In crowded cities,searching for the availability of parking lots is a herculean task as it results in the wastage of drivers’time,increases air pollution,and traffic congestion.Smart parking systems facilitate the dr...In crowded cities,searching for the availability of parking lots is a herculean task as it results in the wastage of drivers’time,increases air pollution,and traffic congestion.Smart parking systems facilitate the drivers to determine the information about the parking lot in real time and book them depending on the requirement.But the existing smart parking systems necessitate the drivers to reveal their sensitive information that includes their mobile number,personal identity,and desired destination.This disclosure of sensitive information makes the existing centralized smart parking systems more vulnerable to service providers’security breaches,single points of failure,and bottlenecks.In this paper,an Improved Asymmetric Consortium Blockchain and Homomorphically Computing Univariate Polynomial-based private information retrieval(IACB-HCUPPIR)scheme is proposed to ensure parking lots’availability with transparency security in a privacy-preserving smart parking system.In specific,an improved Asymmetric Consortium Blockchain is used for achieving secure transactions between different parties interacting in the smart parking environment.It further adopted the method of Homomorphically Computing Univariate Polynomial-based private information retrieval(HCUPPIR)scheme for preserving the location privacy of drivers.The results of IACB-HCUPPIR confirmed better results in terms of minimized computation and communication overload with throughput,latency,and response time with maximized drivers’privacy preservation.Moreover,the proposed fully homomorphic algorithm(FHE)was compared against partial-homomorphic encryption(PHE)and technique without encryption and found that the proposed model has quick communication in allocating the parking slots starting with 24.3 s,whereas PHE starts allocating from 24.7 s and the technique without encryption starts at 27.4 s.Thus,we ensure the proposed model performs well in allocating parking slots with less time and high security with privacy preservation.展开更多
This paper focuses on how to use consortium blockchain to improve the regulation of peer-to-peer(P2 P) lending market. The partial decentralized consortium blockchain with limited pre-set nodes can well improve transp...This paper focuses on how to use consortium blockchain to improve the regulation of peer-to-peer(P2 P) lending market. The partial decentralized consortium blockchain with limited pre-set nodes can well improve transparency and security, which is suitable for financial regulation. Considering irregularities of the P2P lending market, the Hyperledger-based Peer-to-Peer Lending System(HyperP2PLS) is proposed. First elaborate the application scenario and business logic of the system, where a national P2P Lending Trading Center will be established to integrate all transactions and information of P2P lending market. Then construct the system architecture consisting of the blockchain network, HTTP server, and applications. The algorithm of implementation process and the web application for users have been well illustrated. The performance analysis shows that HyperP2PLS can guarantee the reliability, safety, transparency and efficiency.展开更多
With the deepening of China’s health-care reform,an integrated delivery system has gradually emerged with the function of improving the efficiency of the health-care delivery system.For China’s integrated delivery s...With the deepening of China’s health-care reform,an integrated delivery system has gradually emerged with the function of improving the efficiency of the health-care delivery system.For China’s integrated delivery system,a medical consortium plays an important role in integrating public hospitals and primary care facilities.The first medical consortium policy issued after the COVID-19 pandemic apparently placed hope on accelerating the implementation of a medical consortium and tiered health-care delivery system.This paper illustrates the possible future pathway of China’s medical consortium through retrospection of the 10-year process,changes of the series of policies,and characteristics of the policy issued in 2020.We considered that a fully integrated medical consortium would be a major phenomenon in China's medical industry,which would lead to the formation of a dualistic care pattern in China.展开更多
