首页 > 最新文献

IET Blockchain最新文献

英文 中文
Modelling smurfing patterns in cryptocurrencies with integer partitions 在具有整数分区的加密货币中建模smurfing模式
Pub Date : 2024-10-23 DOI: 10.1049/blc2.12087
Marlene Koelbing, Klaus Kieseberg, Ceren Çulha, Bernhard Garn, Dimitris E. Simos

In this paper, we propose the modelling of patterns of financial transactions - with a focus on the domain of cryptocurrencies - as splittings and present a method for generating such splittings utilizing integer partitions. We study current money laundering regulations and directives concerning thresholds for monitoring of financial transactions. We further exemplify that, by having the partitions respect these threshold criteria, the splittings generated from them can be used for modelling illicit transactional behavior such as is shown by smurfing. In addition, we conduct an analysis of the splittings occurring in money laundering efforts that took place in the aftermath of the Upbit hack. Based on the potential weaknesses identified by our research, we finally provide suggestions on how to improve current AML techniques and initiatives towards more effective AML efforts.

在本文中,我们提出了金融交易模式的建模-重点是加密货币领域-作为分裂,并提出了一种利用整数分区生成这种分裂的方法。我们研究了现行的洗钱法规和有关金融交易监测阈值的指令。我们进一步举例说明,通过让分区尊重这些阈值标准,从它们生成的分割可以用于模拟非法事务行为,如smurfing所示。此外,我们还对Upbit黑客攻击后发生的洗钱活动进行了分析。基于我们的研究发现的潜在弱点,我们最后就如何改进当前的“反洗钱”技术和举措,以实现更有效的“反洗钱”工作提出了建议。
{"title":"Modelling smurfing patterns in cryptocurrencies with integer partitions","authors":"Marlene Koelbing,&nbsp;Klaus Kieseberg,&nbsp;Ceren Çulha,&nbsp;Bernhard Garn,&nbsp;Dimitris E. Simos","doi":"10.1049/blc2.12087","DOIUrl":"10.1049/blc2.12087","url":null,"abstract":"<p>In this paper, we propose the modelling of patterns of financial transactions - with a focus on the domain of cryptocurrencies - as splittings and present a method for generating such splittings utilizing integer partitions. We study current money laundering regulations and directives concerning thresholds for monitoring of financial transactions. We further exemplify that, by having the partitions respect these threshold criteria, the splittings generated from them can be used for modelling illicit transactional behavior such as is shown by smurfing. In addition, we conduct an analysis of the splittings occurring in money laundering efforts that took place in the aftermath of the Upbit hack. Based on the potential weaknesses identified by our research, we finally provide suggestions on how to improve current AML techniques and initiatives towards more effective AML efforts.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 S1","pages":"659-680"},"PeriodicalIF":0.0,"publicationDate":"2024-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12087","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143253207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-objective energy management system for multi-microgrids using blockchain miners: A two-stage peak shaving and valley filling framework 基于区块链矿机的多微电网多目标能量管理系统:两阶段调峰填谷框架
Pub Date : 2024-09-26 DOI: 10.1049/blc2.12088
Payman Rezaei, Masoud AliAkbar Golkar

This study presents an innovative energy management framework for multi-microgrids, integrating the burgeoning domain of cryptocurrency mining. Cryptocurrencies, a novel fusion of encryption technology and financial currency, are witnessing exponential global growth. This expansion correlates with a surge in the prevalence of mining activities, amplifying electricity consumption and necessitating accelerated advancements in urban transmission and distribution infrastructures, coupled with increased financial investments. Despite cryptocurrencies' growth, comprehensive research to capitalize on their potential is scarce. This article introduces an operation cost model for miners in the proposed dual-stage framework. The first stage is dedicated to day-ahead scheduling, focusing on peak shaving and valley filling in the electricity demand curve, while concurrently optimizing operational costs. The second stage, updating each 5 min, minimizes imbalances in response to uncertain network conditions. A pivotal feature of this framework is the allocation of revenues generated from mining operations towards enhancing renewable energy resources. Empirical simulations underscore the framework's efficacy, evidenced by a substantial peak shaving of 482.833 kW and valley filling of 4084.42 kW. Furthermore, this approach effectively maintains operational costs within a feasible spectrum. Notably, the demand curve's peak-to-valley distance extends to 4 MW, with the revenue from mining activities alone sufficient to offset operational expenditures.

