Please wait a minute...
Journal of ZheJiang University (Engineering Science)  2024, Vol. 58 Issue (5): 891-899    DOI: 10.3785/j.issn.1008-973X.2024.05.002
    
Enterprise composite blockchain construction method for business environment evaluation
Su LI(),Ze CHEN,Baoyan SONG,Haolin ZHANG*()
School of Information, Liaoning University, Shenyang 110036, China
Download: HTML     PDF(1227KB) HTML
Export: BibTeX | EndNote (RIS)      

Abstract  

An enterprise composite blockchain construction method for business environment evaluation was proposed in order to address the problems of low credibility and easy tampering of enterprise data in the existing business environment evaluation system. The synergistic approach of on-chain and off-chain data was adopted to store the original enterprise data. The blockchain hash function was improved, and an encryption method based on SHA256 algorithm was proposed for enterprise raw data. Key-Value storage mode was introduced for off-chain non-volatile memory-based Level DB storage in order to reduce system communication and storage pressure. The data on-chain storage method was proposed to store the Key values in Level DB corresponding to the DAG-based Conflux public chain and the enterprise state data corresponding to the consortium chain so as to provide trustworthy depository data for the evaluation of the business environment. Experimental comparison with the Level DB database before improvement and the existing blockchain storage model was conducted. The experimental results show that the proposed enterprise composite blockchain construction method has significantly improved read and write performance and storage efficiency.



Key wordsbusiness environment evaluation      Level DB      machine learning      public blockchain      consortium blockchain     
Received: 20 October 2023      Published: 26 April 2024
CLC:  TP 181  
Fund:  国家重点研发计划资助项目(2023YFC3304900);辽宁省应用基础研究计划资助项目(2022JH2/101300250);辽宁省教育厅高校基本科研项目(理工类)面上项目(揭榜挂帅服务地方项目)(JYTMS20230761);教育部产学合作协同育人项目(230701160261310).
Corresponding Authors: Haolin ZHANG     E-mail: liisuu@163.com;18911291179@189.cn
Cite this article:

Su LI,Ze CHEN,Baoyan SONG,Haolin ZHANG. Enterprise composite blockchain construction method for business environment evaluation. Journal of ZheJiang University (Engineering Science), 2024, 58(5): 891-899.

URL:

https://www.zjujournals.com/eng/10.3785/j.issn.1008-973X.2024.05.002     OR     https://www.zjujournals.com/eng/Y2024/V58/I5/891


营商环境评估的企业级复合区块链构建方法

针对现有营商环境评估系统中企业数据可信度低、易篡改的问题,提出营商环境评估的企业级复合区块链构建方法,采用链上和链下数据协同的方式,对企业原始数据进行存储. 改进区块链哈希函数,提出基于SHA256算法的企业原始数据加密方法. 引入Key-Value存储模式进行链下基于非易失性内存的Level DB存储,降低系统的通信和存储压力. 提出数据链上存储方法,分别将Level DB中的Key值对应存储到基于DAG的Conflux公有链,企业状态数据对应存入到联盟链,为营商环境评估提供可信的存证数据. 通过与改进前的Level DB数据库和现有的区块链存储模型进行实验对比,实验结果表明,提出的企业级复合区块链构建方法在读写性能、存储效率两方面均优于现有方法.


关键词: 营商环境评估,  Level DB,  机器学习,  公有链,  联盟链 
Fig.1 Architecture diagram of enterprise composite blockchain
Fig.2 Improved SHA256 algorithm operation
Fig.3 Off-chain LevelDB storage model architecture
Fig.4 Example diagram of PGM index
Fig.5 Architecture diagram of Conflux public blockchain
Fig.6 Data structure diagram of Conflux public blockchain
符号含义
$ {N_i} $$ i $个企业节点
$ {\mathrm{B}}{{\mathrm{S}}_j} $$ j $个企业总部节点
$ {\mathrm{P}}{{\mathrm{K}}_i},{\mathrm{S}}{{\mathrm{K}}_i},{\mathrm{Cer}}{{\mathrm{t}}_i} $实体$ i $的公钥、私钥和证书
$ \{ x\} $元素$ x $的集合
$ {\mathrm{Timestamp}} $时间戳
$ i \to j $实体$ i $发送信息给实体$ j $
$ x||y $元素$ x $连接元素$ y $
$ {E_{{\mathrm{P}}{{\mathrm{K}}_i}}}(m) $使用实体$ i $的公钥加密信息$ m $
$ {\mathrm{Sig}}{{\mathrm{n}}_{{\mathrm{S}}{{\mathrm{K}}_i}}}(m) $使用实体$ i $的私钥对信息$ m $进行数字签名
$ {\mathrm{Hash}}(m) $信息$ m $的哈希值
Tab.1 Symbols used by consortium chain state data storage procedure and their meanings
数据集说明
First-order Transaction Network of Phishing Nodes网络平均包含6万多个节点和20万条链路
Bitcoin Partial Transaction Dataset对2014年11月至2016年1月的交易数据快照进行采样,采样间隔为6个月,每个快照包含对应月份的前150万条交易记录
Second-order Transaction Network of Phishing Nodes包含1 660个目标钓鱼节点和1700个从Etherscan爬取的非钓鱼节点产生的交易数据
Ethereum On-chain Data包含14 500 000个区块信息、区块数据生成的
1 524 325 653个交易信息
Tab.2 Introduction to experimental datasets
Fig.7 Comparison of reading and writing latency of LevelDB before modification
Fig.8 Comparison of reading and writing latency of LevelDB after modification
Fig.9 Storage efficiency comparison of enterprise composite blockchain
[1]   ZHAO X Y, YI C J, ZHAN Y, et al Business environment distance and innovation performance of EMNEs: the mediating effect of R&D internationalization[J]. Journal of Innovation and Knowledge, 2022, 7 (4): 100241- 100252
doi: 10.1016/j.jik.2022.100241
[2]   HASCHKA R E, HERWARTZ H, STRUTHMANN P, et al The joint effects of financial development and the business environment on firm growth: evidence from Vietnam[J]. Journal of Comparative Economics, 2022, 50 (2): 486- 506
doi: 10.1016/j.jce.2021.11.002
[3]   BONDELI J V, HAVENVID M I Bouncing back in turbulent business environments: exploring resilience in business networks[J]. Industrial Marketing Management, 2022, 107: 383- 395
doi: 10.1016/j.indmarman.2022.10.022
[4]   LIU H J, LOVE P E D, MA L, et al Predicting production-output performance within a complex business environment: from singular to multi-dimensional observations in evaluation[J]. International Journal of Production Research, 2021, 59 (24): 7390- 7399
doi: 10.1080/00207543.2020.1841316
[5]   HASSAN M U, REHMANI M H, CHEN J Anomaly detection in blockchain networks: a comprehensive survey[J]. IEEE Communications Surveys and Tutorials, 2022, 25 (1): 289- 318
[6]   HUANG J, HE D, OBAIDAT M S, et al The application of the blockchain technology in voting systems: a review[J]. ACM Computing Surveys, 2021, 54 (3): 1- 28
[7]   WEN Z, LIAO H, EMROUZNEJAD A Information representation of blockchain technology: risk evaluation of investment by personalized quantifier with cubic spline interpolation[J]. Information Processing and Management, 2021, 58 (4): 102571- 102584
doi: 10.1016/j.ipm.2021.102571
[8]   QURESHI J N, FAROOQ M S, ABID A, et al Blockchain applications for the internet of things: systematic review and challenges[J]. Microprocessors and Microsystems, 2022, 94: 104632- 104671
