Skip to main content
Heliyon logoLink to Heliyon
. 2024 Feb 21;10(5):e26402. doi: 10.1016/j.heliyon.2024.e26402

A decentralized and security-enhanced professional title evaluation system in universities under mobile Internet of Things

Miao Miao a, Zhengjun Jing b,, Xiaolong Xu b, Meiqing Xue a
PMCID: PMC10907722  PMID: 38434400

Abstract

Digital online application is a commonly used method for professional title evaluation in colleges and universities. With the rapid development of the mobile Internet of Things, the fastest way for users to access the evaluation system is through mobile devices. However, this also poses security challenges to the traditional professional title evaluation system. Therefore, this paper proposes a decentralized and security-enhanced digital title evaluation system in mobile IoT. Since the system uses blockchain to implement a decentralized review process, the transparency and fairness of the review process are guaranteed. At the same time, the review data and reviewer information in the system are encrypted and stored in the distributed network to ensure the security and non-tamperability of the data. All review records are recorded on the blockchain, and anyone can view and verify the legitimacy of the review results. Additionally, the system incorporates security enhancement mechanisms such as identity verification, smart contracts, and auditing functions to improve the credibility of the evaluation process and prevent cheating under mobile IoT. Experiments have shown that this system has important application value in the field of professional title review in universities, which can improve review efficiency, reduce human intervention, and provide strong support for the credibility of review results.

Keywords: Blockchain, Professional title evaluation, Mobile IoT, Security

1. Introduction

Title evaluation is a key driving force in building a high-quality education system and improving the level of education. Taking China as an example, the development of the Chinese title evaluation system has a deep historical background. Even in the late Qing Dynasty, teachers in higher education institutions were divided into grades and appointed, forming a two-level system of general and divisional instructors. During the period of the Republic of China, a multi-level title system based on qualification audit, teaching, and academic research ability examination gradually formed for the management of the promotion of university faculty titles [1].

The emergence of the mobile Internet of Things (M-IoT) has made the management of the professional title system more convenient. Through mobile phones or other mobile devices, professional title applicants can remotely apply for professional titles. The evaluation institution can also use mobile applications to view and review materials in real time. However, the increase in remote applications provides opportunities for malicious attacks, and existing defense technologies are still inadequate [2]. In the process of professional title application, information such as name and work experience are all user‘s privacy, and there is a risk of third-party eavesdropping or tampering with information. During information review, there is a question of whether the reviewer can be trusted.

With the emergence of blockchain technology, a solution is provided for the aforementioned issues. Blockchain is a distributed ledger technology where transaction information is stored in blocks, and each block is linked to the previous block using a hash value, forming a chain-like structure [3]. Combined with smart contracts, business operations can be automatically executed and managed on the blockchain without the need for third-party intervention, resulting in higher security due to the high cost of tampering with information [4].

Currently, there are existing literatures proposing the application of block-chain technology in the university system. Reference [5] designed a teacher title evaluation system using Ethereum. The system adopts a three-layer architecture that includes data storage, service layer, and view layer. The data storage layer utilizes both the Ethereum network and traditional databases, and smart contracts serve as a service to interact with Ethereum. Most of the data is still stored in traditional databases. Reference [6] designed and implemented an intelligent educational platform based on blockchain, including a campus blockchain model, campus credit blockchain certification system, and credit evaluation system for secure storage of information. With the significant increase in educational opportunities, the possibility of diploma forgery has also increased. Reference [7] proposed the idea of using blockchain technology to manage educational certificates, making them tamper-proof. However, the reference did not provide specific implementation plans but offered a preventive approach to counterfeit diplomas. In reference [8], a comprehensive blockchain-based degree verification solution called Cerberus was implemented to address the issue of diploma forgery. This solution utilizes smart contracts for certificate generation and revocation, eliminating the need for human intervention. By referencing the above solutions, we can transplant the content into the professional title evaluation system.