本研究提出了一个创新的多微电网能源管理框架,整合了新兴的加密货币挖矿领域。加密货币是加密技术和金融货币的新型融合,正在见证全球指数级增长。这种扩大与采矿活动激增有关,增加了电力消耗,必须加速发展城市输配电基础设施,同时增加财政投资。尽管加密货币在增长,但利用其潜力的综合研究却很少。本文介绍了在双阶段框架下的矿工运营成本模型。第一阶段致力于日前调度,重点关注电力需求曲线的调峰和填谷,同时优化运营成本。第二阶段,每5分钟更新一次,最大限度地减少不确定网络条件下的不平衡。这一框架的一个关键特点是将采矿业务产生的收入分配给加强可再生能源。经验模拟强调了该框架的有效性,证明了482.833 kW的大幅削峰和4084.42 kW的谷填充。此外,这种方法有效地将运营成本保持在可行范围内。值得注意的是,需求曲线的峰谷距离延伸至4兆瓦,仅采矿活动的收入就足以抵消运营支出。
{"title":"Multi-objective energy management system for multi-microgrids using blockchain miners: A two-stage peak shaving and valley filling framework","authors":"Payman Rezaei,&nbsp;Masoud AliAkbar Golkar","doi":"10.1049/blc2.12088","DOIUrl":"10.1049/blc2.12088","url":null,"abstract":"<p>This study presents an innovative energy management framework for multi-microgrids, integrating the burgeoning domain of cryptocurrency mining. Cryptocurrencies, a novel fusion of encryption technology and financial currency, are witnessing exponential global growth. This expansion correlates with a surge in the prevalence of mining activities, amplifying electricity consumption and necessitating accelerated advancements in urban transmission and distribution infrastructures, coupled with increased financial investments. Despite cryptocurrencies' growth, comprehensive research to capitalize on their potential is scarce. This article introduces an operation cost model for miners in the proposed dual-stage framework. The first stage is dedicated to day-ahead scheduling, focusing on peak shaving and valley filling in the electricity demand curve, while concurrently optimizing operational costs. The second stage, updating each 5 min, minimizes imbalances in response to uncertain network conditions. A pivotal feature of this framework is the allocation of revenues generated from mining operations towards enhancing renewable energy resources. Empirical simulations underscore the framework's efficacy, evidenced by a substantial peak shaving of 482.833 kW and valley filling of 4084.42 kW. Furthermore, this approach effectively maintains operational costs within a feasible spectrum. Notably, the demand curve's peak-to-valley distance extends to 4 MW, with the revenue from mining activities alone sufficient to offset operational expenditures.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 S1","pages":"616-631"},"PeriodicalIF":0.0,"publicationDate":"2024-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12088","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143253353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure data sharing technology of medical privacy data in the Web 3.0 Web 3.0中医疗隐私数据的安全共享技术
Pub Date : 2024-09-26 DOI: 10.1049/blc2.12086
Shusheng Guo, Cheng Chen, Qing Tong

The development of Web 3.0 technology may signify the dawn of a new digital era. Its concepts of co-management, co-construction, and sharing address the need for private data sharing among medical institutions. However, the sharing of private data has been challenging due to the lack of effective monitoring methods and authorization mechanisms. Additionally, controlling the scope of data sharing, providing incentives, and ensuring legal compliance have presented difficulties. To this end, a medical privacy data security sharing model based on key technologies of Web 3.0 has been proposed and implemented. It stores the source data in Inter Planetary File System by constructing an index of private data keywords, generates trapdoors using query keywords, and achieves retrieval of ciphertext data. Finally, data users apply to multiple parties for joint secure computing to obtain the use of private data. The experimental results indicate that when the size of the private data is less than 5 MB, with 3000 ciphertext indexes and three search keywords, both encryption and decryption times are around 50 ms, and the retrieval time is approximately 1.6 s. This performance is adequate for typical medical privacy sharing and computing scenarios.

