Skip to main content
Log in

Security and privacy of digital economic risk assessment system based on cloud computing and blockchain

  • Neural Networks
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

The digital economy constantly evolves and blockchain technology has become crucial in assessing risks. The security of the economic sector is of utmost importance, and blockchain offers improved security measures while also introducing potential risks. This study conducted a thorough investigation and research on the risk assessment and analysis of blockchain and cloud computing services. It provides a comprehensive overview of the risks associated with blockchain and cloud computing, covering various aspects. This research offers a revolutionary blockchain-and cloud-based digital economic risk assessment system to solve these problems. The system employs blockchain technology to make risk assessment records and processes secure, immutable, and auditable. The algorithm used in blockchain mining is crucial for ensuring privacy and security, particularly in data access transactions. This study introduces differential privacy within the M-kCCIA and BC-PPkCA algorithms. These enhancements increase privacy and security in a digital economic risk assessment system. These advancements enable the public to utilize blockchain cloud services more efficiently and securely. The digital economic landscape within the blockchain ecosystem is complex. This study examines the industry's economic situation, investigates risk assessment, and compares the advantages of a blockchain-based digital assessment system. Furthermore, it evaluates the risks associated with the digital economy and provides corresponding analyses. The presented system uses cloud storage services to store assessment files and their hashes on various blockchains. That overcomes the challenges of blockchain's storage capacity and ensures data integrity in the system. Security and performance analysis demonstrate the efficacy and authenticity of the technique. A verifier can validate query results returned by blockchain nodes; it just needs to store block headers.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

Data availability statement

Inquiries about data availability should be addressed to the authors.

References

  • Ahmed F et al (2020) Uniroam: an anonymous and accountable authentication scheme for cross-domain access. In: 2020 international conference on networking and network applications (NaNA). IEEE

  • Ahmed F et al (2022) Toward fine-grained access control and privacy protection for video sharing in media convergence environment. Int J Intell Syst 37(5):3025–3049

    Article  Google Scholar 

  • Ali M, Yin B, Bilal H et al (2023) Advanced efficient strategy for detection of dark objects based on spiking network with multi-box detection. Multimed Tools Appl. https://doi.org/10.1007/s11042-023-16852-2

    Article  Google Scholar 

  • Aslam MS (2021) L 2–L∞ control for delayed singular markov switch system with nonlinear actuator faults. Int J Fuzzy Syst 23(7):2297–2308

    Article  Google Scholar 

  • Aslam MS, Zhenhua MA (2023) Output regulation for time–delayed Takagi–Sugeno fuzzy model with networked control system. Hacettepe J Math Stat 52(5):1–21 https://doi.org/10.15672/hujms.1017898

    Article  MathSciNet  Google Scholar 

  • Caterino M, Rinaldi M, Fera M (2023) Digital ergonomics: an evaluation framework for the ergonomic risk assessment of heterogeneous workers. Int J Comput Integr Manuf 36(2):239–259

    Article  Google Scholar 

  • Chen Z (2019) Observer-based dissipative output feedback control for network T–S fuzzy systems under time delays with mismatch premise. Nonlinear Dyn 95:2923–2941

    Article  Google Scholar 

  • Christoph S et al (2022) Assessment and treatment of privacy issues in blockchain systems. In: SIGAPP applied computing review, vol 22, no 3. Association for Computing Machinery, pp 5–24

  • Dai X, Hou J, Li Q, Ullah R, Ni Z, Liu Y (2020) Reliable control design for composite-driven scheme based on delay networked T–S fuzzy system. Int J Robust Nonlinear Control 30(4):1622–1642

    Article  MathSciNet  Google Scholar 

  • Dou H, Liu Y, Chen S et al (2023) A hybrid CEEMD-GMM scheme for enhancing the detection of traffic flow on highways. Soft Comput 27:16373–16388. https://doi.org/10.1007/s00500-023-09164-y

    Article  Google Scholar 

  • Doumpos M et al (2023) Operational research and artificial intelligence methods in banking. Eur J Oper Res 306(1):1–16

    Article  MathSciNet  Google Scholar 

  • Ferrer AJ (2023) Beyond edge computing: swarm computing and ad-hoc edge clouds. Springer, Cham

    Book  Google Scholar 

  • Frana PL (2023) Demographics Inc, computerized direct mail, and the rise of the digital attention economy. IEEE Ann Hist Comput 45(2):15–28

    Article  Google Scholar 

  • Guo R, Tafti A, Subramanyam R (2023) Internal IT modularity, firm size, and adoption of cloud computing. Electron Commer Res 1–30https://doi.org/10.1007/s10660-023-09691-8

  • He H et al (2023) A privacy-preserving decentralized credit scoring method based on multi-party information. Decis Support Syst 166:113910

    Article  Google Scholar 

  • Howell A, Saber T, Bendechache M (2023) Measuring node decentralisation in blockchain peer to peer networks. Blockchain Res Appl 4(1):100109

    Article  Google Scholar 

  • Ke C et al (2022) A privacy risk assessment scheme for fog nodes in access control system. IEEE Trans Reliab 71(4):1513–1526. https://doi.org/10.1109/TR.2021.3103906

    Article  Google Scholar 

  • Komljenovic J (2022) The future of value in digitalised higher education: why data privacy should not be our biggest concern. High Educ 83(1):119–135

    Article  Google Scholar 

  • Li Q, Hou J (2021) Fault detection for asynchronous T–S fuzzy networked Markov jump systems with new event-triggered scheme. IET Control Theory Appl 15(11):1461–1473

