Blockchain-enabled cybersecurity system to ensure and strengthen decentralized digital transaction is gradually gaining popularity in the digital era for various areas like finance,transportation,healthcare,education,...Blockchain-enabled cybersecurity system to ensure and strengthen decentralized digital transaction is gradually gaining popularity in the digital era for various areas like finance,transportation,healthcare,education,and supply chain management.Blockchain interactions in the heterogeneous network have fascinated more attention due to the authentication of their digital application exchanges.However,the exponential development of storage space capabilities across the blockchain-based heterogeneous network has become an important issue in preventing blockchain distribution and the extension of blockchain nodes.There is the biggest challenge of data integrity and scalability,including significant computing complexity and inapplicable latency on regional network diversity,operating system diversity,bandwidth diversity,node diversity,etc.,for decision-making of data transactions across blockchain-based heterogeneous networks.Data security and privacy have also become the main concerns across the heterogeneous network to build smart IoT ecosystems.To address these issues,today’s researchers have explored the potential solutions of the capability of heterogeneous network devices to perform data transactions where the system stimulates their integration reliably and securely with blockchain.The key goal of this paper is to conduct a state-of-the-art and comprehensive survey on cybersecurity enhancement using blockchain in the heterogeneous network.This paper proposes a full-fledged taxonomy to identify the main obstacles,research gaps,future research directions,effective solutions,andmost relevant blockchain-enabled cybersecurity systems.In addition,Blockchain based heterogeneous network framework with cybersecurity is proposed in this paper tomeet the goal of maintaining optimal performance data transactions among organizations.Overall,this paper provides an in-depth description based on the critical analysis to overcome the existing work gaps for future research where it presents a potential cybersecurity design with key requirements of blockchain across a heterogeneous network.展开更多
Blockchain,known for its secure encrypted ledger,has garnered attention in financial and data transfer realms,including the field of energy trading.However,the decentralized nature and identity anonymity of user nodes...Blockchain,known for its secure encrypted ledger,has garnered attention in financial and data transfer realms,including the field of energy trading.However,the decentralized nature and identity anonymity of user nodes raise uncertainties in energy transactions.The broadcast consensus authentication slows transaction speeds,and frequent single-point transactions in multi-node settings pose key exposure risks without protective measures during user signing.To address these,an alliance blockchain scheme is proposed,reducing the resource-intensive identity verification among nodes.It integrates multi-signature functionality to fortify user resources and transac-tion security.A novel multi-signature process within this framework involves neutral nodes established through central nodes.These neutral nodes participate in multi-signature’s signing and verification,ensuring user identity and transaction content privacy.Reducing interactions among user nodes enhances transaction efficiency by minimizing communication overhead during verification and consensus stages.Rigorous assessments on reliability and operational speed highlight superior security performance,resilient against conventional attack vectors.Simulation shows that compared to traditional solutions,this scheme has advantages in terms of running speed.In conclusion,the alliance blockchain framework introduces a novel approach to tackle blockchain’s limitations in energy transactions.The integrated multi-signature process,involving neutral nodes,significantly enhances security and privacy.The scheme’s efficiency,validated through analytical assessments and simulations,indicates robustness against security threats and improved transactional speeds.This research underscores the potential for improved security and efficiency in blockchain-enabled energy trading systems.展开更多
Blockchain can realize the reliable storage of a large amount of data that is chronologically related and verifiable within the system.This technology has been widely used and has developed rapidly in big data systems...Blockchain can realize the reliable storage of a large amount of data that is chronologically related and verifiable within the system.This technology has been widely used and has developed rapidly in big data systems across various fields.An increasing number of users are participating in application systems that use blockchain as their underlying architecture.As the number of transactions and the capital involved in blockchain grow,ensuring information security becomes imperative.Addressing the verification of transactional information security and privacy has emerged as a critical challenge.Blockchain-based verification methods can effectively eliminate the need for centralized third-party organizations.However,the efficiency of nodes in storing and verifying blockchain data faces unprecedented challenges.To address this issue,this paper introduces an efficient verification scheme for transaction security.Initially,it presents a node evaluation module to estimate the activity level of user nodes participating in transactions,accompanied by a probabilistic analysis for all transactions.Subsequently,this paper optimizes the conventional transaction organization form,introduces a heterogeneous Merkle tree storage structure,and designs algorithms for constructing these heterogeneous trees.Theoretical analyses and simulation experiments conclusively demonstrate the superior performance of this scheme.When verifying the same number of transactions,the heterogeneous Merkle tree transmits less data and is more efficient than traditional methods.The findings indicate that the heterogeneous Merkle tree structure is suitable for various blockchain applications,including the Internet of Things.This scheme can markedly enhance the efficiency of information verification and bolster the security of distributed systems.展开更多
Data is regarded as a valuable asset,and sharing data is a prerequisite for fully exploiting the value of data.However,the current medical data sharing scheme lacks a fair incentive mechanism,and the authenticity of d...Data is regarded as a valuable asset,and sharing data is a prerequisite for fully exploiting the value of data.However,the current medical data sharing scheme lacks a fair incentive mechanism,and the authenticity of data cannot be guaranteed,resulting in low enthusiasm of participants.A fair and trusted medical data trading scheme based on smart contracts is proposed,which aims to encourage participants to be honest and improve their enthusiasm for participation.The scheme uses zero-knowledge range proof for trusted verification,verifies the authenticity of the patient’s data and the specific attributes of the data before the transaction,and realizes privacy protection.At the same time,the game pricing strategy selects the best revenue strategy for all parties involved and realizes the fairness and incentive of the transaction price.The smart contract is used to complete the verification and game bargaining process,and the blockchain is used as a distributed ledger to record the medical data transaction process to prevent data tampering and transaction denial.Finally,by deploying smart contracts on the Ethereum test network and conducting experiments and theoretical calculations,it is proved that the transaction scheme achieves trusted verification and fair bargaining while ensuring privacy protection in a decentralized environment.The experimental results show that the model improves the credibility and fairness of medical data transactions,maximizes social benefits,encourages more patients and medical institutions to participate in the circulation of medical data,and more fully taps the potential value of medical data.展开更多
