With the development of blood donation industry in China, the blood donation model has changed. Outdated blood donation management software can no longer meet the needs of the new era, so it is imperative to design and implement a blood donation platform based on the combination of blockchain and KNN(K-Nearest Neighbor).This system uses blockchain to store the key information of blood donation and Hash file information, uses IPFS to store the identity image and signature file of the real blood donor, and uses the KNN algorithm to match the nearest blood supply center with a specific blood type, in order to deploy timely when the hospital is ischemic and reduce the mortality caused by insufficient blood in the blood bank. This project combines traditional blood donation with blockchain and KNN. It can not only ensure the privacy and safety of blood donors, and trace the blood source, but also can match the nearest blood bank to call the hospital for ischemia, which will contribute to the public welfare undertakings of blood donation. I hope this project can provide a reference for the future blood donation business.
{"title":"Design and Analysis of Blood Donation Model Based on Blockchain and KNN","authors":"Yaling Luo, Gehao Lu, Yiming Wu","doi":"10.1145/3475992.3475997","DOIUrl":"https://doi.org/10.1145/3475992.3475997","url":null,"abstract":"With the development of blood donation industry in China, the blood donation model has changed. Outdated blood donation management software can no longer meet the needs of the new era, so it is imperative to design and implement a blood donation platform based on the combination of blockchain and KNN(K-Nearest Neighbor).This system uses blockchain to store the key information of blood donation and Hash file information, uses IPFS to store the identity image and signature file of the real blood donor, and uses the KNN algorithm to match the nearest blood supply center with a specific blood type, in order to deploy timely when the hospital is ischemic and reduce the mortality caused by insufficient blood in the blood bank. This project combines traditional blood donation with blockchain and KNN. It can not only ensure the privacy and safety of blood donors, and trace the blood source, but also can match the nearest blood bank to call the hospital for ischemia, which will contribute to the public welfare undertakings of blood donation. I hope this project can provide a reference for the future blood donation business.","PeriodicalId":401179,"journal":{"name":"Proceedings of the 2021 3rd Blockchain and Internet of Things Conference","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129277971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Knudsen, Jakob Svennevik Notland, P. Haro, Truls Bakkejord Ræder, Jingyue Li
Blockchain technologies originate from cryptocurrencies. Thus, most blockchain technologies assume an environment with a fast and stable network. However, in some blockchain-based systems, e.g., supply chain management (SCM) systems, some Internet of Things (IoT) nodes can only rely on the low-quality network sometimes to achieve consensus. Thus, it is critical to understand the applicability of existing consensus algorithms in such environments. We performed a systematic mapping study to evaluate and compare existing consensus mechanisms’ capability to provide integrity and security with varying network properties. Our study identified 25 state-of-the-art consensus algorithms from published and preprint literature. We categorized and compared the consensus algorithms qualitatively based on established performance and integrity metrics and well-known blockchain security issues. Results show that consensus algorithms that rely on synchronous network for correctness cannot provide the expected integrity. Such consensus algorithms may also be vulnerable to distributed-denial-of-service (DDOS) and routing attacks, given limited network throughput. Conversely, asynchronous consensus algorithms, e.g., Honey-BadgerBFT, are deemed more robust against many of these attacks and may provide high integrity in asynchronous events.
{"title":"Consensus in Blockchain Systems with Low Network Throughput: A Systematic Mapping Study","authors":"H. Knudsen, Jakob Svennevik Notland, P. Haro, Truls Bakkejord Ræder, Jingyue Li","doi":"10.1145/3475992.3475995","DOIUrl":"https://doi.org/10.1145/3475992.3475995","url":null,"abstract":"Blockchain technologies originate from cryptocurrencies. Thus, most blockchain technologies assume an environment with a fast and stable network. However, in some blockchain-based systems, e.g., supply chain management (SCM) systems, some Internet of Things (IoT) nodes can only rely on the low-quality network sometimes to achieve consensus. Thus, it is critical to understand the applicability of existing consensus algorithms in such environments. We performed a systematic mapping study to evaluate and compare existing consensus mechanisms’ capability to provide integrity and security with varying network properties. Our study identified 25 state-of-the-art consensus algorithms from published and preprint literature. We categorized and compared the consensus algorithms qualitatively based on established performance and integrity metrics and well-known blockchain security issues. Results show that consensus algorithms that rely on synchronous network for correctness cannot provide the expected integrity. Such consensus algorithms may also be vulnerable to distributed-denial-of-service (DDOS) and routing attacks, given limited network throughput. Conversely, asynchronous consensus algorithms, e.g., Honey-BadgerBFT, are deemed more robust against many of these attacks and may provide high integrity in asynchronous events.","PeriodicalId":401179,"journal":{"name":"Proceedings of the 2021 3rd Blockchain and Internet of Things Conference","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128320113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}