{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T05:52:17Z","timestamp":1769838737163,"version":"3.49.0"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,4,16]],"date-time":"2024-04-16T00:00:00Z","timestamp":1713225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,4,16]],"date-time":"2024-04-16T00:00:00Z","timestamp":1713225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Blockchain has penetrated in various fields, such as finance, healthcare, supply chain, and intelligent transportation, but the value exchange between different blockchains limits their expansion. Cross-chain technology, such as notary mechanism, enables asset exchanges between different blockchain networks. However, existing research still confronts problems such as single inherent value evaluation, collusion risk, credit evaluation and unreasonable resource allocation, making it difficult to ensure the security of cross-chain asset transactions. So this paper proposes a cross-chain asset trading scheme based on edge cloud storage to improve the reliability of notaries and the security of cross-chain value exchange. Firstly, introduce the entropy weight method to determine indicators and adopt multi indicator evaluation to reduce the risk of collusion between notaries and users; Secondly, design a multi-indicator credit evaluation method to improve the accuracy of the evaluation; Finally, design a new and old notary node share allocation method to improve the rationality of resource allocation.The experiment shows that the scheme designed in this paper can reduce the risk of collusion, more accurately screen out high credit nodes to act as notaries, and make resource allocation more reasonable.<\/jats:p>","DOI":"10.1186\/s13677-024-00648-2","type":"journal-article","created":{"date-parts":[[2024,4,16]],"date-time":"2024-04-16T06:01:58Z","timestamp":1713247318000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Cross-chain asset trading scheme for notaries based on edge cloud storage"],"prefix":"10.1186","volume":"13","author":[{"given":"Lang","family":"Chen","sequence":"first","affiliation":[]},{"given":"Yuling","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Chaoyue","family":"Tan","sequence":"additional","affiliation":[]},{"given":"Yun","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Hui","family":"Dou","sequence":"additional","affiliation":[]},{"given":"Yuxiang","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,16]]},"reference":[{"key":"648_CR1","doi-asserted-by":"crossref","unstructured":"Deng L, Chen H, Zeng J, Zhang LJ (2018) Research on cross-chain technology based on sidechain and hash-locking. Edge Computing--EDGE 2018: Second International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle,\u00a0WA, USA, p 144\u2013151","DOI":"10.1007\/978-3-319-94340-4_12"},{"issue":"1","key":"648_CR2","doi-asserted-by":"publisher","first-page":"155014772110599","DOI":"10.1177\/15501477211059945","volume":"18","author":"Z Lv","year":"2022","unstructured":"Lv Z, Wu D, Yang W, Duan L (2022) Attack and protection schemes on fabric isomorphic crosschain systems. Int J Distrib Sens Netw 18(1):15501477211059944","journal-title":"Int J Distrib Sens Netw"},{"key":"648_CR3","unstructured":"Thomas S, Schwartz E (2016) A protocol for interledger payments. https:\/\/interledger.org\/interledger.pdf. Accessed approximately July 2023."},{"issue":"20","key":"648_CR4","doi-asserted-by":"publisher","first-page":"e6623","DOI":"10.1002\/cpe.6623","volume":"35","author":"C Tan","year":"2023","unstructured":"Tan C, Chen Y, Ren X, Peng C (2023) A mobile energy trading scheme based on lightning network. Concurr Comput Pract Experience 35(20):e6623","journal-title":"Concurr Comput Pract Experience"},{"key":"648_CR5","doi-asserted-by":"crossref","unstructured":"Khalil R, Gervais A (2017) Revive: rebalancing off-blockchain payment networks. ACM Sigsac Conference on Computer and Communications Security, p 439\u2013453","DOI":"10.1145\/3133956.3134033"},{"key":"648_CR6","doi-asserted-by":"crossref","unstructured":"Hope-Bailie A, Thomas S (2016) Interledger: creating a standard for payments. Proceedings of the 25th International Conference Companion on World Wide Web, p 281\u2013282","DOI":"10.1145\/2872518.2889307"},{"key":"648_CR7","unstructured":"Nolan (2013) Alt chains and atomic transfers. Bitcoin Forum"},{"key":"648_CR8","unstructured":"Dilley J, Poelstra A, Wilkins J, Piekarska M, Gorlick B, Friedenbach M (2016) Strong federations: an interoperable blockchain solution to centralized third-party risks. ArXiv abs\/1612.05491"},{"issue":"2327","key":"648_CR9","first-page":"4662","volume":"21","author":"G Wood","year":"2016","unstructured":"Wood G (2016) Polkadot: Vision for a heterogeneous multi-chain framework. White Paper 21(2327):4662","journal-title":"White Paper"},{"key":"648_CR10","doi-asserted-by":"crossref","unstructured":"Herlihy M (2018) Atomic cross-chain swaps. ACM Press, p 245\u2013254","DOI":"10.1145\/3212734.3212736"},{"key":"648_CR11","doi-asserted-by":"crossref","unstructured":"Herlihy M, Liskov B, Shrira L (2022) Cross-chain deals and adversarial commerce. The VLDB Journal, p 1291\u20131309","DOI":"10.1007\/s00778-021-00686-1"},{"key":"648_CR12","doi-asserted-by":"crossref","unstructured":"Shadab N, Houshmand F, Lesani M (2020) Cross-chain transactions. 2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), Toronto, ON, Canada, p 1\u20139","DOI":"10.1109\/ICBC48266.2020.9169477"},{"issue":"3","key":"648_CR13","doi-asserted-by":"publisher","first-page":"1255","DOI":"10.1109\/TR.2021.3054617","volume":"70","author":"Y Zhu","year":"2021","unstructured":"Zhu Y, Song W, Wang D, Ma D, Chu WCC (2021) Ta-spesc: Toward asset-driven smart contract language supporting ownership transaction and rule-based generation on blockchain. IEEE Trans Reliab 70(3):1255\u20131270","journal-title":"IEEE Trans Reliab"},{"key":"648_CR14","doi-asserted-by":"crossref","unstructured":"Cai J, Zhou Y, Hu T, Li B (2022) Ptlc: protect the identity privacy during cross-chain asset transaction more effectively. 2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C), Guangzhou, China, p 70\u201378","DOI":"10.1109\/QRS-C57518.2022.00019"},{"key":"648_CR15","unstructured":"Han S, Pu B, Li S, Li X, Zhang X, Wang S (2022) The application of blockchain technology in digital asset security trading. Computer System Application, p 205\u2013209"},{"key":"648_CR16","doi-asserted-by":"publisher","first-page":"108495","DOI":"10.1016\/j.comnet.2021.108495","volume":"200","author":"B Pillai","year":"2021","unstructured":"Pillai B, Biswas K, H\u00f3u Z, Muthukkumarasamy V (2021) Burn-to-claim: An asset transfer protocol for blockchain interoperability. Comput Netw 200:108495","journal-title":"Comput Netw"},{"issue":"8","key":"648_CR17","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1007\/s11128-022-03600-y","volume":"21","author":"Z Wang","year":"2022","unstructured":"Wang Z, Li J, Chen XB, Li C (2022) A secure cross-chain transaction model based on quantum multi-signature. Quantum Inf Process 21(8):279","journal-title":"Quantum Inf Process"},{"issue":"11","key":"648_CR18","first-page":"3438","volume":"42","author":"C Jiang","year":"2022","unstructured":"Jiang C, Fang L, Zhang N, Zhu J (2022) Cross-chain interaction safety model based on notary groups. J Comput Appl 42(11):3438","journal-title":"J Comput Appl"},{"key":"648_CR19","doi-asserted-by":"publisher","first-page":"102102","DOI":"10.1016\/j.sysarc.2021.102102","volume":"117","author":"W Liu","year":"2021","unstructured":"Liu W, Wu H, Meng T, Wang R, Wang Y, Xu CZ (2021) Aucswap: A vickrey auction modeled decentralized cross-blockchain asset transfer protocol. J Syst Archit 117:102102","journal-title":"J Syst Archit"},{"key":"648_CR20","doi-asserted-by":"publisher","first-page":"109344","DOI":"10.1016\/j.knosys.2022.109344","volume":"252","author":"G Wang","year":"2022","unstructured":"Wang G, Li C, Huang Y, Wang X, Luo Y (2022) Smart contract-based caching and data transaction optimization in mobile edge computing. Knowl Based Syst 252:109344","journal-title":"Knowl Based Syst"},{"issue":"3","key":"648_CR21","doi-asserted-by":"publisher","first-page":"4660","DOI":"10.1109\/JIOT.2018.2875542","volume":"6","author":"J