|
|
Enterprise composite blockchain construction method for business environment evaluation |
Su LI( ),Ze CHEN,Baoyan SONG,Haolin ZHANG*( ) |
School of Information, Liaoning University, Shenyang 110036, China |
|
|
Abstract An enterprise composite blockchain construction method for business environment evaluation was proposed in order to address the problems of low credibility and easy tampering of enterprise data in the existing business environment evaluation system. The synergistic approach of on-chain and off-chain data was adopted to store the original enterprise data. The blockchain hash function was improved, and an encryption method based on SHA256 algorithm was proposed for enterprise raw data. Key-Value storage mode was introduced for off-chain non-volatile memory-based Level DB storage in order to reduce system communication and storage pressure. The data on-chain storage method was proposed to store the Key values in Level DB corresponding to the DAG-based Conflux public chain and the enterprise state data corresponding to the consortium chain so as to provide trustworthy depository data for the evaluation of the business environment. Experimental comparison with the Level DB database before improvement and the existing blockchain storage model was conducted. The experimental results show that the proposed enterprise composite blockchain construction method has significantly improved read and write performance and storage efficiency.
|
Received: 20 October 2023
Published: 26 April 2024
|
|
Fund: 国家重点研发计划资助项目(2023YFC3304900);辽宁省应用基础研究计划资助项目(2022JH2/101300250);辽宁省教育厅高校基本科研项目(理工类)面上项目(揭榜挂帅服务地方项目)(JYTMS20230761);教育部产学合作协同育人项目(230701160261310). |
Corresponding Authors:
Haolin ZHANG
E-mail: liisuu@163.com;18911291179@189.cn
|
营商环境评估的企业级复合区块链构建方法
针对现有营商环境评估系统中企业数据可信度低、易篡改的问题,提出营商环境评估的企业级复合区块链构建方法,采用链上和链下数据协同的方式,对企业原始数据进行存储. 改进区块链哈希函数,提出基于SHA256算法的企业原始数据加密方法. 引入Key-Value存储模式进行链下基于非易失性内存的Level DB存储,降低系统的通信和存储压力. 提出数据链上存储方法,分别将Level DB中的Key值对应存储到基于DAG的Conflux公有链,企业状态数据对应存入到联盟链,为营商环境评估提供可信的存证数据. 通过与改进前的Level DB数据库和现有的区块链存储模型进行实验对比,实验结果表明,提出的企业级复合区块链构建方法在读写性能、存储效率两方面均优于现有方法.
关键词:
营商环境评估,
Level DB,
机器学习,
公有链,
联盟链
|
|
[1] |
ZHAO X Y, YI C J, ZHAN Y, et al Business environment distance and innovation performance of EMNEs: the mediating effect of R&D internationalization[J]. Journal of Innovation and Knowledge, 2022, 7 (4): 100241- 100252
doi: 10.1016/j.jik.2022.100241
|
|
|
[2] |
HASCHKA R E, HERWARTZ H, STRUTHMANN P, et al The joint effects of financial development and the business environment on firm growth: evidence from Vietnam[J]. Journal of Comparative Economics, 2022, 50 (2): 486- 506
doi: 10.1016/j.jce.2021.11.002
|
|
|
[3] |
BONDELI J V, HAVENVID M I Bouncing back in turbulent business environments: exploring resilience in business networks[J]. Industrial Marketing Management, 2022, 107: 383- 395
doi: 10.1016/j.indmarman.2022.10.022
|
|
|
[4] |
LIU H J, LOVE P E D, MA L, et al Predicting production-output performance within a complex business environment: from singular to multi-dimensional observations in evaluation[J]. International Journal of Production Research, 2021, 59 (24): 7390- 7399
doi: 10.1080/00207543.2020.1841316
|
|
|
[5] |
HASSAN M U, REHMANI M H, CHEN J Anomaly detection in blockchain networks: a comprehensive survey[J]. IEEE Communications Surveys and Tutorials, 2022, 25 (1): 289- 318
|
|
|
[6] |
HUANG J, HE D, OBAIDAT M S, et al The application of the blockchain technology in voting systems: a review[J]. ACM Computing Surveys, 2021, 54 (3): 1- 28
|
|
|
[7] |
WEN Z, LIAO H, EMROUZNEJAD A Information representation of blockchain technology: risk evaluation of investment by personalized quantifier with cubic spline interpolation[J]. Information Processing and Management, 2021, 58 (4): 102571- 102584
doi: 10.1016/j.ipm.2021.102571
|
|
|
[8] |
QURESHI J N, FAROOQ M S, ABID A, et al Blockchain applications for the internet of things: systematic review and challenges[J]. Microprocessors and Microsystems, 2022, 94: 104632- 104671
doi: 10.1016/j.micpro.2022.104632
|
|
|
[9] |
BERDIK D, OTOUM S, SCHMIDT N, et al A survey on blockchain for information systems management and security[J]. Information Processing and Management, 2021, 58 (1): 102397- 102425
doi: 10.1016/j.ipm.2020.102397
|
|
|
[10] |
LU Q, BINH T A, WEBER I, et al Integrated model-driven engineering of blockchain applications for business processes and asset management[J]. Software: Practice and Experience, 2021, 51 (5): 1059- 1079
doi: 10.1002/spe.2931
|
|
|
[11] |
ALI M S, VECCHIO M, PINCHEIRA M, et al Applications of blockchains in the internet of things: a comprehensive survey[J]. IEEE Communications Surveys and Tutorials, 2018, 21 (2): 1676- 1717
|
|
|
[12] |
DORFLEITNER G, MUCK F, SCHECKENBACH I Blockchain applications for climate protection: a global empirical investigation[J]. Renewable and Sustainable Energy Reviews, 2021, 149: 111378- 111400
doi: 10.1016/j.rser.2021.111378
|
|
|
[13] |
BENSALEM H, BLAQUIERE Y, SAVARIA Y. Acceleration of the secure hash algorithm-256 (SHA-256) on an FPGA-CPU cluster using OpenCL [C]// IEEE International Symposium on Circuits and Systems . Daegu: IEEE, 2021: 1-5.
