Computer Science ›› 2022, Vol. 49 ›› Issue (3): 346-353.doi: 10.11896/jsjkx.210700068

• Information Security • Previous Articles     Next Articles

Composite Blockchain Associated Event Tracing Method for Financial Activities

LI Su, SONG Bao-yan, LI Dong, WANG Jun-lu   

  1. School of Information,Liaoning University,Shenyang 110036,China
  • Received:2021-07-07 Revised:2021-10-16 Online:2022-03-15 Published:2022-03-15
  • About author:LI Su,born in 1997,postgraduate,is a student member of China Computer Federation.Her main research interests include large scale map processing techniques big data processing techniques,and stream data processing techniques.
    WANG Jun-lu,born in 1988,Ph.D candidate,lecturer,is a member of China Computer Federaton.His main research interests include large scale map processing techniques,big data processing techniques and stream data processing techniques.
  • Supported by:
    National Natural Science Foundation of China(62072220,61502215),China Postdoctoral Science Foundation Funded Project(2020M672134) and Scientific Research Project of Liaoning Province Education Department(LJC201913,LJKZ0094).

Abstract: The existing blockchain system mostly adopts the equal mining mode.All bookkeepers (entities) record the books on a single main chain,and the data storage is random.Moreover,in complex or classified financial scenarios,the data of the main chain is difficult to realize association or regular storage,leading to low storage and query efficiency.At the same time,most event traceability in the existing blockchain system can only query the source block,and the implied association between entities cannot be identified,so the query has limitations.To solve these problems,composite blockchain associated event tracing method is proposed.Firstly,the composite chain storage structure model of blockchain is constructed,and the concepts of private chain and al-liance chain are proposed to realize the adaptive data association storage under complex or classified scenarios.Then,in the traceability query,on the basis of obtaining the event source entity block,the auxiliary storage space is set up to transfer the relevant data.A tracing method of the associated entity block based on the Apriori algorithm is proposed,and then the obtained traceability entity block is constructed as the source event correlation graph to describe the correlation relationship between the event entities.Finally,the risk assessment system based on reinforcement learning is proposed to realize the traceability entity risk assessment.Experiments show that the composite blockchain associated event tracing method can reduce the storage overhead by 60%,improve the query accuracy by 90% and improve security by 50%.

Key words: Alliance chain, Associated event tracing, Composite chain structure, Private chain, Reinforcement learning

CLC Number: 

