Journal of Computer Applications ›› 2021, Vol. 41 ›› Issue (3): 745-755.DOI: 10.11772/j.issn.1001-9081.2020060912
Special Issue: 网络空间安全
• Cyber security • Previous Articles Next Articles
GAO Haoyu1,2, LI Leixiao1,2, LIN Hao1,2, LI Jie1,2, DENG Dan1,2, LI Shaoxu1,2
Received:
2020-06-28
Revised:
2020-10-21
Online:
2021-03-10
Published:
2021-03-15
Supported by:
高昊昱1,2, 李雷孝1,2, 林浩1,2, 李杰1,2, 邓丹1,2, 李少旭1,2
通讯作者:
李雷孝
作者简介:
高昊昱(1994-),男,山西太原人,硕士研究生,主要研究方向:大数据安全、区块链;李雷孝(1978-),男,山东成武县人,教授,博士,主要研究方向:云计算、大数据处理、数据挖掘;林浩(1995-),男,天津人,硕士研究生,主要研究方向:云计算、大数据处理、数据挖掘;李杰(1990-),男,内蒙古鄂尔多斯人,助教,硕士,主要研究方向:隐私保护、区块链;邓丹(1996-),男,湖南株洲人,硕士研究生,主要研究方向:云计算、大数据分析、智能算法;李少旭(1997-),山西运城人,硕士研究生,主要研究方向:云计算、大数据处理、数据挖掘。
基金资助:
CLC Number:
GAO Haoyu, LI Leixiao, LIN Hao, LI Jie, DENG Dan, LI Shaoxu. Research and application progress of blockchain in area of data integrity protection[J]. Journal of Computer Applications, 2021, 41(3): 745-755.
高昊昱, 李雷孝, 林浩, 李杰, 邓丹, 李少旭. 区块链在数据完整性保护领域的研究与应用进展[J]. 计算机应用, 2021, 41(3): 745-755.
Add to citation manager EndNote|Ris|BibTeX
URL: http://www.joca.cn/EN/10.11772/j.issn.1001-9081.2020060912
[1] LANGNER R. Stuxnet:dissecting a cyberwarfare weapon[J]. IEEE Security and Privacy,2011,9(3):49-51. [2] 蒋凡, 魏弋翔, 庄严, 等. 安全私有云有效应对勒索病毒的原理分析[J]. 信息网络安全,2017(8):83-88.(JIANG F,WEI Y X, ZHUANG Y,et al. Research of private cloud security's response to BlackMail Virus[J]. Netinfo Security,2017(8):83-88.) [3] NAKAMOTO S. Bitcoin:a peer-to-peer electronic cash system[EB/OL].[2020-03-24]. https://bitcoin.org/bitcoin.pdf. [4] EYAL I,GENCER A E,SIRER E G,et al. Bitcoin-NG:a scalable blockchain protocol[C]//Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation. Berkeley:USENIX Association,2016:45-59. [5] VUKOLIĆ M. The quest for scalable blockchain fabric:proof-ofwork vs. BFT replication[C]//Proceedings of the 2015 International Workshop on Open Problems in Network Security, LNCS 9591. Cham:Springer,2015:112-125. [6] 梅海涛, 刘洁. 区块链的产业现状、存在问题和政策建议[J]. 电信科学,2016,32(11):134-138.(MEI H T,LIU J. Industry present situation, existing problems and strategy suggestion of blockchain[J]. Telecommunications Science,2016,32(11):134-138.) [7] 王丹, 赵文兵, 丁治明. 大数据安全保障关键技术分析综述[J]. 北京工业大学学报,2017,43(3):335-349.(WANG D,ZHAO W B,DING Z M. Review of big data security critical technologies[J]. Journal of Beijing University of Technology,2017,43(3):335-349.) [8] SINGH S,SHARMA P K,MOON S Y,et al. A comprehensive study on APT attacks and countermeasures for future networks and communications:challenges and solutions[J]. Journal of Supercomputing,2019,75(8):4543-4574. [9] CHENEY J, CHITICARIU L, TAN W C. Provenance in databases:why,how,and where[J]. Foundations and Trends in Databases,2009,1(4):379-474. [10] 张国英, 毛燕琴. 一种基于区块链的去中心化数据溯源方法[J]. 南京邮电大学学报(自然科学版),2019,39(2):91-98. (ZHANG G Y,MAO Y Q. Blockchain-based decentralized data provenance method[J]. Journal of Nanjing University of Posts and Telecommunications(Natural Science Edition),2019,39(2):91-98.) [11] MONTECCHI M,PLANGGER K,ETTER M. It's real,trust me! Establishing supply chain provenance using blockchain[J]. Business Horizons,2019,62(3):283-293. [12] 张鹏, 罗新星. 