Detailed Information

Cited 12 time in webofscience Cited 17 time in scopus
Metadata Downloads

The Analysis of Financial Network Transaction Risk Control Based on Blockchain and Edge Computing Technology

Full metadata record
DC Field Value Language
dc.contributor.authorLi, Zhezhou-
dc.contributor.authorLiang, Xiaolong-
dc.contributor.authorWen, Qiyuan-
dc.contributor.authorWan, Enze-
dc.date.accessioned2024-03-24T02:31:31Z-
dc.date.available2024-03-24T02:31:31Z-
dc.date.issued2024-02-
dc.identifier.issn0018-9391-
dc.identifier.issn1558-0040-
dc.identifier.urihttps://scholarworks.gnu.ac.kr/handle/sw.gnu/70045-
dc.description.abstractThis article explores security vulnerabilities within financial network transactions, specifically addressing the challenges associated with utilizing blockchain technology (BCT) on mobile terminal devices. First, the definition and functions of supply chain finance (SCF) are introduced, and a theoretical framework for risk mitigation of financial network transactions is established, combining BCT with edge computing (EC). Second, an anonymous storage protocol for financial network transaction data and a trusted data synchronization system based on BCT and EC are proposed. These two methods are anticipated to yield advancements in bolstering the security landscape of financial network transactions to a notable extent. At the same time, it shows the application of risk control of financial network transactions based on EC and BCT in the SCF field. Finally, the experimental design validates the protocol's efficacy and the system's operational capabilities. The experimental findings unveil that the round-trip time for the system workflow remains under 215 ms, exhibiting negligible latency within the system. Remarkably, the anonymous storage protocol applied to financial network transaction data substantially mitigates the temporal overhead associated with encrypting and transmitting information. Besides, it can effectively resist external attacks, EC device attacks, Man-in-the-Middle attacks, and replay attacks, with high security. This work contributes valuable ideas and methodologies for risk control management and the SCF field of financial network transactions. © 1988-2012 IEEE.-
dc.format.extent22-
dc.language영어-
dc.language.isoENG-
dc.publisherInstitute of Electrical and Electronics Engineers-
dc.titleThe Analysis of Financial Network Transaction Risk Control Based on Blockchain and Edge Computing Technology-
dc.typeArticle-
dc.publisher.location미국-
dc.identifier.doi10.1109/TEM.2024.3364832-
dc.identifier.scopusid2-s2.0-85187244114-
dc.identifier.wosid001180684600003-
dc.identifier.bibliographicCitationIEEE Transactions on Engineering Management, v.71, pp 5669 - 5690-
dc.citation.titleIEEE Transactions on Engineering Management-
dc.citation.volume71-
dc.citation.startPage5669-
dc.citation.endPage5690-
dc.type.docTypeArticle-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassssci-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaBusiness & Economics-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalWebOfScienceCategoryBusiness-
dc.relation.journalWebOfScienceCategoryEngineering, Industrial-
dc.relation.journalWebOfScienceCategoryManagement-
dc.subject.keywordPlusSUPPLY CHAIN FINANCE-
dc.subject.keywordPlusMANAGEMENT OPPORTUNITIES-
dc.subject.keywordPlusSTRATEGY-
dc.subject.keywordAuthorBlockchain-
dc.subject.keywordAuthoredge computing (EC)-
dc.subject.keywordAuthorfinancial network transaction-
dc.subject.keywordAuthornetwork security-
dc.subject.keywordAuthorrisk management-
Files in This Item
There are no files associated with this item.
Appears in
Collections
학과간협동과정 > 지식재산융합학과 > Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE