Special lssues
Table of Content

Emerging Trends on Blockchain: Architecture and Dapp Ecosystem

Submission Deadline: 31 August 2022 (closed)

Guest Editors

Prof. Xiaodong Yang, Northwest Normal University, China
Prof. Shudong Li, Guangzhou University, China
Prof. Yuan Liu, Northeastern University, China

Summary

Blockchain technology enables decentralized credible information access, leading to the evolution of economic, intellectual property protection, electronic government system, logistics, and huge amount of investment. For the further development and potential investors, there exist super chance together with super risk, because: 1) the current blockchain technology has limitations on the storage capability, low consensus efficiency, smart contract vulnerabilities, high transaction fee, and etc.; and 2) the ecosystem of the blockchain based applications is fast evolving with growing complexity, especially when it comes to the cross-chain scenario. To provide a stable and efficient running environment, IPFS and swarm are proposed to conduct efficient off-chain storage; PoRep and PosT are proposed to provide less energy-draining consensus methods; smart contract based fuzz systems are proposed to ensure the security of smart contract before deployment; and layer-2 blockchain is proposed to reduce transaction fees. However, the future trend of blockchain architecture is still an open problem. To understand the potential risk and transaction behaviors of the current dapp ecosystem, modeling based on the dapp transaction data turns out to be a hot topic.


This special issue aims at collecting the recent results from both research and industrial community on blockchain technologies.


Potential topics include but are not limited to:

• Cryptography and key management technology for blockchain

• Distributed storage system for blockchain

• Energy-efficient consensus algorithm

• Scalable consensus algorithm for consortium blockchain

• Decentralized oracle machine for blockchain

• Smart contract security solutions for blockchain

• Privacy protection schemes for blockchain

• Sharding and cross-chain protocols for blockchain

• Blockchain layer-2 technology

• Algorithms and solutions for stable coins

• Attacking and defense of Defi

• Data modeling for Dapp ecosystem

• Transaction behavior monitoring for Dapp ecosystem

• Blockchain based application solutions


Keywords

Blockchain; decentrailized applications; storage system; consensus algorithm

Published Papers


  • Open Access

    ARTICLE

    RAISE: A Resilient Anonymous Information Sharing Environment

    Ning Hu, Ling Liu, Xin Liu, Kaijun Wu, Yue Zhao
    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.3, pp. 2743-2759, 2023, DOI:10.32604/cmes.2023.026939
    (This article belongs to this Special Issue: Emerging Trends on Blockchain: Architecture and Dapp Ecosystem)
    Abstract With the widespread application of cloud computing and network virtualization technologies, more and more enterprise applications are directly deployed in the cloud. However, the traditional TCP/IP network transmission model does not fully consider the information security issues caused by the uncontrollable internet environment. Network security communication solutions represented by encrypted virtual private networks (VPN) are facing multiple security threats. In fact, during the communication process, the user application needs to protect not only the content of the communication but also the behavior of the communication, such as the communication relationship, the communication protocol, and so on. Inspired by blockchain and… More >

  • Open Access

    REVIEW

    International Standardization of Blockchain and Distributed Ledger Technology: Overlaps, Gaps and Challenges

    Xiangjuan Jia, Jing Xu, Mengwei Han, Qing Zhang, Lu Zhang, Xiaofeng Chen
    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.2, pp. 1491-1523, 2023, DOI:10.32604/cmes.2023.026357
    (This article belongs to this Special Issue: Emerging Trends on Blockchain: Architecture and Dapp Ecosystem)
    Abstract As one of the most concerned digital technologies in recent years, blockchain and distributed ledger technology are an important driving force for a new round of technological development. It is currently in the process of accelerating its evolution and maturity, and has gradually integrated with other digital technologies. It has been applied in many industries, providing decentralized solutions for various industries, realizing innovative storage models, and building a new trust system. As blockchain technology is officially incorporated into China’s new information infrastructure category, the application fields of blockchain have expanded rapidly, gradually extending from the financial field and government affairs… More >

  • Open Access

    ARTICLE

    Blockchain-Based Data Acquisition with Privacy Protection in UAV Cluster Network

    Lemei Da, Hai Liang, Yong Ding, Yujue Wang, Changsong Yang, Huiyong Wang
    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.1, pp. 879-902, 2023, DOI:10.32604/cmes.2023.026309
    (This article belongs to this Special Issue: Emerging Trends on Blockchain: Architecture and Dapp Ecosystem)
    Abstract The unmanned aerial vehicle (UAV) self-organizing network is composed of multiple UAVs with autonomous capabilities according to a certain structure and scale, which can quickly and accurately complete complex tasks such as path planning, situational awareness, and information transmission. Due to the openness of the network, the UAV cluster is more vulnerable to passive eavesdropping, active interference, and other attacks, which makes the system face serious security threats. This paper proposes a Blockchain-Based Data Acquisition (BDA) scheme with privacy protection to address the data privacy and identity authentication problems in the UAV-assisted data acquisition scenario. Each UAV cluster has an… More >

  • Open Access

    ARTICLE

    Vulnerability Detection of Ethereum Smart Contract Based on SolBERT-BiGRU-Attention Hybrid Neural Model

