首页 > 最新文献

IET Blockchain最新文献

英文 中文
Blockchain based intelligent disbursement in National Scholarship Portal 国家奖学金门户网站基于区块链的智能支付
Pub Date : 2024-11-21 DOI: 10.1049/blc2.12092
Lifna Challissery Samu, Neelkanth Khithani, Kushl Alve, Vedang Gambhire, Atharva Hande, Shivam Choubey

The National Scholarship Portal in India serves as a one-stop solution for students seeking financial aid for their studies across the country. However, in this digital era, the national-level portal faces challenges such as limited provision for only government scholarships, non-automated systems, complex application processes, reliance on physical verifications, and delays in scholarship disbursement. This research proposes a blockchain-based scholarship module to address these challenges and automate the entire scholarship process. The paper emphasizes upon the transformative impact by the usage of Hyperledger fabric network, which provides a fool-proof system that streamlines the entire application process and fund disbursement. The proposed integration also ensures robust application verification, accountability of stakeholders, transparent scholarship selection criteria, automated and thorough tracking of fund disbursement, immutable transaction history, secure authorization; and stringent compliance measures. Thus, the implementation of the proposed system aims to alleviate the financial insecurities faced by students during their studies, simplify their search for scholarship opportunities, and enable them to focus more on their academic pursuits.

印度的国家奖学金门户网站为全国各地寻求学习资助的学生提供了一站式解决方案。然而,在这个数字化时代,国家级门户网站面临着各种挑战,如仅提供有限的政府奖学金、非自动化系统、复杂的申请流程、依赖物理验证以及奖学金发放延迟等。本研究提出了一个基于区块链的奖学金模块,以应对这些挑战并实现整个奖学金流程的自动化。论文强调了使用超级账本结构网络的变革性影响,该网络提供了一个万无一失的系统,简化了整个申请流程和资金支付。拟议的整合还能确保强有力的申请验证、利益相关者的问责制、透明的奖学金选择标准、自动和全面的资金支付跟踪、不可更改的交易历史、安全授权以及严格的合规措施。因此,拟议系统的实施旨在减轻学生在学习期间面临的财务不安全问题,简化他们寻找奖学金机会的过程,使他们能够更加专注于学业。
{"title":"Blockchain based intelligent disbursement in National Scholarship Portal","authors":"Lifna Challissery Samu,&nbsp;Neelkanth Khithani,&nbsp;Kushl Alve,&nbsp;Vedang Gambhire,&nbsp;Atharva Hande,&nbsp;Shivam Choubey","doi":"10.1049/blc2.12092","DOIUrl":"https://doi.org/10.1049/blc2.12092","url":null,"abstract":"<p>The National Scholarship Portal in India serves as a one-stop solution for students seeking financial aid for their studies across the country. However, in this digital era, the national-level portal faces challenges such as limited provision for only government scholarships, non-automated systems, complex application processes, reliance on physical verifications, and delays in scholarship disbursement. This research proposes a blockchain-based scholarship module to address these challenges and automate the entire scholarship process. The paper emphasizes upon the transformative impact by the usage of Hyperledger fabric network, which provides a fool-proof system that streamlines the entire application process and fund disbursement. The proposed integration also ensures robust application verification, accountability of stakeholders, transparent scholarship selection criteria, automated and thorough tracking of fund disbursement, immutable transaction history, secure authorization; and stringent compliance measures. Thus, the implementation of the proposed system aims to alleviate the financial insecurities faced by students during their studies, simplify their search for scholarship opportunities, and enable them to focus more on their academic pursuits.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 4","pages":"407-422"},"PeriodicalIF":0.0,"publicationDate":"2024-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12092","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142868831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
zk-STARKs based scheme for sealed auctions in chains 基于zk-STARKs的链中密封拍卖方案
Pub Date : 2024-11-04 DOI: 10.1049/blc2.12090
Li Wei, Liang Peili, Li Fei

On-chain sealed auctions represent a novel approach to electronic bidding auctions, wherein the introduction of zero-knowledge proof technology has significantly enhanced the security of auctions. However, most mainstream on-chain sealed auction schemes currently employ Bulletproofs to prove auction correctness, which leaves room for optimization in terms of verification time and inherent security. Addressing these issues, an on-chain sealed auction scheme based on zero-knowledge succinct non-interactive argument of knowledge (zk-STARK) is proposed. This scheme leverages the decentralization and immutability of blockchain and smart contracts to eliminate third-party involvement while ensuring the security of the auction process. The Inter Planetary File System is utilized to provide a qualification review mechanism for the auctioneer, enabling the screening of unqualified bidders before the auction. Additionally, the scheme employs RSA encryption to conceal bidders' bids, Pedersen commitments to ensure the consistency of bidding information, and zk-STARKs to verify the correctness of the winning bid. Security analysis and experimental results demonstrate that the proposed scheme meets the required security standards, with time consumption at various stages of the auction being within acceptable limits, and effectively reduces the time required for proof verification.