Web 3.0 技术的发展可能标志着一个新数字时代的到来。其共同管理、共同建设和共享的理念满足了医疗机构之间共享私人数据的需求。然而,由于缺乏有效的监督方法和授权机制,私人数据共享一直面临挑战。此外,控制数据共享范围、提供激励措施和确保合法合规也是困难重重。为此,我们提出并实施了基于 Web 3.0 关键技术的医疗隐私数据安全共享模型。它通过构建隐私数据关键字索引,将源数据存储在星际文件系统中,利用查询关键字生成陷阱门,实现密文数据的检索。最后,数据用户向多方申请联合安全计算,以获得私有数据的使用权。实验结果表明,当隐私数据的大小小于 5 MB 时,使用 3000 个密文索引和 3 个搜索关键词,加密和解密时间均在 50 ms 左右,检索时间约为 1.6 s。
{"title":"Secure data sharing technology of medical privacy data in the Web 3.0","authors":"Shusheng Guo,&nbsp;Cheng Chen,&nbsp;Qing Tong","doi":"10.1049/blc2.12086","DOIUrl":"10.1049/blc2.12086","url":null,"abstract":"<p>The development of Web 3.0 technology may signify the dawn of a new digital era. Its concepts of co-management, co-construction, and sharing address the need for private data sharing among medical institutions. However, the sharing of private data has been challenging due to the lack of effective monitoring methods and authorization mechanisms. Additionally, controlling the scope of data sharing, providing incentives, and ensuring legal compliance have presented difficulties. To this end, a medical privacy data security sharing model based on key technologies of Web 3.0 has been proposed and implemented. It stores the source data in Inter Planetary File System by constructing an index of private data keywords, generates trapdoors using query keywords, and achieves retrieval of ciphertext data. Finally, data users apply to multiple parties for joint secure computing to obtain the use of private data. The experimental results indicate that when the size of the private data is less than 5 MB, with 3000 ciphertext indexes and three search keywords, both encryption and decryption times are around 50 ms, and the retrieval time is approximately 1.6 s. This performance is adequate for typical medical privacy sharing and computing scenarios.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 4","pages":"335-343"},"PeriodicalIF":0.0,"publicationDate":"2024-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12086","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142869214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Serein: A parallel pipeline-based DAG schema for consensus in blockchain serin:区块链中基于并行管道的DAG模式,用于达成共识
Pub Date : 2024-08-25 DOI: 10.1049/blc2.12085
Yang Liu, Jingwen Chen, Miaomiao Zhang, Shidong Shi, Feng Wang

As the core technology of blockchain, consensus mechanisms play a crucial role in ensuring the consistency and reliability of blockchain systems. In a decentralized and open system environment like blockchain, traditional consensus algorithms are often unsuitable due to their inability to tolerate arbitrary faults such as malicious node behaviour. Consequently, Byzantine fault tolerance consensus algorithms have become a focal point in blockchain systems. However, as Byzantine fault tolerance consensus algorithms have evolved, they still face significant challenges, particularly in addressing issues related to network latency and throughput. This paper proposes a parallel pipeline-based DAG schema for consensus in blockchain, Serein. Firstly, the Serein algorithm achieves functional partitioning of nodes, enhancing their scalability. Secondly, it employs a pipeline structure, allowing each block to proceed without waiting for the previous block's result, thereby reducing block generation latency. Lastly, the Serein algorithm leverages the advantages of the DAG block structure to achieve concurrent block ordering and submission, improving system throughput. Experimental results demonstrate that the proposed Serein algorithm maintains robust performance under conditions of high transaction volume with multiple nodes, effectively enhancing consensus efficiency while ensuring Byzantine fault-tolerant security.

共识机制作为区块链的核心技术,对保证区块链系统的一致性和可靠性起着至关重要的作用。在像区块链这样去中心化和开放的系统环境中,传统的共识算法往往不适合,因为它们无法容忍任意错误,比如恶意节点行为。因此,拜占庭容错一致性算法已成为区块链系统中的研究热点。然而,随着拜占庭容错共识算法的发展,它们仍然面临着重大挑战,特别是在解决与网络延迟和吞吐量相关的问题方面。本文提出了一种基于并行管道的DAG共识模式。首先,Serein算法实现了节点的功能划分,增强了节点的可扩展性;其次,它采用管道结构,允许每个块在不等待前一个块的结果的情况下继续进行,从而减少了块生成延迟。最后,该算法利用DAG块结构的优点,实现了块的并发排序和提交,提高了系统吞吐量。实验结果表明,提出的Serein算法在多节点高交易量条件下保持鲁棒性,在保证拜占庭容错安全性的同时有效提高了共识效率。
{"title":"Serein: A parallel pipeline-based DAG schema for consensus in blockchain","authors":"Yang Liu,&nbsp;Jingwen Chen,&nbsp;Miaomiao Zhang,&nbsp;Shidong Shi,&nbsp;Feng Wang","doi":"10.1049/blc2.12085","DOIUrl":"10.1049/blc2.12085","url":null,"abstract":"<p>As the core technology of blockchain, consensus mechanisms play a crucial role in ensuring the consistency and reliability of blockchain systems. In a decentralized and open system environment like blockchain, traditional consensus algorithms are often unsuitable due to their inability to tolerate arbitrary faults such as malicious node behaviour. Consequently, Byzantine fault tolerance consensus algorithms have become a focal point in blockchain systems. However, as Byzantine fault tolerance consensus algorithms have evolved, they still face significant challenges, particularly in addressing issues related to network latency and throughput. This paper proposes a parallel pipeline-based DAG schema for consensus in blockchain, Serein. Firstly, the Serein algorithm achieves functional partitioning of nodes, enhancing their scalability. Secondly, it employs a pipeline structure, allowing each block to proceed without waiting for the previous block's result, thereby reducing block generation latency. Lastly, the Serein algorithm leverages the advantages of the DAG block structure to achieve concurrent block ordering and submission, improving system throughput. Experimental results demonstrate that the proposed Serein algorithm maintains robust performance under conditions of high transaction volume with multiple nodes, effectively enhancing consensus efficiency while ensuring Byzantine fault-tolerant security.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 S1","pages":"681-690"},"PeriodicalIF":0.0,"publicationDate":"2024-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12085","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143253404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Scalable data management in global health crises: Leveraging blockchain technology 全球卫生危机中的可扩展数据管理:利用区块链技术
Pub Date : 2024-08-01 DOI: 10.1049/blc2.12084
Sakib Al Jobaid, Upama Kabir, Mosarrat Jahan

