Abstract
The digital economy constantly evolves and blockchain technology has become crucial in assessing risks. The security of the economic sector is of utmost importance, and blockchain offers improved security measures while also introducing potential risks. This study conducted a thorough investigation and research on the risk assessment and analysis of blockchain and cloud computing services. It provides a comprehensive overview of the risks associated with blockchain and cloud computing, covering various aspects. This research offers a revolutionary blockchain-and cloud-based digital economic risk assessment system to solve these problems. The system employs blockchain technology to make risk assessment records and processes secure, immutable, and auditable. The algorithm used in blockchain mining is crucial for ensuring privacy and security, particularly in data access transactions. This study introduces differential privacy within the M-kCCIA and BC-PPkCA algorithms. These enhancements increase privacy and security in a digital economic risk assessment system. These advancements enable the public to utilize blockchain cloud services more efficiently and securely. The digital economic landscape within the blockchain ecosystem is complex. This study examines the industry's economic situation, investigates risk assessment, and compares the advantages of a blockchain-based digital assessment system. Furthermore, it evaluates the risks associated with the digital economy and provides corresponding analyses. The presented system uses cloud storage services to store assessment files and their hashes on various blockchains. That overcomes the challenges of blockchain's storage capacity and ensures data integrity in the system. Security and performance analysis demonstrate the efficacy and authenticity of the technique. A verifier can validate query results returned by blockchain nodes; it just needs to store block headers.
Similar content being viewed by others
Data availability statement
Inquiries about data availability should be addressed to the authors.
References
Ahmed F et al (2020) Uniroam: an anonymous and accountable authentication scheme for cross-domain access. In: 2020 international conference on networking and network applications (NaNA). IEEE
Ahmed F et al (2022) Toward fine-grained access control and privacy protection for video sharing in media convergence environment. Int J Intell Syst 37(5):3025–3049
Ali M, Yin B, Bilal H et al (2023) Advanced efficient strategy for detection of dark objects based on spiking network with multi-box detection. Multimed Tools Appl. https://doi.org/10.1007/s11042-023-16852-2
Aslam MS (2021) L 2–L∞ control for delayed singular markov switch system with nonlinear actuator faults. Int J Fuzzy Syst 23(7):2297–2308
Aslam MS, Zhenhua MA (2023) Output regulation for time–delayed Takagi–Sugeno fuzzy model with networked control system. Hacettepe J Math Stat 52(5):1–21 https://doi.org/10.15672/hujms.1017898
Caterino M, Rinaldi M, Fera M (2023) Digital ergonomics: an evaluation framework for the ergonomic risk assessment of heterogeneous workers. Int J Comput Integr Manuf 36(2):239–259
Chen Z (2019) Observer-based dissipative output feedback control for network T–S fuzzy systems under time delays with mismatch premise. Nonlinear Dyn 95:2923–2941
Christoph S et al (2022) Assessment and treatment of privacy issues in blockchain systems. In: SIGAPP applied computing review, vol 22, no 3. Association for Computing Machinery, pp 5–24
Dai X, Hou J, Li Q, Ullah R, Ni Z, Liu Y (2020) Reliable control design for composite-driven scheme based on delay networked T–S fuzzy system. Int J Robust Nonlinear Control 30(4):1622–1642
Dou H, Liu Y, Chen S et al (2023) A hybrid CEEMD-GMM scheme for enhancing the detection of traffic flow on highways. Soft Comput 27:16373–16388. https://doi.org/10.1007/s00500-023-09164-y
Doumpos M et al (2023) Operational research and artificial intelligence methods in banking. Eur J Oper Res 306(1):1–16
Ferrer AJ (2023) Beyond edge computing: swarm computing and ad-hoc edge clouds. Springer, Cham
Frana PL (2023) Demographics Inc, computerized direct mail, and the rise of the digital attention economy. IEEE Ann Hist Comput 45(2):15–28
Guo R, Tafti A, Subramanyam R (2023) Internal IT modularity, firm size, and adoption of cloud computing. Electron Commer Res 1–30https://doi.org/10.1007/s10660-023-09691-8
He H et al (2023) A privacy-preserving decentralized credit scoring method based on multi-party information. Decis Support Syst 166:113910
Howell A, Saber T, Bendechache M (2023) Measuring node decentralisation in blockchain peer to peer networks. Blockchain Res Appl 4(1):100109
Ke C et al (2022) A privacy risk assessment scheme for fog nodes in access control system. IEEE Trans Reliab 71(4):1513–1526. https://doi.org/10.1109/TR.2021.3103906
