Computer Science ›› 2021, Vol. 48 ›› Issue (11): 4-11.doi: 10.11896/jsjkx.210500159
• Blockchain Technology • Previous Articles Next Articles
MAO Han-yu1, NIE Tie-zheng1, SHEN De-rong1, YU Ge1, XU Shi-cheng2, HE Guang-yu2
CLC Number:
[1]SATOSHI N.Bitcoin:A Peer-to-Peer Electronic Cash System[EB/OL].https://bitcoin.org/bitcoin.pdf. [2]BENČIĆF M,ŽARKO I P.Distributed Ledger Technology:Blockchain Compared to Directed Acyclic Graph[C]//2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS).2018:1569-1570. [3]LENG J D,LV X Q,JIANG Y,et al.Consensus Mechanisms of ConsortiumBlockchain:A Survey[J].Data Analysis and Know-ledge Discovery,2021,5(1):56-65. [4]TAN M S,YANG J,DING L,et al.Review of Consensus Me-chanism of Blockchain[J].Computer Engineering,2020,46(12):1-11. [5]LONEA H,NAAZ R.Demystifying Cryptography behind Block-chains and a Vision for Post-Quantum Blockchains[C]//2020 IEEE International Conference for Innovation in Technology (INOCON).2020:1-6. [6]YU G,NIE T Z,LI X H,et al.The Challenge and Prospect of Distributed Data Management Techniques in Blockchain System[J].Chinese Journal of Computers,2021,44(1):28-54. [7]SHAO Q F,JIN C Q,ZHANG Z,et al.Blockchain:Architecture and Research Progress[J].Chinese Journal of Computers,2018,41(5):969-988. [8]HUA S,ZHANG S,PI B,et al.Reasonableness discussion and analysis for Hyperledger Fabric configuration[C]//2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC).2020:1-3. [9]ABUHASHIMA,TANC C.Smart Contract Designs on Block-chain Applications[C]//2020 IEEE Symposium on Computers and Communications (ISCC).2020:1-4. [10]YANG S,LIU H S,CHENG Y.Overview of design and implementation of cloud computing security system[J].Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition),2020,32(5):816-824. [11]ZHENG W,ZHENG Z,CHEN X,et al.NutBaaS:A Blockchain-as-a-Service Platform[J].IEEE Access,2019,7:134422-134433. [12]XU Z Y,ZHOU X.Survey on crosschain technology[J].Application Research of Computers,2021,38(2):341-346. [13]GUO C,GUO S Y,ZHANG S L,et al.Analysis of cross-chain technology of blockchain[J].Chinese Journal on Internet of Things,2020,4(2):35-48. [14]ALEKSIEVA V,VALCHANOV H,HULIYAN A.Implementation of Smart-Contract,Based on Hyperledger Fabric Blockchain[C]//2020 21st International Symposium on Electrical Apparatus & Technologies (SIELA).2020:1-4. [15]JIANG Y,LV R Z.Overview of Blockchain Consensus Algorithms[J].Journal of Jiamusi University(Natural Science Edition),2021,39(2):132-137,161. [16]KANG H Y,DENG J.Survey on Blockchain Data Privacy Protection[J].Journal of Shandong University (Natural Science),2021,56(5):92-110. [17]JIAO J,KAN S,LINS W,et al.Semantic Understanding ofSmart Contracts:Executable Operational Semantics of Solidity[C]//2020 IEEE Symposium on Security and Privacy (SP).2020:1695-1712. [18]KHANS A,AGGARWALR K,KULKARNI S.EncryptionSchemes of Cloud Computing:A Review[C]//2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS).2019:23-26. [19]BAO Y H,FU Y J,CHEN W W.Research Progress on KeyTechnologies of Multi-Cloud Storage[J].Computer Enginee-ring,2020,46(10):18-32,40. [20]ZHANG Z W,WANG G R,XU J L,et al.Survey on Data Ma-nagement in Blockchain Systems[J].Journal of Software,2020,31(9):2903-2925. [21]DAI B R,JIANG S M,LI D W,et al.Evaluation model of cross-chain notary mechanism based on improved PageRank algorithm[J].Computer Engineering,2021,47(2):26-31. [22]YE S J,WANG X Y,XU C C,et al.BitXHub:Side-relay Chain Based Heterogeneous Blockchain Interoperable Platform[J].Computer Science,2020,47(6):294-302. [23]KALYANI D,SRIDEVI R.Robust distributed key issuing protocol for identity based cryptography[C]//2016 International Conference on Advances in Computing,Communications and Informatics (ICACCI).2016:821-825. [24]SIRIS V A,DIMOPOULOS D,FOTIOU N,et al. IoT