeet

【影响因子】8.757

【主题类别】

区块链技术-协同技术-雾计算

【Abstract】The dynamic and decentralized architecture of fog computing, which extends cloud computing closer to the edge of the network, offers benefits such as reduced latency and enhanced bandwidth. However, the existing fog architecture introduces unique security challenges due to the large number of distributed fog nodes, often deployed in diverse and resource-constrained environments. Further, the proximity of fog computing nodes to end-users and the open, distributed nature of the architecture make fog environments particularly vulnerable to unauthorized access and various types of cyberattacks. Therefore, in order to address these challenges, the study presented a detailed systematic review that aims to analyze existing security technologies in fog computing environments, identify current security gaps, and propose future research directions. The comprehensive literature review uses quality databases, focusing on articles published within the last four years, i.e. from 2020 to 2024. Further, the review followed a systematic methodology with clear inclusion and exclusion criteria to ensure relevance and quality with respect to security in fog computing. Consequently, key research questions are also formulated and answered for addressing various security concerns, such as architectural security, IoT integration vulnerabilities, and dynamic security management. Finally, the detailed review summarizes the key findings through MTGIR analysis to give valuable insights on the existing security framework of fog computing systems. The result analysis further revealed that 16% of the research is focusing on blockchain and elliptic curve cryptography, alongside the utilization of artificial intelligence and machine learning, which around 13.2%, specifically for dynamic threat detection. Furthermore, there are few technologies which require attention are federated learning, secure key management, and secure communication mechanisms, as these technologies are less considered in literature, i.e. around 3% only. Finally, the analysis underscored the necessity for real-time security monitoring and adaptive threat response to manage the dynamic nature of fog computing environments effectively.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Fog computing; Cloud computing; Security; Privacy; Machine learning; Artificial intelligence

【发表时间】2024

【收录时间】2024-11-07

【文献类型】 综述

【DOI】 10.1016/j.cosrev.2024.100688

A smart and secured blockchain for children's health monitoring using hybrid encryption and adaptive machine learning techniques

【Author】 Revathi, K. P. Manikandan, T.

CCF-C

【影响因子】8.665

【主题类别】

区块链应用-实体经济-健康领域

【Abstract】Health care monitoring of the children is needed to prevent the children from any diseases during the child's growth. The mental and physical conditions monitoring of children at the age of 5-10 is necessary and it is the parent's duty. Nowadays, healthcare systems utilize the Internet of Things (IoT) for many purposes. The actuators and sensors are used in the IoT for providing treatments as well as monitoring the patient's health. For managing and sharing electronic medical records, blockchain plays an important role in securing the data. To track and monitor the patient's physiological conditions, IoT-based systems are useful. However, these approaches have some drawbacks. Privacy leakage and rollback attacks are common problems that occur in Permissioned blockchains, even if they provide better scalability and throughput. Due to the structure of blockchain, the data-retrieving process in healthcare monitoring systems is difficult. To solve these problems, we implemented a new machine learning-aided technique to monitor and secure the children's health data in the blockchain environment. Initially, the children's healthcare data are accumulated from the public data resources that are involved in the Hybrid Encryption Technique (HET). In the HET, techniques such as Elliptical curve cryptography (ECC) and Attribute-Based Encryption (ABE) are integrated. After performing the encryption method effectively, the encrypted data are stored in the blockchain. Further, to perform the health monitoring, the doctor decrypted the data utilizing the same HET. In this approach, to monitor the children's health data, the Hybrid Adaptive Machine Learning (HAML) approach is adopted, which is the combination of both Conditional Random Fields (CRF) and Multi-Layer Perceptron (MLP). Here, parameters present in this approach are optimized with the support of the Modified Binary Battle Royale Optimizer (MBBRO) algorithm. In the end, the comparative estimation is performed with certain performance criteria to justify the effectiveness of the developed approach.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Children's health data storing and monitoring; Hybrid encryption Technique; Secured blockchain; Hybrid Adaptive Machine Learning; Modified Binary Battle Royale Optimizer

【发表时间】2024

【收录时间】2024-11-07

【文献类型】 理论模型

【DOI】 10.1016/j.eswa.2024.124689

Evaluating the carbon emission reduction in construction and demolition waste management in China

