{"id":"https://openalex.org/W4376852415","doi":"https://doi.org/10.1145/3573942.3573973","title":"Research on Blockchain Consensus Algorithm for Secure Data Sharing on Industrial Internet Platform","display_name":"Research on Blockchain Consensus Algorithm for Secure Data Sharing on Industrial Internet Platform","publication_year":2022,"publication_date":"2022-09-23","ids":{"openalex":"https://openalex.org/W4376852415","doi":"https://doi.org/10.1145/3573942.3573973"},"language":"en","primary_location":{"id":"doi:10.1145/3573942.3573973","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3573942.3573973","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2022 5th International Conference on Artificial Intelligence and Pattern Recognition","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101914510","display_name":"Chao Jia","orcid":"https://orcid.org/0000-0001-5078-3339"},"institutions":[{"id":"https://openalex.org/I4210136859","display_name":"Xi\u2019an University of Posts and Telecommunications","ror":"https://ror.org/04jn0td46","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210136859"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chao Jia","raw_affiliation_strings":["School of Computer Science, Xi'an University of Posts &amp; Telecommunications, China"],"raw_orcid":"https://orcid.org/0000-0001-5078-3339","affiliations":[{"raw_affiliation_string":"School of Computer Science, Xi'an University of Posts &amp; Telecommunications, China","institution_ids":["https://openalex.org/I4210136859"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016028342","display_name":"Lili Gao","orcid":"https://orcid.org/0000-0002-9173-7934"},"institutions":[{"id":"https://openalex.org/I4210136859","display_name":"Xi\u2019an University of Posts and Telecommunications","ror":"https://ror.org/04jn0td46","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210136859"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lili Gao","raw_affiliation_strings":["School of Computer Science, Xi'an University of Posts &amp; Telecommunications, China"],"raw_orcid":"https://orcid.org/0000-0002-9173-7934","affiliations":[{"raw_affiliation_string":"School of Computer Science, Xi'an University of Posts &amp; Telecommunications, China","institution_ids":["https://openalex.org/I4210136859"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101635637","display_name":"Min Li","orcid":"https://orcid.org/0000-0003-4369-4826"},"institutions":[{"id":"https://openalex.org/I4210136859","display_name":"Xi\u2019an University of Posts and Telecommunications","ror":"https://ror.org/04jn0td46","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210136859"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Min Li","raw_affiliation_strings":["School of Computer Science, Xi'an University of Posts &amp; Telecommunications, China"],"raw_orcid":"https://orcid.org/0000-0003-4369-4826","affiliations":[{"raw_affiliation_string":"School of Computer Science, Xi'an University of Posts &amp; Telecommunications, China","institution_ids":["https://openalex.org/I4210136859"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101914510"],"corresponding_institution_ids":["https://openalex.org/I4210136859"],"apc_list":null,"apc_paid":null,"fwci":0.319,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.69065887,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"197","last_page":"204"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9908999800682068,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10101","display_name":"Cloud Computing and Resource Management","score":0.9750000238418579,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8065249919891357},{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.6673445701599121},{"id":"https://openalex.org/keywords/byzantine-fault-tolerance","display_name":"Byzantine fault tolerance","score":0.6438367962837219},{"id":"https://openalex.org/keywords/bottleneck","display_name":"Bottleneck","score":0.5856846570968628},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5663134455680847},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5424928665161133},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.5364404916763306},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.47759556770324707},{"id":"https://openalex.org/keywords/data-sharing","display_name":"Data sharing","score":0.4729342758655548},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.4465816915035248},{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.4141954779624939},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.33669644594192505},{"id":"https://openalex.org/keywords/fault-tolerance","display_name":"Fault tolerance","score":0.2729524075984955},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.12487101554870605},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.12316104769706726},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.0981810986995697},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.09079381823539734}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8065249919891357},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.6673445701599121},{"id":"https://openalex.org/C168021876","wikidata":"https://www.wikidata.org/wiki/Q1353446","display_name":"Byzantine fault tolerance","level":3,"score":0.6438367962837219},{"id":"https://openalex.org/C2780513914","wikidata":"https://www.wikidata.org/wiki/Q18210350","display_name":"Bottleneck","level":2,"score":0.5856846570968628},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5663134455680847},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5424928665161133},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5364404916763306},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.47759556770324707},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.4729342758655548},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.4465816915035248},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.4141954779624939},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.33669644594192505},{"id":"https://openalex.org/C63540848","wikidata":"https://www.wikidata.org/wiki/Q3140932","display_name":"Fault tolerance","level":2,"score":0.2729524075984955},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.12487101554870605},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.12316104769706726},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0981810986995697},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09079381823539734},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3573942.3573973","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3573942.3573973","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2022 5th International Conference on Artificial Intelligence and Pattern Recognition","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6100000143051147,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":2,"referenced_works":["https://openalex.org/W2476140280","https://openalex.org/W4253429854"],"related_works":["https://openalex.org/W4210406818","https://openalex.org/W4306779889","https://openalex.org/W3211706803","https://openalex.org/W4382775358","https://openalex.org/W4246942721","https://openalex.org/W3216065934","https://openalex.org/W2519603953","https://openalex.org/W4362497183","https://openalex.org/W563434055","https://openalex.org/W2075298824"],"abstract_inverted_index":{"The":[0],"traditional":[1],"industrial":[2,30,90],"Internet":[3,91],"platform":[4],"adopts":[5],"a":[6,22,67,73,83,94,104,140,145],"centralized":[7],"data":[8,16,46,75,85,106],"storage":[9],"model,":[10],"and":[11,43,62,64,121,123,144],"the":[12,27,34,41,49,54,99,113,131,160],"security":[13,42,76,86,107],"sharing":[14,77,87,108],"of":[15,29,37,45,53,115,130,156,162],"generated":[17],"by":[18],"terminal":[19,38],"devices":[20],"is":[21,58],"major":[23],"bottleneck":[24],"that":[25],"hinders":[26],"development":[28],"Internet.":[31,56],"Along":[32],"with":[33,93],"geometric":[35],"growth":[36],"data,":[39],"protecting":[40],"integrity":[44],"has":[47],"become":[48],"core":[50,100],"research":[51],"area":[52],"Industrial":[55],"Blockchain":[57],"distributed,":[59],"open,":[60],"transparent":[61],"tamper-evident,":[63],"can":[65],"provide":[66],"reliable":[68],"underlying":[69],"service":[70],"to":[71,101,111,152],"realize":[72],"distributed":[74,95],"system.":[78],"Therefore,":[79],"this":[80],"paper":[81],"proposes":[82],"blockchain-based":[84],"model":[88],"for":[89,126],"platforms,":[92],"blockchain":[96],"network":[97],"as":[98],"build":[102],"up":[103],"decentralized":[105],"service.":[109],"Meanwhile,":[110],"address":[112],"problems":[114],"high":[116],"consensus":[117],"latency,":[118],"low":[119],"throughput":[120],"performance,":[122],"no":[124],"support":[125],"node":[127,147],"dynamic":[128,154],"management":[129,148,155],"practical":[132],"Byzantine":[133],"fault-tolerant":[134],"(PBFT)":[135],"algorithm":[136,163],"used":[137],"in":[138],"blockchain,":[139],"simplified":[141],"consistency":[142],"protocol":[143],"new":[146],"mechanism":[149],"are":[150],"introduced":[151],"achieve":[153],"nodes":[157],"while":[158],"reducing":[159],"complexity":[161],"communication.":[164]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
