Journal of Computer Applications ›› 2025, Vol. 45 ›› Issue (11): 3463-3469.DOI: 10.11772/j.issn.1001-9081.2024121846
• The 7th CCF China Conference on Blockchain Technology • Previous Articles
Lihua ZHANG(
), Wenbiao WANG, Yi YANG, Jiali LUO
Received:2025-01-02
Revised:2025-03-19
Accepted:2025-03-25
Online:2025-04-08
Published:2025-11-10
Contact:
Lihua ZHANG
About author:WANG Wenbiao, born in 2000, M. S. candidate. His research interests include blockchain, disaster recovery, data sharing.Supported by:通讯作者:
张利华
作者简介:王文彪(2000—),男,江西抚州人,硕士研究生,CCF会员,主要研究方向:区块链、容灾备份、数据共享基金资助:CLC Number:
Lihua ZHANG, Wenbiao WANG, Yi YANG, Jiali LUO. Blockchain-based disaster recovery backup scheme for power grid status monitoring data in cloud-edge collaboration environments[J]. Journal of Computer Applications, 2025, 45(11): 3463-3469.
张利华, 王文彪, 杨怡, 罗佳丽. 云边缘协同电网状态监测数据区块链灾备方案[J]. 《计算机应用》唯一官方网站, 2025, 45(11): 3463-3469.
Add to citation manager EndNote|Ris|BibTeX
URL: https://www.joca.cn/EN/10.11772/j.issn.1001-9081.2024121846
| 方案 | 优点 | 不足 |
|---|---|---|
文献[ 的方案 | 可以很好地对数据进行管理存储 | 安全性有待提高 |
文献[ 的方案 | 保证了数据的安全发布、安全验证、安全存储 | 缺乏对潜在风险的 深入分析 |
文献[ 的方案 | 系统整体性能得到提高 | 考虑不全面,难以适应实际需求 |
Tab. 1 Summary of relevant work
| 方案 | 优点 | 不足 |
|---|---|---|
文献[ 的方案 | 可以很好地对数据进行管理存储 | 安全性有待提高 |
文献[ 的方案 | 保证了数据的安全发布、安全验证、安全存储 | 缺乏对潜在风险的 深入分析 |
文献[ 的方案 | 系统整体性能得到提高 | 考虑不全面,难以适应实际需求 |
| 备份节点 | 秘密分量 | 备份节点 | 秘密分量 |
|---|---|---|---|
| 节点1 | F1, F2, F3 | 节点3 | F2, F3, F4 |
| 节点2 | F1, F5, F6 | 节点4 | F4, F5, F6 |
Tab. 2 (3, 4) threshold secret allocation
| 备份节点 | 秘密分量 | 备份节点 | 秘密分量 |
|---|---|---|---|
| 节点1 | F1, F2, F3 | 节点3 | F2, F3, F4 |
| 节点2 | F1, F5, F6 | 节点4 | F4, F5, F6 |
| [1] | TAMIMI A A, DAWOOD R, SADAQA L. Disaster recovery techniques in cloud computing[C]// Proceedings of the 2019 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology. Piscataway: IEEE, 2019: 845-850. |
| [2] | EZEIGWENEME C A, NWASIKE C N, ADEFEMI A, et al. Smart grids in industrial paradigms: a review of progress, benefits, and maintenance implications: analyzing the role of smart grids in predictive maintenance and the integration of renewable energy sources, along with their overall impact on the industrial landscape[J]. Engineering Science and Technology Journal, 2024, 5(1): 1-20. |
| [3] | 李鹏,黄新波,赵隆,等.智能输电线路状态监测代理的研究与设计[J].中国电机工程学报,2013,33(16):153-161. |
| LI P, HUANG X B, ZHAO L, et al. Research and design of transmission line condition monitoring agent[J]. Proceedings of the Chinese Society for Electrical Engineering, 2013, 33(16): 153-161. | |
| [4] | 高昊昱,李雷孝,林浩,等.区块链在数据完整性保护领域的研究与应用进展[J].计算机应用,2021,41(3):745-755. |
| GAO H Y, LI L X, LIN H, et al. Research and application progress of blockchain in area of data integrity protection[J]. Journal of Computer Applications, 2021, 41(3): 745-755. | |
| [5] | DONG S, ABBAS K, LI M, et al. Blockchain technology and application: an overview[J]. PeerJ Computer Science, 2023, 9: No.e1705. |
| [6] | RAMESH G, LOGESHWARAN J, ARAVINDARAJAN V. A secured database monitoring method to improve data backup and recovery operations in cloud computing[J]. BOHR International Journal of Computer Science, 2023, 2(1): 1-7. |
| [7] | ARUL MARY A, CHITRA K. OGSO-DR: oppositional group search optimizer based efficient disaster recovery in a cloud environment[J]. Journal of Ambient Intelligence and Humanized Computing, 2019, 10(5): 1885-1895. |
| [8] | CHANG D, LI L, CHANG Y, et al. Cloud computing storage backup and recovery strategy based on secure IoT and Spark[J]. Mobile Information Systems, 2021, 2021: No.9505249. |
