Please wait a minute...
浙江大学学报(工学版)  2024, Vol. 58 Issue (5): 891-899    DOI: 10.3785/j.issn.1008-973X.2024.05.002
计算机技术、通信技术     
营商环境评估的企业级复合区块链构建方法
李素(),陈泽,宋宝燕,张浩林*()
辽宁大学 信息学院,辽宁 沈阳 110036
Enterprise composite blockchain construction method for business environment evaluation
Su LI(),Ze CHEN,Baoyan SONG,Haolin ZHANG*()
School of Information, Liaoning University, Shenyang 110036, China
 全文: PDF(1227 KB)   HTML
摘要:

针对现有营商环境评估系统中企业数据可信度低、易篡改的问题,提出营商环境评估的企业级复合区块链构建方法,采用链上和链下数据协同的方式,对企业原始数据进行存储. 改进区块链哈希函数,提出基于SHA256算法的企业原始数据加密方法. 引入Key-Value存储模式进行链下基于非易失性内存的Level DB存储,降低系统的通信和存储压力. 提出数据链上存储方法,分别将Level DB中的Key值对应存储到基于DAG的Conflux公有链,企业状态数据对应存入到联盟链,为营商环境评估提供可信的存证数据. 通过与改进前的Level DB数据库和现有的区块链存储模型进行实验对比,实验结果表明,提出的企业级复合区块链构建方法在读写性能、存储效率两方面均优于现有方法.

关键词: 营商环境评估Level DB机器学习公有链联盟链    
Abstract:

An enterprise composite blockchain construction method for business environment evaluation was proposed in order to address the problems of low credibility and easy tampering of enterprise data in the existing business environment evaluation system. The synergistic approach of on-chain and off-chain data was adopted to store the original enterprise data. The blockchain hash function was improved, and an encryption method based on SHA256 algorithm was proposed for enterprise raw data. Key-Value storage mode was introduced for off-chain non-volatile memory-based Level DB storage in order to reduce system communication and storage pressure. The data on-chain storage method was proposed to store the Key values in Level DB corresponding to the DAG-based Conflux public chain and the enterprise state data corresponding to the consortium chain so as to provide trustworthy depository data for the evaluation of the business environment. Experimental comparison with the Level DB database before improvement and the existing blockchain storage model was conducted. The experimental results show that the proposed enterprise composite blockchain construction method has significantly improved read and write performance and storage efficiency.

Key words: business environment evaluation    Level DB    machine learning    public blockchain    consortium blockchain
收稿日期: 2023-10-20 出版日期: 2024-04-26
CLC:  TP 181  
基金资助: 国家重点研发计划资助项目(2023YFC3304900);辽宁省应用基础研究计划资助项目(2022JH2/101300250);辽宁省教育厅高校基本科研项目(理工类)面上项目(揭榜挂帅服务地方项目)(JYTMS20230761);教育部产学合作协同育人项目(230701160261310).
通讯作者: 张浩林     E-mail: liisuu@163.com;18911291179@189.cn
作者简介: 李素(1997—),女,博士生,从事大规模图处理技术、大数据处理技术、区块链技术和流数据处理技术的研究. orcid.org/0000-0002-7520-509X. E-mail:liisuu@163.com
服务  
把本文推荐给朋友
加入引用管理器
E-mail Alert
作者相关文章  
李素
陈泽
宋宝燕
张浩林

引用本文:

李素,陈泽,宋宝燕,张浩林. 营商环境评估的企业级复合区块链构建方法[J]. 浙江大学学报(工学版), 2024, 58(5): 891-899.

Su LI,Ze CHEN,Baoyan SONG,Haolin ZHANG. Enterprise composite blockchain construction method for business environment evaluation. Journal of ZheJiang University (Engineering Science), 2024, 58(5): 891-899.

