• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A Master-Slave Blockchain Paradigm and Application in Digital Rights Management

    2018-08-28 03:49:36ZhaofengMaWeihuaHuangWeiBiHongminGaoZhenWangSchoolofCyberspaceSecurityBeijingUniversityofPostsandTelecommunicationsBeijing00876China
    China Communications 2018年8期

    Zhaofeng Ma, Weihua Huang, Wei Bi, Hongmin Gao, Zhen Wang School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing 00876, China

    2 Shenzhen Datong Industrial Co..Ltd, Shenzhen 518000, China

    3 SeeleTech Corporation, San Francisco, 94107, USA

    Abstract: Upon flaws of current blockchain platforms of heavyweight, large capacity of ledger, and time-consuming of synchronization of data, in this paper, we proposed a new paradigm of master-slave blockchain scheme(MSB) for pervasive computing that suitable for general PC, mobile device such as smart phones or PADs to participants in the working of mining and verification, in which we separated traditional blockchain model in 2 layer defined as master node layer and a series of slavery agents layer, then we proposed 2 approaches for partially computing model(PCM) and non-computing of model(NCM) in the MSB blockchain, Finally large amounts of simulations manifest the proposed master-slave blockchain scheme is feasible, extendible and suitable for pervasive computing especially in the 5G generation environment,and can apply in the DRM-related applications.

    Keywords: master-slave blockchain; proof of equivalent work; proof of contribution; pervasive computing; DRM application

    I. INTRODUCTION

    The original and core motivation of blockchain is to build up a cryptography-based decentralized digital currency system for self-organization transaction in an anonymous.Current blockchain platforms such as Bitcoin,Ethereum or Hyperledger provide a new and promising technology for digital cryptocurrency, distributed trusted data management or supply chain manangement[1-4]. However either Bitcoin or Ethereum and HyperLdger needs to synchronize the lager capacity of ledger, once the host is used as blockchain node for mining or verification, the whole computing memory and resource is occupied for computing, synchronizing, storing data by the blockchain system, in fact,current blockchain system is heavyweight and is difficult for extendible. In general case, blockchain is a decentralized trusted p2p platform which provides a cryptography-based trusted computing paradigm that all the transactions are constructed in a merkle-tree, and the specific transactions are organized under a unique

    merkle-root, then in a proper time interval,then creates a block that include block header and block body, and the block header usually include timestamp, previous block hash, dif ficulty, version and reward.

    As thefirst implemented blockchain appliciaiton, Satoshi Nakamoto first proposed the famous Bitcoin system in his paper “a peer-to-peer electronic cash system” as the genesis innovation of decentralized digital cash system[1], in which the Bitcoin uses a proof-of-work mechanism to ensure the fair work of the computing and security[2], if someone try to modify the blocks existing in the blockchain, the proof-of-work consensus can ensure the block cannot be changed without redoing the work.As later blocks are chained after it, the work to change the block would include redoing all the blocks[1-3]. Upon the peer to peer network,when constructing the block, new transactions are broadcast to all nodes, then each node collects new transactions into a block, each node works on finding a difficult proof-of-work for its block, When a computing node finds a proper difficult by proof-of-work, it then broadcasts the block to all p2p nodes, thosed nodes accept the block only if all transactions are valid and not already spent. nodes express their acceptance of the block by working on creating the next block in the chain, using the hash of the accepted block as the previous hash.

    Bitcoin is an innovative payment network and supports for rewards for mining or verification, however, Bitcoin is not so efficient for real-time transaction, and it is difficult and complex to developers, to solve the problems,Vitalik Buterin first proposed the kernel of Ethereum blockchain system which attempt to solve the efficiency and extendibility of the blockchain[5-7]. The Ethereum is a Turing-complete language which generally can solve the problem if there’s enough time and storage space(whereas bitcoin is not Turning-complete), which supports Ethereum externally owned accounts (EOAs) and smart contract accounts, which is defined by its internal unique address, that can execute any possible user-defined codes according to user’s needs and requirements via ERC20, the smart contract is executed in the Ethereum Virtual Machine(EVM). Ethereum is more flexible,extendible, easy and simple for users to build up variant blockchain by creates unique Token(defined by unique address)[3].

    While Hyperledger fabric[4] provides a new, secure and enterprise consortium blockchain platform, which supports for manage node, verification node, each user should connect each other by certificates, and Hyperledger fabric is suitable for consortium blockchain for secure data management. The fabric is based on the most main source code from IBM, which does not support mining but is available for constructing consortium-based blockchain for authorized blockchain members.

    In fact, the blockchain is defined as a cryptographic-based p2p distributed ledger with high-level security, credit, consensus and reward, which can build up variant application such as digital cryptocurrency, supply chain management, digital rights management[5-13].in [14], the authors innovated a scheme of de-anonymizing social networks with overlapping community structure, and proposed a well-justified cost function minimizing the expected number of mismatched users over all possible true mappings. In fact, the efficiency, blockchain capacity and computing node, especially the computing ability restricts and limits general terminal and endpoint computing device joining into the mining and computing. If considering the computing and availability of mobile device, such as mobile phones, PAD, and personal computer, it need to consider flexible and extendible computing paradigm for blockchain for personal computing devices as light-weight blockchain nodes with fair consensus[9-10,13].

    II. RELATED WORK

    2.1 Current popular blockchain technology

    2.1.1 Bitcoin and its extendible blockchain platform

    As the first successfully implemented blockchain application, Bitcoin[1-2] innovated the peer-to-peer electronic cash system as the original blockchain implementation, which proposed the cryptocurrency in a self-organi-zation mode in P2P network, which verifies,constructs, synchronizes and stores the blockchain data permanently. However the Bitcoin is considered as low-efficient in TPS( only 7 TPS), and the average amount of the block is nearly 1MB, and the Bitcoin is not so efficient and is difficult to extend the architecture such as capacity, efficiency and instance of the transaction verification. Upon the Bitcoin-class blockchain, such as LiteCoin, Lighting Network are innovated and tried to solve the problem. Upon the efficiency, it is heavyweight and cannot be separated the mining module into layered subsystem to enhance the efficiency, which limited the extendibility of the Bitcoin-like blochchain.

