Volume 50 Issue 10
Oct.  2024
Turn off MathJax
Article Contents
ZHAO X X,TAN H B,ZHAO H,et al. A consortium chain improvement model based on multi-chain collaboration[J]. Journal of Beijing University of Aeronautics and Astronautics,2024,50(10):3283-3296 (in Chinese) doi: 10.13700/j.bh.1001-5965.2022.0814
Citation: ZHAO X X,TAN H B,ZHAO H,et al. A consortium chain improvement model based on multi-chain collaboration[J]. Journal of Beijing University of Aeronautics and Astronautics,2024,50(10):3283-3296 (in Chinese) doi: 10.13700/j.bh.1001-5965.2022.0814

A consortium chain improvement model based on multi-chain collaboration

doi: 10.13700/j.bh.1001-5965.2022.0814
Funds:  National Key Research and Development Program of China (2021YFB2700800)
More Information
  • Corresponding author: E-mail:zhaoh@hfcas.ac.cn
  • Received Date: 29 Sep 2022
  • Accepted Date: 25 Nov 2022
  • Available Online: 10 Mar 2023
  • Publish Date: 09 Mar 2023
  • In recent years, blockchain technology has been developing rapidly, and It plays a critical role in fintech, supply chain, medical health, data security and other fields. Due to friendly supervision and excellent performance, the consortium chain has become China's first choice for government and commercial blockchain. However, it is usually faced with problems such as the small number of effective nodes, low node independence, and weak sustainable development ability, which reduces the system’s reliability. We suggest the alliance model, a blockchain approach that coordinates several consortium chains to increase system stability, in light of the aforementioned issues. The model stores data by overlapping each other between chains to reduce the possibility of data tampering and ensure data recovery. In addition, we use the methods of aggregated signature and data integrity verification to solve the problems of transmission data integrity and source authenticity. In order to verify the legitimacy of reciprocal endorsement of collaborative data and to check the continuation of the sent data, we also develop an existence verification method. To confirm its efficacy, this scheme's communication, storage, and computational usage are compared to those of the current techniques.

     

  • loading
  • [1]
    ZHENG Z B, XIE S A, DAI H N, et al. An overview of blockchain technology: architecture, consensus, and future trends[C]// 2017 IEEE International Congress on Big Data (BigData Congress). Piscataway: IEEE Press, 2017: 557-564.
    [2]
    CASTRO M, LISKOV B. Practical Byzantine fault tolerance and proactive recovery[J]. ACM Transactions on Computer Systems, 2002, 20(4): 398-461. doi: 10.1145/571637.571640
    [3]
    ZHU X Y, BADR Y. Identity management systems for the Internet of Things: a survey towards blockchain solutions[J]. Sensors, 2018, 18(12): 4215. doi: 10.3390/s18124215
    [4]
    中国电子信息产业发展研究院. 2021年中国区块链年度发展白皮书[R/OL]. (2022-06-14)[2022-07-24]. https://dsj.guizhou.gov.cn/xwzx/gnyw/202206/t20220614_74881576.html.
    [5]
    武腾, 薛磊, 郑东, 等. P2P持久存储系统可靠性分析与数据维护优化[J]. 信息安全与通信保密, 2009, 7(8): 149-153. doi: 10.3969/j.issn.1009-8054.2009.08.057