链上密封拍卖代表了一种新的电子竞价拍卖方式,其中零知识证明技术的引入大大提高了拍卖的安全性。然而,目前大多数主流链上密封拍卖方案都采用防弹来证明拍卖的正确性,这在验证时间和固有安全性方面都有优化的空间。针对这些问题,提出了一种基于零知识简洁非交互式知识论证(zk-STARK)的链上密封拍卖方案。该方案利用区块链和智能合约的去中心化和不可变性来消除第三方参与,同时确保拍卖过程的安全性。行星间文件系统用于为拍卖商提供资格审查机制,以便在拍卖前筛选不合格的竞标者。此外,该方案使用RSA加密来隐藏竞标者的出价,Pedersen承诺来确保竞标信息的一致性,zk-STARKs来验证中标者的正确性。安全性分析和实验结果表明,该方案满足要求的安全标准,拍卖各阶段的时间消耗在可接受的范围内,有效减少了证明验证所需的时间。
{"title":"zk-STARKs based scheme for sealed auctions in chains","authors":"Li Wei,&nbsp;Liang Peili,&nbsp;Li Fei","doi":"10.1049/blc2.12090","DOIUrl":"https://doi.org/10.1049/blc2.12090","url":null,"abstract":"<p>On-chain sealed auctions represent a novel approach to electronic bidding auctions, wherein the introduction of zero-knowledge proof technology has significantly enhanced the security of auctions. However, most mainstream on-chain sealed auction schemes currently employ Bulletproofs to prove auction correctness, which leaves room for optimization in terms of verification time and inherent security. Addressing these issues, an on-chain sealed auction scheme based on zero-knowledge succinct non-interactive argument of knowledge (zk-STARK) is proposed. This scheme leverages the decentralization and immutability of blockchain and smart contracts to eliminate third-party involvement while ensuring the security of the auction process. The Inter Planetary File System is utilized to provide a qualification review mechanism for the auctioneer, enabling the screening of unqualified bidders before the auction. Additionally, the scheme employs RSA encryption to conceal bidders' bids, Pedersen commitments to ensure the consistency of bidding information, and zk-STARKs to verify the correctness of the winning bid. Security analysis and experimental results demonstrate that the proposed scheme meets the required security standards, with time consumption at various stages of the auction being within acceptable limits, and effectively reduces the time required for proof verification.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 4","pages":"344-354"},"PeriodicalIF":0.0,"publicationDate":"2024-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12090","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142859928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure data sharing technology of medical privacy data in the Web 3.0 Web 3.0中医疗隐私数据的安全共享技术
Pub Date : 2024-09-26 DOI: 10.1049/blc2.12086
Shusheng Guo, Cheng Chen, Qing Tong

The development of Web 3.0 technology may signify the dawn of a new digital era. Its concepts of co-management, co-construction, and sharing address the need for private data sharing among medical institutions. However, the sharing of private data has been challenging due to the lack of effective monitoring methods and authorization mechanisms. Additionally, controlling the scope of data sharing, providing incentives, and ensuring legal compliance have presented difficulties. To this end, a medical privacy data security sharing model based on key technologies of Web 3.0 has been proposed and implemented. It stores the source data in Inter Planetary File System by constructing an index of private data keywords, generates trapdoors using query keywords, and achieves retrieval of ciphertext data. Finally, data users apply to multiple parties for joint secure computing to obtain the use of private data. The experimental results indicate that when the size of the private data is less than 5 MB, with 3000 ciphertext indexes and three search keywords, both encryption and decryption times are around 50 ms, and the retrieval time is approximately 1.6 s. This performance is adequate for typical medical privacy sharing and computing scenarios.

