A Blockchain-Based Framework for Rural Property Rights Transactions
Abstract
:1. Introduction
- We propose a blockchain-based conceptual framework for rural property rights trading, endowed with data tamper-proof capabilities, enhancing transparency and trustworthiness in the rural property rights trading platform. This effectively elevates the security of rural property rights transactions and provides a solution to contract disputes;
- We design smart contracts that aggregate, analyze, and alert on-chain data, enabling functions such as transaction anomaly detection, auditing, and supervision. These smart contracts also support rural property rights confirmation, identity verification, and permission control;
- In the context of rural property rights trading, we introduce an efficient consensus mechanism, CA-PBFT. This mechanism maintains security and stability while enhancing the completion rate of transaction requests and information throughput, all the while reducing consensus and transaction latency;
- Leveraging the Hyperledger Fabric framework in a laboratory environment, we successfully develop a prototype system for rural property rights trading.
2. Related Research
2.1. Property Rights Transaction Platform
2.2. Blockchain and Its Application in Property Rights Transactions
2.3. Consensus Algorithms
3. Framework for a Blockchain-Based Rural Property Rights Trading System
3.1. Overall Conceptual Framework
3.2. Hyperledger Fabric
3.3. Identity Management and Access Control
- Identity registration:New participants are required to undergo identity registration as the first step in gaining access to the system. They must provide personal identity information and relevant credentials to substantiate their identity. This information is submitted to the system and subsequently subjected to verification.
- Transaction contracts: Smart contracts can be written and executed to define the terms and conditions of transactions, automating the transaction process and ensuring its security and reliability. The contract can specify the rights of both buyers and sellers, prices, and payment methods, and automatically release funds or transfer property based on predefined conditions;
- Identity verification:Upon submission of information, the system initiates identity verification procedures. This may encompass the validation of identity documents, credit reports, or other pertinent documents. Once identity verification is successfully completed, participants are granted access permissions to the system.
- Issuance of identity certificates:Following successful identity verification, the system issues identity certificates to participants. These certificates contain the participant’s identity information and access privileges.
- Access control:Once participants possess identity certificates, they can attempt to access the system. The system examines the certificates to ensure that the holder possesses the requisite permissions for the requested operations. If permissions are insufficient, access is denied.
- Smart contract execution:Access control extends to the execution of smart contracts on the blockchain network. Only participants with appropriate permissions are allowed to execute specific smart contracts.
- Auditing and monitoring:The system necessitates real-time monitoring of participant activities to ensure that they do not exceed their authorized scope. Simultaneously, audit logs record all accesses and transactions for auditing and tracking purposes.
3.4. On-Chain Transaction Information Flow
3.5. Smart Contracts
- Condition triggering;
- Automated execution;
- Time triggering;
- Event listening;
- External invocation.
- 1.
- Rural property rights certification:Smart contracts are employed to record and certify rural property rights information, storing ownership information for farmland, houses, or other assets on the blockchain in a manner that ensures the authenticity and traceability of property rights.
- Design principle:This contract is designed to record and certify rural property rights information, securely storing ownership details on the blockchain to ensure the legitimacy and security of property rights.
- Problem solved:Storing property rights information on an immutable blockchain resolves trust issues, ensuring the legality and security of property rights.
- 2.
- Transaction contracts:Smart contracts are used to compose and execute transaction contracts, specifying transaction conditions and terms, automating the transaction process to ensure its security and reliability. These contracts define the interests of both buyer and seller, prices, payment methods, and more, releasing funds or transferring ownership automatically based on conditions.
- Design principle:This contract is designed to compose and execute transaction contracts, defining transaction conditions and terms and automating the transaction process to ensure its security and reliability.
- Problem solved:Automatic execution of transaction contracts enhances transparency and reduces the risk of contract disputes.
- 3.
- Identity verification and access control:Smart contracts integrate identity verification mechanisms to ensure the legitimacy and compliance of participants. They validate participant identities and enforce permissions and access control, allowing only qualified participants to engage in property transaction operations.
- Design principle:This contract integrates identity verification mechanisms, ensuring participant identities are legitimate and compliant with predefined criteria, allowing only qualified participants to engage in property transaction operations.