Based on existing research, we propose and implement a decentralized and security-enhanced professional title evaluation system in universities under mobile Internet of Things. This platform is built on Fabric, which is a permissioned blockchain framework. Fabric provides a highly transparent ledger where participants can view and verify records. Each participant can access the same copy of the ledger, ensuring transparency of information. Fabric employs an endorsement policy to ensure transaction fairness. Transactions are validated and endorsed by a certain number of endorsing peers before being written into the ledger [9], [10]. In our solution, users’ mobile devices act as client nodes for submitting transaction information. We assign identity certificates to client nodes for identity verification. Users are required to fill in information such as user ID, appointment experience, and upload supporting documents. Before submission, the information must be digitally signed to ensure the integrity and authenticity of the transaction. The supporting documents are stored using IPFS, and the returned hash value, along with the user ID and other sensitive information, is submitted as a transaction record to the endorsing nodes. The transaction can only be written into the blockchain after it has been endorsed. Once the information is written into a block, it cannot be modified or deleted. If a hacker attempts to tamper with the blockchain, the other nodes on the chain will reject the modification. This platform strengthens trust between applicants, central authorities, and reviewers, ensuring fair and transparent title evaluation and achieving transparency and fairness in the evaluation process.

In our proposed decentralized digital title evaluation system for universities, data is no longer stored centrally but rather in a decentralized manner on each node in the blockchain network. Furthermore, the platform uses identity authentication, smart contracts, and other services to dynamically complete user identity authentication and achieve automated execution of the evaluation process.

This paper makes the following contributions:

  • We have designed and developed a decentralized and security-enhanced professional title evaluation system in universities under mobile Internet of Things. Users can remotely access the system through M-IoT devices, enabling digital management of title applications.

  • We have integrated blockchain technology to ensure transparent and fair evaluation of title applications. Additionally, data management is decentralized, ensuring greater security and integrity.

  • By leveraging the programmable capabilities of smart contracts, we have migrated the key business logic to smart contracts, improving the flexibility of system development and simplifying the implementation of application layer logic. Experimental results demonstrate that system performance is excellent.

2. Background and related work

2.1. Mobile IoT

With the rapid development of mobile communication technology, wireless communication has evolved from 2G to 6G networks, each generation providing faster and more reliable wireless connectivity. Currently, 5G networks have entered the public eye, and their high-speed connections and low latency are crucial for advancements in intelligent automation, including the Internet of Things (IoT), artificial intelligence (AI), autonomous vehicles, virtual reality, blockchain, etc [11]. Modern smartphones typically come equipped with various sensors such as accelerometers, gyroscopes, GPS, ambient light sensors, etc., making them typical representatives of IoT devices that can communicate with other devices or networks through mobile networks.

Mobile IoT, as a primary means of online learning, offers efficient and convenient access without geographical limitations. However, due to weaker security measures on mobile devices used for online learning, most mobile IoT devices used for online learning are prone to attacks. Reference [12] introduces an M-IoT online education security certification scheme that updates certificates and keys in real-time to counter side-channel attacks and hides users' identity information through pseudonym seeds for privacy protection. Reference [13] researches network security technologies for intelligent information terminals based on mobile IoT and analyzes mainstream encryption algorithms used in the mobile Internet. It proposes a dual-verification nonlinear secure data fusion protocol. By using the method of dual global secret information groups, it leverages the advantages of hidden data bits themselves to complete integrity verification of fused data results and ensure data security.

During the online evaluation process for professional titles, users fill in application or review information using mobile devices or other devices. There is a risk of tampering with the content filled in on mobile devices. To address this issue, we utilize Fabric CA to issue certificates to client nodes such as mobile devices, ensuring the security of node identity and information to prevent tampering.

2.2. Blockchain

Blockchain usually consists of data layer, network layer, consensus layer, encryption layer, and application layer. The data layer is the core layer, consisting of chained data blocks, with each block containing a batch of transaction records that are hashed and linked to the previous block through its hash value, forming an immutable chain [3]. The network layer is a decentralized network composed of many nodes that communicate through peer-to-peer connections to collectively maintain and verify the consistency of the blockchain. The consensus layer is used to determine which transactions can be added to the chain, with common consensus mechanisms including PoW, PBFT, etc. The encryption layer uses cryptography to protect the security of data, including digital signatures, hash functions, public-key encryption, etc [14]. The application layer is the specific application scenario built on top of the underlying technology, such as Bitcoin, supply chain management, etc.

Currently, many institutions have developed various blockchain frameworks, with Hyperledger Fabric being one of the representatives of blockchain technology and widely used. Fabric adopts a modular architecture that can be deployed and composed according to requirements. Fabric supports pluggable consensus mechanisms, including Raft, Kafka, etc. Fabric uses encryption technology and access control mechanisms to protect data integrity, supporting identity verification and permission management on the chain. Fabric introduces the concept of chaincode and supports writing chaincode in multiple languages. In addition, Fabric can support consortium chains, establishing trusted cooperative relationships between different organizations [15].