    2.1.2 Ethereum blockchain and its Tokenbased Innovation

    To implement an extendible and reliable blockchain, Mr Butlin innovates a flexible blockchain Ethereum[3] and ERC20, in which Ethereum implements the paradigm in a generalized manner. And it provides a plurality of such resources, each with a distinct state and operating code but able to interact through a message-passing framework with others. Ethereum designed, implemented, and issued the flexible, useful, extendible platform for a new and flexible blockchain paradigm, especially it innovated the ERC20 protocol, which can make it easy to define a new token-based digital currency in public blockchain.

    2.1.3 Hyperledgerfabric consortium blockchain platform

    Hyperledger fabric[4] provides a new, secure and enterprise consortium blockchain platform, which supports for authentication node,manage node, verification node, Hyperledger fabric is suitable for consortium blockchain for secure data management, such as supply chain management, traceability of source management, and public beneficence management[4-6, 12].

    2.1.4 Other new blockchian technologies

    As for the efficiency, capacity, and security,the other new blockchain technologies such as lighting network, cross-blockchain, muli-blockchain technologies have been studied for more efficient and high-performance transaction capacity[5-12]. And there still exists DAG, EOS[18] public blockchain technologies, which will try to provide a more efficient and effective transaction process ability in TPS, transaction fee.

    2.2 Existing problems and flaws of current blockchain

    2.2.1 Lacks of extendible architecture of blockchain[9-10]

    Current blockchain technologies such as Bitcoin, Ethereum and hyperledger provide a cryptography ensured P2P distributed ledger,to ensure the fair and secure transactions, its supports kinds of consensus such as PoW,PoS, DPoS, PBFT. However, current blockchain is difficult to extend to a flexible, reliable and efficient computing paradigm that allows more and more computing units join in the computing and verification.

    2.2.2 Heavy-weight but low efficiency of TPS[1-3]

    Current blockchain provides a distributed and trusted leger with blocks and transaction, but current blockchain node is not so efficient in TPS, not so flexible especially in a heavyweight mode, it cannot extend for distributing the task to other computing unit such as general PC, mobile smart phones or PADs to participants the work of computing.

    2.2.3 Lack of consensus for new blockchain paradigm[12,15-17]

    Current consensus such as PoW, PoS, DPoS,PBFT[1-5], are very limited for variant consensus supporting, such as PoW is low efficient for mining, while PoS is not still not so high performance for transaction confirmation.Current blockchain should considering more practical and efficient consensus for high TPS and DAPPs[12-17].

    III. THE PROPOSED MASTER-SLAVE BLOCKCHAIN SCHEME

    3.1 The proposed master-slave blockchain model

    Upon flaws of current blockchain platforms of heavyweight, large capacity of ledger, and time-consuming of synchronization of data,in this paper, we proposed a new paradigm of master-slave light-weight blockchain architecture(MSB) for pervasive computing that suitable for general PC, mobile device such as smart phones or PADs, in which we separated traditional blockchain model into master-slave model, in which the master node responsible for transaction collection, computing task distribution, and the slave agents responsible for independently computing and commit result to the master node. The slave computing device may be personal computer, mobile phones.The master-slave blockchain model is described as follows in figure 1, which showed a hierarchical model of master-slave blockchain computing paradigm.

    3.2 The master-slave blockchain architecture

    In the master-slave blockchain scheme, we proposed 2 approaches for partially computing model(PCM) and non-computing of model(NCM) in the MSB blockchain, and in the PCM blockchain model we proposed the consensus defined as proof of equivalent work(PeW), and in NCM, we proposed proof of contribution(PoC). In PCM model, as for a given amount of transactions, the master node dispatches partial computing task(includes but not limited difficulty, timestamp, hash, and version et.al parameters) to the slave agents for distributed computing with high concurrency, when the slave agent computed and found the Nonce that satisfied the mining condition, once the result of the Nonce is verified as true for the partially computing, then the master node gives a reasonable reward to the slave agent.

    And in NCM model, the master node works directly as usual, but it related a series of slave agent for service-related contribution such as providing advertisement, service flow, page view(PV), unique visitor(UV), visit view(VV),independent IP address(IP), when the master node works and gains the rewards from the whole blockchain network, then it distributes rewards to the slave agents according to their service related contribution(PoC). Finally we evaluated the MSB scheme based on Bitcoin system, large amounts of simulations manifest the proposed MSB scheme is feasible, extendible and suitable for pervasive computing, the master-slave blockchain architecture is described as in figure 2.

    IV. SECURITY INFRASTRUCTURE OF MSB BLOCKCHAIN SCHEME

    As for the blockchain technology, SHA256,SHA3, RIPEMD160 and ECC-based public cryptosystem ECDSA are the infrastructure of the security algorithms[24-28]. and the public address of most blockchain is based on BASE58. Such as in Bitcoin, the ECC algorithm in blockchain system uses secp256k1 elliptic curve which is different to the standard ECDSA[26-27].

    Fig. 1. The master-slave blockchain model.

    Fig. 3. The master-slave blockchain execution procedure.

    V. MASTER-SLAVE BLOCKCHAIN EXECUTION AND CONSENSUS

    5.1 Master-slave blockchain execution process

    In the PCM blockchain model we proposed the consensus defined as proof of equivalent work(PeW), and in NCM, we proposed proof of contribution(PoC). In PCM model, as for a given amount of transactions, the master node dispatches partial computing task(includes but not limited difficulty, timestamp,hash, and version et.al parameters) to the slave agents for distributed computing with high concurrency, when the slave agent computed and found the Nonce that satisfied the mining condition, once the result of the Nonce is verified as true for the partially computing, then the master node gives a reasonable reward to the slave for the computing of the slave computing work(PeW). And in NCM model,the master node works directly as usual, but it related a series of slave agent for service-related contribution such as providing advertisement, serviceflow, page view(PV), unique visitor(UV), visit view(VV), independent IP address(IP), when the master node works and gains the rewards from the whole blockchain network, then it distributes rewards to the slave agents according to their service related contribution(PoC). The master-slave blockchain execution process is described in figure 3.

