Research on trust mechanism of cooperation innovation with big data processing based on blockchain
- 124 Downloads
In recent years, the status of cooperation and innovation has become increasingly important. Research on the behavior of production, education, and research organizations has attracted widespread attention. Blockchain technology is considered as another subversive technology following cloud computing, wireless sensor networks, and big data. It is highly concerned by governments, financial institutions, and technology companies. Blockchain technology is essentially a technical solution that collectively maintains a reliable database through a decentralized, high-trust way. Blockchain WEB technology has not only used in financial and other fields, but also has a great potential for application in the fields of production, education, and research. It has expected to play an important role in the establishment of a trust mechanism in the “Internet +” production, research, and innovation and promote education. Drawing on the experience in blockchain applications in the financial sector, the blockchain in the education sector mainly embodies six application modes: building individual science credit data, creating an intelligent education Taobao platform, developing a degree certificate system, and building a new ecology of open educational resources. Of course, due to the uniqueness and complexity of the trust field in the cooperation innovation of industry, universities, and research institutes, the application of blockchain technology is also faced with difficulties in the application, promotion, and operation of production and research, fuzzy ownership of educational big data, limited data storage space, and potential safety problems of blockchain technology. There are many challenges such as the privacy protection risks of teachers and students.
KeywordsCooperation innovation Internet + Blockchain WEB Big data Sensor network
Gray relational analysis
Maximum likelihood estimation
Various types of innovation have brought about tremendous economic development in various countries and have contributed to the progress of human society. Looking at the world’s leading companies, it is because of their active promotion of innovation that they will never fail and even come to the forefront of the world’s enterprises. It can be said that technological innovation is the source of human wealth and the fundamental driving force for economic growth. Technological innovation can increase the benefit of products and reduce the cost of resources, which is the core strength of improving the competitiveness of enterprises . Lassar believes that technology can achieve the effect of multiplication of value through sharing, and cooperation innovation of enterprise technology is one of the most effective ways to achieve technology sharing and is a reliable guarantee for enterprises to establish a sustainable competitive advantage. It will become a kind of technology innovation of many enterprises . Collaborative innovation has usually based on the common interests of partners, and it has based on the premise of sharing resources or complementing each other. It has clear objectives for cooperation, cooperation deadlines, and cooperation rules. All parties involved in joint ventures invest in the whole process or some aspects of technological innovation: participate in, share results, and share risks. Collaborative innovation is generally concentrated in emerging technologies and high-tech industries, and R&D is the main form of cooperation . Currently facing the challenges of knowledge economy and technological progress, many countries are committed to the construction of a “national innovation system.” British scholar Freeman first proposed the concept of a “national innovation system,” which consists of companies, universities, research institutes, and intermediaries. In addition, enterprises are the main body of innovation. Universities and scientific research institutions are the source of innovation. At the same time, they provide and train innovative talents. Intermediary agencies are an important way to communicate and promote knowledge flow and technology diffusion. Governments create policies and laws that encourage and guide innovation . Cooperation innovation between industry, universities, and research institutes has considered as an important means to promote science and technology, education, and economic progress. At present, with the integration of science, technology, and economy, the cooperation between industry, universities, and research institutes around the world is showing a trend of continuous innovation, scale expansion, continuous improvement of the level, more flexible mechanisms, and more dynamic environment . Under the new and complicated market environment, the cooperation between production, education, and research is inefficient or even unsuccessful. It is the result of the combined effects of multiple factors, but the most fundamental reason lies in the mistakes made by the parties in the selection of models.
Blockchain technology is regarded as another subversive technology following cloud computing, Internet of things, and big data. It is highly concerned by governments, financial institutions, and technology companies. In 2016, developed countries such as the USA, the UK, and Japan have successively raised the blockchain technology to the national strategic level and established a blockchain development alliance. In the same year, the “Thirteenth Five-Year Plan for National Normalization” issued by the State Council for the first time included blockchains in Chinese national normalization plan and made it one of the strategic frontier technologies [6, 7, 8]. At present, all occupations have begun to pay attention to blockchain technology and actively explore the use of this technology to crack down on industry problems and promote innovation and development of the industry. In the financial sector, the global bank giants formed the R3 alliance, including more than 40 large international financial institutions such as HSBC, UBS, and the US Banking to develop blockchain technology. The US Nasdaq took the lead in introducing Linq, a security trading platform based on blockchain technology, which became an important milestone in the decentralization trend of financial and security markets. Zhou Xiaochuan, the governor of the People’s Bank of China, pointed out at the digital currency seminar held in Beijing that it is necessary to pay close attention to the impact of blockchains and other technologies on the financial sector and demand the exploration of the issuance of digital currencies.
