A Research on the Sharing Platform of Wild Bird Data in Yunnan Province Based on Blockchain and Interstellar File System
<p>Blockchain-based open platform architecture for bird data.</p> "> Figure 2
<p>Blockchain- and IPFS-based data storage model for birds.</p> "> Figure 3
<p>Schematic diagram of Stachyris nigriceps data uploading to the blockchain.</p> "> Figure 4
<p>Blockchain and IPFS-based data sharing model for birds.</p> "> Figure 5
<p>User upload and download interface.</p> "> Figure 6
<p>Sample instance pattern.</p> "> Figure 7
<p>Third-party authorization authentication pattern.</p> "> Figure 8
<p>Blockchain-based data storage model for birds.</p> "> Figure 9
<p>Schematic diagram of Dinopium data uplink based on Pattern III.</p> "> Figure 10
<p>Time test of Pattern I.</p> "> Figure 11
<p>Time test of Pattern II.</p> "> Figure 12
<p>Time test of Pattern III.</p> "> Figure 13
<p>Time test of Pattern IV.</p> "> Figure 14
<p>Histogram of time consumption of data storage in the four patterns with different file sizes.</p> ">
Abstract
:1. Introduction
2. Related Work
2.1. Smart Contract
2.2. Consensus Mechanism
2.3. InterPlanetary File System
2.4. BigchainDB
- (1)
- User data are stored on the BigchainDB network and cannot be altered or erased.
- (2)
- The concept of the BigchainDB owner controlling an asset implies that only the owner of the asset can transfer the asset.
- (3)
- The ability to process large numbers of transactions per second has always been one of the design goals of BigchainDB, and the BigchainDB network can include transactions in newly committed blocks in just a few seconds.
- (4)
- Each node in the BigchainDB 2.0 network has its own local MongoDB database. Every node operator can use the full power of MongoDB to index and query stored data.
3. Platform Architecture and Module Design
3.1. Platform Architecture
- User module
- 2.
- Open Services
- 3.
- Blockchain-based open platform for bird data
3.2. Platform Module Design
3.2.1. Basic Management Module
3.2.2. Open Services
3.2.3. Data Layer
3.2.4. Consensus Layer
3.2.5. Network Layer
3.2.6. Matching Services
3.3. Blockchain- and IPFS-Based Data Storage Model for Birds
- Large files occupy a large amount of bandwidth during network transmission, which degrades somewhat the input-output performance of the blockchain network.
- Hypertext data require more time for data unchaining, which reduces the efficiency of data up-chaining and consumes extra time when physical users or scientific institutions pull the complete data into the blockchain.
3.4. Blockchain- and IPFS-Based Data-Sharing Model for Birds
3.5. Web Interface Service Design
3.6. User Interface
4. Experiment
4.1. Sample Instance Pattern
4.2. Third-Party Authorization Authentication Pattern
- The user requests the third-party trust authority with its secret key.
- The third-party authority confirms the authentication.
- The third-party organization returns the result message and token to the user.
- The user uses the message and token to request the data storage service.
- The data storage service requests the third-party institution to verify the message and token.
- The third-party trust authority revalidates the token.
- After verification, the third-party trust agency returns the result to the data-storage service.
- The data-storage service processes and handles the data.
- The data-storage service returns the storage result.
