计算机技术 |
|
|
|
|
基于区块链智能合约的物联网数据资产化方法 |
盛念祖1,2, 李芳1, 李晓风1,2, 赵赫1, 周桐1,2 |
1. 中国科学院合肥物质科学研究院, 安徽合肥 230031;
2. 中国科学技术大学, 安徽合肥 230026 |
|
Data capitalization method based on blockchain smart contract for Internet of Things |
SHENG Nian-zu1,2, LI Fang1, LI Xiao-feng1,2, ZHAO He1, ZHOU Tong1,2 |
1. Hefei Institutes of Physical Science, Chinese Academy of Sciences, Hefei 230031, China;
2. University of Science and Technology of China, Hefei 230026, China |
引用本文:
盛念祖, 李芳, 李晓风, 赵赫, 周桐. 基于区块链智能合约的物联网数据资产化方法[J]. 浙江大学学报(工学版), 2018, 52(11): 2150-2158.
SHENG Nian-zu, LI Fang, LI Xiao-feng, ZHAO He, ZHOU Tong. Data capitalization method based on blockchain smart contract for Internet of Things. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2018, 52(11): 2150-2158.
链接本文:
http://www.zjujournals.com/eng/CN/10.3785/j.issn.1008-973X.2018.11.014
或
http://www.zjujournals.com/eng/CN/Y2018/V52/I11/2150
|
[1] 齐爱民, 盘佳. 数据权、数据主权的确立与大数据保护的基本原则[J]. 苏州大学学报:哲学社会科学版, 2015(1):64-70. QI Ai-min, PAN Jia. Data right, the establishment of data sovereignty and the basic principle of big data protection[J]. Journal of Soochow University:Philosophy and Social Science Edition. 2015(1):64-70.
[2] 中国资产评估协会. 中国资产评估准则:2005[M]. 北京:经济科学出版社, 2005:41-45.
[3] 彭云. 大数据环境下数据确权问题研究[J]. 现代电信科技, 2016, 46(5):17-20. PENG Yun. Research on authenticating data rights in big data environment[J]. Modern Science and Technology of Telecommunications. 2016, 46(5):17-20.
[4] 中国电子技术标准化研究院. 中国区块链与物联网融合创新应用蓝皮书[R/OL]. (2017-09-13)[2017-12-20] . http://www.cesi.ac.cn/images/editor/20170913/20170913145041632.pdf.
[5] ZYSKIND G, NATHAN O, PENTLAND A. Decentralizing privacy:using blockchain to protect personal data[C]//IEEE Security and Privacy Workshops. San Jose:IEEE, 2015:180-184.
[6] AZARIA A, EKBLAW A, VIEIRA T, et al. MedRec:using blockchain for medical data access and permission management[C]//International Conference on Open and Big Data. Vienna:IEEE, 2016:25-30.
[7] ZHANG Y, WEN J. An IoT electric business model based on the protocol of bitcoin[C]//International Conference on Intelligence in Next Generation Networks. Paris:IEEE, 2015:184-191.
[8] IBM Institute for Business Value. Device democracy-saving the future of the Internet of Things[R/OL]. (2017-10-02)[2017-12-20] . http://www-01.ibm.com/common/ssi/cgi-bin/ssialias?infotype=PM&subtype=XB&htmlfid=GBE03620USEN.
[9] 赵赫, 李晓风, 占礼葵, 等. 基于区块链技术的采样机器人数据保护方法[J]. 华中科技大学学报:自然科学版, 2015, 43(s1):216-219 ZHAO He, LI Xiao-feng, ZHAN Li-kui, et al. Data integrity protection method for microorganism sampling robots based on blockchain technology[J]. Journal of Huazhong University of Science and Technology:Natural Science Edition, 2015, 43(s1):216-219
[10] LAMPORT L. The Byzantine generals problem[J]. ACM Transactions on Programming Languages and Systems, 1982, 4(3):382-401.
[11] 袁勇, 王飞跃. 区块链技术发展现状与展望[J]. 自动化学报, 2016, 42(4):481-494 YUAN Yong, WANG Fei-Yue. Blockchain:the state of the art and future trends[J]. Acta Automatica Sinica, 2016, 42(4):481-494
[12] 钱卫宁, 邵奇峰, 朱燕超, 等. 区块链与可信数据管理:问题与方法[J]. 软件学报, 2018, 29(1):150-159 QIAN Wei-ning, SHAO Qi-feng, ZHU Yan-chao, et al. Research problems and methods in blockchain and trusted data management[J]. Journal of Software, 2018, 29(1):150-159
[13] Ethereum White Paper. A next-generation smart contract and decentralized application platform[R/OL].(2015-11-12)[2017-12-20] . https://github.com/ethereum/wiki/wiki/WhitePaper.
[14] CONOSCENTI M, VETRÒ A, MARTIN J C D. Blockchain for the Internet of Things:a systematic literature review[C]//Computer Systems and Applications. Agadir:IEEE, 2017:2161-5330.
[15] JOHNSON D, MENEZES A, VANSTONE S. The elliptic curve digital signature algorithm (ECDSA)[J]. International Journal of Information Security, 2001, 1(1):36-63.
[16] U.S. Department of Commerce. Secure hash standard-federal information processing standards publication 180-4[S/OL].[S. l.]:Federal Information Processing Standards Publication, 2012:21-23[2017-12-20] . https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf.
[17] MERKLE R C. A digital signature based on a conventional encryption function[C]//A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology. Santa Barbara:CRYPTO, 1987, 293, 369-378.
[18] KHALIQUE A, SINGH K, SOOD S. Implementation of elliptic curve digital signature algorithm[J]. International Journal of Computer Applications, 2011, 2(2):21-27.
[19] NAKAMOTO S. Bitcoin:a peer-to-peer electronic cash system[EB/OL].(2018)[2017-12-20] . https://bitcoin.org/bitcoin.pdf.
[20] TSCHORSCH F, SCHEUERMANN B. Bitcoin and beyond:a technical survey on decentralized digital currencies[J]. IEEE Communications Surveys and Tutorials, 2016, 18(3):2084-2123.
[21] EYAL I, SIRER E G. Majority is not enough:bitcoin mining is vulnerable[C]//International Conference on Financial Cryptography and Data Security. Christ Church:International Financial Cryptography Association, 2014:436-454.
[22] ANTONOPOULOS A M. Mastering Bitcoin[M/OL].[S.l.]:O'Reilly Media, 2015:210-218[2017-12-20] . http://chimera.labs.oreilly.com/books/1234000001802/index.html.
[23] POON J, DRYJA T. The bitcoin lightning network:scalable off-chain instant payments[EB/OL].[2016-01-14] . https://lightning.network/lightning-network-paper.pdf.
[24] POON J, BUTERIN V. Plasma:scalable autonomous smart contracts[EB/OL].[2017-08-11] . http://plasma.io/plasma.pdf.
[25] KANG J, YU R, HUANG X, et al. Enabling localized peer-to-peer electricity trading among plug-in hybrid electric vehicles using consortium blockchains[J]. IEEE Transactions on Industrial Informatics, 2017, 13(6):3154-3164. |
|
Viewed |
|
|
|
Full text
|
|
|
|
|
Abstract
|
|
|
|
|
Cited |
|
|
|
|
|
Shared |
|
|
|
|
|
Discussed |
|
|
|
|