With the gradual improvement of blockchain technology and the continuous expansion of application fields, some international educational institutions and scholars have begun to pay attention to and explore the application of blockchain technology in the field of education. Prof. Qing Li from Beijing University of Posts and Telecommunications pointed out that blockchain technology has great application potential in the field of education, which helps to create a more open and more credible education system. As a whole, the current application of blockchain technology in the field of education has just begun. It lacks mature application cases and clear application ideas. It urgently needs to strengthen the collaborative research and practice of production, learning, and research. Based on this, this article will introduce the concept and core technology of blockchain technology, analyze the experience and enlightenment from blockchain application in the financial field, and discuss the educational application ideas and values of blockchain technology in combination with the existing typical education cases [9, 10]. We analyze possible challenges to promote the application of blockchain technology in education.
2.1 Blockchain WEB of big data
2.2 Trust mechanism of WEB
In social activities, people usually evaluate the reliability of trading activities of WEB based on the historical records of their direct transactions or friends’ recommendation information and decide whether to conduct transactions based on the evaluation results. In a peer-to-peer network environment, trust and the credibility problem to solve is similar to the reliability evaluation in social activities. Before the transaction, with the help of the trust mechanism, both parties can understand each other’s credibility, thus increasing the safety factor of the transaction and avoiding potential safety hazards in the transaction process. The main contents of the trust and reputation mechanism include collecting historical transaction records between nodes in the system, calculating the credibility of each node based on the collected transaction records, and determining whether to conduct transactions based on the credibility of the nodes. The main points of the study are as follows: (1) The representation method of trust and reputation describe how to express the trust and reputation of the node in the system: It is the core component of the trust and reputation mechanism research; (2) The calculation method of trust and reputation: Transaction information assesses the degree of trust or reputation; and (3) The storage of trust and reputation values: How the calculated node credibility is stored in the system is related to how to obtain the trust and reputation value of the node. This paper will introduce the latest research results of the trust or reputation mechanism in the peer-to-peer network based on the research points of the trust and reputation mechanism.
Definition 1. Trust is a kind of subjective judgment based on existing knowledge. It is a measure of subject B’s ability to provide specific services (or perform specific actions) according to the environment of subject A according to the intention of subject A.
Definition 2. Direct trust is the trust of subject B derived from subject A’s direct transaction history with subject B.
Definition 3. Recommendation trust is the trust formed by the subjects based on the recommendation of a third party. It is also called indirect trust.
Definition 4. The trust degree is a quantitative representation of trust, also known as credibility.
From this, it can be seen that trust is active and it is an evaluation of a subject’s ability to another subject, based on the evaluation of historical transactions; while reputation is passive, it is through the historical behavior of interaction or resource sharing to predict the user, whether the behavior is credible  and reputation is a collection of trusted information. Reputation is a global concept and has objectivity. It is the total of all subjects in the network to evaluate a subject. Trust is a local concept and has subjectivity. It only happens between two entities. Trust depends to a certain extent on reputation, but it has not determined by reputation. Figure 3 shows the relationship between trust and reputation mechanisms in the P2P file sharing system listed in . In the figure, the FP (file provider) is a file provider. From the figure, you can see the implementation process of the trust and reputation mechanism and the relationship between them. A peer wants to choose a trusted FP if historically his experience with interacting with FP has found a FP with the highest level of trust in his trusted FP database to interact with; if he has not previously had experience with interacting with FP or has little knowledge of FP, he is from other peers. In the recommendation, we can calculate and select a FP with a high reputation value to interact. Through the satisfaction of this interaction, the FP has evaluated, and the credibility of the FP has updated. At the same time, the credibility of the peers providing the recommendation has updated. There is a premise that the credibility of FP with high reputation value is also high.
3.1 Application mode of blockchain WEB technology
There are two kinds of nodes in the entire OBC network, validating peer and non-validation peer. The former is a full-featured node and forms a fully connected topology. The latter is a proxy node and is attached to a neighboring authentication node. An application program can be connected to a verification node or a non-authentication node.
3.2 Trust mechanism of blockchain network
The purpose of network security is to provide a protection mechanism to prevent the protected subject from being attacked and illegally accessed by a malicious subject. In the traditional network security mechanism, the protected subject refers to the service provider, and the malicious subject generally comes from the service requester. This security mechanism has called hard security in the literature . The trust mechanism provides the security protection measures which are obviously different from those provided by traditional security mechanisms. The file sharing system (FR) selects the most trusted one among multiple candidates FPs when downloading a file. FP is used as a download source. It can be seen that the trust mechanism is mainly to protect the security of FR, to avoid FR download to malicious files. The protected subject in the trust mechanism is the service requester; potential malicious users are the service providers. The security protection measures provided by the mechanism have referred to as soft security .
