With the development of sharded blockchains,high cross-shard rates and load imbalance have emerged as major challenges.Account partitioning based on hashing and real-time load faces the issue of high cross-shard rates...With the development of sharded blockchains,high cross-shard rates and load imbalance have emerged as major challenges.Account partitioning based on hashing and real-time load faces the issue of high cross-shard rates.Account partitioning based on historical transaction graphs is effective in reducing cross-shard rates but suffers from load imbalance and limited adaptability to dynamic workloads.Meanwhile,because of the coupling between consensus and execution,a target shard must receive both the partitioned transactions and the partitioned accounts before initiating consensus and execution.However,we observe that transaction partitioning and subsequent consensus do not require actual account data but only need to determine the relative partition order between shards.Therefore,we propose a novel sharded blockchain,called HATLedger,based on Hybrid Account and Transaction partitioning.First,HATLedger proposes building a future transaction graph to detect upcoming hotspot accounts and making more precise account partitioning to reduce transaction cross-shard rates.In the event of an impending overload,the source shard employs simulated partition transactions to specify the partition order across multiple target shards,thereby rapidly partitioning the pending transactions.The target shards can reach consensus on received transactions without waiting for account data.The source shard subsequently sends the account data to the corresponding target shards in the order specified by the previously simulated partition transactions.Based on real transaction history from Ethereum,we conducted extensive sharding scalability experiments.By maintaining low cross-shard rates and a relatively balanced load distribution,HATLedger achieves throughput improvements of 2.2x,1.9x,and 1.8x over SharPer,Shard Scheduler,and TxAllo,respectively,significantly enhancing efficiency and scalability.展开更多
In the blockchain,the consensus mechanism plays a key role in maintaining the security and legitimation of contents recorded in the blocks.Various blockchain consensus mechanisms have been proposed.However,there is no...In the blockchain,the consensus mechanism plays a key role in maintaining the security and legitimation of contents recorded in the blocks.Various blockchain consensus mechanisms have been proposed.However,there is no technical analysis and comparison as a guideline to determine which type of consensus mechanism should be adopted in a specific scenario/application.To this end,this work investigates three mainstream consensus mechanisms in the blockchain,namely,Proof of Work(PoW),Proof of Stake(PoS),and Direct Acyclic Graph(DAG),and identifies their performances in terms of the average time to generate a new block,the confirmation delay,the Transaction Per Second(TPS)and the confirmation failure probability.The results show that the consensus process is affected by both network resource(computation power/coin age,buffer size)and network load conditions.In addition,it shows that PoW and PoS are more sensitive to the change of network resource while DAG is more sensitive to network load conditions.展开更多
In this paper,we deal with questions related to blockchains in complex Internet of Things(IoT)-based ecosystems.Such ecosystems are typically composed of IoT devices,edge devices,cloud computing software services,as w...In this paper,we deal with questions related to blockchains in complex Internet of Things(IoT)-based ecosystems.Such ecosystems are typically composed of IoT devices,edge devices,cloud computing software services,as well as people,who are decision makers in scenarios such as smart cities.Many decisions related to analytics can be based on data coming from IoT sensors,software services,and people.However,they are typically based on different levels of abstraction and granularity.This poses a number of challenges when multiple blockchains are used together with smart contracts.This work proposes to apply our concept of elasticity to smart contracts and thereby enabling analytics in and between multiple blockchains in the context of IoT.We propose a reference architecture for Elastic Smart Contracts and evaluate the approach in a smart city scenario,discussing the benefits in terms of performance and self-adaptability of our solution.展开更多
The blockchain technology has been applied to wide areas.However,the open and transparent properties of the blockchains pose serious challenges to users’privacy.Among all the schemes for the privacy protection,the ze...The blockchain technology has been applied to wide areas.However,the open and transparent properties of the blockchains pose serious challenges to users’privacy.Among all the schemes for the privacy protection,the zero-knowledge proof algorithm conceals most of the private information in a transaction,while participants of the blockchain can validate this transaction without the private information.However,current schemes are only aimed at blockchains with the UTXO model,and only one type of assets circulates on these blockchains.Based on the zero-knowledge proof algorithm,this paper proposes a privacy protection scheme for blockchains that use the account and multi-asset model.We design the transaction structure,anonymous addresses and anonymous asset metadata,and also propose the methods of the asset transfer and double-spending detection.The zk-SNARKs algorithm is used to generate and to verify the zero-knowledge proof.And finally,we conduct the experiments to evaluate our scheme.展开更多
Background:In recent years,blockchain technology has attracted considerable attention.It records cryptographic transactions in a public ledger that is difficult to alter and compromise because of the distributed conse...Background:In recent years,blockchain technology has attracted considerable attention.It records cryptographic transactions in a public ledger that is difficult to alter and compromise because of the distributed consensus.As a result,blockchain is believed to resist fraud and hacking.Results:This work explores the types of fraud and malicious activities that can be prevented by blockchain technology and identifies attacks to which blockchain remains vulnerable.Conclusions:This study recommends appropriate defensive measures and calls for further research into the techniques for fighting malicious activities related to blockchains.展开更多
Blockchain is a viable solution to provide data integrity for the enormous volume of 5G IoT social data, while we need to break through the throughput bottleneck of blockchain. Sharding is a promising technology to so...Blockchain is a viable solution to provide data integrity for the enormous volume of 5G IoT social data, while we need to break through the throughput bottleneck of blockchain. Sharding is a promising technology to solve the problem of low throughput in blockchains. However, cross-shard communication hinders the effective improvement of blockchain throughput. Therefore, it is critical to reasonably allocate transactions to different shards to improve blockchain throughput. Existing research on blockchain sharding mainly focuses on shards formation, configuration, and consensus, while ignoring the negative impact of cross-shard communication on blockchain throughput. Aiming to maximize the throughput of transaction processing, we study how to allocate blockchain transactions to shards in this paper. We propose an Associated Transaction assignment algorithm based on Closest Fit (ATCF). ATCF classifies associated transactions into transaction groups which are then assigned to different shards in the non-ascending order of transaction group sizes periodically. Within each epoch, ATCF tries to select a shard that can handle all the transactions for each transaction group. If there are multiple such shards, ATCF selects the shard with the remaining processing capacity closest to the number of transactions in the transaction group. When no such shard exists, ATCF chooses the shard with the largest remaining processing capacity for the transaction group. The transaction groups that cannot be completely processed within the current epoch will be allocated in the subsequent epochs. We prove that ATCF is a 2-approximation algorithm for the associated transaction assignment problem. Simulation results show that ATCF can effectively improve the blockchain throughput and reduce the number of cross-shard transactions.展开更多