    5.2 New Consensus of master-slave blockchain scheme

    The main consensus mechanisms[19-21]include proof of work(PoW), proof of stack(-PoS), distributed POS(DPoS) and practical Byzantine Fault Tolerance(PBFT), other consensus mechanisms include Paxos, Raf, which can satisfy different applications of blockchain scenes.

    In the proposed MIB consensus, we proposed proof of equivalent work(PeW), proof of contribution(PoC):

    5.2.1 Proof of Equivalent Work(PeW)

    In the Proof of equivalent work consensus, the mobile internet agent computes the Nonce as partial computing unit in the slave side.

    (1) PeW Algorithm of MIB Slave User-Agent AID[i]

    Input: AID, y0= T0, blockHeader

    where,

    T0is the target difficulty value

    blockHeader is composed as follows:

    Output: Nonce

    (1) the slave mobile internet UserAgent AID node computes:

    (3) Then AID node stops to compute, and set to Ni

    AID set: Nonce=xi

    (4) AID node signs the Nonce as follows:

    (2) if the condition is satisfied:

    That is:

    Then the server B computes:

    (5) Finally, the Slave Agent AID return Nonce and its signature SigSAto master node;

    (6) End.

    (2) PeW Algorithm of MSB Slave Agent AID[i]

    Input: AID, Nonce, blockHeader,

    where,

    T0is the target difficulty value

    blockHeader is composed as follows:

    Ni, the nonce as the goal value for mining.

    Output: blockHeader, blockBody, Rsuccess,RunSuccess

    (1)After received the Nonce Ni, then MIB Master Node

    f

    i rstly verifies the validation of the Nonce.

    If r=rSAit manifests the signature is true.

    (2) The MIB Master Node broadcasts the block data to all candidate blocks to verify its correctness and validity. Generally, supposing that there are M0blocks participant the verifying and the verification result is true, that is :

    if all the bVeriResult[i] is true, i.e:

    (3)The MIB Master Node constructs and outputs:

    (4) The MIB Master Node then constructs :

    Where

    (5) The MIB Master Node dispatches Reward to the successfully mining or verifying Agent AID[i]:

    (6) To encourage those who participate the working of mining or verifying agent, the MIB Master Node still give reward to the Successfully mining AID[j](i!=j)

    where(CPF means contribution Percentage Function)

    t is the time the AID[j] took for the working of mining or verifying.

    freq is the frequency of the AID[j] working.

    eff is the efficiency value of the AID[j]working.

    Then MIB Master Node gives thefinal rewards R as above:

    (7) End.

    5.2.2 Proof of contribution

    In the non-computing of model(NCM), the master node works directly as usual, but it related a series of slave agents for service-related contribution such as providing advertisement, serviceflow, page view(PV), unique visitor(UV), visit view(VV), independent IP address(IP), when the master node works and gains the rewards from the whole blockchain network, then it distributes rewards to the slave agents according to their service related contribution, we defined the consensus as proof of contribution (PoC).

    (1) Definition of PoC Algorithm in the non-computing of model(NCM)

    Definition: Proof of Contribution(PoC)is the consensus algorithm that supports for non-computing model in master-slave blockchain environment, the reward and the consensus is defined as following the compound function f:

    Where R(x) and CF(y) represent the reward function and control factor function:

    And the parameters in R(x) represent service flows, which include page view(PV),unique visitor(UV), visit view(VV), independent IP visiting(IP), advertisement hit(AH).Generally, the parameters often has the following relationship:

    While the CtrlFactor(y) represents the control factor function to control invalid or deliberate cheating behavior, the PoC consensus function C(x,y) is defined as the following formula:

    As the parameters such as page view(PV),unique visitor(UV), visit view(VV) are natural numbers, thus the factors α, β, γ parameters is defined as natural number,then there exists the following property of PoC:

    Then in the proof of contribution consensus(PoC), we can give proper reward as the above definition. And in real application system, it is reasonable and fair for different users to visit and contribute to the service-related system.

    (2) PoC Algorithm in the non-computing of model (NCM)

    Input: user behavior vector R(x) and R(y)to the destination objects as defined as the above definition.

    Output: The contribution awards share C(x,y) to the user

    (1) the system daemon monitors and records each client’s behavior, the system counts each parameter in R(x), which includes page view(PV), unique visitor(UV), visit view(VV),independent IP visiting(IP), advertisement hit(AH).

    (2) For each parameter of R(x), the system counts and calculates the summary of the specific time period(such as a day):

    (3) For each parameter of R(x), the system merge the repeat parameter as one valid behavior:

    In which t0is the specific time window,such as in 10 minutes the system monitored a user accessed the specific page view 100 times, which is obviously a machine behavior,then the PV counter should be NOT accepted in the system.

    (4) Not only the repeat counter such as PV or VV should be viewed as invalid, and the system should punish the machinery automatic behavior as follows:

    Where yautoand yrepeatrepresents the the machinery page view (PV) counter and visit view( VV) counter.

    (5) The system then calculates the contribution as follows:

    In the above R(x), the parameters xpvand xuvis the valid counter that had be dealt without machinery automatic behavior.

    (6) Then the final reward contribution is computed as:

    (7) Finally, the system returns the C(x, y) as thefinal contribution reward for the proof of contribution(PoC).

    5.3 Blockchain management and reconstruction

    When the master-slave blockchain procedure is verified as valid, then when constructing the correct block in the whole blockchain system, the blockchain management includes for 4 stage operations: (1) download blockchain data;(2) receive blockchain data;(3) verify the blockchain data; (4)reconstruct bllockchain.

    5.3.1 Whole blockchain data downloading

    When the node first runs the blockchain network, it need to download the whole blockchain data. The efficient stratagem of the blockchain download is headerfirst, that is the systemfirstly download the block header(only 80bytes), when download all the blockheader, then the system can download the whole blockdata from different peers in P2P network.

