GAO Feng , ZHU Liehuang , DING Kai , GONG Guopeng , DAI Qingzhu
2019, 11(5):499-512. DOI: 10.13878/j.cnki.jnuist.2019.05.001
Abstract:As a special cryptocurrency based on value-stable attributes,stable coins not only act as a bridge to link blockchain crypto assets and real-world assets,but also have the potential to be an effective tool for reducing the cost of intermediary services in the real financial industry and improving the efficiency of capital transmission.Since the announcement of stable token programs by internationally renowned companies such as JP Morgan and Facebook,the stable coins have become a research hotspot for financial regulators,business circles and scientific institutions.By comparing the legal currency,cryptocurrency and stable coins,this paper introduces the characteristics of stable tokens in detail,and then introduces the system architecture and operation mechanism of stable tokens from three aspects of blockchain infrastructure,value stability and operation mechanism.Finally,we analyze the defects and possible solutions of the stable token system combined with its technical characteristics.
LIU Jiuliang , FU Zhangjie , SUN Xingming
2019, 11(5):513-522. DOI: 10.13878/j.cnki.jnuist.2019.05.002
Abstract:Blockchain technology,which has the advantages of decentralization and tamper-proofing,provides a new way to store information,execute transactions and handle business logic in an open environment.From the 1.0 era represented by Bitcoin to the 2.0 era represented by Ethereum,blockchain technology has revolutionized the finance,Internet of Things,supply chains and other industries.However,blockchain technology still faces many security challenges due to technical and management issues.Firstly,we discuss eight kinds of blockchain attacks in terms of information security,system security and privacy security,such as malicious information attacks,51% attacks,smart contract attacks,denial of service attacks,etc.,and analyze the principles,implementation processes and destructiveness of these attacks.Secondly,we discuss twelve blockchain security technologies from the above three perspectives,such as SmartPool,Securify analysis tool,mixing service and zero-knowledge proof,and analyze the principles,implementation processes,advantages and limitations of these technologies.Finally,we look forward into the future research directions of blockchain technology.
2019, 11(5):523-531. DOI: 10.13878/j.cnki.jnuist.2019.05.003
Abstract:Blockchain technology is one of the most popular technologies in recent years.It has been widely used in the field of e-commerce information security because of its characteristics of decentralization,trustworthiness and anonymity.Firstly,this paper introduces the blockchain technology from its basic principles,key technologies,application fields,and existing security risks.Secondly,the application of blockchain technology in the field of e-commerce information security is elaborated from several perspectives,such as data encryption technology,blockchain-based identity authentication,blockchain-based firewall technology,etc.Finally,the application challenges of blockchain technology in the field of e-commerce information security are analyzed,and the conclusions and prospects are summarized.
HONG Yang , WANG Lisong , GE Chunpeng
2019, 11(5):532-540. DOI: 10.13878/j.cnki.jnuist.2019.05.004
Abstract:Blockchain,the underlying technology of Bitcoin,has been widely deployed in many systems including the cryptocurrency,supply chain system due to its transparency,unforgeability and immutability.However,the most of the blockchain platforms such as the Bitcoin are facing the security problems including selfish mining attack,which cause serious effects to the development of blockchain technology.Selfish mining is a kind of strategy in the blockchain technology where selfish miners increase their profit by selectively publishing hidden blocks.Utilizing the central limit theorem and node state transition diagram to establish two probability models in theory,then we use Markov stochastic process and function extremum method to figure out the optimal relative profit.Meanwhile,the simulation experiment of selfish mining is designed and conducted,and the relationship between node computing power and profit in selfish mining is obtained,so as to further verify the rationality of the above models.
2019, 11(5):541-550. DOI: 10.13878/j.cnki.jnuist.2019.05.005
Abstract:Blockchain technology is quite suitable to solve the difficulties in the field of education due to its secure and decentralized nature.This paper introduces blockchain's basic theory and key technologies which include the block structure and construction of blockchain,the architecture of blockchain platform,types of blockchain,consensus algorithms and smart contract.Then the new trends in modern education field such as lifelong education and cross-domain education are presented and the limitations of traditional digital education system are discussed.We give detailed description and analysis of the application of blockchain technology in the field of education such as educational data sharing and verification,learning tracing,awarding and shaping of study path,study evaluation,educational management and decision making.Finally the questions in application of blockchain technology in education field and future research directions are summarized.