| [9] | KIM B H. Design of reliable disaster recovery system through integrated server redundancy[J]. Turkish Journal of Computer and Mathematics Education, 2021, 12(6): 674-679. |
| [10] | NI J, LIN X, SHEN X S. Toward edge-assisted internet of things: from security and efficiency perspectives[J]. IEEE Network, 2019, 33(2): 50-57. |
| [11] | SHARMA P, JINDAL R, BORAH M D. Blockchain technology for cloud storage: a systematic literature review[J]. ACM Computing Surveys, 2021, 53(4): No.89. |
| [12] | SU X, ULLAH I, WANG M, et al. Blockchain-based system and methods for sensitive data transactions[J]. IEEE Consumer Electronics Magazine, 2024, 13(2): 87-96. |
| [13] | LI R, SONG T, MEI B, et al. Blockchain for large-scale internet of things data storage and protection[J]. IEEE Transactions on Services Computing, 2019, 12(5): 762-771. |
| [14] | NATOLI C, GRAMOLI V. The blockchain anomaly[C]// Proceedings of the IEEE 15th International Symposium on Network Computing and Applications. Piscataway: IEEE, 2016: 310-317. |
| [15] | GUO H, YU X. A survey on blockchain technology and its security[J]. Blockchain: Research and Applications, 2022, 3(2): No. 100067. |
| [16] | GAI K, WU Y, ZHU L, et al. Permissioned blockchain and edge computing empowered privacy-preserving smart grid networks[J]. IEEE Internet of Things Journal, 2019, 6(5): 7992-8004. |
| [17] | LIANG W, LONG J, WENG T H, et al. TBRS: a trust based recommendation scheme for vehicular CPS network[J]. Future Generation Computer Systems, 2019, 92: 383-398. |
| [18] | 劳卫伦,王柏勇,张锐,等. 基于区块链的电力数据容灾备份方案[J].计算机工程,2019,45(11):9-15. |
| LAO W L, WANG B Y, ZHANG R, et al. Disaster tolerance and backup scheme of power data based on blockchain[J]. Computer Engineering, 2019, 45(11): 9-15. | |
| [19] | 刘扬,胡学先,周刚,等.基于多层次区块链的医疗数据共享模型[J]. 计算机应用研究,2022,39(5):1307-1312,1318. |
| LIU Y, HU X X, ZHOU G, et al. Multi-level blockchain-based model for medical data sharing[J]. Application Research of Computers, 2022, 39 (5): 1307-1312,1318. | |
| [20] | ZAKARET C, PELADARINOS N, CHEIMARAS V, et al. Blockchain and secure element, a hybrid approach for secure energy smart meter gateways[J]. Sensors, 2022, 22(24): No. 9664. |
| [21] | SKOWROŃSKI R. The open blockchain-aided multi-agent symbiotic cyber — physical systems[J]. Future Generation Computer Systems, 2019, 94: 430-443. |
| [22] | SU Z, XU Q, LUO J, et al. A secure content caching scheme for disaster backup in fog computing enabled mobile social networks[J]. IEEE Transactions on Industrial Informatics, 2018, 14(10): 4579-4589. |
| [23] | ZHANG Z, WANG F, ZHONG C, et al. Grid terminal data security management mechanism based on master-slave blockchain[C]// Proceedings of the 5th International Conference on Computer and Communication Systems. Piscataway: IEEE, 2020: 67-70. |
| [24] | JIANG X, SUN A, SUN Y, et al. A trust-based hierarchical consensus mechanism for consortium blockchain in smart grid[J]. Tsinghua Science and Technology, 2023, 28(1): 69-81. |
| [25] | LIANG W, FAN Y, LI K C, et al. Secure data storage and recovery in industrial blockchain network environments[J]. IEEE Transactions on Industrial Informatics, 2020, 16(10): 6543-6552. |
| [26] | MAHER R, NASR O A. DropStore: a secure backup system using multi-cloud and fog computing[J]. IEEE Access, 2021, 9: 71318-71327. |
| [27] | YIN M, MALKHI D, REITER M K, et al. HotStuff: BFT consensus with linearity and responsiveness[C]// Proceedings of the 2019 ACM Symposium on Principles of Distributed Computing. New York: ACM, 2019: 347-356. |
| [28] | LI W, FENG C, ZHANG L, et al. A scalable multi-layer PBFT consensus for blockchain[J]. IEEE Transactions on Parallel and Distributed Systems, 2021, 32(5): 1146-1160. |