There are many contents based on Fabric. Reference [9] pointed out that previous research on consensus algorithms had some limitations, such as not conducting resource consumption analysis and insufficient performance analysis. The authors conducted a kernel-level resource consumption analysis of three main consensus algorithms in Fabric. The results showed that the resource consumption differences between different consensus algorithms in different scenarios could be up to 7 times, proving the importance of appropriate resource allocation. Reference [10] proposed an attribute-based access control scheme to solve the problem of unauthorized access, utilizing Fabric to provide real and reliable credentials and using verifiable and controlled collaboration mechanisms to detect malicious behavior, effectively enhancing the authorization discreteness and flexibility of the Internet of Things. Reference [16] proposed a secure data transmission scheme based on Fabric, with the designed keyword index stored in blockchain, allowing enterprises to share data through querying indexes, and using channels to achieve privacy protection and high-speed data transmission, while using ECDSA to ensure data integrity. Reference [17] pointed out that although Fabric had data privacy protection, there was still a possibility of information leakage for personnel with advanced access rights. The authors proposed a blockchain-based privacy system manager based on heuristic K-anonymity privacy protection technology and overcame non-deterministic polynomial (NP) problems by adopting a random diffusion search optimization algorithm. Reference [18] proposed using Fabric's access control mechanism, combined with device contracts, policy contracts, and access contracts, to provide decentralized, fine-grained, and dynamic access control management for IIoT, which faces risks of single-point failure and malicious attacks.

In the decentralized title evaluation system, we utilize fabric to store title application information, leveraging its decentralized and immutable characteristics to ensure transparency and fairness throughout the application process, adhering to the principles of openness and justice.

2.3. IPFS

In the digital title evaluation system, users are required to provide files as evidence. Although blockchain can be used for file storage, its drawbacks are apparent. The storage capacity of blockchain nodes is limited. Additionally, uploading and downloading files require the process of consensus, which results in slow transfer speeds.

IPFS is a distributed file system that uses peer-to-peer network protocols. It can permanently and decentralize storage of files, with only one copy of each file being saved to achieve uniqueness and save space. Combined with its peer-to-peer hypermedia feature, IPFS can store various types of data. IPFS also has version control mechanisms, allowing for the preservation of modification history and the tracing of data sources [19], [20].

In the process of professional title evaluation, user's proof materials are critical to the evaluation. Given the characteristics of IPFS, we can use IPFS to store files and store the unique identifiers generated by the file in a blockchain network.

3. System design

3.1. Professional title evaluation process analysis

In the process of professional title evaluation, after faculty members submit their information, the department they belong to will review the information and assess and recommend relevant individuals. The recommended individuals will then undergo further assessment by the functional department. Those who pass the assessment will be publicly announced throughout the entire university. Subject group experts will evaluate the individuals who have been announced, and ultimately, a high-level evaluation committee will conduct the final review. If the evaluation is successful, the announcement will be made, followed by record-keeping and certification. The process is illustrated in Fig. 1. Block 1 represents the faculty filling out the application information and submitting it; Blocks 2-4 represent departmental review, where departmental leaders review the faculty's application materials, conduct evaluation and recommendation of those who pass the review, and finally make public announcements of the recommended personnel; Blocks 5-7 represent functional department review, where the functional department conducts data review of the personnel recommended by various departments, assesses and evaluates those who pass the review, and makes public announcements of those who pass the assessment and evaluation; Blocks 8-9 represent subject groups evaluating those who pass the assessment and evaluation, and making public announcements of those who are successful; Blocks 10-11 represent the high-level committee reviewing and evaluating the publicly announced personnel again, and making public announcements of those who pass the review, indicating that they have succeeded in their application for academic titles; Block 12 issues a notice to register the applicants; Block 13 produces certificates for successful applicants and presents them to them; Block 14 archives the application materials of successful applicants.

Figure 1.

Figure 1

The process of title evaluation.