- Problem solved:Identity verification and access control ensure that only legitimate and authorized participants conduct transactions, enhancing transaction security.
- 4.
- Transaction auditing and regulation:Smart contracts record all operations and changes in property transactions, providing transparent and traceable transaction records. These serve as effective auditing tools for regulatory authorities, ensuring transaction compliance and regulatory requirements.
- Design principle:This contract records all operations and changes in property transactions, providing transparent and traceable transaction records, serving as auditing tools for regulatory authorities.
- Problem solved:Providing auditable transaction records ensures transaction compliance and assists regulatory authorities in fulfilling their oversight responsibilities.
- 5.
- Transaction anomaly alerts:By setting specific conditions and rules within smart contracts, transaction anomalies can be monitored, triggering alert mechanisms when suspicious transactions, unusual amounts, or contract violations occur. Additionally, a predefined evaluation index and weight calculations for performance data are applied. The results are used as the output for evaluating the contract. Furthermore, a user interface is provided for users to query and view the credibility of each participant, enhancing transparency and mitigating potential fraud risks.
- Design principle:This contract monitors transaction anomalies and triggers alert mechanisms for suspicious behavior, unusual amounts, or contract violations.
- Problem solved:Automatic detection and alerting of anomalies enhance transaction security and reliability while reducing potential fraud risks.
4. Enhanced PBFT Consensus Algorithm (CA-PBFT) Based on a Dual Rating System of Credit and Activation
4.1. PBFT
- Security and fault tolerance:PBFT is renowned for its outstanding security and fault tolerance capabilities. In applications demanding a high level of security and trustworthiness, such as rural property rights transaction platforms, opting for PBFT helps ensure transaction security and data integrity. PBFT can tolerate up to 1/3 of malicious nodes, a critical feature for thwarting potential attacks and ensuring system stability;
- Communication complexity:PBFT has successfully reduced the communication complexity of Byzantine fault tolerance algorithms from exponential to polynomial levels. This efficiency gain is particularly vital in rural areas where network connectivity may be weak. PBFT’s low communication complexity guarantees the efficiency of both transaction and consensus processes, contributing to enhanced transaction speed and efficiency;
- Consensus protocol:PBFT’s consensus protocol [50] ensures consistency of state across all nodes, a crucial factor for ensuring transaction accuracy and traceability. In platforms dealing with numerous property transactions and data records, such as rural property rights transaction platforms, a reliable consensus protocol is essential for managing these transactions;
- Real-world applications and maturity:PBFT has been widely adopted and boasts mature implementations and ecosystems in real-world applications. In critical domains such as rural property rights transactions, selecting a validated consensus algorithm is paramount due to its proven reliability and effectiveness across various scenarios.
4.2. CA-PBFT
4.2.1. Dynamic Mechanism
- (1)
- Dynamic Node Addition
- Application phase:When a new node is introduced into the active network and intends to join the cluster for subsequent consensus phases, it initiates an AddNode request by dispatching a message s to all existing nodes within the cluster, along with an appended timestamp.
- New node authentication phase:Upon receiving the AddNode request from the newly introduced node, existing nodes broadcast AgreeAdd messages and collect these messages from other nodes. When a node accumulates 2f+1 AgreeAdd messages, it sends an authentication message concurring with the integration of the new node into the cluster. Subsequently, when the new node collects 2f+1 authentication messages, a consensus is reached, granting permission for the new node to be incorporated into the cluster.
- Data synchronization phase:The new node enters the proactive recovery process, sending data synchronization requests and receiving all currently stored information from other nodes to achieve data synchronization.
- Network integration phase:After completing data synchronization, the new node broadcasts the JoinNet request to all nodes within the entire blockchain network, requesting participation in the consensus process of the blockchain network. Upon receiving the JoinNet request from the newly introduced node, all existing nodes simultaneously inform each other of the new node’s formal network entry. Concurrently, a reevaluation of the total node count within the network is conducted, and a recalibration of the new view, denoted as v, is initiated.
