Skip to main content
Top
Published in: Neural Computing and Applications 13/2021

23-11-2020 | Original Article

Security risk and response analysis of typical application architecture of information and communication blockchain

Authors: Hongwei Zhao, Moli Zhang, Shi Wang, Entang Li, Zhenhua Guo, Dianmin Sun

Published in: Neural Computing and Applications | Issue 13/2021

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

As the role of blockchain technology in various industries becomes more and more important, the technical limitations of its consensus mechanism, private key management and smart contracts are gradually emerging. However, security events such as blockchain platform applications are emerging one after another. As a new round of transformative power in the network era, it combines the blockchain with existing technologies to generate new formats and new models. Technology applications and existing cybersecurity regulatory policies have brought new challenges. This paper analyzes the typical application architecture of blockchain technology, and analyzes the security risks of blockchain application architecture from key layers such as storage layer, protocol layer, extension layer, and application layer. This article combines the DOC mechanism with IOT application scenarios to propose a blockchain-based confidential IOT service model (Beekeeper 1.0) that supports first-order homomorphic multiplication, and a blockchain-based confidential IOT service model that supports high-order homomorphic multiplication (Beekeeper 2.0), Beekeeper 2.0 significantly improves Beekeeper 1.0 in server capabilities, verification efficiency, verification key length, and device work diversity. This article finds that the chain code call delay basically increases with the increase in the transaction sending rate. When the transaction sending rate reaches 300TPS, the chain code calling delay only increases a little, and when the transaction sending rate reaches 300TPS, the success rate of the transaction on the chain increases. Finally, the average blockchain access delay increases with the increase in the transaction sending rate. The blockchain access delay is affected by less throughput, and the transaction success rate is stable at 98%.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Li J, Liang G, Liu T (2017) A novel multi-link integrated factor algorithm considering node trust degree for blockchain-based communication[J]. KSII Trans Internet Inf Sys 11(8):3766–3788 Li J, Liang G, Liu T (2017) A novel multi-link integrated factor algorithm considering node trust degree for blockchain-based communication[J]. KSII Trans Internet Inf Sys 11(8):3766–3788
2.
go back to reference Cha SC, Hung SC, Chen JF et al (2017) On the design of a blockchain-based reputation service for android applications[J]. Adv Sci Lett 23(3):2179–2184CrossRef Cha SC, Hung SC, Chen JF et al (2017) On the design of a blockchain-based reputation service for android applications[J]. Adv Sci Lett 23(3):2179–2184CrossRef
3.
go back to reference Mengelkamp E, Notheisen B, Beer C et al (2018) A blockchain-based smart grid: towards sustainable local energy markets[J]. Computer Sci Res & Develop 33(1–2):207–214CrossRef Mengelkamp E, Notheisen B, Beer C et al (2018) A blockchain-based smart grid: towards sustainable local energy markets[J]. Computer Sci Res & Develop 33(1–2):207–214CrossRef
4.
go back to reference Geng W U, Bo Z, Ran LI et al (2017) Research on the Application of Blockchain in the Integrated Demand Response Resource Transaction [J]. proceedings of the Csee, 37(13): 3717–3728 Geng W U, Bo Z, Ran LI et al (2017) Research on the Application of Blockchain in the Integrated Demand Response Resource Transaction [J]. proceedings of the Csee, 37(13): 3717–3728
