通知公告
访问统计

总访问量

今日访问

在线人数

Special issue on Blockchain Technology and Applications

  • Special issue on Blockchain Technology and Applications

    王旭莹

    Currently, blockchain has attracted extensive attention from research institute. As a constantly evolving peer-to-peer (P2P) distributed ledger technology, blockchain has the characteristics of decentralization, tamper-proof, openness, trust establishment, etc. Compare with the traditional centralized systems, it has great potential to lower the cost of the underpinning infrastructure, improve service security and realize decentralized resource management. Since its emergence, blockchain has affected many industries, such as supply chain, electronic system, data security and so on. These characteristics and advantages of blockchain naturally bring new vitality to various industries. Hence, the objective of this special issue is to research on Blockchain Technology and applications. This special issue provides researchers a forum to present their research on the design, implementation, and evaluation of systems using the concept of blockchain technology  and applications.

    默认 最新文章 浏览次数
    Please wait a minute...
    选择: 显示/隐藏图片
    1.

    Research on cross-chain and interoperability for blockchain system

    李鸣 邱鸿霖 徐泉清 宋文鹏 Liu Baixiang
    中国邮电高校学报(英文版)    2021, 28 (5): 1-17.   DOI: 10.19682/j.cnki.1005-8885.2021.0029
    摘要678)      PDF(pc) (3984KB)(264)    收藏

    At present, there is an urgent need for blockchain interoperability technology to realize interconnection between various blockchains, data communication and value transfer between blockchains, so as to break the ‘ value silo’ phenomenon of each blockchain. Firstly, it lists what people understand about the concept of interoperability. Secondly, it gives the key technical issues of cross-chain, including cross-chain mechanism, interoperability, eventual consistency, and universality. Then, the implementation of each cross-chain key technology is analyzed, including Hash-locking, two-way peg, notary schemes, relay chain scheme, cross-chain protocol, and global identity system. Immediately after that, five typical cross-chain systems are introduced and comparative analysis is made. In addition, two examples of cross-chain programmability and their analysis are given. Finally, the current state of cross-chain technology is summarized from two aspects: key technology implementation and cross-chain application enforcement. The cross-chain technology as a whole has formed a centralized fixed mechanism, as well as a trend of modular design, and some of the solutions to mature applications were established in the relevant standards organizations, and the cross-chain technology architecture tends to be unified, which is expected to accelerate the evolution of the open cross-chain network that supports the real needs of the interconnection of all chains.


    参考文献 | 相关文章 | 多维度评价
    2.

    Trusted data access and authorization protocol

    宋文鹏 李鸣 刘百祥
    中国邮电高校学报(英文版)    2021, 28 (5): 18-26.   DOI: 10.19682/j.cnki.1005-8885.2021.0028
    摘要437)      PDF(pc) (1270KB)(160)    收藏

    Threshold proxy re-encryption( PRE) authorizes the data access right of data subject to multiple proxies, who authorize the right again to delegatee to accomplish the end-to-end data encryption process from storage to authorization. Based on threshold PRE algorithm, in order to build a complete trusted data storage and authorization system, the four protocols, which are data access protocol, authorization proxy protocol, authorization proxy cancellation protocol and data reading authorization protocol, are defined completely. On that basis, an efficient data searching method is constructed by specifying the data delegatee. At last, to ensure the right to know of data, the audit log is processed with trusted data right confirmation based on distributed ledger technology. Meanwhile, a parallel data right confirmation processing method is defined based on hierarchical derivation algorithm of public and private key. In the end, the performance evaluation analysis of the protocol are given. Trusted data access and authorization protocol is convenient to build a complete data processing system on the premise of protecting data privacy based on public cloud storage system or distributed storage system.

    参考文献 | 相关文章 | 多维度评价
    3.

    Multi-level sharded blockchain system for edge computing

    刘巧 唐碧华 Chen Xue Fan Wu 范文浩
    中国邮电高校学报(英文版)    2021, 28 (5): 46-58.   DOI: 10.19682/j.cnki.1005-8885.2021.0031
    摘要402)      PDF(pc) (3905KB)(142)    收藏

    Blockchain technology is used in edge computing ( EC) systems to solve the security problems caused by single point of failure ( SPOF) due to data loss, task execution failure, or control by malicious nodes. However, the disadvantage of blockchain is high latency, which contradicts the strict latency requirements of EC services. The existing single-level sharded blockchain system ( SLSBS) cannot provide different quality of service for different tasks. To solve these problems, a multi-level sharded blockchain system ( MLSBS) based on genetic algorithm ( GA) is proposed. The shards are classified according to the delay of the service, and the parameters such as the shard size of different shards are different. Using the GA, the MLSBS obtains the optimal resource allocation strategy that achieves maximum security. Simulation results show that the proposed scheme outperforms SLSBS.

    参考文献 | 相关文章 | 多维度评价
    4.

    Design and implementation of labor arbitration system based on blockchain

    崔鸿雁 蔡子寅 Teng Shaokai
    中国邮电高校学报(英文版)    2021, 28 (5): 36-45.   DOI: 10.19682/j.cnki.1005-8885.2021.0032
    摘要399)      PDF(pc) (2975KB)(186)    收藏

    Data island and information opacity are two major problems in collaborative administration. Blockchain has the potential to provide a trustable and transparent environment encouraging data sharing among administration members. However, the blockchain only stores Hash values and transactions in blocks which makes it unable to store big data and trace their changes. In this paper, a labor arbitration scheme based on blockchain was proposed to share labor arbitration data. In the system, a collaborative administration scheme that provides a big data storage model combined blockchain and interplanetary file system ( IPFS) is designed. It can store big data and share these data among different parties. Moreover, a file version control mechanism based on blockchain is designed to manage the data changes in IPFS network. It creates a tracing chain that consists of many IPFS objects to track changes of stored data. The relationship of previous and current IPFS objects recorded by blockchain can describe the changes of administration data and trace the data operations. The proposed platform is used in Rizhao City in China, and the experiment result shows collaborative administration scheme achieves traceability with high throughput and is more efficient than traditional hypertext transfer protocol ( HTTP) way to share data.

    参考文献 | 相关文章 | 多维度评价
    5.

    Extensive game analysis and improvement strategy of DPOS consensus mechanism

    王雷 朱庆华 李保珍
    中国邮电高校学报(英文版)    2021, 28 (5): 27-35.   DOI: 10.19682/j.cnki.1005-8885.2021.0030
    摘要376)      PDF(pc) (846KB)(101)    收藏

    Delegated proof-of-stake ( DPOS) consensus mechanism is widely adopted in blockchain platforms, but problems exist in its current applications. In order to explore the security risks in the voting attack of the DPOS consensus mechanism, an extensive game model between nodes was constructed, and it was concluded that the DPOS consensus mechanism relies too much on tokens, and the possibility of node attacks is very high. In order to solve the problems of frequent changes of DPOS consensus mechanism nodes, inactive node voting, excessive reliance on tokens, and malicious nodes, a dynamic, credible, and attack-evading DPOS consensus mechanism was proposed. In addition, the Python simulation results show that the improved Bayesian voting algorithm is effective in calculating node scores.


    参考文献 | 相关文章 | 多维度评价