- Receipt phase:The primary node issues the UpdateNet information to all nodes within the cluster. Upon receiving this message, all consensus nodes execute an update for the total node count, denoted as N, and the view, denoted as v, within the blockchain cluster. This concludes the procedure for adding the new node. Following the successful completion of view and node count updates, consensus nodes provide feedback to the primary node. Upon receiving 2f+1 such acknowledgments, indicating the successful integration of the new node into the network, a dynamic node addition consensus event is accomplished.
- (2)
- Data Synchronization for Dynamic Node Addition
- Data request: Upon formal network authentication, the node New_Replica5 initiates data synchronization by requesting all existing nodes provide their current data snapshots;
- Data response:Existing nodes respond to these requests by commencing the transmission of their blockchain data to the new node. This dataset may encompass complete block replicas, transaction histories, and other vital network information;
- Data verification:Upon receiving the data, New_Replica5 conducts a comprehensive verification process. This verification encompasses checking block continuity, transaction legitimacy, and potential digital signatures;
- Data completion:Once all data have been successfully synchronized, New_Replica5 broadcasts a message to notify the network of its attainment of a data version consistent with that of other nodes.
- (3)
- Dynamic Node Departure
- Application phase:When the node labeled as Del_Replica5 initiates a voluntary exit, it begins broadcasting Del_request messages to other nodes.
- Authentication message phase:Upon receiving the Del_request message from the exiting node (Del_Replica5), and assuming that this node is exiting the existing blockchain network, other nodes calculate the new view v and the total node count N after removing the exiting node. They broadcast their agreement to delete the Del_Replica5 node to the rest of the blockchain network. When f AgreeDel messages are collected, all nodes consent to and execute the request to remove the node, which includes data synchronization. Additionally, they encapsulate messages containing the updated view v and total node count N after the node’s deletion.
- Exit phase:After the node Del_Replica5 has exited, the primary node broadcasts an UpdataNet message.
- Network update:Upon receiving the UpdataNet message, all nodes within the network update the total node count N and the view v in the blockchain network. This finalizes the removal process of the mentioned node.
- (4)
- Data Synchronization for Dynamic Node Departure
- Data request: Before Del_Replica5 decides to depart, it may need to ensure that all pending transactions or incomplete data synchronizations have been successfully completed or taken over by other nodes in the network;
- Data transfer:In certain scenarios, Del_Replica5 may possess data that are not present in other nodes. In such cases, it becomes imperative for Del_Replica5 to transfer these unique data to other nodes within the network;
- Data confirmation:Once all data have been effectively transferred, Del_Replica5 broadcasts a message to notify the network that it can safely depart without causing data loss or inconsistencies;
- Data completion:Del_Replica5 formally disconnects from the network after ensuring that its data have been fully synchronized with the network.
4.2.2. The Dual-Scoring Mechanism with Credit and Activation
- (1)
- Credit Score
- (2)
- Activation
4.2.3. Simplified Consensus Protocol
4.2.4. Upgrading the Consensus Node Set under the Dynamic Scoring Model
- Foundations of the dynamic scoring modelThe dynamic scoring model is a scoring mechanism that comprehensively considers the credibility and proactiveness of nodes. By assessing a node’s performance and activity within the network, this model assigns a dynamically changing score to each node. Credibility primarily reflects a node’s stability and reliability within the consensus process, while proactiveness predominantly considers a node’s activity and efficiency.
- The Process of upgrading the consensus node set
- Data collection:The system periodically collects relevant data from each node, including transaction latency, transaction completion rates, transaction amounts, transaction frequency, and the distance between nodes and active transaction areas;
- Scoring and classification:Based on the collected data and the dynamic scoring model, each node is assigned a score for credibility and proactiveness. Subsequently, nodes are categorized as malicious nodes, regular nodes, candidate nodes, or priority nodes based on these scores;
- Role determination:Node categorization determines their roles within the consensus. For instance, malicious nodes are excluded from the consensus, while priority nodes may become primary nodes and participate in the consensus process;
- Network broadcasting:Once the node set is updated, this information is broadcasted through the network to ensure that all nodes are aware of the latest consensus node set.
- Upgrade frequency:Currently, our system performs consensus node set upgrades every 24 h. This frequency is based on our initial research and testing and may be adjusted in the future based on actual network performance and requirements.
