Chinese Journal of Network and Information Security ›› 2023, Vol. 9 ›› Issue (6): 56-70.doi: 10.11959/j.issn.2096-109x.2023083
• Papers • Previous Articles
Xuedan JIA1,2, Longxia HUANG1, Pujie JING1, Liangmin WANG3, Xiangmei SONG1
Revised:
2023-10-23
Online:
2023-12-01
Published:
2023-12-01
Supported by:
CLC Number:
Xuedan JIA, Longxia HUANG, Pujie JING, Liangmin WANG, Xiangmei SONG. Hybrid-chain-based supervision scheme for privacypreserving trading system[J]. Chinese Journal of Network and Information Security, 2023, 9(6): 56-70.
[1] | ZHENG Z , XIE S , DAI H ,et al. An overview of blockchain technology:Architecture,consensus,and future trends[C]// Proceedings of 2017 IEEE International Congress on Big Data (BigData Congress). 2017: 557-564. |
[2] | HAYES A . Blockchain explained[EB]. |
[3] | NIJEHOLT H , OUDEJANS J , ERKIN Z . Decreg:a framework for preventing double-financing using blockchain technology[C]// Proceedings of the ACM Workshop on Blockchain,Cryptocurrencies and Contracts. 2017: 29-34. |
[4] | DAI J , VASARHELYI A . Toward blockchain-based accounting and assurance[J]. Journal of Information Systems, 2017,31(3): 5-21. |
[5] | AKINS W , CHAPMAN L , GORDON M . A whole new world:income tax considerations of the Bitcoin economy[J]. Pittsburgh Tax Review, 2014,12(1): 24-56. |
[6] | JIA X , WANG L , CHENG K ,et al. A blockchain-based privacy-preserving and collusion-resistant scheme(PPCR) for double auctions[J]. Digital Communications and Networks, 2023,5(2). |
[7] | YU K , TAN L , ALOQAILY M ,et al. Blockchain-enhanced data sharing with traceable and direct revocation in IIoT[J]. IEEE Transactions on Industrial Informatics, 2021,17(11): 7669-7678. |
[8] | ZHU Q , KOUHIZADEH M . Blockchain technology,supply chain information,and strategic product deletion management[J]. IEEE Engineering Management Review, 2019,47(1): 36-44. |
[9] | REN K , HO N M , LOGHIN D ,et al. Interoperability in blockchain:a survey[J]. IEEE Transactions on Knowledge and Data Engineering, 2023,35(12): 12750-12769. |
[10] | XIE T , ZHANG J , CHENG Z ,et al. Zkbridge:Trustless cross-chain bridges made practical[C]// Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. 2022: 3003-3017. |
[11] | 经普杰, 王良民, 董学文 ,等. 分层跨链结构:一种面向区块链系统监管的可行架构[J]. 通信学报, 2023,44(3): 93-104. |
JING P J , WANG L M , DONG X W ,et al. CHA:Cross-chain based hierarchical architecture for practicable blockchain regulatory[J]. Journal on Communications, 2023,44(3): 93-104. | |
[12] | BIRYUKOV A , KHOVRATOVICH D , PUSTOGAROV I . Deanonymisation of clients in bitcoin P2P network[C]// Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. 2014: 15-29. |
[13] | BIRYUKOV A , TIKHOMIROV S . Deanonymization and linkability of cryptocurrency transactions based on network analysis[C]// Proceedings of 2019 IEEE European Symposium on Security and Privacy (EuroS&P). 2019: 172-184. |
[14] | GAO Y , SHI J , WANG X ,et al. Practical deanonymization attack in Ethereum based on P2P network analysis[C]// Proceedings of 2021 IEEE International Congress on Parallel & Distributed Processing with Applications,Big Data & Cloud Computing,Sustainable Computing & Communications,Social Computing & Networking(ISPA/BDCloud/ SocialCom/SustainCom). 2021: 1402-1409. |
[15] | 李芳, 李卓然, 赵赫 . 区块链跨链技术进展研究[J]. 软件学报, 2019,30(6): 1649-1660. |
LI F , LI Z R , ZHAO H . Research on the progress in cross-chain technology of blockchains[J]. Journal of Software, 2019,30(6): 1649-1660. | |
[16] | BELCHIOR R , VASCONCELOS A , GUERREIRO S ,et al. A survey on blockchain interoperability:past,present,and future trends[J]. ACM Computing Surveys (CSUR), 2021,54(8): 1-41. |
[17] | BUTERIN V . Chain interoperability[J]. R3 Research Paper, 2016. |
[18] | TIAN H , XUE K , LUO X ,et al. Enabling cross-chain transactions:a decentralized cryptocurrency exchange protocol[J]. IEEE Transactions on Information Forensics and Security, 2021,16: 3928-3941. |
[19] | SHAO S , CHEN F , XIAO X ,et al. IBE-BCIOT:an IBE based cross-chain communication mechanism of blockchain in IoT[J]. World Wide Web, 2021,24(5): 1665-1690. |
[20] | ZHANG Y , GE Z , LONG Y ,et al. UCC:universal and committee-based cross-chain framework[C]// Proceedings of International Conference on Information Security Practice and Experience. 2022: 93-111. |
[21] | XIONG A , LIU G , ZHU Q ,et al. A notary group-based cross-chain mechanism[J]. Digital Communications and Networks, 2022,8(6): 1059-1067. |
[22] | 邹萍, 李艳东, 王肖 ,等. 区块链监管的现状与展望[J]. 网络空间安全, 2019,10(6): 51-56. |
ZOU P , LI Y , WANG X ,et al. The status quo and future trends of blockchain regulation[J]. Cyberspace Security, 2019,10(6): 51-56. | |
[23] | WANG Y , GOU G , LIU C ,et al. Survey of security supervision on blockchain from the perspective of technology[J]. Journal of Information Security and Applications, 2021,60: 1-31. |