    WU T, XUE L, ZHENG D, et al. Reliability analysis and data maintenance optimization of P2P durable storage system[J]. Information Security and Communications Privacy, 2009, 7(8): 149-153 (in Chinese). doi: 10.3969/j.issn.1009-8054.2009.08.057
    [6]
    GUO H Q, YU X J. A survey on blockchain technology and its security[J]. Blockchain: Research and Applications, 2022, 3(2): 100067. doi: 10.1016/j.bcra.2022.100067
    [7]
    BANDARA H D, XU X W, WEBER I. Patterns for blockchain data migration[C]// Proceedings of the European Conference on Pattern Languages of Programs 2020. New York: ACM, 2020: 1-19.
    [8]
    LEI K, ZHANG Q C, XU L M, et al. Reputation-based Byzantine fault-tolerance for consortium blockchain[C]// 2018 IEEE 24th International Conference on Parallel and Distributed Systems (ICPADS). Piscataway: IEEE Press, 2018: 604-611.
    [9]
    YAN C Y, ZHANG C, LU Z G, et al. Blockchain abnormal behavior awareness methods: a survey[J]. Cybersecurity, 2022, 5(1): 5. doi: 10.1186/s42400-021-00107-4
    [10]
    ARÁOZ M. Proof of existence[R/OL]. [2022-07-24]. http://docs.proofofexistence.com.
    [11]
    谭海波, 周桐, 赵赫, 等. 基于区块链的档案数据保护与共享方法[J]. 软件学报, 2019, 30(9): 2620-2635.

    TAN H B, ZHOU T, ZHAO H, et al. Archival data protection and sharing method based on blockchain[J]. Journal of Software, 2019, 30(9): 2620-2635 (in Chinese).
    [12]
    HOPE-BAILIE A, THOMAS S. Interledger: creating a standard for payments[C]//Proceedings of the 25th International Conference Companion on World Wide Web-WWW '16 Companion. New York: ACM, 2016: 281-282.
    [13]
    叶少杰, 汪小益, 徐才巢, 等. BitXHub: 基于侧链中继的异构区块链互操作平台[J]. 计算机科学, 2020, 47(6): 294-302. doi: 10.11896/jsjkx.191100055

    YE S J, WANG X Y, XU C C, et al. BitXHub: side-relay chain based heterogeneous blockchain interoperable platform[J]. Computer Science, 2020, 47(6): 294-302 (in Chinese). doi: 10.11896/jsjkx.191100055
    [14]
    FLOERSCH K. Ethereum smart contracts in L2: optimistic rollup[R/OL]. (2019-08-28)[2022-11-30]. https://medium.com/plasma-group/ethereum-smart-contracts-in-l2-optimistic-rollup-2c1cef2ec537.
    [15]
    BUTERIN V. Chain interoperability[R/OL]. R3 research paper, 2016 (2016-09-09)[2022-07-24]. https://allquantor.at/blockchainbib/pdf/vitalik2016chain.pdf.
    [16]
    VIGIL M, BUCHMANN J, CABARCAS D, et al. Integrity, authenticity, non-repudiation, and proof of existence for long-term archiving: a survey[J]. Computers & Security, 2015, 50: 16-32.
    [17]
    LAKHWANI K, KAUR R, KUMAR P, et al. An extensive survey on data authentication schemes in cloud computing[C]// 2018 4th International Conference on Computing Sciences (ICCS). Piscataway: IEEE Press, 2018: 59-66.
    [18]
    MERKLE R C. A certified digital signature[M]// Advances in Cryptology — CRYPTO’ 89 Proceedings. New York: Springer New York, 2007: 218-238.
    [19]
    BENALOH J, DE MARE M. One-way accumulators: a decentralized alternative to digital signatures[M]// Advances in cryptology — EUROCRYPT ’93. Berlin: Springer Berlin Heidelberg, 1994: 274-285.
    [20]
    ATENIESE G, DI PIETRO R, MANCINI L V, et al. Scalable and efficient provable data possession[C]// Proceedings of the 4th International Conference on Security and Privacy in Communication Netowrks. New York: ACM, 2008: 1-10.
    [21]
    Zlib home site[EB/OL]. (1995-05-01)[2022-03-28]. http://www.zlib.net.
    [22]
    祁健. 累加器在区块链中的应用研究[D]. 南京: 南京信息工程大学, 2020: 22-33.

    QI J. Research on the application of accumulator in blockchain[D]. Nanjing: Nanjing University of Information Science & Technology, 2020: 22-33 (in Chinese).
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(10)  / Tables(5)

    Article Metrics

    Article views(277) PDF downloads(8) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return