Web 3.0 技术的发展可能标志着一个新数字时代的到来。其共同管理、共同建设和共享的理念满足了医疗机构之间共享私人数据的需求。然而,由于缺乏有效的监督方法和授权机制,私人数据共享一直面临挑战。此外,控制数据共享范围、提供激励措施和确保合法合规也是困难重重。为此,我们提出并实施了基于 Web 3.0 关键技术的医疗隐私数据安全共享模型。它通过构建隐私数据关键字索引,将源数据存储在星际文件系统中,利用查询关键字生成陷阱门,实现密文数据的检索。最后,数据用户向多方申请联合安全计算,以获得私有数据的使用权。实验结果表明,当隐私数据的大小小于 5 MB 时,使用 3000 个密文索引和 3 个搜索关键词,加密和解密时间均在 50 ms 左右,检索时间约为 1.6 s。
{"title":"Secure data sharing technology of medical privacy data in the Web 3.0","authors":"Shusheng Guo,&nbsp;Cheng Chen,&nbsp;Qing Tong","doi":"10.1049/blc2.12086","DOIUrl":"https://doi.org/10.1049/blc2.12086","url":null,"abstract":"<p>The development of Web 3.0 technology may signify the dawn of a new digital era. Its concepts of co-management, co-construction, and sharing address the need for private data sharing among medical institutions. However, the sharing of private data has been challenging due to the lack of effective monitoring methods and authorization mechanisms. Additionally, controlling the scope of data sharing, providing incentives, and ensuring legal compliance have presented difficulties. To this end, a medical privacy data security sharing model based on key technologies of Web 3.0 has been proposed and implemented. It stores the source data in Inter Planetary File System by constructing an index of private data keywords, generates trapdoors using query keywords, and achieves retrieval of ciphertext data. Finally, data users apply to multiple parties for joint secure computing to obtain the use of private data. The experimental results indicate that when the size of the private data is less than 5 MB, with 3000 ciphertext indexes and three search keywords, both encryption and decryption times are around 50 ms, and the retrieval time is approximately 1.6 s. This performance is adequate for typical medical privacy sharing and computing scenarios.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 4","pages":"335-343"},"PeriodicalIF":0.0,"publicationDate":"2024-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12086","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142869214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain transaction data mining and its applications 区块链交易数据挖掘及其应用
Pub Date : 2024-07-29 DOI: 10.1049/blc2.12083
Jiajing Wu, Hong-Ning Dai, Qi Xuan, Radosław Michalski, Xi Chen
<p>Since the birth of blockchain as the underlying support technology for Bitcoin, blockchain technology has received widespread attention from academia and industry worldwide and is considered to have profound potential for disruptive change in areas such as finance, smart manufacturing, and the Internet of Things. As cryptocurrencies, smart contracts, decentralized applications and other derivatives continue to be generated on the blockchain, the volume of transaction data on the blockchain has been maintaining a high growth. With the help of this massive data, we can dig out the development rules of the blockchain, analyze the characteristics of different transactions, and then identify the abnormal behaviour on the blockchain to promote the green and sustainable development of the blockchain. Unfortunately, blockchain transaction data mining faces challenges, such as blockchain data heterogeneity, anonymity and decentralization as well as real-time and generality.</p><p>This special issue aims to provide an open venue for academic and industrial communities to present and discuss cutting-edge technologies and research results regarding blockchain transaction data mining and its applications. It solicits original high-quality papers with new transaction data acquisition tools, transaction network construction and mining methods, anomaly detection algorithms, etc.</p><p>In this Special Issue, we have received eight papers, all of which underwent peer review. Of the eight originally submitted papers, five have been accepted. The overall submissions were of high quality, which marks the success of this Special Issue. A brief presentation of each of the paper in this special issue follows.</p><p>Xiong et al. introduce a graph neural network-based phishing detection method for Ethereum, and conduct extensive experiments on the Ethereum dataset to verify the effectiveness of this scheme in identifying Ethereum phishing detection. The method introduces a feature learning algorithm named TransWalk and constructs an Ethereum phishing fraud detection framework utilizing a transaction-oriented biased sampling strategy for transaction networks and a multi-scale feature extraction method for Ethereum. Through more effective extraction of Ethereum transaction features, the framework aims to enhance phishing fraud detection performance. This work holds significant importance in the field of Ethereum ecosystem security. Access the full paper using the following link: https://doi.org/10.1049/blc2.12031.</p><p>Feng et al. propose a framework for detecting and repairing reentrancy vulnerabilities in smart contracts based on bytecode and vulnerability features. This framework aims to mitigate the losses incurred by reentrancy vulnerabilities in the digital currency economy and offers a more comprehensive solution for detecting and repairing such vulnerabilities. The proposed bytecode-level method overcomes challenges in detection and repair by integrating detecti