Cloud computing is a collection of distributed storage Network which can provide various services and store the data in the efficient manner.The advantages of cloud computing is its remote access where data can access...Cloud computing is a collection of distributed storage Network which can provide various services and store the data in the efficient manner.The advantages of cloud computing is its remote access where data can accessed in real time using Remote Method Innovation(RMI).The problem of data security in cloud environment is a major concern since the data can be accessed by any time by any user.Due to the lack of providing the efficient security the cloud computing they fail to achieve higher performance in providing the efficient service.To improve the performance in data security,the block chains are used for securing the data in the cloud environment.However,the traditional block chain technique are not suitable to provide efficient security to the cloud data stored in the cloud.In this paper,an efficient user centric block level Attribute Based Encryption(UCBL-ABE)scheme is presented to provide the efficient security of cloud data in cloud environment.The proposed approach performs data transaction by employing the block chain.The proposed system provides efficient privacy with access control to the user access according to the behavior of cloud user using Data Level Access Trust(DLAT).Based on DLAT,the user access has been restricted in the cloud environment.The proposed protocol is implemented in real time using Java programming language and uses IBM cloud.The implementation results justifies that the proposed system can able to provide efficient security to the data present in and cloud and also enhances the cloud performance.展开更多
As the Internet enters the era of big data, massive amounts of data are flooding people’s mobile phones and computers. The emerging self-media industry produces many videos every day, which also exposes many security...As the Internet enters the era of big data, massive amounts of data are flooding people’s mobile phones and computers. The emerging self-media industry produces many videos every day, which also exposes many security issues in digital rights management (DRM). The works of original creators can easily be infringed on public networks, and it is urgent to protect the copyright of digital content. Traditional digital rights management (TDRM) has many problems, including unqualified copyright confirmation, difficulty obtaining evidence, long time-consuming, high price, and high centralization. The combination of blockchain technology and digital rights management is one of the most popular blockchain application scenarios, the characteristics of the blockchain match DRM market demand. This paper proposes a registration oracle scheme for digital rights management based on heterogeneous blockchains, HBRO, which uses review and voting as a means to judge whether a work can be registered for copyright. HBRO is more rigorous than TDRM and DDRM in the copyright confirmation stage, rejecting many unnecessary and unqualified contents. In addition, a secure cross-chain solution is used to ensure the integrity and correctness of data transmission on heterogeneous blockchains.展开更多
Blockchain has been widely used in finance,the Internet of Things(IoT),supply chains,and other scenarios as a revolutionary technology.Consensus protocol plays a vital role in blockchain,which helps all participants t...Blockchain has been widely used in finance,the Internet of Things(IoT),supply chains,and other scenarios as a revolutionary technology.Consensus protocol plays a vital role in blockchain,which helps all participants to maintain the storage state consistently.However,with the improvement of network environment complexity and system scale,blockchain development is limited by the performance,security,and scalability of the consensus protocol.To address this problem,this paper introduces the collaborative filtering mechanism commonly used in the recommendation system into the Practical Byzantine Fault Tolerance(PBFT)and proposes a Byzantine fault-tolerant(BFT)consensus protocol based on collaborative filtering recommendation(CRBFT).Specifically,an improved collaborative filtering recommendation method is designed to use the similarity between a node’s recommendation opinions and those of the recommender as a basis for determining whether to adopt the recommendation opinions.This can amplify the recommendation voice of good nodes,weaken the impact of cunningmalicious nodes on the trust value calculation,andmake the calculated resultsmore accurate.In addition,the nodes are given voting power according to their trust value,and a weight randomelection algorithm is designed and implemented to reduce the risk of attack.The experimental results show that CRBFT can effectively eliminate various malicious nodes and improve the performance of blockchain systems in complex network environments,and the feasibility of CRBFT is also proven by theoretical analysis.展开更多
With the rapid development of the Internet of Things(IoT),there is an increasing need for interac-tion between different networks.In order to improve the level of interconnection,especially the interoper-ability of us...With the rapid development of the Internet of Things(IoT),there is an increasing need for interac-tion between different networks.In order to improve the level of interconnection,especially the interoper-ability of users/devices between different nodes is very important.In the IoT heterogeneous blockchain sce-nario,how to ensure the legitimacy of the chain and how to confirm the identity of cross-chain informa-tion users/devices become the key issues to be solved for blockchain interoperability.In this paper,we pro-pose a secure and trusted interoperability mechanism for IoT based on heterogeneous chains to improve the security of blockchain interoperability.In this mecha-nism,a primary sidechain architecture supporting au-thentication at both ends of the heterogeneous chain is designed.In addition,a distributed gateway archi-tecture is proposed for cross-chain authentication and protocol conversion.The security and performance analysis shows that our scheme is feasible and effec-tive in improving the security of cross-chain opera-tions in IoT.展开更多
Edge blockchains,the blockchains running on edge computing infrastructures,have attracted a lot of attention in recent years.Thanks to data privacy,scalable computing resources,and distributed topology nature of edge ...Edge blockchains,the blockchains running on edge computing infrastructures,have attracted a lot of attention in recent years.Thanks to data privacy,scalable computing resources,and distributed topology nature of edge computing,edge blockchains are considered promising solutions to facilitating future blockchain applications.However,edge blockchains face unique security issues caused by the de⁃ployment of vulnerable edge devices and networks,including supply chain attacks and insecure consensus offloading,which are mostly not well studied in previous literature.This paper is the first survey that discusses the attacks and countermeasures of edge blockchains.We first summarize the three-layer architecture of edge blockchains:blockchain management,blockchain consensus,and blockchain lightweight cli⁃ent.We then describe seven specific attacks on edge blockchain components and discuss the countermeasures.At last,we provide future re⁃search directions on securing edge blockchains.This survey will act as a guideline for researchers and developers to design and implement se⁃cure edge blockchains.展开更多
