{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,20]],"date-time":"2023-09-20T16:48:41Z","timestamp":1695228521666},"reference-count":25,"publisher":"Fuji Technology Press Ltd.","issue":"5","funder":[{"name":"Guangdong Province","award":["2020WCXTD008"]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JACIII","J. Adv. Comput. Intell. Intell. Inform."],"published-print":{"date-parts":[[2023,9,20]]},"abstract":"In order to improve the universality and security of the data management of the Internet of Things and avoid the single point of failure problem in the traditional management architecture, this paper proposes a massive connection management architecture based on blockchain. The blockchain is reconstructed according to the hierarchical structure of blockchain technology, and with reference to the attribute-based access control mechanism, a data exchange model is designed using gossip mode and TLS networking mode to ensure the safe transmission of data. The peer computer network technology, data signature, and consensus mechanism are used to complete the design of the data exchange network layer and realize the design of the blockchain-based massive connection management architecture, so as to effectively avoid the single point of failure problem in the traditional management architecture and greatly reduce the burden of the management center. The access requests of massive devices in 5G application scenarios were simulated, and the results showed that the blockchain-based access control architecture designed in this article can quickly process received requests, with information leakage below 10%, improving the security and processing performance of data connections, achieving efficient processing and management of large-scale data, and providing reliable guarantees for the development of the Internet era.<\/jats:p>","DOI":"10.20965\/jaciii.2023.p0855","type":"journal-article","created":{"date-parts":[[2023,9,19]],"date-time":"2023-09-19T15:58:03Z","timestamp":1695139083000},"page":"855-865","source":"Crossref","is-referenced-by-count":0,"title":["Massive Data Connection Architecture Design of Web Platform Based on Blockchain"],"prefix":"10.20965","volume":"27","author":[{"given":"Hongping","family":"Cao","sequence":"first","affiliation":[{"name":"School of Data Science, Guangzhou Huashang College, Guangzhou, Guangdong 511300, China"},{"name":"School of Computer Science, Taylor\u2019s University, Subang Jaya, Selangor 47500, Malaysia"}]},{"given":"Hongxing","family":"Cao","sequence":"additional","affiliation":[{"name":"School of Electrical and Computer Engineering, Guangzhou Nanfang College, Guangzhou, Guangdong 510970, China"}]},{"given":"Hongwei","family":"Zhou","sequence":"additional","affiliation":[{"name":"School of Data Science, Guangzhou Huashang College, Guangzhou, Guangdong 511300, China"}]},{"given":"Yifeng","family":"Wu","sequence":"additional","affiliation":[{"name":"School of Data Science, Guangzhou Huashang College, Guangzhou, Guangdong 511300, China"}]},{"given":"Siyu","family":"Xu","sequence":"additional","affiliation":[{"name":"School of Data Science, Guangzhou Huashang College, Guangzhou, Guangdong 511300, China"}]}],"member":"8550","published-online":{"date-parts":[[2023,9,20]]},"reference":[{"key":"key-10.20965\/jaciii.2023.p0855-1","doi-asserted-by":"crossref","unstructured":"Y. Zhang, D. Zheng, and R. H. Deng, \u201cSecurity and privacy in smart health: Efficient policy-hiding attribute-based access control,\u201d IEEE Internet of Things J., Vol.5, No.3, pp. 2130-2145, 2018. https:\/\/doi.org\/10.1109\/JIOT.2018.2825289","DOI":"10.1109\/JIOT.2018.2825289"},{"key":"key-10.20965\/jaciii.2023.p0855-2","doi-asserted-by":"crossref","unstructured":"Y. Zhang, X. Chen, J. Li, D. S. Wong, H. Li, and I. You, \u201cEnsuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing,\u201d Information Sciences, Vol.379, pp. 42-61, 2017. https:\/\/doi.org\/10.1016\/j.ins.2016.04.015","DOI":"10.1016\/j.ins.2016.04.015"},{"key":"key-10.20965\/jaciii.2023.p0855-3","doi-asserted-by":"crossref","unstructured":"D. Han, N. Pan, and K.-C. Li, \u201cA traceable and revocable ciphertext-policy attribute-based encryption scheme based on privacy protection,\u201d IEEE Trans. on Dependable and Secure Computing, Vol.19, Issue 1, pp. 316-327, 2020. https:\/\/doi.org\/10.1109\/TDSC.2020.2977646","DOI":"10.1109\/TDSC.2020.2977646"},{"key":"key-10.20965\/jaciii.2023.p0855-4","doi-asserted-by":"crossref","unstructured":"Y. Jiang, W. Susilo, Y. Mu, and F. Guo, \u201cCiphertext-policy attribute-based encryption against key-delegation abuse in fog computing,\u201d Future Generation Computer Systems, Vol.78, No.2, pp. 720-729, 2018. https:\/\/doi.org\/10.1016\/j.future.2017.01.026","DOI":"10.1016\/j.future.2017.01.026"},{"key":"key-10.20965\/jaciii.2023.p0855-5","doi-asserted-by":"crossref","unstructured":"J. Li, Q. Yu, Y. Zhang, and J. Shen, \u201cKey-policy attribute-based encryption against continual auxiliary input leakage,\u201d Information Sciences, Vol.470, pp. 175-188, 2019. https:\/\/doi.org\/10.1016\/j.ins.2018.07.077","DOI":"10.1016\/j.ins.2018.07.077"},{"key":"key-10.20965\/jaciii.2023.p0855-6","doi-asserted-by":"crossref","unstructured":"P. Ruan, T. T. A. Dinh, Q. Lin, M. Zhang, G. Chen, and B. C. Ooi, \u201cLineageChain: A fine-grained, secure and efficient data provenance system for blockchains,\u201d The VLDB J., Vol.30, No.1, pp. 3-24, 2021. https:\/\/doi.org\/10.1007\/s00778-020-00646-1","DOI":"10.1007\/s00778-020-00646-1"},{"key":"key-10.20965\/jaciii.2023.p0855-7","doi-asserted-by":"crossref","unstructured":"M. El-Hindi, C. Binnig, A. Arasu, D. Kossmann, and R. Ramamurthy, \u201cBlockchainDB: A shared database on blockchains,\u201d Proc. of the VLDB Endowment, Vol.12, No.11, pp. 1597-1609, 2019. https:\/\/doi.org\/10.14778\/3342263.3342636","DOI":"10.14778\/3342263.3342636"},{"key":"key-10.20965\/jaciii.2023.p0855-8","doi-asserted-by":"crossref","unstructured":"Y. Peng, M. Du, F. Li, R. Cheng, and D. Song, \u201cFalconDB: Blockchain-based collaborative database,\u201d Proc. of the 2020 ACM SIGMOD Int. Conf. on Management of Data, pp. 637-652, 2020. https:\/\/doi.org\/10.1145\/3318464.3380594","DOI":"10.1145\/3318464.3380594"},{"key":"key-10.20965\/jaciii.2023.p0855-9","doi-asserted-by":"crossref","unstructured":"C. Zhang, C. Xu, J. Xu, Y. Tang, and B. Choi, \u201cGEM2-Tree: A Gas-Efficient Structure for Authenticated Range Queries in Blockchain,\u201d 35th IEEE Int. Conf. on Data Engineering (ICDE\u201919), 2019. https:\/\/doi.org\/10.1109\/ICDE.2019.00080","DOI":"10.1109\/ICDE.2019.00080"},{"key":"key-10.20965\/jaciii.2023.p0855-10","doi-asserted-by":"crossref","unstructured":"S. Wang, T. T. A. Dinh, Q. Lin, Z. Xie, M. Zhang, Q. Cai, G. Chen, W. Fu, B. C. Ooi, and P. Ruan, \u201cForkBase: An Efficient Storage Engine for Blockchain and Forkable Applications,\u201d