Effective data management is crucial in navigating any health crisis. With proper data management protocols in place, stakeholders can swiftly adapt to evolving circumstances during challenging times. A recent event like the COVID-19 pandemic has unequivocally revealed its significance. It is essential to conduct disease surveillance, practice preventive measures, and devise policies to contain the situation. As the process involves massive data growth, it demands an acute level of oversight and control. Monitoring this vast sensitive data faces multifaceted limitations, namely data tampering, breach of privacy, and centralized data stewardship. In response to these challenges, we propose an innovative blockchain-enabled scalable data management scheme in light of the COVID-19 scenario. However, blockchain cannot scale in a large ecosystem due to storing all contents in every participating node. This work addresses this shortcoming by proposing a lightweight solution that groups nodes into clusters, resulting in less memory and processing overhead. Moreover, it adopts an off-chaining technique to reduce the memory load of every node and, thereby, the entire network. The experimental results demonstrate that it attains approximately 85% and 94% storage reduction per node and the whole network, respectively, and an 87% reduction in transaction processing time.

有效的数据管理对于应对任何健康危机至关重要。有了适当的数据管理协议,利益相关者可以在充满挑战的时期迅速适应不断变化的环境。最近发生的COVID-19大流行等事件明确显示了其重要性。开展疾病监测、采取预防措施和制定政策以控制局势至关重要。由于这一过程涉及大量数据增长,因此需要高度的监督和控制。监控这些庞大的敏感数据面临多方面的限制,即数据篡改、侵犯隐私和集中数据管理。针对这些挑战,我们提出了一种创新的基于区块链的可扩展数据管理方案。然而,区块链无法在大型生态系统中扩展,因为它将所有内容存储在每个参与节点中。这项工作通过提出一种轻量级解决方案来解决这个缺点,该解决方案将节点分组到集群中,从而减少内存和处理开销。此外,它采用脱链技术来减少每个节点的内存负载,从而减少整个网络的内存负载。实验结果表明,每个节点和整个网络的存储空间分别减少了85%和94%,事务处理时间减少了87%。
{"title":"Scalable data management in global health crises: Leveraging blockchain technology","authors":"Sakib Al Jobaid,&nbsp;Upama Kabir,&nbsp;Mosarrat Jahan","doi":"10.1049/blc2.12084","DOIUrl":"10.1049/blc2.12084","url":null,"abstract":"<p>Effective data management is crucial in navigating any health crisis. With proper data management protocols in place, stakeholders can swiftly adapt to evolving circumstances during challenging times. A recent event like the COVID-19 pandemic has unequivocally revealed its significance. It is essential to conduct disease surveillance, practice preventive measures, and devise policies to contain the situation. As the process involves massive data growth, it demands an acute level of oversight and control. Monitoring this vast sensitive data faces multifaceted limitations, namely data tampering, breach of privacy, and centralized data stewardship. In response to these challenges, we propose an innovative blockchain-enabled scalable data management scheme in light of the COVID-19 scenario. However, blockchain cannot scale in a large ecosystem due to storing all contents in every participating node. This work addresses this shortcoming by proposing a lightweight solution that groups nodes into clusters, resulting in less memory and processing overhead. Moreover, it adopts an off-chaining technique to reduce the memory load of every node and, thereby, the entire network. The experimental results demonstrate that it attains approximately 85% and 94% storage reduction per node and the whole network, respectively, and an 87% reduction in transaction processing time.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 S1","pages":"596-615"},"PeriodicalIF":0.0,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12084","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143244221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain transaction data mining and its applications 区块链交易数据挖掘及其应用
Pub Date : 2024-07-29 DOI: 10.1049/blc2.12083
Jiajing Wu, Hong-Ning Dai, Qi Xuan, Radosław Michalski, Xi Chen
<p>Since the birth of blockchain as the underlying support technology for Bitcoin, blockchain technology has received widespread attention from academia and industry worldwide and is considered to have profound potential for disruptive change in areas such as finance, smart manufacturing, and the Internet of Things. As cryptocurrencies, smart contracts, decentralized applications and other derivatives continue to be generated on the blockchain, the volume of transaction data on the blockchain has been maintaining a high growth. With the help of this massive data, we can dig out the development rules of the blockchain, analyze the characteristics of different transactions, and then identify the abnormal behaviour on the blockchain to promote the green and sustainable development of the blockchain. Unfortunately, blockchain transaction data mining faces challenges, such as blockchain data heterogeneity, anonymity and decentralization as well as real-time and generality.</p><p>This special issue aims to provide an open venue for academic and industrial communities to present and discuss cutting-edge technologies and research results regarding blockchain transaction data mining and its applications. It solicits original high-quality papers with new transaction data acquisition tools, transaction network construction and mining methods, anomaly detection algorithms, etc.</p><p>In this Special Issue, we have received eight papers, all of which underwent peer review. Of the eight originally submitted papers, five have been accepted. The overall submissions were of high quality, which marks the success of this Special Issue. A brief presentation of each of the paper in this special issue follows.</p><p>Xiong et al. introduce a graph neural network-based phishing detection method for Ethereum, and conduct extensive experiments on the Ethereum dataset to verify the effectiveness of this scheme in identifying Ethereum phishing detection. The method introduces a feature learning algorithm named TransWalk and constructs an Ethereum phishing fraud detection framework utilizing a transaction-oriented biased sampling strategy for transaction networks and a multi-scale feature extraction method for Ethereum. Through more effective extraction of Ethereum transaction features, the framework aims to enhance phishing fraud detection performance. This work holds significant importance in the field of Ethereum ecosystem security. Access the full paper using the following link: https://doi.org/10.1049/blc2.12031.</p><p>Feng et al. propose a framework for detecting and repairing reentrancy vulnerabilities in smart contracts based on bytecode and vulnerability features. This framework aims to mitigate the losses incurred by reentrancy vulnerabilities in the digital currency economy and offers a more comprehensive solution for detecting and repairing such vulnerabilities. The proposed bytecode-level method overcomes challenges in detection and repair by integrating detecti
他是 IET 研究员和 IEEE 高级会员。他目前的研究兴趣包括物联网、智能电网、人工智能应用和电动汽车充电网络。
{"title":"Blockchain transaction data mining and its applications","authors":"Jiajing Wu,&nbsp;Hong-Ning Dai,&nbsp;Qi Xuan,&nbsp;Radosław Michalski,&nbsp;Xi Chen","doi":"10.1049/blc2.12083","DOIUrl":"10.1049/blc2.12083","url":null,"abstract":"&lt;p&gt;Since the birth of blockchain as the underlying support technology for Bitcoin, blockchain technology has received widespread attention from academia and industry worldwide and is considered to have profound potential for disruptive change in areas such as finance, smart manufacturing, and the Internet of Things. As cryptocurrencies, smart contracts, decentralized applications and other derivatives continue to be generated on the blockchain, the volume of transaction data on the blockchain has been maintaining a high growth. With the help of this massive data, we can dig out the development rules of the blockchain, analyze the characteristics of different transactions, and then identify the abnormal behaviour on the blockchain to promote the green and sustainable development of the blockchain. Unfortunately, blockchain transaction data mining faces challenges, such as blockchain data heterogeneity, anonymity and decentralization as well as real-time and generality.&lt;/p&gt;&lt;p&gt;This special issue aims to provide an open venue for academic and industrial communities to present and discuss cutting-edge technologies and research results regarding blockchain transaction data mining and its applications. It solicits original high-quality papers with new transaction data acquisition tools, transaction network construction and mining methods, anomaly detection algorithms, etc.&lt;/p&gt;&lt;p&gt;In this Special Issue, we have received eight papers, all of which underwent peer review. Of the eight originally submitted papers, five have been accepted. The overall submissions were of high quality, which marks the success of this Special Issue. A brief presentation of each of the paper in this special issue follows.&lt;/p&gt;&lt;p&gt;Xiong et al. introduce a graph neural network-based phishing detection method for Ethereum, and conduct extensive experiments on the Ethereum dataset to verify the effectiveness of this scheme in identifying Ethereum phishing detection. The method introduces a feature learning algorithm named TransWalk and constructs an Ethereum phishing fraud detection framework utilizing a transaction-oriented biased sampling strategy for transaction networks and a multi-scale feature extraction method for Ethereum. Through more effective extraction of Ethereum transaction features, the framework aims to enhance phishing fraud detection performance. This work holds significant importance in the field of Ethereum ecosystem security. Access the full paper using the following link: https://doi.org/10.1049/blc2.12031.&lt;/p&gt;&lt;p&gt;Feng et al. propose a framework for detecting and repairing reentrancy vulnerabilities in smart contracts based on bytecode and vulnerability features. This framework aims to mitigate the losses incurred by reentrancy vulnerabilities in the digital currency economy and offers a more comprehensive solution for detecting and repairing such vulnerabilities. The proposed bytecode-level method overcomes challenges in detection and repair by integrating detecti","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 3","pages":"223-225"},"PeriodicalIF":0.0,"publicationDate":"2024-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12083","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142160269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on transaction privacy protection solutions for cross-border commerce 跨境商务交易隐私保护解决方案研究
Pub Date : 2024-07-19 DOI: 10.1049/blc2.12080
JinCheng Ma, Fei Li