    5.3.2 Blockchain receiving

    After downloaded the blockchain data from peers, then the current node will load the whole index from LevelDB,which may be a tree rather than a single chain, that is each block has only one parent block, but has more than one sub-blocks.

    5.3.3 Blockchain verification

    Once the node first runs the blockchain network, it need to download the whole blockchain data. The efficient stratagem of the blockchain download is headerfirst, that is the systemfirstly download the block header(only 80bytes), when download all the blockheader, then the system can download the whole blockdata from different peers in P2P network.

    As well known, the blockchain data structure of the block data is listed as follows:

    where the

    1) Then the peerfirstly verify the data in-tegrity and the correctness of data format.

    2) The blockchain peer transfers the blockdata to the receiver and signs the block as follows:

    And then the peer computes:

    3) each other peer received the blockdata,and can verify the correctness as follows:

    The signature is valid if and only if the following formula exists:

    In fact, it’s easily to verify that the signature is valid in and only if the following equation is correct:

    Then there must exist:

    Fig. 5. The Blockchain block and transaction data structure.

    Thus its manifests the peer verifies the signature of the blockdata as true, then the blockchain management system then check the transcation is a UTXO or not.

    5.3.4 Blockchain reconstruction

    When the peerfinds a longer chain than current exist chain, it needs to reconstruct the blockchain, most reconstruction is just for one block data reconstruction, only occurs when different miners computes the same valid block.

    5.4 Block and transaction data construction

    After pass the verification, the blockchain platform then build Up the blocks and transactions in time-order with tamper-resistance and security, the block data and transaction data is constructed and included block header and block body. The blockchain will permanently stores the data in the P2P network and cannot allow it be modified or deleted in a tamper-resistance mode, which can provide strong and high level reliability and security. Even some blockchain nodes deliberately announced or the nodes truly corrupted, the most other nodes can provide strong and trusted service for evidences. The block and transaction data structure are defined as bellows which is easy to convert to JSON format. The blocks and transaction data are organized in figure 5 and figure 6.

    In the master-slave blockchain mode, the slave agent only acts as the light-weight client of computing nodes, which computes andfinds the proper nonce that satisfy the condition, thus gets the rewards according to the consensus methods such as proof of equivalent work or proof of indirect contribution.

    VI. EVALUATION OF MASTER-SLAVE BLOCKCHAIN SCHEME

    6.1 Evaluation environment of master-slave scheme

    To evaluate the availability and efficiency, we built up the master-slave blockchain simulation environment based on Bitcoin v0.10.99.0-unk, in which we simulated the task redistribution thread and receiver thread from slave agents, and when the slave agents received the computing task(including mining computing and verification computing), then do the computing work according to the related computing parameters. The master-slave blockchain simulation environment is listed as table1.

    We deployed 4 master nodes and each nodes serves 3 slave agents include general personal computer, android mobile phones and Pads for task receiving and computing and verification.

    6.2 Experiments of master-slave blockchian scheme

    In the deployed 4 bitcoin blockchain system,the master-slave bitcoin platform, we used variant kinds of PCs. Android mobile phones or Pads joined into to 4 master nodes, and then evaluated the performance and scalability of the master-slave blockchain scheme. The simulation of master-slave blockchain parameters are listed in table 2-3, algorithm 1 is the genesis initialization in CMainParams function, algorithm 2 is the blockchain data created from genesis block.

    6.3 Simulation results of masterslave scheme

    Figures 7-9 are the simulation results of the master-slave blokchain computing model.Figure 7-8 are the PeW consensus simulations in one master node and 3 slave nodes computing performance comparison, and figure 9 are the simulation results of PoC, in which α,β,γ were parameterized as 1, 2,3, to simply the whole computing complexity, in the serial data set S1, α,β,γ are parameterized as α=β=γ=1,and in serial data S2, α=β=γ=2,finally, in S3,α=β=γ=3. The results showed reasonable reward rate for variant contribution in PoC.

    6.4 Simulation analysis of masterslave scheme

    Fig. 6. The general data structure of blockchain(Bitcoin).

    Table I. Development environment parameters.

    Table II. The network parameters of master nodes.

    Table III. The peer node network status in master-slave platform.

    Algorithm 1. The genesis initialization in CMainParams function.

    Algorithm 2. The blockchain information created from genesis block.

    The simulation results of figure 7 and figure 8 reflex the master and slave node(s) computing resource occupation(CPU), of which the mobile phone’s CPU occupation is 25.17-28.21%, and the average value is 26.36%, and the pad CPU usage rate is 22.18-24.93%, and average percentage is 23.36%, while the PC slave node’s occupation is 18.21-20.03%, and the average rate is 19.05%, based on which we can found that with the hardware computing performance decreasing, the master node need much more computing CPU for the collection and waiting for the slave nodes to commit the computing and verification results.

    While in PoC, it is easily found, that with the parameters α,β,γ increasing, the average reward rate declined from 41.53%, 40.11%, to 38.85%, this indicated that if we want to give the salve node a less reward we can parameterized α,β,γ to a large value, thus the reward rate can be reduced to a reasonable level.

    VII. ANALYSIS OF MASTER-SLAVE BLOCKCHAIN SCHEME

    7. 1 Availability of master-slave blockchain

    The DRMChain Scheme provides a flexible DRM approach that enables user-controlled encryption but administrator and auditor can decrypt and audit the content once the released content is suspected violation or illegal usage,in the scheme, we proposed 3 parts control model trusted and creditable content encryption, secure key management, multi-signature for violation appraisal.

    7.2 Consensus of master-slave blockchain

    The proposed master-slave blockchain scheme allows variant computing device such as personal computer, mobile phones, or Pads can join into the blockchain computing and get reasonable rewards according to their work or contribution, the proposed proof-of-equivalent(PeW), and the proof-of-indirect-contribution(PIC) innovated the existing consensus of blockchain, and are effective and efficient

    mechanism that can attract more persons joint into the blockchain system without large capacity ledger data synchronization.

