Video transaction algorithm considering FISCO alliance chain and improved trusted computing

With the advent of the era of self media, the demand for video trading is becoming more and more obvious. Alliance blockchain has the characteristics of traceable transaction records, tamper proof transaction records, decentralized transactions and faster transaction speed than public chains. These features make it a trading platform. Trusted computing can solve the problem of non Byzantine attack in the aspect of hardware. This paper proposes a video transaction algorithm considering FISCO alliance chain and improved trusted computing. First, an improved trusted computing algorithm is used to prepare a trusted transaction environment. Second, the video summary information extraction algorithm is used to extract the summary information that can uniquely identify the video. Finally, based on the video transactions algorithm of FISCO alliance chain, the video summary information is traded on the chain. Experimental results show that the proposed algorithm is efficient and robust for video transactions. At the same time, the algorithm has low computational power requirements and algorithm complexity, which can provide technical support for provincial and county financial media centers and relevant media departments.

[1]  Seung-Hee Kim,et al.  A Design for a Hyperledger Fabric Blockchain-Based Patch-Management System , 2020 .

[2]  Antonio Maña,et al.  Protected Computing vs. Trusted Computing , 2006, 2006 1st International Conference on Communication Systems Software & Middleware.

[3]  Antonio Maña,et al.  Agent Protection Based on the Use of Cryptographic Hardware , 2009, 2009 33rd Annual IEEE International Computer Software and Applications Conference.

[4]  Eduardo B. Fernandez,et al.  TPM, a pattern for an architecture for trusted computing , 2020, EuroPLoP.

[5]  S. Nakamoto,et al.  Bitcoin: A Peer-to-Peer Electronic Cash System , 2008 .

[6]  Antonio Maña,et al.  Facilitating the Use of TPM Technologies Using the Serenity Framework , 2011, ATC.

[7]  Daniel Serrano,et al.  Protecting agents from malicious hosts using TPM , 2009, Int. J. Comput. Sci. Appl..

[8]  Antonio Maña,et al.  Trusted Code Execution in JavaCard , 2007, TrustBus.

[9]  Antonio Muñoz,et al.  ICITPM: Integrity Validation of Software in Iterative Continuous Integration Through the Use of Trusted Platform Module (TPM) , 2020, DETIPS/DeSECSys/MPS/SPOSE@ESORICS.

[10]  Javier López,et al.  A Security Pattern for Cloud service certification , 2019 .

[11]  Antonio Maña,et al.  TPM-based protection for mobile agents , 2011, Secur. Commun. Networks.

[12]  Thomas Serre,et al.  HMDB: A large video database for human motion recognition , 2011, 2011 International Conference on Computer Vision.

[13]  Nadjla Hariri,et al.  Using data island method for creating metadata records with indexability and visibility of tag names in web search engines , 2014, Libr. Hi Tech.

[14]  Daniel Serrano,et al.  The role of Trusted Computing in secure agent migration , 2009, 2009 Third International Conference on Research Challenges in Information Science.

[15]  Vitalik Buterin A NEXT GENERATION SMART CONTRACT & DECENTRALIZED APPLICATION PLATFORM , 2015 .