News

Special issue on Blockchain Technology and Applications

  • Special issue on Blockchain Technology and Applications

    Wang Xuying

    Currently, blockchain has attracted extensive attention from research institute. As a constantly evolving peer-to-peer (P2P) distributed ledger technology, blockchain has the characteristics of decentralization, tamper-proof, openness, trust establishment, etc. Compare with the traditional centralized systems, it has great potential to lower the cost of the underpinning infrastructure, improve service security and realize decentralized resource management. Since its emergence, blockchain has affected many industries, such as supply chain, electronic system, data security and so on. These characteristics and advantages of blockchain naturally bring new vitality to various industries. Hence, the objective of this special issue is to research on Blockchain Technology and applications. This special issue  provides researchers a forum to present their research on the design, implementation, and evaluation of systems using the concept of blockchain technology  and applications.

    Default Latest Most Read
    Please wait a minute...
    For Selected: Toggle Thumbnails

    Research on cross-chain and interoperability for blockchain system

    李鸣 邱鸿霖 徐泉清 宋文鹏 Liu Baixiang
    The Journal of China Universities of Posts and Telecommunications    2021, 28 (5): 1-17.   DOI: 10.19682/j.cnki.1005-8885.2021.0029
    Abstract668)      PDF(pc) (3984KB)(256)       Save

    At present, there is an urgent need for blockchain interoperability technology to realize interconnection between various blockchains, data communication and value transfer between blockchains, so as to break the ‘ value silo’ phenomenon of each blockchain. Firstly, it lists what people understand about the concept of interoperability. Secondly, it gives the key technical issues of cross-chain, including cross-chain mechanism, interoperability, eventual consistency, and universality. Then, the implementation of each cross-chain key technology is analyzed, including Hash-locking, two-way peg, notary schemes, relay chain scheme, cross-chain protocol, and global identity system. Immediately after that, five typical cross-chain systems are introduced and comparative analysis is made. In addition, two examples of cross-chain programmability and their analysis are given. Finally, the current state of cross-chain technology is summarized from two aspects: key technology implementation and cross-chain application enforcement. The cross-chain technology as a whole has formed a centralized fixed mechanism, as well as a trend of modular design, and some of the solutions to mature applications were established in the relevant standards organizations, and the cross-chain technology architecture tends to be unified, which is expected to accelerate the evolution of the open cross-chain network that supports the real needs of the interconnection of all chains.



    Reference | Related Articles | Metrics

    Trusted data access and authorization protocol

    The Journal of China Universities of Posts and Telecommunications    2021, 28 (5): 18-26.   DOI: 10.19682/j.cnki.1005-8885.2021.0028
    Abstract430)      PDF(pc) (1270KB)(157)       Save

    Threshold proxy re-encryption( PRE) authorizes the data access right of data subject to multiple proxies, who authorize the right again to delegatee to accomplish the end-to-end data encryption process from storage to authorization. Based on threshold PRE algorithm, in order to build a complete trusted data storage and authorization system, the four protocols, which are data access protocol, authorization proxy protocol, authorization proxy cancellation protocol and data reading authorization protocol, are defined completely. On that basis, an efficient data searching method is constructed by specifying the data delegatee. At last, to ensure the right to know of data, the audit log is processed with trusted data right confirmation based on distributed ledger technology. Meanwhile, a parallel data right confirmation processing method is defined based on hierarchical derivation algorithm of public and private key. In the end, the performance evaluation analysis of the protocol are given. Trusted data access and authorization protocol is convenient to build a complete data processing system on the premise of protecting data privacy based on public cloud storage system or distributed storage system.

    Reference | Related Articles | Metrics

    Extensive game analysis and improvement strategy of DPOS consensus mechanism

    The Journal of China Universities of Posts and Telecommunications    2021, 28 (5): 27-35.   DOI: 10.19682/j.cnki.1005-8885.2021.0030
    Abstract372)      PDF(pc) (846KB)(99)       Save

    Delegated proof-of-stake ( DPOS) consensus mechanism is widely adopted in blockchain platforms, but problems exist in its current applications. In order to explore the security risks in the voting attack of the DPOS consensus mechanism, an extensive game model between nodes was constructed, and it was concluded that the DPOS consensus mechanism relies too much on tokens, and the possibility of node attacks is very high. In order to solve the problems of frequent changes of DPOS consensus mechanism nodes, inactive node voting, excessive reliance on tokens, and malicious nodes, a dynamic, credible, and attack-evading DPOS consensus mechanism was proposed. In addition, the Python simulation results show that the improved Bayesian voting algorithm is effective in calculating node scores.


    Reference | Related Articles | Metrics
    Design and implementation of labor arbitration system based on blockchain
    Cui Hongyan CAI Ziyin Teng Shaokai
    The Journal of China Universities of Posts and Telecommunications    2021, 28 (5): 36-45.   DOI: 10.19682/j.cnki.1005-8885.2021.0032
    Abstract394)      PDF(pc) (2975KB)(185)       Save

    Data island and information opacity are two major problems in collaborative administration. Blockchain has the potential to provide a trustable and transparent environment encouraging data sharing among administration members. However, the blockchain only stores Hash values and transactions in blocks which makes it unable to store big data and trace their changes. In this paper, a labor arbitration scheme based on blockchain was proposed to share labor arbitration data. In the system, a collaborative administration scheme that provides a big data storage model combined blockchain and interplanetary file system ( IPFS) is designed. It can store big data and share these data among different parties. Moreover, a file version control mechanism based on blockchain is designed to manage the data changes in IPFS network. It creates a tracing chain that consists of many IPFS objects to track changes of stored data. The relationship of previous and current IPFS objects recorded by blockchain can describe the changes of administration data and trace the data operations. The proposed platform is used in Rizhao City in China, and the experiment result shows collaborative administration scheme achieves traceability with high throughput and is more efficient than traditional hypertext transfer protocol ( HTTP) way to share data.

    Reference | Related Articles | Metrics

    Multi-level sharded blockchain system for edge computing

    刘巧 唐碧华 Chen Xue Fan Wu 范文浩
    The Journal of China Universities of Posts and Telecommunications    2021, 28 (5): 46-58.   DOI: 10.19682/j.cnki.1005-8885.2021.0031
    Abstract391)      PDF(pc) (3905KB)(140)       Save

    Blockchain technology is used in edge computing ( EC) systems to solve the security problems caused by single point of failure ( SPOF) due to data loss, task execution failure, or control by malicious nodes. However, the disadvantage of blockchain is high latency, which contradicts the strict latency requirements of EC services. The existing single-level sharded blockchain system ( SLSBS) cannot provide different quality of service for different tasks. To solve these problems, a multi-level sharded blockchain system ( MLSBS) based on genetic algorithm ( GA) is proposed. The shards are classified according to the delay of the service, and the parameters such as the shard size of different shards are different. Using the GA, the MLSBS obtains the optimal resource allocation strategy that achieves maximum security. Simulation results show that the proposed scheme outperforms SLSBS.


    Reference | Related Articles | Metrics