Consensus protocols are used for the distributed management of large databases in an environment without trust among participants.The choice of a specific protocol depends on the purpose and characteristics of the sys...Consensus protocols are used for the distributed management of large databases in an environment without trust among participants.The choice of a specific protocol depends on the purpose and characteristics of the system itself.The subjects of the paper are consensus protocols in permissioned blockchains.The objective of this paper is to identify functional advantages and disadvantages of observed protocol.The analysis covers a total of six consensus protocols for permissioned blockchains.The following characteristics were compared:security,trust among participants,throughput and scalability.The results show that no protocol shows absolute dominance in all aspects of the comparison.Paxos and Raft are intended for systems in which there is no suspicion of unreliable users,but only the problem of a temporary shutdown.Practical Byzantine Fault Tolerance is intended for systems with a small number of nodes.Federated Byzantine Fault Tolerance shows better scalability and is more suitable for large systems,but can withstand a smaller number of malicious nodes.Proof-of-authority can withstand the largest number of malicious nodes without interfering with the functioning of the system.When choosing a consensus protocol for a blockchain application,one should take into account priority characteristics.展开更多
Despite the growing attention on blockchain,phishing activities have surged,particularly on newly established chains.Acknowledging the challenge of limited intelligence in the early stages of new chains,we propose ADA...Despite the growing attention on blockchain,phishing activities have surged,particularly on newly established chains.Acknowledging the challenge of limited intelligence in the early stages of new chains,we propose ADA-Spearan automatic phishing detection model utilizing adversarial domain adaptive learning which symbolizes the method’s ability to penetrate various heterogeneous blockchains for phishing detection.The model effectively identifies phishing behavior in new chains with limited reliable labels,addressing challenges such as significant distribution drift,low attribute overlap,and limited inter-chain connections.Our approach includes a subgraph construction strategy to align heterogeneous chains,a layered deep learning encoder capturing both temporal and spatial information,and integrated adversarial domain adaptive learning in end-to-end model training.Validation in Ethereum,Bitcoin,and EOSIO environments demonstrates ADA-Spear’s effectiveness,achieving an average F1 score of 77.41 on new chains after knowledge transfer,surpassing existing detection methods.展开更多
As healthcare systems increasingly embrace digitalization,effective management of electronic health records(EHRs)has emerged as a critical priority,particularly in inpatient settings where data sensitivity and realtim...As healthcare systems increasingly embrace digitalization,effective management of electronic health records(EHRs)has emerged as a critical priority,particularly in inpatient settings where data sensitivity and realtime access are paramount.Traditional EHR systems face significant challenges,including unauthorized access,data breaches,and inefficiencies in tracking follow-up appointments,which heighten the risk of misdiagnosis and medication errors.To address these issues,this research proposes a hybrid blockchain-based solution for securely managing EHRs,specifically designed as a framework for tracking inpatient follow-ups.By integrating QR codeenabled data access with a blockchain architecture,this innovative approach enhances privacy protection,data integrity,and auditing capabilities,while facilitating swift and real-time data retrieval.The architecture adheres to Role-Based Access Control(RBAC)principles and utilizes robust encryption techniques,including SHA-256 and AES-256-CBC,to secure sensitive information.A comprehensive threat model outlines trust boundaries and potential adversaries,complemented by a validated data transmission protocol.Experimental results demonstrate that the framework remains reliable in concurrent access scenarios,highlighting its efficiency and responsiveness in real-world applications.This study emphasizes the necessity for hybrid solutions in managing sensitive medical information and advocates for integrating blockchain technology and QR code innovations into contemporary healthcare systems.展开更多
Practical byzantine fault tolerance(PBFT)can reduce energy consumption and achieve high throughput compared with the traditional PoW algorithm,which is more suitable for a strongly consistent consortium blockchain.How...Practical byzantine fault tolerance(PBFT)can reduce energy consumption and achieve high throughput compared with the traditional PoW algorithm,which is more suitable for a strongly consistent consortium blockchain.However,due to the frequent communication among nodes,PBFT cannot realize scalability in large-scale networks.Existing PBFTbased algorithms still ignore performance and security.Therefore,we propose a secure and efficient practical byzantine fault tolerance based on double layers and multi copies(DM-PBFT).We design a reputation evaluation and node scheduling method for DMPBFT.And then we propose an adaptive node scheduling strategy based on the derived threshold values after analyzing the system communication complexity and security.Combining the above research,a node dynamic adjustment mechanism is proposed to freeze or adjust the node operation status according to the system environment.Simulation experiments show that the proposed mechanism can improve efficiency and increase the system’s throughput.展开更多
Industrial Cyber-Physical Systems(ICPSs)play a vital role in modern industries by providing an intellectual foundation for automated operations.With the increasing integration of information-driven processes,ensuring ...Industrial Cyber-Physical Systems(ICPSs)play a vital role in modern industries by providing an intellectual foundation for automated operations.With the increasing integration of information-driven processes,ensuring the security of Industrial Control Production Systems(ICPSs)has become a critical challenge.These systems are highly vulnerable to attacks such as denial-of-service(DoS),eclipse,and Sybil attacks,which can significantly disrupt industrial operations.This work proposes an effective protection strategy using an Artificial Intelligence(AI)-enabled Smart Contract(SC)framework combined with the Heterogeneous Barzilai-Borwein Support Vector(HBBSV)method for industrial-based CPS environments.The approach reduces run time and minimizes the probability of attacks.Initially,secured ICPSs are achieved through a comprehensive exchange of views on production plant strategies for condition monitoring using SC and blockchain(BC)integrated within a BC network.The SC executes the HBBSV strategy to verify the security consensus.The Barzilai-Borwein Support Vectorized algorithm computes abnormal attack occurrence probabilities to ensure that components operate within acceptable production line conditions.When a component remains within these conditions,no security breach occurs.Conversely,if a component does not satisfy the condition boundaries,a security lapse is detected,and those components are isolated.The HBBSV method thus strengthens protection against DoS,eclipse,and Sybil attacks.Experimental results demonstrate that the proposed HBBSV approach significantly improves security by enhancing authentication accuracy while reducing run time and authentication time compared to existing techniques.展开更多
