Guest Editors
Prof. Xiaodong Yang, Northwest Normal University, China
Prof. Shudong Li, Guangzhou University, China
Prof. Yuan Liu, Northeastern University, China
Summary
Blockchain technology enables decentralized
credible information access, leading to the evolution of economic, intellectual
property protection, electronic government system, logistics, and huge amount
of investment. For the further development and potential investors, there exist
super chance together with super risk, because: 1) the current blockchain
technology has limitations on the storage capability, low consensus efficiency,
smart contract vulnerabilities, high transaction fee, and etc.; and 2) the
ecosystem of the blockchain based applications is fast evolving with growing
complexity, especially when it comes to the cross-chain scenario. To provide a
stable and efficient running environment, IPFS and swarm are proposed to
conduct efficient off-chain storage; PoRep and PosT are proposed to provide
less energy-draining consensus methods; smart contract based fuzz systems are
proposed to ensure the security of smart contract before deployment; and layer-2
blockchain is proposed to reduce transaction fees. However, the future trend of
blockchain architecture is still an open problem. To understand the potential
risk and transaction behaviors of the current dapp ecosystem, modeling based on
the dapp transaction data turns out to be a hot topic.
This special issue aims at collecting the
recent results from both research and industrial community on blockchain
technologies.
Potential topics include but are not limited
to:
• Cryptography and key
management technology for blockchain
• Distributed storage
system for blockchain
• Energy-efficient
consensus algorithm
• Scalable consensus
algorithm for consortium blockchain
• Decentralized oracle
machine for blockchain
• Smart contract
security solutions for blockchain
• Privacy protection
schemes for blockchain
• Sharding and
cross-chain protocols for blockchain
• Blockchain layer-2
technology
• Algorithms and
solutions for stable coins
• Attacking and
defense of Defi
• Data modeling for
Dapp ecosystem
• Transaction behavior
monitoring for Dapp ecosystem
• Blockchain based
application solutions
Keywords
Blockchain; decentrailized applications; storage system; consensus algorithm
Published Papers
-
Open Access
ARTICLE
BC-PC-Share: Blockchain-Based Patient-Centric Data Sharing Scheme for PHRs in Cloud Computing
Caihui Lan, Haifeng Li
CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.3, pp. 2985-3010, 2023, DOI:10.32604/cmes.2023.026321
(This article belongs to this Special Issue:
Emerging Trends on Blockchain: Architecture and Dapp Ecosystem)
Abstract Sharing of personal health records (PHR) in cloud computing is an essential functionality in the healthcare system. However, how to securely, efficiently and flexibly share PHRs data of the patient in a multi-receiver setting has not been well addressed. For instance, since the trust domain of the cloud server is not identical to the data owner or data user, the semi-trust cloud service provider may intentionally destroy or tamper shared PHRs data of user or only transform partial ciphertext of the shared PHRs or even return wrong computation results to save its storage and computation resource, to pursue maximum economic…
More >
-
Open Access
ARTICLE
PIMS: An Efficient Process Integrity Monitoring System Based on Blockchain and Trusted Computing in Cloud-Native Context
Miaomiao Yang, Guosheng Huang, Junwei Liu, Yanshuang Gui, Qixu Wang, Xingshu Chen
CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.2, pp. 1879-1898, 2023, DOI:10.32604/cmes.2023.026371
(This article belongs to this Special Issue:
Emerging Trends on Blockchain: Architecture and Dapp Ecosystem)
Abstract With the advantages of lightweight and high resource utilization, cloud-native technology with containers as the core is gradually becoming the mainstream technical architecture for information infrastructure. However, malware attacks such as Doki and Symbiote threaten the container runtime’s security. Malware initiates various types of runtime anomalies based on process form (e.g., modifying the process of a container, and opening the external ports). Fortunately, dynamic monitoring mechanisms have proven to be a feasible solution for verifying the trusted state of containers at runtime. Nevertheless, the current routine dynamic monitoring mechanisms for baseline data protection are still based on strong security assumptions.…
More >
-
Open Access
ARTICLE
A Linear Homomorphic Proxy Signature Scheme Based on Blockchain for Internet of Things
Caifen Wang, Bin Wu
CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.2, pp. 1857-1878, 2023, DOI:10.32604/cmes.2023.026153
(This article belongs to this Special Issue:
Emerging Trends on Blockchain: Architecture and Dapp Ecosystem)
Abstract The mushroom growth of IoT has been accompanied by the generation of massive amounts of data. Subject to the limited storage and computing capabilities of most IoT devices, a growing number of institutions and organizations outsource their data computing tasks to cloud servers to obtain efficient and accurate computation while avoiding the cost of local data computing. One of the most important challenges facing outsourcing computing is how to ensure the correctness of computation results. Linearly homomorphic proxy signature (LHPS) is a desirable solution to ensure the reliability of outsourcing computing in the case of authorized signing right. Blockchain has…
More >
-
Open Access
ARTICLE
Multi-Source Data Privacy Protection Method Based on Homomorphic Encryption and Blockchain
Ze Xu, Sanxing Cao
CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.1, pp. 861-881, 2023, DOI:10.32604/cmes.2023.025159
(This article belongs to this Special Issue:
Emerging Trends on Blockchain: Architecture and Dapp Ecosystem)
Abstract Multi-Source data plays an important role in the evolution of media convergence. Its fusion processing enables the further mining of data and utilization of data value and broadens the path for the sharing and dissemination of media data. However, it also faces serious problems in terms of protecting user and data privacy. Many privacy protection methods have been proposed to solve the problem of privacy leakage during the process of data sharing, but they suffer from two flaws: 1) the lack of algorithmic frameworks for specific scenarios such as dynamic datasets in the media domain; 2) the inability to solve…
More >
Graphic Abstract
-
Open Access
ARTICLE
Analyzing Ethereum Smart Contract Vulnerabilities at Scale Based on Inter-Contract Dependency
Qiuyun Lyu, Chenhao Ma, Yanzhao Shen, Shaopeng Jiao, Yipeng Sun, Liqin Hu
CMES-Computer Modeling in Engineering & Sciences, Vol.135, No.2, pp. 1625-1647, 2023, DOI:10.32604/cmes.2022.021562
(This article belongs to this Special Issue:
Emerging Trends on Blockchain: Architecture and Dapp Ecosystem)
Abstract Smart contracts running on public blockchains are permissionless and decentralized, attracting both developers and malicious participants. Ethereum, the world’s largest decentralized application platform on which more than 40 million smart contracts are running, is frequently challenged by smart contract vulnerabilities. What’s worse, since the homogeneity of a wide range of smart contracts and the increase in inter-contract dependencies, a vulnerability in a certain smart contract could affect a large number of other contracts in Ethereum. However, little is known about how vulnerable contracts affect other on-chain contracts and which contracts can be affected. Thus, we first present the contract dependency…
More >