{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T17:21:33Z","timestamp":1771003293762,"version":"3.50.1"},"reference-count":32,"publisher":"SAGE Publications","issue":"2","license":[{"start":{"date-parts":[[2024,11,12]],"date-time":"2024-11-12T00:00:00Z","timestamp":1731369600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"name":"Harbin Finance University","award":["E012021003"],"award-info":[{"award-number":["E012021003"]}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Computational Methods in Sciences and Engineering"],"published-print":{"date-parts":[[2025,3]]},"abstract":"<jats:p>This study focuses on safeguarding the privacy of farmers\u2019 personal information data during the enhancement of employment resources and services. By leveraging the integrated features of blockchain, including decentralization, immutability, and distributed storage, along with the efficiency of edge computing technology in processing distributed storage data, the research presents solutions for the collection, sharing, and identity authentication of farmers\u2019 personal information within the strategic framework of targeted poverty alleviation. It can effectively protect against various security threats, thus ensuring the security and privacy of farmers\u2019 personal information data during the aggregation and uploading process. Meanwhile, it combines the Paillier homomorphic encryption algorithm, batch aggregation signature algorithm, and anonymous authentication mechanism to propose a secure and anonymous data aggregation mechanism. It can use Horner\u2019s rule to parse regional data, and then realize the aggregation and decryption of fine-grained privacy data, which provides strong support for optimizing rural employment resources and services. Finally, through the comparison experiment, it is found that when ACA is 200 and 700, the communication overhead of this scheme is 0.47 bits and 1.81 bits, both of which have lower communication overhead than the previous scheme.<\/jats:p>","DOI":"10.1177\/14727978241299573","type":"journal-article","created":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T03:15:24Z","timestamp":1745896524000},"page":"1368-1381","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":0,"title":["The optimization of rural employment resources and services based on edge computing and blockchain technology"],"prefix":"10.1177","volume":"25","author":[{"given":"Meiyan","family":"Liu","sequence":"first","affiliation":[{"name":"Faculty of Management, Harbin Finance University, Harbin, China"}]}],"member":"179","published-online":{"date-parts":[[2024,11,12]]},"reference":[{"key":"e_1_3_4_2_2","doi-asserted-by":"publisher","DOI":"10.1080\/10670564.2019.1645489"},{"key":"e_1_3_4_3_2","doi-asserted-by":"publisher","DOI":"10.1111\/1467-8489.12353"},{"key":"e_1_3_4_4_2","doi-asserted-by":"publisher","DOI":"10.1080\/00131857.2018.1438889"},{"key":"e_1_3_4_5_2","doi-asserted-by":"publisher","DOI":"10.1186\/s12939-019-0982-6"},{"key":"e_1_3_4_6_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11135-018-0817-3"},{"key":"e_1_3_4_7_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11442-019-1619-9"},{"key":"e_1_3_4_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2894727"},{"key":"e_1_3_4_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2938001"},{"key":"e_1_3_4_10_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2020.102397"},{"key":"e_1_3_4_11_2","doi-asserted-by":"publisher","DOI":"10.1145\/3471140"},{"key":"e_1_3_4_12_2","doi-asserted-by":"publisher","DOI":"10.3390\/sym10100470"},{"key":"e_1_3_4_13_2","doi-asserted-by":"publisher","DOI":"10.1007\/s12599-020-00656-x"},{"key":"e_1_3_4_14_2","doi-asserted-by":"publisher","DOI":"10.1080\/00207543.2018.1533261"},{"key":"e_1_3_4_15_2","doi-asserted-by":"publisher","DOI":"10.3390\/cryptography3010003"},{"key":"e_1_3_4_16_2","doi-asserted-by":"publisher","DOI":"10.2308\/ciia-52540"},{"key":"e_1_3_4_17_2","doi-asserted-by":"publisher","DOI":"10.4018\/IJEIS.2018070107"},{"key":"e_1_3_4_18_2","doi-asserted-by":"publisher","DOI":"10.3390\/s21041540"},{"key":"e_1_3_4_19_2","doi-asserted-by":"publisher","DOI":"10.3390\/fi13040094"},{"key":"e_1_3_4_20_2","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10172049"},{"issue":"3","key":"e_1_3_4_21_2","first-page":"177","article-title":"Design of the blockchain smart contract: a use case for real estate","volume":"9","author":"Karamitsos I","year":"2018","unstructured":"Karamitsos I, Papadaki M, Al Barghuthi NB. Design of the blockchain smart contract: a use case for real estate. J Inf Secur 2018; 9(3): 177\u2013190.","journal-title":"J Inf Secur"},{"key":"e_1_3_4_22_2","doi-asserted-by":"publisher","DOI":"10.1080\/00207543.2019.1627439"},{"key":"e_1_3_4_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2984887"},{"key":"e_1_3_4_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2970550"},{"key":"e_1_3_4_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.3009103"},{"key":"e_1_3_4_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2019.2915983"},{"key":"e_1_3_4_27_2","doi-asserted-by":"publisher","DOI":"10.3390\/iot2040031"},{"key":"e_1_3_4_28_2","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10101171"},{"key":"e_1_3_4_29_2","doi-asserted-by":"publisher","DOI":"10.3390\/s20185282"},{"key":"e_1_3_4_30_2","doi-asserted-by":"publisher","DOI":"10.3390\/app11010414"},{"key":"e_1_3_4_31_2","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-021-01107-4"},{"key":"e_1_3_4_32_2","doi-asserted-by":"crossref","unstructured":"Ni JB Alharbi K Lin XD et al. Security-enhanced data aggregation against malicious gateways in smart grid. In 2015 IEEE Global Communications Conference (GLOBECOM) San Diego CA 2015 pp. 1\u20136.","DOI":"10.1109\/GLOCOM.2015.7417140"},{"key":"e_1_3_4_33_2","doi-asserted-by":"publisher","DOI":"10.3390\/s18082659"}],"container-title":["Journal of Computational Methods in Sciences and Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/14727978241299573","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/14727978241299573","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/14727978241299573","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T16:31:51Z","timestamp":1771000311000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/14727978241299573"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,12]]},"references-count":32,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,3]]}},"alternative-id":["10.1177\/14727978241299573"],"URL":"https:\/\/doi.org\/10.1177\/14727978241299573","relation":{},"ISSN":["1472-7978","1875-8983"],"issn-type":[{"value":"1472-7978","type":"print"},{"value":"1875-8983","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,12]]}}}