ResourceAccess utilizing Blockchains and Trusted Execution Environments[C]//2019 Global IoT Summit (GIoTS).2019:1-6. [25]FAN J L,LI X H,NIE T Z,et al.Survey on Smart Contract Based on Blockchain System[J].Computer Science,2019,46(11):1-10. [26]TSUTSUMI D,OHMURA I,ABE T,et al.An AES processing system with a compact CPU core for secure communication in embedded systems[C]//TENCON 2012 IEEE Region 10 Conference.2012:1-5. [27]YU H B,CHEN J,ZHANG K.Design of a Secure Cloud Storage Scheme Based on Blockchain[J].Computer Applications and Software,2021,38(4):64-68. [28]LI G H.Blockchain-based cloud storage for digital forensics[J].Network Security Technology & Application,2021(4):155-156. [29]LI D,WONGW E,ZHAO M,et al.Secure Storage and Access for Task-Scheduling Schemes on Consortium Blockchain and Interplanetary File System[C]//2020 IEEE 20th International Conference on Software Quality,Reliability and Security Companion (QRSC).2020:153-159. [30]WANG T,CHANG X,LIU B.Performability Analysis for IaaSCloud Data Center[C]//2016 17th International Conference on Parallel and Distributed Computing,Applications and Technologies (PDCAT).2016:91-94. [31]KHAJEH-HOSSEINI A,GREENWOOD D,SOMMERVILLEI.Cloud Migration:A Case Study of Migrating an Enterprise IT System to IaaS[C]//2010 IEEE 3rd International Conference on Cloud Computing.2010:450-457. [32]WEN Z,LIANG Y,LI G.Design and Implementation of High-availability PaaS Platform Based on Virtualization Platform[C]// 2020 IEEE 5th Information Technology and Mechatronics Engineering Conference (ITOEC).2020:1571-1575. [33]CHENG T L,QING L,ZHOU L,et al.PaaS:A revolution for information technology platforms[C]//2010 International Conference on Educational and Network Technology.2010:346-349. [34]LIU G.Research on independent SaaS platform[C]//2010 2nd IEEE International Conference on Information Management and Engineering.2010:110-113. [35]LIU W,ZHANG B,LIU Y,et al.New model of SaaS:SaaS with tenancy agency[C]//2010 2nd International Conference on Advanced Computer Control.2010:463-466. [36]YAN L,DENG H J,CHEN X.A Survey of Status and Research on TLS Protocol[J].Network New Media Technology,2019,8(1):1-8,17. [37]YU D R,BIAN F,ZHANG B.Improving TLS Protocol UsingIdentity-Based Double-certificate Mechanism[C]//2012 International Conference on Industrial Control and Electronics Engineering.2012:48-51. [38]YUAN X C,FU G,BI J Z,et al.Survey on data caching techno-logy of distributed dataflow system[J].Big Data Research,2020,6(3):101-116. [39]NGUYENC N,KIM J,HWANG S.KOHA:Building a Kafka-Based Distributed Queue System on the Fly in a Hadoop Cluster[C]//2016 IEEE 1st International Workshops on Foundations and Applications of Self* Systems (FAS*W).2016:48-53. [40]WANGX,LI J W,CHAI J P.The Research on the Incentive Method of Consortium Blockchain Based on Practical Byzantine Fault Tolerant[C]//2018 11th International Symposium on Computational Intelligence and Design (ISCID).2018:154-156. [41]NEISSE R,HERNANDEZ-RAMOS J L,MATHEU-GARCIAS N,et al.An Interledger Blockchain Platform for cross-border Management of Cybersecurity Information[J].IEEE Internet Computing,2020,24(3):19-29. [42]THOMAS S,SCHARRTZ E.Interledger whitepaper [EB/OL].https://interledger.org/. [43]BASTA A,BLENK A,LAI Y.HyperFlex:Demonstrating control-plane isolation for virtual software-defined network[C]//2015 IFIP/IEEE International Symposium on Integrated Network Management (IM).2015:1163-1164. [44]WANG X T.Construction of Cloud DataCenter based on Vir-tualization Technology and Automated Maintenance Management[J].Software Engineering,2020,23(11):27-29. [45]ZHANG T,GAO T,XU P,et al.A Review of AI and AI Intelligence Assessment[C]//2020 IEEE 4th Conference on Energy Internet and Energy System Integration (EI2).Wuhan,China,2020:3039-3044. [46]SHAMIM