4.2.5. CA-PBFT Consensus Algorithm Implementation Process
- Initialization of nodes:Upon startup, newly joined nodes receive initial scores, and an exit process is initiated for nodes requesting to leave. Existing nodes’ credit scores and activation are evaluated based on their historical performance, and nodes are categorized according to their score ranges.
- Client submits transaction requests:When a transaction request is received, the system checks for the current primary node. If no primary node exists, the candidate node with the highest score is selected as the primary node. Priority nodes, if available, are given preference in primary node selection.
- Primary node executes consensus task:The primary node takes charge of executing consensus tasks, which involve tasks such as assigning identifiers and processing request messages. Subsequently, it engages in executing a streamlined consensus protocol. During this phase, the primary node assesses and compares the status of participating nodes based on received feedback and messages.
- Confirming Byzantine nodes:In the feedback phase of the simplified consensus protocol, the primary node verifies the information transmitted by consensus nodes, primarily by checking the consistency of the information’s hash values. If the hash values of the information transmitted by all consensus nodes are identical, it indicates the absence of Byzantine nodes’ interference in the current network, allowing the consensus process to proceed. The primary node records scores and consensus information, preparing for the next round of consensus. However, if inconsistencies in hash values are detected, signifying the presence of Byzantine nodes, the primary node immediately halts the execution of the simplified consensus protocol to prevent any disruption.
- Complete PBFT consensus protocol:If the presence of Byzantine nodes is confirmed, the primary node initiates the execution of the complete PBFT consensus protocol, involving all consensus nodes to ensure the safety and correctness of the consensus process.
- Update scores after consensus:After completing the consensus, all nodes record the data generated during the process and calculate and update the credit score and activation of each node. Nodes with scores falling below the established threshold are excluded from the consensus group and cannot participate in future consensus processes.
- Return to step one for the next round:The system returns to the initial step, awaiting new transaction requests and preparing for the next round of consensus.
4.2.6. Process Summary of the CA-PBFT Algorithm
- Dynamic mechanism:This mechanism’s benefits lie in its ability to adapt to ever-changing circumstances, seamlessly incorporate new nodes, and maintain operational continuity. Its core principles emphasize flexibility, adaptability, stability, and efficient consensus, critical for sustaining the effectiveness and reliability of the blockchain network. Whether nodes exit due to failures, maintenance, or other reasons, the algorithm swiftly adjusts to changes and ensures the network’s continuous operation. This flexibility and fault-tolerance enable the CA-PBFT algorithm to effectively handle continuously shifting network conditions and node join/exit scenarios. In the real world, network topology and node participation may change frequently, but the CA-PBFT algorithm can adapt flexibly, maintaining a high level of system stability and reliability. In summary, the dynamic exit and join mechanisms provide the CA-PBFT algorithm with increased adaptability and robustness.
- Dual-scoring mechanism:Through the dual-scoring mechanism, which combines credit scoring and activation, nodes contributing significant value to the system are chosen to participate in the consensus process, while malicious nodes are identified and excluded. Nodes that successfully complete consensus tasks or offer valuable contributions receive higher scores, incentivizing active participation in the consensus process and promoting the provision of higher-quality services and contributions. By rewarding beneficial behavior, this mechanism stimulates nodes’ enthusiasm and sense of responsibility, thereby enhancing the overall efficiency and stability of the system.
- Simplified consensus protocol:In the CA-PBFT algorithm, a simplified consensus protocol has been specifically designed for scenarios without Byzantine nodes. Through optimizations in the algorithm and communication mechanisms, unnecessary communication frequency and data transmission volume between nodes are reduced, effectively lowering network load and latency. This streamlined consensus protocol, focused on consistency, enhances overall system performance, reduces latency, conserves resources, and reinforces system stability, ultimately delivering efficient performance, a favorable user experience, and adaptability to blockchain systems.
5. Development and Implementation of the Prototype System
- Smart contract development:On the blockchain, smart contracts are the code that implements business logic. We employed the GO programming language to write smart contracts, defining rules and operations for property rights transactions.
- Data model design:Appropriate data structures were designed to store transaction information, geographical location data, and property-related details. This involves using state databases (such as CouchDB and LevelDB) to store data and defining the structure and relationships of the data.