    Article  MathSciNet  Google Scholar 

  • Li X, Wang J, Yang C (2023) Risk prediction in financial management of listed companies based on optimized BP neural network under digital economy. Neural Comput Appl 35(3):2045–2058

    Article  Google Scholar 

  • Lin P, Maozhi Wu, Zhang L (2023) Probabilistic safety risk assessment in large-diameter tunnel construction using an interactive and explainable tree-based pipeline optimization method. Appl Soft Comput 143:110376

    Article  Google Scholar 

  • Litimein H, Huang ZY, Aslam MS (2023) Circular formation control with collision avoidance based on probabilistic position. Intell Autom Soft Comput 37(1):321–341. https://doi.org/10.32604/iasc.2023.036786

    Article  Google Scholar 

  • Liu J et al (2023) Risk assessment based on FMEA combining DEA and cloud model: a case application in robot-assisted rehabilitation. Expert Syst Appl 214:119119

    Article  Google Scholar 

  • Matthias E et al (2022) Automated security risk identification using automation ML-based engineering data. IEEE Trans Depend Secure Comput 19(3):1655–1672

    Article  Google Scholar 

  • McManus K et al (2022) Development of data-driven metrics for balance impairment and fall risk assessment in older adults. IEEE Trans Biomed Eng 69(7):2324–2332

    Article  Google Scholar 

  • Muhammad SA, Qaisar I, Majid A, Shamrooz S (2023) Adaptive event-triggered robust H∞ control for Takagi–Sugeno fuzzy networked Markov jump systems with time-varying delay. Asian J Control 25(1):213–228

    Article  MathSciNet  Google Scholar 

  • Pan W et al (2022) Digital economy: an innovation driver for total factor productivity. J Bus Res 139:303–311

    Article  Google Scholar 

  • Qaisar I, Majid A, Ramaraj P (2021) Design of sliding mode controller for sensor/actuator fault with unknown input observer for satellite control system. Soft Comput 25(24):14993–15003

    Article  Google Scholar 

  • Quach S et al (2022) Digital technologies: tensions in privacy and data. J Acad Mark Sci 50(6):1299–1323

    Article  Google Scholar 

  • Roberta G et al (2022) Semantics and non-fungible tokens for copyright management on the metaverse and beyond. ACM Trans Multimed Comput Commun Appl. https://doi.org/10.1145/3585387

    Article  Google Scholar 

  • Song Z et al (2022) Fall risk assessment for the elderly based on weak foot features of wearable plantar pressure. IEEE Trans Neural Syst Rehabil Eng 30:1060–1070

    Article  Google Scholar 

  • Tronnier F, Harborth D, Hamm P (2022) Investigating privacy concerns and trust in the digital Euro in Germany. Electron Commer Res Appl 53:101158

    Article  Google Scholar 

  • Ullah R, Dai X, Sheng A (2020a) Event-triggered scheme for fault detection and isolation of non-linear system with time-varying delay. IET Control Theory Appl 14(16):2429–2438

    Article  MathSciNet  Google Scholar 

  • Ullah R, Li Y, Aslam MS, Sheng A (2020b) Event-triggered dissipative observer-based control for delay dependent T–S fuzzy singular systems. IEEE Access 8:134276–134289

    Article  Google Scholar 

  • Wen H, Wen C, Lee C-C (2022) Impact of digitalization and environmental regulation on total factor productivity. Inf Econ Policy 61:101007

    Article  Google Scholar 

  • Wu Q, Li X, Wang K et al (2023) Regional feature fusion for on-road detection of objects using camera and 3D-LiDAR in high-speed autonomous vehicles. Soft Comput 27:18195–18213. https://doi.org/10.1007/s00500-023-09278-3

    Article  Google Scholar 

  • Wu J et al (2023) Risk assessment of open-pit slope based on large-scale group decision-making method considering non-cooperative behavior. Int J Fuzzy Syst 25(1):245–263

    Article  Google Scholar 

  • Zhang R (2023a) The application of artificial immune network in e-commerce credit risk assessment. Int J Comput Intell Syst 16(1):155

    Article  MathSciNet  Google Scholar 

  • Zhang C (2023b) The analysis of the risks and improvements of ERC20 tokens. Highlights Sci Eng Technol 39:1093–1097

    Article  Google Scholar 

  • Zhang F, Song W (2022) Sustainability risk assessment of blockchain adoption in sustainable supply chain: an integrated method. Comput Ind Eng 171:108378

    Article  Google Scholar 

  • Zhang L et al (2021) A risk-level assessment system based on the STRIDE/DREAD model for digital data marketplaces. Int J Inf Secur 1–17

  • Zhao S et al (2023) Nonlinear and spatial spillover effects of the digital economy on green total factor energy efficiency: evidence from 281 cities in China. Environ Sci Pollut Res 30(34):81896–81916

    Article  Google Scholar 

  • Zhenhua M, Ullah R, Li Y, Sheng A, Majid A (2022) Stability and admissibility analysis of T–S descriptive systems and its applications. Soft Comput 26(15):7159–7166

    Article  Google Scholar 

  • Zhihan L, Chen C, Haibin L (2023) Blockchain-based decentralized learning for security in digital twins. IEEE Internet Things J 10(24):21479–21488. https://doi.org/10.1109/JIOT.2023.3295499

    Article  Google Scholar 

Download references

Funding

No funding was provided for the completion of this study.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wenjin Jin.

Ethics declarations

Conflict of interest

The authors have declared no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jin, W. Security and privacy of digital economic risk assessment system based on cloud computing and blockchain. Soft Comput 28, 2753–2768 (2024). https://doi.org/10.1007/s00500-023-09586-8

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-023-09586-8

Keywords

Navigation