System-wide information management(SWIM)is a complex distributed information transfer and sharing system for the next generation of Air Transportation System(ATS).In response to the growing volume of civil aviation ai...System-wide information management(SWIM)is a complex distributed information transfer and sharing system for the next generation of Air Transportation System(ATS).In response to the growing volume of civil aviation air operations,users accessing different authentication domains in the SWIM system have problems with the validity,security,and privacy of SWIM-shared data.In order to solve these problems,this paper proposes a SWIM crossdomain authentication scheme based on a consistent hashing algorithm on consortium blockchain and designs a blockchain certificate format for SWIM cross-domain authentication.The scheme uses a consistent hash algorithm with virtual nodes in combination with a cluster of authentication centers in the SWIM consortium blockchain architecture to synchronize the user’s authentication mapping relationships between authentication domains.The virtual authentication nodes are mapped separately using different services provided by SWIM to guarantee the partitioning of the consistent hash ring on the consortium blockchain.According to the dynamic change of user’s authentication requests,the nodes of virtual service authentication can be added and deleted to realize the dynamic load balancing of cross-domain authentication of different services.Security analysis shows that this protocol can resist network attacks such as man-in-the-middle attacks,replay attacks,and Sybil attacks.Experiments show that this scheme can reduce the redundant authentication operations of identity information and solve the problems of traditional cross-domain authentication with single-point collapse,difficulty in expansion,and uneven load.At the same time,it has better security of information storage and can realize the cross-domain authentication requirements of SWIM users with low communication costs and system overhead.KEYWORDS System-wide information management(SWIM);consortium blockchain;consistent hash;cross-domain authentication;load balancing.展开更多
Effectively identifying and preventing the threat of Byzantine nodes to the security of distributed systems is a challenge in applying consortium chains.Therefore,this paper proposes a new consortium chain generation ...Effectively identifying and preventing the threat of Byzantine nodes to the security of distributed systems is a challenge in applying consortium chains.Therefore,this paper proposes a new consortium chain generation model,deeply analyzes the vulnerability of the consortium chain consensus based on the behavior of the nodes,and points out the effects of Byzantine node proportion and node state verification on the consensus process and system security.Furthermore,the normalized verification node aggregation index that represents the consensus ability of the consortium organization and the trust evaluation function of the verification node set is derived.When either of the two is lower than the threshold,the consortium institution or the verification node set members are dynamically adjusted.On this basis,an innovative consortium chain generation mechanism based on the Asynchronous Binary Byzantine Consensus Mechanism(ABBCM)is proposed.Based on the extended consortium chain consensus mechanism,a certain consensus value set can be combined into multiple proposals,which can realize crossdomain asynchronous message passing between multi-consortium chains without reducing the system’s security.In addition,experiments are carried out under four classical Byzantine Attack(BA)behaviors,BA1 to BA4.The results show that the proposed method can obtain better delay than the classical random Byzantine consensus algorithm Coin,effectively improving the consensus efficiency based on asynchronous message passing in the consortium chain and thus meeting the throughput of most Internet of Things(IoT)applications.展开更多
The data in Mobile Edge Computing(MEC)contains tremendousmarket value,and data sharing canmaximize the usefulness of the data.However,certain data is quite sensitive,and sharing it directly may violate privacy.Vertica...The data in Mobile Edge Computing(MEC)contains tremendousmarket value,and data sharing canmaximize the usefulness of the data.However,certain data is quite sensitive,and sharing it directly may violate privacy.Vertical Federated Learning(VFL)is a secure distributed machine learning framework that completes joint model training by passing encryptedmodel parameters rather than raw data,so there is no data privacy leakage during the training process.Therefore,the VFL can build a bridge between data demander and owner to realize data sharing while protecting data privacy.Typically,the VFL requires a third party for key distribution and decryption of training