scispace - formally typeset
Search or ask a question
Author

Jianming Zhu

Bio: Jianming Zhu is an academic researcher from Central University of Finance and Economics. The author has contributed to research in topics: Blockchain & Big data. The author has an hindex of 3, co-authored 4 publications receiving 28 citations.

Papers
More filters
Proceedings ArticleDOI
01 Aug 2018
TL;DR: The results of correctness and security analysis showed that this scheme can provide new technical ideas and methods for big data sharing and data trace.
Abstract: The existing data sharing models have some issues such as poor transparency of data transactions, data without security assurance and lacking of effective data tracking methods. This paper proposed a brand-new data sharing scheme based on blockchain technology. Firstly, a blockchain double-chain structure about blockchain was introduced, one chain was used to store the original data and another was used to store transaction data generated by transactions. This structure separated the original data storage and data transactions. Secondly, combined with proxy re-encryption technology, safe and reliable data sharing were achieved. Finally, a new design was implemented. The logical structure of data transaction records enables data to be traced. The results of correctness and security analysis showed that this scheme can provide new technical ideas and methods for big data sharing and data trace.

42 citations

Proceedings ArticleDOI
01 Aug 2018
TL;DR: It is concluded that the blockchain platform can greatly increase the user's trust in the project, enhance the system's cleanliness coefficient and increase the quality of philanthropically raised materials, thereby improving the public welfare of charitable donations.
Abstract: Focusing on the overlapping areas of the logistics industry with a large number of mature blockchain applications and the public welfare industry that requires high transparency and credibility, this paper designs and implements an innovative philanthropy logistics platform based on blockchain technology through the Ethereum platform. Our platform makes use of the open, transparent, and irrevocable features of the blockchain, combined with a unique Responsibility Relay System and Evaluation and Reporting Mechanism, and can achieve the consistency of the data on the chain with real-world status, as well as the authenticity and transparency of philanthropy logistics data. This paper also establishes a model for evaluating philanthropy material donations for social welfare based on the classic network maximum flow algorithm. After four months of empirical analysis, we have concluded that the blockchain platform can greatly increase the user's trust in the project, enhance the system's cleanliness coefficient and increase the quality of philanthropically raised materials, thereby improving the public welfare of charitable donations. The paper draws the conclusion that this blockchain platform is a technical solution for maximizing social welfare.

10 citations

Proceedings ArticleDOI
27 Jul 2015
TL;DR: This paper has analyzed the positive information value of big data in Internet finance business activities, such as the long tail user management, risk supervision, the third party payment, micro credit, crowd funding, online manage money matters, business recommendation, the transaction subject authentication etc, and the negative information value that big data can bring to Internet finance.
Abstract: Internet finance is an emerging area which combines traditional finance industry and Internet spirit. In this paper we have analyzed the positive information value of big data in Internet finance business activities, such as the long tail user management, risk supervision, the third party payment, micro credit, crowd funding, online manage money matters, business recommendation, the transaction subject authentication etc, and the negative information value that big data can bring to Internet finance. In the part of empirical analysis, we make the lenders and the borrowers of micro credit business as an example, to construct the incomplete information static game model, for proving big data have the information value in Internet finance business activities, and illustrate the information value of big data by instance data.

3 citations

Proceedings ArticleDOI
27 Jul 2015
TL;DR: This paper applies game theory to analyze the possibility of the attackers' attacks and suggests the defensive strategies for the defenders.
Abstract: Using the social media services is becoming more and more popular nowadays. For companies and their employees, they communicate with customers and colleagues with the new ways of social media. More and more people tend to use mobile social media service at any time and any place but mobile virus and malware are dramatically increasing in frequency. The mobile social media has become a very popular attack target of attackers because of the security risks associated with mobile social media. The information security administrators of companies must take security solutions to defend against these sophisticated attackers. This paper applies game theory to analyze the possibility of the attackers' attacks and suggests the defensive strategies for the defenders.