他是 IET 研究员和 IEEE 高级会员。他目前的研究兴趣包括物联网、智能电网、人工智能应用和电动汽车充电网络。
{"title":"Blockchain transaction data mining and its applications","authors":"Jiajing Wu,&nbsp;Hong-Ning Dai,&nbsp;Qi Xuan,&nbsp;Radosław Michalski,&nbsp;Xi Chen","doi":"10.1049/blc2.12083","DOIUrl":"https://doi.org/10.1049/blc2.12083","url":null,"abstract":"&lt;p&gt;Since the birth of blockchain as the underlying support technology for Bitcoin, blockchain technology has received widespread attention from academia and industry worldwide and is considered to have profound potential for disruptive change in areas such as finance, smart manufacturing, and the Internet of Things. As cryptocurrencies, smart contracts, decentralized applications and other derivatives continue to be generated on the blockchain, the volume of transaction data on the blockchain has been maintaining a high growth. With the help of this massive data, we can dig out the development rules of the blockchain, analyze the characteristics of different transactions, and then identify the abnormal behaviour on the blockchain to promote the green and sustainable development of the blockchain. Unfortunately, blockchain transaction data mining faces challenges, such as blockchain data heterogeneity, anonymity and decentralization as well as real-time and generality.&lt;/p&gt;&lt;p&gt;This special issue aims to provide an open venue for academic and industrial communities to present and discuss cutting-edge technologies and research results regarding blockchain transaction data mining and its applications. It solicits original high-quality papers with new transaction data acquisition tools, transaction network construction and mining methods, anomaly detection algorithms, etc.&lt;/p&gt;&lt;p&gt;In this Special Issue, we have received eight papers, all of which underwent peer review. Of the eight originally submitted papers, five have been accepted. The overall submissions were of high quality, which marks the success of this Special Issue. A brief presentation of each of the paper in this special issue follows.&lt;/p&gt;&lt;p&gt;Xiong et al. introduce a graph neural network-based phishing detection method for Ethereum, and conduct extensive experiments on the Ethereum dataset to verify the effectiveness of this scheme in identifying Ethereum phishing detection. The method introduces a feature learning algorithm named TransWalk and constructs an Ethereum phishing fraud detection framework utilizing a transaction-oriented biased sampling strategy for transaction networks and a multi-scale feature extraction method for Ethereum. Through more effective extraction of Ethereum transaction features, the framework aims to enhance phishing fraud detection performance. This work holds significant importance in the field of Ethereum ecosystem security. Access the full paper using the following link: https://doi.org/10.1049/blc2.12031.&lt;/p&gt;&lt;p&gt;Feng et al. propose a framework for detecting and repairing reentrancy vulnerabilities in smart contracts based on bytecode and vulnerability features. This framework aims to mitigate the losses incurred by reentrancy vulnerabilities in the digital currency economy and offers a more comprehensive solution for detecting and repairing such vulnerabilities. The proposed bytecode-level method overcomes challenges in detection and repair by integrating detecti","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 3","pages":"223-225"},"PeriodicalIF":0.0,"publicationDate":"2024-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12083","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142160269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on airport baggage anomaly retention detection technology based on machine vision, edge computing, and blockchain 基于机器视觉、边缘计算和区块链的机场行李异常保留检测技术研究
Pub Date : 2024-07-15 DOI: 10.1049/blc2.12082
Yuzhou Chen, Gang Mao, Xue Yang, Mingqian Du, Hongqing Song