- Chaincode deployment:Chaincode is the executable instance of smart contracts on the blockchain. We deployed well-written smart contracts to nodes within the blockchain network, enabling them to be invoked and executed.
- Consensus configuration:To facilitate the easy adjustment of consensus algorithm parameters and network node configurations, we configured the consensus mechanism of the blockchain network, ensuring that all nodes in the network achieve consensus on transaction approvals.
- Transaction verification and block construction:When property transactions occur, they are submitted to the blockchain network and subsequently undergo verification and processing. Verification ensures transactions adhere to contract rules before adding them to new blocks.
6. Experimental Design and Analysis
6.1. Throughput Analysis
- Experiment 1
- Experiment 2
6.2. Consistency Delay Analysis
- Experiment 3
- Experiment 4
6.3. Fault-Tolerance Security Analysis
- Experiment 5
6.4. Analysis of Transaction Request Valid Completion Rate
- Experiment 6
6.5. Summary of CA-PBFT
- Comprehensiveness of dual scoring:
- The dual-scoring model provides a more comprehensive node assessment. The credit score focuses on node stability and reliability, while the activation score emphasizes node activeness and efficiency. The combination ensures that selected nodes are both trustworthy and efficient.
- Enhanced security:
- In a single-scoring model, malicious nodes could boost their score through specific actions to participate in consensus. However, in the dual-scoring model, malicious nodes must excel in both dimensions, significantly increasing the difficulty of their selection. Additionally, CA-PBFT directly removes malicious nodes from the consensus process, greatly enhancing system security.
- Performance improvements:
- The dual-scoring mechanism considers factors such as node proximity to active transaction areas, transaction latency, transaction amounts, and transaction frequency. This ensures that selected nodes are not only reliable but also most likely to process transactions quickly;
- Ensuring that primary nodes are efficient accelerates the entire consensus process, enhancing performance.
- Enhanced adaptability:
- Tailored for rural property rights trading platforms, the dual-scoring mechanism specifically addresses critical factors in this scenario, such as node proximity to active transaction areas, making it more suitable than a generic single-scoring model.
7. Conclusions and Prospects
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Li, Z.X. Design and implementation of intellectual property rights exhibition and trade platform. Electron. Des. Eng. 2013, 21, 9–12. [Google Scholar]
- Wang, B.; Li, J.J. Design and Implementation of Rural Comprehensive Property RightsTransaction System. Geospat. Inf. 2017, 15, 77–79. [Google Scholar]
- Jiang, S.; Cao, J.; Zhu, J.; Cao, Y. PolyChain: A generic blockchain as a service platform. In Proceedings of the International Conference on Blockchain and Trustworthy Systems, Guangzhou, China, 5–6 August 2021; pp. 459–472. [Google Scholar]
- Nakamoto, S. Bitcoin: A Peer-to-Peer Electronic Cash System. Decentralized Bus. Rev. 2008, 21260. [Google Scholar]
- Wood, G. Ethereum: A Secure Decentralised Generalised Transaction Ledger. Ethereum Proj. Yellow Pap. 2014, 151, 1–32. [Google Scholar]
