首页 > 最新文献

Blockchain-Research and Applications最新文献

英文 中文
Dual-blockchain based multi-layer grouping federated learning scheme for heterogeneous data in industrial IoT 基于双区块链的工业物联网异构数据多层分组联合学习方案
IF 6.9 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-01 DOI: 10.1016/j.bcra.2024.100195

Federated learning (FL) allows data owners to train neural networks together without sharing local data, allowing the industrial Internet of Things (IIoT) to share a variety of data. However, traditional FL frameworks suffer from data heterogeneity and outdated models. To address these issues, this paper proposes a dual-blockchain based multi-layer grouping federated learning (BMFL) architecture. BMFL divides the participant groups based on the training tasks, then realizes the model training by combining synchronous and asynchronous FL through the multi-layer grouping structure, and uses the model blockchain to record the characteristic tags of the global model, allowing group-manners to extract the model based on the feature requirements and solving the problem of data heterogeneity. In addition, to protect the privacy of the model gradient parameters and manage the key, the global model is stored in ciphertext, and the chameleon hash algorithm is used to perform the modification and management of the encrypted key on the key blockchain while keeping the block header hash unchanged. Finally, we evaluate the performance of BMFL on different public datasets and verify the practicality of the scheme with real fault datasets. The experimental results show that the proposed BMFL exhibits more stable and accurate convergence behavior than the classic FL algorithm, and the key revocation overhead time is reasonable.

联盟学习(FL)允许数据所有者在不共享本地数据的情况下共同训练神经网络,从而使工业物联网(IIoT)能够共享各种数据。然而,传统的联邦学习框架存在数据异构和模型过时的问题。为了解决这些问题,本文提出了一种基于双区块链的多层分组联合学习(BMFL)架构。BMFL 根据训练任务划分参与组,然后通过多层分组结构实现同步和异步 FL 相结合的模型训练,并利用模型区块链记录全局模型的特征标签,允许组员根据特征需求提取模型,解决了数据异构的问题。此外,为了保护模型梯度参数的隐私和管理密钥,全局模型以密文形式存储,并使用变色龙哈希算法对密钥区块链上的加密密钥进行修改和管理,同时保持区块头哈希值不变。最后,我们评估了 BMFL 在不同公共数据集上的性能,并通过真实故障数据集验证了该方案的实用性。实验结果表明,与经典的 FL 算法相比,所提出的 BMFL 表现出更稳定、更准确的收敛行为,而且密钥撤销开销时间合理。
{"title":"Dual-blockchain based multi-layer grouping federated learning scheme for heterogeneous data in industrial IoT","authors":"","doi":"10.1016/j.bcra.2024.100195","DOIUrl":"10.1016/j.bcra.2024.100195","url":null,"abstract":"<div><p>Federated learning (FL) allows data owners to train neural networks together without sharing local data, allowing the industrial Internet of Things (IIoT) to share a variety of data. However, traditional FL frameworks suffer from data heterogeneity and outdated models. To address these issues, this paper proposes a dual-blockchain based multi-layer grouping federated learning (BMFL) architecture. BMFL divides the participant groups based on the training tasks, then realizes the model training by combining synchronous and asynchronous FL through the multi-layer grouping structure, and uses the model blockchain to record the characteristic tags of the global model, allowing group-manners to extract the model based on the feature requirements and solving the problem of data heterogeneity. In addition, to protect the privacy of the model gradient parameters and manage the key, the global model is stored in ciphertext, and the chameleon hash algorithm is used to perform the modification and management of the encrypted key on the key blockchain while keeping the block header hash unchanged. Finally, we evaluate the performance of BMFL on different public datasets and verify the practicality of the scheme with real fault datasets. The experimental results show that the proposed BMFL exhibits more stable and accurate convergence behavior than the classic FL algorithm, and the key revocation overhead time is reasonable.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"5 3","pages":"Article 100195"},"PeriodicalIF":6.9,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096720924000083/pdfft?md5=17c58876f9db0cb915d1b0b20cbe64c3&pid=1-s2.0-S2096720924000083-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140468200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An interpretable model for large-scale smart contract vulnerability detection 大规模智能合约漏洞检测的可解释模型
IF 6.9 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-01 DOI: 10.1016/j.bcra.2024.100209
Smart contracts hold billions of dollars in digital currency, and their security vulnerabilities have drawn a lot of attention in recent years. Traditional methods for detecting smart contract vulnerabilities rely primarily on symbol execution, which makes them time-consuming with high false positive rates. Recently, deep learning approaches have alleviated these issues but still face several major limitations, such as lack of interpretability and susceptibility to evasion techniques. In this paper, we propose a feature selection method for uplifting modeling. The fundamental concept of this method is a feature selection algorithm, utilizing interpretation outcomes to select critical features, thereby reducing the scales of features. The learning process could be accelerated significantly because of the reduction of the feature size. The experiment shows that our proposed model performs well in six types of vulnerability detection. The accuracy of each type is higher than 93% and the average detection time of each smart contract is less than 1 ms. Notably, through our proposed feature selection algorithm, the training time of each type of vulnerability is reduced by nearly 80% compared with that of its original.
