Computer Science ›› 2025, Vol. 52 ›› Issue (10): 348-356.doi: 10.11896/jsjkx.250200001
• Information Security • Previous Articles Next Articles
WU Moxun1, PENG Zeshun1, YU Minghe2, LI Xiaohua1, DONG Xiaomei1, NIE Tiezheng1, YU Ge1
CLC Number:
[1]YU G,NIE T Z,LI X H,et al.The challenge and prospect of distributed data management techniques in blockchain systems[J].Chinese Journal of Computers,2021,44(1):28-54. [2]HE P,YU G,ZHANG Y F,et al.Survey on blockchain technolo-gy and tts application prospect[J].Chinese Journal of Compu-ters,2017,44(4):1-7,15. [3]CHEN J,YAO S,YUAN Q,et al.Certchain:public and efficient certificate audit based on blockchain for TLS connections[C]//Proceedings of IEEE INFOCOM.2018:2060-2068. [4]KUBILAY M Y,KIRAZ M S,MANTAR H A.CertLedger:A new PKI model with certificate transparency based on blockchain[J].Computers & Security,2019,85:333-352. [5]SHEN M,LIU H,ZHU L,et al.Blockchain-assisted secure device authentication for cross-domain industrial IoT[J].IEEE Journal on Selected Areas in Communications,2020,38(5):942-954. [6]ADJA Y C E,HAMMI B,SERHROUCHNI A,et al.A blockchain-based certificate revocation management and status verification system[J].Computers & Security,2021,104:102209. [7]TRUONG N B,SUN K,LEE G M,et al.GDPR-compliant personal data management:a blockchain-based solution[J].IEEE Transactions on Information Forensics and Security,2019,15:1746-1761. [8]XIONG Z,ZHANG Y,LUONG N C,et al.The best of bothworlds:A general architecture for data management in blockchain-enabled Internet-of-Things[J].IEEE Network,2020,34(1):166-173. [9]SHAFAGH H,BURKHALTER L,HITHNAWI A,et al.Towards blockchain-based auditable storage and sharing of IoT data[C]//Proceedings of the 2017 on Cloud Computing Security Workshop.2017:45-50. [10]HARI A,LAKSHMAN T V.The internet blockchain:A distributed,tamper-resistant transaction framework for the internet[C]//Proceedings of the 15th ACM Workshop on Hot To-pics in Networks.2016:204-210. [11]XING Q,WANG B,WANG X.POSTER:BGPCoin:A trust-worthy blockchain-based resource management solution for BGP security[C]//Proceedings of the 2017 ACM SIGSAC Confe-rence on Computer and Communications Security.2017:2591-2593. [12]SHAO Q F,JIN C Q,ZHANG Z,et al.Blockchain:architecture and research progress[J].Chinese Journal of Computers,2018,41(5):969-88. [13]LI Y,ZHENG K,YAN Y,et al.EtherQL:A query layer for blockchain system[C]//Proceedings of DASFAA.2017:556-567. [14]WU H,PENG Z,GUO S,et al.VQL:Efficient and verifiable cloud query services for blockchain systems[J].IEEE Transactions on Parallel and Distributed Systems,2021,33(6):1393-1406. [15]MCCONAGHY T,MARQUES R,MÜLLER A,et al.Bigchaindb:a scalable blockchain database[R].Berlin:White Paper,BigChainDB,2016:53-72. [16]TSANG Y P,LEE C K M,ZHANG K,et al.On-chain and off-chain data management for blockchain-internet of things:a multi-agent deep reinforcement learning approach[J].Journal of Grid Computing,2024,22(1):16. [17]ZHU Y,ZHANG Z,JIN C,et al.SEBDB:Semantics empowered blockchain database[C]//Proceedings of ICDE.2019:1820-1831. [18]XU C,ZHANG C,XU J.Vchain:Enabling verifiable booleanrange queries over blockchain databases[C]//Proceedings of SIGMOD.2019:141-158. [19]CHENG J,QI S,AN B,et al.Lightweight verifiable blockchain top-k queries[J].Future Generation Computer Systems,2024,156:105-115. [20]LI W,FENG Y,LIU N,et al.A secure and efficient log storage and query framework based on blockchain[J].Computer Networks,2024,252:110683. [21]LIU Q,PENG Y,XU M,et al.MPV:Enabling fine-grained query authentication in hybrid-storage blockchain[J].IEEE TKDE,2024,36(7):3297-3311. [22]ZHOU F,JIAO Z,WANG Q,et al.BCVSE:Verifiable searchable encryption scheme with blockchain supporting fuzzy query[J].Arabian Journal for Science and Engineering,2024,49(3):4401-4418. [23]PENG Y,DU M,LI F,et al.FalconDB:Blockchain-based collaborative database[C]//Proceedings