Airport checked luggage entails specific requirements for speed, stability, and reliability. The issue of abnormal retention of checked luggage presents a significant challenge to aviation safety and transportation efficiency. Traditional luggage monitoring systems exhibit limitations in terms of accuracy and timeliness. To address this challenge, this paper proposes a real-time detection and alerting of luggage anomaly retention based on the YOLOv5 object detection model, leveraging visual algorithms. By eliminating cloud servers and deploying multiple edge servers to establish a private chain, images of anomalously retained luggage are encrypted and stored on the chain. Data users can verify the authenticity of accessed images through anti-tampering algorithms, ensuring the security of data transmission and storage. The deployment of edge computing servers can significantly reduce algorithm latency and enhance real-time performance. This solution employs computer vision technology and an edge computing framework to address the speed and stability of checked luggage transportation. Furthermore, blockchain technology greatly enhances system security during operation. A model trained on a sample set of 4600 images achieved a luggage recognition rate of 96.9% and an anomaly detection rate of 95.8% in simulated test videos.

机场托运行李对速度、稳定性和可靠性有特殊要求。托运行李的异常滞留问题给航空安全和运输效率带来了巨大挑战。传统的行李监控系统在准确性和及时性方面存在局限性。为应对这一挑战,本文基于 YOLOv5 物体检测模型,利用视觉算法,提出了行李异常滞留的实时检测和报警方法。通过取消云服务器并部署多个边缘服务器来建立私有链,对异常保留行李的图像进行加密并存储在链上。数据用户可通过防篡改算法验证访问图像的真实性,确保数据传输和存储的安全性。部署边缘计算服务器可大大减少算法延迟,提高实时性。该解决方案采用计算机视觉技术和边缘计算框架,解决了托运行李运输的速度和稳定性问题。此外,区块链技术大大增强了系统运行过程中的安全性。在模拟测试视频中,基于 4600 张图像样本集训练的模型实现了 96.9% 的行李识别率和 95.8% 的异常检测率。
{"title":"Research on airport baggage anomaly retention detection technology based on machine vision, edge computing, and blockchain","authors":"Yuzhou Chen,&nbsp;Gang Mao,&nbsp;Xue Yang,&nbsp;Mingqian Du,&nbsp;Hongqing Song","doi":"10.1049/blc2.12082","DOIUrl":"10.1049/blc2.12082","url":null,"abstract":"<p>Airport checked luggage entails specific requirements for speed, stability, and reliability. The issue of abnormal retention of checked luggage presents a significant challenge to aviation safety and transportation efficiency. Traditional luggage monitoring systems exhibit limitations in terms of accuracy and timeliness. To address this challenge, this paper proposes a real-time detection and alerting of luggage anomaly retention based on the YOLOv5 object detection model, leveraging visual algorithms. By eliminating cloud servers and deploying multiple edge servers to establish a private chain, images of anomalously retained luggage are encrypted and stored on the chain. Data users can verify the authenticity of accessed images through anti-tampering algorithms, ensuring the security of data transmission and storage. The deployment of edge computing servers can significantly reduce algorithm latency and enhance real-time performance. This solution employs computer vision technology and an edge computing framework to address the speed and stability of checked luggage transportation. Furthermore, blockchain technology greatly enhances system security during operation. A model trained on a sample set of 4600 images achieved a luggage recognition rate of 96.9% and an anomaly detection rate of 95.8% in simulated test videos.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 4","pages":"393-406"},"PeriodicalIF":0.0,"publicationDate":"2024-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12082","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141647467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data-sharing strategies in medical consortium based on master-slave multichain and federated learning 基于主从多链和联合学习的医疗联合体数据共享策略
Pub Date : 2024-07-11 DOI: 10.1049/blc2.12075
Bohan Kang, Ning Zhang, Jianming Zhu

In order to encourage participants to actively join the data sharing and to meet the distributed structure and privacy requirement in the medical consortium, the data-sharing strategy based on the master-slave multichain is presented in this paper. According to the different computing resources and the responsibility of participants, the adaptive Proof of Liveness and Quality consensus and hierarchical federated learning algorithm for master-slave multichain are proposed. Meanwhile, by quantifying the utility function and the optimization constraint of participants, this paper designs the cooperative incentive mechanism of medical consortium in multi-leader Stackelberg game to solve the optimal decision and pricing selection of the master-slave multichain. The simulation experiments show that the proposed methods can decrease the training loss and improve the parameter accuracy by MedMINST datasets, as well as reach the optimal equilibrium in selection and pricing strategy in the system, guaranteeing the fairness of profit distribution for participants in master-slave multichain.

为了鼓励参与者积极加入数据共享,满足医疗联合体的分布式结构和隐私要求,本文提出了基于主从多链的数据共享策略。针对不同的计算资源和参与者的责任,提出了主从多链的自适应 "有效性证明 "和 "质量共识 "以及分层联合学习算法。同时,本文通过量化参与方的效用函数和优化约束,设计了多领导者 Stackelberg 博弈中的医疗联合体合作激励机制,解决了主从多链的最优决策和定价选择问题。仿真实验表明,本文提出的方法可以通过MedMINST数据集降低训练损失,提高参数精度,并在系统中达到最优选择和定价策略的均衡,保证主从多链参与者利益分配的公平性。
{"title":"Data-sharing strategies in medical consortium based on master-slave multichain and federated learning","authors":"Bohan Kang,&nbsp;Ning Zhang,&nbsp;Jianming Zhu","doi":"10.1049/blc2.12075","DOIUrl":"10.1049/blc2.12075","url":null,"abstract":"<p>In order to encourage participants to actively join the data sharing and to meet the distributed structure and privacy requirement in the medical consortium, the data-sharing strategy based on the master-slave multichain is presented in this paper. According to the different computing resources and the responsibility of participants, the adaptive Proof of Liveness and Quality consensus and hierarchical federated learning algorithm for master-slave multichain are proposed. Meanwhile, by quantifying the utility function and the optimization constraint of participants, this paper designs the cooperative incentive mechanism of medical consortium in multi-leader Stackelberg game to solve the optimal decision and pricing selection of the master-slave multichain. The simulation experiments show that the proposed methods can decrease the training loss and improve the parameter accuracy by MedMINST datasets, as well as reach the optimal equilibrium in selection and pricing strategy in the system, guaranteeing the fairness of profit distribution for participants in master-slave multichain.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 4","pages":"470-481"},"PeriodicalIF":0.0,"publicationDate":"2024-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12075","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141655460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MEchain—A novel mode to improve blockchain's real-time and throughput 机制-一种提高b区块链实时和吞吐量的新模式
Pub Date : 2024-06-24 DOI: 10.1049/blc2.12074
Yunwei Cao, Ting Yang, Yu Wang, Gang Mao

