Citation: | ZHAO X X,TAN H B,ZHAO H,et al. A consortium chain improvement model based on multi-chain collaboration[J]. Journal of Beijing University of Aeronautics and Astronautics,2024,50(10):3283-3296 (in Chinese) doi: 10.13700/j.bh.1001-5965.2022.0814 |
In recent years, blockchain technology has been developing rapidly, and It plays a critical role in fintech, supply chain, medical health, data security and other fields. Due to friendly supervision and excellent performance, the consortium chain has become China's first choice for government and commercial blockchain. However, it is usually faced with problems such as the small number of effective nodes, low node independence, and weak sustainable development ability, which reduces the system’s reliability. We suggest the alliance model, a blockchain approach that coordinates several consortium chains to increase system stability, in light of the aforementioned issues. The model stores data by overlapping each other between chains to reduce the possibility of data tampering and ensure data recovery. In addition, we use the methods of aggregated signature and data integrity verification to solve the problems of transmission data integrity and source authenticity. In order to verify the legitimacy of reciprocal endorsement of collaborative data and to check the continuation of the sent data, we also develop an existence verification method. To confirm its efficacy, this scheme's communication, storage, and computational usage are compared to those of the current techniques.
[1] |
ZHENG Z B, XIE S A, DAI H N, et al. An overview of blockchain technology: architecture, consensus, and future trends[C]// 2017 IEEE International Congress on Big Data (BigData Congress). Piscataway: IEEE Press, 2017: 557-564.
|
[2] |
CASTRO M, LISKOV B. Practical Byzantine fault tolerance and proactive recovery[J]. ACM Transactions on Computer Systems, 2002, 20(4): 398-461. doi: 10.1145/571637.571640
|
[3] |
ZHU X Y, BADR Y. Identity management systems for the Internet of Things: a survey towards blockchain solutions[J]. Sensors, 2018, 18(12): 4215. doi: 10.3390/s18124215
|
[4] |
中国电子信息产业发展研究院. 2021年中国区块链年度发展白皮书[R/OL]. (2022-06-14)[2022-07-24]. https://dsj.guizhou.gov.cn/xwzx/gnyw/202206/t20220614_74881576.html.
|
[5] |
武腾, 薛磊, 郑东, 等. P2P持久存储系统可靠性分析与数据维护优化[J]. 信息安全与通信保密, 2009, 7(8): 149-153. doi: 10.3969/j.issn.1009-8054.2009.08.057
WU T, XUE L, ZHENG D, et al. Reliability analysis and data maintenance optimization of P2P durable storage system[J]. Information Security and Communications Privacy, 2009, 7(8): 149-153 (in Chinese). doi: 10.3969/j.issn.1009-8054.2009.08.057
|
[6] |
GUO H Q, YU X J. A survey on blockchain technology and its security[J]. Blockchain: Research and Applications, 2022, 3(2): 100067. doi: 10.1016/j.bcra.2022.100067
|
[7] |
BANDARA H D, XU X W, WEBER I. Patterns for blockchain data migration[C]// Proceedings of the European Conference on Pattern Languages of Programs 2020. New York: ACM, 2020: 1-19.
|
[8] |
LEI K, ZHANG Q C, XU L M, et al. Reputation-based Byzantine fault-tolerance for consortium blockchain[C]// 2018 IEEE 24th International Conference on Parallel and Distributed Systems (ICPADS). Piscataway: IEEE Press, 2018: 604-611.
|
[9] |
YAN C Y, ZHANG C, LU Z G, et al. Blockchain abnormal behavior awareness methods: a survey[J]. Cybersecurity, 2022, 5(1): 5. doi: 10.1186/s42400-021-00107-4
|
[10] |
ARÁOZ M. Proof of existence[R/OL]. [2022-07-24]. http://docs.proofofexistence.com.
|
[11] |
谭海波, 周桐, 赵赫, 等. 基于区块链的档案数据保护与共享方法[J]. 软件学报, 2019, 30(9): 2620-2635.
TAN H B, ZHOU T, ZHAO H, et al. Archival data protection and sharing method based on blockchain[J]. Journal of Software, 2019, 30(9): 2620-2635 (in Chinese).
|
[12] |
HOPE-BAILIE A, THOMAS S. Interledger: creating a standard for payments[C]//Proceedings of the 25th International Conference Companion on World Wide Web-WWW '16 Companion. New York: ACM, 2016: 281-282.
|
[13] |
叶少杰, 汪小益, 徐才巢, 等. BitXHub: 基于侧链中继的异构区块链互操作平台[J]. 计算机科学, 2020, 47(6): 294-302. doi: 10.11896/jsjkx.191100055
YE S J, WANG X Y, XU C C, et al. BitXHub: side-relay chain based heterogeneous blockchain interoperable platform[J]. Computer Science, 2020, 47(6): 294-302 (in Chinese). doi: 10.11896/jsjkx.191100055
|
[14] |
FLOERSCH K. Ethereum smart contracts in L2: optimistic rollup[R/OL]. (2019-08-28)[2022-11-30]. https://medium.com/plasma-group/ethereum-smart-contracts-in-l2-optimistic-rollup-2c1cef2ec537.
|
[15] |
BUTERIN V. Chain interoperability[R/OL]. R3 research paper, 2016 (2016-09-09)[2022-07-24]. https://allquantor.at/blockchainbib/pdf/vitalik2016chain.pdf.
|
[16] |
VIGIL M, BUCHMANN J, CABARCAS D, et al. Integrity, authenticity, non-repudiation, and proof of existence for long-term archiving: a survey[J]. Computers & Security, 2015, 50: 16-32.
|
[17] |
LAKHWANI K, KAUR R, KUMAR P, et al. An extensive survey on data authentication schemes in cloud computing[C]// 2018 4th International Conference on Computing Sciences (ICCS). Piscataway: IEEE Press, 2018: 59-66.
|
[18] |
MERKLE R C. A certified digital signature[M]// Advances in Cryptology — CRYPTO’ 89 Proceedings. New York: Springer New York, 2007: 218-238.
|
[19] |
BENALOH J, DE MARE M. One-way accumulators: a decentralized alternative to digital signatures[M]// Advances in cryptology — EUROCRYPT ’93. Berlin: Springer Berlin Heidelberg, 1994: 274-285.
|
[20] |
ATENIESE G, DI PIETRO R, MANCINI L V, et al. Scalable and efficient provable data possession[C]// Proceedings of the 4th International Conference on Security and Privacy in Communication Netowrks. New York: ACM, 2008: 1-10.
|
[21] |
Zlib home site[EB/OL]. (1995-05-01)[2022-03-28]. http://www.zlib.net.
|
[22] |
祁健. 累加器在区块链中的应用研究[D]. 南京: 南京信息工程大学, 2020: 22-33.
QI J. Research on the application of accumulator in blockchain[D]. Nanjing: Nanjing University of Information Science & Technology, 2020: 22-33 (in Chinese).
|