链接本文:

https://www.zjujournals.com/eng/CN/10.3785/j.issn.1008-973X.2024.05.002        https://www.zjujournals.com/eng/CN/Y2024/V58/I5/891

图 1  企业级复合区块链的架构图
图 2  改进后的SHA256算法操作
图 3  链下LevelDB存储模型架构
图 4  PGM索引示例图
图 5  Conflux公有链架构图
图 6  Conflux公有链的数据结构
符号含义
$ {N_i} $$ i $个企业节点
$ {\mathrm{B}}{{\mathrm{S}}_j} $$ j $个企业总部节点
$ {\mathrm{P}}{{\mathrm{K}}_i},{\mathrm{S}}{{\mathrm{K}}_i},{\mathrm{Cer}}{{\mathrm{t}}_i} $实体$ i $的公钥、私钥和证书
$ \{ x\} $元素$ x $的集合
$ {\mathrm{Timestamp}} $时间戳
$ i \to j $实体$ i $发送信息给实体$ j $
$ x||y $元素$ x $连接元素$ y $
$ {E_{{\mathrm{P}}{{\mathrm{K}}_i}}}(m) $使用实体$ i $的公钥加密信息$ m $
$ {\mathrm{Sig}}{{\mathrm{n}}_{{\mathrm{S}}{{\mathrm{K}}_i}}}(m) $使用实体$ i $的私钥对信息$ m $进行数字签名
$ {\mathrm{Hash}}(m) $信息$ m $的哈希值
表 1  联盟链状态数据存储过程使用的符号及其含义
数据集说明
First-order Transaction Network of Phishing Nodes网络平均包含6万多个节点和20万条链路
Bitcoin Partial Transaction Dataset对2014年11月至2016年1月的交易数据快照进行采样,采样间隔为6个月,每个快照包含对应月份的前150万条交易记录
Second-order Transaction Network of Phishing Nodes包含1 660个目标钓鱼节点和1700个从Etherscan爬取的非钓鱼节点产生的交易数据
Ethereum On-chain Data包含14 500 000个区块信息、区块数据生成的
1 524 325 653个交易信息
表 2  实验数据集介绍
图 7  修改前LevelDB读、写时延的对比图
图 8  修改后LevelDB读、写时延的对比图
图 9  企业级复合区块链的存储效率对比
1 ZHAO X Y, YI C J, ZHAN Y, et al Business environment distance and innovation performance of EMNEs: the mediating effect of R&D internationalization[J]. Journal of Innovation and Knowledge, 2022, 7 (4): 100241- 100252
doi: 10.1016/j.jik.2022.100241
2 HASCHKA R E, HERWARTZ H, STRUTHMANN P, et al The joint effects of financial development and the business environment on firm growth: evidence from Vietnam[J]. Journal of Comparative Economics, 2022, 50 (2): 486- 506
doi: 10.1016/j.jce.2021.11.002
3 BONDELI J V, HAVENVID M I Bouncing back in turbulent business environments: exploring resilience in business networks[J]. Industrial Marketing Management, 2022, 107: 383- 395
doi: 10.1016/j.indmarman.2022.10.022
4 LIU H J, LOVE P E D, MA L, et al Predicting production-output performance within a complex business environment: from singular to multi-dimensional observations in evaluation[J]. International Journal of Production Research, 2021, 59 (24): 7390- 7399
doi: 10.1080/00207543.2020.1841316
5 HASSAN M U, REHMANI M H, CHEN J Anomaly detection in blockchain networks: a comprehensive survey[J]. IEEE Communications Surveys and Tutorials, 2022, 25 (1): 289- 318
6 HUANG J, HE D, OBAIDAT M S, et al The application of the blockchain technology in voting systems: a review[J]. ACM Computing Surveys, 2021, 54 (3): 1- 28
