{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T15:59:09Z","timestamp":1771516749182,"version":"3.50.1"},"reference-count":73,"publisher":"Wiley","license":[{"start":{"date-parts":[[2020,12,10]],"date-time":"2020-12-10T00:00:00Z","timestamp":1607558400000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772352"],"award-info":[{"award-number":["61772352"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2019YFG0400"],"award-info":[{"award-number":["2019YFG0400"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2018GZDZX0031"],"award-info":[{"award-number":["2018GZDZX0031"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2018GZDZX0004"],"award-info":[{"award-number":["2018GZDZX0004"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2017GZDZX0003"],"award-info":[{"award-number":["2017GZDZX0003"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2018JY0182"],"award-info":[{"award-number":["2018JY0182"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["19ZDYF1286"],"award-info":[{"award-number":["19ZDYF1286"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Science and Technology Planning Project of Sichuan Province","award":["61772352"],"award-info":[{"award-number":["61772352"]}]},{"name":"Science and Technology Planning Project of Sichuan Province","award":["2019YFG0400"],"award-info":[{"award-number":["2019YFG0400"]}]},{"name":"Science and Technology Planning Project of Sichuan Province","award":["2018GZDZX0031"],"award-info":[{"award-number":["2018GZDZX0031"]}]},{"name":"Science and Technology Planning Project of Sichuan Province","award":["2018GZDZX0004"],"award-info":[{"award-number":["2018GZDZX0004"]}]},{"name":"Science and Technology Planning Project of Sichuan Province","award":["2017GZDZX0003"],"award-info":[{"award-number":["2017GZDZX0003"]}]},{"name":"Science and Technology Planning Project of Sichuan Province","award":["2018JY0182"],"award-info":[{"award-number":["2018JY0182"]}]},{"name":"Science and Technology Planning Project of Sichuan Province","award":["19ZDYF1286"],"award-info":[{"award-number":["19ZDYF1286"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2020,12,10]]},"abstract":"<jats:p>Blockchain technology has emerged as a novel distributed ledger technology, facilitating data sharing and system management securely and efficiently without interventions from a central authority. However, blockchain technology alone is not suitable for enterprise-class applications, mainly due to the limitations in capacity expansion and veri\ufb01cation speed of blockchain systems. This paper proposes a secure and effective construction scheme for blockchain networks to improve performance and address the effective management concerns of blockchain data based on transaction categories. We designed a network link protocol to construct a directed acyclic graph (DAG) blockchain network and used a sharding protocol to divide the DAG blockchain into multiple category shards to process transactions in parallel. We then extensively evaluated our proposed design on local clusters. The experimental results show that our link and shard protocols achieved high throughput and the category-based sharded DAG blockchain demonstrated high scalability.<\/jats:p>","DOI":"10.1155\/2020\/8881881","type":"journal-article","created":{"date-parts":[[2020,12,11]],"date-time":"2020-12-11T01:32:19Z","timestamp":1607650339000},"page":"1-20","source":"Crossref","is-referenced-by-count":16,"title":["A Secure and Effective Construction Scheme for Blockchain Networks"],"prefix":"10.1155","volume":"2020","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7193-9993","authenticated-orcid":true,"given":"Chaoxia","family":"Qin","sequence":"first","affiliation":[{"name":"College of Computer Science, Sichuan University, Chengdu, Sichuan 610065, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0679-4601","authenticated-orcid":true,"given":"Bing","family":"Guo","sequence":"additional","affiliation":[{"name":"College of Computer Science, Sichuan University, Chengdu, Sichuan 610065, China"}]},{"given":"Yan","family":"Shen","sequence":"additional","affiliation":[{"name":"School of Control Engineering, Chengdu University of Information Technology, Chengdu, Sichuan 610225, China"}]},{"given":"Tao","family":"Li","sequence":"additional","affiliation":[{"name":"College