Blockchain trilemma is a considerable obstacle for today's decentralized systems. It is hard to achieve a perfect balance among decentralization, security, and scalability. Many popular blockchain platforms sacrifice scalability to preserve decentralization and security, resulting in low speed, reduced throughput, and poor real-time performance (the time from transaction initiation to confirmation). Currently, there are several technologies, such as sharding, directed acyclic graph technology, sidechains, off-chain state channels etc., that aim to improve throughput and real-time performance. However, most of these solutions compromise the core feature of blockchain, which is decentralization, and introduce new security risks. In this paper, the authors propose a novel method, called MEchain, based on the Proof of Time Series Algorithm. MEchain consists of two models: the multi-chain model and the elastic-chain model. The authors’ experimental results show that these two models can enhance real-time performance and throughput to a higher level in the industry.

区块链三难困境是当今去中心化系统的一个相当大的障碍。很难在去中心化、安全性和可扩展性之间取得完美的平衡。许多流行的区块链平台牺牲可伸缩性来保持去中心化和安全性,从而导致速度低、吞吐量降低和实时性能差(从事务发起到确认的时间)。目前,有几种技术,如分片、有向无环图技术、侧链、链下状态通道等,旨在提高吞吐量和实时性能。然而,这些解决方案中的大多数都损害了区块链的核心特性,即去中心化,并引入了新的安全风险。在本文中,作者提出了一种基于时间序列证明算法的新方法——MEchain。机制包括两种模型:多链模型和弹性链模型。实验结果表明,这两种模型都能将实时性和吞吐量提高到较高的水平。
{"title":"MEchain—A novel mode to improve blockchain's real-time and throughput","authors":"Yunwei Cao,&nbsp;Ting Yang,&nbsp;Yu Wang,&nbsp;Gang Mao","doi":"10.1049/blc2.12074","DOIUrl":"https://doi.org/10.1049/blc2.12074","url":null,"abstract":"<p>Blockchain trilemma is a considerable obstacle for today's decentralized systems. It is hard to achieve a perfect balance among decentralization, security, and scalability. Many popular blockchain platforms sacrifice scalability to preserve decentralization and security, resulting in low speed, reduced throughput, and poor real-time performance (the time from transaction initiation to confirmation). Currently, there are several technologies, such as sharding, directed acyclic graph technology, sidechains, off-chain state channels etc., that aim to improve throughput and real-time performance. However, most of these solutions compromise the core feature of blockchain, which is decentralization, and introduce new security risks. In this paper, the authors propose a novel method, called MEchain, based on the Proof of Time Series Algorithm. MEchain consists of two models: the multi-chain model and the elastic-chain model. The authors’ experimental results show that these two models can enhance real-time performance and throughput to a higher level in the industry.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 4","pages":"355-364"},"PeriodicalIF":0.0,"publicationDate":"2024-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12074","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142862101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RON-based cross-chain routing optimization strategy in metaverse 基于 RON 的元宇宙跨链路由优化策略
Pub Date : 2024-06-10 DOI: 10.1049/blc2.12078
Junjie Huang, Liang Tan, Jianmei Xiao

Metaverse is a new ecology that integrates the digital world with the physical world, generates a mirror image of the real world based on digital twin technology, and guarantees the fairness of the virtual world through the trusted mechanism of blockchain. Cross-chain communication technology is the key to realizing data circulation and collaborative processing between blockchains, which provides the communication foundation for the massive connection of blockchains in the metaverse. The current cross-chain communication mode is dominated by direct-connect routing, leading to network congestion and high propagation delay once the direct-connect link fails and cannot be recovered quickly. To optimize direct-connect routing, this paper proposed a cross-chain routing optimization strategy based on RON (Resilient Overlay Network), that is, Cross-Chain_RON, which firstly applies RON to reconstruct the direct-connect routing model, and then selects the optimal link through the shortest-path algorithm and policy routing, and combines with the RON performance database to improve the data transmission efficiency. Finally, the two communication modes were simulated by simulation tools. The experiments show that Cross-Chain_RON outperforms the direct-connect routing in terms of latency, rate of successful data transmission, and throughput in poor network environments, but at the expense of a certain amount of system overhead.