With the introduction of the“dual carbon”goal and the continuous promotion of low-carbon development,the integrated energy system(IES)has gradually become an effective way to save energy and reduce emissions.This st...With the introduction of the“dual carbon”goal and the continuous promotion of low-carbon development,the integrated energy system(IES)has gradually become an effective way to save energy and reduce emissions.This study proposes a low-carbon economic optimization scheduling model for an IES that considers carbon trading costs.With the goal of minimizing the total operating cost of the IES and considering the transferable and curtailable characteristics of the electric and thermal flexible loads,an optimal scheduling model of the IES that considers the cost of carbon trading and flexible loads on the user side was established.The role of flexible loads in improving the economy of an energy system was investigated using examples,and the rationality and effectiveness of the study were verified through a comparative analysis of different scenarios.The results showed that the total cost of the system in different scenarios was reduced by 18.04%,9.1%,3.35%,and 7.03%,respectively,whereas the total carbon emissions of the system were reduced by 65.28%,20.63%,3.85%,and 18.03%,respectively,when the carbon trading cost and demand-side flexible electric and thermal load responses were considered simultaneously.Flexible electrical and thermal loads did not have the same impact on the system performance.In the analyzed case,the total cost and carbon emissions of the system when only the flexible electrical load response was considered were lower than those when only the flexible thermal load response was taken into account.Photovoltaics have an excess of carbon trading credits and can profit from selling them,whereas other devices have an excess of carbon trading and need to buy carbon credits.展开更多
This paper draws on the experience of the eighth plenary meeting of the ISO/TC 321, Transaction assurance in e-commerce, held in Hangzhou of China in November 2023, and explores potential ways in which developing coun...This paper draws on the experience of the eighth plenary meeting of the ISO/TC 321, Transaction assurance in e-commerce, held in Hangzhou of China in November 2023, and explores potential ways in which developing countries in Africa can drive their development and contribute to global industrial progress by leveraging ISO/TC 321 standards. It provides practical recommendations for utilizing e-commerce standardization and related standards to stimulate economic growth and enhance business practices.展开更多
With the maturation and advancement of blockchain technology,a novel execute-order-validate(EOV)architecture has been proposed,allowing transactions to be executed in parallel during the execution phase.However,parall...With the maturation and advancement of blockchain technology,a novel execute-order-validate(EOV)architecture has been proposed,allowing transactions to be executed in parallel during the execution phase.However,parallel execution may lead to multi-version concurrency control(MVCC)conflicts during the validation phase,resulting in transaction invalidation.Based on different causes,we categorize conflicts in the EOV blockchain into two types:within-block conflicts and cross-block conflicts,and propose an optimization solution called FabricMan based on Fabric v2.4.For within-block conflicts,a reordering algorithm is designed to improve the transaction success rate and parallel validation is implemented based on the transaction conflict graph.We also merge transfer transactions to prevent triggering multiple version checks.For cross-block conflicts,a cache-based version validation mechanism is implemented to detect and terminate invalid transactions in advance.Experimental comparisons are conducted between FabricMan and two other systems,Fabric and Fabric++.The results show that FabricMan outperforms the other two systems in terms of throughput,transaction abort rate,algorithm execution time,and other experimental metrics.展开更多
Thucydides asserts that the occupation of Decelea by the Spartans in 413 BC made the grain supply for Athens costly by forcing the transport from land onto the sea.This calls into question the well-established consens...Thucydides asserts that the occupation of Decelea by the Spartans in 413 BC made the grain supply for Athens costly by forcing the transport from land onto the sea.This calls into question the well-established consensus that sea transport was far cheaper than land transport.This paper contends that the cost of protecting supply lines-specifically the expenses associated with the warships which escorted the supply ships-rendered the grain transported on the new route exceptionally costly.In this paper,the benefits and drawbacks of a maritime economy,including transaction costs,trade dependencies,and the capabilities of warships and supply ships are discussed.展开更多
In the evolving landscape of software engineering, Microservice Architecture (MSA) has emerged as a transformative approach, facilitating enhanced scalability, agility, and independent service deployment. This systema...In the evolving landscape of software engineering, Microservice Architecture (MSA) has emerged as a transformative approach, facilitating enhanced scalability, agility, and independent service deployment. This systematic literature review (SLR) explores the current state of distributed transaction management within MSA, focusing on the unique challenges, strategies, and technologies utilized in this domain. By synthesizing findings from 16 primary studies selected based on rigorous criteria, the review identifies key trends and best practices for maintaining data consistency and integrity across microservices. This SLR provides a comprehensive understanding of the complexities associated with distributed transactions in MSA, offering actionable insights and potential research directions for software architects, developers, and researchers.展开更多
Demand response(DR)using shared energy storage systems(ESSs)is an appealing method to save electricity bills for users under demand charge and time-of-use(TOU)price.A novel Stackelberg-game-based ESS sharing scheme is...Demand response(DR)using shared energy storage systems(ESSs)is an appealing method to save electricity bills for users under demand charge and time-of-use(TOU)price.A novel Stackelberg-game-based ESS sharing scheme is proposed and analyzed in this study.In this scheme,the interactions between selfish users and an operator are characterized as a Stackelberg game.Operator holds a large-scale ESS that is shared among users in the form of energy transactions.It sells energy to users and sets the selling price first.It maximizes its profit through optimal pricing and ESS dispatching.Users purchase some energy from operator for the reduction of their demand charges after operator's selling price is announced.This game-theoretic ESS sharing scheme is characterized and analyzed by formulating and solving a bi-level optimization model.The upper-level optimization maximizes operator's profit and the lower-level optimization minimizes users'costs.The bi-level model is transformed and linearized into a mixed-integer linear programming(MILP)model using the mathematical programming with equilibrium constraints(MPEC)method and model linearizing techniques.Case studies with actual data are carried out to explore the economic performances of the proposed ESS sharing scheme.展开更多