【Author】 Yi, Yanqing Liu, Jingkuang Lavagnolo, Maria Cristina Manzardo, Alessandro

【影响因子】7.201

【主题类别】

--

【Abstract】Construction and demolition waste reduction (C&DWR) is an important measure to protect the environment and promote sustainable development in the construction sector. The present policy in China remains a lack of emphasis on carbon tax and penalty for reducing construction waste. This paper proposes a construction and demolition waste (C&DW) management model to identify the waste reduction effects of various policies in China. It simulates the effects of single policies and combined policies on waste reduction and carbon emission by using the approach of integrating system dynamics and grey model theory. The results reveal that: (1) Penalties can effectively reduce the amount of illegal dump waste and carbon emissions from illegal dump waste, with an appropriate penalty value (in Chinese CNY) suggested as is an element of [160, 320]. (2) Subsidies can vastly increase the amount of waste recycled and a carbon tax can reduce carbon emissions; the recommended values are suggested as subsidies is an element of [30,45] and carbon tax is an element of [40, 70]. (3) Compared to other policies, the combined policy of penalty-waste disposal charging fee-subsidy-carbon tax (160, 60, 45, 70) achieves the greatest environmental benefits in terms of reducing waste and carbon emission. (4) Governments should improve waste minimization incentive policies and gradually introduce trials for a carbon tax policy, encourage the use of digital governance combined with blockchain technology to regulate C&DW. These findings provide valuable insights for policymakers to develop effective waste reduction strategies and promote sustainability through the implementation of C&DWR theories.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Construction and demolition waste reduction (C&DWR); Incentive; Carbon tax policy; System dynamics; Combined strategy; Combined strategy

【发表时间】2024

【收录时间】2024-11-07

【文献类型】

【DOI】 10.1016/j.enbuild.2024.114932

An Internet of Vehicles road traffic data sharing scheme based on signcryption and editable blockchain

【Author】 Liu, Xueyan Xiong, Xin Wang, Jia Qi, Yujiao

CCF-B

【影响因子】5.493

【主题类别】

区块链应用-实体经济-车联网

【Abstract】Aiming at the problems of low real-time update efficiency of traffic data and privacy leakage of vehicle users in the Internet of Vehicles (IoV) data sharing, an IoV road traffic data sharing scheme based on signcryption and editable blockchain is proposed. Road-Side Unit (RSU) implements proxy signcryption for sharing data based on the authorization of the vehicle, ensuring the reliability of data and reducing the frequent interaction between vehicles and authorized map companies when sharing data. The editable blockchain is implemented by the chameleon hash function, and no new blocks need to be generated when updating data, thereby reducing the storage overhead caused by updating data. Combined with editable blockchain and fog computing server, the storage, sharing and update of traffic data are better realized. Security analysis shows that the proposed scheme satisfies the confidentiality, integrity, verifiability and unforgeability. Simulation results show that the proposed scheme has less communication overhead and computing overhead.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Internet of Vehicles (IoV); Data sharing; Proxy signcryption; Chameleon hash; Editable blockchain

【发表时间】2024

【收录时间】2024-11-07

【文献类型】 实验仿真

【DOI】 10.1016/j.comnet.2024.110864

P2P electricity trading model for urban multi-virtual power plants based on double-layer energy blockchain

【Author】 Zhou, Kaile Xing, Hengheng Ding, Tao

【影响因子】5.405

【主题类别】

区块链应用-实体经济-电力领域

【Abstract】The urban virtual power plant (VPP) enhances the overall performance of the urban power system by aggregating diverse distributed energy resources (DERs) to provide energy services. With the advancement of smart grid technology, peer-to-peer (P2P) electricity trading has emerged a new paradigm of electricity trading within urban VPPs. In this study, we propose a P2P electricity trading model for multi-VPPs in urban areas, based on a double-layer energy blockchain framework. Initially, users submit their electricity trading information for matching at the user layer; any remaining unfulfilled electricity demand is then further matched at the VPP layer. The user participation process in trading encompasses several stages: trading start, matching, validation, execution, and settlement. Additionally, this study introduces a double-layer blockchain structure consisting of one main chain and multiple side chains. The main chain records real-time trading information from the VPP layer while the side chains are dedicated to recording real-time trading information from the user layer. The feasibility of the proposed model is demonstrated through its implementation in Hyperledger Fabric. Experimental results indicate that the proposed model effectively reduces urban users' reliance on the main grid and decreases their electricity expenses.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Double-layer blockchain; Virtual power plants; Peer-to-peer electricity trading; Distributed energy resources