- Wu, H.T.; Zhong, B.T.; Li, H.; Guo, J.D.; Wang, Y.H. On-Site Construction Quality Inspection Using Blockchain and Smart Contracts. J. Manag. Eng. 2021, 37, 04021065. [Google Scholar] [CrossRef]
- Xu, L.; Chen, W.; Li, Z.; Xu, J.; Liu, A.; Zhao, L. Solutions for concurrency conflict problem on Hyperledger Fabric. World Wide Web 2021, 24, 463–482. [Google Scholar] [CrossRef]
- Zhong, B.; Guo, J.; Zhang, L.; Wu, H.T.; Li, H. A blockchain-based framework for on-site construction environmental monitoring: Proof of concept. Build. Environ. 2022, 217, 109064. [Google Scholar] [CrossRef]
- Hang, L.; Kim, D. Optimal blockchain network construction methodology based on analysis of configurable components for enhancing Hyperledger Fabric performance. Blockchain Res. Appl. 2021, 2, 100009. [Google Scholar] [CrossRef]
- Firdaus, A.; Razak, M.F.A.; Feizollah, A.; Hashem, I.A.T.; Hazim, M.; Anuar, N.B. The rise of “blockchain”: Bibliometric analysis of blockchain study. Scientometrics 2019, 120, 1289–1331. [Google Scholar] [CrossRef]
- Touloupou, M.; Themistocleous, M.; Iosif, E.; Christodoulou, K. A Systematic Literature Review Toward a Blockchain Benchmarking Framework. IEEE Access 2022, 10, 70630–70644. [Google Scholar] [CrossRef]
- Duan, Z.; Feng, W.; Zhong, W.; Huang, M.; Feng, S. Form Specification of Smart Contract for Intellectual Property Transaction Based on Blockchain. Wirel. Commun. Mob. Comput. 2022, 2022, 3274454. [Google Scholar] [CrossRef]
- Sladić, G.; Milosavljević, B.; Nikolić, S.; Sladić, D.; Radulović, A. A Blockchain Solution for Securing Real Property Transactions: A Case Study for Serbia. ISPRS Int. J.-Geo-Inf. 2021, 10, 35. [Google Scholar] [CrossRef]
- Perera, S.; Hijazi, A.A.; Weerasuriya, G.T.; Nanayakkara, S.; Rodrigo, M.N.N. Blockchain-Based Trusted Property Transactions in the Built Environment: Development of an Incubation-Ready Prototype. Buildings 2021, 11, 560. [Google Scholar] [CrossRef]
- Mashatan, A.; Lemieux, V.; Lee, S.H.; Szufel, P.; Roberts, Z. Usurping Double-Ending Fraud in Real Estate Transactions via Blockchain Technology. J. Database Manag. 2021, 32, 27–48. [Google Scholar] [CrossRef]
- Yadav, A.S.; Agrawal, S.; Kushwaha, D.S. Distributed Ledger Technology-based land transaction system with trusted nodes consensus mechanism. J. King Saud Univ. Comput. Inf. Sci. 2022, 34, 6414–6424. [Google Scholar] [CrossRef]
- Ma, Z.; Zhao, W.; Luo, S.; Wang, L. TrustedBaaS: Blockchain-Enabled Distributed and Higher-Level Trusted Platform. Comput. Netw. 2020, 183, 107600. [Google Scholar] [CrossRef]
- Ahmad, I.; Alqarni, M.A.; Almazroi, A.A. Real Estate Management via a Decentralized Blockchain Platform. Comput. Mater. Contin. 2021, 66, 1813–1822. [Google Scholar] [CrossRef]
- Song, H.; Zhu, N.; Xue, R. Proof-of-Contribution consensus mechanism for blockchain and its application in intellectual property protection. Inf. Process. Manag. 2021, 58, 102507. [Google Scholar] [CrossRef]
- Zhao, L.T.; Zhang, J.W.; Jing, H.R. Blockchain-Enabled Digital Rights Management for Museum-Digital Property Rights. Intell. Autom. Soft Comput. 2022, 34, 1785–1801. [Google Scholar] [CrossRef]
- Hasan, M.A.; Tariq, M.; Chen, Z. A digital rights management system based on a scalable blockchain. Peer -Peer Netw. Appl. 2020, 14, 2665–2680. [Google Scholar]
- Liu, Y.; Shang, C. Application of Blockchain Technology in Agricultural Water Rights Trade Management. IEEE Access 2022, 14, 7017. [Google Scholar] [CrossRef]