5.
go back to reference Yang X, Zhang Y, Lu J et al (2017) Blockchain-based automated demand response method for energy storage system in an energy local network[J]. Zhongguo Dianji Gongcheng Xuebao/proc Chinese Soc Electr Eng 37(13):3703–3716 Yang X, Zhang Y, Lu J et al (2017) Blockchain-based automated demand response method for energy storage system in an energy local network[J]. Zhongguo Dianji Gongcheng Xuebao/proc Chinese Soc Electr Eng 37(13):3703–3716
6.
go back to reference Schneider FB (2018) Viewpoint Impediments with Policy Interventions to Foster Cybersecurity[J]. communications of the acm, 61(3):36–38 Schneider FB (2018) Viewpoint Impediments with Policy Interventions to Foster Cybersecurity[J]. communications of the acm, 61(3):36–38
7.
go back to reference Spindler G (2019) Digitalization and corporate law–a view from Germany[J]. European Co Financial Law 16(1–2):106–148CrossRef Spindler G (2019) Digitalization and corporate law–a view from Germany[J]. European Co Financial Law 16(1–2):106–148CrossRef
8.
go back to reference Zhang J (2016) Walks trajectory tracking of shared information based on consortium blockchain[J]. Revista de la Facultad de Ingenieria 31(12):8–17 Zhang J (2016) Walks trajectory tracking of shared information based on consortium blockchain[J]. Revista de la Facultad de Ingenieria 31(12):8–17
9.
go back to reference Singh M, Kim S (2017) Intelligent vehicle-trust point: reward based intelligent vehicle communication using blockchain[J]. Opt Eng 33(1):701–709 Singh M, Kim S (2017) Intelligent vehicle-trust point: reward based intelligent vehicle communication using blockchain[J]. Opt Eng 33(1):701–709
10.
go back to reference Yermack D (2017) Corporate Governance and Blockchains[J]. Rev Finance 21(1):7–31 Yermack D (2017) Corporate Governance and Blockchains[J]. Rev Finance 21(1):7–31
11.
go back to reference CreditCoin: A Privacy-Preserving Blockchain-Based Incentive Announcement Network for Communications of Smart Vehicles[J]. IEEE Transactions on Intelligent Transportation Systems, 2018, 19(7):2204–2220. CreditCoin: A Privacy-Preserving Blockchain-Based Incentive Announcement Network for Communications of Smart Vehicles[J]. IEEE Transactions on Intelligent Transportation Systems, 2018, 19(7):2204–2220.
12.
go back to reference Yin H, Guo D, Wang K et al (2018) Hyperconnected network: a decentralized trusted computing and networking Paradigm[J]. IEEE Network 32(1):112–117CrossRef Yin H, Guo D, Wang K et al (2018) Hyperconnected network: a decentralized trusted computing and networking Paradigm[J]. IEEE Network 32(1):112–117CrossRef
13.
go back to reference Savelyev A . Contract law 2.0: ‘Smart’ contracts as the beginning of the end of classic contract law[J]. Information & Communications Technology Law, 2017, 26(2):1–19. Savelyev A . Contract law 2.0: ‘Smart’ contracts as the beginning of the end of classic contract law[J]. Information & Communications Technology Law, 2017, 26(2):1–19.
14.
go back to reference Konoplev AS, Busygin AG, Zegzhda DP (2018) A Blockchain Decentralized Public Key Infrastructure Model[J]. Automatic Control Co ences 52(8):1017–1021CrossRef Konoplev AS, Busygin AG, Zegzhda DP (2018) A Blockchain Decentralized Public Key Infrastructure Model[J]. Automatic Control Co ences 52(8):1017–1021CrossRef
15.
go back to reference Cavelty MD (2018) Cybersecurity Research Meets Science and Technology Studies[J]. Politics Governance 6(2):22CrossRef Cavelty MD (2018) Cybersecurity Research Meets Science and Technology Studies[J]. Politics Governance 6(2):22CrossRef
16.
