Please enter verification code
Confirm
Research on Block Chain Product Evaluation System
Internet of Things and Cloud Computing
Volume 8, Issue 4, December 2020, Pages: 52-59
Received: Jan. 11, 2021; Published: Jan. 12, 2021
Views 9      Downloads 13
Authors
Shao Yong, Faculty of Information Technology, Beijing University of Technology, Beijing, China
Yan Changshun, Faculty of Information Technology, Beijing University of Technology, Beijing, China
Article Tools
Follow on us
Abstract
Block chain technology has occupied a very important position in today's society. This emerging technology has been successfully explored and developed in many fields and scenarios. However, due to the fact that block chain technology is still in the exploratory stage, there is no rigid specification and index for block chain products, Integrating the research results of block chain technology architecture and security risk assessment, this paper designs a set of evaluation indicators for block chain products. The indicators are divided into six aspects, including P2P network technology evaluation index, distributed ledger technology evaluation index, asymmetric encryption technology evaluation index, smart contract evaluation index, consensus mechanism evaluation index and other security technologies Evaluation indicators, each big evaluation index is subdivided into several more in-depth evaluation indicators, and each of the specific analysis and explanation. Finally, based on the previous analysis and design work, a block chain product evaluation software is developed, which provides users with the function of comprehensive evaluation of block chain products. The design and software implementation of the block chain product evaluation system can effectively improve the efficiency in the development of block chain products and the quality of the products themselves, which is conducive to the further development of the block chain field.
Keywords
Block Chain, Architecture Analysis, Evaluation Indicators, Evaluation Software
To cite this article
Shao Yong, Yan Changshun, Research on Block Chain Product Evaluation System, Internet of Things and Cloud Computing. Vol. 8, No. 4, 2020, pp. 52-59. doi: 10.11648/j.iotcc.20200804.13
References
[1]
Lei-peng Xiang, Design and Practice of Blockchain System Testing. Modern computer, Vol 5, 2018, pp. 24-26.
[2]
Ying-xuan Zheng, Construction of campus network security model for NS2 network to resist DDoS attack. Network Security Technology & Application, Vol 10, 2019, pp. 98-99.
[3]
Xiang-hua Wang, Xin Song, Witch attack detection method based on node location message verification in WSN. Computer Applications and Software, Vol 35, 2018, pp. 321-326.
[4]
Liang Zhang, Bai-xiang Liu, Ru-Yi Zhang, Bin-xin Jiang, Yi-Jiang Liu, Overview of Blockchain Technology. Computer Engineering, Vol 45, 2019, pp. 1-12.
[5]
Zhe LI, Yi-liang Han, Yu LI, A Key Exchange Cryptosystem Based on Polar Codes. Netinfo Security, Vol 19, 2019, pp. 84-90.
[6]
Dan-qing Duan, Hong-ru Wei, Collision Attack on MIBS Algorithm. Computer science, Vol 45, 2018, pp. 222-225.
[7]
Wei-qing You, Xiao-ming Chen, Jian Qi, Research on a Kind of Anti quantum Computing Public Key Cryptosystem. Netinfo Security, Vol 17, 2017, pp. 53-60.
[8]
Yu Wang, Ming Zhu, Xia Yan, Application Research of Asymmetric Encryption Algorithm in Identity Authentication. Computer Technology and Development, Vol 30, 2020, pp. 94-98.
[9]
Ke-wei Hou, Design of electronic secret key identity remote automatic verification system in heterogeneous environment. Automation & Instrumentation, Vol 2, 2020, pp. 85-88.
[10]
Chun-mei Guo, Bao-ping Zhu, An Improved Blockchain Consensus Algorithm. Computer and Digital Engineering, Vol 48, 2020, pp. 1290-1293.
[11]
Meng-yu Wu, Guo-sheng Zhu, Shan-chao Wu, Improved consensus mechanism of blockchain based on proof-of-work and proof-of-stake. Journal of Computer Applications, Vol 40, 2020, pp. 2274-2278.
[12]
Ying Gao, Xue-cheng Tan, Improvement of DPOS consensus mechanism. Application Research of Computers, Vol 37, 2018, pp. 3086-3090.
[13]
Ying-xu Lai, Zun-xu Bo, Research on sybil attack in defense blockchain based on improved PBFT algorithm. Journal on Communications, Vol 41, 2020, pp. 104-117.
[14]
Lei Wang, Nan Ren, Baozhen Li, Research on evolutionary game and prevention and control strategy of block-chain 51%double spendattack. Computer Engineering and Applications, Vol 10, 2019, pp. 1-9.
[15]
Jian Han, Jing Zou, Han Jiang, Qiu-liang Xu, Research on Mining Attacks in Bitcoin. Journal of Cryptologic Research, Vol 5, 2018, pp. 470-483.
[16]
Wei-dong Fang, Wu-xiong Zhang, Tao Pan, Wei chen, Yang Yang, Cyber Security in Blockchain. Threats and Countermeasures, Vol 3, 2018, pp. 87-104.
ADDRESS
Science Publishing Group
1 Rockefeller Plaza,
10th and 11th Floors,
New York, NY 10020
U.S.A.
Tel: (001)347-983-5186