results.In this article,we employ the consortium blockchain instead of the traditional third party and design a VFL architecture based on the consortium blockchain for data sharing in MEC.More specifically,we propose a V-Raft consensus algorithm based on Verifiable Random Functions(VRFs),which is a variant of the Raft.The VRaft is able to elect leader quickly and stably to assist data demander and owner to complete data sharing by VFL.Moreover,we apply secret sharing todistribute the private key to avoid the situationwhere the training result cannot be decrypted if the leader crashes.Finally,we analyzed the performance of the V-Raft and carried out simulation experiments,and the results show that compared with Raft,the V-Raft has higher efficiency and better scalability.展开更多
The construction of a municipal industry-education consortium is one of the important measures for the“one body,two wings,and five key points”reform of China’s modern vocational education system in the new era.It i...The construction of a municipal industry-education consortium is one of the important measures for the“one body,two wings,and five key points”reform of China’s modern vocational education system in the new era.It is of great significance for the integrated promotion of the three major national strategies of education,technology,and talent.Exploring the construction path of municipal industry-education consortia from the perspective of“four-chain integration”is essential for improving the quality of vocational education talents,comprehensively promoting local economic and social development,and serving the national strategy of revitalizing the country through science and education.The new generation of information technology industry-education consortium in Chengdu actively explores new paths of industry-education integration,science-education integration,and vocational-education integration.It has formed a“park+alliance”to establish a diversified collaborative construction and management mechanism,a“professional+industry”school-enterprise cooperation to promote industrial transformation and upgrading,a“teaching+research and development”to build an industry-university research innovation platform to empower high-quality development,and a“cultivation+employment”to explore a matrix style talent cultivation model,thus promoting regional governments,industries enterprises,and higher education institutions.Fully leveraging complementary advantages involves capitalizing on the spatial cluster effect.It requires a foundation in the education chain,guided by the industrial chain,activation of the innovation chain,establishment of a talent chain,enhancement of the value chain,and the promotion of a modern vocational education structure.This structure should align with market demand and industry structure,ultimately promoting regional economic and social development.展开更多
The microbial consortium GF-20(GF-20) can efficiently decompose corn stover at low temperatures. The present study explored the key microbes of GF-20 and evaluated different culture conditions on its composition stabi...The microbial consortium GF-20(GF-20) can efficiently decompose corn stover at low temperatures. The present study explored the key microbes of GF-20 and evaluated different culture conditions on its composition stability to promote the utilization of corn stover decomposing microbes in low temperature regions. GF-20 was subcultured to the 15 th generation under different temperatures, pHs, carbon, and nitrogen sources. Then, the dynamics of fermenting pH, cellulose enzyme activities, carbohydrate concentration, and oxidation reduction potential were determined to estimate the degradation efficiency of corn stover with GF-20. Furthermore, the structural stability and functional microbes of GF-20 were identified on the basis of PCR-denaturing gradient gel electrophoresis(DGGE) profiling and principal component analysis. The results showed that the offspring of GF-20 subcultured under different temperatures(4–30°C) and pH(6.0–9.0) conditions maintained stable growth, decomposition function, and composition structure. Furthermore, consortia GF-20 had a stable composition structure, which induced GF-20 to secrete cellulose and promote substrate decomposition as corn stover and ammonium were used as sources of carbon and nitrogen, respectively. According to the PCR-DGGE profiles, the key strains of GF-20 were determined to be Bacillus licheniformis, Cellvibrio mixtus subsp. mixtus, Bacillus tequilensis, Clostridium populeti, and Clostridium xylanolyticum.展开更多
基金The research was funded by the School of Information Technology and Engineering,Vellore Institute of Technology,Vellore 632014,Tamil Nadu,India.