智能合约持有数十亿美元的数字货币,其安全漏洞近年来引起了广泛关注。检测智能合约漏洞的传统方法主要依赖于符号执行,因此耗时长、误报率高。最近,深度学习方法缓解了这些问题,但仍面临几个主要限制,如缺乏可解释性和易受规避技术影响。在本文中,我们提出了一种用于上行建模的特征选择方法。该方法的基本概念是一种特征选择算法,利用解释结果来选择关键特征,从而减少特征的规模。由于特征规模的缩小,学习过程可以大大加快。实验表明,我们提出的模型在六种类型的漏洞检测中表现良好。每种类型的准确率都高于 93%,每个智能合约的平均检测时间小于 1 毫秒。值得注意的是,通过我们提出的特征选择算法,每种类型漏洞的训练时间都比原来减少了近 80%。
{"title":"An interpretable model for large-scale smart contract vulnerability detection","authors":"","doi":"10.1016/j.bcra.2024.100209","DOIUrl":"10.1016/j.bcra.2024.100209","url":null,"abstract":"<div><div>Smart contracts hold billions of dollars in digital currency, and their security vulnerabilities have drawn a lot of attention in recent years. Traditional methods for detecting smart contract vulnerabilities rely primarily on symbol execution, which makes them time-consuming with high false positive rates. Recently, deep learning approaches have alleviated these issues but still face several major limitations, such as lack of interpretability and susceptibility to evasion techniques. In this paper, we propose a feature selection method for uplifting modeling. The fundamental concept of this method is a feature selection algorithm, utilizing interpretation outcomes to select critical features, thereby reducing the scales of features. The learning process could be accelerated significantly because of the reduction of the feature size. The experiment shows that our proposed model performs well in six types of vulnerability detection. The accuracy of each type is higher than 93% and the average detection time of each smart contract is less than 1 ms. Notably, through our proposed feature selection algorithm, the training time of each type of vulnerability is reduced by nearly 80% compared with that of its original.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"5 3","pages":"Article 100209"},"PeriodicalIF":6.9,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141390225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting anomalies in blockchain transactions using machine learning classifiers and explainability analysis 利用机器学习分类器和可解释性分析检测区块链交易中的异常情况
IF 6.9 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-01 DOI: 10.1016/j.bcra.2024.100207
Mohammad Hasan , Mohammad Shahriar Rahman , Helge Janicke , Iqbal H. Sarker
As the use of blockchain for digital payments continues to rise, it becomes susceptible to various malicious attacks. Successfully detecting anomalies within blockchain transactions is essential for bolstering trust in digital payments. However, the task of anomaly detection in blockchain transaction data is challenging due to the infrequent occurrence of illicit transactions. Although several studies have been conducted in the field, a limitation persists: the lack of explanations for the model's predictions. This study seeks to overcome this limitation by integrating explainable artificial intelligence (XAI) techniques and anomaly rules into tree-based ensemble classifiers for detecting anomalous Bitcoin transactions. The shapley additive explanation (SHAP) method is employed to measure the contribution of each feature, and it is compatible with ensemble models. Moreover, we present rules for interpreting whether a Bitcoin transaction is anomalous or not. Additionally, we introduce an under-sampling algorithm named XGBCLUS, designed to balance anomalous and non-anomalous transaction data. This algorithm is compared against other commonly used under-sampling and over-sampling techniques. Finally, the outcomes of various tree-based single classifiers are compared with those of stacking and voting ensemble classifiers. Our experimental results demonstrate that: (i) XGBCLUS enhances true positive rate (TPR) and receiver operating characteristic-area under curve (ROC-AUC) scores compared to state-of-the-art under-sampling and over-sampling techniques, and (ii) our proposed ensemble classifiers outperform traditional single tree-based machine learning classifiers in terms of accuracy, TPR, and false positive rate (FPR) scores.