The increased connectivity and reliance on digital technologies have exposed smart transportation systems to various cyber threats,making intrusion detection a critical aspect of ensuring their secure operation.Tradit...The increased connectivity and reliance on digital technologies have exposed smart transportation systems to various cyber threats,making intrusion detection a critical aspect of ensuring their secure operation.Traditional intrusion detection systems have limitations in terms of centralized architecture,lack of transparency,and vulnerability to single points of failure.This is where the integration of blockchain technology with signature-based intrusion detection can provide a robust and decentralized solution for securing smart transportation systems.This study tackles the issue of database manipulation attacks in smart transportation networks by proposing a signaturebased intrusion detection system.The introduced signature facilitates accurate detection and systematic classification of attacks,enabling categorization according to their severity levels within the transportation infrastructure.Through comparative analysis,the research demonstrates that the blockchain-based IDS outperforms traditional approaches in terms of security,resilience,and data integrity.展开更多
With the rapid development of intelligent cyber-physical systems(ICPS),diverse services with varying Quality of Service(QoS)requirements have brought great challenges to traditional network resource allocation.Further...With the rapid development of intelligent cyber-physical systems(ICPS),diverse services with varying Quality of Service(QoS)requirements have brought great challenges to traditional network resource allocation.Furthermore,given the open environment and a multitude of devices,enhancing the security of ICPS is an urgent concern.To address these issues,this paper proposes a novel trusted virtual network embedding(T-VNE)approach for ICPS based combining blockchain and edge computing technologies.Additionally,the proposed algorithm leverages a deep reinforcement learning(DRL)model to optimize decision-making processes.It employs the policygradient-based agent to compute candidate embedding nodes and utilizes a breadth-first search(BFS)algorithm to determine the optimal embedding paths.Finally,through simulation experiments,the efficacy of the proposed method was validated,demonstrating outstanding performance in terms of security,revenue generation,and virtual network request(VNR)acceptance rate.展开更多
As blockchain technology rapidly evolves,smart contracts have seen widespread adoption in financial transactions and beyond.However,the growing prevalence of malicious Ponzi scheme contracts presents serious security ...As blockchain technology rapidly evolves,smart contracts have seen widespread adoption in financial transactions and beyond.However,the growing prevalence of malicious Ponzi scheme contracts presents serious security threats to blockchain ecosystems.Although numerous detection techniques have been proposed,existing methods suffer from significant limitations,such as class imbalance and insufficient modeling of transaction-related semantic features.To address these challenges,this paper proposes an oversampling-based detection framework for Ponzi smart contracts.We enhance the Adaptive Synthetic Sampling(ADASYN)algorithm by incorporating sample proximity to decision boundaries and ensuring realistic sample distributions.This enhancement facilitates the generation of high-quality minority class samples and effectively mitigates class imbalance.In addition,we design a Contract Transaction Graph(CTG)construction algorithm to preserve key transactional semantics through feature extraction from contract code.A graph neural network(GNN)is then applied for classification.This study employs a publicly available dataset from the XBlock platform,consisting of 318 verified Ponzi contracts and 6498 benign contracts.Sourced from real Ethereum deployments,the dataset reflects diverse application scenarios and captures the varied characteristics of Ponzi schemes.Experimental results demonstrate that our approach achieves an accuracy of 96%,a recall of 92%,and an F1-score of 94%in detecting Ponzi contracts,outperforming state-of-the-art methods.展开更多
Amid the increasing demand for data sharing,the need for flexible,secure,and auditable access control mechanisms has garnered significant attention in the academic community.However,blockchain-based ciphertextpolicy a...Amid the increasing demand for data sharing,the need for flexible,secure,and auditable access control mechanisms has garnered significant attention in the academic community.However,blockchain-based ciphertextpolicy attribute-based encryption(CP-ABE)schemes still face cumbersome ciphertext re-encryption and insufficient oversight when handling dynamic attribute changes and cross-chain collaboration.To address these issues,we propose a dynamic permission attribute-encryption scheme for multi-chain collaboration.This scheme incorporates a multiauthority architecture for distributed attribute management and integrates an attribute revocation and granting mechanism that eliminates the need for ciphertext re-encryption,effectively reducing both computational and communication overhead.It leverages the InterPlanetary File System(IPFS)for off-chain data storage and constructs a cross-chain regulatory framework—comprising a Hyperledger Fabric business chain and a FISCO BCOS regulatory chain—to record changes in decryption privileges and access behaviors in an auditable manner.Security analysis shows selective indistinguishability under chosen-plaintext attack(sIND-CPA)security under the decisional q-Parallel Bilinear Diffie-Hellman Exponent Assumption(q-PBDHE).In the performance and experimental evaluations,we compared the proposed scheme with several advanced schemes.The results show that,while preserving security,the proposed scheme achieves higher encryption/decryption efficiency and lower storage overhead for ciphertexts and keys.展开更多
基金funded by the National Key Research and Development Program of China(Grant No.2024YFE0209000)the NSFC(Grant No.U23B2019)。
文摘With the development of sharded blockchains,high cross-shard rates and load imbalance have emerged as major challenges.Account partitioning based on hashing and real-time load faces the issue of high cross-shard rates.Account partitioning based on historical transaction graphs is effective in reducing cross-shard rates but suffers from load imbalance and limited adaptability to dynamic workloads.Meanwhile,because of the coupling between consensus and execution,a target shard must receive both the partitioned transactions and the partitioned accounts before initiating consensus and execution.However,we observe that transaction partitioning and subsequent consensus do not require actual account data but only need to determine the relative partition order between shards.Therefore,we propose a novel sharded blockchain,called HATLedger,based on Hybrid Account and Transaction partitioning.First,HATLedger proposes building a future transaction graph to detect upcoming hotspot accounts and making more precise account partitioning to reduce transaction cross-shard rates.In the event of an impending overload,the source shard employs simulated partition transactions to specify the partition order across multiple target shards,thereby rapidly partitioning the pending transactions.The target shards can reach consensus on received transactions without waiting for account data.The source shard subsequently sends the account data to the corresponding target shards in the order specified by the previously simulated partition transactions.Based on real transaction history from Ethereum,we conducted extensive sharding scalability experiments.By maintaining low cross-shard rates and a relatively balanced load distribution,HATLedger achieves throughput improvements of 2.2x,1.9x,and 1.8x over SharPer,Shard Scheduler,and TxAllo,respectively,significantly enhancing efficiency and scalability.