arXiv:1802.04949, 2018. https:\/\/doi.org\/10.48550\/arXiv.1802.04949","DOI":"10.14778\/3231751.3231762"},{"key":"key-10.20965\/jaciii.2023.p0855-11","doi-asserted-by":"crossref","unstructured":"D. Jia, J. Xin, Z. Wang, W. Guo, and G. Wang, \u201cElasticChain: Support Very Large Blockchain by Reducing Data Redundancy,\u201d Asia-Pacific Web (APWeb) and Web-Age Information Management (WAIM) Joint Int. Conf. on Web and Big Data, Springer, pp. 440-454, 2018. https:\/\/doi.org\/10.1007\/978-3-319-96893-3_33","DOI":"10.1007\/978-3-319-96893-3_33"},{"key":"key-10.20965\/jaciii.2023.p0855-12","doi-asserted-by":"crossref","unstructured":"J. Lind, O. Naor, I. Eyal, F. Kelbert, P. Pietzuch, and E. G. Sirer, \u201cTeechain: Reducing storage costs on the blockchain with offline payment channels,\u201d Proc. of the 11th ACM Int. Systems and Storage Conf., p. 125, 2018. https:\/\/doi.org\/10.1145\/3211890.3211904","DOI":"10.1145\/3211890.3211904"},{"key":"key-10.20965\/jaciii.2023.p0855-13","doi-asserted-by":"crossref","unstructured":"Z. Ma, L. Wang, X. Wang, Z. Wang, and W. Zhao, \u201cBlockchain-Enabled Decentralized Trust Management and Secure Usage Control of IoT Big Data,\u201d IEEE Internet of Things J., Vol.7, No.5, pp. 4000-4015, 2019. https:\/\/doi.org\/10.1109\/JIOT.2019.2960526","DOI":"10.1109\/JIOT.2019.2960526"},{"key":"key-10.20965\/jaciii.2023.p0855-14","doi-asserted-by":"crossref","unstructured":"K. Karlsson, W. Jiang, S. Wicker, D. Adams, E. Ma, R. van Renesse, and H. Weatherspoon, \u201cVegvisir: A Partition-Tolerant Blockchain for the Internet-of-Things,\u201d 2018 IEEE 38th Int. Conf. on Distributed Computing Systems (ICDCS), pp. 1150-1158, 2018. https:\/\/doi.org\/10.1109\/ICDCS.2018.00114","DOI":"10.1109\/ICDCS.2018.00114"},{"key":"key-10.20965\/jaciii.2023.p0855-15","doi-asserted-by":"crossref","unstructured":"A. Alnoman, S. K. Sharma, W. Ejaz, and A. Anpalagan, \u201cEmerging Edge Computing Technologies for Distributed IoT Systems,\u201d IEEE Network, Vol.33, No.6, pp. 140-147, 2019. https:\/\/doi.org\/10.1109\/MNET.2019.1800543","DOI":"10.1109\/MNET.2019.1800543"},{"key":"key-10.20965\/jaciii.2023.p0855-16","doi-asserted-by":"crossref","unstructured":"J. Sun, H. Xiong, X. Liu, Y. Zhang, X. Nie, and R. H. Deng, \u201cLightweight and Privacy-Aware Fine-Grained Access Control for IoT-Oriented Smart Health,\u201d IEEE Internet of Things J., Vol.7, No.7, pp. 6566-6575, 2020. https:\/\/doi.org\/10.1109\/JIOT.2020.2974257","DOI":"10.1109\/JIOT.2020.2974257"},{"key":"key-10.20965\/jaciii.2023.p0855-17","doi-asserted-by":"crossref","unstructured":"S. F. Aghili, H. Mala, M. Shojafar, and P. Peris-Lopez, \u201cLACO: Lightweight Three-Factor Authentication, Access Control and Ownership Transfer Scheme for E-Health Systems in IoT,\u201d Future Generation Computer Systems, Vol.96, No.7, pp. 410-424, 2019. https:\/\/doi.org\/10.1016\/j.future.2019.02.020","DOI":"10.1016\/j.future.2019.02.020"},{"key":"key-10.20965\/jaciii.2023.p0855-18","doi-asserted-by":"crossref","unstructured":"M. Aman, U. Javaid, and B. Sikdar, \u201cA Privacy-Preserving and Scalable Authentication Protocol for the Internet of Vehicles,\u201d IEEE Internet of Things J., Vol.8, No.2, pp. 1123-1139, 2020. https:\/\/doi.org\/10.1109\/JIOT.2020.3010893","DOI":"10.1109\/JIOT.2020.3010893"},{"key":"key-10.20965\/jaciii.2023.p0855-19","doi-asserted-by":"crossref","unstructured":"S. F. Aghili, H. Mala, P. Kaliyar, and M. Conti, \u201cSecLAP: Secure and lightweight RFID authentication protocol for medical IoT,\u201d Future Generation Computer Systems, Vol.101, pp. 621-634, 2019. https:\/\/doi.org\/10.1016\/j.future.2019.07.004","DOI":"10.1016\/j.future.2019.07.004"},{"key":"key-10.20965\/jaciii.2023.p0855-20","doi-asserted-by":"crossref","unstructured":"S. Xia, F. Lin, Z. Chen, C. Tang, Y. Ma, and X. Yu, \u201cA Bayesian Game Based Vehicle-to-Vehicle Electricity Trading Scheme for Blockchain-Enabled Internet of Vehicles,\u201d IEEE Trans. on Vehicular Technology, Vol.69, No.7, pp. 6856-6868, 2020. https:\/\/doi.org\/10.1109\/TVT.2020.2990443","DOI":"10.1109\/TVT.2020.2990443"},{"key":"key-10.20965\/jaciii.2023.p0855-21","doi-asserted-by":"crossref","unstructured":"V. Hassija, V. Chamola, V. Saxena, D. Jain, P. Goyal, and B. Sikdar, \u201cA Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures,\u201d IEEE Access, Vol.7, pp. 82721-82743, 2019. https:\/\/doi.org\/10.1109\/ACCESS.2019.2924045","DOI":"10.1109\/ACCESS.2019.2924045"},{"key":"key-10.20965\/jaciii.2023.p0855-22","doi-asserted-by":"crossref","unstructured":"H. Dai, Z. Zheng, and Y. Zhang, \u201cBlockchain for Internet of Things: A Survey,\u201d IEEE Internet of Things J., Vol.6, No.5, pp. 8076-8094, 2019. https:\/\/doi.org\/10.1109\/JIOT.2019.2920987","DOI":"10.1109\/JIOT.2019.2920987"},{"key":"key-10.20965\/jaciii.2023.p0855-23","doi-asserted-by":"crossref","unstructured":"L. Barbierato, A. Estebsari, E. Pons, M. Pau, F. Salassa, M. Ghirardi, and E. Patti, \u201cA Distributed IoT Infrastructure to Test and Deploy Real-Time Demand Response in Smart Grids,\u201d IEEE Internet of Things J., Vol.6, No.1, pp. 1136-1146, 2019. https:\/\/doi.org\/10.1109\/JIOT.2018.2867511","DOI":"10.1109\/JIOT.2018.2867511"},{"key":"key-10.20965\/jaciii.2023.p0855-24","doi-asserted-by":"crossref","unstructured":"S. Wang, A. F. Taha, J. Wang, K. Kvaternik, and A. Hahn, \u201cEnergy Crowdsourcing and Peer-to-Peer Energy Trading in Blockchain-Enabled Smart Grids,\u201d IEEE Trans. on Systems, Man and Cybernetics, Vol.49, No.8, pp. 1612-1623, 2019. https:\/\/doi.org\/10.1109\/TSMC.2019.2916565","DOI":"10.1109\/TSMC.2019.2916565"},{"key":"key-10.20965\/jaciii.2023.p0855-25","doi-asserted-by":"crossref","unstructured":"T.-M. Choi, \u201cFinancing Product Development Projects in the Blockchain Era: Initial Coin Offerings Versus Traditional Bank Loans,\u201d IEEE Trans. on Engineering Management, Vol.69, Issue 6, pp. 3184-3196, 2022. https:\/\/doi.org\/10.1109\/TEM.2020.3032426","DOI":"10.1109\/TEM.2020.3032426"}],"container-title":["Journal of Advanced Computational Intelligence and Intelligent Informatics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.fujipress.jp\/main\/wp-content\/themes\/Fujipress\/hyosetsu.php?ppno=JACII002700050012","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,19]],"date-time":"2023-09-19T16:02:41Z","timestamp":1695139361000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.fujipress.jp\/jaciii\/jc\/jacii002700050855"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,20]]},"references-count":25,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2023,9,20]]},"published-print":{"date-parts":[[2023,9,20]]}},"URL":"https:\/\/doi.org\/10.20965\/jaciii.2023.p0855","relation":{},"ISSN":["1883-8014","1343-0130"],"issn-type":[{"value":"1883-8014","type":"electronic"},{"value":"1343-0130","type":"print"}],"subject":[],"published":{"date-parts":[[2023,9,20]]}}}