doi: 10.1016/j.micpro.2022.104632
[9]   BERDIK D, OTOUM S, SCHMIDT N, et al A survey on blockchain for information systems management and security[J]. Information Processing and Management, 2021, 58 (1): 102397- 102425
doi: 10.1016/j.ipm.2020.102397
[10]   LU Q, BINH T A, WEBER I, et al Integrated model-driven engineering of blockchain applications for business processes and asset management[J]. Software: Practice and Experience, 2021, 51 (5): 1059- 1079
doi: 10.1002/spe.2931
[11]   ALI M S, VECCHIO M, PINCHEIRA M, et al Applications of blockchains in the internet of things: a comprehensive survey[J]. IEEE Communications Surveys and Tutorials, 2018, 21 (2): 1676- 1717
[12]   DORFLEITNER G, MUCK F, SCHECKENBACH I Blockchain applications for climate protection: a global empirical investigation[J]. Renewable and Sustainable Energy Reviews, 2021, 149: 111378- 111400
doi: 10.1016/j.rser.2021.111378
[13]   BENSALEM H, BLAQUIERE Y, SAVARIA Y. Acceleration of the secure hash algorithm-256 (SHA-256) on an FPGA-CPU cluster using OpenCL [C]// IEEE International Symposium on Circuits and Systems . Daegu: IEEE, 2021: 1-5.
[14]   马文龙, 朱妤晴, 蒋德钧, 等 Key-Value型NoSQL本地存储系统研究[J]. 计算机学报, 2018, 41 (8): 1722- 1751
MA Wenlong, ZHU Yuqing, JIANG Dejun, et al A survey on local key-value store of NoSQL system[J]. Chinese Journal of Computers, 2018, 41 (8): 1722- 1751
[15]   高政风, 郑继来, 汤舒扬, 等 基于DAG的分布式账本共识机制研究[J]. 软件学报, 2020, 31 (4): 1124- 1142
GAO Zhengfeng, ZHENG Jilai, TANG Shuyang, et al State-of-the-art survey of consensus mecha-nisms on DAG-based distributed ledger[J]. Journal of Software, 2020, 31 (4): 1124- 1142
[16]   LU L, PILLAI T S, GOPALAKRISHNAN H, et al Wisckey: separating keys from values in SSD-conscious storage[J]. ACM Transactions on Storage, 2017, 13 (1): 1- 28
[17]   LEPERS B, BALMAU O, GUPTA K, et al. Kvell: the design and implementation of a fast persistent key-value store [C]// Proceedings of the 27th ACM Symposium on Operating Systems Principles . Huntsville: ACM, 2019: 447-461.
[18]   KAIYRAKHMET O, LEE S, NAM B, et al. SLM-DB: single-level key-value store with persistent memory [C]// 17th USENIX Conference on File and Storage Technologies . Boston: USENIX, 2019: 191-205.
[19]   KANNAN S, BHAT N, GAVRILOVSKA A, et al. Redesigning LSMs for nonvolatile memory with NoveLSM [C]// USENIX Annual Technical Conference . Boston: USENIX, 2018: 993-1005.
[20]   LEWENBERG Y, SOMPOLINSKY Y, ZOHAR A. Inclusive blockchain protocols [C]// International Conference on Financial Cryptography and Data Security . San Juan: Springer, 2015: 528-547.
[21]   LEONOV D, KODENKO M, LEICHENCO D, et al Design and validation of a phantom for transcranial ultrasonography[J]. International Journal of Computer Assisted Radiology and Surgery, 2022, 17 (9): 1579- 1588
doi: 10.1007/s11548-022-02614-2
[22]   EYAL I, GENCER A E, SIRER E G, et al. Bitcoin-NG: a scalable blockchain protocol [C]// 13th USENIX Symposium on Networked Systems Design and Implementation . Santa Clara: USENIX, 2016: 45-59.
[23]   DEREK L, ADAM S, YOSSI G, et al Vault: fast bootstrapping for cryptocurrencies[J]. IACR Cryptology ePrint Archive, 2018, 21 (15): 269- 281
[24]   何润民 单向Hash函数SHA256的研究与改进[J]. 信息技术, 2013, 37 (8): 22- 25
HE Runmin One-way Hash function research and improved SHA-256[J]. Information Technology, 2013, 37 (8): 22- 25
