Abstract
As the role of blockchain technology in various industries becomes more and more important, the technical limitations of its consensus mechanism, private key management and smart contracts are gradually emerging. However, security events such as blockchain platform applications are emerging one after another. As a new round of transformative power in the network era, it combines the blockchain with existing technologies to generate new formats and new models. Technology applications and existing cybersecurity regulatory policies have brought new challenges. This paper analyzes the typical application architecture of blockchain technology, and analyzes the security risks of blockchain application architecture from key layers such as storage layer, protocol layer, extension layer, and application layer. This article combines the DOC mechanism with IOT application scenarios to propose a blockchain-based confidential IOT service model (Beekeeper 1.0) that supports first-order homomorphic multiplication, and a blockchain-based confidential IOT service model that supports high-order homomorphic multiplication (Beekeeper 2.0), Beekeeper 2.0 significantly improves Beekeeper 1.0 in server capabilities, verification efficiency, verification key length, and device work diversity. This article finds that the chain code call delay basically increases with the increase in the transaction sending rate. When the transaction sending rate reaches 300TPS, the chain code calling delay only increases a little, and when the transaction sending rate reaches 300TPS, the success rate of the transaction on the chain increases. Finally, the average blockchain access delay increases with the increase in the transaction sending rate. The blockchain access delay is affected by less throughput, and the transaction success rate is stable at 98%.







Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Li J, Liang G, Liu T (2017) A novel multi-link integrated factor algorithm considering node trust degree for blockchain-based communication[J]. KSII Trans Internet Inf Sys 11(8):3766–3788
Cha SC, Hung SC, Chen JF et al (2017) On the design of a blockchain-based reputation service for android applications[J]. Adv Sci Lett 23(3):2179–2184
Mengelkamp E, Notheisen B, Beer C et al (2018) A blockchain-based smart grid: towards sustainable local energy markets[J]. Computer Sci Res & Develop 33(1–2):207–214
Geng W U, Bo Z, Ran LI et al (2017) Research on the Application of Blockchain in the Integrated Demand Response Resource Transaction [J]. proceedings of the Csee, 37(13): 3717–3728
Yang X, Zhang Y, Lu J et al (2017) Blockchain-based automated demand response method for energy storage system in an energy local network[J]. Zhongguo Dianji Gongcheng Xuebao/proc Chinese Soc Electr Eng 37(13):3703–3716
Schneider FB (2018) Viewpoint Impediments with Policy Interventions to Foster Cybersecurity[J]. communications of the acm, 61(3):36–38
Spindler G (2019) Digitalization and corporate law–a view from Germany[J]. European Co Financial Law 16(1–2):106–148
Zhang J (2016) Walks trajectory tracking of shared information based on consortium blockchain[J]. Revista de la Facultad de Ingenieria 31(12):8–17
Singh M, Kim S (2017) Intelligent vehicle-trust point: reward based intelligent vehicle communication using blockchain[J]. Opt Eng 33(1):701–709
Yermack D (2017) Corporate Governance and Blockchains[J]. Rev Finance 21(1):7–31
CreditCoin: A Privacy-Preserving Blockchain-Based Incentive Announcement Network for Communications of Smart Vehicles[J]. IEEE Transactions on Intelligent Transportation Systems, 2018, 19(7):2204–2220.
Yin H, Guo D, Wang K et al (2018) Hyperconnected network: a decentralized trusted computing and networking Paradigm[J]. IEEE Network 32(1):112–117
Savelyev A . Contract law 2.0: ‘Smart’ contracts as the beginning of the end of classic contract law[J]. Information & Communications Technology Law, 2017, 26(2):1–19.
Konoplev AS, Busygin AG, Zegzhda DP (2018) A Blockchain Decentralized Public Key Infrastructure Model[J]. Automatic Control Co ences 52(8):1017–1021
Cavelty MD (2018) Cybersecurity Research Meets Science and Technology Studies[J]. Politics Governance 6(2):22
Kim TK, Kan JM (2018) Sharing the attribute information based on blockchain[J]. J Eng Appl Sci 13(3):771–775
Adoma F (2018) Big Data, Machine Learning and the BlockChain Technology: An Overview[J]. Int J Co Appl 180(28):1–4
Karamitsos I, Papadaki M, Barghuthi NBA (2018) Design of the blockchain smart contract: a use case for real estate[J]. Journal of Information Security 09(3):177–190
Bahga A, Madisetti VK (2016) Blockchain Platform for Industrial Internet of Things[J]. J Softw Eng Appl 09(10):533–546
Weber RH, Studer E (2016) Cybersecurity in the Internet of Things: Legal aspects[J]. Co Law Secur Report 32(5):715–728
Cruz T, Rosa L, Proena J et al (2016) A cyber security detection framework for supervisory control and data acquisition systems[J]. IEEE Trans Industr Inf 12(6):2236–2246
Conteh NY, Schmick PJ (2016) Cybersecurity:risks, vulnerabilities and countermeasures to prevent social engineering attacks[J]. Int J Adv Co Res 6(23):31–38
Finnemore M, Hollis DB (2016) Constructing norms for global cybersecurity[J]. Am J Int Law 110(3):425–479
Gordon LA, Loeb MP, Zhou L (2016) Investing in cybersecurity: insights from the gordon-loeb model[J]. J Inf Secur 07(2):49–59
Mckenna S, Staheli D, Fulcher C et al (2016) BubbleNet: a cyber security dashboard for visualizing patterns[J]. Co Gr Forum 35(3):281–290
Woo PS, Kim BH (2017) Methodology of cyber security assessment in the smart grid[J]. J Electr Eng Technol 12(2):495–501
Acknowledgements
This work was supported by Grant NO.2019JZZY011101 from the Major scientific and technological innovation projects in Shandong Province to Dianmin Sun.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
There is no potential competing interests in our paper. And all authors have seen the manuscript and approved to submit to your journal. We confirm that the content of the manuscript has not been published or submitted for publication elsewhere.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Zhao, H., Zhang, M., Wang, S. et al. Security risk and response analysis of typical application architecture of information and communication blockchain. Neural Comput & Applic 33, 7661–7671 (2021). https://doi.org/10.1007/s00521-020-05508-z
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00521-020-05508-z