元宇宙是数字世界与物理世界融合的新生态,基于数字孪生技术生成现实世界的镜像,并通过区块链的可信机制保证虚拟世界的公平性。跨链通信技术是实现区块链之间数据流通和协同处理的关键,它为元宇宙中区块链的大规模连接提供了通信基础。目前的跨链通信模式以直连式路由为主,一旦直连链路出现故障,无法快速恢复,就会导致网络拥塞和高传播延迟。为了优化直连路由,本文提出了一种基于 RON(Resilient Overlay Network)的跨链路由优化策略,即 Cross-Chain_RON,它首先应用 RON 重构直连路由模型,然后通过最短路径算法和策略路由选择最优链路,并结合 RON 性能数据库提高数据传输效率。最后,利用仿真工具对两种通信模式进行了仿真。实验结果表明,在网络环境较差的情况下,Cross-Chain_RON在延迟、数据传输成功率和吞吐量等方面都优于直连路由,但要以一定的系统开销为代价。
{"title":"RON-based cross-chain routing optimization strategy in metaverse","authors":"Junjie Huang,&nbsp;Liang Tan,&nbsp;Jianmei Xiao","doi":"10.1049/blc2.12078","DOIUrl":"10.1049/blc2.12078","url":null,"abstract":"<p>Metaverse is a new ecology that integrates the digital world with the physical world, generates a mirror image of the real world based on digital twin technology, and guarantees the fairness of the virtual world through the trusted mechanism of blockchain. Cross-chain communication technology is the key to realizing data circulation and collaborative processing between blockchains, which provides the communication foundation for the massive connection of blockchains in the metaverse. The current cross-chain communication mode is dominated by direct-connect routing, leading to network congestion and high propagation delay once the direct-connect link fails and cannot be recovered quickly. To optimize direct-connect routing, this paper proposed a cross-chain routing optimization strategy based on RON (Resilient Overlay Network), that is, Cross-Chain_RON, which firstly applies RON to reconstruct the direct-connect routing model, and then selects the optimal link through the shortest-path algorithm and policy routing, and combines with the RON performance database to improve the data transmission efficiency. Finally, the two communication modes were simulated by simulation tools. The experiments show that Cross-Chain_RON outperforms the direct-connect routing in terms of latency, rate of successful data transmission, and throughput in poor network environments, but at the expense of a certain amount of system overhead.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 4","pages":"379-392"},"PeriodicalIF":0.0,"publicationDate":"2024-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12078","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141362481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring artificial intelligence generated content (AIGC) applications in the metaverse: Challenges, solutions, and future directions 探索元宇宙中的人工智能生成内容(AIGC)应用:挑战、解决方案和未来方向
Pub Date : 2024-05-26 DOI: 10.1049/blc2.12076
Xutian Wang, Yan Hong, Xiaoming He

In recent years, the Metaverse has gained attention as a hub for technological revolution. However, its main platform suffers from issues like low-quality content and lackluster virtual environments, leading to subpar user experiences. Concerns arise from declining interest in NFTs and failed virtual real estate ventures, casting doubt on the Metaverse's future. Artificial intelligence generated content (AIGC) emerges as a key driver of Metaverse advancement, using AI to create digital content efficiently and affordably. AIGC also enables personalized content, enhancing the Metaverse. This paper examines the link between the Metaverse and AIGC, exploring AIGC's applications, underlying technologies, and future challenges. It reveals that while AIGC shows promise for improving the Metaverse, its technologies must better align with development needs to deliver immersive experiences.