一种基于区块链数字代币的有限溯源方法[J]. 系统工程理论与实践,2019,39(6):1469-1478.(ZHANG P, LUO X X. A limited traceability method based on blockchain digital tokens[J]. Systems Engineering-Theory and Practice, 2019,39(6):1469-1478.) [13] 张朝栋, 王宝生, 邓文平. 基于侧链技术的供应链溯源系统设计[J]. 计算机工程,2019,45(11):1-8.(ZHANG C D,WANG B S,DENG W P. Design of supply chain traceability system based on side chain technology[J]. Computer Engineering,2019,45(11):1-8.) [14] NEISSE R, STERI G, NAI-FOVINO I. A blockchain-based approach for data accountability and provenance tracking[C]//Proceedings of the 12th International Conference on Availability, Reliability and Security. New York:ACM,2017:No. 14. [15] LIANG X,SHETTY S,TOSH D,et al. ProvChain:a blockchainbased data provenance architecture in cloud environment with enhanced privacy and availability[C]//Proceedings of the 17th IEEE/ACM International Symposium on Cluster,Cloud and Grid Computing. Piscataway:IEEE,2017:468-477. [16] 费禹, 宁静, 胡青. 基于区块链的日志存储系统[J]. 网络空间安全,2018,9(6):80-85.(FEI Y,NING J,HU Q. A log storage system based on block chain[J]. Cyberspace Security,2018,9(6):80-85.) [17] SUTTON A,SAMAVI R. Blockchain enabled privacy audit logs[C]//Proceedings of the 2017 International Semantic Web Conference,LNCS 10587. Cham:Springer,2017:645-660. [18] SHAO W,WANG Z,WANG X,et al. LSC:online auto-update smart contracts for fortifying blockchain-based log systems[J]. Information Sciences,2020,512:506-517. [19] 魏艳, 毛燕琴, 沈苏彬. 一种基于区块链的数据完整性验证解决方案[J]. 计算机技术与发展,2020,30(1):76-81.(WEI Y, MAO Y Q,SHEN S B. A data integrity verification solution based on blockchain[J]. Computer Technology and Development, 2020,30(1):76-81.) [20] 田海博, 何杰杰, 付利青. 基于公开区块链的隐私保护公平合同签署协议[J]. 密码学报,2017,4(2):187-198.(TIAN H B, HE J J,FU L Q. A privacy preserving fair contract signing protocol based on block chains[J]. Journal of Cryptologic Research,2017,4(2):187-198.) [21] 刘格昌, 李强. 基于可搜索加密的区块链数据隐私保护机制[J]. 计算机应用,2019,39(S2):140-146.(LIU G C,LI Q. Blockchain data privacy protection mechanism based on searchable encryption[J]. Journal of Computer Applications,2019,39(S2):140-146.) [22] 吕琦. 区块链技术在医疗领域中的应用研究——以健康档案数据保护为例[J]. 网络空间安全,2018,9(8):18-24.(LYU Q. Application of blockchain technology in health care system-illustrated by the case of health record data protection[J]. Cyberspace Security,2018,9(8):18-24.) [23] DAGHER G G,MOHLER J,MILOJKOVIC M,et al. Ancile:privacy-preserving framework for access control and interoperability of electronic health records using blockchain technology[J]. Sustainable Cities and Society, 2018, 39:283-297. [24] FERNÁNDEZ-CARAMÉS T M,FRAGA-LAMAS P. Design of a fog computing, blockchain and IoT-based continuous glucose monitoring system for crowdsourcing mHealth[C]//Proceedings of the 5th International Electronic Conference on Sensors and Applications. Piscataway:IEEE,2018:No. 37. [25] FAN K,WANG S,REN Y,et al. MedBlock:efficient and secure medical data sharing via blockchain[J]. Journal of Medical Systems,2018,42(8):No. 136. [26] 陈春玲, 沈阳, 余瀚. 去中心化的征信系统模型研究[J]. 计算机技术与发展,2019,29(3):122-126.