【发表时间】2024

【收录时间】2024-11-07

【文献类型】 实验仿真

【DOI】 10.1016/j.segan.2024.101444

Improving traceability in e-governance file-sharing systems: the Moroccan justice system as a use case

【Author】 Jlil, Manal Jouti, Kaoutar Boumhidi, Jaouad Loqman, Chakir

【影响因子】2.427

【主题类别】

区块链应用-实体经济-政务领域

【Abstract】Sharing data is critical to accelerating research and business innovation, automating processes, and getting everyone involved. However, data integrity, security, and lack of traceability of data exchange platforms are the biggest issues facing public administrations, preventing them from sharing data. Blockchain technology enables the exchange of digital information between different entities. It represents an immutable ledger in which user transactions are recorded and cannot be modified, deleted, or destroyed. This innovation guarantees the fidelity and security of data records and builds trust without the need for a trusted third party. In this document, we propose a new architecture for the system of the Moroccan Ministry of Justice: a filesharing system based on Blockchain technology, IPFS, and smart contracts to manage data in a decentralized, trusted, and secured environment exchange. This system architecture's aim is to exceed the traditional centralized data-sharing platform's problems and guarantee the persistency, auditability, scalability, and traceability of data, as well as the elimination of the third party. In this way, the new architecture proposed will be an outstanding revolution for the Ministry of Justice and so on for the E-governance In Morocco.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】E-governance; Public administrations; Blockchain; IPFS; Smart contracts; File sharing

【发表时间】2025

【收录时间】2024-11-07

【文献类型】 理论模型

【DOI】 10.1007/s10207-024-00919-8

A secure hierarchical deterministic wallet with stealth address from lattices

【Author】 Yin, Xin Liu, Zhen

CCF-B

【影响因子】1.002

【主题类别】

区块链技术-协同技术-钱包技术

【Abstract】The concept of Hierarchical Deterministic Wallet (HDW) was introduced by Wuille in Bitcoin Improvement Proposal 32 (BIP32). HDW enables an individual/organization to generate cryptographic keys and subsequently ease the key management problems (e.g., backup and recovery). Since the first HDW algorithm in 2012, HDW has gradually shown its fit for many promising use cases, such as Bitcoin-like cryptocurrencies, global key revocation in FIDO2 standard. In order to achieve all the features (i.e., deterministic derivation, master public key and hierarchy) and the security (i.e., safety of cryptocurrencies and privacy protection of users) requirements for HDW, Yin et al. (ESORICS 2022) conceptualized Hierarchical Deterministic Wallet supporting Stealth Address (HDWSA), and gave a provably secure construction from the standard Computational Diffie-Hellman Assumption. Unfortunately, the construction is not quantum-resistant. In this work, we propose the first HDWSA construction from lattices to fill this gap, we provide the security proof for the construction in the random oracle model (ROM) based on hard problems over lattices. Compared with existing works, to the best of our knowledge, our construction not only captures all the HDW features and security properties, but also provides the potential quantum resistance.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Lattice-based; Signature; Wallet; Blockchain; Cryptocurrency

【发表时间】2024

【收录时间】2024-11-07

【文献类型】 理论模型

【DOI】 10.1016/j.tcs.2024.114672

车联网中的区块链和可搜索加密数据共享方案

【作者】 周雄; 王峥; 程哲凡

【作者单位】太原理工大学计算机科学与技术学院(大数据学院);

【文献来源】小型微型计算机系统

【复合影响因子】1.734

【综合影响因子】1.304

【主题类别】

区块链应用-实体经济-车联网

【摘要】云计算为车联网数据存储和资源共享带来了极大的便利。然而,云存储的集中化对数据安全共享构成了潜在的威胁,可能导致云服务提供商和非法用户未经授权访问和滥用车辆数据。为此,本文提出一种基于区块链和可搜索加密的车联网数据共享方案。首先,该方案采用隐藏向量加密技术为文件设置轻量级的访问控制策略,实现对加密数据的细粒度访问控制,以满足多用户密文搜索请求;其次,使用可搜索加密技术和智能合约实现加密数据在区块链上的公平搜索。此外,该方案支持多关键词搜索和结果的完整性验证。最后,安全性分析与实验表明,该方案在安全性和效率方面是可行的。