1 citations


Cited by
More filters
Book ChapterDOI
01 Jan 2014
TL;DR: This chapter is devoted to a more detailed examination of game theory, and two game theoretic scenarios were examined: Simultaneous-move and multi-stage games.
Abstract: This chapter is devoted to a more detailed examination of game theory. Game theory is an important tool for analyzing strategic behavior, is concerned with how individuals make decisions when they recognize that their actions affect, and are affected by, the actions of other individuals or groups. Strategic behavior recognizes that the decision-making process is frequently mutually interdependent. Game theory is the study of the strategic behavior involving the interaction of two or more individuals, teams, or firms, usually referred to as players. Two game theoretic scenarios were examined in this chapter: Simultaneous-move and multi-stage games. In simultaneous-move games the players effectively move at the same time. A normal-form game summarizes the players, possible strategies and payoffs from alternative strategies in a simultaneous-move game. Simultaneous-move games may be either noncooperative or cooperative. In contrast to noncooperative games, players of cooperative games engage in collusive behavior. A Nash equilibrium, which is a solution to a problem in game theory, occurs when the players’ payoffs cannot be improved by changing strategies. Simultaneous-move games may be either one-shot or repeated games. One-shot games are played only once. Repeated games are games that are played more than once. Infinitely-repeated games are played over and over again without end. Finitely-repeated games are played a limited number of times. Finitely-repeated games have certain or uncertain ends.

814 citations

Journal ArticleDOI
TL;DR: A taxonomy of blockchain business models based on 99 blockchain ventures is developed to explore the impact of blockchain technology on business models and identifies five archetypal patterns, which enhance understanding of how blockchain technology affects existing and creates new business models.
Abstract: Blockchain technology enables new ways of organizing economic activities, reduces costs and time associated with intermediaries, and strengthens the trust in an ecosystem of actors. The impact of this seminal technology is reflected by an upcoming research stream and various firms that examine the potential uses of blockchain technology. While there are promising use cases of this new technology, research and practice are still in their infancy about altering existing and creating new business models. We develop a taxonomy of blockchain business models based on 99 blockchain ventures to explore the impact of blockchain technology on business models. As a result, we identify five archetypal patterns, which enhance our understanding of how blockchain technology affects existing and creates new business models. We propose to use these results to discover further patterns fueled by blockchain technology and illustrate how firms can use blockchain technology to innovate their business models.

100 citations

Journal ArticleDOI
TL;DR: An in-depth survey of BCoT applications in different use-case domains such as smart healthcare, smart city, smart transportation and smart industry is provided and some important research challenges and future directions are highlighted to spur further research in this promising area.
Abstract: The blockchain technology is taking the world by storm. Blockchain with its decentralized, transparent and secure nature has emerged as a disruptive technology for the next generation of numerous industrial applications. One of them is Cloud of Things enabled by the combination of cloud computing and Internet of Things. In this context, blockchain provides innovative solutions to address challenges in Cloud of Things in terms of decentralization, data privacy and network security, while Cloud of Things offer elasticity and scalability functionalities to improve the efficiency of blockchain operations. Therefore, a novel paradigm of blockchain and Cloud of Things integration, called BCoT, has been widely regarded as a promising enabler for a wide range of application scenarios. In this article, we present a state-of-the-art review on the BCoT integration to provide general readers with an overview of the BCoT in various aspects, including background knowledge, motivation, and integrated architecture. Particularly, we also provide an in-depth survey of BCoT applications in different use-case domains such as smart healthcare, smart city, smart transportation and smart industry. Then, we review the recent BCoT developments with the emerging blockchain and cloud platforms, services, and research projects. Finally, some important research challenges and future directions are highlighted to spur further research in this promising area.

81 citations

Journal ArticleDOI
TL;DR: This paper proposes a data sharing incentive model based on evolutionary game theory using blockchain with smart contract that can dynamically control the excitation parameters and continuously encourages users to participate in data sharing.

80 citations

Journal ArticleDOI
TL;DR: This paper proposes a blockchain-enabled accountability mechanism against information leakage in the content-sharing services of the vertical industry services and uses the blockchain technology to ensure that service providers and clients can securely and fairly generate and share watermarked content.
Abstract: The emergence of 5 G technology contributes to create more open and efficient eco-systems for various vertical industries. Especially, it significantly improves the capabilities of the vertical industries focusing on content-sharing services like mobile telemedicine, etc. However, cyber threats such as information leakage or piracy are more likely to occur in an open 5 G networks. So tracking information leakage in 5 G environments has become a daunting task. The existing tracing and accountability schemes have nonnegligible limitations in practice due to the dependence on a Trusted Third Party (TTP) or being encumbered with the significant overhead. Fortunately, the blockchain helps to mitigate these problems. In this paper, we propose a blockchain-enabled accountability mechanism against information leakage in the content-sharing services of the vertical industry services. For any information converted to vector form, we use the blockchain technology to ensure that service providers and clients can securely and fairly generate and share watermarked content. Besides, the homomorphic encryption is introduced to avoid the disclosure of the watermarking content, which guarantees the subsequent TTP-free arbitration. Finally, we theoretically analyze the security of the scheme and verify its performance.

77 citations