(CHEN C L,SHEN Y, YU H. Research on decentralized model for credit information system[J]. Computer Technology and Development,2019,29(3):122-126.) [27] LI M,WENG J,YANG A,et al. CrowdBC:a blockchain-based decentralized framework for crowdsourcing[J]. IEEE Transactions on Parallel and Distributed Systems,2019,30(6):1251-1266. [28] BHATIA G K. WorkerRep:building trust on crowdsourcing platform using blockchain[D]. New Delhi:Indraprastha Institute of Information Technology,2018:11-23. [29] HAN S,XU Z,ZENG Y,et al. Fluid:a blockchain based framework for crowdsourcing[C]//Proceedings of the 2019 International Conference on Management of Data. New York:ACM,2019:1921-1924. [30] LU Y,TANG Q,WANG G. ZebraLancer:private and anonymous crowdsourcing system atop open blockchain[C]//Proceedings of the IEEE 38th International Conference on Distributed Computing Systems. Piscataway:IEEE,2018:853-865. [31] BUCCAFURRI F,LAX G,NICOLAZZO S,et al. Tweetchain:an alternative to blockchain for crowd-based applications[C]//Proceedings of the 2017 International Conference on Web Engineering,LNCS 10360. Cham:Springer,2017:386-393. [32] BUMBLAUSKAS D,MANN A,DUGAN B,et al. A blockchain use case in food distribution:do you know where your food has been?[J]. International Journal of Information Management, 2020,52:No. 102008. [33] Hyperledger Sawtooth. PoET 1.0 Specification[EB/OL].[2019-03-29]. https://sawtooth.hyperledger.org/docs/core/releases/1.0/architecture/poet.html#introduction. [34] RAMACHANDRAN A,KANTARCIOGLU M. SmartProvenance:a distributed,blockchain based data provenance system[C]//Proceedings of the 8th ACM Conference on Data and Application Security and Privacy. New York:ACM,2018:35-42. [35] TOSH D K,SHETTY S,LIANG X,et al. Consensus protocols for blockchain-based data provenance:challenges and opportunities[C]//Proceedings of the IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference. Piscataway:IEEE,2017:469-474. [36] 田有亮, 杨科迪, 王缵, 等. 基于属性加密的区块链数据溯源算法[J]. 通信学报,2019,40(11):101-111.(TIAN Y L,YANG K D,WANG Z,et al. Algorithm of blockchain data provenance based on ABE[J]. Journal on Communications,2019,40(11):101-111.) [37] 王海龙, 田有亮, 尹鑫. 基于区块链的大数据确权方案[J]. 计算机科学,2018, 45(2):15-19,24.(WANG H L,TIAN Y L, YIN X. Blockchain-based big data right confirmation scheme[J]. Computer Science,2018,45(2):15-19,24.) [38] SAVELYEV A. Copyright in the blockchain era:promises and challenges[J]. Computer Law and Security Review,2018,34(3):550-561. [39] 吕建富, 赖英旭, 刘静. 基于链上链下相结合的日志安全存储与检索[J]. 计算机科学,2020,47(3):298-303.(LYU J F, LAI Y X,LIU J. Log security storage and retrieval based on combination of on-chain and off-chain[J]. Computer Science, 2020,47(3):298-303.) [40] 韩菊茹, 纪兆轩, 李一鸣, 等. 基于区块链的可信日志存储与验证系统[J]. 计算机工程,2019,45(5):13-17.(HAN J R,JI Z X,LI Y M,et al. Trusted log storage and verification system based on blockchain[J]. Computer Engineering,2019,45(5):13-17.) [41] PUTZ B,MENGES F,PERNUL G. A secure and auditable logging infrastructure based on a permissioned blockchain[J]. Computers and Security,2019,87:No. 101602. [42] HANG L,ULLAH I,KIM D H. A secure fish farm platform based on blockchain for agriculture data integrity[J]. Computers and Electronics in Agriculture,2020,170:No. 105251. [43] 谭海波, 周桐, 赵赫, 等. 