基金the National Natural Science Foundation of China under Grant 61701059,Grant 61941114,and Grant 61831002,in part by the Fundamental Research Funds for the Central Universities of New TeachersProject,in part by the Chongqing Technological Innovation and Application Development Projects under Grant cstc2019jscx-msxm1322,and in part by the Eighteentg Open Foundation of State Key Lab of Integrated Services Networks of Xidian University under Grant ISN20-05.
文摘In the blockchain,the consensus mechanism plays a key role in maintaining the security and legitimation of contents recorded in the blocks.Various blockchain consensus mechanisms have been proposed.However,there is no technical analysis and comparison as a guideline to determine which type of consensus mechanism should be adopted in a specific scenario/application.To this end,this work investigates three mainstream consensus mechanisms in the blockchain,namely,Proof of Work(PoW),Proof of Stake(PoS),and Direct Acyclic Graph(DAG),and identifies their performances in terms of the average time to generate a new block,the confirmation delay,the Transaction Per Second(TPS)and the confirmation failure probability.The results show that the consensus process is affected by both network resource(computation power/coin age,buffer size)and network load conditions.In addition,it shows that PoW and PoS are more sensitive to the change of network resource while DAG is more sensitive to network load conditions.
基金This work was partially supported by FEDER/Ministerio de Ciencia e Innovación-Agencia Estatal de Investigación under project HORATIO(RTI2018-101204-B-C21)by Junta de Andalucía under projects APOLO(US-1264651)and EKIPMENT-PLUS(P18-FR-2895)by the TU Wien Research Cluster Smart CT.
文摘In this paper,we deal with questions related to blockchains in complex Internet of Things(IoT)-based ecosystems.Such ecosystems are typically composed of IoT devices,edge devices,cloud computing software services,as well as people,who are decision makers in scenarios such as smart cities.Many decisions related to analytics can be based on data coming from IoT sensors,software services,and people.However,they are typically based on different levels of abstraction and granularity.This poses a number of challenges when multiple blockchains are used together with smart contracts.This work proposes to apply our concept of elasticity to smart contracts and thereby enabling analytics in and between multiple blockchains in the context of IoT.We propose a reference architecture for Elastic Smart Contracts and evaluate the approach in a smart city scenario,discussing the benefits in terms of performance and self-adaptability of our solution.
基金supported by National Natural Science Foundation of China(61672499,61772502)Key Special Project of Beijing Municipal Science&Technology Commission(Z181100003218018)+1 种基金Natural Science Foundation of Inner Mongolia,Open Foundation of State key Laboratory of Networking and Switching Technology(Beijing University of Posts and Telecommunications,SKLNST-2016-2-09)SV-ICT Blockchain&DAPP Joint Lab
文摘The blockchain technology has been applied to wide areas.However,the open and transparent properties of the blockchains pose serious challenges to users’privacy.Among all the schemes for the privacy protection,the zero-knowledge proof algorithm conceals most of the private information in a transaction,while participants of the blockchain can validate this transaction without the private information.However,current schemes are only aimed at blockchains with the UTXO model,and only one type of assets circulates on these blockchains.Based on the zero-knowledge proof algorithm,this paper proposes a privacy protection scheme for blockchains that use the account and multi-asset model.We design the transaction structure,anonymous addresses and anonymous asset metadata,and also propose the methods of the asset transfer and double-spending detection.The zk-SNARKs algorithm is used to generate and to verify the zero-knowledge proof.And finally,we conduct the experiments to evaluate our scheme.
文摘Background:In recent years,blockchain technology has attracted considerable attention.It records cryptographic transactions in a public ledger that is difficult to alter and compromise because of the distributed consensus.As a result,blockchain is believed to resist fraud and hacking.Results:This work explores the types of fraud and malicious activities that can be prevented by blockchain technology and identifies attacks to which blockchain remains vulnerable.Conclusions:This study recommends appropriate defensive measures and calls for further research into the techniques for fighting malicious activities related to blockchains.
基金supported by Anhui Provincial Key R&D Program of China(202004a05020040),the open project of State Key Laboratory of Complex Electromagnetic Environment Effects on Electronics and Information System in China(CEMEE2018Z0102B)the open fund of Intelligent Interconnected Systems Laboratory of Anhui Province(PA2021AKSK0114),Hefei University of Technology.
文摘Blockchain is a viable solution to provide data integrity for the enormous volume of 5G IoT social data, while we need to break through the throughput bottleneck of blockchain. Sharding is a promising technology to solve the problem of low throughput in blockchains. However, cross-shard communication hinders the effective improvement of blockchain throughput. Therefore, it is critical to reasonably allocate transactions to different shards to improve blockchain throughput. Existing research on blockchain sharding mainly focuses on shards formation, configuration, and consensus, while ignoring the negative impact of cross-shard communication on blockchain throughput. Aiming to maximize the throughput of transaction processing, we study how to allocate blockchain transactions to shards in this paper. We propose an Associated Transaction assignment algorithm based on Closest Fit (ATCF). ATCF classifies associated transactions into transaction groups which are then assigned to different shards in the non-ascending order of transaction group sizes periodically. Within each epoch, ATCF tries to select a shard that can handle all the transactions for each transaction group. If there are multiple such shards, ATCF selects the shard with the remaining processing capacity closest to the number of transactions in the transaction group. When no such shard exists, ATCF chooses the shard with the largest remaining processing capacity for the transaction group. The transaction groups that cannot be completely processed within the current epoch will be allocated in the subsequent epochs. We prove that ATCF is a 2-approximation algorithm for the associated transaction assignment problem. Simulation results show that ATCF can effectively improve the blockchain throughput and reduce the number of cross-shard transactions.
文摘Cloud computing is a collection of distributed storage Network which can provide various services and store the data in the efficient manner.The advantages of cloud computing is its remote access where data can accessed in real time using Remote Method Innovation(RMI).The problem of data security in cloud environment is a major concern since the data can be accessed by any time by any user.Due to the lack of providing the efficient security the cloud computing they fail to achieve higher performance in providing the efficient service.To improve the performance in data security,the block chains are used for securing the data in the cloud environment.However,the traditional block chain technique are not suitable to provide efficient security to the cloud data stored in the cloud.In this paper,an efficient user centric block level Attribute Based Encryption(UCBL-ABE)scheme is presented to provide the efficient security of cloud data in cloud environment.The proposed approach performs data transaction by employing the block chain.The proposed system provides efficient privacy with access control to the user access according to the behavior of cloud user using Data Level Access Trust(DLAT).Based on DLAT,the user access has been restricted in the cloud environment.The proposed protocol is implemented in real time using Java programming language and uses IBM cloud.The implementation results justifies that the proposed system can able to provide efficient security to the data present in and cloud and also enhances the cloud performance.
文摘As the Internet enters the era of big data, massive amounts of data are flooding people’s mobile phones and computers. The emerging self-media industry produces many videos every day, which also exposes many security issues in digital rights management (DRM). The works of original creators can easily be infringed on public networks, and it is urgent to protect the copyright of digital content. Traditional digital rights management (TDRM) has many problems, including unqualified copyright confirmation, difficulty obtaining evidence, long time-consuming, high price, and high centralization. The combination of blockchain technology and digital rights management is one of the most popular blockchain application scenarios, the characteristics of the blockchain match DRM market demand. This paper proposes a registration oracle scheme for digital rights management based on heterogeneous blockchains, HBRO, which uses review and voting as a means to judge whether a work can be registered for copyright. HBRO is more rigorous than TDRM and DDRM in the copyright confirmation stage, rejecting many unnecessary and unqualified contents. In addition, a secure cross-chain solution is used to ensure the integrity and correctness of data transmission on heterogeneous blockchains.
基金supported by the National Natural Science Foundation of China(Grant No.62102449)awarded to W.J.Wang.
文摘Blockchain has been widely used in finance,the Internet of Things(IoT),supply chains,and other scenarios as a revolutionary technology.Consensus protocol plays a vital role in blockchain,which helps all participants to maintain the storage state consistently.However,with the improvement of network environment complexity and system scale,blockchain development is limited by the performance,security,and scalability of the consensus protocol.To address this problem,this paper introduces the collaborative filtering mechanism commonly used in the recommendation system into the Practical Byzantine Fault Tolerance(PBFT)and proposes a Byzantine fault-tolerant(BFT)consensus protocol based on collaborative filtering recommendation(CRBFT).Specifically,an improved collaborative filtering recommendation method is designed to use the similarity between a node’s recommendation opinions and those of the recommender as a basis for determining whether to adopt the recommendation opinions.This can amplify the recommendation voice of good nodes,weaken the impact of cunningmalicious nodes on the trust value calculation,andmake the calculated resultsmore accurate.In addition,the nodes are given voting power according to their trust value,and a weight randomelection algorithm is designed and implemented to reduce the risk of attack.The experimental results show that CRBFT can effectively eliminate various malicious nodes and improve the performance of blockchain systems in complex network environments,and the feasibility of CRBFT is also proven by theoretical analysis.
基金The research work is supported by the Shandong Provincial Key Research and Development Program(2021CXGC010107).
文摘With the rapid development of the Internet of Things(IoT),there is an increasing need for interac-tion between different networks.In order to improve the level of interconnection,especially the interoper-ability of users/devices between different nodes is very important.In the IoT heterogeneous blockchain sce-nario,how to ensure the legitimacy of the chain and how to confirm the identity of cross-chain informa-tion users/devices become the key issues to be solved for blockchain interoperability.In this paper,we pro-pose a secure and trusted interoperability mechanism for IoT based on heterogeneous chains to improve the security of blockchain interoperability.In this mecha-nism,a primary sidechain architecture supporting au-thentication at both ends of the heterogeneous chain is designed.In addition,a distributed gateway archi-tecture is proposed for cross-chain authentication and protocol conversion.The security and performance analysis shows that our scheme is feasible and effec-tive in improving the security of cross-chain opera-tions in IoT.
基金supported by the Research Institute for Artificial Intelligence of Things,The Hong Kong Polytechnic University,HK RGC Collaborative Research Fund(CRF)under Grant No.C2004-21GF.
文摘Edge blockchains,the blockchains running on edge computing infrastructures,have attracted a lot of attention in recent years.Thanks to data privacy,scalable computing resources,and distributed topology nature of edge computing,edge blockchains are considered promising solutions to facilitating future blockchain applications.However,edge blockchains face unique security issues caused by the de⁃ployment of vulnerable edge devices and networks,including supply chain attacks and insecure consensus offloading,which are mostly not well studied in previous literature.This paper is the first survey that discusses the attacks and countermeasures of edge blockchains.We first summarize the three-layer architecture of edge blockchains:blockchain management,blockchain consensus,and blockchain lightweight cli⁃ent.We then describe seven specific attacks on edge blockchain components and discuss the countermeasures.At last,we provide future re⁃search directions on securing edge blockchains.This survey will act as a guideline for researchers and developers to design and implement se⁃cure edge blockchains.