go back to reference Kim TK, Kan JM (2018) Sharing the attribute information based on blockchain[J]. J Eng Appl Sci 13(3):771–775 Kim TK, Kan JM (2018) Sharing the attribute information based on blockchain[J]. J Eng Appl Sci 13(3):771–775
17.
go back to reference Adoma F (2018) Big Data, Machine Learning and the BlockChain Technology: An Overview[J]. Int J Co Appl 180(28):1–4 Adoma F (2018) Big Data, Machine Learning and the BlockChain Technology: An Overview[J]. Int J Co Appl 180(28):1–4
18.
go back to reference Karamitsos I, Papadaki M, Barghuthi NBA (2018) Design of the blockchain smart contract: a use case for real estate[J]. Journal of Information Security 09(3):177–190CrossRef Karamitsos I, Papadaki M, Barghuthi NBA (2018) Design of the blockchain smart contract: a use case for real estate[J]. Journal of Information Security 09(3):177–190CrossRef
19.
go back to reference Bahga A, Madisetti VK (2016) Blockchain Platform for Industrial Internet of Things[J]. J Softw Eng Appl 09(10):533–546CrossRef Bahga A, Madisetti VK (2016) Blockchain Platform for Industrial Internet of Things[J]. J Softw Eng Appl 09(10):533–546CrossRef
20.
go back to reference Weber RH, Studer E (2016) Cybersecurity in the Internet of Things: Legal aspects[J]. Co Law Secur Report 32(5):715–728CrossRef Weber RH, Studer E (2016) Cybersecurity in the Internet of Things: Legal aspects[J]. Co Law Secur Report 32(5):715–728CrossRef
21.
go back to reference Cruz T, Rosa L, Proena J et al (2016) A cyber security detection framework for supervisory control and data acquisition systems[J]. IEEE Trans Industr Inf 12(6):2236–2246CrossRef Cruz T, Rosa L, Proena J et al (2016) A cyber security detection framework for supervisory control and data acquisition systems[J]. IEEE Trans Industr Inf 12(6):2236–2246CrossRef
22.
go back to reference Conteh NY, Schmick PJ (2016) Cybersecurity:risks, vulnerabilities and countermeasures to prevent social engineering attacks[J]. Int J Adv Co Res 6(23):31–38CrossRef Conteh NY, Schmick PJ (2016) Cybersecurity:risks, vulnerabilities and countermeasures to prevent social engineering attacks[J]. Int J Adv Co Res 6(23):31–38CrossRef
23.
go back to reference Finnemore M, Hollis DB (2016) Constructing norms for global cybersecurity[J]. Am J Int Law 110(3):425–479CrossRef Finnemore M, Hollis DB (2016) Constructing norms for global cybersecurity[J]. Am J Int Law 110(3):425–479CrossRef
24.
go back to reference Gordon LA, Loeb MP, Zhou L (2016) Investing in cybersecurity: insights from the gordon-loeb model[J]. J Inf Secur 07(2):49–59 Gordon LA, Loeb MP, Zhou L (2016) Investing in cybersecurity: insights from the gordon-loeb model[J]. J Inf Secur 07(2):49–59
25.
go back to reference Mckenna S, Staheli D, Fulcher C et al (2016) BubbleNet: a cyber security dashboard for visualizing patterns[J]. Co Gr Forum 35(3):281–290CrossRef Mckenna S, Staheli D, Fulcher C et al (2016) BubbleNet: a cyber security dashboard for visualizing patterns[J]. Co Gr Forum 35(3):281–290CrossRef
26.
go back to reference Woo PS, Kim BH (2017) Methodology of cyber security assessment in the smart grid[J]. J Electr Eng Technol 12(2):495–501CrossRef Woo PS, Kim BH (2017) Methodology of cyber security assessment in the smart grid[J]. J Electr Eng Technol 12(2):495–501CrossRef
Metadata
Title
Security risk and response analysis of typical application architecture of information and communication blockchain
Authors
Hongwei Zhao
Moli Zhang
Shi Wang
Entang Li
Zhenhua Guo
Dianmin Sun
Publication date
23-11-2020
Publisher
Springer London
Published in
Neural Computing and Applications / Issue 13/2021
Print ISSN: 0941-0643
Electronic ISSN: 1433-3058
DOI
https://doi.org/10.1007/s00521-020-05508-z

Other articles of this Issue 13/2021

Neural Computing and Applications 13/2021 Go to the issue

Premium Partner