7 WEN Z, LIAO H, EMROUZNEJAD A Information representation of blockchain technology: risk evaluation of investment by personalized quantifier with cubic spline interpolation[J]. Information Processing and Management, 2021, 58 (4): 102571- 102584
doi: 10.1016/j.ipm.2021.102571
8 QURESHI J N, FAROOQ M S, ABID A, et al Blockchain applications for the internet of things: systematic review and challenges[J]. Microprocessors and Microsystems, 2022, 94: 104632- 104671
doi: 10.1016/j.micpro.2022.104632
9 BERDIK D, OTOUM S, SCHMIDT N, et al A survey on blockchain for information systems management and security[J]. Information Processing and Management, 2021, 58 (1): 102397- 102425
doi: 10.1016/j.ipm.2020.102397
10 LU Q, BINH T A, WEBER I, et al Integrated model-driven engineering of blockchain applications for business processes and asset management[J]. Software: Practice and Experience, 2021, 51 (5): 1059- 1079
doi: 10.1002/spe.2931
11 ALI M S, VECCHIO M, PINCHEIRA M, et al Applications of blockchains in the internet of things: a comprehensive survey[J]. IEEE Communications Surveys and Tutorials, 2018, 21 (2): 1676- 1717
12 DORFLEITNER G, MUCK F, SCHECKENBACH I Blockchain applications for climate protection: a global empirical investigation[J]. Renewable and Sustainable Energy Reviews, 2021, 149: 111378- 111400
doi: 10.1016/j.rser.2021.111378
13 BENSALEM H, BLAQUIERE Y, SAVARIA Y. Acceleration of the secure hash algorithm-256 (SHA-256) on an FPGA-CPU cluster using OpenCL [C]// IEEE International Symposium on Circuits and Systems . Daegu: IEEE, 2021: 1-5.
14 马文龙, 朱妤晴, 蒋德钧, 等 Key-Value型NoSQL本地存储系统研究[J]. 计算机学报, 2018, 41 (8): 1722- 1751
MA Wenlong, ZHU Yuqing, JIANG Dejun, et al A survey on local key-value store of NoSQL system[J]. Chinese Journal of Computers, 2018, 41 (8): 1722- 1751
15 高政风, 郑继来, 汤舒扬, 等 基于DAG的分布式账本共识机制研究[J]. 软件学报, 2020, 31 (4): 1124- 1142
GAO Zhengfeng, ZHENG Jilai, TANG Shuyang, et al State-of-the-art survey of consensus mecha-nisms on DAG-based distributed ledger[J]. Journal of Software, 2020, 31 (4): 1124- 1142
16 LU L, PILLAI T S, GOPALAKRISHNAN H, et al Wisckey: separating keys from values in SSD-conscious storage[J]. ACM Transactions on Storage, 2017, 13 (1): 1- 28
17 LEPERS B, BALMAU O, GUPTA K, et al. Kvell: the design and implementation of a fast persistent key-value store [C]// Proceedings of the 27th ACM Symposium on Operating Systems Principles . Huntsville: ACM, 2019: 447-461.