随着区块链在数字支付领域的应用不断增加,它也容易受到各种恶意攻击。成功检测区块链交易中的异常情况对于增强数字支付的信任度至关重要。然而,由于非法交易很少发生,在区块链交易数据中进行异常检测是一项具有挑战性的任务。虽然该领域已开展了多项研究,但仍存在一个局限性:缺乏对模型预测的解释。本研究试图通过将可解释人工智能(XAI)技术和异常规则整合到基于树的集合分类器中来克服这一局限,以检测异常比特币交易。我们采用夏普利加法解释(SHAP)方法来衡量每个特征的贡献,该方法与集合模型兼容。此外,我们还提出了解释比特币交易是否异常的规则。此外,我们还引入了一种名为 XGBCLUS 的低采样算法,旨在平衡异常和非异常交易数据。我们将该算法与其他常用的低采样和高采样技术进行了比较。最后,将各种基于树的单一分类器的结果与堆叠和投票集合分类器的结果进行了比较。实验结果表明(i) 与最先进的欠采样和过采样技术相比,XGBCLUS 提高了真阳性率(TPR)和接收者操作特征曲线下面积(ROC-AUC)分数;(ii) 我们提出的集合分类器在准确率、TPR 和假阳性率(FPR)分数方面优于传统的基于树的单一机器学习分类器。
{"title":"Detecting anomalies in blockchain transactions using machine learning classifiers and explainability analysis","authors":"Mohammad Hasan ,&nbsp;Mohammad Shahriar Rahman ,&nbsp;Helge Janicke ,&nbsp;Iqbal H. Sarker","doi":"10.1016/j.bcra.2024.100207","DOIUrl":"10.1016/j.bcra.2024.100207","url":null,"abstract":"<div><div>As the use of blockchain for digital payments continues to rise, it becomes susceptible to various malicious attacks. Successfully detecting anomalies within blockchain transactions is essential for bolstering trust in digital payments. However, the task of anomaly detection in blockchain transaction data is challenging due to the infrequent occurrence of illicit transactions. Although several studies have been conducted in the field, a limitation persists: the lack of explanations for the model's predictions. This study seeks to overcome this limitation by integrating explainable artificial intelligence (XAI) techniques and anomaly rules into tree-based ensemble classifiers for detecting anomalous Bitcoin transactions. The shapley additive explanation (SHAP) method is employed to measure the contribution of each feature, and it is compatible with ensemble models. Moreover, we present rules for interpreting whether a Bitcoin transaction is anomalous or not. Additionally, we introduce an under-sampling algorithm named XGBCLUS, designed to balance anomalous and non-anomalous transaction data. This algorithm is compared against other commonly used under-sampling and over-sampling techniques. Finally, the outcomes of various tree-based single classifiers are compared with those of stacking and voting ensemble classifiers. Our experimental results demonstrate that: (i) XGBCLUS enhances true positive rate (TPR) and receiver operating characteristic-area under curve (ROC-AUC) scores compared to state-of-the-art under-sampling and over-sampling techniques, and (ii) our proposed ensemble classifiers outperform traditional single tree-based machine learning classifiers in terms of accuracy, TPR, and false positive rate (FPR) scores.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"5 3","pages":"Article 100207"},"PeriodicalIF":6.9,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142320259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How can the holder trust the verifier? A CP-ABPRE-based solution to control the access to claims in a Self-Sovereign-Identity scenario 持有人如何信任验证者?一种基于 CP-ABPRE 的解决方案,用于控制自我主权身份情况下对权利主张的访问
IF 6.9 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-01 DOI: 10.1016/j.bcra.2024.100196

The interest in Self-Sovereign Identity (SSI) in research, industry, and governments is rapidly increasing. SSI is a paradigm where users hold their identity and credentials issued by authorized entities. SSI is revolutionizing the concept of digital identity and enabling the definition of a trust framework wherein a service provider (verifier) validates the claims presented by a user (holder) for accessing services. However, current SSI solutions primarily focus on the presentation and verification of claims, overlooking a dual aspect: ensuring that the verifier is authorized to access the holder's claims. Addressing this gap, this paper introduces an innovative SSI-based solution that integrates decentralized wallets with Ciphertext-Policy Attribute-Based Proxy Re-Encryption (CP-ABPRE). This combination effectively addresses the challenge of verifier authorization. Our solution, implemented on the Ethereum platform, enhances accountability by notarizing key operations through a smart contract. This paper also offers a prototype demonstrating the practicality of the proposed approach. Furthermore, it provides an extensive evaluation of the solution's performance, emphasizing its feasibility and efficiency in real-world applications.