基于区块链的档案数据保护与共享方法[J]. 软件学报,2019,30(9):2620-2635.(TAN H B,ZHOU T,ZHAO H,et al. Archival data protection and sharing method based on blockchain[J]. Journal of Software,2019,30(9):2620-2635.) [44] MINOLI D. Positioning of blockchain mechanisms in IOT-powered smart home systems:a gateway-based approach[J]. Internet of Things,2020,10:No. 100147. [45] DORRI A,KANHERE S S,JURDAK R,et al. Blockchain for IoT security and privacy:the case study of a smart home[C]//Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops. Piscataway:IEEE,2017:618-623. [46] 秦晓伟, 王立兵, 汪磊, 等. 区块链技术在矿山物联网中的应用研究[J]. 工矿自动化,2020,46(3):21-26.(QIN X W,WANG L B,WANG L,et al. Research on application of blockchain technology in mine Internet of Things[J]. Industry and Mine Automation,2020,46(3):21-26.) [47] 安瑞, 何德彪, 张韵茹, 等. 基于区块链技术的防伪系统的设计与实现[J]. 密码学报,2017,4(2):199-208.(AN R,HE D B, ZHANG Y R,et al. The design of an anti-counterfeiting system based on blockchain[J]. Journal of Cryptologic Research,2017,4(2):199-208.) [48] XIE Y,FENG D,TAN Z,et al. Design and evaluation of a provenance-based rebuild framework[J]. IEEE Transactions on Magnetics,2013,49(6):2805-2811. [49] WIDOM J. Trio:a system for integrated management of data accuracy and lineage[C]//Proceedings of the 2005 International Conference on Innovation Data Systems Research. Piscataway:IEEE,2005:262-276. [50] IKEDA R,WIDOM J. Panda:a system for provenance and data[C]//Proceedings for the 2nd Conference on Theory and Practice of Provenance. Berkeley:USENIX Association,2010:1-4. [51] 钱卫宁, 邵奇峰, 朱燕超, 等. 区块链与可信数据管理:问题与方法[J]. 软件学报,2018,29(1):150-159.(QIAN W N, SHAO Q F,ZHU Y C,et al. Research problems and methods in blockchain and trusted data management[J]. Journal of Software, 2018,29(1):150-159.) [52] 常兴, 赵运磊. 比特币扩容技术的发展现状与展望[J]. 计算机应用与软件,2019,36(3):49-56.(CHANG X,ZHAO Y L. Scaling bitcoin:the state of development and future trend[J]. Computer Applications and Software,2019,36(3):49-56.) [53] 曾帅, 袁勇, 倪晓春, 等. 面向比特币的区块链扩容:关键技术, 制约因素与衍生问题[J]. 自动化学报,2019,45(6):1015-1030.(ZENG S,YUAN Y,NI X C,et al. Scaling blockchain towards bitcoin:key technologies,constraints and related issues[J]. Acta Automatica Sinica,2019,45(6):1015-1030.) [54] 喻辉, 张宗洋, 刘建伟. 比特币区块链扩容技术研究[J]. 计算机研究与发展,2017,54(10):2390-2403.(YU H,ZHANG Z Y,LIU J W. Research on scaling technology of bitcoin blockchain[J]. Journal of Computer Research and Development,2017,54(10):2390-2403.) [55] 李芳, 李卓然, 赵赫. 区块链跨链技术进展研究[J]. 软件学报, 2019,30(6):1649-1660.(LI F,LI Z R,ZHAO H. Research on the progress in cross-chain technology of blockchains[J]. Journal of Software,2019,30(6):1649-1660.) [56] POON J,DRYJA T. The bitcoin lightning network:scalable offchain instant payments[EB/OL] [2020-05-10]. https://www.bitcoinlightning.com/wp-content/uploads/2018/03/lightningnetwork-paper.pdf. [57] WORLEY C,SKJELLUM A. Blockchain tradeoffs and challenges for current and emerging applications:generalization, fragmentation,sidechains,and scalability[C]//Proceedings of 2018 IEEE International Conference on Internet of Things/IEEE Green Computing and Communications/IEEE Cyber,Physical and Social Computing/IEEE Smart Data. Piscataway:IEEE,2018:1582-1587. [58] 中国信息通信研究院. 