2019 IEEE International Conference on Blockchain (Blockchain) 2019
DOI: 10.1109/blockchain.2019.00061
|View full text |Cite
|
Sign up to set email alerts
|

Scalable Privacy-Preserving Query Processing over Ethereum Blockchain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 28 publications
(12 citation statements)
references
References 6 publications
0
7
0
Order By: Relevance
“…There are already studies that try to model, although indirectly, blockchain data. Some create easy-to-use interfaces, such as HTTP REST interfaces [Li et al 2017, Pratama andMutijarsa 2018] while others provide SQL interfaces that execute on top of native blockchain clients [Linoy et al 2019, Trihinas 2019. Finally, many studies decide to simply copy the data in order to make it accessible through popular database management systems and its interfaces [Peng et al 2019, Bartoletti et al 2017, Bartoletti et al 2017, Han et al 2019, Zhou et al 2019.…”
Section: Related Workmentioning
confidence: 99%
“…There are already studies that try to model, although indirectly, blockchain data. Some create easy-to-use interfaces, such as HTTP REST interfaces [Li et al 2017, Pratama andMutijarsa 2018] while others provide SQL interfaces that execute on top of native blockchain clients [Linoy et al 2019, Trihinas 2019. Finally, many studies decide to simply copy the data in order to make it accessible through popular database management systems and its interfaces [Peng et al 2019, Bartoletti et al 2017, Bartoletti et al 2017, Han et al 2019, Zhou et al 2019.…”
Section: Related Workmentioning
confidence: 99%
“…Besides, some privacy-preserving schemes that try to leverage 5G technology in blockchain-oriented solutions have been presented [7] , [10] , [11] , [16] , [22] , [26] . We can conclude that more and more researchers are paying attention to solve the privacy issues in 5G-integrated blockchain networks.…”
Section: Related Work and Motivationsmentioning
confidence: 99%
“…[73] Using air-gapped wallet techniques Most secure implementation possible, provides an upper bound on wallet security, can help the user identify the weakest parts of their air-gapped wallet scheme Wallet analysis and quantification [71] Propose a compacted DAG-based blockchain protocol CoDAG that greatly improves the throughput and performance of blockchain Improve the linear structure of traditional blockchain protocol Tune the parameters for better performance; combine with hybrid consensus to improve the throughput further [45] Propose a novel hybrid blockchain crowdsourcing platform to achieve decentralization and privacy preservation Ensure secure communication between their users and the workers, decentralization, and privacy preservation Test the performance of the public chain as well as the interaction between the public chain and the subchains [58] Proposed system uses big data processing techniques Provides a secure, robust, and scalable way to process SQL queries over any blockchain Time delays [16] Proposed a blockchain for mobile communication Secure communication Techniques discussed are time-consuming, not secure [79] Discussing blockchain achievements and future work Helps to find future work in blockchain Other elicitation techniques can also be used, requirement validation is not used [20] Combining the transaction link of energy "Internet with blockchain technology" "Can effectively solve the transaction friction, maintain the order of the market, and guarantee the legitimacy of the transaction" Not covering all the application areas [44] "The principle of fast authentication with an APG-PBFT algorithm is present in this paper Can reduce the authentication frequency Not prioritized efficiently, time consuming [59] Identify the cost of verification and networking Gives an overview of cost factors of blockchain Repetitions in the model, not secure, complex [64] Presents blockchain and compares the various platforms on which blockchain can be implemented Illustrates the use of blockchain applications for building the secure infrastructure of cloud computing Techniques discussed are time consuming, not secure…”
Section: Ref Key Factorsmentioning
confidence: 99%
“…The decentralized feature of blockchain will help to create a decentralized ledger of requirements that will easily be accessible by stakeholders [58].…”
mentioning
confidence: 99%