Cited 17 time in
The Analysis of Financial Network Transaction Risk Control Based on Blockchain and Edge Computing Technology
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Li, Zhezhou | - |
| dc.contributor.author | Liang, Xiaolong | - |
| dc.contributor.author | Wen, Qiyuan | - |
| dc.contributor.author | Wan, Enze | - |
| dc.date.accessioned | 2024-03-24T02:31:31Z | - |
| dc.date.available | 2024-03-24T02:31:31Z | - |
| dc.date.issued | 2024-02 | - |
| dc.identifier.issn | 0018-9391 | - |
| dc.identifier.issn | 1558-0040 | - |
| dc.identifier.uri | https://scholarworks.gnu.ac.kr/handle/sw.gnu/70045 | - |
| dc.description.abstract | This article explores security vulnerabilities within financial network transactions, specifically addressing the challenges associated with utilizing blockchain technology (BCT) on mobile terminal devices. First, the definition and functions of supply chain finance (SCF) are introduced, and a theoretical framework for risk mitigation of financial network transactions is established, combining BCT with edge computing (EC). Second, an anonymous storage protocol for financial network transaction data and a trusted data synchronization system based on BCT and EC are proposed. These two methods are anticipated to yield advancements in bolstering the security landscape of financial network transactions to a notable extent. At the same time, it shows the application of risk control of financial network transactions based on EC and BCT in the SCF field. Finally, the experimental design validates the protocol's efficacy and the system's operational capabilities. The experimental findings unveil that the round-trip time for the system workflow remains under 215 ms, exhibiting negligible latency within the system. Remarkably, the anonymous storage protocol applied to financial network transaction data substantially mitigates the temporal overhead associated with encrypting and transmitting information. Besides, it can effectively resist external attacks, EC device attacks, Man-in-the-Middle attacks, and replay attacks, with high security. This work contributes valuable ideas and methodologies for risk control management and the SCF field of financial network transactions. © 1988-2012 IEEE. | - |
| dc.format.extent | 22 | - |
| dc.language | 영어 | - |
| dc.language.iso | ENG | - |
| dc.publisher | Institute of Electrical and Electronics Engineers | - |
| dc.title | The Analysis of Financial Network Transaction Risk Control Based on Blockchain and Edge Computing Technology | - |
| dc.type | Article | - |
| dc.publisher.location | 미국 | - |
| dc.identifier.doi | 10.1109/TEM.2024.3364832 | - |
| dc.identifier.scopusid | 2-s2.0-85187244114 | - |
| dc.identifier.wosid | 001180684600003 | - |
| dc.identifier.bibliographicCitation | IEEE Transactions on Engineering Management, v.71, pp 5669 - 5690 | - |
| dc.citation.title | IEEE Transactions on Engineering Management | - |
| dc.citation.volume | 71 | - |
| dc.citation.startPage | 5669 | - |
| dc.citation.endPage | 5690 | - |
| dc.type.docType | Article | - |
| dc.description.isOpenAccess | N | - |
| dc.description.journalRegisteredClass | scie | - |
| dc.description.journalRegisteredClass | ssci | - |
| dc.description.journalRegisteredClass | scopus | - |
| dc.relation.journalResearchArea | Business & Economics | - |
| dc.relation.journalResearchArea | Engineering | - |
| dc.relation.journalWebOfScienceCategory | Business | - |
| dc.relation.journalWebOfScienceCategory | Engineering, Industrial | - |
| dc.relation.journalWebOfScienceCategory | Management | - |
| dc.subject.keywordPlus | SUPPLY CHAIN FINANCE | - |
| dc.subject.keywordPlus | MANAGEMENT OPPORTUNITIES | - |
| dc.subject.keywordPlus | STRATEGY | - |
| dc.subject.keywordAuthor | Blockchain | - |
| dc.subject.keywordAuthor | edge computing (EC) | - |
| dc.subject.keywordAuthor | financial network transaction | - |
| dc.subject.keywordAuthor | network security | - |
| dc.subject.keywordAuthor | risk management | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
Gyeongsang National University Central Library, 501, Jinju-daero, Jinju-si, Gyeongsangnam-do, 52828, Republic of Korea+82-55-772-0532
COPYRIGHT 2022 GYEONGSANG NATIONAL UNIVERSITY LIBRARY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.