文摘Consensus protocols are used for the distributed management of large databases in an environment without trust among participants.The choice of a specific protocol depends on the purpose and characteristics of the system itself.The subjects of the paper are consensus protocols in permissioned blockchains.The objective of this paper is to identify functional advantages and disadvantages of observed protocol.The analysis covers a total of six consensus protocols for permissioned blockchains.The following characteristics were compared:security,trust among participants,throughput and scalability.The results show that no protocol shows absolute dominance in all aspects of the comparison.Paxos and Raft are intended for systems in which there is no suspicion of unreliable users,but only the problem of a temporary shutdown.Practical Byzantine Fault Tolerance is intended for systems with a small number of nodes.Federated Byzantine Fault Tolerance shows better scalability and is more suitable for large systems,but can withstand a smaller number of malicious nodes.Proof-of-authority can withstand the largest number of malicious nodes without interfering with the functioning of the system.When choosing a consensus protocol for a blockchain application,one should take into account priority characteristics.
基金supported by National Key Research and Development Program of China(Nos.2023YFC3306305,2021YFF0307203,2019QY1300)Foundation Strengthening Program Technical Area Fund(No.2021-JCJQJJ-0908)+4 种基金technological project funding of the State Grid Corporation of China(Contract Number:SG270000YXJS2311060)Youth Innovation Promotion Association CAS(No.2021156)the Strategic Priority Research Program of Chinese Academy of Sciences(No.XDC02040100)National Natural Science Foundation of China(No.61802404)supported by the Program of Key Laboratory of Network Assessment Technology,the Chinese Academy of Sciences,Program of Beijing Key Laboratory of Network Security and Protection Technology.
文摘Despite the growing attention on blockchain,phishing activities have surged,particularly on newly established chains.Acknowledging the challenge of limited intelligence in the early stages of new chains,we propose ADA-Spearan automatic phishing detection model utilizing adversarial domain adaptive learning which symbolizes the method’s ability to penetrate various heterogeneous blockchains for phishing detection.The model effectively identifies phishing behavior in new chains with limited reliable labels,addressing challenges such as significant distribution drift,low attribute overlap,and limited inter-chain connections.Our approach includes a subgraph construction strategy to align heterogeneous chains,a layered deep learning encoder capturing both temporal and spatial information,and integrated adversarial domain adaptive learning in end-to-end model training.Validation in Ethereum,Bitcoin,and EOSIO environments demonstrates ADA-Spear’s effectiveness,achieving an average F1 score of 77.41 on new chains after knowledge transfer,surpassing existing detection methods.
基金funded by Multimedia University,Cyberjaya,Selangor,Malaysia(Grant Number:PostDoc(MMUI/240029)).
文摘As healthcare systems increasingly embrace digitalization,effective management of electronic health records(EHRs)has emerged as a critical priority,particularly in inpatient settings where data sensitivity and realtime access are paramount.Traditional EHR systems face significant challenges,including unauthorized access,data breaches,and inefficiencies in tracking follow-up appointments,which heighten the risk of misdiagnosis and medication errors.To address these issues,this research proposes a hybrid blockchain-based solution for securely managing EHRs,specifically designed as a framework for tracking inpatient follow-ups.By integrating QR codeenabled data access with a blockchain architecture,this innovative approach enhances privacy protection,data integrity,and auditing capabilities,while facilitating swift and real-time data retrieval.The architecture adheres to Role-Based Access Control(RBAC)principles and utilizes robust encryption techniques,including SHA-256 and AES-256-CBC,to secure sensitive information.A comprehensive threat model outlines trust boundaries and potential adversaries,complemented by a validated data transmission protocol.Experimental results demonstrate that the framework remains reliable in concurrent access scenarios,highlighting its efficiency and responsiveness in real-world applications.This study emphasizes the necessity for hybrid solutions in managing sensitive medical information and advocates for integrating blockchain technology and QR code innovations into contemporary healthcare systems.
基金supported in part by Beijing Natural Science Foundation(L244010,251038)National Natural Science Foundation of China(92467203,62372050,62502041)+2 种基金CCF-Huawei Populus Grove Fund(TC202418)Fellowship of China National Postdoctoral Program for Innovative Talents(BX20240045)China Postdoctoral Science Foundation General Program(2025M773481).
文摘Practical byzantine fault tolerance(PBFT)can reduce energy consumption and achieve high throughput compared with the traditional PoW algorithm,which is more suitable for a strongly consistent consortium blockchain.However,due to the frequent communication among nodes,PBFT cannot realize scalability in large-scale networks.Existing PBFTbased algorithms still ignore performance and security.Therefore,we propose a secure and efficient practical byzantine fault tolerance based on double layers and multi copies(DM-PBFT).We design a reputation evaluation and node scheduling method for DMPBFT.And then we propose an adaptive node scheduling strategy based on the derived threshold values after analyzing the system communication complexity and security.Combining the above research,a node dynamic adjustment mechanism is proposed to freeze or adjust the node operation status according to the system environment.Simulation experiments show that the proposed mechanism can improve efficiency and increase the system’s throughput.
文摘Industrial Cyber-Physical Systems(ICPSs)play a vital role in modern industries by providing an intellectual foundation for automated operations.With the increasing integration of information-driven processes,ensuring the security of Industrial Control Production Systems(ICPSs)has become a critical challenge.These systems are highly vulnerable to attacks such as denial-of-service(DoS),eclipse,and Sybil attacks,which can significantly disrupt industrial operations.This work proposes an effective protection strategy using an Artificial Intelligence(AI)-enabled Smart Contract(SC)framework combined with the Heterogeneous Barzilai-Borwein Support Vector(HBBSV)method for industrial-based CPS environments.The approach reduces run time and minimizes the probability of attacks.Initially,secured ICPSs are achieved through a comprehensive exchange of views on production plant strategies for condition monitoring using SC and blockchain(BC)integrated within a BC network.The SC executes the HBBSV strategy to verify the security consensus.The Barzilai-Borwein Support Vectorized algorithm computes abnormal attack occurrence probabilities to ensure that components operate within acceptable production line conditions.When a component remains within these conditions,no security breach occurs.Conversely,if a component does not satisfy the condition boundaries,a security lapse is detected,and those components are isolated.The HBBSV method thus strengthens protection against DoS,eclipse,and Sybil attacks.Experimental results demonstrate that the proposed HBBSV approach significantly improves security by enhancing authentication accuracy while reducing run time and authentication time compared to existing techniques.