- Chen, C.L.; Fang, C.C.; Zhou, M.A. Blockchain-Based Anti-Counterfeit and Traceable NBA Digital Trading Card Management System. Symmetry 2022, 14, 1827. [Google Scholar] [CrossRef]
- Thien, H.T.; Thippa, R.G.; Wang, W.Z. Blockchain for the metaverse: A Review. ScienceDirect 2023, 143, 401–419. [Google Scholar]
- Wang, X.J.; Zhu, H.L.; Guo, L. Blockchain Intelligence for Internet of Vehicles: Challenges and Solutions. IEEE Commun. Surv. Tutor. 2023, 10, 3305312. [Google Scholar] [CrossRef]
- Peng, J.; Zhang, L.; You, S.M. Blockchain technology applications in waste management: Overview, challenges and opportunities. ScienceDirect 2023, 421, 138466. [Google Scholar]
- Li, K.P.; Lee, J.Y.; Amir, G. Blockchain in food supply chains: A literature review and synthesis analysis of platforms, benefits and challenges. Int. J. Prod. Res. 2021, 61, 3527–3546. [Google Scholar] [CrossRef]
- Milad, B.S.; Robert, C.M.; Sina, F.M. Blockchain in the Construction Industry between 2016 and 2022: A Review, Bibliometric, and Network Analysis. Smart Cities 2023, 6, 819–845. [Google Scholar]
- Yuan, Y.; Ni, X.C.; Zeng, S.; Wang, F.Y. Blockchain Consensus Algorithms: The State of the Art and Future Trends. Acta Autom. Sin. 2018, 44, 2011–2022. [Google Scholar]
- Yao, S.; Yingsen, W. SV-PBFT: An Efficient and Stable Blockchain PBFT Improved Consensus Algorithm for Vehicle-to-Vehicle Energy Transactions. J. Internet Technol. 2022, 23, 1191–1201. [Google Scholar] [CrossRef]
- Almakki, R.; AlSuwaidan, L.; Khan, S.; Baig, A.R.; Baseer, S.; Singh, M. Fault Tolerance Byzantine Algorithm for Lower Overhead Blockchain. Secur. Commun. Netw. 2022, 2022, 1855238. [Google Scholar] [CrossRef]
- Wu, J.Y.; Liu, Y.; Cai, J.F.; Su, S.H. Blockchain Consensus Mechanism for Distributed Energy Transactions. Wirel. Commun. Mob. Comput. 2022, 44, 1–13. [Google Scholar] [CrossRef]
- Liu, W.; Zhang, X.; Feng, W.; Huang, M.; Xu, Y. Optimization of the PBFT Algorithm Based on QoS-Aware Trust Service Evaluation. Sensors 2022, 22, 4590. [Google Scholar] [CrossRef] [PubMed]
- Fang, W.W.; Wang, Z.Y.; Song, H.L.; Wang, Y.P.; Ding, Y. An optimized PBFT consensus algorithm for blockchain. J. Beijing Jiaotong Univ. 2019, 43, 58–64. [Google Scholar]
- Liu, X.N.; Zhang, R.H.; Liu, C.Z. Improvement of PBFT Consensus Algorithm Based on Grouping and Credit Rating. Comput. Eng. 2023, 36, 1–13. [Google Scholar]
- Meng, W.T.; Zhang, D.W. Optimization Scheme for Hyperledger Fabric Consensus Mechanism. Acta Autom. Sin. 2021, 47, 1885–1898. [Google Scholar]
- Reng, X.Y.; Tong, X.R.; Zhang, W. PBFT Consensus Algorithm Based on Trust Evaluation Mode. J. Shanxi Univ. 2023, 46, 108–118. [Google Scholar]
- Liu, Z.K.; Wang, F.; Jia, H.R. Optimization Scheme of PBFT Algorithm Combining Dynamic Credit Mechanism. Comput. Eng. 2023, 49, 191–198. [Google Scholar]
- Zhong, W.; Feng, W.L.; Huang, M.X.; Feng, S.L. ST-PBFT: An Optimized PBFT Consensus Algorithm for Intellectual Property Transaction Scenarios. Electronic 2023, 12, 325. [Google Scholar] [CrossRef]
- Ouyang, L.W.; Wang, S.; Yuan, Y. Smart contracts: Architecture and research progresses. Acta Autom. Sin. 2019, 45, 445–457. [Google Scholar]
- Ding, T.S.; Cheng, S.P. Improved PBFT Consensus Mechanism Based on Credit-Layered Mechanism. Comput. Syst. Appl. 2020, 29, 255–259. [Google Scholar]
- Elli, A.; Artem, B. Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains. Ithaca Cornell Univ. Libr. 2018, 30, 1–15. [Google Scholar]