研究、工业和政府对自主身份(SSI)的兴趣正在迅速增长。SSI 是一种用户持有其身份和授权实体颁发的凭证的模式。SSI 正在彻底改变数字身份的概念,并使信任框架的定义成为可能,在这种框架中,服务提供商(验证者)验证用户(持有者)为获取服务而提出的要求。然而,目前的 SSI 解决方案主要关注的是提交和验证主张,忽略了一个双重方面:确保验证者有权访问持有者的主张。针对这一缺陷,本文介绍了一种基于 SSI 的创新解决方案,它将分散式钱包与基于属性的代理重加密(CP-ABPRE)集成在一起。这种组合有效地解决了验证者授权的难题。我们的解决方案在以太坊平台上实施,通过智能合约公证密钥操作,增强了问责制。本文还提供了一个原型,展示了所提方法的实用性。此外,本文还对解决方案的性能进行了广泛评估,强调了其在现实世界应用中的可行性和效率。
{"title":"How can the holder trust the verifier? A CP-ABPRE-based solution to control the access to claims in a Self-Sovereign-Identity scenario","authors":"","doi":"10.1016/j.bcra.2024.100196","DOIUrl":"10.1016/j.bcra.2024.100196","url":null,"abstract":"<div><p>The interest in Self-Sovereign Identity (SSI) in research, industry, and governments is rapidly increasing. SSI is a paradigm where users hold their identity and credentials issued by authorized entities. SSI is revolutionizing the concept of digital identity and enabling the definition of a trust framework wherein a service provider (verifier) validates the claims presented by a user (holder) for accessing services. However, current SSI solutions primarily focus on the presentation and verification of claims, overlooking a dual aspect: ensuring that the verifier is authorized to access the holder's claims. Addressing this gap, this paper introduces an innovative SSI-based solution that integrates decentralized wallets with Ciphertext-Policy Attribute-Based Proxy Re-Encryption (CP-ABPRE). This combination effectively addresses the challenge of verifier authorization. Our solution, implemented on the Ethereum platform, enhances accountability by notarizing key operations through a smart contract. This paper also offers a prototype demonstrating the practicality of the proposed approach. Furthermore, it provides an extensive evaluation of the solution's performance, emphasizing its feasibility and efficiency in real-world applications.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"5 3","pages":"Article 100196"},"PeriodicalIF":6.9,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096720924000095/pdfft?md5=670501a0e4d21da648399fb2a95be292&pid=1-s2.0-S2096720924000095-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140763959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy-aware proof-of-authority: Blockchain consensus for clustered wireless sensor network 能量感知的授权证明:集群无线传感器网络的区块链共识
IF 6.9 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-01 DOI: 10.1016/j.bcra.2024.100211
This study addresses integrating blockchain technology into lightweight devices, specifically clustered Wireless Sensor Networks (WSNs). Integrating blockchain into the WSNs solves the problems of heterogeneity, data integrity, and data confidentiality. However, no blockchain integration considers network lifetime in WSNs. This research focuses on developing a permissioned blockchain system that incorporates a consensus mechanism known as Proof-of-Authority (PoA) within clustered WSNs with two main features. The first feature is to enhance the network lifetime by introducing a rotational selection of block proposers using an Energy-Aware PoA (EA-PoA) weighting mechanism. Known as the Multi-Level Blockchain Model (MLBM), the subsequent feature is to create a hierarchical network model within a blockchain network. The MLBM network comprises both local and master blockchains. Each cluster inside a WSN possesses its local blockchain network. In the MLBM, the local blockchain creates a block on the main blockchain by proposing the headers of every 10 blocks to improve data integrity. Each local blockchain has its leader, which can increase block production. The results show that the proposed solution can overcome traditional PoA performance and is suitable for clustered WSNs. In terms of lifetime, the EA-PoA selection method can extend the network lifetime by up to 10%. In addition, the MLBM can increase block production by up to twice each additional cluster compared to a single blockchain network used in traditional PoA.
本研究探讨将区块链技术集成到轻量级设备中,特别是集群无线传感器网络(WSN)。将区块链集成到 WSN 中可以解决异构性、数据完整性和数据保密性等问题。然而,没有任何区块链集成考虑到 WSN 的网络寿命。本研究的重点是开发一个许可区块链系统,该系统结合了集群 WSN 中的共识机制,即权威证明(PoA),具有两个主要特点。第一个特点是通过使用能量感知 PoA(EA-PoA)加权机制对区块提议者进行轮流选择,从而提高网络寿命。被称为多级区块链模型(MLBM)的后续功能是在区块链网络中创建一个分级网络模型。MLBM 网络包括本地区块链和主区块链。WSN 中的每个集群都拥有自己的本地区块链网络。在 MLBM 中,本地区块链通过每 10 个区块链头的提议在主区块链上创建一个区块,以提高数据完整性。每个本地区块链都有自己的领导者,这可以提高区块产量。结果表明,所提出的解决方案可以克服传统的 PoA 性能,适用于集群 WSN。在寿命方面,EA-PoA 选择方法可以延长网络寿命达 10%。此外,与传统 PoA 中使用的单个区块链网络相比,MLBM 可以将每个额外集群的区块产量最多提高两倍。