    7.3 Extendibility of master-slave blockchain

    With the proper connection mode such as the mining pool for cluster computing in Bitcoin,the master-slave blockchain scheme innovates the blockchain paradigm that develops the heavy-weight blockchain to light-weight layered computing mode, which can dispatch different work to slave agents for discrete time usage of mining task balance or indirect contribution for blockchain useful utilization without synchronize blockchain data synchronization.

    VIII.THE MASTER-SLAVE BLOCKCHAIN APPLICATION IN DRM

    Digital content service is mainly occupying the bandwidth rather than the computing resource, upon which the proposed master-slave paradigm is very suitable for digital right management of content service. The proposed PeW and PoC consensus is a reasonable method for DRM-related applications[19-22].

    8.1 Scene of the PeW in DRM system

    In the DRM service[19-20], when the user client daemon is idle or free time, the PeW consensus can be implemented in a master-slave mode to allow computing resource limitation device such as phones or Pads join in the partial computing work as slave, and the full-computing node organizes the valid computing piece as master, which can speed up the full-computing node for the mining work.With 5G network bandwidth and computing ability development, it’s a good and promise direction for PeW application in mobile Internet computing times. In the DRM servie,when the client daemon is free or idle, the PeW is efficient and secure for master-slave blockchain paradigm[20].

    Fig. 7. The simulation of CPU usage of the master node in PeW.

    Fig. 8. The simulation of CPU usage of variant slave nodes in PeW.

    8.2 Scene of the PoC for DRM-based content view

    As for the proposed blockchain paradigm, the proof of contribution(PoC) is suitable for user to visit or consume the content, once the user visit, preview, play, or share the content, the user should be encouraged, and should give the reward according to the user’s PV, UV,VV,or IP, and the valid sharing and the shared user’s valid consumption, the content service provider then gives the user an active blockchain-based digital currency reward, and the user can query the reward transaction in his/her account, which is very useful for sharing economy. Especially when using DRM[21-22]and blockchain technology for content service,it is easily implemented a blockchain-based new DRM content service, that the right content serves the right user in a right way with a right reward. The users can consume the content by digital currency, which either is he/she bought independently, or is granted as a reward by his/her contribution of consumption or sharing, thus PoC consensus is a classic application for DRM-based content service scene.

    IX. CONCLUSION

    The most useful contribution of the paper is that we proposed a new paradigm of master-slave blockchain scheme (MSB) for pervasive computing that suitable for general PC,mobile device such as smart phones or PADs to participants in the working of mining and verification, in which we separated traditional blockchain model in 2 layers defined as master node layer and a series of slave agents layer,and we proposed 2 approaches for partially computing model(PCM) and non-computing of model(NCM) in the MSB blockchain. Finally we evaluated the MSB architecture based on Bitcoin system, large amounts of simulations manifest the proposed MSB scheme is feasible, extendible and suitable for pervasive computing. The proposed PeW and PoC consensus is a reasonable method for DRM-related applications, and as the permanent research topic, performance and TPS enhance is the most important issues to be studied in the future work.

    ACKNOWLEDGMENTS

    This work was supported by the National Natural Science Foundation of China under Grant 61272519, the Research Funds of Blockchain Joint Lab between BUPT and BCT, and the joint Blockchain and Security Lab between BUPT and CAPSTONE.