In the traditional mode, title evaluation requires collaboration from multiple departments, resulting in long work cycles and low efficiency. The process is easily influenced by external factors and personal relationships, making it difficult to maintain strict control. Additionally, traditional material announcements have limited impact, and the information provided by applicants is not transparent. Moreover, the traditional evaluation process requires preparing multiple copies of materials and often involves repetitive filling, which makes it challenging to conduct title work effectively. Our aim is to propose a more efficient, standardized, open, and convenient digital title evaluation system. Efficiency is reflected in shorter title evaluation cycles. Standardization is apparent in the system's rigorous logic and regulated time scheduling. Openness is evident in the complete transparency of applicant information within the local area network. Convenience is demonstrated in the fact that the application information only needs to be collected once, eliminating repetitive labor.

3.2. Conceptual model

The network layer of a decentralized and security-enhanced digital title evaluation system is composed of a fabric blockchain network and an off-chain network. The fabric network is used to store data, while the off-chain network is used to store files. The roles in the system include applicants, department leaders, functional departments, subject groups, and the high-level evaluation committee. The conceptual model of the system is shown in Fig. 2.

Figure 2.

Figure 2

Conceptual model.

Users can remotely access to the network through mobile devices to fill in the information and complete the evaluation of title information. A university consists of many secondary colleges, such as the School of Computer Engineering, the School of Mechanical Engineering, and the School of Telecommunications. Each college is divided into several departments, for example, the College of Computer Engineering consists of the Department of Computer Science, the Department of Software and so on. In order to facilitate the independent maintenance of data in each college, we use channels to isolate the data between the secondary colleges. Each department under the secondary colleges joins the channel maintained by their respective colleges and manages the ledger together to ensure the fairness and impartiality of title evaluation. Functional departments, subject groups, and high-level evaluation committees belong to public entities that are independent of the secondary colleges. Therefore, they need to join the channels maintained by all departments to review the title information across the entire university.

3.3. Business process

The title evaluation process involves a hierarchical review by the applicant's department leader, functional department, subject group, and the high-level evaluation committee. After the review is completed, the results are publicly announced. The business process flow of the system is Shown in Fig. 3.

Figure 3.

Figure 3

Business process.

In Fig. 3, CA is used to issue certificates to the users and only authorized users can access the fabric network. The overall flow of the system is as follows.

  • 1.

    Users log in the title evaluation system with their certificates. Each user can view all the information of their respective colleges, but can only edit their own. Different roles have different permissions, for example, only department heads, functional departments, discipline groups, and senior evaluation committee have the permission to review.

  • 2.

    The applicant uploads the information through the client interface, which carries the user certificate to call the smart contract. The contract is divided into userContract, roleContract and userInfoContract. The userContract is mainly used to manage users, the roleContract is used to maintain user roles, and the userInfoContract is used to maintain user's title evaluation information. The auditor calls the contract to view the information needs to be audited and perform the operation of passing or rejecting.

  • 3.

    The applicant's title evaluation information needs to undergo consensus among the applicant's department, functional department, subject group, and the high-level evaluation committee. Only after successful consensus, the record will be written into the ledger. In case of consensus failure, an error prompt will be given to the user. When reviewers perform approval or rejection operations, consensus among other nodes is also required to modify the data state in the ledger.

  • 4.

    The title evaluation information will be saved into the ledger after the consensus is successful, and the files will be saved into the off-chain network. The initial state of the content is set as unaudited, and the audit progress is set as departmental audit. The auditor completes the auditing operation to modify the auditing status of the declaration information and displays the current auditing progress.

  • 5.

    Users retrieve their application information from the blockchain using a client interface. They can check the progress and whether it has been rejected. The data is returned to the user interface in JSON format, providing a visual display of the information.

3.4. On-Chain data

The title evaluation system mainly consists of two roles: applicants and reviewers. Applicants are required to fill in information such as ID, name, subject, and intended job title. Reviewers, when performing approval or rejection operations, need to fill in their own ID, name, and other relevant information, which can be used to trace accountability if any objections arise during the review process. On-Chain Data is shown in Table 1.

Table 1.

On-Chain data.

Role Fields
applicant ID, name, review subject, position, appointment experience
study experience, filing time, current position
reviewers Audit Time, ID, name, audit status, audit progress

3.5. System architecture

A decentralized and security-enhanced digital title evaluation system consists of a five-layer architecture, which are user layer, application layer, gateway layer, contract layer and network layer. The system architecture is shown in Fig. 4.

Figure 4.

Figure 4

System architecture.

Client layer mainly provides API interfaces for users to access. Such as login interface, query interface and so on. applicants can query the information through mobile devices such as smartphones.