{"title":"Energy-aware proof-of-authority: Blockchain consensus for clustered wireless sensor network","authors":"","doi":"10.1016/j.bcra.2024.100211","DOIUrl":"10.1016/j.bcra.2024.100211","url":null,"abstract":"<div><div>This study addresses integrating blockchain technology into lightweight devices, specifically clustered Wireless Sensor Networks (WSNs). Integrating blockchain into the WSNs solves the problems of heterogeneity, data integrity, and data confidentiality. However, no blockchain integration considers network lifetime in WSNs. This research focuses on developing a permissioned blockchain system that incorporates a consensus mechanism known as Proof-of-Authority (PoA) within clustered WSNs with two main features. The first feature is to enhance the network lifetime by introducing a rotational selection of block proposers using an Energy-Aware PoA (EA-PoA) weighting mechanism. Known as the Multi-Level Blockchain Model (MLBM), the subsequent feature is to create a hierarchical network model within a blockchain network. The MLBM network comprises both local and master blockchains. Each cluster inside a WSN possesses its local blockchain network. In the MLBM, the local blockchain creates a block on the main blockchain by proposing the headers of every 10 blocks to improve data integrity. Each local blockchain has its leader, which can increase block production. The results show that the proposed solution can overcome traditional PoA performance and is suitable for clustered WSNs. In terms of lifetime, the EA-PoA selection method can extend the network lifetime by up to 10%. In addition, the MLBM can increase block production by up to twice each additional cluster compared to a single blockchain network used in traditional PoA.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"5 3","pages":"Article 100211"},"PeriodicalIF":6.9,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141397258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Expedition to the blockchain application potential for higher education institutions 探索高等教育机构的区块链应用潜力
IF 6.9 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-01 DOI: 10.1016/j.bcra.2024.100203
Matthias Gottlieb , Christina Deutsch , Felix Hoops , Hans Pongratz , Helmut Krcmar
In the education sector, blockchain is currently at the end of the peak of inflated expectations in Gartner’s Hype Cycle. Thus, it is crucial to understand whether this technology meets the expectations of Higher Education Institutions (HEIs). We go on an expedition to identify blockchain application scenarios and its potential for HEI administration—the universities are digitalized to just 23.3%.
Current information systems research addresses classifications of blockchain-based projects (application level) rather than their technical realization (protocol level). Thus, when evaluating blockchain application scenarios in HEI administration, we intensively consider the technical side of blockchain-based projects. We perform a three-step approach: (1) systematic literature review, (2) qualitative exploratory semi-structured interviews to supplement information on market-ready solutions, and (3) an evaluation of the potential of the blockchain-based projects identified, based on HEI administration requirements.
We find that the leading blockchain application scenarios are credential verification and record-sharing. At the protocol level, we obtain equivocal results regarding the technical realization of projects, e.g., their underlying blockchain types and storage models. At the application level, when discussing the potential of different projects, we find that most of them address adaptability, complexity decomposition, and cost reduction requirements between HEIs; interest diversity and stakeholder collaboration between HEIs and business actors; privacy and trust between HEIs and students.
在教育领域,区块链目前正处于 Gartner Hype Cycle 中夸大期望的顶峰末期。因此,了解这项技术是否符合高等教育机构(HEIs)的期望至关重要。目前的信息系统研究针对的是基于区块链的项目分类(应用层面),而不是其技术实现(协议层面)。因此,在评估高校管理中的区块链应用场景时,我们着重考虑了基于区块链项目的技术层面。我们采取了三步走的方法:(1)系统性文献综述;(2)定性探索性半结构式访谈,以补充市场上已有解决方案的信息;(3)根据高等院校管理要求,评估已确定的基于区块链项目的潜力。在协议层面,我们在项目的技术实现方面(如底层区块链类型和存储模型)获得了不确定的结果。在应用层面,当讨论不同项目的潜力时,我们发现大多数项目都能满足高等院校之间的适应性、复杂性分解和降低成本要求;高等院校和商业参与者之间的利益多样性和利益相关者合作;高等院校和学生之间的隐私和信任。
{"title":"Expedition to the blockchain application potential for higher education institutions","authors":"Matthias Gottlieb ,&nbsp;Christina Deutsch ,&nbsp;Felix Hoops ,&nbsp;Hans Pongratz ,&nbsp;Helmut Krcmar","doi":"10.1016/j.bcra.2024.100203","DOIUrl":"10.1016/j.bcra.2024.100203","url":null,"abstract":"<div><div>In the education sector, blockchain is currently at the end of the peak of inflated expectations in Gartner’s Hype Cycle. Thus, it is crucial to understand whether this technology meets the expectations of Higher Education Institutions (HEIs). We go on an expedition to identify blockchain application scenarios and its potential for HEI administration—the universities are digitalized to just 23.3%.</div><div>Current information systems research addresses classifications of blockchain-based projects (application level) rather than their technical realization (protocol level). Thus, when evaluating blockchain application scenarios in HEI administration, we intensively consider the technical side of blockchain-based projects. We perform a three-step approach: (1) systematic literature review, (2) qualitative exploratory semi-structured interviews to supplement information on market-ready solutions, and (3) an evaluation of the potential of the blockchain-based projects identified, based on HEI administration requirements.