M,BHUIYAN F A,RAHMAN A.XI Command-ments of Kubernetes Security:A Systematization of Knowledge Related to Kubernetes Security Practices[OL].https://arxiv.org/abs/2006.15275. [47]ANT Group.Antchain Blockchain as a Service Documentation[EB/OL].https://antchain.antgroup.com/docs/11/73763. [48]AOKI Y,KOSHIZUKA N,SEIKE H.Fork Rate-Based Analysis of the Longest Chain Growth Time Interval of a PoW Blockchain[C]//2019 IEEE International Conference on Blockchain (Blockchain).IEEE,2019. [49]SUKHWANI H,MARTINEZ J M,CHANG X,et al.Perfor-mance Modeling of PBFT Consensus Process for Permissioned Blockchain Network (Hyperledger Fabric)[C]//2017 IEEE 36th Symposium on Reliable Distributed Systems (SRDS).IEEE,2017. [50]LIU Y J.Research on Content Placement Optimization in Cloud Content Distribution Network[D].Jinan:Shandong Normal University,2019. [51]AIYAR K,HALGAMUGE M N,MOHAMAD A.Probability Distribution Model to Analyze the Trade-off between Scalability and Security of Sharding-Based Blockchain Networks[C]//IEEE Consumer Communications & Networking Conference (IEEE CCNC’21).IEEE,2021. |
[1] | WANG Zi-kai, ZHU Jian, ZHANG Bo-jun, HU Kai. Research and Implementation of Parallel Method in Blockchain and Smart Contract [J]. Computer Science, 2022, 49(9): 312-317. |
[2] | ZHOU Hang, JIANG He, ZHAO Yan, XIE Xiang-peng. Study on Optimal Scheduling of Power Blockchain System for Consensus Transaction ofEach Unit [J]. Computer Science, 2022, 49(6A): 771-776. |
[3] | LI Bo, XIANG Hai-yun, ZHANG Yu-xiang, LIAO Hao-de. Application Research of PBFT Optimization Algorithm for Food Traceability Scenarios [J]. Computer Science, 2022, 49(6A): 723-728. |
[4] | FU Li-yu, LU Ge-hao, WU Yi-ming, LUO Ya-ling. Overview of Research and Development of Blockchain Technology [J]. Computer Science, 2022, 49(6A): 447-461. |
[5] | GAO Jian-bo, ZHANG Jia-shuo, LI Qing-shan, CHEN Zhong. RegLang:A Smart Contract Programming Language for Regulation [J]. Computer Science, 2022, 49(6A): 462-468. |
[6] | MAO Dian-hui, HUANG Hui-yu, ZHAO Shuang. Study on Automatic Synthetic News Detection Method Complying with Regulatory Compliance [J]. Computer Science, 2022, 49(6A): 523-530. |
[7] | WANG Si-ming, TAN Bei-hai, YU Rong. Blockchain Sharding and Incentive Mechanism for 6G Dependable Intelligence [J]. Computer Science, 2022, 49(6): 32-38. |
[8] | SUN Hao, MAO Han-yu, ZHANG Yan-feng, YU Ge, XU Shi-cheng, HE Guang-yu. Development and Application of Blockchain Cross-chain Technology [J]. Computer Science, 2022, 49(5): 287-295. |
[9] | YANG Zhen, HUANG Song, ZHENG Chang-you. Study on Crowdsourced Testing Intellectual Property Protection Technology Based on Blockchain and Improved CP-ABE [J]. Computer Science, 2022, 49(5): 325-332. |
[10] | REN Chang, ZHAO Hong, JIANG Hua. Quantum Secured-Byzantine Fault Tolerance Blockchain Consensus Mechanism [J]. Computer Science, 2022, 49(5): 333-340. |
[11] | FENG Liao-liao, DING Yan, LIU Kun-lin, MA Ke-lin, CHANG Jun-sheng. Research Advance on BFT Consensus Algorithms [J]. Computer Science, 2022, 49(4): 329-339. |
[12] | GAO Shi-yao, CHEN Yan-li, XU Yu-lan. Expressive Attribute-based Searchable Encryption Scheme in Cloud Computing [J]. Computer Science, 2022, 49(3): 313-321. |
[13] | YANG Xin-yu, PENG Chang-gen, YANG Hui, DING Hong-fa. Rational PBFT Consensus Algorithm with Evolutionary Game [J]. Computer Science, 2022, 49(3): 360-370. |
[14] | WANG Xin, ZHOU Ze-bao, YU Yun, CHEN Yu-xu, REN Hao-wen, JIANG Yi-bo, SUN Ling-yun. Reliable Incentive Mechanism for Federated Learning of Electric Metering Data [J]. Computer Science, 2022, 49(3): 31-38. |
[15] | ZHANG Ying-li, MA Jia-li, LIU Zi-ang, LIU Xin, ZHOU Rui. Overview of Vulnerability Detection Methods for Ethereum Solidity Smart Contracts [J]. Computer Science, 2022, 49(3): 52-61. |
|