|
|
|
[14] |
马文龙, 朱妤晴, 蒋德钧, 等 Key-Value型NoSQL本地存储系统研究[J]. 计算机学报, 2018, 41 (8): 1722- 1751 MA Wenlong, ZHU Yuqing, JIANG Dejun, et al A survey on local key-value store of NoSQL system[J]. Chinese Journal of Computers, 2018, 41 (8): 1722- 1751
|
|
|
[15] |
高政风, 郑继来, 汤舒扬, 等 基于DAG的分布式账本共识机制研究[J]. 软件学报, 2020, 31 (4): 1124- 1142 GAO Zhengfeng, ZHENG Jilai, TANG Shuyang, et al State-of-the-art survey of consensus mecha-nisms on DAG-based distributed ledger[J]. Journal of Software, 2020, 31 (4): 1124- 1142
|
|
|
[16] |
LU L, PILLAI T S, GOPALAKRISHNAN H, et al Wisckey: separating keys from values in SSD-conscious storage[J]. ACM Transactions on Storage, 2017, 13 (1): 1- 28
|
|
|
[17] |
LEPERS B, BALMAU O, GUPTA K, et al. Kvell: the design and implementation of a fast persistent key-value store [C]// Proceedings of the 27th ACM Symposium on Operating Systems Principles . Huntsville: ACM, 2019: 447-461.
|
|
|
[18] |
KAIYRAKHMET O, LEE S, NAM B, et al. SLM-DB: single-level key-value store with persistent memory [C]// 17th USENIX Conference on File and Storage Technologies . Boston: USENIX, 2019: 191-205.
|
|
|
[19] |
KANNAN S, BHAT N, GAVRILOVSKA A, et al. Redesigning LSMs for nonvolatile memory with NoveLSM [C]// USENIX Annual Technical Conference . Boston: USENIX, 2018: 993-1005.
|
|
|
[20] |
LEWENBERG Y, SOMPOLINSKY Y, ZOHAR A. Inclusive blockchain protocols [C]// International Conference on Financial Cryptography and Data Security . San Juan: Springer, 2015: 528-547.
|
|
|
[21] |
LEONOV D, KODENKO M, LEICHENCO D, et al Design and validation of a phantom for transcranial ultrasonography[J]. International Journal of Computer Assisted Radiology and Surgery, 2022, 17 (9): 1579- 1588
doi: 10.1007/s11548-022-02614-2
|
|
|
[22] |
EYAL I, GENCER A E, SIRER E G, et al. Bitcoin-NG: a scalable blockchain protocol [C]// 13th USENIX Symposium on Networked Systems Design and Implementation . Santa Clara: USENIX, 2016: 45-59.
|
|
|
[23] |
DEREK L, ADAM S, YOSSI G, et al Vault: fast bootstrapping for cryptocurrencies[J]. IACR Cryptology ePrint Archive, 2018, 21 (15): 269- 281
|
|
|
[24] |
何润民 单向Hash函数SHA256的研究与改进[J]. 信息技术, 2013, 37 (8): 22- 25 HE Runmin One-way Hash function research and improved SHA-256[J]. Information Technology, 2013, 37 (8): 22- 25
|
|
|
|
Viewed |
|
|
|
Full text
|
|
|
|
|
Abstract
|
|
|
|
|
Cited |
|
|
|
|
|
Shared |
|
|
|
|
|
Discussed |
|
|
|
|