- Kuzlu, M.; Pipattanasomporn, M.; Gurses, L.; Rahman, S. Performance analysis of a hyperledger fabric blockchain framework: Throughput, latency and scalability. In Proceedings of the 2019 IEEE International Conference on Blockchain (Blockchain), Atlanta, Atlanta, GA, USA, 14–17 July 2019; pp. 536–540. [Google Scholar]
- Zheng, Z.; Xie, S.; Dai, H.; Chen, W.; Chen, X.; Weng, J. An overview on smart contracts: Challenges, advances and platforms. Future Gener. Comput. Syst. 2020, 105, 475–491. [Google Scholar] [CrossRef]
- Peter, G.; Aggelos, K.; Dionysis, Z. Proof-of-stake sidechains. In Proceedings of the 2019 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 19–23 May 2019; pp. 139–156. [Google Scholar]
- Lobanov, A.V. Models of Closed Multimachine Computer Systems with Transient-fault-tolerance and Fault-tolerance on the Basis of Replication under Byzantine Faults. Autom. Remote Control 2009, 70, 328–343. [Google Scholar] [CrossRef]
- Lashkari, B.; Musilek, P. A Comprehensive Review of Blockchain Consensus Mechanisms. IEEE Access 2021, 9, 43620–43652. [Google Scholar] [CrossRef]
- Fu, X.M.; Wang, H.; Shi, P. A survey of Blockchain consensus algorithms: Mechanism, design and applications. Sci. China Inf. Sci. 2021, 62, 121101. [Google Scholar] [CrossRef]
- Wang, Q.; Li, H.J.; Ni, X.L. Survey on Blockchain Consensus Algorithms and Application. J. Front. Comput. Sci. Technol. 2022, 16, 1214–1242. [Google Scholar]
- Di, S.P.; Huo, Y.Y.; Yang, Y. Improvement of PBFT algorithm based on consistent hash and random selection. Comput. Eng. Appl. 2023, 14, 1–11. [Google Scholar]
- Chen, S.M.; Wang, B.; Chen, Y.Q. Improved PBFT consensus algorithm based on node grouping reputation model. Appl. Res. Comput. 2023, 11, 1–7. [Google Scholar]
- Xu, J.Y.; Hua, C.J.; Zhang, Y. A blockchain-based framework for supervision of livelihood issues: Proof of concept with optimized consensus. IEEE Access 2023, 11, 73414–73434. [Google Scholar] [CrossRef]
Software | Version |
---|---|
Deployment Tool | Docker |
SDK | Hyperledger Fabric SDK |
CPU | Intel Core i7-9750 H 2.60 GHz |
Memory | 16 GB RAM |
Operating System | Centos 7.6 |
Hyperledger Fabric | 2.2 |
Deployment Tool | Docker |
Memory | 16 GB RAM |
SDK | Hyperledger Fabric SDK |
The Number of Nodes | PBFT | C-PBFT | CA-PBFT |
---|---|---|---|
4 | 86.8% | 92.0% | 94.0% |
7 | 78.2% | 88.4% | 92.2% |
10 | 74.8% | 85.2% | 91.6% |
13 | 70.2% | 80.8% | 90.0% |
16 | 62.2% | 78.2% | 87.8% |
19 | 53.0% | 74.8% | 84.2% |
22 | 44.8% | 70.0% | 82.4% |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Hua, C.; Wu, S.; Zhang, Y.; Luo, K.; Li, M.; Fu, J. A Blockchain-Based Framework for Rural Property Rights Transactions. Electronics 2023, 12, 4334. https://doi.org/10.3390/electronics12204334
Hua C, Wu S, Zhang Y, Luo K, Li M, Fu J. A Blockchain-Based Framework for Rural Property Rights Transactions. Electronics. 2023; 12(20):4334. https://doi.org/10.3390/electronics12204334
Chicago/Turabian StyleHua, Caijian, Sichao Wu, Yan Zhang, Kun Luo, Miaomiao Li, and Jiaguo Fu. 2023. "A Blockchain-Based Framework for Rural Property Rights Transactions" Electronics 12, no. 20: 4334. https://doi.org/10.3390/electronics12204334
APA StyleHua, C., Wu, S., Zhang, Y., Luo, K., Li, M., & Fu, J. (2023). A Blockchain-Based Framework for Rural Property Rights Transactions. Electronics, 12(20), 4334. https://doi.org/10.3390/electronics12204334