In response to the dual privacy protection challenges concerning the confidentiality of transaction amounts and identities in cross-border trade, a transaction scheme that combines +HomEIG Zero Knowledge Proof (+HomEIG-ZKProof) and the national encryption algorithm SM2 is proposed. While ensuring transaction traceability and verifiability, this scheme achieves privacy protection for both payers’ and recipients’ identities, specifically tailored for cross-border trade scenarios. Additionally, customs authorities play the role of supervisory nodes to verify the identities of transaction parties and the zero-knowledge proofs for transaction information. The RAFT consensus algorithm is employed to construct a secure authentication application, demonstrating how zero-knowledge proofs, combined with homomorphic encryption, can be verified through a consensus process. In this scenario, the legitimacy of transaction amounts is subject to zero-knowledge verification during consensus interactions. Merchant identity verification is accomplished using SM2 ring signatures. The analysis indicates that this scheme offers strong security features such as resistance to tampering attacks, public key replacement attacks, impersonation attacks, and anonymity. Testing results demonstrate that this scheme can effectively provide dual privacy protection for transaction amounts and identities in cross-border trade, meeting the practical requirements of privacy protection in cross-border trade transactions.

为应对跨境贸易中交易金额和身份保密的双重隐私保护挑战,我们提出了一种结合了 +HomEIG 零知识证明(+HomEIG-ZKProof)和国家加密算法 SM2 的交易方案。该方案在确保交易可追溯性和可验证性的同时,实现了对付款人和收款人身份的隐私保护,特别适合跨境贸易场景。此外,海关当局扮演着监督节点的角色,负责验证交易双方的身份和交易信息的零知识证明。RAFT 共识算法用于构建安全认证应用,展示了零知识证明与同态加密相结合如何通过共识过程进行验证。在这种情况下,交易金额的合法性需要在共识交互过程中进行零知识验证。商家身份验证通过 SM2 环签名完成。分析表明,该方案具有很强的安全特性,如抗篡改攻击、公钥替换攻击、冒名攻击和匿名性。测试结果表明,该方案能有效地为跨境贸易中的交易金额和身份提供双重隐私保护,满足了跨境贸易交易中隐私保护的实际要求。
{"title":"Research on transaction privacy protection solutions for cross-border commerce","authors":"JinCheng Ma,&nbsp;Fei Li","doi":"10.1049/blc2.12080","DOIUrl":"10.1049/blc2.12080","url":null,"abstract":"<p>In response to the dual privacy protection challenges concerning the confidentiality of transaction amounts and identities in cross-border trade, a transaction scheme that combines <sup>+</sup>HomEIG Zero Knowledge Proof (<sup>+</sup>HomEIG-ZKProof) and the national encryption algorithm SM2 is proposed. While ensuring transaction traceability and verifiability, this scheme achieves privacy protection for both payers’ and recipients’ identities, specifically tailored for cross-border trade scenarios. Additionally, customs authorities play the role of supervisory nodes to verify the identities of transaction parties and the zero-knowledge proofs for transaction information. The RAFT consensus algorithm is employed to construct a secure authentication application, demonstrating how zero-knowledge proofs, combined with homomorphic encryption, can be verified through a consensus process. In this scenario, the legitimacy of transaction amounts is subject to zero-knowledge verification during consensus interactions. Merchant identity verification is accomplished using SM2 ring signatures. The analysis indicates that this scheme offers strong security features such as resistance to tampering attacks, public key replacement attacks, impersonation attacks, and anonymity. Testing results demonstrate that this scheme can effectively provide dual privacy protection for transaction amounts and identities in cross-border trade, meeting the practical requirements of privacy protection in cross-border trade transactions.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 S1","pages":"586-595"},"PeriodicalIF":0.0,"publicationDate":"2024-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12080","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141821278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on airport baggage anomaly retention detection technology based on machine vision, edge computing, and blockchain 基于机器视觉、边缘计算和区块链的机场行李异常保留检测技术研究
Pub Date : 2024-07-15 DOI: 10.1049/blc2.12082
Yuzhou Chen, Gang Mao, Xue Yang, Mingqian Du, Hongqing Song