基金supported by the National Research Foundation(NRF),Republic of Korea,under project BK21 FOUR(4299990213939).
文摘The increased connectivity and reliance on digital technologies have exposed smart transportation systems to various cyber threats,making intrusion detection a critical aspect of ensuring their secure operation.Traditional intrusion detection systems have limitations in terms of centralized architecture,lack of transparency,and vulnerability to single points of failure.This is where the integration of blockchain technology with signature-based intrusion detection can provide a robust and decentralized solution for securing smart transportation systems.This study tackles the issue of database manipulation attacks in smart transportation networks by proposing a signaturebased intrusion detection system.The introduced signature facilitates accurate detection and systematic classification of attacks,enabling categorization according to their severity levels within the transportation infrastructure.Through comparative analysis,the research demonstrates that the blockchain-based IDS outperforms traditional approaches in terms of security,resilience,and data integrity.
基金supported by the National Natural Science Foundation of China under Grant 62471493supported by the Natural Science Foundation of Shandong Province under Grant ZR2023LZH017,ZR2024MF066。
文摘With the rapid development of intelligent cyber-physical systems(ICPS),diverse services with varying Quality of Service(QoS)requirements have brought great challenges to traditional network resource allocation.Furthermore,given the open environment and a multitude of devices,enhancing the security of ICPS is an urgent concern.To address these issues,this paper proposes a novel trusted virtual network embedding(T-VNE)approach for ICPS based combining blockchain and edge computing technologies.Additionally,the proposed algorithm leverages a deep reinforcement learning(DRL)model to optimize decision-making processes.It employs the policygradient-based agent to compute candidate embedding nodes and utilizes a breadth-first search(BFS)algorithm to determine the optimal embedding paths.Finally,through simulation experiments,the efficacy of the proposed method was validated,demonstrating outstanding performance in terms of security,revenue generation,and virtual network request(VNR)acceptance rate.
基金supported by the Key Project of Joint Fund of the National Natural Science Foundation of China“Research on Key Technologies and Demonstration Applications for Trusted and Secure Data Circulation and Trading”(U24A20241)the National Natural Science Foundation of China“Research on Trusted Theories and Key Technologies of Data Security Trading Based on Blockchain”(62202118)+4 种基金the Major Scientific and Technological Special Project of Guizhou Province([2024]014)Scientific and Technological Research Projects from the Guizhou Education Department(Qian jiao ji[2023]003)the Hundred-Level Innovative Talent Project of the Guizhou Provincial Science and Technology Department(Qiankehe Platform Talent-GCC[2023]018)the Major Project of Guizhou Province“Research and Application of Key Technologies for Trusted Large Models Oriented to Public Big Data”(Qiankehe Major Project[2024]003)the Guizhou Province Computational Power Network Security Protection Science and Technology Innovation Talent Team(Qiankehe Talent CXTD[2025]029).
文摘As blockchain technology rapidly evolves,smart contracts have seen widespread adoption in financial transactions and beyond.However,the growing prevalence of malicious Ponzi scheme contracts presents serious security threats to blockchain ecosystems.Although numerous detection techniques have been proposed,existing methods suffer from significant limitations,such as class imbalance and insufficient modeling of transaction-related semantic features.To address these challenges,this paper proposes an oversampling-based detection framework for Ponzi smart contracts.We enhance the Adaptive Synthetic Sampling(ADASYN)algorithm by incorporating sample proximity to decision boundaries and ensuring realistic sample distributions.This enhancement facilitates the generation of high-quality minority class samples and effectively mitigates class imbalance.In addition,we design a Contract Transaction Graph(CTG)construction algorithm to preserve key transactional semantics through feature extraction from contract code.A graph neural network(GNN)is then applied for classification.This study employs a publicly available dataset from the XBlock platform,consisting of 318 verified Ponzi contracts and 6498 benign contracts.Sourced from real Ethereum deployments,the dataset reflects diverse application scenarios and captures the varied characteristics of Ponzi schemes.Experimental results demonstrate that our approach achieves an accuracy of 96%,a recall of 92%,and an F1-score of 94%in detecting Ponzi contracts,outperforming state-of-the-art methods.
文摘Amid the increasing demand for data sharing,the need for flexible,secure,and auditable access control mechanisms has garnered significant attention in the academic community.However,blockchain-based ciphertextpolicy attribute-based encryption(CP-ABE)schemes still face cumbersome ciphertext re-encryption and insufficient oversight when handling dynamic attribute changes and cross-chain collaboration.To address these issues,we propose a dynamic permission attribute-encryption scheme for multi-chain collaboration.This scheme incorporates a multiauthority architecture for distributed attribute management and integrates an attribute revocation and granting mechanism that eliminates the need for ciphertext re-encryption,effectively reducing both computational and communication overhead.It leverages the InterPlanetary File System(IPFS)for off-chain data storage and constructs a cross-chain regulatory framework—comprising a Hyperledger Fabric business chain and a FISCO BCOS regulatory chain—to record changes in decryption privileges and access behaviors in an auditable manner.Security analysis shows selective indistinguishability under chosen-plaintext attack(sIND-CPA)security under the decisional q-Parallel Bilinear Diffie-Hellman Exponent Assumption(q-PBDHE).In the performance and experimental evaluations,we compared the proposed scheme with several advanced schemes.The results show that,while preserving security,the proposed scheme achieves higher encryption/decryption efficiency and lower storage overhead for ciphertexts and keys.