Cryptocurrency, as a typical application scene of blockchain, has attracted broad interests from both industrial and academic communities. With its rapid development, the cryptocurrency transaction network embedding(C...Cryptocurrency, as a typical application scene of blockchain, has attracted broad interests from both industrial and academic communities. With its rapid development, the cryptocurrency transaction network embedding(CTNE) has become a hot topic. It embeds transaction nodes into low-dimensional feature space while effectively maintaining a network structure,thereby discovering desired patterns demonstrating involved users' normal and abnormal behaviors. Based on a wide investigation into the state-of-the-art CTNE, this survey has made the following efforts: 1) categorizing recent progress of CTNE methods, 2) summarizing the publicly available cryptocurrency transaction network datasets, 3) evaluating several widely-adopted methods to show their performance in several typical evaluation protocols, and 4) discussing the future trends of CTNE. By doing so, it strives to provide a systematic and comprehensive overview of existing CTNE methods from static to dynamic perspectives,thereby promoting further research into this emerging and important field.展开更多
Blockchain technology is a shared database of logs of all consumer transactions which are registered on all machines on a network.Both transactions in the system are carried out by consensus processes and to preserve ...Blockchain technology is a shared database of logs of all consumer transactions which are registered on all machines on a network.Both transactions in the system are carried out by consensus processes and to preserve confidentiality all thefiles contained cannot be changed.Blockchain technology is the fundamental software behind digital currencies like Bitcoin,which is common in the marketplace.Cloud computing is a method of using a network of external machines to store,monitor,and process information,rather than using the local computer or a local personal computer.The software is currently facing multiple problems including lack of data protection,data instability,and reliability.This paper aims to give the highest security for multiple user environments in cloud for storing and accessing the data in blocks.The users who are legitimate are only allowed for storing and accessing the data as like a secured block chain approach.As like the Blockchain which does not require a centralized system for transactions,the proposed system is also independent on centralized network interface.The decentralized system is developed in such a way to avoid counterfeiting.The system enables the fabricator to spend less or null resources to perform the validations for its direct operated stores.This ensures the product fabricator to avoid the circulation of its duplicate products.The customer as an end-user is also ensured to have only the genuine products from the fabricator.The Fabricator(F),Merchant(M)and consumer(C)forms an interconnected triangular structure without allowing any counterfeiting agents in their secured cloud chain.The pro-posed approach provides the stability in the security system of the cloud using the chaining mechanism within different blocks at each node.It takes roughly 4.7,6.2,and 7.5 ms,respectively,to register each node in the proposed system for 5,10,and 15 nodes.The overall registration time for each scenario is 11.9,26.2,and 53.1 ms,despite the fact that each node’s registration time was greatest for 10 nodes.By looking at the data,it’s clear that the number of nodes is a func-tion of time.展开更多
Accurate and seamless auxiliary services in the power market can guarantee smooth and continuous power system operation. China’s new round of power system reform has entered a critical period, and reform implementati...Accurate and seamless auxiliary services in the power market can guarantee smooth and continuous power system operation. China’s new round of power system reform has entered a critical period, and reform implementation requires comprehensive improvements in the maturity of the supporting auxiliary service market. This study reviews the development status and evolution path of the European unified power market and the US regional power market, provides experience for the development of China’s regional power market, then identifies the key influencing factors of auxiliary service trading mechanism design in regional power markets. To analyze the rationality of the auxiliary service trading evaluation index, this paper established an evaluation model for assessing regional power markets. Using combined weight optimization, the gray correlation TOPSIS method was applied to comprehensively evaluate auxiliary service trading in the regional power market. Finally, the application of the proposed evaluation method was briefly analyzed to examine four regional power markets in China and evaluate the effectiveness of current market construction in different regions and provide suggestions for future market construction.展开更多
The purpose of this research is to deal with effective block chain framework for secure transactions.The rate of effective data transactions and the interoperability of the ledger are the two major obstacles involved ...The purpose of this research is to deal with effective block chain framework for secure transactions.The rate of effective data transactions and the interoperability of the ledger are the two major obstacles involved in Blockchain and to tackle this issue,Cross-Chain based Transaction(CCT)is introduced.Traditional industries have been restructured by the introduction of Internet of Things(IoT)to become smart industries through the feature of data-driven decision-making.Still,there are a few limitations,like decentralization,security vulnerabilities,poor interoperability,as well as privacy concerns in IoTs.To overcome this limitation,Blockchain has been employed to assure a safer transaction process,especially in asset exchanges.In recent decades,scalable local ledgers implement Blockchains,simultaneously sustaining peer validations of transactions which can be at local or global levels.From the single Hyperledger-based blockchains system,the CCT takes the transaction amid various chains.In addition,the most significant factor for this registration processing strategy is the Signature to ensure security.The application of the Quantum cryptographic algorithm amplifies the proposed Hyperledger-based blockchains,to strengthen the safety of the process.The key has been determined by restricting the number of transactions that reach the global Blockchain using the quantum-based hash function and accomplished by scalable local ledgers,and peer validations of transactions at local and global levels without any issues.The rate of transaction processing for entire peers has enhanced with the ancillary aid of the proposed solution,as it includes the procedure of load distribution.Without any boosted enhancement,the recommended solution utilizes the current transaction strategy,and also,it’s aimed at scalability,resource conservation,and interoperability.The experimental results of the system have been evaluated using the metrics like block weight,ledger memory,the usage of the central processing unit,and the communication overhead.展开更多
Most traditional trust computing models in E-commerce do not take the transaction frequency among participating entities into consideration,which makes it easy for one party of the transaction to obtain a high trust v...Most traditional trust computing models in E-commerce do not take the transaction frequency among participating entities into consideration,which makes it easy for one party of the transaction to obtain a high trust value in a short time,and brings many disadvantages,uncertainties and even attacks.To solve this problem,a transaction frequency based trust is proposed in this study.The proposed method is composed of two parts.The first part is built on the classic Bayes analysis based trust modelswhich are ease of computing for the E-commerce system.The second part is the transaction frequency module which can mitigate the potential insecurity caused by one participating entity gaining trust in a short time.Simulations show that the proposed method can effectively mitigate the self-promoting attacks so as to maintain the function of E-commerce system.展开更多