Airport checked luggage entails specific requirements for speed, stability, and reliability. The issue of abnormal retention of checked luggage presents a significant challenge to aviation safety and transportation efficiency. Traditional luggage monitoring systems exhibit limitations in terms of accuracy and timeliness. To address this challenge, this paper proposes a real-time detection and alerting of luggage anomaly retention based on the YOLOv5 object detection model, leveraging visual algorithms. By eliminating cloud servers and deploying multiple edge servers to establish a private chain, images of anomalously retained luggage are encrypted and stored on the chain. Data users can verify the authenticity of accessed images through anti-tampering algorithms, ensuring the security of data transmission and storage. The deployment of edge computing servers can significantly reduce algorithm latency and enhance real-time performance. This solution employs computer vision technology and an edge computing framework to address the speed and stability of checked luggage transportation. Furthermore, blockchain technology greatly enhances system security during operation. A model trained on a sample set of 4600 images achieved a luggage recognition rate of 96.9% and an anomaly detection rate of 95.8% in simulated test videos.

机场托运行李对速度、稳定性和可靠性有特殊要求。托运行李的异常滞留问题给航空安全和运输效率带来了巨大挑战。传统的行李监控系统在准确性和及时性方面存在局限性。为应对这一挑战,本文基于 YOLOv5 物体检测模型,利用视觉算法,提出了行李异常滞留的实时检测和报警方法。通过取消云服务器并部署多个边缘服务器来建立私有链,对异常保留行李的图像进行加密并存储在链上。数据用户可通过防篡改算法验证访问图像的真实性,确保数据传输和存储的安全性。部署边缘计算服务器可大大减少算法延迟,提高实时性。该解决方案采用计算机视觉技术和边缘计算框架,解决了托运行李运输的速度和稳定性问题。此外,区块链技术大大增强了系统运行过程中的安全性。在模拟测试视频中,基于 4600 张图像样本集训练的模型实现了 96.9% 的行李识别率和 95.8% 的异常检测率。
{"title":"Research on airport baggage anomaly retention detection technology based on machine vision, edge computing, and blockchain","authors":"Yuzhou Chen,&nbsp;Gang Mao,&nbsp;Xue Yang,&nbsp;Mingqian Du,&nbsp;Hongqing Song","doi":"10.1049/blc2.12082","DOIUrl":"10.1049/blc2.12082","url":null,"abstract":"<p>Airport checked luggage entails specific requirements for speed, stability, and reliability. The issue of abnormal retention of checked luggage presents a significant challenge to aviation safety and transportation efficiency. Traditional luggage monitoring systems exhibit limitations in terms of accuracy and timeliness. To address this challenge, this paper proposes a real-time detection and alerting of luggage anomaly retention based on the YOLOv5 object detection model, leveraging visual algorithms. By eliminating cloud servers and deploying multiple edge servers to establish a private chain, images of anomalously retained luggage are encrypted and stored on the chain. Data users can verify the authenticity of accessed images through anti-tampering algorithms, ensuring the security of data transmission and storage. The deployment of edge computing servers can significantly reduce algorithm latency and enhance real-time performance. This solution employs computer vision technology and an edge computing framework to address the speed and stability of checked luggage transportation. Furthermore, blockchain technology greatly enhances system security during operation. A model trained on a sample set of 4600 images achieved a luggage recognition rate of 96.9% and an anomaly detection rate of 95.8% in simulated test videos.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 4","pages":"393-406"},"PeriodicalIF":0.0,"publicationDate":"2024-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12082","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141647467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data-sharing strategies in medical consortium based on master-slave multichain and federated learning 基于主从多链和联合学习的医疗联合体数据共享策略
Pub Date : 2024-07-11 DOI: 10.1049/blc2.12075
Bohan Kang, Ning Zhang, Jianming Zhu

In order to encourage participants to actively join the data sharing and to meet the distributed structure and privacy requirement in the medical consortium, the data-sharing strategy based on the master-slave multichain is presented in this paper. According to the different computing resources and the responsibility of participants, the adaptive Proof of Liveness and Quality consensus and hierarchical federated learning algorithm for master-slave multichain are proposed. Meanwhile, by quantifying the utility function and the optimization constraint of participants, this paper designs the cooperative incentive mechanism of medical consortium in multi-leader Stackelberg game to solve the optimal decision and pricing selection of the master-slave multichain. The simulation experiments show that the proposed methods can decrease the training loss and improve the parameter accuracy by MedMINST datasets, as well as reach the optimal equilibrium in selection and pricing strategy in the system, guaranteeing the fairness of profit distribution for participants in master-slave multichain.