Application layer divides into identity authentication module, user module, apply module and audit module. Identity authentication module is mainly to complete the authentication of the user's identity information, only the user who passes the audit can access the title system. User module is responsible for managing user information including user name, role and department. Apply module is used to fill the user's title evaluation information. Audit module is used for auditing the information.

In Gateway Layer, Users need to be authenticated by the fabric gateway to access the fabric network. Authentication requires the user to provide the certificate issued by the CA node. After authentication, users can call the network interface and contract interface.

Contract Layer mainly provides smart contracts for users to interact with the fabric ledger. Contracts include roleContract, userInfoContract and userContract. The roleContract maintains the role information. The userInfoContract maintains the user's title evaluation information.

Network layer consists of fabric network and off-chain network. Data and documents are stored in the ledger in a discrete form, peer nodes in a channel jointly maintain a ledger.

3.6. Authentication module

When a user logs into the system, he/she needs to complete the identity authentication, and the user's identity certificate is issued by Fabric CA, and the business flow is shown in Fig. 5.

Figure 5.

Figure 5

Authentication flow.

The user logs into the system with the certificate issued by the Fabric CA. The system first verifies whether the file type is correct, and if the file ends with a .pem suffix, then it converts the file into a binary stream and passes it to the back-end. After the back-end converts the stream into a certificate file and stores the information in the wallet, it is verified by CA and finally returns the verification information to prompt the login result. To facilitate user login, once the user logs in successfully for the first time, they do not need to provide their certificate file for subsequent logins. Users can simply use the wallet file saved during their first login to log in again. The user login timing diagram is shown in Fig. 6.

Figure 6.

Figure 6

Authentication timing.

3.7. Apply module

This module mainly completes the filling of user information and the uploading of materials. The information filled in by the user is saved in the blockchain network, while the material uploading utilizes IPFS services. The apply timing diagram is shown in Fig. 7.

Figure 7.

Figure 7

Title application timing.

In the addInfo.vue page, users fill in their title information. After completion, the page needs to validate the required fields and prompt users to provide missing information if any. When the back-end UserInfoController.java receives a new request, it will invoke the IpfsService to upload the relevant materials to the IPFS network. Upon successful upload, the hash address of the file will be returned. Then, the application layer will send a gRPC request to invoke the userInfoContract, passing the title application information to the smart contract. The smart contract submits the transaction to the blockchain network, and the nodes in the network verify the transaction. After successful verification, the transaction is written into the ledger, and a prompt message is returned to the page.

3.8. Evaluation module

The Evaluation module mainly completes the audit of the information by the relevant departments of the university. The Evaluation process is shown in Fig. 8.

Figure 8.

Figure 8

Title evaluation flow.

After the auditor logs into the system using a smartphone, the Info.vue page will display the applications that need to be reviewed by the user. When the user clicks the “View” button, the application layer interface AuditController.java will invoke the IpfsService to retrieve the material information and also call the smart contract. The userInfoContract will determine the user's organization and role to determine if they have the corresponding permissions. If the user has the required permissions, the information list will be returned.

When the auditor clicks the “Approve” or “Reject” button, the application layer interface will call the userInfoContract. The smart contract also needs to verify the user's role and only submit the transaction if the user has the necessary authorization for reviewing. The transactions are verified by nodes in the blockchain network, and once validated, the transactions will be written into the ledger. The result of the transaction is returned and displayed on the page. Fig. 9 is the timing of title evaluation.

Figure 9.

Figure 9

Title evaluation timing.

3.9. External evaluation module

After the applicant's achievements have been reviewed, representative achievements are collected from the achievement information and sent for expert evaluate. The appraisal rules need to avoid relevant academic institutions, organizations, and experts. In the Appraisal.vue page, users select the personnel information that needs to be sent for appraisal, and then click the “Appraisal” button. This sends a request to AppraisalController.java. The system will automatically filter out qualified academic institutions and experts. Then, it will invoke the userInfoContract to retrieve the list of achievements from the blockchain network. AppraisalController.java, based on the hash values in the achievement list, will call the IpfsService to retrieve the achievement files and send the applicant's information for appraisal. The timing of external evaluation is shown in Fig. 10.

Figure 10.

Figure 10

External evaluation timing.