of SIGMOD.2020:637-652. [24]XU C,ZHANG C,XU J,et al.SlimChain:Scaling blockchain transactions through off-chain storage and parallel processing[J].PVLDB Endowment,2021,14(11):2314-2326. [25]SHEN D,DUMAS C,SARDINA C,et al.Cholula:Fast,fault-tolerant,and stronglyconsistent off-chain object storage[C]//Proceedings of 4th International Conference on Blockchain Computing and Applications.IEEE,2022:189-194. [26]ZHOU J,WANG N,LIU A,et al.Cbcs:A scalable consortium blockchain architecture based on world state collaborative storage[J].Electronics,2023,12(3):735. [27]KRAFT P,LI Q,ZHOU X,et al.Epoxy:ACID transactionsacross diverse data stores[J].PVLDB Endowment,2023,16(11):2742-2754. [28]JIAO T,SHEN D,NIE T.BlockchainDB:Querable and immutable database[J].Journal of Software,2019,30(9):2671-2685. [29]SUN Y M,FAN H B,PENG M Y,et al.A method of off-chain data verifiable query for consortium blockchain [J].Modern Electronics Technique,2023,46(19):70-74. [30]PENG Z,ZHANG Y,XU Q,et al.NeuChain:a fast permis-sioned blockchain system with deterministic ordering [J].PVLDB Endowment,2022,15(11):2585-2598. |
[1] | HU Yongqing, YANG Han, LIU Ziyuan, QING Guangjun, DAI Qinglong. ACCF:Time Prediction Mechanism-driven Top-k Flow Measurement [J]. Computer Science, 2025, 52(10): 98-105. |
[2] | DUAN Pengsong, ZHANG Yihang, FANG Tao, CAO Yangjie, WANG Chao. WiLCount:A Lightweight Crowd Counting Model for Wireless Perception Scenarios [J]. Computer Science, 2025, 52(10): 317-327. |
[3] | WANG Pengrui, HU Yuxiang, CUI Pengshuai, DONG Yongji, XIA Jiqiang. SRv6 Functional Conformance Verification Mechanism Based on the Programmable Data Plane [J]. Computer Science, 2025, 52(10): 328-335. |
[4] | XU Jia, LIU Jingyi, XU Lijie, LIU Linfeng. Wireless Charging Scheduling with Minimized Maximum Return-to-Work Time for Heterogeneous Mobile Rechargeable Devices [J]. Computer Science, 2025, 52(10): 336-347. |
[5] | HE Hao, ZHANG Hui. Intrusion Detection Method Based on Improved Active Learning [J]. Computer Science, 2025, 52(10): 357-365. |
[6] | ZHU Ziyi, ZHANG Jianhui, ZENG Junjieand ZHANG Hongyuan. Security-aware Service Function Chain Deployment Method Based on Deep ReinforcementLearning [J]. Computer Science, 2025, 52(10): 404-411. |
[7] | WU Jiagao, YI Jing, ZHOU Zehui, LIU Linfeng. Personalized Federated Learning Framework for Long-tailed Heterogeneous Data [J]. Computer Science, 2025, 52(9): 232-240. |
[8] | SHEN Tao, ZHANG Xiuzai, XU Dai. Improved RT-DETR Algorithm for Small Object Detection in Remote Sensing Images [J]. Computer Science, 2025, 52(8): 214-221. |
[9] | LONG Tie, XIAO Fu, FAN Weibei, HE Xin, WANG Junchang. Cubic+:Enhanced Cubic Congestion Control for Cross-datacenter Networks [J]. Computer Science, 2025, 52(8): 335-342. |
[10] | YE Miao, WANG Jue, JIANG Qiuxiang, WANG Yong. SDN-based Integrated Communication and Storage Edge In-network Storage Node Selection Method [J]. Computer Science, 2025, 52(8): 343-353. |
[11] | FAN Xinggang, JIANG Xinyang, GU Wenting, XU Juntao, YANG Youdong, LI Qiang. Effective Task Offloading Strategy Based on Heterogeneous Nodes [J]. Computer Science, 2025, 52(8): 354-362. |
[12] | ZHAO Jihong, MA Jian, LI Qianwen, NING Lijuan. Service Function Chain Deployment Method Based on VNF Divided Backup Mechanisms [J]. Computer Science, 2025, 52(7): 287-294. |
[13] | LIU Wenfei, LIU Jiafei, WANG Qi, WU Jingli, LI Gaoshi. Component Reliability Analysis of Interconnected Networks Based on Star Graph [J]. Computer Science, 2025, 52(7): 295-306. |
[14] | CHEN Shangyu, HU Hongchao, ZHANG Shuai, ZHOU Dacheng, YANG Xiaohan. Tor Multipath Selection Based on Threaten Awareness [J]. Computer Science, 2025, 52(7): 363-371. |
[15] | ZHOU Lei, SHI Huaifeng, YANG Kai, WANG Rui, LIU Chaofan. Intelligent Prediction of Network Traffic Based on Large Language Model [J]. Computer Science, 2025, 52(6A): 241100058-7. |
|