Table of Content

Emerging Trends on Blockchain: Architecture and Dapp Ecosystem

Submission Deadline: 31 August 2022 (closed)

Guest Editors

Prof. Xiaodong Yang, Northwest Normal University, China
Prof. Shudong Li, Guangzhou University, China
Prof. Yuan Liu, Northeastern University, China


Blockchain technology enables decentralized credible information access, leading to the evolution of economic, intellectual property protection, electronic government system, logistics, and huge amount of investment. For the further development and potential investors, there exist super chance together with super risk, because: 1) the current blockchain technology has limitations on the storage capability, low consensus efficiency, smart contract vulnerabilities, high transaction fee, and etc.; and 2) the ecosystem of the blockchain based applications is fast evolving with growing complexity, especially when it comes to the cross-chain scenario. To provide a stable and efficient running environment, IPFS and swarm are proposed to conduct efficient off-chain storage; PoRep and PosT are proposed to provide less energy-draining consensus methods; smart contract based fuzz systems are proposed to ensure the security of smart contract before deployment; and layer-2 blockchain is proposed to reduce transaction fees. However, the future trend of blockchain architecture is still an open problem. To understand the potential risk and transaction behaviors of the current dapp ecosystem, modeling based on the dapp transaction data turns out to be a hot topic.

This special issue aims at collecting the recent results from both research and industrial community on blockchain technologies.

Potential topics include but are not limited to:

• Cryptography and key management technology for blockchain

• Distributed storage system for blockchain

• Energy-efficient consensus algorithm

• Scalable consensus algorithm for consortium blockchain

• Decentralized oracle machine for blockchain

• Smart contract security solutions for blockchain

• Privacy protection schemes for blockchain

• Sharding and cross-chain protocols for blockchain

• Blockchain layer-2 technology

• Algorithms and solutions for stable coins

• Attacking and defense of Defi

• Data modeling for Dapp ecosystem

• Transaction behavior monitoring for Dapp ecosystem

• Blockchain based application solutions


Blockchain; decentrailized applications; storage system; consensus algorithm

Published Papers

  • Open Access


    BC-PC-Share: Blockchain-Based Patient-Centric Data Sharing Scheme for PHRs in Cloud Computing

    Caihui Lan, Haifeng Li
    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.3, pp. 2985-3010, 2023, DOI:10.32604/cmes.2023.026321
    (This article belongs to this Special Issue: Emerging Trends on Blockchain: Architecture and Dapp Ecosystem)
    Abstract Sharing of personal health records (PHR) in cloud computing is an essential functionality in the healthcare system. However, how to securely, efficiently and flexibly share PHRs data of the patient in a multi-receiver setting has not been well addressed. For instance, since the trust domain of the cloud server is not identical to the data owner or data user, the semi-trust cloud service provider may intentionally destroy or tamper shared PHRs data of user or only transform partial ciphertext of the shared PHRs or even return wrong computation results to save its storage and computation resource, to pursue maximum economic… More >

  • Open Access


    PIMS: An Efficient Process Integrity Monitoring System Based on Blockchain and Trusted Computing in Cloud-Native Context

    Miaomiao Yang, Guosheng Huang, Junwei Liu, Yanshuang Gui, Qixu Wang, Xingshu Chen
    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.2, pp. 1879-1898, 2023, DOI:10.32604/cmes.2023.026371
    (This article belongs to this Special Issue: Emerging Trends on Blockchain: Architecture and Dapp Ecosystem)
    Abstract With the advantages of lightweight and high resource utilization, cloud-native technology with containers as the core is gradually becoming the mainstream technical architecture for information infrastructure. However, malware attacks such as Doki and Symbiote threaten the container runtime’s security. Malware initiates various types of runtime anomalies based on process form (e.g., modifying the process of a container, and opening the external ports). Fortunately, dynamic monitoring mechanisms have proven to be a feasible solution for verifying the trusted state of containers at runtime. Nevertheless, the current routine dynamic monitoring mechanisms for baseline data protection are still based on strong security assumptions.… More >

  • Open Access


    A Linear Homomorphic Proxy Signature Scheme Based on Blockchain for Internet of Things

    Caifen Wang, Bin Wu
    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.2, pp. 1857-1878, 2023, DOI:10.32604/cmes.2023.026153
    (This article belongs to this Special Issue: Emerging Trends on Blockchain: Architecture and Dapp Ecosystem)
    Abstract The mushroom growth of IoT has been accompanied by the generation of massive amounts of data. Subject to the limited storage and computing capabilities of most IoT devices, a growing number of institutions and organizations outsource their data computing tasks to cloud servers to obtain efficient and accurate computation while avoiding the cost of local data computing. One of the most important challenges facing outsourcing computing is how to ensure the correctness of computation results. Linearly homomorphic proxy signature (LHPS) is a desirable solution to ensure the reliability of outsourcing computing in the case of authorized signing right. Blockchain has… More >

  • Open Access


    Multi-Source Data Privacy Protection Method Based on Homomorphic Encryption and Blockchain

    Ze Xu, Sanxing Cao
    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.1, pp. 861-881, 2023, DOI:10.32604/cmes.2023.025159
    (This article belongs to this Special Issue: Emerging Trends on Blockchain: Architecture and Dapp Ecosystem)
    Abstract Multi-Source data plays an important role in the evolution of media convergence. Its fusion processing enables the further mining of data and utilization of data value and broadens the path for the sharing and dissemination of media data. However, it also faces serious problems in terms of protecting user and data privacy. Many privacy protection methods have been proposed to solve the problem of privacy leakage during the process of data sharing, but they suffer from two flaws: 1) the lack of algorithmic frameworks for specific scenarios such as dynamic datasets in the media domain; 2) the inability to solve… More >

    Graphic Abstract

    Multi-Source Data Privacy Protection Method Based on Homomorphic Encryption and Blockchain

  • Open Access


    Analyzing Ethereum Smart Contract Vulnerabilities at Scale Based on Inter-Contract Dependency

    Qiuyun Lyu, Chenhao Ma, Yanzhao Shen, Shaopeng Jiao, Yipeng Sun, Liqin Hu
    CMES-Computer Modeling in Engineering & Sciences, Vol.135, No.2, pp. 1625-1647, 2023, DOI:10.32604/cmes.2022.021562
    (This article belongs to this Special Issue: Emerging Trends on Blockchain: Architecture and Dapp Ecosystem)
    Abstract Smart contracts running on public blockchains are permissionless and decentralized, attracting both developers and malicious participants. Ethereum, the world’s largest decentralized application platform on which more than 40 million smart contracts are running, is frequently challenged by smart contract vulnerabilities. What’s worse, since the homogeneity of a wide range of smart contracts and the increase in inter-contract dependencies, a vulnerability in a certain smart contract could affect a large number of other contracts in Ethereum. However, little is known about how vulnerable contracts affect other on-chain contracts and which contracts can be affected. Thus, we first present the contract dependency… More >

Share Link

WeChat scan