文摘In crowded cities,searching for the availability of parking lots is a herculean task as it results in the wastage of drivers’time,increases air pollution,and traffic congestion.Smart parking systems facilitate the drivers to determine the information about the parking lot in real time and book them depending on the requirement.But the existing smart parking systems necessitate the drivers to reveal their sensitive information that includes their mobile number,personal identity,and desired destination.This disclosure of sensitive information makes the existing centralized smart parking systems more vulnerable to service providers’security breaches,single points of failure,and bottlenecks.In this paper,an Improved Asymmetric Consortium Blockchain and Homomorphically Computing Univariate Polynomial-based private information retrieval(IACB-HCUPPIR)scheme is proposed to ensure parking lots’availability with transparency security in a privacy-preserving smart parking system.In specific,an improved Asymmetric Consortium Blockchain is used for achieving secure transactions between different parties interacting in the smart parking environment.It further adopted the method of Homomorphically Computing Univariate Polynomial-based private information retrieval(HCUPPIR)scheme for preserving the location privacy of drivers.The results of IACB-HCUPPIR confirmed better results in terms of minimized computation and communication overload with throughput,latency,and response time with maximized drivers’privacy preservation.Moreover,the proposed fully homomorphic algorithm(FHE)was compared against partial-homomorphic encryption(PHE)and technique without encryption and found that the proposed model has quick communication in allocating the parking slots starting with 24.3 s,whereas PHE starts allocating from 24.7 s and the technique without encryption starts at 27.4 s.Thus,we ensure the proposed model performs well in allocating parking slots with less time and high security with privacy preservation.
基金supported by the National Natural Science Foundation of China under Grant No.71872020 and No.71402008the Corporate Finance and Innovation Development Research Center in BUPT
文摘This paper focuses on how to use consortium blockchain to improve the regulation of peer-to-peer(P2 P) lending market. The partial decentralized consortium blockchain with limited pre-set nodes can well improve transparency and security, which is suitable for financial regulation. Considering irregularities of the P2P lending market, the Hyperledger-based Peer-to-Peer Lending System(HyperP2PLS) is proposed. First elaborate the application scenario and business logic of the system, where a national P2P Lending Trading Center will be established to integrate all transactions and information of P2P lending market. Then construct the system architecture consisting of the blockchain network, HTTP server, and applications. The algorithm of implementation process and the web application for users have been well illustrated. The performance analysis shows that HyperP2PLS can guarantee the reliability, safety, transparency and efficiency.
基金supported by the National Natural Sciences Foundation of China(No.71874058 and No.72174068).
文摘With the deepening of China’s health-care reform,an integrated delivery system has gradually emerged with the function of improving the efficiency of the health-care delivery system.For China’s integrated delivery system,a medical consortium plays an important role in integrating public hospitals and primary care facilities.The first medical consortium policy issued after the COVID-19 pandemic apparently placed hope on accelerating the implementation of a medical consortium and tiered health-care delivery system.This paper illustrates the possible future pathway of China’s medical consortium through retrospection of the 10-year process,changes of the series of policies,and characteristics of the policy issued in 2020.We considered that a fully integrated medical consortium would be a major phenomenon in China's medical industry,which would lead to the formation of a dualistic care pattern in China.
基金funded by the National Natural Science Foundation of China(62172418)the Joint Funds of the National Natural Science Foundation of China and the Civil Aviation Administration of China(U2133203)+1 种基金the Education Commission Scientific Research Project of Tianjin China(2022KJ081)the Open Fund of Key Laboratory of Civil Aircraft Airworthiness Technology(SH2021111907).
文摘System-wide information management(SWIM)is a complex distributed information transfer and sharing system for the next generation of Air Transportation System(ATS).In response to the growing volume of civil aviation air operations,users accessing different authentication domains in the SWIM system have problems with the validity,security,and privacy of SWIM-shared data.In order to solve these problems,this paper proposes a SWIM crossdomain authentication scheme based on a consistent hashing algorithm on consortium blockchain and designs a blockchain certificate format for SWIM cross-domain authentication.The scheme uses a consistent hash algorithm with virtual nodes in combination with a cluster of authentication centers in the SWIM consortium blockchain architecture to synchronize the user’s authentication mapping relationships between authentication domains.The virtual authentication nodes are mapped separately using different services provided by SWIM to guarantee the partitioning of the consistent hash ring on the consortium blockchain.According to the dynamic change of user’s authentication requests,the nodes of virtual service authentication can be added and deleted to realize the dynamic load balancing of cross-domain authentication of different services.Security analysis shows that this protocol can resist network attacks such as man-in-the-middle attacks,replay attacks,and Sybil attacks.Experiments show that this scheme can reduce the redundant authentication operations of identity information and solve the problems of traditional cross-domain authentication with single-point collapse,difficulty in expansion,and uneven load.At the same time,it has better security of information storage and can realize the cross-domain authentication requirements of SWIM users with low communication costs and system overhead.KEYWORDS System-wide information management(SWIM);consortium blockchain;consistent hash;cross-domain authentication;load balancing.