近年来,超宇宙作为技术革命的中心而备受关注。然而,它的主要平台却存在一些问题,如低质量的内容和平淡无奇的虚拟环境,导致用户体验欠佳。人们对nft兴趣的下降和虚拟房地产投资的失败引起了人们的担忧,这让人们对Metaverse的未来产生了怀疑。人工智能生成内容(AIGC)成为虚拟世界发展的关键驱动力,利用人工智能高效且经济地创建数字内容。AIGC还支持个性化内容,增强了元宇宙。本文研究了元宇宙和AIGC之间的联系,探索了AIGC的应用、底层技术和未来的挑战。它表明,尽管AIGC有望改善虚拟世界,但其技术必须更好地与开发需求保持一致,以提供沉浸式体验。
{"title":"Exploring artificial intelligence generated content (AIGC) applications in the metaverse: Challenges, solutions, and future directions","authors":"Xutian Wang,&nbsp;Yan Hong,&nbsp;Xiaoming He","doi":"10.1049/blc2.12076","DOIUrl":"https://doi.org/10.1049/blc2.12076","url":null,"abstract":"<p>In recent years, the Metaverse has gained attention as a hub for technological revolution. However, its main platform suffers from issues like low-quality content and lackluster virtual environments, leading to subpar user experiences. Concerns arise from declining interest in NFTs and failed virtual real estate ventures, casting doubt on the Metaverse's future. Artificial intelligence generated content (AIGC) emerges as a key driver of Metaverse advancement, using AI to create digital content efficiently and affordably. AIGC also enables personalized content, enhancing the Metaverse. This paper examines the link between the Metaverse and AIGC, exploring AIGC's applications, underlying technologies, and future challenges. It reveals that while AIGC shows promise for improving the Metaverse, its technologies must better align with development needs to deliver immersive experiences.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 4","pages":"365-378"},"PeriodicalIF":0.0,"publicationDate":"2024-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12076","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142862248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain end user adoption and societal challenges: Exploring privacy, rights, and security dimensions 区块链终端用户的采用和社会挑战:探索隐私、权利和安全问题
Pub Date : 2024-05-07 DOI: 10.1049/blc2.12077
Salman Saleem Virani
The focus of this review article is on the societal problems and end user acceptance of blockchain technology. The paper begins by outlining the importance of blockchain in modernizing trust and data management systems and highlighting its rapid spread across numerous industries. In‐depth analysis of the adoption‐influencing aspects is done, which also lists the advantages and typical end‐user problems. It examines the privacy implications, restrictions on pseudonymity, and function of technologies that improve privacy, such as zero‐knowledge proofs, while also exploring the legal and regulatory environment around blockchain, putting a focus on digital identity, intellectual property, and data ownership. It also evaluates blockchain security features, such as flaws and risks associated with smart contracts, discusses best practices for boosting security, discusses the societal effects of blockchain, and makes suggestions for legislators, companies, and scholars. The use of blockchain technology and its effects on privacy, rights, and security are discussed in real‐world case studies as well.
这篇评论文章的重点是区块链技术的社会问题和最终用户的接受程度。文章首先概述了区块链在实现信任和数据管理系统现代化方面的重要性,并强调了区块链在众多行业中的迅速普及。论文深入分析了采用的影响因素,还列举了优势和典型的终端用户问题。报告研究了隐私影响、对假名的限制以及零知识证明等改善隐私的技术的功能,同时还探讨了区块链的法律和监管环境,重点关注数字身份、知识产权和数据所有权。报告还评估了区块链的安全特性,如智能合约的缺陷和风险,讨论了提高安全性的最佳实践,探讨了区块链的社会效应,并为立法者、公司和学者提出了建议。本书还通过实际案例研究,讨论了区块链技术的使用及其对隐私、权利和安全的影响。
{"title":"Blockchain end user adoption and societal challenges: Exploring privacy, rights, and security dimensions","authors":"Salman Saleem Virani","doi":"10.1049/blc2.12077","DOIUrl":"https://doi.org/10.1049/blc2.12077","url":null,"abstract":"The focus of this review article is on the societal problems and end user acceptance of blockchain technology. The paper begins by outlining the importance of blockchain in modernizing trust and data management systems and highlighting its rapid spread across numerous industries. In‐depth analysis of the adoption‐influencing aspects is done, which also lists the advantages and typical end‐user problems. It examines the privacy implications, restrictions on pseudonymity, and function of technologies that improve privacy, such as zero‐knowledge proofs, while also exploring the legal and regulatory environment around blockchain, putting a focus on digital identity, intellectual property, and data ownership. It also evaluates blockchain security features, such as flaws and risks associated with smart contracts, discusses best practices for boosting security, discusses the societal effects of blockchain, and makes suggestions for legislators, companies, and scholars. The use of blockchain technology and its effects on privacy, rights, and security are discussed in real‐world case studies as well.","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"75 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141004248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IET Blockchain
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1