    av在线app专区| 国产永久视频网站| 永久免费av网站大全| 三级国产精品欧美在线观看| 肉色欧美久久久久久久蜜桃 | 一级毛片久久久久久久久女| 欧美少妇被猛烈插入视频| 久久久久久国产a免费观看| 免费不卡的大黄色大毛片视频在线观看| 亚洲伊人久久精品综合| 久久久成人免费电影| 亚洲一级一片aⅴ在线观看| 免费电影在线观看免费观看| 国产伦精品一区二区三区视频9| 哪个播放器可以免费观看大片| 国产精品无大码| 亚洲成人精品中文字幕电影| av免费观看日本| 少妇人妻 视频| 美女国产视频在线观看| 成人国产av品久久久| 联通29元200g的流量卡| 人妻 亚洲 视频| 国产精品不卡视频一区二区| 内射极品少妇av片p| 久久久久国产网址| 波野结衣二区三区在线| 欧美日韩一区二区视频在线观看视频在线 | 久久久久久久久久久免费av| 色网站视频免费| 国内精品美女久久久久久| 日韩人妻高清精品专区| 国产极品天堂在线| 只有这里有精品99| 亚洲精品成人久久久久久| 国内揄拍国产精品人妻在线| 精品一区二区免费观看| 一本—道久久a久久精品蜜桃钙片 精品乱码久久久久久99久播 | 亚洲va在线va天堂va国产| 亚洲国产精品成人久久小说| 最近2019中文字幕mv第一页| 国产精品国产三级国产专区5o| 国产一级毛片在线| 久久精品国产亚洲av天美| 在线观看人妻少妇| 一级毛片aaaaaa免费看小| 97超碰精品成人国产| 国产成人一区二区在线| 一个人看视频在线观看www免费| 色综合色国产| 你懂的网址亚洲精品在线观看| 边亲边吃奶的免费视频| 午夜福利在线在线| 欧美bdsm另类| 国产精品av视频在线免费观看| 菩萨蛮人人尽说江南好唐韦庄| 亚洲精品色激情综合| a级毛片免费高清观看在线播放| 国产综合精华液| 91久久精品国产一区二区成人| 国产在视频线精品| 黄色视频在线播放观看不卡| 超碰97精品在线观看| 久久久久久久久久久丰满| 可以在线观看毛片的网站| 精品少妇黑人巨大在线播放| 看十八女毛片水多多多| 国产精品一区二区性色av| 国产精品成人在线| 久久久成人免费电影| 国产成人福利小说| 日韩成人av中文字幕在线观看| 亚洲综合精品二区| 韩国av在线不卡| 中文字幕制服av| 久久久a久久爽久久v久久| 少妇的逼水好多| 亚洲经典国产精华液单| 午夜福利网站1000一区二区三区| 久久99精品国语久久久| 久久久久久久久大av| 夫妻午夜视频| 亚洲,一卡二卡三卡| 国产亚洲精品久久久com| 少妇人妻精品综合一区二区| 18禁在线无遮挡免费观看视频| 色播亚洲综合网| 大香蕉97超碰在线| 三级国产精品片| 丝瓜视频免费看黄片| 天堂网av新在线| 亚洲人成网站在线观看播放| 国产成人freesex在线| 九九在线视频观看精品| 午夜日本视频在线| 最新中文字幕久久久久| 欧美精品国产亚洲| 亚洲欧美日韩卡通动漫| 大香蕉97超碰在线| 国产精品伦人一区二区| 直男gayav资源| 国产欧美日韩精品一区二区| 精品少妇黑人巨大在线播放| 日本-黄色视频高清免费观看| 2021天堂中文幕一二区在线观| 亚洲国产av新网站| 精品久久国产蜜桃| 国产av国产精品国产| 国产老妇伦熟女老妇高清| 一级av片app| 国产成人精品一,二区| 欧美+日韩+精品| av.在线天堂| av免费观看日本| 亚洲国产欧美人成| 久久韩国三级中文字幕| 亚洲成人久久爱视频| 中文字幕制服av| 人妻 亚洲 视频| 色网站视频免费| 婷婷色麻豆天堂久久| 日韩精品有码人妻一区| 精品久久国产蜜桃| 欧美成人a在线观看| 少妇 在线观看| 亚洲精品一区蜜桃| 看黄色毛片网站| 成人午夜精彩视频在线观看| 成人午夜精彩视频在线观看| 国产色婷婷99| 午夜免费男女啪啪视频观看| 人妻制服诱惑在线中文字幕| 成人毛片60女人毛片免费| 五月伊人婷婷丁香| 国产男人的电影天堂91| 色播亚洲综合网| 欧美xxxx性猛交bbbb| 国产爽快片一区二区三区| 免费人成在线观看视频色| 九草在线视频观看| 肉色欧美久久久久久久蜜桃 | 97精品久久久久久久久久精品| 国产爽快片一区二区三区| 人人妻人人看人人澡| 国产精品久久久久久久电影| 婷婷色麻豆天堂久久| 日韩大片免费观看网站| 免费大片18禁| 毛片女人毛片| 亚洲人成网站在线播| 国产在线男女| 国产老妇女一区| 亚洲欧美日韩无卡精品| 国产国拍精品亚洲av在线观看| 天天躁日日操中文字幕| 国产精品国产三级国产专区5o| 国产免费又黄又爽又色| 久久女婷五月综合色啪小说 | 国产综合精华液| 精品人妻熟女av久视频| 九九爱精品视频在线观看| 人妻一区二区av| 久久热精品热| 日韩三级伦理在线观看| 一二三四中文在线观看免费高清| 简卡轻食公司| 日日啪夜夜爽| 人妻一区二区av| 男的添女的下面高潮视频| av免费在线看不卡| 69人妻影院| 国产精品国产三级国产专区5o| 国产色婷婷99| 欧美区成人在线视频| 深夜a级毛片| 夫妻午夜视频| 高清欧美精品videossex| 国产精品久久久久久精品古装| 成人欧美大片| 亚洲欧美精品自产自拍| 久久99热这里只有精品18| 综合色丁香网| 国产美女午夜福利| 又黄又爽又刺激的免费视频.