4.3. Blockchain-Based Bird-Data-Storage Pattern
4.4. Service Resource
5. Experimental Results and Analysis
6. Conclusions
Supplementary Materials
Author Contributions
Funding
Institutional Review Board Statement
Conflicts of Interest
References
- Alsunaidi, S.J.; Almuhaideb, A.M.; Ibrahim, N.M.; Shaikh, F.S.; Alqudaihi, K.S.; Alhaidari, F.A.; Khan, I.U.; Aslam, N.; Alshahrani, M.S. Applications of big data analytics to control COVID-19 pandemic. Sensors 2021, 21, 2282. [Google Scholar] [CrossRef] [PubMed]
- Fang, H.; Zhang, Z.; Wang, C.J.; Daneshmand, M.; Wang, C.; Wang, H. A survey of big data research. IEEE Netw. 2015, 29, 6–9. [Google Scholar] [CrossRef] [PubMed]
- Hashem, I.A.T.; Yaqoob, I.; Anuar, N.B.; Mokhtar, S.; Gani, A.; Khan, S.U. The rise of “big data” on cloud computing: Review and open research issues. Inf. Syst. 2015, 47, 98–115. [Google Scholar] [CrossRef]
- Lei, G. What is systematics. Syst. Sci. Math. 2016, 36, 291–301. [Google Scholar]
- Liao, H.; Tang, M.; Luo, L.; Li, C.; Chiclana, F.; Zeng, X.J. A Bibliometric Analysis and Visualization of Medical Big Data Research. Sustainability 2018, 10, 166. [Google Scholar] [CrossRef]
- Xiuguang, Z.; Zhengdao, L. Prospective analysis and challenges of “blockchain+Internet” in the financial field. Manag. Mod. 2016, 36, 4–6. [Google Scholar]
- Wang, X.; Ren, J.Y.; Wang, H. Refined simulation study of regional economic spatial pattern based on multi-source remote sensing data support—Jinan city as an example. Land Nat. Resour. Res. 2021, 64–68. [Google Scholar] [CrossRef]
- Yuan, C. Research on agro-climate and crop yield changes based on big data analysis. China Agric. Resour. Zoning 2017, 38, 112–117. [Google Scholar]
- Pascual, A.; Rivera, R.; Gómez, R.; Domínguez-Lerena, S. Monitoring water-soil dynamics and tree survival using soil sensors under a big data approach. Sensors 2019, 19, 4634. [Google Scholar] [CrossRef]
- Chen, D.; Hong, Z. Data Security and Privacy Protection Issues in Cloud Computing. In Proceedings of the International Conference on Computer Science & Electronics Engineering, Hangzhou, China, 23–25 March 2012; IEEE: Piscataway, NJ, USA, 2014; pp. 39–44. [Google Scholar]
- Chi, J.; Li, Y.; Huang, J.; Liu, J.; Jin, Y.; Chen, C.; Qiu, T. A secure and efficient data sharing scheme based on blockchain in industrial Internet of Things. J. Netw. Comput. Appl. 2020, 167, 102710. [Google Scholar] [CrossRef]
- Mukherjee, M.; Matam, R.; Shu, L.; Maglaras, L.; Ferrag, M.A.; Choudhury, N.; Kumar, V. Security and privacy in fog computing: Challenges. IEEE Access 2017, 5, 19293–19304. [Google Scholar] [CrossRef]
- Dinh, T.T.A.; Liu, R.; Zhang, M.; Chen, G.; Ooi, B.C.; Wang, J. Untangling blockchain: A data processing view of blockchain systems. IEEE Trans. Knowl. Data Eng. 2018, 30, 1366–1385. [Google Scholar] [CrossRef]
- Alwakeel, A.M. An overview of fog computing and edge computing security and privacy issues. Sensors 2021, 21, 8226. [Google Scholar] [CrossRef]
- Li, M.; Chen, Y.; Lal, C.; Conti, M.; Alazab, M.; Hu, D. Eunomia: Anonymous and secure vehicular digital forensics based on blockchain. IEEE Trans. Dependable Secur. Comput. 2021, 1. [Google Scholar] [CrossRef]
- Zuo, C.; Wang, W.; Lin, Z.; Wang, R. Automatic Forgery of Cryptographically Consistent Messages to Identify Security Vulnerabilities in Mobile Services. In Proceedings of the NDSS, San Diego, CA, USA, 21–24 February 2016. [Google Scholar]
- Marshall, A.M.; Tompsett, B.C. Identity theft in an online world. Comput. Law Secur. Rev. 2005, 21, 128–137. [Google Scholar] [CrossRef]