</div><div>We find that the leading blockchain application scenarios are credential verification and record-sharing. At the protocol level, we obtain equivocal results regarding the technical realization of projects, e.g., their underlying blockchain types and storage models. At the application level, when discussing the potential of different projects, we find that most of them address adaptability, complexity decomposition, and cost reduction requirements between HEIs; interest diversity and stakeholder collaboration between HEIs and business actors; privacy and trust between HEIs and students.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"5 3","pages":"Article 100203"},"PeriodicalIF":6.9,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096720924000162/pdfft?md5=8e0b84cecf19054cf2bb2d432145337e&pid=1-s2.0-S2096720924000162-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142316282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Partial pre-image attack on Proof-of-Work based blockchains 对基于工作证明的区块链的部分预映像攻击
IF 6.9 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-01 DOI: 10.1016/j.bcra.2024.100194

Blockchain is a type of distributed ledger technology that consists of a growing list of records, called blocks, that are securely linked together using cryptography. Each blockchain-based solution deploys a specific consensus algorithm that guarantees the consistency of the ledger over time. The most famous, and yet claimed to be the most secure, is the Proof-of-Work (PoW) consensus algorithm. In this paper, we revisit the fundamental calculations and assumptions of this algorithm, originally presented in the Bitcoin white paper. We break down its claimed calculations in order to better understand the underlying assumptions of the proposal. We also propose a novel formalization model of the PoW mining problem using the Birthday paradox. We utilize this model to formalize and analyze partial pre-image attacks on PoW-based blockchains, with formal analysis that confirms the experimental results and the previously proposed implications. We build on those analyses and propose new concepts for benchmarking the security of PoW-based systems, including Critical Difficulty and Critical Difficulty per given portion. Our calculations result in several important findings, including the profitability of launching partial pre-image attacks on PoW-based blockchains, once the mining puzzle difficulty reaches a given threshold. Specifically, for any compromised portion of the network (q<0.5; honest majority assumption still holds), the attack is formally proven profitable once the PoW mining puzzle difficulty reaches 56 leading zeros.

区块链是一种分布式账本技术,由不断增加的记录列表(称为区块)组成,这些记录通过加密技术安全地连接在一起。每个基于区块链的解决方案都部署了特定的共识算法,以保证账本的长期一致性。最有名、也号称最安全的共识算法是工作证明(PoW)算法。在本文中,我们将重新审视这种算法的基本计算和假设,这些计算和假设最初是在比特币白皮书中提出的。我们对其声称的计算进行了分解,以便更好地理解该提案的基本假设。我们还利用生日悖论为 PoW 挖矿问题提出了一个新的形式化模型。我们利用该模型来形式化和分析对基于 PoW 的区块链的部分预映像攻击,形式化分析证实了实验结果和之前提出的影响。我们以这些分析为基础,提出了基于 PoW 的系统安全性基准的新概念,包括临界难度和每个给定部分的临界难度。我们的计算得出了几个重要发现,包括一旦挖矿谜题难度达到给定阈值,对基于 PoW 的区块链发起部分预映像攻击的盈利能力。具体来说,对于网络的任何受损部分(q<0.5;诚实多数假设仍然成立),一旦 PoW 挖矿谜题难度达到 56 个前导零,攻击就被正式证明是有利可图的。
{"title":"Partial pre-image attack on Proof-of-Work based blockchains","authors":"","doi":"10.1016/j.bcra.2024.100194","DOIUrl":"10.1016/j.bcra.2024.100194","url":null,"abstract":"<div><p>Blockchain is a type of distributed ledger technology that consists of a growing list of records, called blocks, that are securely linked together using cryptography. Each blockchain-based solution deploys a specific consensus algorithm that guarantees the consistency of the ledger over time. The most famous, and yet claimed to be the most secure, is the Proof-of-Work (PoW) consensus algorithm. In this paper, we revisit the fundamental calculations and assumptions of this algorithm, originally presented in the Bitcoin white paper. We break down its claimed calculations in order to better understand the underlying assumptions of the proposal. We also propose a novel formalization model of the PoW mining problem using the Birthday paradox. We utilize this model to formalize and analyze partial pre-image attacks on PoW-based blockchains, with formal analysis that confirms the experimental results and the previously proposed implications. We build on those analyses and propose new concepts for benchmarking the security of PoW-based systems, including Critical Difficulty and Critical Difficulty per given portion. Our calculations result in several important findings, including the profitability of launching partial pre-image attacks on PoW-based blockchains, once the mining puzzle difficulty reaches a given threshold. Specifically, for any compromised portion of the network (<span><math><mi>q</mi><mo>&lt;</mo><mn>0.5</mn></math></span>; honest majority assumption still holds), the attack is formally proven profitable once the PoW mining puzzle difficulty reaches 56 leading zeros.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"5 3","pages":"Article 100194"},"PeriodicalIF":6.9,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096720924000071/pdfft?md5=f39562da38a21729770c2b928c68923e&pid=1-s2.0-S2096720924000071-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140268941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analyzing voting power in decentralized governance: Who controls DAOs? 分析去中心化治理中的投票权:谁控制着 DAO?
