Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (7)
  • Open Access

    ARTICLE

    On Designs of Decentralized Reputation Management for Permissioned Blockchain Networks

    Jinyu Chen1, Long Shi1,*, Qisheng Huang2, Taotao Wang3, Daojing He4

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.2, pp. 1755-1773, 2024, DOI:10.32604/cmes.2023.046826

    Abstract In permissioned blockchain networks, the Proof of Authority (PoA) consensus, which uses the election of authorized nodes to validate transactions and blocks, has been widely advocated thanks to its high transaction throughput and fault tolerance. However, PoA suffers from the drawback of centralization dominated by a limited number of authorized nodes and the lack of anonymity due to the round-robin block proposal mechanism. As a result, traditional PoA is vulnerable to a single point of failure that compromises the security of the blockchain network. To address these issues, we propose a novel decentralized reputation management mechanism for permissioned blockchain networks… More > Graphic Abstract

    On Designs of Decentralized Reputation Management for Permissioned Blockchain Networks

  • Open Access

    ARTICLE

    CLEC: Combination Locality Based Erasure Code for Permissioned Blockchain Storage

    Jiabin Wu1,3, Boai Yang2, Yang Liu1, Fang Liu3,*, Nong Xiao1, Shuo Li4

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5137-5150, 2022, DOI:10.32604/cmc.2022.028305

    Abstract Building a new decentralized domain name system based on blockchain technology is helping to solve problems, such as load imbalance and over-dependence on the trust of the central node. However, in the existing blockchain storage system, the storage overhead is very high due to its full-replication data storage mechanism. The total storage consumption for each block is up to O(n) with n nodes. Erasure code applied to blockchains can significantly reduce the storage overhead, but also greatly lower the read performance. In this study, we propose a novel coding scheme for blockchain storage, Combination Locality based Erasure Code for Permissioned… More >

  • Open Access

    ARTICLE

    Trustworthiness Evaluation for Permissioned Blockchain-Enabled Applications

    Shi-Cho Cha1, Chuang-Ming Shiung1, Wen-Wei Li1, Chun-Neng Peng1, Yi-Hsuan Hung1, Kuo-Hui Yeh2,3,*

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2731-2755, 2022, DOI:10.32604/cmc.2022.029161

    Abstract As permissioned blockchain becomes a common foundation of blockchain-based circumstances for current organizations, related stakeholders need a means to assess the trustworthiness of the applications involved within. It is extremely important to consider the potential impact brought by the Blockchain technology in terms of security and privacy. Therefore, this study proposes a rigorous security risk management framework for permissioned blockchain-enabled applications. The framework divides itself into different implementation domains, i.e., organization security, application security, consensus mechanism security, node management and network security, host security and perimeter security, and simultaneously provides guidelines to control the security risks of permissioned blockchain applications… More >

  • Open Access

    ARTICLE

    Hyperledger Fabric Blockchain: Secure and Efficient Solution for Electronic Health Records

    Mueen Uddin1,*, M. S. Memon2, Irfana Memon2, Imtiaz Ali2, Jamshed Memon3, Maha Abdelhaq4, Raed Alsaqour5

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 2377-2397, 2021, DOI:10.32604/cmc.2021.015354

    Abstract Background: Electronic Health Record (EHR) systems are used as an efficient and effective technique for sharing patient’s health records among different hospitals and various other key stakeholders of the healthcare industry to achieve better diagnosis and treatment of patients globally. However, the existing EHR systems mostly lack in providing appropriate security, entrusted access control and handling privacy and secrecy issues and challenges in current hospital infrastructures. Objective: To solve this delicate problem, we propose a Blockchain-enabled Hyperledger Fabric Architecture for different EHR systems. Methodology: In our EHR blockchain system, Peer nodes from various organizations (stakeholders) create a ledger network, where… More >

  • Open Access

    ARTICLE

    DNS Service Model Based on Permissioned Blockchain

    Yantao Shen1,*, Yang Lu2, Zhili Wang1, Xin Xv3, Feng Qi1, Ningzhe Xing4, Ziyu Zhao5

    Intelligent Automation & Soft Computing, Vol.27, No.1, pp. 259-268, 2021, DOI:10.32604/iasc.2021.013704

    Abstract With the continuous development of the Internet, the domain name system (DNS) as infrastructure is playing an increasingly important role. However, traditional DNS architecture is centralized, and there are some security problems such as the right concentration and power abuse. This paper combines blockchain technology with DNS technology and proposes a domain name service model based on the permissioned blockchain. At first, this paper designs a top-level domain chain (TLDChain) model to conduct consensus on block transactions and achieve decentralization of domain name service. Then, this paper introduces a data model to upload data. At the same time, to improve… More >

  • Open Access

    ARTICLE

    A Key Recovery System Based on Password-Protected Secret Sharing in a Permissioned Blockchain

    Gyeong-Jin Ra1, Chang-Hyun Roh1, Im-Yeong Lee1, *

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 153-170, 2020, DOI:10.32604/cmc.2020.011293

    Abstract In today’s fourth industrial revolution, various blockchain technologies are being actively researched. A blockchain is a peer-to-peer data-sharing structure lacking central control. If a user wishes to access stored data, she/he must employ a private key to prove ownership of the data and create a transaction. If the private key is lost, blockchain data cannot be accessed. To solve such a problem, public blockchain users can recover the key using a wallet program. However, key recovery in a permissioned blockchain (PBC) has been but little studied. The PBC server is Honest-but-Curious (HBC), and should not be able to learn anything… More >

  • Open Access

    ARTICLE

    A Food Traceability Framework Based on Permissioned Blockchain

    Jiuliang Liu1,*, Xingming Sun1, Ke Song2

    Journal of Cyber Security, Vol.2, No.2, pp. 107-113, 2020, DOI:10.32604/jcs.2020.011222

    Abstract In recent years, food safety problems have become increasingly serious. The traditional supply chain traceability solution faces some serious problems, such as centralization, data tampering, and high communication costs. To solve these problems, this paper proposes a food traceability framework based on permissioned blockchain. The proposed framework is decentralized, and the supply chain data of the framework cannot be tampered with. The framework divides supply chain entities into five organizations, and each organization deploys its own chaincode onto the blockchain. The chaincode specifies the query permission of each organization, which can effectively protect the user’s sensitive information. The PBFT consensus… More >

Displaying 1-10 on page 1 of 7. Per Page