基金supported by Henan University Science and Technology Innovation Talent Support Program(23HASTIT029)the National Natural Science Foundation of China(61902447)+3 种基金Tianjin Natural Science Foundation Key Project(22JCZDJC00600)Research Project of Humanities and Social Sciences in Universities of Henan Province(2024-ZDJH-061)Key Scientific Research Projects of Colleges and Universities in Henan Province(23A520054)Henan Science and Technology Research Project(232102210124).
文摘Effectively identifying and preventing the threat of Byzantine nodes to the security of distributed systems is a challenge in applying consortium chains.Therefore,this paper proposes a new consortium chain generation model,deeply analyzes the vulnerability of the consortium chain consensus based on the behavior of the nodes,and points out the effects of Byzantine node proportion and node state verification on the consensus process and system security.Furthermore,the normalized verification node aggregation index that represents the consensus ability of the consortium organization and the trust evaluation function of the verification node set is derived.When either of the two is lower than the threshold,the consortium institution or the verification node set members are dynamically adjusted.On this basis,an innovative consortium chain generation mechanism based on the Asynchronous Binary Byzantine Consensus Mechanism(ABBCM)is proposed.Based on the extended consortium chain consensus mechanism,a certain consensus value set can be combined into multiple proposals,which can realize crossdomain asynchronous message passing between multi-consortium chains without reducing the system’s security.In addition,experiments are carried out under four classical Byzantine Attack(BA)behaviors,BA1 to BA4.The results show that the proposed method can obtain better delay than the classical random Byzantine consensus algorithm Coin,effectively improving the consensus efficiency based on asynchronous message passing in the consortium chain and thus meeting the throughput of most Internet of Things(IoT)applications.
基金funded by the National Natural Science Foundation(61962009)the National Natural Science Foundation(62202118)+1 种基金Top Technology Talent Project from Guizhou Education Department(Qianjiao ji[2022]073)Foundation of Guangxi Key Laboratory of Cryptography and Information Security(GCIS202118).
文摘The data in Mobile Edge Computing(MEC)contains tremendousmarket value,and data sharing canmaximize the usefulness of the data.However,certain data is quite sensitive,and sharing it directly may violate privacy.Vertical Federated Learning(VFL)is a secure distributed machine learning framework that completes joint model training by passing encryptedmodel parameters rather than raw data,so there is no data privacy leakage during the training process.Therefore,the VFL can build a bridge between data demander and owner to realize data sharing while protecting data privacy.Typically,the VFL requires a third party for key distribution and decryption of training results.In this article,we employ the consortium blockchain instead of the traditional third party and design a VFL architecture based on the consortium blockchain for data sharing in MEC.More specifically,we propose a V-Raft consensus algorithm based on Verifiable Random Functions(VRFs),which is a variant of the Raft.The VRaft is able to elect leader quickly and stably to assist data demander and owner to complete data sharing by VFL.Moreover,we apply secret sharing todistribute the private key to avoid the situationwhere the training result cannot be decrypted if the leader crashes.Finally,we analyzed the performance of the V-Raft and carried out simulation experiments,and the results show that compared with Raft,the V-Raft has higher efficiency and better scalability.