IF 6.9 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-01 DOI: 10.1016/j.bcra.2024.100208
Robin Fritsch, Marino Müller, Roger Wattenhofer
We empirically study the state of three prominent DAO governance systems on the Ethereum blockchain: Compound, Uniswap and Ethereum name service (ENS). In particular, we examine how the voting power is distributed in these systems. Using a comprehensive dataset of all governance token holders, delegates, proposals, and votes, we analyze who holds the voting power and how this power is being used to influence governance decisions. While we reveal that the majority of voting power is concentrated in the hands of a small number of addresses, we rarely observe these powerful entities overturning a vote by choosing a different outcome than that of the overall community and less influential voters.
我们对以太坊区块链上三个著名 DAO 治理系统的状态进行了实证研究:Compound、Uniswap 和以太坊名称服务 (ENS)。特别是,我们研究了投票权在这些系统中是如何分配的。利用所有治理代币持有者、代表、提案和投票的综合数据集,我们分析了谁拥有投票权,以及如何利用这种权力来影响治理决策。虽然我们发现大部分投票权集中在少数地址手中,但我们很少观察到这些强大的实体通过选择与整个社区和影响力较小的投票者不同的结果来推翻投票。
{"title":"Analyzing voting power in decentralized governance: Who controls DAOs?","authors":"Robin Fritsch,&nbsp;Marino Müller,&nbsp;Roger Wattenhofer","doi":"10.1016/j.bcra.2024.100208","DOIUrl":"10.1016/j.bcra.2024.100208","url":null,"abstract":"<div><div>We empirically study the state of three prominent DAO governance systems on the Ethereum blockchain: Compound, Uniswap and Ethereum name service (ENS). In particular, we examine how the voting power is distributed in these systems. Using a comprehensive dataset of all governance token holders, delegates, proposals, and votes, we analyze who holds the voting power and how this power is being used to influence governance decisions. While we reveal that the majority of voting power is concentrated in the hands of a small number of addresses, we rarely observe these powerful entities overturning a vote by choosing a different outcome than that of the overall community and less influential voters.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"5 3","pages":"Article 100208"},"PeriodicalIF":6.9,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142320258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Prism blockchain enabled Internet of Things with deep reinforcement learning 利用深度强化学习支持物联网的 Prism 区块链
IF 6.9 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-01 DOI: 10.1016/j.bcra.2024.100205
This paper presents a Deep Reinforcement Learning (DRL) based Internet of Things (IoT)-enabled Prism blockchain. The recent advancements in the field of IoT motivate the development of a secure infrastructure for storing and sharing vast amounts of data. Blockchain, a distributed and immutable ledger, is best known as a potential solution to data security and privacy for the IoT. The scalability of blockchain, which should optimize the throughput and handle the dynamics of the IoT environment, becomes a challenge due to the enormous amount of IoT data. The critical challenge in scaling blockchain is to guarantee decentralization, latency, and security of the system while optimizing the transaction throughput. This paper presents a DRL-based performance optimization for blockchain-enabled IoT. We consider one of the recent promising blockchains, Prism, as the underlying blockchain system because of its good performance guarantees. We integrate the IoT data into Prism blockchain and optimize the performance of the system by leveraging the Proximal Policy Optimization (PPO) method. The DRL method helps to optimize the blockchain parameters like mining rate and mined blocks to adapt to the environment dynamics of the IoT system. Our results show that the proposed method can improve the throughput of Prism blockchain-based IoT systems while preserving Prism performance guarantees. Our scheme can achieve 1.5 times more system rewards than IoT-integrated Prism. In our experimental setup, the proposed scheme could improve the average throughput of the system by about 6,000 transactions per second compared to Prism.