Due to its decentralized,tamper-proof,and trust-free characteristics,blockchain is used in the Internet of Things(IoT)to guarantee the reliability of data.However,some technical flaws in blockchain itself prevent the ...Due to its decentralized,tamper-proof,and trust-free characteristics,blockchain is used in the Internet of Things(IoT)to guarantee the reliability of data.However,some technical flaws in blockchain itself prevent the development of these applications,such as the issue with linearly growing storage capacity of blockchain systems.On the other hand,there is a lack of storage resources for sensor devices in IoT,and numerous sensor devices will generate massive data at ultra-high speed,which makes the storage problem of the IoT enabled by blockchain more prominent.There are various solutions to reduce the storage burden by modifying the blockchain’s storage policy,but most of them do not consider the willingness of peers.In attempt to make the blockchain more compatible with the IoT,this paper proposes a storage optimization scheme that revisits the system data storage problem from amore practically oriented standpoint.Peers will only store transactional data that they are directly involved in.In addition,a transaction verification model is developed to enable peers to undertake transaction verification with the aid of cloud computing,and an incentive mechanism is premised on the storage optimization scheme to assure data integrity.The results of the simulation experiments demonstrate the proposed scheme’s advantage in terms of storage and throughput.展开更多
Rapidly increasing cryptocurrency prices have encouraged cryptocurrency miners to participate in cryptocurrency production,increasing network hashrates and electricity consumption.Growth in network hashrates has furth...Rapidly increasing cryptocurrency prices have encouraged cryptocurrency miners to participate in cryptocurrency production,increasing network hashrates and electricity consumption.Growth in network hashrates has further crowded out small cryptocurrency investors owing to the heightened costs of mining hardware and electricity.These changes prompt cryptocurrency miners to become new investors,leading to cryptocurrency price increases.The potential bidirectional relationship between cryptocurrency price and electricity consumption remains unidentified.Hence,this research thus utilizes July 312015–July 122019 data from 13 cryptocurrencies to investigate the short-and long-run causal effects between cryptocurrency transaction and electricity consumption.Particularly,we consider structural breaks induced by external shocks through stationary analysis and comovement relationships.Over the examined time period,we found that the series of cryptocurrency transaction and electricity consumption gradually returns to mean convergence after undergoing daily shocks,with prices trending together with hashrates.Transaction fluctuations exert both a temporary effect and permanent influence on electricity consumption.Therefore,owing to the computational power deployed to wherever high profit is found,transactions are vital determinants of electricity consumption.展开更多
Accounting Information System(AIS),which is the foundation of any enterprise resource planning(ERP)system,is often built as centralized system.The technologies that allow the Internet-of-Value,which is built onfive asp...Accounting Information System(AIS),which is the foundation of any enterprise resource planning(ERP)system,is often built as centralized system.The technologies that allow the Internet-of-Value,which is built onfive aspects that are network,algorithms,distributed ledger,transfers,and assets,are based on blockchain.Cryptography and consensus protocols boost the blockchain plat-form implementation,acting as a deterrent to cyber-attacks and hacks.Blockchain platforms foster innovation among supply chain participants,resulting in ecosys-tem development.Traditional business processes have been severely disrupted by blockchains since apps and transactions that previously required centralized struc-tures or trusted third-parties to authenticate them may now function in a decentra-lized manner with the same level of assurance.Because a blockchain split in AIS may easily lead to double-spending attacks,reducing the likelihood of a split has become a very important and difficult research subject.Reduced block relay time between the nodes can minimize the block propagation time of all nodes,resulting in better Bitcoin performance.In this paper,three problems were addressed on transaction and block propagation mechanisms in order to reduce the likelihood of a split.A novel algorithm for blockchain is proposed to reduce the total pro-pagation delay in AIS transactions.Numerical results reveal that,the proposed algorithm performs better and reduce the transaction delay in AIS as compared with existing methods.展开更多
Frauds don’t follow any recurring patterns.They require the use of unsupervised learning since their behaviour is continually changing.Fraud-sters have access to the most recent technology,which gives them the abilit...Frauds don’t follow any recurring patterns.They require the use of unsupervised learning since their behaviour is continually changing.Fraud-sters have access to the most recent technology,which gives them the ability to defraud people through online transactions.Fraudsters make assumptions about consumers’routine behaviour,and fraud develops swiftly.Unsupervised learning must be used by fraud detection systems to recognize online payments since some fraudsters start out using online channels before moving on to other techniques.Building a deep convolutional neural network model to identify anomalies from conventional competitive swarm optimization pat-terns with a focus on fraud situations that cannot be identified using historical data or supervised learning is the aim of this paper Artificial Bee Colony(ABC).Using real-time data and other datasets that are readily available,the ABC-Recurrent Neural Network(RNN)categorizes fraud behaviour and compares it to the current algorithms.When compared to the current approach,the findings demonstrate that the accuracy is high and the training error is minimal in ABC_RNN.In this paper,we measure the Accuracy,F1 score,Mean Square Error(MSE)and Mean Absolute Error(MAE).Our system achieves 97%accuracy,92%precision rate and F1 score 97%.Also we compare the simulation results with existing methods.展开更多
In the context of the joint operation of China’s intra-provincial markets and inter-provincial trading,how to meet the load demand and energy consumption using inter-provincial renewable energy trading is a key probl...In the context of the joint operation of China’s intra-provincial markets and inter-provincial trading,how to meet the load demand and energy consumption using inter-provincial renewable energy trading is a key problem.The combined operation of intra-provincial and inter-provincial markets provides a new way for provincial power companies to optimize and clear the intra-provincial power market,complete the intra-provincial consumption responsibility weight index,and consume renewable energy across provinces and regions.This paper combines power generation and consumption within the province,uses inter-provincial renewable energy trading tomeet the load demand within the province and completes the index of intra-provincial consumption responsibility weights.The intra-provincial market trading and inter-provincial market clearing are respectively taken as the upper and lower levels of the model.Under the two-level electricity market operation framework,the upper-level model aims to minimize the expected total operating cost within the province considering the carbon emission cost and the weight of the consumption responsibility,while the lower-level model aims to minimize the inter-provincial renewable energy purchasing cost.Finally,the influence of inter-provincial transaction mechanism,risk aversion coefficient,voucher price,and responsibility weight on operating cost is analyzed.Simulation is used to verify that the proposed model can meet the requirements of the provincial load power consumption and the consumption responsibility weight index,and promote the consumption of renewable energy.展开更多
基金The authors would like to acknowledge the Institute for Big Data Analytics and Artificial Intelligence(IBDAAI),Universiti TeknologiMARA and the Ministry of Higher Education,Malaysia for the financial support through Fundamental Research Grant Scheme(FRGS)Grant No.FRGS/1/2021/ICT11/UITM/01/1.