    Guangxia Xu, Lei Liu, Jingnan Dong
    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.1, pp. 903-922, 2023, DOI:10.32604/cmes.2023.026627
    (This article belongs to this Special Issue: Emerging Trends on Blockchain: Architecture and Dapp Ecosystem)
    Abstract In recent years, with the great success of pre-trained language models, the pre-trained BERT model has been gradually applied to the field of source code understanding. However, the time cost of training a language model from zero is very high, and how to transfer the pre-trained language model to the field of smart contract vulnerability detection is a hot research direction at present. In this paper, we propose a hybrid model to detect common vulnerabilities in smart contracts based on a lightweight pre-trained language model BERT and connected to a bidirectional gate recurrent unit model. The downstream neural network adopts… More >

  • Open Access

    ARTICLE

    BC-PC-Share: Blockchain-Based Patient-Centric Data Sharing Scheme for PHRs in Cloud Computing

    Caihui Lan, Haifeng Li
    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.3, pp. 2985-3010, 2023, DOI:10.32604/cmes.2023.026321
    (This article belongs to this Special Issue: Emerging Trends on Blockchain: Architecture and Dapp Ecosystem)
    Abstract Sharing of personal health records (PHR) in cloud computing is an essential functionality in the healthcare system. However, how to securely, efficiently and flexibly share PHRs data of the patient in a multi-receiver setting has not been well addressed. For instance, since the trust domain of the cloud server is not identical to the data owner or data user, the semi-trust cloud service provider may intentionally destroy or tamper shared PHRs data of user or only transform partial ciphertext of the shared PHRs or even return wrong computation results to save its storage and computation resource, to pursue maximum economic… More >

  • Open Access

    ARTICLE

    PIMS: An Efficient Process Integrity Monitoring System Based on Blockchain and Trusted Computing in Cloud-Native Context

    Miaomiao Yang, Guosheng Huang, Junwei Liu, Yanshuang Gui, Qixu Wang, Xingshu Chen
    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.2, pp. 1879-1898, 2023, DOI:10.32604/cmes.2023.026371
    (This article belongs to this Special Issue: Emerging Trends on Blockchain: Architecture and Dapp Ecosystem)
    Abstract With the advantages of lightweight and high resource utilization, cloud-native technology with containers as the core is gradually becoming the mainstream technical architecture for information infrastructure. However, malware attacks such as Doki and Symbiote threaten the container runtime’s security. Malware initiates various types of runtime anomalies based on process form (e.g., modifying the process of a container, and opening the external ports). Fortunately, dynamic monitoring mechanisms have proven to be a feasible solution for verifying the trusted state of containers at runtime. Nevertheless, the current routine dynamic monitoring mechanisms for baseline data protection are still based on strong security assumptions.… More >

  • Open Access

    ARTICLE

    A Linear Homomorphic Proxy Signature Scheme Based on Blockchain for Internet of Things

    Caifen Wang, Bin Wu
    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.2, pp. 1857-1878, 2023, DOI:10.32604/cmes.2023.026153
    (This article belongs to this Special Issue: Emerging Trends on Blockchain: Architecture and Dapp Ecosystem)
    Abstract The mushroom growth of IoT has been accompanied by the generation of massive amounts of data. Subject to the limited storage and computing capabilities of most IoT devices, a growing number of institutions and organizations outsource their data computing tasks to cloud servers to obtain efficient and accurate computation while avoiding the cost of local data computing. One of the most important challenges facing outsourcing computing is how to ensure the correctness of computation results. Linearly homomorphic proxy signature (LHPS) is a desirable solution to ensure the reliability of outsourcing computing in the case of authorized signing right. Blockchain has… More >

  • Open Access

    ARTICLE

    Multi-Source Data Privacy Protection Method Based on Homomorphic Encryption and Blockchain

    Ze Xu, Sanxing Cao
    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.1, pp. 861-881, 2023, DOI:10.32604/cmes.2023.025159
    (This article belongs to this Special Issue: Emerging Trends on Blockchain: Architecture and Dapp Ecosystem)
    Abstract Multi-Source data plays an important role in the evolution of media convergence. Its fusion processing enables the further mining of data and utilization of data value and broadens the path for the sharing and dissemination of media data. However, it also faces serious problems in terms of protecting user and data privacy. Many privacy protection methods have been proposed to solve the problem of privacy leakage during the process of data sharing, but they suffer from two flaws: 1) the lack of algorithmic frameworks for specific scenarios such as dynamic datasets in the media domain; 2) the inability to solve… More >

    Graphic Abstract

    Multi-Source Data Privacy Protection Method Based on Homomorphic Encryption and Blockchain

  • Open Access

    ARTICLE

    Analyzing Ethereum Smart Contract Vulnerabilities at Scale Based on Inter-Contract Dependency

    Qiuyun Lyu, Chenhao Ma, Yanzhao Shen, Shaopeng Jiao, Yipeng Sun, Liqin Hu
    CMES-Computer Modeling in Engineering & Sciences, Vol.135, No.2, pp. 1625-1647, 2023, DOI:10.32604/cmes.2022.021562
    (This article belongs to this Special Issue: Emerging Trends on Blockchain: Architecture and Dapp Ecosystem)
    Abstract Smart contracts running on public blockchains are permissionless and decentralized, attracting both developers and malicious participants. Ethereum, the world’s largest decentralized application platform on which more than 40 million smart contracts are running, is frequently challenged by smart contract vulnerabilities. What’s worse, since the homogeneity of a wide range of smart contracts and the increase in inter-contract dependencies, a vulnerability in a certain smart contract could affect a large number of other contracts in Ethereum. However, little is known about how vulnerable contracts affect other on-chain contracts and which contracts can be affected. Thus, we first present the contract dependency… More >

Share Link