本文介绍了一种基于深度强化学习(DRL)、支持物联网(IoT)的棱镜区块链。物联网领域的最新进展推动了用于存储和共享海量数据的安全基础设施的发展。区块链是一种分布式、不可更改的分类账,是物联网数据安全和隐私的潜在解决方案。由于物联网数据量巨大,区块链的可扩展性成为一项挑战,它应优化吞吐量并处理物联网环境的动态变化。扩展区块链的关键挑战是在优化交易吞吐量的同时保证系统的去中心化、延迟和安全性。本文针对区块链物联网提出了一种基于 DRL 的性能优化方法。我们将最近很有前途的区块链之一 Prism 作为底层区块链系统,因为它具有良好的性能保证。我们将物联网数据集成到 Prism 区块链中,并利用近端策略优化(PPO)方法优化系统性能。DRL 方法有助于优化挖矿率和已挖区块等区块链参数,以适应物联网系统的环境动态。我们的研究结果表明,所提出的方法可以提高基于 Prism 区块链的物联网系统的吞吐量,同时保留 Prism 的性能保证。与物联网集成 Prism 相比,我们的方案可实现 1.5 倍的系统奖励。在我们的实验设置中,与 Prism 相比,我们提出的方案可以将系统的平均吞吐量提高约 6000 笔/秒。
{"title":"Prism blockchain enabled Internet of Things with deep reinforcement learning","authors":"","doi":"10.1016/j.bcra.2024.100205","DOIUrl":"10.1016/j.bcra.2024.100205","url":null,"abstract":"<div><div>This paper presents a Deep Reinforcement Learning (DRL) based Internet of Things (IoT)-enabled Prism blockchain. The recent advancements in the field of IoT motivate the development of a secure infrastructure for storing and sharing vast amounts of data. Blockchain, a distributed and immutable ledger, is best known as a potential solution to data security and privacy for the IoT. The scalability of blockchain, which should optimize the throughput and handle the dynamics of the IoT environment, becomes a challenge due to the enormous amount of IoT data. The critical challenge in scaling blockchain is to guarantee decentralization, latency, and security of the system while optimizing the transaction throughput. This paper presents a DRL-based performance optimization for blockchain-enabled IoT. We consider one of the recent promising blockchains, Prism, as the underlying blockchain system because of its good performance guarantees. We integrate the IoT data into Prism blockchain and optimize the performance of the system by leveraging the Proximal Policy Optimization (PPO) method. The DRL method helps to optimize the blockchain parameters like mining rate and mined blocks to adapt to the environment dynamics of the IoT system. Our results show that the proposed method can improve the throughput of Prism blockchain-based IoT systems while preserving Prism performance guarantees. Our scheme can achieve 1.5 times more system rewards than IoT-integrated Prism. In our experimental setup, the proposed scheme could improve the average throughput of the system by about 6,000 transactions per second compared to Prism.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"5 3","pages":"Article 100205"},"PeriodicalIF":6.9,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096720924000186/pdfft?md5=9d5944398ef57f0ec758734d7337bddd&pid=1-s2.0-S2096720924000186-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141050211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy-preserving pathological data sharing among multiple remote parties 在多个远程方之间共享病理数据时保护隐私
IF 6.9 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-01 DOI: 10.1016/j.bcra.2024.100204

The sharing of pathological data is highly important in various applications, such as remote diagnosis, graded diagnosis, illness treatment, and specialist system development. However, ensuring reliable, secure, privacy-preserving, and efficient sharing of pathological data poses significant challenges. This paper presents a novel solution that leverages blockchain technology to ensure reliability in pathological data sharing. Additionally, it employs conditional proxy re-encryption (C-PRE) and public key encryption with equality test technology to control the scope and preserve the privacy of shared data. To assess the practicality of our solution, we implemented a prototype system using Hyperledger Fabric and conducted evaluations with various metrics. We also compared the solution with relevant schemes. The results demonstrate that the proposed solution effectively meets the requirements for pathological data sharing and is practical in production scenarios.

病理数据共享在远程诊断、分级诊断、疾病治疗和专家系统开发等各种应用中都非常重要。然而,确保可靠、安全、保护隐私和高效地共享病理数据是一项重大挑战。本文提出了一种新颖的解决方案,利用区块链技术确保病理数据共享的可靠性。此外,它还采用了条件代理重加密(C-PRE)和公钥加密与平等测试技术,以控制共享数据的范围并保护其隐私。为了评估解决方案的实用性,我们使用 Hyperledger Fabric 实现了一个原型系统,并用各种指标进行了评估。我们还将该解决方案与相关方案进行了比较。结果表明,所提出的解决方案有效地满足了病理数据共享的要求,并在生产场景中切实可行。
{"title":"Privacy-preserving pathological data sharing among multiple remote parties","authors":"","doi":"10.1016/j.bcra.2024.100204","DOIUrl":"10.1016/j.bcra.2024.100204","url":null,"abstract":"<div><p>The sharing of pathological data is highly important in various applications, such as remote diagnosis, graded diagnosis, illness treatment, and specialist system development. However, ensuring reliable, secure, privacy-preserving, and efficient sharing of pathological data poses significant challenges. This paper presents a novel solution that leverages blockchain technology to ensure reliability in pathological data sharing. Additionally, it employs conditional proxy re-encryption (C-PRE) and public key encryption with equality test technology to control the scope and preserve the privacy of shared data. To assess the practicality of our solution, we implemented a prototype system using Hyperledger Fabric and conducted evaluations with various metrics. We also compared the solution with relevant schemes. The results demonstrate that the proposed solution effectively meets the requirements for pathological data sharing and is practical in production scenarios.</p></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"5 3","pages":"Article 100204"},"PeriodicalIF":6.9,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096720924000174/pdfft?md5=2f0d8f88a5acc867cc2092153e8fba03&pid=1-s2.0-S2096720924000174-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141045558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Blockchain-Research and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1