There is also a link between the traditional security mechanism and the trust security mechanism. Computers or network systems protected by traditional security mechanisms are not vulnerable to attacks by malicious nodes, and the possibility of internal malicious programs (such as Trojan horses) has reduced. The credibility will be high; on the contrary, the credibility of those nodes that have not protected by the security mechanism will be low. In addition, there are trust mechanisms in the traditional security mechanisms, mainly relying on trusted third parties for identity authentication. The mechanism protects the security of the network system from different angles, and the two complement each other.
3.3 Blockchain network for industry-university-research cooperation
The demand for cooperation between production, education, and research is generated by the traction of market demand or the government’s macro-guidance. Therefore, the cooperation model of industry, university, and research can have divided into two types as “demand for market demand” and “government macro-guidance” . (1) The market demand traction cooperation model refers to the cooperation of industry, universities, and research institutes with the constraints of their own resources and market demands and other internal factors, and the cooperation mode between industry, universities, and research institutes in order to meet the demand of combination of technology and economy. According to the classification of technology circulation and service, the main cooperation modes include technology transfer, technology development, technical consultation, and technical services. (2) The macro-guided cooperation model of the government and the macro-guided cooperation model of the government refer to the high-level cooperation between industry, universities, and research institutes at all levels in order to enhance national and local technological and economic strength and accelerate the development of high-tech fields. According to the form of the combination of technology and economy, the common modes of cooperation mainly include joint scientific and technological research, co-construction engineering technology center, and co-construction university science park and high-tech industrial development zone. Any cooperation model has guided by the policies of the government’s competent authorities, creating a locally optimized internal and external environment for high-tech integration bases, and actively attracting industry-university-research cooperation partners to bring projects to the park for entrepreneurial development to facilitate the acceleration of high-tech commercialization. The process of industrialization and internationalization has strengthened the strength of the local economy.
3.3.1 Trust calculation (inference) method of blockchain WEB
Trust calculation (inference) method refers to the method of calculating (speculating) the trust degree of the subject based on the collected evaluation data. The calculation (speculation) method does not depend on the trust value. The common calculation methods in the literature are the weighted average method, Bayesian method, fuzzy reasoning method, and gray reasoning method.
3.3.2 Weighted average method of blockchain WEB
where Ti,j denotes the trust value of subject i for subject j, Rd is the direct trust value calculated based on the direct transaction record between subject i and subject j, and Rr is the indirect trust calculated by subject i based on recommendation information of other subjects. For the value, Ri is the risk value brought by the transaction, and α, β, γ represent different coefficients.
3.3.3 Maximum likelihood estimation of blockchain WEB
3.3.4 Bayesian method of blockchain WEB
The Bayesian method is a result-based posterior probability estimate that is applicable to probabilistic models and belief models. Unlike MLE, it first assigns a priori probability distribution to the parameters to be inferred (prior probability) and then use the Bayes’ rule to estimate the posterior probability of the parameter based on the outcome of the transaction. Based on the number of possible outcomes for the transaction evaluation, the prior probability distribution for the parameter to be speculated is divided into two. Species: Beta distribution and Dirichlet distribution, where beta distribution is only suitable for the case of binary evaluation results and is a special form of Dirichlet distribution. Due to space limitations, only the reasoning methods based on Dirichlet distribution are introduced here.
3.3.5 Fuzzy reasoning method for blockchain WEB
IF the weighted trustworthiness value is high
AND the opinion weight is high
AND the opinion credibility is high
THEN trustworthiness level is high
Formal inference rules can be found. The anti-fuzzification reasoning results can be used to obtain the credibility of the subject.
3.3.6 Gray system method for blockchain WEB
In the gray inference process, firstly, the gray relational analysis (gray relational analysis) is used to analyze the evaluation result, and the gray relational degree (i.e., the evaluation vector) is obtained; if the evaluation involves multiple key attributes (such as in a file sharing system, the evaluation of the subject may involve the quality of downloading files, attributes of download speed, etc.), determining the weight relationship between attributes; calculating the whitening matrix using the whitening function and the evaluation vector; and calculating the clustering vector from the whitening matrix and the weight matrix, and clustering the vector response, the relationship between the subject and the gray level in the gray level set, and the clustering analysis of the clustering vector can obtain the gray class to which the subject belongs.
3.4 Blockchain WEB results and discussion
Taking Jiangsu Province’s innovation in cooperation with industry, universities, and research institutes as an example, Jiangsu Province has 115 ordinary higher education institutions, 403 research institutes in universities and colleges, and 299 independent research and development institutions in government departments. These scientific research institutions are knowledge producers and talent cultivation bases for relevant applied research and important common technologies in Jiangsu Province and should play a leading role in Jiangsu’s technological innovation activities. At present, Jiangsu Province is facing a new situation of upgrading industrial structure and improving independent innovation capabilities. Under the guidance and supervision of the provincial government, can universities, research institutes, and enterprises implement effective cooperation models and lead Jiangsu’s cooperative innovation activities? Do you have the necessary conditions for innovation? How is its innovation performance? This will have practical significance for the construction of disciplines in Jiangsu Province.
