网络与信息安全学报 ›› 2019, Vol. 5 ›› Issue (2): 1-12.doi: 10.11959/j.issn.2096-109x.2019011

• 专栏:区块链技术 •    下一篇

基于双层架构的溯源许可链共识机制

丁庆洋1(),朱建明1,张瑾2,宋彪1,3,许艳静1,贾传昌1,高政1   

  1. 1 中央财经大学信息学院,北京 100081
    2 中央财经大学保险学院,北京 100081
    3 内蒙古财经大学会计学院,内蒙古 呼和浩特,010000
  • 修回日期:2018-12-10 出版日期:2019-04-15 发布日期:2019-04-16
  • 作者简介:丁庆洋(1991- ),男,河北南宫人,中央财经大学博士生,主要研究方向为区块链应用、数字经济。|朱建明(1965- ),男,山西太原人,中央财经大学教授、博士生导师,主要研究方向为信息安全、区块链技术、大数据分析。|张瑾(1993- ),女,山东菏泽人,中央财经大学硕士生,主要研究方向为区块链应用。|宋彪(1983- ),男,内蒙古兴安盟人,中央财经大学博士(后)、内蒙古财经大学副教授,主要研究方向大数据、区块链技术。|许艳静(1983- ),女,河北石家庄人,中央财经大学博士生,主要研究方向为区块链技术与应用。|贾传昌(1978- ),男,黑龙江佳木斯人,中央财经大学博士生,主要研究方向为信息安全、区块链应用。|高政(1993- ),男,山西太原人,中央财经大学硕士生,主要研究方向为金融科技。
  • 基金资助:
    国家重点研发计划基金资助项目(2017YFB1400700);国家自然科学基金资助项目(U1509214);内蒙古自然科学基金资助项目(2016BS0701);内蒙古数据科学与大数据学会基金资助项目(BDY18010)

Traceability permissioned chain consensus mechanism based on double-layer architecture

Qingyang DING1(),Jianming ZHU1,Jin ZHANG2,Biao SONG1,3,Yanjing XU1,Chuanchang JIA1,Zheng GAO1   

  1. 1 School of Information,Central University of Finance and Economics,Beijing 100081,China
    2 School of Insurance,Central University of Finance and Economics,Beijing 100081,China
    3 Inner Mongolia University of Finance and Economics Accounting College,Hohhot 010000,China
  • Revised:2018-12-10 Online:2019-04-15 Published:2019-04-16
  • Supported by:
    The National Key R&D Program of China(2017YFB1400700);The National Natural Science Foundation of China(U1509214);Inner Mongolia Natural Science Foundation Project(2016BS0701);Inner Mongolia Data Science and Big Data Society Project(BDY18010)

摘要:

区块链中的区块按照时间历史顺序进行排列,同时通过数据加密技术以及共识机制使区块链具有不可篡改性,这使产品溯源成为区块链的重要应用场景。选择产品信息追溯技术要考虑技术的可行性同时要考虑产品以及生产者的市场属性,这使许可链代替公有链成为产品信息溯源的重要部署方式。现有研究成果中对溯源许可链的研究多停留在机制设计和框架建构上,少有对适用于产品信息溯源的共识算法进行研究。在技术工程实践过程中,联盟链中多选用实用拜占庭容错(PBFT,practical byzantine fault tolerance)作为溯源链的共识机制(如超级账本项目 Hyperledger),但随着参与节点数量的增加,溯源链的运行效率明显下降,延迟时间明显提高,致使多数项目依然处于实验阶段。基于此,提出基于双层架构的溯源许可链共识机制(DLPCM)。首先将参与者在垂直维度上化分为两层,其次在不同层次上根据区块链的不同部署方式采用不同的共识机制,最后对该共识机制下的溯源信息查询机制进行介绍,为基于许可链的溯源系统的开发和设计提供了重要借鉴。

关键词: 许可链, 溯源, 双层架构, 共识机制

Abstract:

The blocks in the blockchain are arranged in chronological and historical order,and the blockchain is incapable of modification through data encryption technology and consensus mechanism,which makes product trace ability to be an important application scenario of blockchain.To choose product information traceability technology,not only the feasibility of the technology but also the market attributes of the product and the producer should be considered,which makes the permissioned chain replace the public chain as an important deployment method of product information traceability.In the existing research results,the research on the traceability license chain mainly focuses on mechanism design and framework construction,and the consensus algorithm applicable to product information traceability is rarely studied.In the process of technology of engineering practice,practical byzantine fault tolerance was chosen more in league chain as the consensus of traceability chain mechanism (such as Hyperledger),but with the increasing number of participating nodes of the traceability chain efficiency will be significantly reduced,and the delay time will be significantly improved,resulting in most of the project is still in the stage of experiment.Based on this,a traceability license chain consensus mechanism based on double-layer architecture (DLPCM) is proposed,and its security is analyzed.Participants are divided into two layers on the vertical dimension,and different consensus mechanisms are adopted at different levels according to different deployment modes of blockchain.Finally,the traceability information query mechanism under the consensus mechanism is introduced,an important reference for the development and design of traceability system based on license chain is provided.

Key words: permissioned chain, traceability, double-layer architecture, consensus mechanism

中图分类号: 

[1] 曹张华,唐元生. 基于网络编码保密通信[J]. 通信学报, 2010, 31(8A): 34 -194 .
[2] 高翔,祝跃飞,刘胜利,费金龙,刘龙. 基于模糊Petri网的网络风险评估模型[J]. 通信学报, 2013, 34(Z1): 16 -132 .
[3] 孔德岐,李亚晖,郭鹏. 高可靠嵌入式计算机系统的发展[J]. 通信学报, 2013, 34(Z1): 22 -175 .
[4] 杨智丹,刘克胜,陈 宇,陈建熊. 抗统计分析的ISN随机增量协议隐写算法[J]. 通信学报, 2008, 29(11A): 7 -40 .
[5] 陶承怡,马小梅. 基于信息价值链的电信运营商大数据策略研究[J]. 电信科学, 2014, 30(6): 126 -130 .
[6] 张 旻,吴春明,王 滨,姜 明. 跨域逻辑承载网映射方法研究[J]. 通信学报, 2012, 33(8): 24 -207 .
[7] 王成巍,沈成彬,蒋铭. PON系统承载TDM技术研究[J]. 电信科学, 2010, 26(8): 14 -18 .
[8] 许 华,郑 辉. 对高阶QAM信号盲载波相位捕获算法的一种改进方法[J]. 通信学报, 2005, 26(8): 10 -66 .
[9] 陈文宇,曾 茹,皮 维,李 文. 基于RapidIO的GIOP协议——RIO-IOP[J]. 通信学报, 2012, 33(Z1): 10 -78 .
[10] 彭文杰,李岳衡,居美艳,黄 平,谭国平. 复合衰落信道下分布式MIMO系统下行中断概率分析[J]. 通信学报, 2014, 35(6): 21 -168 .