• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Dai Weiqi, Li Ming, Zhao Kexuan, Jiang Wenchao, Zhou Weilin, Zou Deqing, Jin Hai. Blockchain Marketing Label Trading System for E-Commerce Alliance[J]. Journal of Computer Research and Development, 2025, 62(1): 269-280. DOI: 10.7544/issn1000-1239.202330217
Citation: Dai Weiqi, Li Ming, Zhao Kexuan, Jiang Wenchao, Zhou Weilin, Zou Deqing, Jin Hai. Blockchain Marketing Label Trading System for E-Commerce Alliance[J]. Journal of Computer Research and Development, 2025, 62(1): 269-280. DOI: 10.7544/issn1000-1239.202330217

Blockchain Marketing Label Trading System for E-Commerce Alliance

Funds: This work was supported by the National Key Research and Development Program of China (2019YFB2101700) and the National Natural Science Foundation of China (62072202).
More Information
  • Author Bio:

    Dai Weiqi: born in 1984. PhD, associate professor. Member of CCF. His main research interests include blockchain security, privacy computing, and cloud security

    Li Ming: born in 1997. Master. His main research interests include blockchain security and trusted computing

    Zhao Kexuan: born in 2001. PhD candidate. His main research interests include blockchain and privacy computing

    Jiang Wenchao: born in 1977. PhD, associate professor. Member of CCF. His main research interests include cloud computing, big data, knowledge mapping, and industrial artificial intelligence

    Zhou Weilin: born in 1978. Master, senior engineer. His main research interests include electronic authentication, information security, and distributed databases

    Zou Deqing: born in 1975. PhD, professor. Member of CCF. His main research interests include big data security and AI security, cloud computing security, software definition security and active defense, and software vulnerability detection and network attack and defense

    Jin Hai: born in 1966. PhD, professor. Fellow of CCF. His main research interests include computer architecture, parallel and distributed processing, and cloud computing and big data

  • Received Date: March 30, 2023
  • Revised Date: December 10, 2023
  • Available Online: May 28, 2024
  • In the era of big data e-commerce, data trading can enable collaborative sharing and value utilization of isolated data resources. As the main form of data trading in e-commerce business, marketing tags have enormous potential value. However, the traditional data trading market faces three main problems: 1) The opaque information of the centralized platform leads to trust crisis and malicious bidding ranking; 2) Lack of reasonable incentive mechanism to break the data island leads to data non-circulation and sharing difficulties; 3) Data security threats lead to privacy disclosure and data reselling and theft. In order to solve these problems, a blockchain marketing label trading mechanism for e-commerce alliance is designed, and the upper consensus incentive mechanism is designed based on decentralization, and all data transactions and computing businesses of the system are completed in combination with the trusted execution environment, thus realizing a safe and complete data transaction ecosystem. The authenticity verification mechanism is designed to ensure the effectiveness of marketing labels, the consensus incentive mechanism is designed to enable users to actively share data, and the smart contract is used to effectively constrain the role behavior according to the system design specification; Then key transmission and data security storage are realized through SGX remote authentication, and smart contract security call is realized to ensure user privacy and data security; Finally, the reliable delivery of data transaction results is realized through the trusted computer system and system design idea. In order to verify the security and practicability of the system, 350000 pieces of real data provided by an e-commerce company are used for performance testing. The test results show that the system can guarantee the security and performance requirements at the same time, and its additional costs mainly come from the remote authentication module and are within the acceptable range.

  • [1]
    祝烈煌,高峰,沈蒙,等. 区块链隐私保护研究综述[J]. 计算机研究与发展,2017,54(10):2170−2186 doi: 10.7544/issn1000-1239.2017.20170471

    Zhu Liehuang, Gao Feng, Shen Meng, et al. Survey on privacy preserving techniques for blockchain technology[J]. Journal of Computer Research and Development, 2017, 54(10): 2170−2186 (in Chinese) doi: 10.7544/issn1000-1239.2017.20170471
    [2]
    Sani A S, Bertino E, Yuan Dong, et al. SPrivAD: A secure and privacy-preserving mutually dependent authentication and data access scheme for smart communities[J]. Computers & Security, 2022, 115: 102610
    [3]
    杨琪,龚南宁. 我国大数据交易的主要问题及建议[J]. 大数据,2015,1(2):38−48 doi: 10.11959/j.issn.2096-0271.2015017