18 KAIYRAKHMET O, LEE S, NAM B, et al. SLM-DB: single-level key-value store with persistent memory [C]// 17th USENIX Conference on File and Storage Technologies . Boston: USENIX, 2019: 191-205.
19 KANNAN S, BHAT N, GAVRILOVSKA A, et al. Redesigning LSMs for nonvolatile memory with NoveLSM [C]// USENIX Annual Technical Conference . Boston: USENIX, 2018: 993-1005.
20 LEWENBERG Y, SOMPOLINSKY Y, ZOHAR A. Inclusive blockchain protocols [C]// International Conference on Financial Cryptography and Data Security . San Juan: Springer, 2015: 528-547.
21 LEONOV D, KODENKO M, LEICHENCO D, et al Design and validation of a phantom for transcranial ultrasonography[J]. International Journal of Computer Assisted Radiology and Surgery, 2022, 17 (9): 1579- 1588
doi: 10.1007/s11548-022-02614-2
22 EYAL I, GENCER A E, SIRER E G, et al. Bitcoin-NG: a scalable blockchain protocol [C]// 13th USENIX Symposium on Networked Systems Design and Implementation . Santa Clara: USENIX, 2016: 45-59.
23 DEREK L, ADAM S, YOSSI G, et al Vault: fast bootstrapping for cryptocurrencies[J]. IACR Cryptology ePrint Archive, 2018, 21 (15): 269- 281
24 何润民 单向Hash函数SHA256的研究与改进[J]. 信息技术, 2013, 37 (8): 22- 25
HE Runmin One-way Hash function research and improved SHA-256[J]. Information Technology, 2013, 37 (8): 22- 25
[1] 高一聪,王彦坤,费少梅,林琼. 基于迁移学习的机械制图智能评阅方法[J]. 浙江大学学报(工学版), 2022, 56(5): 856-863, 889.
[2] 张鹏,田子都,王浩. 基于改进生成对抗网络的飞参数据异常检测方法[J]. 浙江大学学报(工学版), 2022, 56(10): 1967-1976.
[3] 黄发明,潘李含,姚池,周创兵,姜清辉,常志璐. 基于半监督机器学习的滑坡易发性预测建模[J]. 浙江大学学报(工学版), 2021, 55(9): 1705-1713.
[4] 任嘉豪,王海鸥,邢江宽,罗坤,樊建人. 湍流火焰切向应变率的低维近似模型[J]. 浙江大学学报(工学版), 2021, 55(6): 1128-1134.
[5] 战友,李强,马啸天,王郴平,邱延峻. 基于宏微观纹理特征融合的路面摩擦性能预测[J]. 浙江大学学报(工学版), 2021, 55(4): 684-694.
[6] 于勇,薛静远,戴晟,鲍强伟,赵罡. 机加零件质量预测与工艺参数优化方法[J]. 浙江大学学报(工学版), 2021, 55(3): 441-447.
[7] 陈巧红,陈翊,李文书,贾宇波. 多尺度SE-Xception服装图像分类[J]. 浙江大学学报(工学版), 2020, 54(9): 1727-1735.
[8] 王慧芳,张晨宇. 采用极限梯度提升算法的电力系统电压稳定裕度预测[J]. 浙江大学学报(工学版), 2020, 54(3): 606-613.
[9] 谢乐,衡熙丹,刘洋,蒋启龙,刘东. 基于线性判别分析和分步机器学习的变压器故障诊断[J]. 浙江大学学报(工学版), 2020, 54(11): 2266-2272.
[10] 万志远,陶嘉恒,梁家坤,才振功,苌程,乔林,周巧妮. Stack Overflow上机器学习相关问题的大规模实证研究[J]. 浙江大学学报(工学版), 2019, 53(5): 819-828.
[11] 柯懂湘,潘丽敏,罗森林,张寒青. 基于随机森林算法的Android恶意行为识别与分类方法[J]. 浙江大学学报(工学版), 2019, 53(10): 2013-2023.
[12] 忽丽莎, 王素贞, 陈益强, 高晨龙, 胡春雨, 蒋鑫龙, 陈振宇, 高兴宇. 基于可穿戴设备的跌倒检测算法综述[J]. 浙江大学学报(工学版), 2018, 52(9): 1717-1728.
[13] 王洪凯, 陈中华, 周纵苇, 李迎辞, 陆佩欧, 王文志, 刘宛予, 于丽娟. 机器学习算法诊断PET/CT纵膈淋巴结性能评估[J]. 浙江大学学报(工学版), 2018, 52(4): 788-797.
[14] 吴鹏洲,于慧敏,曾雄. 基于正则化风险最小化的目标计数[J]. 浙江大学学报(工学版), 2014, 48(7): 1226-1233.
[15] 宓云軿 王晓萍 金鑫. 基于机器学习的水质COD预测方法[J]. J4, 2008, 42(5): 790-793.