[1] Yi-cong GAO,Yan-kun WANG,Shao-mei FEI,Qiong LIN. Intelligent proofreading method of engineering drawing based on transfer learning[J]. Journal of ZheJiang University (Engineering Science), 2022, 56(5): 856-863, 889.
[2] Peng ZHANG,Zi-du TIAN,Hao WANG. Flight parameter data anomaly detection method based on improved generative adversarial network[J]. Journal of ZheJiang University (Engineering Science), 2022, 56(10): 1967-1976.
[3] Fa-ming HUANG,Li-han PAN,Chi YAO,Chuang-bing ZHOU,Qing-hui JIANG,Zhi-lu CHANG. Landslide susceptibility prediction modelling based on semi-supervised machine learning[J]. Journal of ZheJiang University (Engineering Science), 2021, 55(9): 1705-1713.
[4] Jia-hao REN,Hai-ou WANG,Jiang-kuan XING,Kun LUO,Jian-ren FAN. Lower-dimensional approximation models of tangential strain rate of turbulent flames[J]. Journal of ZheJiang University (Engineering Science), 2021, 55(6): 1128-1134.
[5] You ZHAN,Qiang LI,Xiao-tian MA,Chen-ping WANG,Yan-jun QIU. Macro and micro texture based prediction of pavement surface friction[J]. Journal of ZheJiang University (Engineering Science), 2021, 55(4): 684-694.
[6] Yong YU,Jing-yuan XUE,Sheng DAI,Qiang-wei BAO,Gang ZHAO. Quality prediction and process parameter optimization method for machining parts[J]. Journal of ZheJiang University (Engineering Science), 2021, 55(3): 441-447.
[7] Qiao-hong CHEN,YI CHEN,Wen-shu Li,Yu-bo JIA. Clothing image classification based on multi-scale SE-Xception[J]. Journal of ZheJiang University (Engineering Science), 2020, 54(9): 1727-1735.
[8] Hui-fang WANG,Chen-yu ZHANG. Prediction of voltage stability margin in power system based on extreme gradient boosting algorithm[J]. Journal of ZheJiang University (Engineering Science), 2020, 54(3): 606-613.
[9] Le XIE,Xi-dan HENG,Yang LIU,Qi-long JIANG,Dong LIU. Transformer fault diagnosis based on linear discriminant analysis and step-by-step machine learning[J]. Journal of ZheJiang University (Engineering Science), 2020, 54(11): 2266-2272.
[10] Zhi-yuan WAN,Jia-heng TAO,Jia-kun LIANG,Zhen-gong CAI,Cheng CHANG,Lin QIAO,Qiao-ni ZHOU. Large-scale empirical study on machine learning related questions on Stack Overflow[J]. Journal of ZheJiang University (Engineering Science), 2019, 53(5): 819-828.
[11] Dong-xiang KE,Li-min PAN,Sen-lin LUO,Han-qing ZHANG. Android malicious behavior recognition and classification method based on random forest algorithm[J]. Journal of ZheJiang University (Engineering Science), 2019, 53(10): 2013-2023.
[12] HU Li-sha, WANG Su-zhen, CHEN Yi-qiang, GAO Chen-long, HU Chun-yu, JIANG Xin-long, CHEN Zhen-yu, GAO Xing-yu. Fall detection algorithms based on wearable device: a review[J]. Journal of ZheJiang University (Engineering Science), 2018, 52(9): 1717-1728.
[13] WANG Hong-kai, CHEN Zhong-hua, ZHOU Zong-wei, LI Ying-ci, LU Pei-ou, WANG Wen-zhi, LIU Wan-yu, YU Li-juan. Evaluation of machine learning classifiers for diagnosing mediastinal lymph node metastasis of lung cancer from PET/CT images[J]. Journal of ZheJiang University (Engineering Science), 2018, 52(4): 788-797.
[14] WU Peng-zhou, YU Hui-min, ZENG Xiong. Object counting based on regularized risk minimization[J]. Journal of ZheJiang University (Engineering Science), 2014, 48(7): 1226-1233.