4. Algorithm design

4.1. The stage of authentication

The identity authentication pseudo-code is used to verify the user's identity information. When logging into the title system, the user needs to provide the private key and certificate file. When the system receives the private key and certificate file, it will first judge the file type. After successful judgment, fabric sdk will verify the legitimacy of the certificate. After successful verification, it will save the information to the wallet folder, user logs in only need to provide the file in the folder in the next time.

Traditional authentication with account and password has the risk of leakage, and the use of certificates for authentication is more secure. The certificate contains a public key and a private key, the private key is kept by the user and is not easy to leak, and the public key is verified by Fabric CA.

Algorithm 1.

Algorithm 1

Identity Authentication.

4.2. The stage of title application

When filling out the title application information, the user is required to fill out sufficient information such as personal information, experience, the position to be applied for, and so on. After the title information is filled, the information is serialized and saved in the ledger. The information review status is set to unapproved and the progress is set to departmental review. In addition, the user can make changes to the information while it is not being reviewed.

Algorithm 2.

Algorithm 2

Position Apply.

4.3. The stage of title evaluation

Title audit needs to determine the role of the user firstly, according to the role to query the information that needs to be audited by the user. Before auditing, the user is allowed to modify the information. When auditing the information, the progress of the modification of the audit passes for the next level of audit. The audit needs to be reviewed by the department, functional department, subject group and high-level evaluation committee in turn.

Algorithm 3.

Algorithm 3

Title Audit.

5. Performance evaluation

5.1. Experimental environment

The security-enhanced digital title evaluation system is implemented with fabric 2.3.2. The operating system uses Ubuntu 18, and the fabric network is implemented based on docker with seven nodes configured. The network's consensus is raft, and the block generation strategy uses one block generated every two seconds, or 50 transactions packed into one block.

5.2. User register and query

This module is done with tape, which tests performance metrics such as blockchain throughput and transaction completion time by testing userContract. In blockchain networks, TPS is commonly used to measure the throughput of the network, representing the number of transactions processed by the blockchain network in one second. We set 10 clients with the number of concurrent connections to the node and test 10 sets of data with different transaction volumes, with the number of transactions increasing from 500 to 5000, the interval is 500.

From Fig. 11, it can be seen that the transaction completion time is distributed between 2 to 12 seconds. As the number of transactions increases, the completion time gradually increases. The throughput is distributed between 240 to 470, and the trend goes from an increase to a gradual stabilization. The experimental results demonstrate that the performance of the blockchain network is good.

Figure 11.

Figure 11

User register and query.

5.3. The performance of title application

We complete this test by testing the apply function in userInfoContract, which provides user filling in their apply information.

From Fig. 12, it can be noticed that the throughput ranges from 140 to 290, and the throughput increases initially and gradually stabilizes. The time distribution is between 3 to 18 seconds, and the duration increases with the number of transactions.

Figure 12.

Figure 12

Title application test.

5.4. The performance of title evaluation

Title auditing is a function of auditors, and we observe the performance of the system by simulating and testing multiple auditors performing auditing operations at the same time.

Fig. 13 shows the performance of title evaluation. The configuration of is the same as user testing. It can be seen that the duration is between 2 s and 13 s, and TPS is around 400.

Figure 13.

Figure 13

Title evaluation test.

6. Conclusions

Mobile IoT has enriched the access methods of the title evaluation system, allowing users to remotely access the system using their mobile phones. By combining M-IoT technology, the digital evaluation system greatly facilitates the application and review process, reducing the review cycle. In this paper, we address the issues existing in the current title system and propose the use of blockchain technology to ensure transparency and fairness in the title evaluation process, eliminating the possibility of user information tampering. By leveraging smart contracts, users can interact better with the network, simplifying application layer development. Additionally, we introduce IPFS technology for storing user files and save the hash addresses of the files on the network.

Although the system can enhance fairness and reduce corruption, it also has limitations. We still use the traditional hierarchical review system, and delays in any link will affect the progress of the application. In addition, as the system scales up, the burden of data storage and processing will become heavier, exacerbating resource consumption. We will explore how to break through performance bottlenecks and reduce energy consumption in future work.

CRediT authorship contribution statement

Miao Miao: Writing – original draft, Validation, Supervision, Software, Resources, Methodology, Investigation, Funding acquisition, Formal analysis, Data curation, Conceptualization. Zhengjun Jing: Writing – review & editing, Validation, Supervision, Software, Methodology, Formal analysis, Data curation, Conceptualization. Xiaolong Xu: Validation, Software, Project administration, Formal analysis, Data curation. Meiqing Xue: Validation, Supervision, Resources, Project administration, Methodology, Investigation, Conceptualization.