DING Yong , XIANG Hengkui , YUAN Fang , LUO Decun , LIU Lingang , ZOU Xiuqing , TANG Chenjun
2019, 11(5):551-558. DOI: 10.13878/j.cnki.jnuist.2019.05.006
Abstract:In the era of mobile internet,it is more and more convenient to access professional knowledge and information,meanwhile,academic misconducts such as plagiarism and fraud are receiving increasing attention.With the emergence of digital currencies such as Bitcoin,the underlying blockchain technology also enters into people's sights.Based on the decentralization,trustworthiness and traceability of blockchain technology,this paper proposes a blockchain-based academic paper review and traceability system.While eliminating the high cost and security problems brought by the centralized system,the proposed system retrieves,records,and stores the academic papers with their reviewing and publishing processes,thus make the papers safe and traceable.
2019, 11(5):559-566. DOI: 10.13878/j.cnki.jnuist.2019.05.007
Abstract:With the improvement of domestic scientific research and the rapid development of publishing industry,China has gradually become a world power in scientific research output.However,China's international journal paper publishing is faced with such problems as slow progress,high cost and poor timeliness.This paper aims to build a decentralized international journal publishing system to solve these problems.Firstly,the feasibility of an international journal publishing system based on blockchain was analyzed,and then the model of Rec-chain for international journal publishing based on blockchain was proposed.Hyperledger Composer was used for the proof of the model concept,and Hyperledger Caliper was used to test the model performance.The proposed model has passed the feasibility test and the concept proof,and the performance test shows that the system is feasible in terms of throughput and delay.Experiment results show that the proposed Rec-chain system can effectively solve the problems faced by international journal publishing system,and has the performance feasibility.
SUN Hui , CHENG Xu , HUANG Zheng , CHEN Fulong
2019, 11(5):567-572. DOI: 10.13878/j.cnki.jnuist.2019.05.008
Abstract:With the rapid development of Internet and explosive growth of medical data,the sharing of medical data results in serious security concerns.A data security protection method based on Medical Alliance Chain (MAC) is proposed,which includes a security authentication and access control model.The query logic detached storage technology is introduced into the model to protect patients' data privacy.The storage and access of authentication credentials and access authority data are elaborated based on MAC.The security authentication and access control model based on MAC involves three roles of patients,medical staff,and the MAC.The query logic detached technology and the MAC are closely integrated to meet the needs of secure medical data sharing between different hospitals,and to protect patients' data privacy as well as the right of medical staff to access data.
2019, 11(5):573-580. DOI: 10.13878/j.cnki.jnuist.2019.05.009
Abstract:Aiming at the security problems such as single point of failure,data untrustworthiness,failure untraceability caused by centralized storage architecture and the problem that traditional collaborative office system only supports single enterprise internal office,this paper uses hyperledger fabric blockchain technology,business process management technology and service combination technology to implement a smart contract collaborative development system based on fabric blockchain.Firstly,the system architecture combines the traditional centralized storage technology and the blockchain decentralized storage technology.By storing the core business data information in the blockchain distributed ledger and the unimportant data such as business process management in the traditional database,the problem of security and trust brought by centralized storage management is solved.Finally,by combining the characteristics of enterprise alliance provided by hyperledger fabric blockchain technology,the system can be applied to enterprise alliance office,and solve the problem of single office.
SANG Anqi , SHEN Meng , ZHU Liehuang , LIU Sheng , YIN Shu , XIAO Yao
2019, 11(5):581-589. DOI: 10.13878/j.cnki.jnuist.2019.05.010
Abstract:With the rapid development of information technology,the security of authentication mechanism has received more and more extensive attention.However,the existing identity authentication mechanism has the risk of privacy threat.Thus,designing a more reliable authentication mechanism is in urgent need.This paper designed a multi-party collaborative security authentication mechanism based on the blockchain for its decentralized and tamper-proof features.While achieving reliable identity authentication,it ensures the authority of information,reduces data redundancy,improves the authentication efficiency,and realizes comprehensive and accurate authentication.Finally,the authentication system is implemented,which enables multiple data service providers to encrypt and sign identity information,protect data privacy,and share data with multiple parties.