大数据安全白皮书(2018年)[EB/OL].[2020-05-18]. http://www.caict.ac.cn/kxyj/qwfb/bps/201807/P020180712523226672500.pdf. (China Academy of Information and Communications Technology. White paper on big data security[EB/OL].[2020-05-18]. http://www.caict.ac.cn/kxyj/qwfb/bps/201807/P020180712523226672500.pdf.) [59] 李琪, 李勍, 朱建明, 等. 基于区块链技术的慈善应用模式与平台[J]. 计算机应用,2017,37(S2):287-292.(LI Q,LI Q,ZHU J M,et al. Model and platform of charity application based on block chain technology[J]. Journal of Computer Applications, 2017,37(S2):287-292.) [60] 王凌宇, 傅宏, 杨云, 等. 基于区块链的电力营销数据存储机制[J/OL]. 重庆大学学报,[2020-05-06]. http://kns.cnki.net/kcms/detail/50.1044.N.20200318.1346.004.html. (WANG L Y,FU H,YANG Y, et al. Research on storage mechanism of electricity marketing data based on blockchain[J]. Journal of Chongqing University,[2020-05-06]. http://kns.cnki.net/kcms/detail/50.1044.N.20200318.1346.004.html.) [61] TURKANOVIĆ M,HÖLBL M,KOŠIČ K,et al. EduCTX:a blockchain-based higher education credit platform[J]. IEEE Access,2018,6:5112-5127. [62] WANG S,DING W,LI J,et al. Decentralized autonomous organizations:concept, model, and applications[J]. IEEE Transactions on Computational Social Systems,2019,6(5):870-878. [63] SWAN M. Blockchain thinking:the brain as a decentralized autonomous corporation[J]. IEEE Technology and Society Magazine,2015,34(4):41-52. [64] 方燕飞, 王俊, 何王全. 基于多层MD5消息摘要的文件完整性实时检测技术[J]. 计算机应用与软件,2015,32(1):20-23. (FANG Y F, WANG J, HE W Q. Real-time file integrity detection technique based on multi-level MD5 messages digest[J]. Computer Applications and Software,2015,32(1):20-23.) [65] 左黎明, 陈祚松, 夏萍萍, 等. 一种改进的高效无证书短签名方案[J]. 计算机科学,2019,46(4):172-176.(ZUO L M,CHEN Z S,XIA P P,et al. Improved efficient certificateless short signature scheme[J]. Computer Science, 2019, 46(4):172-176.) [66] 童伟, 朱岩. 可证明安全的可擦除脆弱数字水印[J]. 计算机工程与设计,2018,39(3):679-683.(TONG W,ZHU Y. Provably secure erasable fragile watermarking[J]. Computer Engineering and Design,2018,39(3):679-683.) [67] 李瑞民. 数字水印擦除技术的研究[J]. 电视技术,2015,39(1):12-14.(LI R M. Research of erase technology of digital waterprint[J]. Video Engineering,2015,39(1):12-14.) [68] 刘怀进, 陈永红, 田辉, 等. 一种可检测数据完整性的安全数据聚合协议[J]. 计算机科学,2016,43(6A):353-356.(LIU H J, CHEN Y H,TIAN H,et al. Integrity-checking security data aggregation protocol[J]. Computer Science,2016,43(6A):353-356.) [69] 赵洋, 陈阳, 熊虎, 等. 云环境下一种可撤销授权的数据拥有性证明方案[J]. 信息网络安全,2015(8):1-7.(ZHAO Y,CHEN Y,XIONG H,et al. A revocable authorization provable data possession scheme in clouds[J]. Netinfo Security,2015(8):1-7.) [70] 邵必林, 吴书强, 刘江, 等. 重要数据完整性分布式检测系统[J]. 探测与控制学报,2018,40(2):93-98.(SHAO B L,WU S Q,LIU J,et al. Distributed detection system of significant data integrity[J]. Journal of Detection and Control,2018,40(2):93-98.) [71] 谭霜, 贾焰, 韩伟红. 云存储中的数据完整性证明研究及进展[J]. 计算机学报,2015,38(1):164-177.