文摘Blockchain-enabled cybersecurity system to ensure and strengthen decentralized digital transaction is gradually gaining popularity in the digital era for various areas like finance,transportation,healthcare,education,and supply chain management.Blockchain interactions in the heterogeneous network have fascinated more attention due to the authentication of their digital application exchanges.However,the exponential development of storage space capabilities across the blockchain-based heterogeneous network has become an important issue in preventing blockchain distribution and the extension of blockchain nodes.There is the biggest challenge of data integrity and scalability,including significant computing complexity and inapplicable latency on regional network diversity,operating system diversity,bandwidth diversity,node diversity,etc.,for decision-making of data transactions across blockchain-based heterogeneous networks.Data security and privacy have also become the main concerns across the heterogeneous network to build smart IoT ecosystems.To address these issues,today’s researchers have explored the potential solutions of the capability of heterogeneous network devices to perform data transactions where the system stimulates their integration reliably and securely with blockchain.The key goal of this paper is to conduct a state-of-the-art and comprehensive survey on cybersecurity enhancement using blockchain in the heterogeneous network.This paper proposes a full-fledged taxonomy to identify the main obstacles,research gaps,future research directions,effective solutions,andmost relevant blockchain-enabled cybersecurity systems.In addition,Blockchain based heterogeneous network framework with cybersecurity is proposed in this paper tomeet the goal of maintaining optimal performance data transactions among organizations.Overall,this paper provides an in-depth description based on the critical analysis to overcome the existing work gaps for future research where it presents a potential cybersecurity design with key requirements of blockchain across a heterogeneous network.
文摘Blockchain,known for its secure encrypted ledger,has garnered attention in financial and data transfer realms,including the field of energy trading.However,the decentralized nature and identity anonymity of user nodes raise uncertainties in energy transactions.The broadcast consensus authentication slows transaction speeds,and frequent single-point transactions in multi-node settings pose key exposure risks without protective measures during user signing.To address these,an alliance blockchain scheme is proposed,reducing the resource-intensive identity verification among nodes.It integrates multi-signature functionality to fortify user resources and transac-tion security.A novel multi-signature process within this framework involves neutral nodes established through central nodes.These neutral nodes participate in multi-signature’s signing and verification,ensuring user identity and transaction content privacy.Reducing interactions among user nodes enhances transaction efficiency by minimizing communication overhead during verification and consensus stages.Rigorous assessments on reliability and operational speed highlight superior security performance,resilient against conventional attack vectors.Simulation shows that compared to traditional solutions,this scheme has advantages in terms of running speed.In conclusion,the alliance blockchain framework introduces a novel approach to tackle blockchain’s limitations in energy transactions.The integrated multi-signature process,involving neutral nodes,significantly enhances security and privacy.The scheme’s efficiency,validated through analytical assessments and simulations,indicates robustness against security threats and improved transactional speeds.This research underscores the potential for improved security and efficiency in blockchain-enabled energy trading systems.
基金funded by the National Natural Science Foundation of China(62072056,62172058)the Researchers Supporting Project Number(RSP2023R102)King Saud University,Riyadh,Saudi Arabia+4 种基金funded by the Hunan Provincial Key Research and Development Program(2022SK2107,2022GK2019)the Natural Science Foundation of Hunan Province(2023JJ30054)the Foundation of State Key Laboratory of Public Big Data(PBD2021-15)the Young Doctor Innovation Program of Zhejiang Shuren University(2019QC30)Postgraduate Scientific Research Innovation Project of Hunan Province(CX20220940,CX20220941).
文摘Blockchain can realize the reliable storage of a large amount of data that is chronologically related and verifiable within the system.This technology has been widely used and has developed rapidly in big data systems across various fields.An increasing number of users are participating in application systems that use blockchain as their underlying architecture.As the number of transactions and the capital involved in blockchain grow,ensuring information security becomes imperative.Addressing the verification of transactional information security and privacy has emerged as a critical challenge.Blockchain-based verification methods can effectively eliminate the need for centralized third-party organizations.However,the efficiency of nodes in storing and verifying blockchain data faces unprecedented challenges.To address this issue,this paper introduces an efficient verification scheme for transaction security.Initially,it presents a node evaluation module to estimate the activity level of user nodes participating in transactions,accompanied by a probabilistic analysis for all transactions.Subsequently,this paper optimizes the conventional transaction organization form,introduces a heterogeneous Merkle tree storage structure,and designs algorithms for constructing these heterogeneous trees.Theoretical analyses and simulation experiments conclusively demonstrate the superior performance of this scheme.When verifying the same number of transactions,the heterogeneous Merkle tree transmits less data and is more efficient than traditional methods.The findings indicate that the heterogeneous Merkle tree structure is suitable for various blockchain applications,including the Internet of Things.This scheme can markedly enhance the efficiency of information verification and bolster the security of distributed systems.