Kang","year":"2018","unstructured":"Kang J, Yu R, Huang X, Wu M, Maharjan S, Xie S, Zhang Y (2018) Blockchain for secure and efficient data sharing in vehicular edge computing and networks. IEEE Internet Things J 6(3):4660\u20134670","journal-title":"IEEE Internet Things J"},{"issue":"2","key":"648_CR22","doi-asserted-by":"publisher","first-page":"2468","DOI":"10.1109\/TVT.2022.3213130","volume":"72","author":"F Zeng","year":"2022","unstructured":"Zeng F, Zhang K, Wu L, Wu J (2022) Efficient caching in vehicular edge computing based on edge-cloud collaboration. IEEE Trans Veh Technol 72(2):2468\u20132481","journal-title":"IEEE Trans Veh Technol"},{"issue":"9","key":"648_CR23","doi-asserted-by":"publisher","first-page":"9212","DOI":"10.1109\/TVT.2022.3179363","volume":"71","author":"W Li","year":"2022","unstructured":"Li W, Li Q, Chen L, Wu F, Ren J (2022) A storage resource collaboration model among edge nodes in edge federation service. IEEE Trans Veh Technol 71(9):9212\u20139224","journal-title":"IEEE Trans Veh Technol"},{"issue":"6","key":"648_CR24","first-page":"1649","volume":"30","author":"F Li","year":"2019","unstructured":"Li F, Li Z, Zhao H (2019) Research on the progress of blockchain cross-chain technology. J Softw 30(6):1649\u20131660","journal-title":"J Softw"},{"key":"648_CR25","doi-asserted-by":"crossref","unstructured":"Sun Y, Yi L, Duan L, Wang W (2022) A decentralized cross-chain service protocol based on notary schemes and hash-locking. 2022 IEEE International Conference on Services Computing (SCC), Barcelona, Spain, p 152\u2013157","DOI":"10.1109\/SCC55611.2022.00033"},{"issue":"6","key":"648_CR26","doi-asserted-by":"publisher","first-page":"1059","DOI":"10.1016\/j.dcan.2022.04.012","volume":"8","author":"A Xiong","year":"2022","unstructured":"Xiong A, Liu G, Zhu Q, Jing A, Loke SW (2022) A notary group-based cross-chain mechanism. Digit Commun Netw 8(6):1059\u20131067","journal-title":"Digit Commun Netw"},{"key":"648_CR27","unstructured":"Xue Q, Sun C, Ma H, Tan C, Zhang T (2021) Cross-chain data sharing scheme based on conditional proxy re encryption. IEEE, p 1847\u20131852"},{"issue":"5","key":"648_CR28","doi-asserted-by":"publisher","first-page":"4944","DOI":"10.1007\/s11227-022-04793-w","volume":"79","author":"L Cao","year":"2023","unstructured":"Cao L, Zhao S, Gao Z, Du X (2023) Cross-chain data traceability mechanism for cross-domain access. J Supercomput 79(5):4944\u20134961","journal-title":"J Supercomput"},{"key":"648_CR29","unstructured":"Dai B, Jiang S, Li D, Li C (2021) cross-chain notary mechanism evaluation model based on improved pagerank algorithm. Computer Engineering, p 26\u201331"},{"key":"648_CR30","unstructured":"Jiang C, Fang L, Zhu J (2022) Improved notary node credit sorting algorithm based on pagerank. Research on Information Security, p 9\u201318"}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-024-00648-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13677-024-00648-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-024-00648-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,16]],"date-time":"2024-04-16T06:08:26Z","timestamp":1713247706000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofcloudcomputing.springeropen.com\/articles\/10.1186\/s13677-024-00648-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,16]]},"references-count":30,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,12]]}},"alternative-id":["648"],"URL":"https:\/\/doi.org\/10.1186\/s13677-024-00648-2","relation":{},"ISSN":["2192-113X"],"issn-type":[{"value":"2192-113X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,4,16]]},"assertion":[{"value":"16 December 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 March 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 April 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"The results\/data\/figures in this manuscript have not been published elsewhere, nor are they under consideration by another publisher.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"90"}}