- Li, Y.; Luo, Q.; Liu, J.; Guo, H.; Kato, N. TSP security in intelligent and connected vehicles: Challenges and solutions. IEEE Wirel. Commun. 2019, 26, 125–131. [Google Scholar] [CrossRef]
- He, D.; Wang, H.; Zhang, J.; Wang, L. Insecurity of an identity-based public auditing protocol for the outsourced data in cloud storage. Inf. Sci. 2017, 375, 48–53. [Google Scholar] [CrossRef]
- Ali, M.S.; Dolui, K.; Antonelli, F. IoT data privacy via blockchains and IPFS. In Proceedings of the Seventh International Conference on the Internet of Things, Linz, Austria, 22–25 October 2017; pp. 1–7. [Google Scholar]
- Benet, J. Ipfs-content addressed, versioned, p2p file system. arXiv 2014, arXiv:1407.3561. [Google Scholar]
- Nizamuddin, N.; Hasan, H.R.; Salah, K. IPFS-blockchain-based authenticity of online publications. In Proceedings of the International Conference on Blockchain, Halifax, NS, Canada, 30 July–3 August 2018; Springer: Cham, Switzerland, 2018; pp. 199–212. [Google Scholar]
- Tenorio-Fornés, A.; Jacynycz, V.; Llop-Vila, D.; Sánchez-Ruiz, A.; Hassan, S. Towards a decentralized process for scientific publication and peer review using blockchain and IPFS. In Proceedings of the 52nd Hawaii International Conference on System Sciences, Maui, HI, USA, 8–11 January 2019. [Google Scholar]
- McConaghy, T.; Marques, R.; Müller, A.; De Jonghe, D.; McConaghy, T.; McMullen, G.; Henderson, R.; Bellemare, S.; Granzotto, A. Bigchaindb: A scalable blockchain database. White Paper, BigChainDB. 2016. Available online: https://git.berlin/bigchaindb/site/raw/commit/b2d98401b65175f0fe0c169932ddca0b98a456a6/_src/whitepaper/bigchaindb-whitepaper.pdf (accessed on 1 August 2022).
- Dos Santos, R.B.; Torrisi, N.M.; Pantoni, R.P. Third party certification of agri-food supply chain using smart contracts and blockchain tokens. Sensors 2021, 21, 5307. [Google Scholar] [CrossRef] [PubMed]
- Zheng, Z.; Xie, S.; Dai, H.N.; Chen, W.; Chen, X.; Weng, J.; Imran, M. An overview on smart contracts: Challenges, advances and platforms. Future Gener. Comput. Syst. 2020, 105, 475–491. [Google Scholar] [CrossRef]
- Tsankov, P.; Dan, A.; Drachsler-Cohen, D.; Gervais, A.; Buenzli, F.; Vechev, M. Securify: Practical security analysis of smart contracts. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, Toronto, ON, Canada, 15–19 October 2018; pp. 67–82. [Google Scholar]
- Bodkhe, U.; Mehta, D.; Tanwar, S.; Bhattacharya, P.; Singh, P.K.; Hong, W.C. A survey on decentralized consensus mechanisms for cyber physical systems. IEEE Access 2020, 8, 54371–54401. [Google Scholar] [CrossRef]
- Cao, B.; Li, Y.; Zhang, L.; Zhang, L.; Mumtaz, S.; Zhou, Z.; Peng, M. When Internet of Things meets blockchain: Challenges in distributed consensus. IEEE Netw. 2019, 33, 133–139. [Google Scholar] [CrossRef]
- He, H.W.; Yan, A.; Chen, Z.H. A review of blockchain-based smart contract technologies and applications. Comput. Res. Dev. 2018, 55, 2452–2466. [Google Scholar]
- Wang, S.; Yuan, Y.; Wang, X.; Li, J.; Qin, R.; Wang, F.Y. An overview of smart contract: Architecture, applications, and future trends. In Proceedings of the 2018 IEEE Intelligent Vehicles Symposium (IV), Suzhou, China, 26–30 June 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 108–113. [Google Scholar]
- Hassan, U.F.; Ali, A.; Latif, S.; Qadir, J.; Kanbhere, S.; Singh, J.; Crowcroft, J. Blockchain and the future of the Internet: A comprebensive review. arXiv 2019, arXiv:1904.00733. [Google Scholar]
- Huang, J.; Zhou, K.; Xiong, A.; Li, D. Smart contract vulnerability detection model based on multi-task learning. Sensors 2022, 22, 1829. [Google Scholar] [CrossRef]
- Yadav, A.S.; Singh, N.; Kushwaha, D.S. A scalable trust based consensus mechanism for secure and tamper free property transaction mechanism using DLT. Int. J. Syst. Assur. Eng. Manag. 2022, 13, 735–751. [Google Scholar] [CrossRef]
- Xia, Q.; Dou, W.S.; Guo, K.W.; Liang, G.; Zuo, C.; Zhang, F.J. A review of blockchain consensus protocols. J. Softw. 2021, 32, 277–299. [Google Scholar]
- Lepore, C.; Ceria, M.; Visconti, A.; Rao, U.P.; Shah, K.A.; Zanolini, L. A survey on blockchain consensus with a performance comparison of PoW, PoS and pure PoS. Mathematics 2020, 8, 1782. [Google Scholar] [CrossRef]
- Castro, M.; Liskov, B. Practical byzantine fault tolerance and proactive recovery. ACM Trans. Comput. Syst. 2002, 20, 398–461. [Google Scholar] [CrossRef]
- Yang, F.; Zhou, W.; Wu, Q.; Long, R.; Xiong, N.N.; Zhou, M. Delegated proof of stake with downgrade: A secure and efficient blockchain consensus algorithm with downgrade mechanism. IEEE Access 2019, 7, 118541–118555. [Google Scholar] [CrossRef]
- Mingxiao, D.; Xiaofeng, M.; Zhe, Z.; Xiangwei, W.; Qijun, C. A review on consensus algorithm of blockchain. In Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics (SMC), Banff, AB, Canada, 5–8 October 2017; IEEE: Piscataway, NJ, USA, 2017; pp. 2567–2572. [Google Scholar]
- Kaashoek, M.F.; Karger, D.R. Koorde: A simple degree-optimal distributed hash table. In Proceedings of the International Workshop on Peer-to-Peer Systems, Berkeley, CA, USA, 21–22 February 2003; Springer: Berlin/Heidelberg, Germany, 2003; pp. 98–107. [Google Scholar]
- Mazieres, D.; Kaashoek, M.F. Escaping the evils of centralized control with self-certifying pathnames. In Proceedings of the 8th ACM SIGOPS European workshop on Support for Composing Distributed Applications, Sintra, Portugal, 7–10 September 1998; pp. 118–125. [Google Scholar]
- Khan, J.A.; Bangalore, K.U.; Kurkcu, A.; Ozbay, K. TREAD: Privacy preserving incentivized connected vehicle mobility data storage on interplanetary-file-system-enabled blockchain. Transp. Res. Rec. 2022, 2676, 680–691. [Google Scholar] [CrossRef]
- Borah, M.D.; Naik, V.B.; Patgiri, R.; Bhargav, A.; Phukan, B.; Basani, S.G. Supply chain management in agriculture using blockchain and IoT. In Advanced Applications of Blockchain Technology; Springer: Singapore, 2020; pp. 227–242. [Google Scholar]
- Yili, Z.; Yucheng, L.; Hao, C. Automatic image recognition system for wild birds in Yunnan. Comput. Appl. Res. 2020, 37, 423–425. [Google Scholar]
Pattern Name | Benefits | Inadequate |
---|---|---|
Bird data storage pattern based on blockchain and IPFS | 1: Decentralized. Each node in the network is independent and equal in the blockchain network 2: Secure and reliable. The blockchain is deployed in a distributed manner, with each node in the network having data on the blockchain 3: IPFS can integrate the same files in data sharing and storage, reducing the redundancy of file data, thus saving the storage control of cloud service resources | 1: Large files occupy a large amount of bandwidth during network transmission 2: Hypertext data require more time for data to unchain |
Interface Name | Type | Function Description |
---|---|---|
/open/ipfs/v1/getDocumentByAddress | GET | Search documents by address |
/open/ipfs/v1/insertDocument | POST | Storage files |
/open/ipfs/v1/updateDocument | POST | Update files |
/open/bigchaindb/v1/getIndividualDetail | GET | Obtain information about users on the blockchain |
/open/bigchaindb/v1/getPeerStatus | GET | Query Node Status |
/open/bigchaindb/v1/registerIndividualAccount | POST | Register Account |
/open/bigchaindb/v1/configChainProperties | POST | Configure blockchain property files |
Response Code | Response Message | Processing Method |