of Computer Science, Sichuan University, Chengdu, Sichuan 610065, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2839-9888","authenticated-orcid":true,"given":"Yun","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Statistics, Southwestern University of Finance and Economics, Chengdu, Sichuan 611130, China"}]},{"given":"Zhen","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Computer Science, Sichuan University, Chengdu, Sichuan 610065, China"}]}],"member":"311","reference":[{"key":"1","first-page":"136","article-title":"Cryptographic cloud storage","author":"S. Kamara"},{"key":"2","volume-title":"Bitcoin: A Peer-To-Peer Electronic Cash System","author":"S. Nakamoto","year":"2008"},{"key":"3","first-page":"403","article-title":"Betfunding: a distributed bounty-based crowdfunding platform over Ethereum","author":"V. Jacynycz"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2882794"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.06.018"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.08.020"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2015.27"},{"issue":"3","key":"8","first-page":"1","article-title":"Blockchain & infrastructure (identity, data security)","volume":"1","author":"D. Shrier","year":"2016","journal-title":"Massachusetts Institute of Technology-Connection Science"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-7998-0186-3.ch010"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/mcc.2018.011791712"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-8715-9_33"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.23919\/ICACT.2017.7890132"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2020.2966643"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/j.csbj.2018.08.002"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2018.10299"},{"key":"16","first-page":"373","article-title":"Privacy preserving government data sharing based on hyperledger blockchain","author":"Y. Hao"},{"key":"17","volume-title":"World Record!! We\u2019ve Processed 256,000 Payment Transactions Per Second (tps)","author":"ALIPAY","year":"2017"},{"key":"18","volume-title":"The Tangle","author":"S. Popov"},{"key":"19","first-page":"27","article-title":"A comparative analysis of DAG-based blockchain architectures","author":"H. Pervez"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/mnet.2019.1900002"},{"key":"21","first-page":"183","article-title":"State-of-the-art and future trends of blockchain based on dag structure","author":"C. Bai"},{"key":"22","first-page":"17","article-title":"A secure shard protocol for open blockchains","author":"L. Luu"},{"key":"23","article-title":"Byteball: a decentralized system for storage and transfer of value","author":"A. Churyumov","year":"2016"},{"key":"24","volume-title":"Nano: A Feeless Distributed Cryptocurrency Network","author":"C. LeMahieu","year":"2018"},{"key":"25","first-page":"493","article-title":"An adaptive data placement scheme for parallel database computer systems","author":"K. A. Hua"},{"key":"26"},{"key":"27"},{"key":"28"},{"key":"29","first-page":"95","article-title":"Monoxide: scale out blockchains with asynchronous consensus zones","author":"J. Wang"},{"key":"30"},{"key":"31","article-title":"The zilliqa technical whitepaper","author":"Z. Team","year":"2017"},{"key":"32"},{"key":"33","volume-title":"A Highly Scalable Public Blockchain via Adaptive State Sharding and Secure Proof of Stake","author":"Elrond"},{"key":"34","article-title":"Nightshade: near protocol sharding design","author":"A. Skidanov","year":"2019"},{"key":"35"},{"key":"36","first-page":"251","article-title":"The sybil attack","author":"J. R. Douceur"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.5120\/7224-0055"},{"key":"38"},{"key":"39","first-page":"352","article-title":"Improvement of DPoS consensus based on block chain","author":"W. Zhang"},{"key":"40","doi-asserted-by":"crossref","article-title":"A tool for implementing privacy in nano","author":"R. Morais","DOI":"10.1109\/DAPPS49028.2020.00021"},{"key":"41","first-page":"1","article-title":"Ethereum: a secure decentralised generalised transaction ledger","volume":"151","author":"G. Wood","year":"2014","journal-title":"Ethereum Project Yellow