为了鼓励参与者积极加入数据共享,满足医疗联合体的分布式结构和隐私要求,本文提出了基于主从多链的数据共享策略。针对不同的计算资源和参与者的责任,提出了主从多链的自适应 "有效性证明 "和 "质量共识 "以及分层联合学习算法。同时,本文通过量化参与方的效用函数和优化约束,设计了多领导者 Stackelberg 博弈中的医疗联合体合作激励机制,解决了主从多链的最优决策和定价选择问题。仿真实验表明,本文提出的方法可以通过MedMINST数据集降低训练损失,提高参数精度,并在系统中达到最优选择和定价策略的均衡,保证主从多链参与者利益分配的公平性。
{"title":"Data-sharing strategies in medical consortium based on master-slave multichain and federated learning","authors":"Bohan Kang,&nbsp;Ning Zhang,&nbsp;Jianming Zhu","doi":"10.1049/blc2.12075","DOIUrl":"10.1049/blc2.12075","url":null,"abstract":"<p>In order to encourage participants to actively join the data sharing and to meet the distributed structure and privacy requirement in the medical consortium, the data-sharing strategy based on the master-slave multichain is presented in this paper. According to the different computing resources and the responsibility of participants, the adaptive Proof of Liveness and Quality consensus and hierarchical federated learning algorithm for master-slave multichain are proposed. Meanwhile, by quantifying the utility function and the optimization constraint of participants, this paper designs the cooperative incentive mechanism of medical consortium in multi-leader Stackelberg game to solve the optimal decision and pricing selection of the master-slave multichain. The simulation experiments show that the proposed methods can decrease the training loss and improve the parameter accuracy by MedMINST datasets, as well as reach the optimal equilibrium in selection and pricing strategy in the system, guaranteeing the fairness of profit distribution for participants in master-slave multichain.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 4","pages":"470-481"},"PeriodicalIF":0.0,"publicationDate":"2024-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12075","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141655460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MEchain—A novel mode to improve blockchain's real-time and throughput 机制-一种提高b区块链实时和吞吐量的新模式
Pub Date : 2024-06-24 DOI: 10.1049/blc2.12074
Yunwei Cao, Ting Yang, Yu Wang, Gang Mao

Blockchain trilemma is a considerable obstacle for today's decentralized systems. It is hard to achieve a perfect balance among decentralization, security, and scalability. Many popular blockchain platforms sacrifice scalability to preserve decentralization and security, resulting in low speed, reduced throughput, and poor real-time performance (the time from transaction initiation to confirmation). Currently, there are several technologies, such as sharding, directed acyclic graph technology, sidechains, off-chain state channels etc., that aim to improve throughput and real-time performance. However, most of these solutions compromise the core feature of blockchain, which is decentralization, and introduce new security risks. In this paper, the authors propose a novel method, called MEchain, based on the Proof of Time Series Algorithm. MEchain consists of two models: the multi-chain model and the elastic-chain model. The authors’ experimental results show that these two models can enhance real-time performance and throughput to a higher level in the industry.

区块链三难困境是当今去中心化系统的一个相当大的障碍。很难在去中心化、安全性和可扩展性之间取得完美的平衡。许多流行的区块链平台牺牲可伸缩性来保持去中心化和安全性,从而导致速度低、吞吐量降低和实时性能差(从事务发起到确认的时间)。目前,有几种技术,如分片、有向无环图技术、侧链、链下状态通道等,旨在提高吞吐量和实时性能。然而,这些解决方案中的大多数都损害了区块链的核心特性,即去中心化,并引入了新的安全风险。在本文中,作者提出了一种基于时间序列证明算法的新方法——MEchain。机制包括两种模型:多链模型和弹性链模型。实验结果表明,这两种模型都能将实时性和吞吐量提高到较高的水平。
{"title":"MEchain—A novel mode to improve blockchain's real-time and throughput","authors":"Yunwei Cao,&nbsp;Ting Yang,&nbsp;Yu Wang,&nbsp;Gang Mao","doi":"10.1049/blc2.12074","DOIUrl":"10.1049/blc2.12074","url":null,"abstract":"<p>Blockchain trilemma is a considerable obstacle for today's decentralized systems. It is hard to achieve a perfect balance among decentralization, security, and scalability. Many popular blockchain platforms sacrifice scalability to preserve decentralization and security, resulting in low speed, reduced throughput, and poor real-time performance (the time from transaction initiation to confirmation). Currently, there are several technologies, such as sharding, directed acyclic graph technology, sidechains, off-chain state channels etc., that aim to improve throughput and real-time performance. However, most of these solutions compromise the core feature of blockchain, which is decentralization, and introduce new security risks. In this paper, the authors propose a novel method, called MEchain, based on the Proof of Time Series Algorithm. MEchain consists of two models: the multi-chain model and the elastic-chain model. The authors’ experimental results show that these two models can enhance real-time performance and throughput to a higher level in the industry.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 4","pages":"355-364"},"PeriodicalIF":0.0,"publicationDate":"2024-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12074","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142862101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IET Blockchain
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1