基金This research was funded by the Natural Science Foundation of Hebei Province(F2021201052)。
文摘Data is regarded as a valuable asset,and sharing data is a prerequisite for fully exploiting the value of data.However,the current medical data sharing scheme lacks a fair incentive mechanism,and the authenticity of data cannot be guaranteed,resulting in low enthusiasm of participants.A fair and trusted medical data trading scheme based on smart contracts is proposed,which aims to encourage participants to be honest and improve their enthusiasm for participation.The scheme uses zero-knowledge range proof for trusted verification,verifies the authenticity of the patient’s data and the specific attributes of the data before the transaction,and realizes privacy protection.At the same time,the game pricing strategy selects the best revenue strategy for all parties involved and realizes the fairness and incentive of the transaction price.The smart contract is used to complete the verification and game bargaining process,and the blockchain is used as a distributed ledger to record the medical data transaction process to prevent data tampering and transaction denial.Finally,by deploying smart contracts on the Ethereum test network and conducting experiments and theoretical calculations,it is proved that the transaction scheme achieves trusted verification and fair bargaining while ensuring privacy protection in a decentralized environment.The experimental results show that the model improves the credibility and fairness of medical data transactions,maximizes social benefits,encourages more patients and medical institutions to participate in the circulation of medical data,and more fully taps the potential value of medical data.
基金supported by State Grid Shanxi Electric Power Company Science and Technology Project“Research on key technologies of carbon tracking and carbon evaluation for new power system”(Grant:520530230005)。
文摘With the introduction of the“dual carbon”goal and the continuous promotion of low-carbon development,the integrated energy system(IES)has gradually become an effective way to save energy and reduce emissions.This study proposes a low-carbon economic optimization scheduling model for an IES that considers carbon trading costs.With the goal of minimizing the total operating cost of the IES and considering the transferable and curtailable characteristics of the electric and thermal flexible loads,an optimal scheduling model of the IES that considers the cost of carbon trading and flexible loads on the user side was established.The role of flexible loads in improving the economy of an energy system was investigated using examples,and the rationality and effectiveness of the study were verified through a comparative analysis of different scenarios.The results showed that the total cost of the system in different scenarios was reduced by 18.04%,9.1%,3.35%,and 7.03%,respectively,whereas the total carbon emissions of the system were reduced by 65.28%,20.63%,3.85%,and 18.03%,respectively,when the carbon trading cost and demand-side flexible electric and thermal load responses were considered simultaneously.Flexible electrical and thermal loads did not have the same impact on the system performance.In the analyzed case,the total cost and carbon emissions of the system when only the flexible electrical load response was considered were lower than those when only the flexible thermal load response was taken into account.Photovoltaics have an excess of carbon trading credits and can profit from selling them,whereas other devices have an excess of carbon trading and need to buy carbon credits.
文摘This paper draws on the experience of the eighth plenary meeting of the ISO/TC 321, Transaction assurance in e-commerce, held in Hangzhou of China in November 2023, and explores potential ways in which developing countries in Africa can drive their development and contribute to global industrial progress by leveraging ISO/TC 321 standards. It provides practical recommendations for utilizing e-commerce standardization and related standards to stimulate economic growth and enhance business practices.
文摘With the maturation and advancement of blockchain technology,a novel execute-order-validate(EOV)architecture has been proposed,allowing transactions to be executed in parallel during the execution phase.However,parallel execution may lead to multi-version concurrency control(MVCC)conflicts during the validation phase,resulting in transaction invalidation.Based on different causes,we categorize conflicts in the EOV blockchain into two types:within-block conflicts and cross-block conflicts,and propose an optimization solution called FabricMan based on Fabric v2.4.For within-block conflicts,a reordering algorithm is designed to improve the transaction success rate and parallel validation is implemented based on the transaction conflict graph.We also merge transfer transactions to prevent triggering multiple version checks.For cross-block conflicts,a cache-based version validation mechanism is implemented to detect and terminate invalid transactions in advance.Experimental comparisons are conducted between FabricMan and two other systems,Fabric and Fabric++.The results show that FabricMan outperforms the other two systems in terms of throughput,transaction abort rate,algorithm execution time,and other experimental metrics.
文摘Thucydides asserts that the occupation of Decelea by the Spartans in 413 BC made the grain supply for Athens costly by forcing the transport from land onto the sea.This calls into question the well-established consensus that sea transport was far cheaper than land transport.This paper contends that the cost of protecting supply lines-specifically the expenses associated with the warships which escorted the supply ships-rendered the grain transported on the new route exceptionally costly.In this paper,the benefits and drawbacks of a maritime economy,including transaction costs,trade dependencies,and the capabilities of warships and supply ships are discussed.
文摘In the evolving landscape of software engineering, Microservice Architecture (MSA) has emerged as a transformative approach, facilitating enhanced scalability, agility, and independent service deployment. This systematic literature review (SLR) explores the current state of distributed transaction management within MSA, focusing on the unique challenges, strategies, and technologies utilized in this domain. By synthesizing findings from 16 primary studies selected based on rigorous criteria, the review identifies key trends and best practices for maintaining data consistency and integrity across microservices. This SLR provides a comprehensive understanding of the complexities associated with distributed transactions in MSA, offering actionable insights and potential research directions for software architects, developers, and researchers.
基金supported by the National Natural Science Foundation of China(U21A20478)Zhejiang Provincial Nature Science Foundation of China(LZ21F030004)Key-Area Research and Development Program of Guangdong Province(2018B010107002)。
文摘Demand response(DR)using shared energy storage systems(ESSs)is an appealing method to save electricity bills for users under demand charge and time-of-use(TOU)price.A novel Stackelberg-game-based ESS sharing scheme is proposed and analyzed in this study.In this scheme,the interactions between selfish users and an operator are characterized as a Stackelberg game.Operator holds a large-scale ESS that is shared among users in the form of energy transactions.It sells energy to users and sets the selling price first.It maximizes its profit through optimal pricing and ESS dispatching.Users purchase some energy from operator for the reduction of their demand charges after operator's selling price is announced.This game-theoretic ESS sharing scheme is characterized and analyzed by formulating and solving a bi-level optimization model.The upper-level optimization maximizes operator's profit and the lower-level optimization minimizes users'costs.The bi-level model is transformed and linearized into a mixed-integer linear programming(MILP)model using the mathematical programming with equilibrium constraints(MPEC)method and model linearizing techniques.Case studies with actual data are carried out to explore the economic performances of the proposed ESS sharing scheme.