(TAN S,JIA Y,HAN W H. Research and development of provable data integrity in cloud storage[J]. Chinese Journal of Computers,2015,38(1):164-177.) [72] ATENIESE G,DI PIETRO R,MANCINI L V,et al. Scalable and efficient provable data possession[C]//Proceedings of the 4th International Conference on Security and Privacy in Communication Networks. New York:ACM,2008:No. 9. [73] JUELS A,KALISKI B S. PORs:proofs of retrievability for large files[C]//Proceedings of the 14th ACM Conference on Computer and Communications Security. New York:ACM,2007:584-597. [74] WANG Q,WANG C,LI J,et al. Enabling public verifiability and data dynamics for storage security in cloud computing[C]//Proceedings of the 2009 European Symposium on Research in Computer Security, LNCS 5789. Berlin:Springer, 2009:355-370. [75] WEIL S A,BRANDT S A,MILLER E L,et al. Ceph:a scalable, high-performance distributed file system[C]//Proceedings of the 7th Symposium on Operating Systems Design and Implementation. Berkeley:USENIX Association, 2006:307-320. [76] 殷龙, 王宏伟. 基于IPFS的分布式数据共享系统的研究[J]. 物联网技术,2016,6(6):60-62.(YIN L,WANG H W. Research on distributed data sharing system based on IPFS[J]. Internet of Things Technology,2016,6(6):60-62.) [77] MCCONAGHY T, MARQUES R, MÜLLER A, et al. BigchainDB:a scalable blockchain database (DRAFT)[EB/OL].[2020-05-15]. http://www.blockchain.jetzt/wp-content/uploads/2016/02/bigchaindb-whitepaper.pdf. [78] YU B, LIU J, NEPAL S, et al. Proof-of-QoS:QoS based blockchain consensus protocol[J]. Computers and Security, 2019,87:No. 101580. [79] AMORETTI M,BRAMBILLA G,MEDIOLI F,et al. Blockchainbased proof of location[C]//Proceedings of the 2018 IEEE International Conference on Software Quality, Reliability and Security Companion. Piscataway:IEEE,2018:146-153. [80] CHENLI C,LI B,SHI Y,et al. Energy-recycling blockchain with proof-of-deep-learning[C]//Proceedings of the 2019 IEEE International Conference on Blockchain and Cryptocurrency. Piscataway:IEEE,2019:19-23. [81] HAN X,YUAN Y,WANG F. A fair blockchain based on proof of credit[J]. IEEE Transactions on Computational Social Systems, 2019,6(5):922-931. [82] HOFMAN D,SHANNON C,MCMANUS B,et al. Building trust and protecting privacy:analyzing evidentiary quality in a blockchain proof-of-concept for health research data consent management[C]//Proceedings of the 2018 IEEE International Conference on Internet of Things/IEEE Green Computing and Communications/IEEE Cyber,Physical and Social Computing/IEEE Smart Data. Piscataway:IEEE,2018:1650-1656. [83] 赵伟, 张问银, 王九如, 等. 基于符号执行的智能合约漏洞检测方案[J]. 计算机应用,2020,40(4):947-953.(ZHAO W, ZHANG W Y,WANG J R,et al. Smart contract vulnerability detection scheme based on symbol execution[J]. Journal of Computer Applications,2020,40(4):947-953.) [84] 斯雪明, 徐蜜雪, 苑超. 区块链安全研究综述[J]. 密码学报, 2018,5(5):458-469.(SI X M,XU M X,YUAN C. Survey on security of blockchain[J]. Journal of Cryptologic Research,2018, 5(5):458-469.) [85] CAI T,CAI H J,WANG H,et al. Analysis of blockchain system with token-based bookkeeping method[J]. IEEE Access,2019, 7:50823-50832. [86] 韩璇, 袁勇, 王飞跃. 区块链安全问题:研究现状与展望[J]. 自动化学报,2019,45(1):206-225.(HAN X,YUAN Y,WANG F Y. Security problems on blockchain:the state of the art and future trends[J]. Acta Automatica Sinica, 2019, 45(1):206-225.) [87] POPOV S. The tangle[EB/OL].[2020-05-20]. https://assets.ctfassets.net/r1dr6vzfxhev/2t4uxvsIqk0EUau6g2sw0g/45eae33637ca92f85dd9f4a3a218e1ec/iota1_4_3.pdf. |