| 国产欧美亚洲国产| 国产极品天堂在线| 啦啦啦在线观看免费高清www| 91久久精品国产一区二区成人| 久久99热6这里只有精品| 联通29元200g的流量卡| 国产av码专区亚洲av| 少妇被粗大猛烈的视频| 99九九线精品视频在线观看视频| 欧美xxxx性猛交bbbb| 成人综合一区亚洲| 欧美日韩综合久久久久久| 亚洲精品成人久久久久久| 我要看日韩黄色一级片| 亚洲欧美一区二区三区国产| av在线老鸭窝| 亚洲经典国产精华液单| 看非洲黑人一级黄片| 免费大片黄手机在线观看| 日产精品乱码卡一卡2卡三| 国产精品三级大全| 2021少妇久久久久久久久久久| 国产乱人偷精品视频| 岛国毛片在线播放| 街头女战士在线观看网站| 狂野欧美激情性xxxx在线观看| 最近2019中文字幕mv第一页| 免费人成在线观看视频色| 精品熟女少妇av免费看| 亚洲av.av天堂| videossex国产| 99热这里只有精品一区| 久久久久国产网址| 免费观看a级毛片全部| 亚洲av电影在线观看一区二区三区 | 真实男女啪啪啪动态图| 亚洲色图av天堂| 看非洲黑人一级黄片| 91在线精品国自产拍蜜月| 男人狂女人下面高潮的视频| 麻豆成人av视频| 日本与韩国留学比较| 久久久久久国产a免费观看| 简卡轻食公司| 欧美97在线视频| 精品熟女少妇av免费看| 亚洲自偷自拍三级| 婷婷色综合www| 久久久久久久亚洲中文字幕| 美女脱内裤让男人舔精品视频| 精品国产三级普通话版| 色播亚洲综合网| 亚洲人成网站在线播| 亚洲色图av天堂| 九九久久精品国产亚洲av麻豆| 亚洲国产精品成人综合色| 亚洲精品456在线播放app| 国产精品不卡视频一区二区| 久久热精品热| 精品久久久久久久久av| 成年人午夜在线观看视频| 日韩电影二区| 欧美精品一区二区大全| 国产男女内射视频| 国产精品99久久99久久久不卡 | 人人妻人人看人人澡| 亚洲精品久久久久久婷婷小说| 一级毛片电影观看| 午夜激情福利司机影院| 熟女av电影| 蜜臀久久99精品久久宅男| 九色成人免费人妻av| 51国产日韩欧美| 亚洲av中文字字幕乱码综合| 日韩av在线免费看完整版不卡| 亚洲精品国产色婷婷电影| 黄色视频在线播放观看不卡| 精品一区二区三卡| 身体一侧抽搐| 2018国产大陆天天弄谢| av女优亚洲男人天堂| 成人午夜精彩视频在线观看| 久久热精品热| 亚洲精品国产色婷婷电影| 成年免费大片在线观看| 国产精品不卡视频一区二区| av播播在线观看一区| 一区二区三区四区激情视频| 18禁动态无遮挡网站| 99久久九九国产精品国产免费| 草草在线视频免费看| 插阴视频在线观看视频| 在线观看一区二区三区激情| 午夜福利在线观看免费完整高清在| av免费在线看不卡| 免费观看的影片在线观看| 一级爰片在线观看| 纵有疾风起免费观看全集完整版| 久久人人爽人人爽人人片va| 精品人妻熟女av久视频| 欧美高清成人免费视频www| 亚洲精品日韩在线中文字幕| 亚洲最大成人av| 日本黄色片子视频| 免费看光身美女| 免费播放大片免费观看视频在线观看| 欧美成人一区二区免费高清观看| 高清毛片免费看| 人体艺术视频欧美日本| 中国三级夫妇交换| 中文乱码字字幕精品一区二区三区| 亚洲人成网站在线观看播放| 日产精品乱码卡一卡2卡三| 超碰av人人做人人爽久久| 免费看日本二区| 白带黄色成豆腐渣| 国产成人91sexporn| 国产老妇伦熟女老妇高清| 欧美变态另类bdsm刘玥| 亚洲av中文av极速乱| 最近中文字幕高清免费大全6| 直男gayav资源| 在线看a的网站| 国产成人福利小说| 天堂俺去俺来也www色官网| 亚洲欧美日韩东京热| 国产精品一及| 国产人妻一区二区三区在| 18+在线观看网站| 久久精品国产自在天天线| 18禁裸乳无遮挡免费网站照片| 欧美97在线视频| 亚洲av中文av极速乱| 黄色怎么调成土黄色| 精品人妻一区二区三区麻豆| 边亲边吃奶的免费视频| 免费大片18禁| 亚洲国产精品国产精品| 中文天堂在线官网| 视频中文字幕在线观看| 成年av动漫网址| 国产有黄有色有爽视频| 国产精品三级大全| 国产精品伦人一区二区| 在线a可以看的网站| 有码 亚洲区| 色视频www国产| 久久久久久久久久久免费av| 自拍欧美九色日韩亚洲蝌蚪91 | 一本—道久久a久久精品蜜桃钙片 精品乱码久久久久久99久播 | 国产欧美亚洲国产| 高清日韩中文字幕在线| 午夜爱爱视频在线播放| 日韩国内少妇激情av| 少妇人妻久久综合中文| 下体分泌物呈黄色| 色5月婷婷丁香| 99热网站在线观看| 狂野欧美激情性bbbbbb| 国产成人精品福利久久| 精品午夜福利在线看| 亚洲精品第二区| 成年版毛片免费区| 丰满人妻一区二区三区视频av| 熟女人妻精品中文字幕| 人妻制服诱惑在线中文字幕| 丰满人妻一区二区三区视频av| 亚洲精品成人av观看孕妇| 岛国毛片在线播放| 欧美精品国产亚洲| 亚洲精品中文字幕在线视频 | 天天躁日日操中文字幕| 联通29元200g的流量卡| 91aial.com中文字幕在线观看| 日韩欧美精品免费久久| 国产成人午夜福利电影在线观看| 搡女人真爽免费视频火全软件| 久久久色成人| 欧美+日韩+精品| 亚洲精品乱久久久久久| 韩国av在线不卡| av天堂中文字幕网| 亚洲欧洲日产国产| 亚洲久久久久久中文字幕| 国产高潮美女av| 亚洲欧美日韩卡通动漫| 精品视频人人做人人爽| eeuss影院久久| 下体分泌物呈黄色| 色综合色国产| 国产精品三级大全| 丝瓜视频免费看黄片| 男女边摸边吃奶| 国产黄片视频在线免费观看| 国产高清三级在线| 只有这里有精品99| 最后的刺客免费高清国语| kizo精华| 美女国产视频在线观看| 秋霞在线观看毛片| 波野结衣二区三区在线| 久久久精品94久久精品| 内地一区二区视频在线| 男的添女的下面高潮视频| 91精品伊人久久大香线蕉| 99久久精品一区二区三区| 男女下面进入的视频免费午夜| 亚洲国产色片| 不卡视频在线观看欧美| 亚洲av免费在线观看| 男人狂女人下面高潮的视频| 国产精品一区二区性色av| 久久97久久精品| 成人综合一区亚洲| 看非洲黑人一级黄片| 国产精品一区www在线观看| 看十八女毛片水多多多| 激情五月婷婷亚洲| 乱码一卡2卡4卡精品| 一区二区三区精品91| 国内精品宾馆在线| 特级一级黄色大片| 免费电影在线观看免费观看| 麻豆精品久久久久久蜜桃| 全区人妻精品视频| 黄色怎么调成土黄色| 久久精品熟女亚洲av麻豆精品| 国产精品秋霞免费鲁丝片| 麻豆精品久久久久久蜜桃| 亚洲欧美精品自产自拍| 69av精品久久久久久| 午夜免费男女啪啪视频观看| 一本—道久久a久久精品蜜桃钙片 精品乱码久久久久久99久播 | 国产成人午夜福利电影在线观看| 一级毛片 在线播放| 成人二区视频| 在线看a的网站| 男男h啪啪无遮挡| 亚洲精华国产精华液的使用体验| 爱豆传媒免费全集在线观看| 欧美极品一区二区三区四区| 久久久亚洲精品成人影院| 插阴视频在线观看视频| 日韩,欧美,国产一区二区三区| 一级毛片电影观看| 又黄又爽又刺激的免费视频.