    Yang Qi, Gong Nanning. Main problems and suggestions on China’s big data trading[J]. Big Data, 2015, 1(2): 38−48 (in Chinese) doi: 10.11959/j.issn.2096-0271.2015017
    [4]
    Zheng Xiao. Data trading with differential privacy in data market[C]//Proc of the 6th Int Conf on Computing and Data Engineering. New York: ACM, 2020: 112−115
    [5]
    Lu Siqi, Zheng Jianhua, Cao Zhenfu, et al. A survey on cryptographic techniques for protecting big data security: Present and forthcoming [J]. Science China Information Sciences. 2022, 65(10): 201301
    [6]
    周炜,王超,徐剑,等. 基于区块链的隐私保护去中心化联邦学习模型[J]. 计算机研究与发展,2022,59(11):2423−2436 doi: 10.7544/issn1000-1239.20220470

    Zhou Wei, Wang Chao, Xu Jian, et al. Privacy-preserving and decentralized federated learning model based on the blockchain[J]. Journal of Computer Research and Development, 2022, 59(11): 2423−2436 (in Chinese) doi: 10.7544/issn1000-1239.20220470
    [7]
    Li Hui, Pei Lishuang, Liao Dan, et al. BDDT: Use blockchain to facilitate IoT data transactions[J]. Cluster Computing, 2021, 24: 459−473 doi: 10.1007/s10586-020-03119-w
    [8]
    石丹. 大数据时代数据权属及其保护路径研究[J]. 西安交通大学学报:社会科学版,2018,38(3):78−85

    Shi Dan. Research on data ownership and protection path in the age of big data[J]. Journal of Xi’an Jiaotong University: Social Science Edition, 2018, 38(3): 78−85 (in Chinese)
    [9]
    Maesa D D F, Mori P. Blockchain 3.0 applications survey[J]. Journal of Parallel and Distributed Computing, 2020, 138(12): 99−114
    [10]
    Wendl M, Doan M H, Sassen R. The environmental impact of cryptocurrencies using proof of work and proof of stake consensus algorithms: A systematic review[J]. Journal of Environmental Management, 2023, 326: 116530 doi: 10.1016/j.jenvman.2022.116530
    [11]
    应臣浩,夏福源,李颉,等. 区块链群智感知中基于隐私数据真值估计的激励机制[J]. 计算机研究与发展,2022,59(10):2212−2232 doi: 10.7544/issn1000-1239.20220493

    Ying Chenhao, Xia Fuyuan, Li Jie, et al. Incentive mechanism based on truth estimation of private data for blockchain-based mobile crowdsensing[J]. Journal of Computer Research and Development, 2022, 59(10): 2212−2232 (in Chinese) doi: 10.7544/issn1000-1239.20220493
    [12]
    Chernyavskiy A, Ilvovsky D. Extract and aggregate: A novel domain-independent approach to factual data verification[C]//Proc of the 2nd Workshop on Fact Extraction and VERification (FEVER). Stroudsburg, PA: ACL, 2019: 69−78
    [13]
    Xiao Yang, Zhang Ning, Li Jin, et al. PrivacyGuard: Enforcing private data usage control with blockchain and attested off-chain contract execution[C]//Proc of the 25th European Symp on Research in Computer Security. Berlin: Springer, 2020: 610−629
    [14]
    Yao Xin, Yan Xiaoping, Zhao Ming. Authenticity verification for dynamic social data outsourcing[J]. IEEE Systems Journal, 2021, 16(2): 2325−2335
    [15]
    Liu Jinhui, Yu Yong, Bi Hongliang, et al. Post quantum secure fair data trading with deterability based on machine learning[J]. Science China Information Sciences, 2022, 65(7): 170308 doi: 10.1007/s11432-021-3441-y
    [16]
    Li Yanan, Feng Xiaotao, Xie Jan, et al. A decentralized and secure blockchain platform for open fair data trading[J]. Concurrency and Computation: Practice and Experience, 2020, 32(7): e5578 doi: 10.1002/cpe.5578
    [17]
    赵志伟. 基于区块链的个人数据交易隐私保护研究[D]. 成都:电子科技大学,2020

    Zhao Zhiwei. Research on the privacy protection of personal data trading based on blockchain [D]. Chengdu: University of Electronic Science and Technology of China, 2020 (in Chinese)
    [18]
    夏昌琳. 基于区块链技术的物联网数据交易系统[D]. 南京:南京邮电大学,2020