[1] | GE Jihong, SHEN Tao. Energy data access control method based on blockchain [J]. Journal of Computer Applications, 2021, 41(9): 2615-2622. |
[2] | SHEN Yumin, WANG Jinlong, HU Diankai, LIU Xingyu. Multi-person collaborative creation system of building information modeling drawings based on blockchain [J]. Journal of Computer Applications, 2021, 41(8): 2338-2345. |
[3] | YANG Longhai, WANG Xueyuan, JIANG Hesong. Blockchain digital signature scheme with improved SM2 signature method [J]. Journal of Computer Applications, 2021, 41(7): 1983-1988. |
[4] | CHEN Weiwei, CAO Li, GU Xiang. E-forensics model for internet of vehicles based on blockchain [J]. Journal of Computer Applications, 2021, 41(7): 1989-1995. |
[5] | QING Xinyi, CHEN Yuling, ZHOU Zhengqiang, TU Yuanchao, LI Tao. Blockchain storage expansion model based on Chinese remainder theorem [J]. Journal of Computer Applications, 2021, 41(7): 1977-1982. |
[6] | LIU Hongyu, LIANG Xiubo, WU Junhan. Kubernetes-based Fabric chaincode management and high availability technology [J]. Journal of Computer Applications, 2021, 41(4): 956-962. |
[7] | LI Bei, ZHANG Wenyin, WANG Jiuru, ZHAO Wei, WANG Haifeng. Sealed-bid auction scheme based on blockchain [J]. Journal of Computer Applications, 2021, 41(4): 999-1004. |
[8] | TIAN Zhihong, ZHAO Jindong. Overview of blockchain consensus mechanism for internet of things [J]. Journal of Computer Applications, 2021, 41(4): 917-929. |
[9] | ZHANG Xuewang, YIN Zijie, FENG Jiaqi, YE Caijin, FU Kang. Data trading scheme based on blockchain and trusted computing [J]. Journal of Computer Applications, 2021, 41(4): 939-944. |
[10] | ZHANG Guochao, TANG Huayun, CHEN Jianhai, SHEN Rui, HE Qinming, HUANG Butian. Digital music copyright management system based on blockchain [J]. Journal of Computer Applications, 2021, 41(4): 945-955. |
[11] | QIN Jing, AN Wen, JI Changqing, WANG Zumin. Review of privacy protection mechanisms in wireless body area network [J]. Journal of Computer Applications, 2021, 41(4): 970-975. |
[12] | LIU Yu, ZHU Chaoyang, LI Jinze, LAO Yuanji, QIN Tuanfa. d-PBFT:detection consensus algorithm for alliance blockchain [J]. Journal of Computer Applications, 2021, 41(3): 756-762. |
[13] | LUO Changyin, CHEN Xuebin, MA Chundi, WANG Junyu. Online federated incremental learning algorithm for blockchain [J]. Journal of Computer Applications, 2021, 41(2): 363-371. |
[14] | WU Guangfu, WANG Yingjun. Secure storage and sharing scheme of internet of vehicles data based on hybrid architecture of blockchain and cloud-edge computing [J]. Journal of Computer Applications, 2021, 41(10): 2885-2892. |
[15] | CHEN Jinyu, LIU Zhaowei. Internet of vehicles system based on improved proof of vote consensus protocol [J]. Journal of Computer Applications, 2021, 41(1): 170-176. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||