[24] | 余春堂, 韩志耕, 李致远 ,等. 基于区块链的众包物流分级多层智能服务交易监管架构[J]. 网络与信息安全学报, 2020,6(3): 50-58. |
YU C T , HAN Z G , LI Z Y ,et al. Blockchain-based hierarchical and multi-level smart service transaction supervision framework for crowdsourcing logistics[J]. Chinese Journal of Network and Information Security, 2020,6(3): 50-58. | |
[25] | TAO Q , CUI X , HUANG X ,et al. Food safety supervision system based on hierarchical multi-domain blockchain network[J]. IEEE Access, 2019,7: 51817-51826. |
[26] | LI X , WU L , ZHAO R ,et al. Two-layer adaptive blockchain-based supervision model for off-site modular housing production[J]. Computers in Industry, 2021,128:103437. |
[27] | PENG X , ZHANG X , WANG X ,et al. A refined supervision model of rice supply chain based on multi-blockchain[J]. Foods, 2022,11(18): 1-25. |
[28] | WANG K , ZHANG Z , KIM H . ReviewChain:smart contract based review system with multi-blockchain gateway[C]// Proceedings of 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber,Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). 2018: 1521-1526. |
[29] | PARNO B , HOWELL J , GENTRY C ,et al. Pinocchio:nearly practical verifiable computation[J]. Communications of the ACM, 2016,59(2): 103-112. |
[30] | HUANG K , KANHERE S , HU W . Are you contributing trustworthy data? The case for a reputation system in participatory sensing[C]// Proceedings of the 13th ACM International Conference on Modeling,Analysis,and Simulation of Wireless and Mobile Systems. 2010: 14-22. |
[31] | GANERIWAL S , BALZANO L , SRIVASTAVA M . Reputation-based framework for high integrity sensor networks[J]. ACM Transactions on Sensor Networks (TOSN), 2008,4(3): 1-37. |
[1] | Jingyu JIA, Chang TAN, Zhewei LIU, Xinhao LI, Zheli LIU, Tao ZHANG. Privacy view and target of differential privacy [J]. Chinese Journal of Network and Information Security, 2023, 9(5): 82-91. |
[2] | Yifan HE, Jie ZHANG, Weiming ZHANG, Nenghai YU. Privacy leakage risk assessment for reversible neural network [J]. Chinese Journal of Network and Information Security, 2023, 9(4): 29-39. |
[3] | Yue YU, Xianzheng LIN, Weihai LI, Nenghai YU. Privacy-preserving data compression scheme for k-anonymity model based on Huffman coding [J]. Chinese Journal of Network and Information Security, 2023, 9(4): 64-73. |
[4] | Lijun ZU, Yalin CAO, Xiaohua MEN, Zhihui LYU, Jiawei YE, Hongyi LI, Liang ZHANG. Adaptive selection method of desensitization algorithm based on privacy risk assessment [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 49-59. |
[5] | Saite CHEN, Weihai LI, Yuanzhi YAO, Nenghai YU. Location privacy protection method based on lightweight K-anonymity incremental nearest neighbor algorithm [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 60-72. |
[6] | Renfeng CHEN, Hongbin ZHU. Research on credit card transaction security supervision based on PU learning [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 73-78. |
[7] | Feng YU, Qingxin LIN, Hui LIN, Xiaoding WANG. Privacy-enhanced federated learning scheme based on generative adversarial networks [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 113-122. |
[8] | Jinyin CHEN, Rongchang LI, Guohan HUANG, Tao LIU, Haibin ZHENG, Yao CHENG. Survey on vertical federated learning: algorithm, privacy and security [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 1-20. |
[9] | Zhao CAI, Tao JING, Shuang REN. Survey on Ethereum phishing detection technology [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 21-32. |
[10] | Min XIAO, Faying MAO, Yonghong HUANG, Yunfei CAO. Anonymous trust management scheme of VANET based on attribute signature [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 33-45. |
[11] | Jianlong XU, Jian LIN, Yusen LI, Zhi XIONG. Distributed user privacy preserving adjustable personalized QoS prediction model for cloud services [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 70-80. |
[12] | Heli WANG, Qiao YAN. Selfish mining detection scheme based on the characters of transactions [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 104-114. |
[13] | Beiyuan YU, Shanyao REN, Jianwei LIU. Overview of blockchain assets theft attacks and defense technology [J]. Chinese Journal of Network and Information Security, 2023, 9(1): 1-17. |
[14] | Zhe SUN, Hong NING, Lihua YIN, Binxing FANG. Preliminary study on the construction of a data privacy protection course based on a teaching-in-practice range [J]. Chinese Journal of Network and Information Security, 2023, 9(1): 178-188. |
[15] | Fenghua LI, Hui LI, Ben NIU, Weidong QIU. Academic connotation and research trends of privacy computing [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 1-8. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|