YANG Ming , DING Long , XU Yan
2019, 11(5):590-595. DOI: 10.13878/j.cnki.jnuist.2019.05.011
Abstract:Cloud services can provide storage space,but a single cloud environment cannot provide secure data storage and sharing.However,the secure storage and sharing is an important content to ensure the security of medical data.Public audit technology protects cloud data from tampering,thus ensure the secure storage of medical data.The public access of the tamper-resistant blockchain can realize the secure sharing of medical data.The paper uses public audit technology to propose a blockchain-based cloud storage and sharing scheme for medical data,and analysis shows that the scheme is secure and effective.
LIU Shuai , QI Rongxin , DONG Yihui , FENG Meng , MIAO Tiantian , JIANG Linghong
2019, 11(5):596-600. DOI: 10.13878/j.cnki.jnuist.2019.05.012
Abstract:The resource of the internet of things (IoT) devices is limited and external resources are needed.While a centralized cloud solution can provide sufficient computing and storage resources for the internet of things.However,the cloud cannot process large amounts of data promptly,due to some factors such as network bandwidth.The scheme based on cloud uses static password authentication and plaintext storage mechanism,thus there are some security problems.The emerging technology of blockchain brings a new idea to solve the security problems of the internet of things.And edge computing shortens the distance of data processing and enhances the real-time performance.Therefore,this paper will use these two technologies to solve the current problems in the internet of things.
WANG Xiangshun , ZHENG Xiaoyao , ZHU Deyi , ZHANG Yue , SUN Liping
2019, 11(5):601-608. DOI: 10.13878/j.cnki.jnuist.2019.05.013
Abstract:The traditional recommendation system is mainly for a single user,but people are increasingly participating in activities in the form of multiple users.Group recommendation is intended to serve groups of multiple users and has already become one of the hotspots of current research.Aiming at the low accuracy of current group recommendation and the difficulty of integrating preference conflicts among group members,this paper proposes a new consensus model strategy,which combines group leader impact factor and project heat impact factor,and is based on K Nearest Neighbor recommendation.A group recommendation algorithm based on preference aggregation is designed to find the neighbor groups for the target group and draw on the preference of the neighbor groups.The experimental results on the MovieLens dataset show that the aggregation strategy proposed in this paper has better performance than traditional preference aggregation strategy.The overall average performance of the recommended accuracy (measured by normalized Discounted Cumulative Gain,nDCG) is increased by about 13%,and the overall average performance of the recommendation list diversity is improved by about 10%.
CHEN Shiding , LIU Xiang , WANG Yingqiong
2019, 11(5):609-620. DOI: 10.13878/j.cnki.jnuist.2019.05.014
Abstract:A single architecture cannot meet the demand for the development of an emergency early warning auxiliary decision system.In order to solve this problem,a microservice architecture is introduced to design and develop the system.By analyzing the advantages of applying a microservice architecture in a complex systeminstead of a traditional monomer-type structure,we designed a microservice architecture based on the emergency early warning information release auxiliary decision system.This system selects the Spring Cloud service framework,and makes an appropriate extension on itto create the registry and gateway based on the system design.The system adopts a 2D and 3D integrated geographic information system as the display platform.By accessing the static monitoring data and hazard source dymamic monitoring data on various industries,the system can integrate and processes data according to the set mode,and assists in command and decision-making in the early warning information generation,release,and emergency response stages.This design scheme has been applied tothe Hubei province emergency early warning and release aided decision system.The rationality and effectiveness of this kind of system,which uses a microservice architecture,has been verified.
2019, 11(5):621-624. DOI: 10.13878/j.cnki.jnuist.2019.05.015
Abstract:For radio frequency identification using the LANDMARC indoor positioning system,k-nearest neighbor reference tags that meet certain conditionswere selected,and the final position of the unknown tag was estimated according to those reference tags.However,the methods of selecting of the number of adjacent reference tags are also blindness.To solve this problem,the reference tag thatis nearest the unknown node is selected as an unknown point; then,the optimal number k is obtained by searching all feasible k values.Simulation results demonstrate that the performance of the improved LANDMARC algorithm is better than the traditional LANDMARC algorithm,and the accuracy improved by approximately 10%.
Address:No. 219, Ningliu Road, Nanjing, Jiangsu Province
Postcode:210044
Phone:025-58731025