Komljenovic J (2022) The future of value in digitalised higher education: why data privacy should not be our biggest concern. High Educ 83(1):119–135
Li Q, Hou J (2021) Fault detection for asynchronous T–S fuzzy networked Markov jump systems with new event-triggered scheme. IET Control Theory Appl 15(11):1461–1473
Li X, Wang J, Yang C (2023) Risk prediction in financial management of listed companies based on optimized BP neural network under digital economy. Neural Comput Appl 35(3):2045–2058
Lin P, Maozhi Wu, Zhang L (2023) Probabilistic safety risk assessment in large-diameter tunnel construction using an interactive and explainable tree-based pipeline optimization method. Appl Soft Comput 143:110376
Litimein H, Huang ZY, Aslam MS (2023) Circular formation control with collision avoidance based on probabilistic position. Intell Autom Soft Comput 37(1):321–341. https://doi.org/10.32604/iasc.2023.036786
Liu J et al (2023) Risk assessment based on FMEA combining DEA and cloud model: a case application in robot-assisted rehabilitation. Expert Syst Appl 214:119119
Matthias E et al (2022) Automated security risk identification using automation ML-based engineering data. IEEE Trans Depend Secure Comput 19(3):1655–1672
McManus K et al (2022) Development of data-driven metrics for balance impairment and fall risk assessment in older adults. IEEE Trans Biomed Eng 69(7):2324–2332
Muhammad SA, Qaisar I, Majid A, Shamrooz S (2023) Adaptive event-triggered robust H∞ control for Takagi–Sugeno fuzzy networked Markov jump systems with time-varying delay. Asian J Control 25(1):213–228
Pan W et al (2022) Digital economy: an innovation driver for total factor productivity. J Bus Res 139:303–311
Qaisar I, Majid A, Ramaraj P (2021) Design of sliding mode controller for sensor/actuator fault with unknown input observer for satellite control system. Soft Comput 25(24):14993–15003
Quach S et al (2022) Digital technologies: tensions in privacy and data. J Acad Mark Sci 50(6):1299–1323
Roberta G et al (2022) Semantics and non-fungible tokens for copyright management on the metaverse and beyond. ACM Trans Multimed Comput Commun Appl. https://doi.org/10.1145/3585387
Song Z et al (2022) Fall risk assessment for the elderly based on weak foot features of wearable plantar pressure. IEEE Trans Neural Syst Rehabil Eng 30:1060–1070
Tronnier F, Harborth D, Hamm P (2022) Investigating privacy concerns and trust in the digital Euro in Germany. Electron Commer Res Appl 53:101158
Ullah R, Dai X, Sheng A (2020a) Event-triggered scheme for fault detection and isolation of non-linear system with time-varying delay. IET Control Theory Appl 14(16):2429–2438
Ullah R, Li Y, Aslam MS, Sheng A (2020b) Event-triggered dissipative observer-based control for delay dependent T–S fuzzy singular systems. IEEE Access 8:134276–134289
Wen H, Wen C, Lee C-C (2022) Impact of digitalization and environmental regulation on total factor productivity. Inf Econ Policy 61:101007
Wu Q, Li X, Wang K et al (2023) Regional feature fusion for on-road detection of objects using camera and 3D-LiDAR in high-speed autonomous vehicles. Soft Comput 27:18195–18213. https://doi.org/10.1007/s00500-023-09278-3
Wu J et al (2023) Risk assessment of open-pit slope based on large-scale group decision-making method considering non-cooperative behavior. Int J Fuzzy Syst 25(1):245–263
Zhang R (2023a) The application of artificial immune network in e-commerce credit risk assessment. Int J Comput Intell Syst 16(1):155
Zhang C (2023b) The analysis of the risks and improvements of ERC20 tokens. Highlights Sci Eng Technol 39:1093–1097
Zhang F, Song W (2022) Sustainability risk assessment of blockchain adoption in sustainable supply chain: an integrated method. Comput Ind Eng 171:108378
Zhang L et al (2021) A risk-level assessment system based on the STRIDE/DREAD model for digital data marketplaces. Int J Inf Secur 1–17
Zhao S et al (2023) Nonlinear and spatial spillover effects of the digital economy on green total factor energy efficiency: evidence from 281 cities in China. Environ Sci Pollut Res 30(34):81896–81916
Zhenhua M, Ullah R, Li Y, Sheng A, Majid A (2022) Stability and admissibility analysis of T–S descriptive systems and its applications. Soft Comput 26(15):7159–7166
Zhihan L, Chen C, Haibin L (2023) Blockchain-based decentralized learning for security in digital twins. IEEE Internet Things J 10(24):21479–21488. https://doi.org/10.1109/JIOT.2023.3295499
Funding
No funding was provided for the completion of this study.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors have declared no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Jin, W. Security and privacy of digital economic risk assessment system based on cloud computing and blockchain. Soft Comput 28, 2753–2768 (2024). https://doi.org/10.1007/s00500-023-09586-8
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00500-023-09586-8