---|---|---|
0 | Success | Response successful |
400001 | TS_AUTH_ERROR | Authentication error |
400002 | TS_ENCRYPTION_EXCEPTION | Decryption exceptions |
400003 | TS_PEER_EXCEPTION | Node Anomaly |
…… | …… | …… |
500001 | TS_REQUEST_FREQUENCY_LIMITED | Request frequency is limited, please try later |
500002 | TS_ERROR_PERMISSION | Insufficient Permissions |
Pattern Name | Benefits | Inadequate |
---|---|---|
Sample Instance Pattern | 1: Basic data storage needs are met 2: Support data transmission to any node of the network via the Internet 3: Data are fully encrypted during data transmission | 1: No mandatory SSL certificate for cloud-based open applications 2: There is a risk of a data breach |
Pattern Name | Benefits | Inadequate |
---|---|---|
Third-party authorization authentication pattern | 1: Basic data storage needs are met 2: There will be a mandatory token bucket policy under high-frequency access | 1: The centralization problem of third-party trust institutions is prominent 2: There will be a mandatory token bucket policy under high-frequency access |
Pattern Name | Benefits | Inadequate |
---|---|---|
Blockchain-based bird data storage pattern | 1: Decentralized. Each node in the network is independent and equal in the blockchain network 2: Secure and reliable. The blockchain is deployed in a distributed manner, with each node in the network having data on the blockchain | 1: Large files will occupy a lot of bandwidth during network transmission, which will affect the performance of the blockchain network |
Service Name | Operating System | Quantity | vCPU | Memory (GB) | Storage (GB) |
---|---|---|---|---|---|
Elastic Computing Instances | Linux 7.2 | 1 | 4 | 8 | 50 |
Elastic Computing Instances | Linux 7.2 | 3 | 8 | 16 | 200 |
Relational Database Instances | Linux 7.2 | 2 | 2 | 4 | 500 |
Service Name | Operating System | Quantity | vCPU | Memory (GB) | Storage (GB) |
---|---|---|---|---|---|
Elastic Computing Instances | Linux 7.2 | 1 | 4 | 8 | 50 |
Elastic Computing Instances | Linux 7.2 | 1 | 2 | 4 | 100 |
Elastic Computing Instances | Linux 7.2 | 6 | 8 | 16 | 200 |
Relational Database Instances | Linux 7.2 | 4 | 2 | 4 | 500 |
Service Name | Operating System | Quantity | vCPU | Memory (GB) | Storage (GB) |
---|---|---|---|---|---|
Elastic Computing Instances | Ubuntu 18.04 | 5 | 8 | 16 | 500 |
Service Name | Operating System | Quantity | vCPU | Memory (GB) | Storage (GB) |
---|---|---|---|---|---|
Elastic Computing Instances | Ubuntu 18.04 | 7 | 8 | 16 | 500 |
Model Name | Comparison with Pattern I | Rank |
---|---|---|
Pattern I | 100% | 1 |
Pattern III | 105.86% | 2 |
Pattern IV | 199.03% | 3 |
Pattern II | 242.82% | 4 |
Model Name | Comparison with Pattern III | Rank |
---|---|---|
Pattern III | 100% | 1 |
Pattern IV | 107.19% | 2 |
Pattern I | 110.28% | 3 |
Pattern II | 223.16% | 4 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Yang, H.; Li, Y.; Zhou, H.; Zhao, Y.; Song, L. A Research on the Sharing Platform of Wild Bird Data in Yunnan Province Based on Blockchain and Interstellar File System. Sensors 2022, 22, 6961. https://doi.org/10.3390/s22186961
Yang H, Li Y, Zhou H, Zhao Y, Song L. A Research on the Sharing Platform of Wild Bird Data in Yunnan Province Based on Blockchain and Interstellar File System. Sensors. 2022; 22(18):6961. https://doi.org/10.3390/s22186961
Chicago/Turabian StyleYang, Huaiyuan, Yucheng Li, Hua Zhou, Yili Zhao, and Lei Song. 2022. "A Research on the Sharing Platform of Wild Bird Data in Yunnan Province Based on Blockchain and Interstellar File System" Sensors 22, no. 18: 6961. https://doi.org/10.3390/s22186961