  • TP311
[1]AHMAD R W,HASAN H,YAQOOB I,et al.Blockchain forAerospace and Defense:Opportunities and Open Research Challenges[J].Computers & Industrial Engineering,2021,151:106982.
[2]TIAN G H,HU Y H,CHEN X F.Research progress of block-chain system attack and defense technology[J].Journal of Software,2021,32(5):1495-1525.
[3]WAN P K,HUANG L,HOLTSKOG H.Blockchain-enabledInformation Sharing within a Supply Chain:A Systematic Lite-rature Review[J].IEEE Access,2020,8:49645-49656.
[4]CAI T,LIN H,CHEN W H,et al.Blockchain-enabled Efficient Data Sharing Scheme for Internet of Things[J].Journal of Software,2021,32(4):953-972.
[5]WEI L F,ZHU J Y,HENG X R,et al.Design and implementation of intelligent traceability system for aquatic product quality and safety based on block chain technology and HACCP ma-nagement[J].Fishery Modernization,2020,47(4):8.
[6]BARTOLETTI M,BRACCIALI A,LANDE S,et al.A general framework for blockchain analytics[C]//Proceedings of the 1st Workshop on Scalable and Resilient Infrastructures for Distributed Ledgers.Las Vegas,Nevada,USA,2017:11-15.
[7]HE P,YU G,ZHANG Y F,et al.Review of Blockchain Technology and Application[J].Computer Science,2017,44(4):1-7.
[8]IEMIEUX V L.Trusting records:is blockchain technology theanswer?[J].Records Management Journal,2016,26(2):110-139.
[9]WANG S,DINH T A,LIN Q,et al.ForkBase:An EfficientStorage Engine for Blockchain and Forkable Applications[J].arXiv:1802.04949,2018.
[10]HALPIN H,PIEKARSKA M.Introduction to Security and Privacy on the Blockchain[C]//IEEE European Symposium on Security & Privacy Workshops.IEEE,2017:1-3.
[11]KRAFT D.Difficulty control for blockchain-based consensussystems[J].Peer-to-Peer Networking and Applications,2016,9(2):397-413.
[12]DANNEN C.Introducing Ethereum and Solidity:Foundations of Cryptocurrency and Blockchain Programming for Beginners[M].Apress,2017.
[13]DINH T T A,WANG J,CHEN G,et al.BLOCKBENCH:aframework for analyzing private blockchains[C]//International Conference on Management of Data.2017:1085-1100.
[14]CAO Y,MIAO Z G.An Improved Apriori Algorithm for Fre-quent Terms Optimization Based on Vector Matrix[J].Journal of Jilin University (Natural Science Edition),2016,54(2):349-353.
[15]JIN H,DAI X,XIAO J.Towards a Novel Architecture for Enabling Interoperability amongst Multiple Blockchains[C]//International Conference on Distributed Computing Systems.IEEE Computer Society,2018:1203-1211.
[16]SHAO Q F,JIN C Q,ZHANG Z,et al.Blockchain Technology:Architecture and Progress[J].Chinese Journal of Computers,2018,41(5):969-988.
[17]WANG Q G,HE P,NIE T Z,et al.Overview of Blockchain System Data Storage and Query Technology[J].Computer Science,2018,45(12):12-18.
[18]LIU L J.Research and application of improved Apriori algorithm[J].Computer Engineering and Design,2017(12):142-146.
[19]BIAN G Q,WANG Y.An Improved Apriori Algorithm Basedon Matrix and Weight[J].Microelectronics & Computer,2017,34(1):137-140.
[20]LI Y,ZHENG K,YAN Y,et al.EtherQL:a query layer forblockchain system[C]//International Conference on Database Systems for Advanced Applications.2017.
[21]ENRICO C,SERENA N,ANTONINO N,et al.A two-tierBlockchain framework to increase protection and autonomy of smart objects in the IoT[J].Computer Communications,2022,181:338-356.
[22]LUU L,NARAYANAN V,ZHENG C,et al,A secure sharding protocol for open blockchains[C]//2016 ACM SIGSAC Confe-rence.ACM,2016.
[23]WANG Z H,LIU P Z,SONG C B,et al.Research on FlexibleTrustable Traceability System of Agricultural Products Based on Blockchain[J].Computer Engineering,2020,46(12):319-326.
[24]HAN H.Blockchain infiltration into data transaction to solvetraceability and authorization “pain points”[J].Communications World,2017(19):1.
[25]HUANG Z Z,ZHANG X D,ZHAO J H,et al.Design of know-lege sharing mechanism based on blockchain[J].Journal of Chongqing University of Technology(Natural Science),2021,35(9):143-151.
[26]QIAO R,CAO Y,WANG Q X.Dynamic data traceability me-chanism of internet of things based on alliance chain[J].Journal of Software,2019,30(6):1614-1631.
[27]SONG S,PENG W.BLOCCE+:An Improved Blockchain-Based Covert Communication Approach[J].Journal of Chongqing University of Technology(Natural Science),2020,34(9):238-244.
[28]XI L,WANG R D,FAN H Y,et al.Unsupervised Anomaly Detection Model based on Sample Association Perception[J].Chinese Journal of Computers,2021,44(11):2317-2331.
[1] LIU Xing-guang, ZHOU Li, LIU Yan, ZHANG Xiao-ying, TAN Xiang, WEI Ji-bo. Construction and Distribution Method of REM Based on Edge Intelligence [J]. Computer Science, 2022, 49(9): 236-241.
[2] YUAN Wei-lin, LUO Jun-ren, LU Li-na, CHEN Jia-xing, ZHANG Wan-peng, CHEN Jing. Methods in Adversarial Intelligent Game:A Holistic Comparative Analysis from Perspective of Game Theory and Reinforcement Learning [J]. Computer Science, 2022, 49(8): 191-204.
[3] SHI Dian-xi, ZHAO Chen-ran, ZHANG Yao-wen, YANG Shao-wu, ZHANG Yong-jun. Adaptive Reward Method for End-to-End Cooperation Based on Multi-agent Reinforcement Learning [J]. Computer Science, 2022, 49(8): 247-256.
[4] YU Bin, LI Xue-hua, PAN Chun-yu, LI Na. Edge-Cloud Collaborative Resource Allocation Algorithm Based on Deep Reinforcement Learning [J]. Computer Science, 2022, 49(7): 248-253.
[5] LI Meng-fei, MAO Ying-chi, TU Zi-jian, WANG Xuan, XU Shu-fang. Server-reliability Task Offloading Strategy Based on Deep Deterministic Policy Gradient [J]. Computer Science, 2022, 49(7): 271-279.
[6] YUAN Hao-nan, WANG Rui-jin, ZHENG Bo-wen, WU Bang-yan. Design and Implementation of Cross-chain Trusted EMR Sharing System Based on Fabric [J]. Computer Science, 2022, 49(6A): 490-495.
[7] XIE Wan-cheng, LI Bin, DAI Yue-yue. PPO Based Task Offloading Scheme in Aerial Reconfigurable Intelligent Surface-assisted Edge Computing [J]. Computer Science, 2022, 49(6): 3-11.
[8] HONG Zhi-li, LAI Jun, CAO Lei, CHEN Xi-liang, XU Zhi-xiong. Study on Intelligent Recommendation Method of Dueling Network Reinforcement Learning Based on Regret Exploration [J]. Computer Science, 2022, 49(6): 149-157.
[9] GUO Yu-xin, CHEN Xiu-hong. Automatic Summarization Model Combining BERT Word Embedding Representation and Topic Information Enhancement [J]. Computer Science, 2022, 49(6): 313-318.
[10] FAN Jing-yu, LIU Quan. Off-policy Maximum Entropy Deep Reinforcement Learning Algorithm Based on RandomlyWeighted Triple Q -Learning [J]. Computer Science, 2022, 49(6): 335-341.
[11] ZHANG Jia-neng, LI Hui, WU Hao-lin, WANG Zhuang. Exploration and Exploitation Balanced Experience Replay [J]. Computer Science, 2022, 49(5): 179-185.
[12] LI Peng, YI Xiu-wen, QI De-kang, DUAN Zhe-wen, LI Tian-rui. Heating Strategy Optimization Method Based on Deep Learning [J]. Computer Science, 2022, 49(4): 263-268.
[13] ZHOU Qin, LUO Fei, DING Wei-chao, GU Chun-hua, ZHENG Shuai. Double Speedy Q-Learning Based on Successive Over Relaxation [J]. Computer Science, 2022, 49(3): 239-245.
[14] OUYANG Zhuo, ZHOU Si-yuan, LYU Yong, TAN Guo-ping, ZHANG Yue, XIANG Liang-liang. DRL-based Vehicle Control Strategy for Signal-free Intersections [J]. Computer Science, 2022, 49(3): 46-51.
[15] HUANG Xin-quan, LIU Ai-jun, LIANG Xiao-hu, WANG Heng. Load-balanced Geographic Routing Protocol in Aerial Sensor Network [J]. Computer Science, 2022, 49(2): 342-352.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!