    Xia Changlin. Internet of things data trading system based on blockchain technology [D]. Nanjing: Nanjing University of Posts and Telecommunications, 2020 (in Chinese)
    [19]
    Knauth T, Steiner M, Chakrabarti S, et al. Integrating remote attestation with transport layer security [J]. arXiv preprint, arXiv: 1801.05863, 2018
    [20]
    Sardar M U, Fetzer C. Towards formalization of enhanced privacy ID (EPID)-based remote attestation in Intel SGX[C]//Proc of the 23rd Euromicro Conf on Digital System Design (DSD). Piscataway, NJ: IEEE, 2020: 604−607
    [21]
    Karande V, Bauman E, Lin Zhiqiang, et al. SGX-Log: Securing system logs with SGX[C]//Proc of the 2017 ACM on Asia Conf on Computer and Communications Security. New York: ACM, 2017: 19−30
    [22]
    Kuang Boyu, Fu Anmin, Susilo W, et al. A survey of remote attestation in Internet of things: Attacks, countermeasures, and prospects[J]. Computers & Security, 2022, 112: 102498
    [23]
    Lei Hong, Bao Zijian, Wang Qinghao, et al. SDABS: A secure cloud data auditing scheme based on blockchain and SGX[C]//Proc of the 2nd Blockchain and Trustworthy Systems. Berlin: Springer, 2020: 269−281
    [24]
    Dai Weiqi, Dai Chunkai, Choo K K R, et al. SDTE: A secure blockchain-based data trading ecosystem[J]. IEEE Transactions on Information Forensics and Security, 2019, 15: 725−737
  • Related Articles

    [1]Fang Haotian, Li Chunhua, Wang Qing, Zhou Ke. A Method of Microservice Performance Anomaly Detection Based on Deep Learning[J]. Journal of Computer Research and Development, 2024, 61(3): 600-613. DOI: 10.7544/issn1000-1239.202330543
    [2]Yue Wenjing, Qu Wenwen, Lin Kuan, Wang Xiaoling. Survey of Cardinality Estimation Techniques Based on Machine Learning[J]. Journal of Computer Research and Development, 2024, 61(2): 413-427. DOI: 10.7544/issn1000-1239.202220649
    [3]Wang Rui, Qi Jianpeng, Chen Liang, Yang Long. Survey of Collaborative Inference for Edge Intelligence[J]. Journal of Computer Research and Development, 2023, 60(2): 398-414. DOI: 10.7544/issn1000-1239.202110867
    [4]Liu Qixu, Chen Yanhui, Ni Jieshuo, Luo Cheng, Liu Caiyun, Cao Yaqin, Tan Ru, Feng Yun, Zhang Yue. Survey on Machine Learning-Based Anomaly Detection for Industrial Internet[J]. Journal of Computer Research and Development, 2022, 59(5): 994-1014. DOI: 10.7544/issn1000-1239.20211147
    [5]Wang Jialai, Zhang Chao, Qi Xuyan, Rong Yi. A Survey of Intelligent Malware Detection on Windows Platform[J]. Journal of Computer Research and Development, 2021, 58(5): 977-994. DOI: 10.7544/issn1000-1239.2021.20200964
    [6]Chen Kerui, Meng Xiaofeng. Interpretation and Understanding in Machine Learning[J]. Journal of Computer Research and Development, 2020, 57(9): 1971-1986. DOI: 10.7544/issn1000-1239.2020.20190456
    [7]Liu Chenyi, Xu Mingwei, Geng Nan, Zhang Xiang. A Survey on Machine Learning Based Routing Algorithms[J]. Journal of Computer Research and Development, 2020, 57(4): 671-687. DOI: 10.7544/issn1000-1239.2020.20190866
    [8]Liu Junxu, Meng Xiaofeng. Survey on Privacy-Preserving Machine Learning[J]. Journal of Computer Research and Development, 2020, 57(2): 346-362. DOI: 10.7544/issn1000-1239.2020.20190455
    [9]Xu Xiaoxiang, Li Fanzhang, Zhang Li, Zhang Zhao. The Category Representation of Machine Learning Algorithm[J]. Journal of Computer Research and Development, 2017, 54(11): 2567-2575. DOI: 10.7544/issn1000-1239.2017.20160350
    [10]Wen Guihua. Relative Transformation for Machine Learning[J]. Journal of Computer Research and Development, 2008, 45(4): 612-618.

Catalog

    Article views (167) PDF downloads (50) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return