基金supported in part by the National Natural Science Foundation of China (62272078)the CAAI-Huawei MindSpore Open Fund (CAAIXSJLJJ-2021-035A)the Doctoral Student Talent Training Program of Chongqing University of Posts and Telecommunications (BYJS202009)。
文摘Cryptocurrency, as a typical application scene of blockchain, has attracted broad interests from both industrial and academic communities. With its rapid development, the cryptocurrency transaction network embedding(CTNE) has become a hot topic. It embeds transaction nodes into low-dimensional feature space while effectively maintaining a network structure,thereby discovering desired patterns demonstrating involved users' normal and abnormal behaviors. Based on a wide investigation into the state-of-the-art CTNE, this survey has made the following efforts: 1) categorizing recent progress of CTNE methods, 2) summarizing the publicly available cryptocurrency transaction network datasets, 3) evaluating several widely-adopted methods to show their performance in several typical evaluation protocols, and 4) discussing the future trends of CTNE. By doing so, it strives to provide a systematic and comprehensive overview of existing CTNE methods from static to dynamic perspectives,thereby promoting further research into this emerging and important field.
文摘Blockchain technology is a shared database of logs of all consumer transactions which are registered on all machines on a network.Both transactions in the system are carried out by consensus processes and to preserve confidentiality all thefiles contained cannot be changed.Blockchain technology is the fundamental software behind digital currencies like Bitcoin,which is common in the marketplace.Cloud computing is a method of using a network of external machines to store,monitor,and process information,rather than using the local computer or a local personal computer.The software is currently facing multiple problems including lack of data protection,data instability,and reliability.This paper aims to give the highest security for multiple user environments in cloud for storing and accessing the data in blocks.The users who are legitimate are only allowed for storing and accessing the data as like a secured block chain approach.As like the Blockchain which does not require a centralized system for transactions,the proposed system is also independent on centralized network interface.The decentralized system is developed in such a way to avoid counterfeiting.The system enables the fabricator to spend less or null resources to perform the validations for its direct operated stores.This ensures the product fabricator to avoid the circulation of its duplicate products.The customer as an end-user is also ensured to have only the genuine products from the fabricator.The Fabricator(F),Merchant(M)and consumer(C)forms an interconnected triangular structure without allowing any counterfeiting agents in their secured cloud chain.The pro-posed approach provides the stability in the security system of the cloud using the chaining mechanism within different blocks at each node.It takes roughly 4.7,6.2,and 7.5 ms,respectively,to register each node in the proposed system for 5,10,and 15 nodes.The overall registration time for each scenario is 11.9,26.2,and 53.1 ms,despite the fact that each node’s registration time was greatest for 10 nodes.By looking at the data,it’s clear that the number of nodes is a func-tion of time.
基金supported by the Beijing Power Exchange Center (Study on the Medium and Long Term Time Division Transaction Mode and Balance Mechanism of Electric Power)supported by the National Natural Science Foundation of China(No. 72171082)。
文摘Accurate and seamless auxiliary services in the power market can guarantee smooth and continuous power system operation. China’s new round of power system reform has entered a critical period, and reform implementation requires comprehensive improvements in the maturity of the supporting auxiliary service market. This study reviews the development status and evolution path of the European unified power market and the US regional power market, provides experience for the development of China’s regional power market, then identifies the key influencing factors of auxiliary service trading mechanism design in regional power markets. To analyze the rationality of the auxiliary service trading evaluation index, this paper established an evaluation model for assessing regional power markets. Using combined weight optimization, the gray correlation TOPSIS method was applied to comprehensively evaluate auxiliary service trading in the regional power market. Finally, the application of the proposed evaluation method was briefly analyzed to examine four regional power markets in China and evaluate the effectiveness of current market construction in different regions and provide suggestions for future market construction.
文摘The purpose of this research is to deal with effective block chain framework for secure transactions.The rate of effective data transactions and the interoperability of the ledger are the two major obstacles involved in Blockchain and to tackle this issue,Cross-Chain based Transaction(CCT)is introduced.Traditional industries have been restructured by the introduction of Internet of Things(IoT)to become smart industries through the feature of data-driven decision-making.Still,there are a few limitations,like decentralization,security vulnerabilities,poor interoperability,as well as privacy concerns in IoTs.To overcome this limitation,Blockchain has been employed to assure a safer transaction process,especially in asset exchanges.In recent decades,scalable local ledgers implement Blockchains,simultaneously sustaining peer validations of transactions which can be at local or global levels.From the single Hyperledger-based blockchains system,the CCT takes the transaction amid various chains.In addition,the most significant factor for this registration processing strategy is the Signature to ensure security.The application of the Quantum cryptographic algorithm amplifies the proposed Hyperledger-based blockchains,to strengthen the safety of the process.The key has been determined by restricting the number of transactions that reach the global Blockchain using the quantum-based hash function and accomplished by scalable local ledgers,and peer validations of transactions at local and global levels without any issues.The rate of transaction processing for entire peers has enhanced with the ancillary aid of the proposed solution,as it includes the procedure of load distribution.Without any boosted enhancement,the recommended solution utilizes the current transaction strategy,and also,it’s aimed at scalability,resource conservation,and interoperability.The experimental results of the system have been evaluated using the metrics like block weight,ledger memory,the usage of the central processing unit,and the communication overhead.
文摘Most traditional trust computing models in E-commerce do not take the transaction frequency among participating entities into consideration,which makes it easy for one party of the transaction to obtain a high trust value in a short time,and brings many disadvantages,uncertainties and even attacks.To solve this problem,a transaction frequency based trust is proposed in this study.The proposed method is composed of two parts.The first part is built on the classic Bayes analysis based trust modelswhich are ease of computing for the E-commerce system.The second part is the transaction frequency module which can mitigate the potential insecurity caused by one participating entity gaining trust in a short time.Simulations show that the proposed method can effectively mitigate the self-promoting attacks so as to maintain the function of E-commerce system.
基金We would also thank the support from the National Natural Science Foundation of China(Nos.62172182,62202118,61962009)the Top Technology Talent Project from Guizhou Education Department(Qian jiao ji[2022]073)The Opening Foundation of Key Laboratory of Intelligent Control Technology for Wuling-Mountain Ecological Agriculture in Hunan Province(Grant No.ZNKZN2021-07).