Paper"},{"key":"42","first-page":"557","article-title":"An overview of blockchain technology: architecture, consensus, and future trends","author":"Z. Zheng"},{"key":"43","volume-title":"Mastering Ethereum: Building Smart Contracts and Dapps: Chapter 4","author":"A. M. Antonopoulos","year":"2018"},{"key":"44","article-title":"Ipfs-content addressed, versioned, P2p file system","author":"J. Benet","year":"2014"},{"key":"45","doi-asserted-by":"publisher","DOI":"10.1109\/SmartTechCon.2017.8358404"},{"key":"46","first-page":"1","article-title":"Blockchain technology, bitcoin, and Ethereum: a brief overview","author":"D. Vuji\u010di\u0107"},{"key":"47"},{"key":"48","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.03.038"},{"key":"49","volume-title":"Chain Interoperability","author":"V. Buterin","year":"2016"},{"key":"50"},{"key":"51","volume-title":"Ethereum: Platform Review: Opportunities and Challenges for Private and Consortium Blockchains","author":"V. Buterin","year":"2020"},{"key":"52","volume-title":"Kadena\u2014the First Scalable, High Performance Private Blockchain","author":"W. Martino"},{"issue":"1","key":"53","first-page":"2","article-title":"Atomicity analysis of service composition across organizations","volume":"35","author":"C. Ye","year":"2008","journal-title":"IEEE Transactions on Software Engineering"},{"key":"54","article-title":"Atomic commitment across blockchains","author":"V. Zakhary","year":"2019"},{"key":"55","article-title":"Distributed cross-blockchain transactions","author":"D. Zhao","year":"2020"},{"key":"56","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1970.tb01770.x"},{"key":"57","doi-asserted-by":"publisher","DOI":"10.1007\/s11222-007-9033-z"},{"key":"58","unstructured":"Van DongenS.Performance criteria for graph clustering and Markov cluster experiments2000Amsterdam, NetherlandsNational Research Institute for Mathematics and Computer ScienceTechnical Report INS-R0012"},{"key":"59","doi-asserted-by":"publisher","DOI":"10.1140\/epjst\/e2010-01179-1"},{"key":"60","first-page":"2399","article-title":"Manifold regularization: a geometric framework for learning from labeled and unlabeled examples","volume":"7","author":"M. Belkin","year":"2006","journal-title":"Journal of Machine Learning Research"},{"key":"61","doi-asserted-by":"publisher","DOI":"10.1088\/1742-5468\/2008\/10\/p10008"},{"key":"62","doi-asserted-by":"publisher","DOI":"10.1038\/nature03607"},{"key":"63","first-page":"824","article-title":"Scan: a structural clustering algorithm for networks","author":"X. Xu"},{"key":"64","first-page":"109","article-title":"On the formation of circles in co-authorship net-works","author":"T. Chakraborty"},{"key":"65","first-page":"407","article-title":"Probabilistic community and role model for social networks","author":"Y. Han"},{"key":"66","article-title":"DagCoin: a cryptocurrency without blocks","author":"S. D. Lerner","year":"2015"},{"key":"67","doi-asserted-by":"publisher","DOI":"10.1145\/997150.997156"},{"key":"68","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-018-0422-4"},{"key":"69","article-title":"Python implementation of directed acyclic graph","author":"Thieman","year":"2017"},{"key":"70"},{"key":"71","doi-asserted-by":"publisher","DOI":"10.1145\/3035918.3064033"},{"key":"72","doi-asserted-by":"crossref","DOI":"10.5210\/fm.v5i10.792","article-title":"Free riding on gnutella","author":"E. Adar","year":"2000"},{"key":"73","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.06.019"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8881881.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8881881.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8881881.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,11]],"date-time":"2020-12-11T01:32:50Z","timestamp":1607650370000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2020\/8881881\/"}},"subtitle":[],"editor":[{"given":"Omar","family":"Cheikhrouhou","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2020,12,10]]},"references-count":73,"alternative-id":["8881881","8881881"],"URL":"https:\/\/doi.org\/10.1155\/2020\/8881881","relation":{},"ISSN":["1939-0122","1939-0114"],"issn-type":[{"value":"1939-0122","type":"electronic"},{"value":"1939-0114","type":"print"}],"subject":[],"published":{"date-parts":[[2020,12,10]]}}}