The Analysis of Financial Network Transaction Risk Control Based on Blockchain and Edge Computing Technology
- Authors
- Li, Zhezhou; Liang, Xiaolong; Wen, Qiyuan; Wan, Enze
- Issue Date
- Feb-2024
- Publisher
- Institute of Electrical and Electronics Engineers
- Keywords
- Blockchain; edge computing (EC); financial network transaction; network security; risk management
- Citation
- IEEE Transactions on Engineering Management, v.71, pp 5669 - 5690
- Pages
- 22
- Indexed
- SCIE
SSCI
SCOPUS
- Journal Title
- IEEE Transactions on Engineering Management
- Volume
- 71
- Start Page
- 5669
- End Page
- 5690
- URI
- https://scholarworks.gnu.ac.kr/handle/sw.gnu/70045
- DOI
- 10.1109/TEM.2024.3364832
- ISSN
- 0018-9391
1558-0040
- Abstract
- This article explores security vulnerabilities within financial network transactions, specifically addressing the challenges associated with utilizing blockchain technology (BCT) on mobile terminal devices. First, the definition and functions of supply chain finance (SCF) are introduced, and a theoretical framework for risk mitigation of financial network transactions is established, combining BCT with edge computing (EC). Second, an anonymous storage protocol for financial network transaction data and a trusted data synchronization system based on BCT and EC are proposed. These two methods are anticipated to yield advancements in bolstering the security landscape of financial network transactions to a notable extent. At the same time, it shows the application of risk control of financial network transactions based on EC and BCT in the SCF field. Finally, the experimental design validates the protocol's efficacy and the system's operational capabilities. The experimental findings unveil that the round-trip time for the system workflow remains under 215 ms, exhibiting negligible latency within the system. Remarkably, the anonymous storage protocol applied to financial network transaction data substantially mitigates the temporal overhead associated with encrypting and transmitting information. Besides, it can effectively resist external attacks, EC device attacks, Man-in-the-Middle attacks, and replay attacks, with high security. This work contributes valuable ideas and methodologies for risk control management and the SCF field of financial network transactions. © 1988-2012 IEEE.
- Files in This Item
- There are no files associated with this item.
- Appears in
Collections - 학과간협동과정 > 지식재산융합학과 > Journal Articles

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.