| 五月伊人婷婷丁香| 亚洲精品第二区| 肉色欧美久久久久久久蜜桃 | 成年版毛片免费区| 亚洲av电影在线观看一区二区三区 | 欧美日韩一区二区视频在线观看视频在线 | 91久久精品国产一区二区成人| 亚洲精华国产精华液的使用体验| av又黄又爽大尺度在线免费看| 亚洲美女搞黄在线观看| 91aial.com中文字幕在线观看| 午夜爱爱视频在线播放| 欧美区成人在线视频| av在线播放精品| 看黄色毛片网站| 国产一区亚洲一区在线观看| 熟妇人妻不卡中文字幕| 街头女战士在线观看网站| 国产成人aa在线观看| 国产有黄有色有爽视频| 丝袜美腿在线中文| 91精品一卡2卡3卡4卡| 国产黄a三级三级三级人| 在线观看人妻少妇| 精品国产三级普通话版| 男人狂女人下面高潮的视频| 亚洲精品视频女| 亚洲国产色片| 日本免费在线观看一区| 在线观看美女被高潮喷水网站| 亚洲丝袜综合中文字幕| 一本—道久久a久久精品蜜桃钙片 精品乱码久久久久久99久播 | 人妻一区二区av| 久久久久久国产a免费观看| 一区二区三区精品91| 毛片女人毛片| 国产高清不卡午夜福利| 久久99热这里只频精品6学生| 欧美日本视频| 麻豆国产97在线/欧美| 成人美女网站在线观看视频| 亚洲怡红院男人天堂| 久久久久久久国产电影| 亚洲欧美日韩无卡精品| 一级黄片播放器| 国内少妇人妻偷人精品xxx网站| 亚洲va在线va天堂va国产| 久久久久久久久久久免费av| 日本av手机在线免费观看| 国产成人a∨麻豆精品| 国产成人freesex在线| 久久影院123| 亚洲人成网站在线观看播放| 大片电影免费在线观看免费| av在线app专区| 精品国产三级普通话版| 国产v大片淫在线免费观看| 神马国产精品三级电影在线观看| 麻豆成人午夜福利视频| 肉色欧美久久久久久久蜜桃 | 亚洲成人av在线免费| 毛片一级片免费看久久久久| 亚洲最大成人中文| 综合色丁香网| 国产成人一区二区在线| 中国国产av一级| 欧美日本视频| 噜噜噜噜噜久久久久久91| 成人欧美大片| 国产男女内射视频| 男女无遮挡免费网站观看| 爱豆传媒免费全集在线观看| 丝袜喷水一区| 中国三级夫妇交换| 久久久a久久爽久久v久久| 我的女老师完整版在线观看| av黄色大香蕉| 亚洲怡红院男人天堂| 久久久久久久久久久丰满| 精品一区二区免费观看| 亚洲av在线观看美女高潮| 久久99热这里只有精品18| 亚洲国产精品国产精品| 免费av毛片视频| 国产日韩欧美亚洲二区| 99热网站在线观看| 老师上课跳d突然被开到最大视频| 成人国产麻豆网| 九九爱精品视频在线观看| 3wmmmm亚洲av在线观看| 久久久久久久大尺度免费视频| 五月伊人婷婷丁香| 欧美极品一区二区三区四区| 26uuu在线亚洲综合色| 国产91av在线免费观看| 26uuu在线亚洲综合色| 熟妇人妻不卡中文字幕| 九九久久精品国产亚洲av麻豆| av线在线观看网站| 九九久久精品国产亚洲av麻豆| av在线app专区| 日韩三级伦理在线观看| 男人添女人高潮全过程视频| 亚洲国产欧美人成| 熟女av电影| 日本爱情动作片www.在线观看| 精品酒店卫生间| av国产久精品久网站免费入址| 精品国产露脸久久av麻豆| 日本一二三区视频观看| 美女脱内裤让男人舔精品视频| 日本一二三区视频观看| 1000部很黄的大片| 欧美xxxx性猛交bbbb| 免费看a级黄色片| 国产精品蜜桃在线观看| 99久久精品热视频| 又黄又爽又刺激的免费视频.| 国产成人精品婷婷| 另类亚洲欧美激情| 在线观看美女被高潮喷水网站| 在线精品无人区一区二区三 | 国产综合精华液| 一级毛片aaaaaa免费看小| 亚洲欧洲日产国产| 美女被艹到高潮喷水动态| 久久久久久久久大av| 亚洲精品国产av蜜桃| 日日撸夜夜添| 黄色欧美视频在线观看| 97在线视频观看| 亚洲精品一二三| av在线播放精品| 久久久久久久久久人人人人人人| 一本久久精品| 91久久精品电影网| 亚洲精品成人av观看孕妇| 91aial.com中文字幕在线观看| 中文字幕亚洲精品专区| 美女国产视频在线观看| 欧美一级a爱片免费观看看| 97在线视频观看| 伦精品一区二区三区| 91久久精品国产一区二区成人| 国产男女超爽视频在线观看| 国产精品熟女久久久久浪| av网站免费在线观看视频| 国产视频内射| 久久精品国产自在天天线| videos熟女内射| 97超视频在线观看视频| 精品久久久噜噜| 国产亚洲91精品色在线| 亚洲精华国产精华液的使用体验| 最近中文字幕高清免费大全6| 岛国毛片在线播放| 日本一二三区视频观看| 日韩人妻高清精品专区| 一级av片app| 亚洲国产精品专区欧美| 国产色爽女视频免费观看| 国产av不卡久久| 欧美高清成人免费视频www| 国产黄片视频在线免费观看| .国产精品久久| 国产精品嫩草影院av在线观看| 中文字幕av成人在线电影| 国产精品伦人一区二区| 99热网站在线观看| 美女被艹到高潮喷水动态| 免费大片18禁| 老司机影院毛片| 成年人午夜在线观看视频| 国产精品偷伦视频观看了| 久久久久久久大尺度免费视频| 一本色道久久久久久精品综合| 午夜视频国产福利| 一区二区三区四区激情视频| 欧美日韩一区二区视频在线观看视频在线 | 乱系列少妇在线播放| 少妇人妻一区二区三区视频| 熟妇人妻不卡中文字幕| 国产成年人精品一区二区| 国产精品国产av在线观看| 日本爱情动作片www.在线观看|