【关键词】车联网;;区块链;;可搜索加密;;隐藏向量加密;;访问控制

【文献类型】 实验仿真

【DOI】

【发表时间】2024-11-07

基于区块链的隐私保护碳核算模型

【作者】 杨珂; 郭庆雷; 李达; 温婷婷; 杜哲

【作者单位】国网数字科技控股有限公司;国网区块链应用技术实验室;国网区块链科技(北京)有限公司;

【文献来源】信息安全研究

【复合影响因子】

【综合影响因子】

【主题类别】

区块链应用-实体经济-碳交易

【摘要】碳核算有助于指导政府制定减排政策,推动低碳经济发展,并促进国际合作应对气候变化挑战.当前碳核算机制面临企业碳排放数据漏报、瞒报、弄虚作假以降低碳配额清缴成本的问题,以及各参与方之间监管力度不足,导致核算真实性、准确性不足,且难以兼顾企业数据隐私保护.为此,提出一种基于区块链的隐私保护碳核算模型.首先,结合区块链,通过将数据上链,使得数据公开透明且可追溯.其次,为了解决链上数据的隐私问题,使用同态加密系统对链上数据进行加密.此外,引入数字签名技术,让多个参与方对数据进行签名以实现多方确认.最后,设计了基于密文的比较协议,拓展了碳核算管理系统的辅助功能,提供企业之间进行数据安全比较的功能.理论和实验表明,该方案可以高效且安全地实现碳核算.

【关键词】碳核算;;区块链;;隐私保护;;同态加密;;数字签名

【文献类型】 实验仿真

【DOI】

【发表时间】2024-11-07

基于区块链的车联网多因素跨域认证方案

【作者】 王雨鑫; 郑东; 韩刚; 马妍

【作者单位】西安邮电大学网络空间安全学院;空天地一体化综合业务网全国重点实验室(西安电子科技大学);

【文献来源】信息安全研究

【复合影响因子】

【综合影响因子】

【主题类别】

区块链应用-实体经济-车联网

【摘要】随着车联网应用服务数量和普及度的迅速上升,用户数量不断增加,车联网环境安全是一个需要关注的问题.对于车联网系统来说车辆信息存在被窃取与篡改的风险,进一步影响车联网系统的健康运行.鉴于此,提出了基于区块链的车联网多因素跨域认证方案.将整个车联网置于联盟链中,有效解决了不同域之间存在的信任间隙问题;通过对车辆用户信息进行多因素认证,有效防止用户信息的泄露,保障了用户数据的安全性;将区块链和认证技术相结合,极大降低用户身份认证信息的冗余操作,同时实现了车联网信息的同步查询.安全性分析表明了该方案的可行性.

【关键词】区块链;;车联网;;多因素认证;;跨域认证;;智能合约

【文献类型】 理论模型

【DOI】

【发表时间】2024-11-07

基于混合模型和注意力机制的智能合约重入漏洞检测方法

【作者】 沈学利; 李明峰

【作者单位】辽宁工程技术大学软件学院;

【文献来源】信息安全研究

【复合影响因子】

【综合影响因子】

【主题类别】

区块链技术-协同技术-智能合约

【摘要】针对传统智能合约漏洞检测工具和单一深度学习模型对重入漏洞检测效率和精确率低等问题,提出了一种基于混合模型和注意力机制的重入漏洞检测方法(CNN-BiLSTM-ATT).首先,使用单词嵌入模型(Word2vec)进行数据处理并得到特征向量;然后,将处理后的特征向量通过卷积神经网络(CNN)和双向长短期记忆网络(BiLSTM)相结合的方法进行特征提取,并通过注意力机制赋予权重以突出关键特征;最后,采用全连接层和Softmax分类器对生成的结果进行分类,实现智能合约的重入漏洞检测.实验结果表明,与传统工具和深度学习方法相比,基于CNN-BiLSTM-ATT的方法在重入漏洞检测方面有较大的提升,准确率、精确率、召回率和F1值分别达到了92.53%,93.27%,91.73%,92.5%,证明该方法的有效性.

【关键词】智能合约;;重入漏洞;;漏洞检测;;混合模型;;注意力机制

【文献类型】 实验仿真

【DOI】

【发表时间】2024-11-07

数字资产出资面临的挑战及法律回应

【作者】 陈雪萍; 钟翊鸣

【作者单位】中南民族大学法学院;

【文献来源】重庆大学学报(社会科学版)

【复合影响因子】

【综合影响因子】

【主题类别】

区块链治理-法律治理-数字资产

【摘要】在多数国家,公司股本可以用货币或实物支付。根据《中华人民共和国公司法》第48条,公司只能通过货币或非货币财产两种财产出资,因此数字资产的法律性质将直接决定其出资行为的有效性。在实体经济和数字经济深度融合的背景下,公司可否接受数字资产的出资,是当下面临的一个重要课题。各国法律对数字资产的定性不一,尤其我国对其法律定性阙如,使法官在司法实践中常采取回避的态度,也使数字资产面临概念不清、性质不明,以及监管滞后的挑战。这进一步削弱了数字资产出资的可能性,产生数字资产出资得不到相应的保护之虞。一方面,数字资产由于不能在物理上被占有,与“物必有体”的传统理论相悖,如何进行公示以及是否具有排他性均遭受质疑。另一方面,《关于防范比特币风险的通知》等规章的模糊表述及法律的滞后性,导致数字资产即使被认定为所有权客体也可能无法满足《公司法》对出资财产的要求。为此,我国应对现存制度进行优化,肯定数字资产的财产属性及合法性,以确保法律对数字资产的定性能满足作价出资的要求。我国应通过对比分析国内外关于数字资产法律定性的现状,将数字资产所有权的公示方式从传统动产使用的“占有即所有”公示规则转变为“控制即所有”公示规则。数字资产通过私钥或密码的控制,实现对其所有权的有效公示,确认其具备所有权客体的特征,以弥补数字资产不能被占有所导致的公示问题。我国可透过扩张解释《民法典》第127条,扩大网络虚拟财产的内涵,将数字资产纳入网络虚拟财产的范围,明确数字资产无形动产、网络虚拟财产的法律本质,阐明数字资产作为所有权客体符合物权法定原则,以确保其在司法实践中得以有效保护。同时尽快制定《数字资产法》,全面规范数字资产的范围、性质、流转和监管方式,肯定数字资产的经济价值,探寻估价方法,为其合法性和出资有效性提供法律基础,推动数字资产市场的健康发展和加强对投资者权益的保护,最终确定数字资产出资的有效性,以构建恰当的数字资产出资法律制度。

【关键词】数字资产;;公司出资;;财产属性;;控制即所有;;物权法定原则

【文献类型】 观点阐述

【DOI】

【发表时间】2024-11-07

区块链技术在食品溯源中的典型应用及问题分析

【作者】 岳红卫; 丁采凤; 李瑞; 冯迪; 武竹英; 王道兵; 钟其顶; 徐庆阳

【作者单位】国家市场监管技术创新中心(轻工消费品质量安全);中轻技术创新中心有限公司;天津科技大学生物工程学院;

【文献来源】食品与发酵工业

【复合影响因子】

【综合影响因子】

【主题类别】

区块链应用-实体经济-食品领域

【摘要】在全球化的食品市场中,确保食品安全和来源的可靠性已成为全球关注的焦点。随着食品信息恶意篡改问题的日益加剧,对生产者、政府、消费者等其他利益相关者构成大挑战。在此背景下,保障食品信息的不可篡改和透明度变得尤为重要。区块链技术以其独特的去中心化、不可篡改和透明性等特点,为食品信息溯源提供了一种解决方案。该文介绍了区块链技术在食品生产加工、贮藏和配送三个关键环节的典型应用,并总结了区块链与物联网相结合的具体案例。此外,该文介绍了区块链与食品真实性认证相结合的可能性。最后,指出了区块链技术在食品信息溯源系统中面临的挑战。

【关键词】区块链;;食品溯源;;物联网;;真实性认证

【文献类型】 观点阐述

【DOI】 10.13995/j.cnki.11-1802/ts.039590

【发表时间】2024-11-07

在线标注

备案号: 苏ICP备17025947号-5

评论回复