A master-slave blockchain paradigm and application in digital rights management
- 16 August 2018
- journal article
- research article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in China Communications
- Vol. 15 (8), 174-188
- https://doi.org/10.1109/cc.2018.8438282
Abstract
Upon flaws of current blockchain platforms of heavyweight, large capacity of ledger, and time-consuming of synchronization of data, in this paper, we proposed a new paradigm of master-slave blockchain scheme (MSB) for pervasive computing that suitable for general PC, mobile device such as smart phones or PADs to participants in the working of mining and verification, in which we separated traditional blockchain model in 2 layer defined as master node layer and a series of slavery agents layer, then we proposed 2 approaches for partially computing model(P-CM) and non-computing of model(NCM) in the MSB blockchain, Finally large amounts of simulations manifest the proposed master-slave blockchain scheme is feasible, extendible and suitable for pervasive computing especially in the 5G generation environment, and can apply in the DRM-related applications.Keywords
This publication has 8 references indexed in Scilit:
- BlockChain: A Distributed Solution to Automotive Security and PrivacyIEEE Communications Magazine, 2017
- Blockchain beyond bitcoinCommunications of the ACM, 2016
- A Secure Sharding Protocol For Open BlockchainsPublished by Association for Computing Machinery (ACM) ,2016
- Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart ContractsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2016
- Towards property-based consistency verificationPublished by Association for Computing Machinery (ACM) ,2016
- Decentralizing Privacy: Using Blockchain to Protect Personal DataPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2015
- The promise and perils of digital currenciesInternational Journal of Critical Infrastructure Protection, 2013
- Decoding digital rights managementComputers & Security, 2007