基金2022-2024 Sichuan Vocational Education Talent Training and Education and Teaching Reform Research Project:Research and Practice on Comprehensive Education of Digital Media Technology Major"Posts,Courses,Competitions,and Certificates in Higher Vocational Colleges from the Perspective of Talent Chain,Innovation Chain,Education Chain,and Industrial Chain Integration"(Chuanjiaohan[2023]No.100,GZJG2022-107)2023 Sichuan Education and Scientific Research Project Key Project"Based on the Skills Master Studio's'Three-Pairs,Three-Levels,and Four-Integration'Education Path Research and Practice in Digital Media Technology Major in Higher Vocational Education"(Chuanjiaohan[2023]No.478,SCJG23A077)+2 种基金14th Five-Year Plan for Education Information Technology Research in Sichuan Province 2022 Project(DSJ2022100)2022 Chengdu Agricultural College Key Education and Teaching Reform Project(JG-202202-11)Chengdu Philosophy and Social Sciences Key Research Base:Chengdu Craftsman Culture Research Center Project(2023ZC03)。
文摘The construction of a municipal industry-education consortium is one of the important measures for the“one body,two wings,and five key points”reform of China’s modern vocational education system in the new era.It is of great significance for the integrated promotion of the three major national strategies of education,technology,and talent.Exploring the construction path of municipal industry-education consortia from the perspective of“four-chain integration”is essential for improving the quality of vocational education talents,comprehensively promoting local economic and social development,and serving the national strategy of revitalizing the country through science and education.The new generation of information technology industry-education consortium in Chengdu actively explores new paths of industry-education integration,science-education integration,and vocational-education integration.It has formed a“park+alliance”to establish a diversified collaborative construction and management mechanism,a“professional+industry”school-enterprise cooperation to promote industrial transformation and upgrading,a“teaching+research and development”to build an industry-university research innovation platform to empower high-quality development,and a“cultivation+employment”to explore a matrix style talent cultivation model,thus promoting regional governments,industries enterprises,and higher education institutions.Fully leveraging complementary advantages involves capitalizing on the spatial cluster effect.It requires a foundation in the education chain,guided by the industrial chain,activation of the innovation chain,establishment of a talent chain,enhancement of the value chain,and the promotion of a modern vocational education structure.This structure should align with market demand and industry structure,ultimately promoting regional economic and social development.
基金supported by the National Natural Science Foundation of China (31760353 and 31560360)the National Key R&D Program of China (2017YFD0300804 and 2016YFD0300103)+2 种基金the earmarked fund for China Agriculture Research System (CARS-02-63)the Crop Science Observation & Experiment Station in Loess Plateau of North China, Ministry of Agriculture, China (25204120)the Advanced Talented Scholars of Inner Mongolia Agricultural University, China (NDYB2016-15)
文摘The microbial consortium GF-20(GF-20) can efficiently decompose corn stover at low temperatures. The present study explored the key microbes of GF-20 and evaluated different culture conditions on its composition stability to promote the utilization of corn stover decomposing microbes in low temperature regions. GF-20 was subcultured to the 15 th generation under different temperatures, pHs, carbon, and nitrogen sources. Then, the dynamics of fermenting pH, cellulose enzyme activities, carbohydrate concentration, and oxidation reduction potential were determined to estimate the degradation efficiency of corn stover with GF-20. Furthermore, the structural stability and functional microbes of GF-20 were identified on the basis of PCR-denaturing gradient gel electrophoresis(DGGE) profiling and principal component analysis. The results showed that the offspring of GF-20 subcultured under different temperatures(4–30°C) and pH(6.0–9.0) conditions maintained stable growth, decomposition function, and composition structure. Furthermore, consortia GF-20 had a stable composition structure, which induced GF-20 to secrete cellulose and promote substrate decomposition as corn stover and ammonium were used as sources of carbon and nitrogen, respectively. According to the PCR-DGGE profiles, the key strains of GF-20 were determined to be Bacillus licheniformis, Cellvibrio mixtus subsp. mixtus, Bacillus tequilensis, Clostridium populeti, and Clostridium xylanolyticum.