| [29] | WANG X, DUAN S, CLAVIN J, et al. BFT in blockchains: from protocols to use cases[J]. ACM Computing Surveys, 2022, 54(10s): No.209. |
| [30] | CHEN Y, LI M, ZHU X, et al. An improved algorithm for practical byzantine fault tolerance to large-scale consortium chain[J]. Information Processing and Management, 2022, 59(2): No.102884. |
| [31] | LIU P, REN S, WANG J, et al. A blockchain consensus optimization‑based algorithm for food traceability[J]. Mobile Information Systems, 2022, 2022: No.1529983. |
| [1] | Wei SHE, Tianxiang MA, Haige FENG, Zhao TIAN, Wei LIU. Blockchain covert communication method based on contract call concealment [J]. Journal of Computer Applications, 2025, 45(9): 2865-2872. |
| [2] | Sheping ZHAI, Pengju ZHU, Rui YANG, Jiayiteng LIU. Blockchain-based identity management system for internet of things [J]. Journal of Computer Applications, 2025, 45(9): 2873-2881. |
| [3] | Wei GAO, Lihua LIU, Bintao HE, Fang’an DENG. Research advances in blockchain consensus mechanisms and improvement algorithms [J]. Journal of Computer Applications, 2025, 45(9): 2848-2864. |
| [4] | Di WANG. P-Dledger: blockchain edge node security architecture [J]. Journal of Computer Applications, 2025, 45(8): 2630-2636. |
| [5] | Haiyang PENG, Weixing JI, Fawang LIU. Blockchain-based data notarization model for autonomous driving simulation testing [J]. Journal of Computer Applications, 2025, 45(8): 2421-2427. |
| [6] | Shuo ZHANG, Guokai SUN, Yuan ZHUANG, Xiaoyu FENG, Jingzhi WANG. Dynamic detection method of eclipse attacks for blockchain node analysis [J]. Journal of Computer Applications, 2025, 45(8): 2428-2436. |
| [7] | Yuxuan CHEN, Haibin ZHENG, Zhenyu GUAN, Boheng SU, Yujue WANG, Zhenwei GUO. Blockchain sharding mechanism in asynchronous network based on HoneyBadgerBFT and DAG [J]. Journal of Computer Applications, 2025, 45(7): 2092-2100. |
| [8] | Xin SHAO, Zigang CHEN, Xingchun YANG, Haihua ZHU, Wenjun LUO, Long CHEN, Yousheng ZHOU. Vehicular digital evidence preservation and access control based on consortium blockchain [J]. Journal of Computer Applications, 2025, 45(6): 1902-1910. |
| [9] | Li’e WANG, Caiyi LIN, Yongdong LI, Xingcheng FU, Xianxian LI. Digital content copyright protection and fair tracking scheme based on blockchain [J]. Journal of Computer Applications, 2025, 45(6): 1756-1765. |
| [10] | Gaimei GAO, Miaolian DU, Chunxia LIU, Yuli YANG, Weichao DANG, Guoxia DI. Privacy protection method for consortium blockchain based on SM2 linkable ring signature [J]. Journal of Computer Applications, 2025, 45(5): 1564-1572. |
| [11] | Yuqi PENG, Jiaolong CHEN, Jiaqi YAN. Review of operational mechanisms for blockchain-based decentralized science systems [J]. Journal of Computer Applications, 2025, 45(11): 3407-3415. |
| [12] | Minghao LIU, Jianlei HONG, Chengxiang WANG, Jindong ZHAO. Blockchain storage optimization strategy based on consistent hashing [J]. Journal of Computer Applications, 2025, 45(11): 3446-3452. |
| [13] | Fei WANG, Hengdi WANG, Konglin ZHU, Lin ZHANG. Adaptive online blockchain sharding algorithm based on trusted execution environments [J]. Journal of Computer Applications, 2025, 45(11): 3424-3431. |
| [14] | Bimang SUN, Wunan WAN, Shibin ZHANG, Jinquan ZHANG. Multi-domain access control scheme in blockchain based on SM2 homomorphic encryption [J]. Journal of Computer Applications, 2025, 45(11): 3432-3439. |
| [15] | Mei TANG, Wunan WAN, Shibin ZHANG, Jinquan ZHANG. Survey of DDoS protection research based on blockchain [J]. Journal of Computer Applications, 2025, 45(11): 3416-3423. |
| Viewed | ||||||
|
Full text |
|
|||||
|
Abstract |
|
|||||