Many experts and scholars have expressed their opinions on the selection of cooperative innovation models. Judging from the current research results, the cooperation and innovation of the industry-university-research cooperation innovation model and supervision have been a trend of cooperation and innovation in recent years. And it has promoted the intellectual resources of universities and scientific research institutes flow, or enterprises, enabling them to become the main body of technological innovation and to realize the sharing of risks, mutual benefit, mutual complementarily, common development, and optimization of social resources among all partners. The successful cooperation between industry, universities, and research institutes and the effective realization of the transformation of scientific and technological achievements are the key. Therefore, the cooperation relationship between the cooperation partners in the cooperation of industry, universities, and research institutes, the principal-agent relationship, and the government’s supervision and other economic behavior choices should lead to more experts and scholars. In addition to use cases and empirical methods, we can also use more advanced game theory economic analysis methods, assuming parameters, modeling, and computer simulations, in order to depict real economic behavior selection patterns more vividly. Although we have achieved some achievements and experience in the joint work of Chinese domestic research and development, there are still many problems. At present, the research on the trust mechanism under P2P environment has received extensive attention from domestic and foreign scholars. By introducing a trust mechanism in P2P, we hope to solve the security problems it faces. This paper discusses the issues that need further study because of the latest research progress of the trust mechanism. However, because of the many similarities between P2P networks and human society, this causes trust mechanisms to be more complex. The research on trust mechanisms in P2P networks is also applicable to other computing environments, such as pervasive computing environments, ad hoc networks. With reference significance, the use of blockchain technology to develop a decentralized education system will help to break the monopoly of education rights that has been monopolized by schools or government agencies, so that education will become fully open, and an integrated education system will be formed with the participation of the whole people. In the future, the qualifications provided by education institutions such as schools and training institutions approved by government agencies to provide educational services, there will be more institutions and even individuals who assume the role of professional education service providers, and they will be open source, transparent, and based on the blockchain. Features such as non-derog ability can guarantee the authenticity and credibility of their educational process and results.
This work was supported by the Fund Project of Hunan Social Sciences (grant No.15YBB031), the project of the humanities and social sciences fund of the Ministry of Education (grant No. 16YJAZH085), and the Fund Project of Hunan Social Sciences (grant No. 17YBA142).
The Fund Project of Hunan Social Sciences (grant No.15YBB031)
The project of the humanities and social sciences fund of the Ministry of Education (grant No. 16YJAZH085).
The Fund Project of Hunan Social Sciences (grant No. 17YBA142)
Availability of data and materials
The data generated and analyzed during this study are included in this published article, and its supplementary information isalso available from the corresponding author on reasonable request.
The manuscript was written through the contributions of all authors. All authors have given approval to the final version of the manuscript.
Qi Liu: Lecturer, Business School, Central South University. Her research interests include technological innovation, business administration.
XiaoZou: Professor, Business School, Hunan University of Technology. Her research interests include business administration, logistics management.
The authors declare that they have no competing interests.
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
- 7.Schweizer A, Schlatt V, Urbach N, et al. Unchaining Social Businesses–Blockchain as the Basic Technology of a Crowdlending Platform. 2017Google Scholar
- 9.V. Brătăşanu, Digital innovation the new paradigm for financial services industry. Theoret. Appl. Econ. 24, 83-94 (2017)Google Scholar
- 10.X. Luo, W. Zhong, X. Li, X. Guan, S. Albrecht, S. Reichert, J. Schmid, et al., Rigid graph-based three-dimension localization algorithm for wireless sensor networks. J. Syst. Eng. Electron. 29(5), 927–936 (2018)Google Scholar
- 11.R. Ribitzky, J.S. Clair, D.I. Houlding, et al., Pragmatic, interdisciplinary perspectives on blockchain and distributed ledger technology: paving the future for healthcare. Blockchain Healthc. Today (2018)Google Scholar
- 12.G. Yang, X. Deng, C. Liu, Facial expression recognition model based on deep spatiotemporal convolutional neural networks. J. Cent. South Univ. (Sci. Technol.) 47(7), 2311–2319 (2016)Google Scholar
- 14.G. Yang, W. Tan, H. Jin, et al., Review wearable sensing system for gait recognition. Clust. Comput., 1–9 (2018)Google Scholar
- 15.T. Fujimoto, K. Shigeta, Y. Fukuyama, The research trends in game-based learning and open education. Educ. Technol. Res. 39(1), 15–23 (2016)Google Scholar
- 17.P. Bauer, A. Hiba, B.Z. Daróczy, et al., Real flight demonstration of monocular image-based aircraft sense and avoid. ERCIM NEWS 110, 42–43 (2017)Google Scholar
Open AccessThis article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.