文摘Due to its decentralized,tamper-proof,and trust-free characteristics,blockchain is used in the Internet of Things(IoT)to guarantee the reliability of data.However,some technical flaws in blockchain itself prevent the development of these applications,such as the issue with linearly growing storage capacity of blockchain systems.On the other hand,there is a lack of storage resources for sensor devices in IoT,and numerous sensor devices will generate massive data at ultra-high speed,which makes the storage problem of the IoT enabled by blockchain more prominent.There are various solutions to reduce the storage burden by modifying the blockchain’s storage policy,but most of them do not consider the willingness of peers.In attempt to make the blockchain more compatible with the IoT,this paper proposes a storage optimization scheme that revisits the system data storage problem from amore practically oriented standpoint.Peers will only store transactional data that they are directly involved in.In addition,a transaction verification model is developed to enable peers to undertake transaction verification with the aid of cloud computing,and an incentive mechanism is premised on the storage optimization scheme to assure data integrity.The results of the simulation experiments demonstrate the proposed scheme’s advantage in terms of storage and throughput.
基金funding agencies in the public,commercial,or notfor-profit sectors.
文摘Rapidly increasing cryptocurrency prices have encouraged cryptocurrency miners to participate in cryptocurrency production,increasing network hashrates and electricity consumption.Growth in network hashrates has further crowded out small cryptocurrency investors owing to the heightened costs of mining hardware and electricity.These changes prompt cryptocurrency miners to become new investors,leading to cryptocurrency price increases.The potential bidirectional relationship between cryptocurrency price and electricity consumption remains unidentified.Hence,this research thus utilizes July 312015–July 122019 data from 13 cryptocurrencies to investigate the short-and long-run causal effects between cryptocurrency transaction and electricity consumption.Particularly,we consider structural breaks induced by external shocks through stationary analysis and comovement relationships.Over the examined time period,we found that the series of cryptocurrency transaction and electricity consumption gradually returns to mean convergence after undergoing daily shocks,with prices trending together with hashrates.Transaction fluctuations exert both a temporary effect and permanent influence on electricity consumption.Therefore,owing to the computational power deployed to wherever high profit is found,transactions are vital determinants of electricity consumption.
基金supported by the Researchers Supporting Project(No.RSP-2021/395),King Saud University,Riyadh,Saudi Arabia.
文摘Accounting Information System(AIS),which is the foundation of any enterprise resource planning(ERP)system,is often built as centralized system.The technologies that allow the Internet-of-Value,which is built onfive aspects that are network,algorithms,distributed ledger,transfers,and assets,are based on blockchain.Cryptography and consensus protocols boost the blockchain plat-form implementation,acting as a deterrent to cyber-attacks and hacks.Blockchain platforms foster innovation among supply chain participants,resulting in ecosys-tem development.Traditional business processes have been severely disrupted by blockchains since apps and transactions that previously required centralized struc-tures or trusted third-parties to authenticate them may now function in a decentra-lized manner with the same level of assurance.Because a blockchain split in AIS may easily lead to double-spending attacks,reducing the likelihood of a split has become a very important and difficult research subject.Reduced block relay time between the nodes can minimize the block propagation time of all nodes,resulting in better Bitcoin performance.In this paper,three problems were addressed on transaction and block propagation mechanisms in order to reduce the likelihood of a split.A novel algorithm for blockchain is proposed to reduce the total pro-pagation delay in AIS transactions.Numerical results reveal that,the proposed algorithm performs better and reduce the transaction delay in AIS as compared with existing methods.
文摘Frauds don’t follow any recurring patterns.They require the use of unsupervised learning since their behaviour is continually changing.Fraud-sters have access to the most recent technology,which gives them the ability to defraud people through online transactions.Fraudsters make assumptions about consumers’routine behaviour,and fraud develops swiftly.Unsupervised learning must be used by fraud detection systems to recognize online payments since some fraudsters start out using online channels before moving on to other techniques.Building a deep convolutional neural network model to identify anomalies from conventional competitive swarm optimization pat-terns with a focus on fraud situations that cannot be identified using historical data or supervised learning is the aim of this paper Artificial Bee Colony(ABC).Using real-time data and other datasets that are readily available,the ABC-Recurrent Neural Network(RNN)categorizes fraud behaviour and compares it to the current algorithms.When compared to the current approach,the findings demonstrate that the accuracy is high and the training error is minimal in ABC_RNN.In this paper,we measure the Accuracy,F1 score,Mean Square Error(MSE)and Mean Absolute Error(MAE).Our system achieves 97%accuracy,92%precision rate and F1 score 97%.Also we compare the simulation results with existing methods.
基金supported by National Natural Science Foundation of China (51977127)Shanghai Municipal Science and Technology Commission (19020500800)“Shuguang Program” (20SG52)Shanghai Education Development Foundation and Shanghai Municipal Education Commission.
文摘In the context of the joint operation of China’s intra-provincial markets and inter-provincial trading,how to meet the load demand and energy consumption using inter-provincial renewable energy trading is a key problem.The combined operation of intra-provincial and inter-provincial markets provides a new way for provincial power companies to optimize and clear the intra-provincial power market,complete the intra-provincial consumption responsibility weight index,and consume renewable energy across provinces and regions.This paper combines power generation and consumption within the province,uses inter-provincial renewable energy trading tomeet the load demand within the province and completes the index of intra-provincial consumption responsibility weights.The intra-provincial market trading and inter-provincial market clearing are respectively taken as the upper and lower levels of the model.Under the two-level electricity market operation framework,the upper-level model aims to minimize the expected total operating cost within the province considering the carbon emission cost and the weight of the consumption responsibility,while the lower-level model aims to minimize the inter-provincial renewable energy purchasing cost.Finally,the influence of inter-provincial transaction mechanism,risk aversion coefficient,voucher price,and responsibility weight on operating cost is analyzed.Simulation is used to verify that the proposed model can meet the requirements of the provincial load power consumption and the consumption responsibility weight index,and promote the consumption of renewable energy.