Declaration of Competing Interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Data availability

Data included in article/supp.material/referenced in article.

References

  • 1.Sulan Xu, Xinxing Duan. The trajectory and logic of the evolution of the promotion system for Chinese university teachers' titles: a perspective based on historical institutionalism. Jiangsu High. Educ. 2020;50(58) [Google Scholar]
  • 2.Cinar Ahmet Cevahir, Beyza Kara Turkan. The current state and future of mobile security in the light of the recent mobile security threat reports. Multimed. Tools Appl. 2023:1–13. doi: 10.1007/s11042-023-14400-6. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 3.Chiu Wei-Yang, Meng Weizhi, Nosneaky Chunpeng Ge. A blockchain-based execution integrity protection scheme in industry 4.0. IEEE Trans. Ind. Inform. 2022 [Google Scholar]
  • 4.Gadekallu Thippa Reddy, Huynh-The Thien, Wang Weizheng, Yenduri Gokul, Ranaweera Pasika, Pham Quoc-Viet, Benevides da Costa Daniel, Liyanage Madhusanka. Blockchain for the metaverse: a review. 2022. arXiv:2203.09738 arXiv preprint.
  • 5.Li Xishun. Design of a title evaluation system based on the teacher personal information center. Inf. Comput. (Theory Ed.) 2022;34(141–143) [Google Scholar]
  • 6.Yin Xiaoke, Yu Yi, Hu Bo, Luo Qian, Tang Zhiwei. 2022 3rd Asia Service Sciences and Software Engineering Conference. 2022. Research on the application of blockchain technology in education and teaching in higher vocational colleges; pp. 30–36. [Google Scholar]
  • 7.Caramihai Mihai, Severin Irina. A blockchain-based solution for diploma management in universities. Sustainability. 2023;15(20) [Google Scholar]
  • 8.Tariq A., Haq H.B., Ali S.T. Cerberus: a blockchain-based accreditation and degree verification system. 2019. arXiv:1912.06812 arXiv preprint.
  • 9.Yang Gyeongsik, Lee Kwanhoon, Lee Kyungwoon, Yoo Yeonho, Lee Hyowon, Yoo Chuck. Resource analysis of blockchain consensus algorithms in hyperledger fabric. IEEE Access. 2022;10:74902–74920. [Google Scholar]
  • 10.Zhang Yan, Li Bing, Liu Ben, Wu Jiaxin, Wang Yazhou, Yang Xia. An attribute-based collaborative access control scheme using blockchain for iot devices. Electronics. 2020;9(2):285. [Google Scholar]
  • 11.Attaran Mohsen. The impact of 5g on the evolution of intelligent automation and industry digitization. J. Ambient Intell. Humaniz. Comput. 2023;14(5):5977–5993. doi: 10.1007/s12652-020-02521-x. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 12.Yin Jiming, Cui Jie. Secure authentication scheme in 6g-enabled mobile Internet of things for online English education. IET Netw. 2022;11(5):182–194. [Google Scholar]
  • 13.Sun Ning, Li Tao, Song Gongfei, Xia Haoran. Network security technology of intelligent information terminal based on mobile Internet of things. Mob. Inf. Syst. 2021;2021:1–9. [Google Scholar]
  • 14.Chen Yong, Lu Yang, Bulysheva Larisa, Kataev Mikhail Yu. Applications of blockchain in industry 4.0: a review. Inf. Syst. Front. 2022:1–15. [Google Scholar]
  • 15.Cachin Christian, et al. Architecture of the hyperledger blockchain fabric. Workshop on Distributed Cryptocurrencies and Consensus Ledgers, volume 310; Chicago, IL; 2016. pp. 1–4. [Google Scholar]
  • 16.Chen Chin-Ling, Yang Jiaxin, Tsaur Wei Weng Woei-Jiunn, Wu Chih-Ming, Wei Xiaojun. Enterprise data sharing with privacy-preserved based on hyperledger fabric blockchain in iiot's application. Sensors. 2022;22(3):1146. doi: 10.3390/s22031146. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 17.Sowmiya B., Poovammal E. A heuristic k-anonymity based privacy preserving for student management hyperledger fabric blockchain. Wirel. Pers. Commun. 2022;127(2):1359–1376. [Google Scholar]
  • 18.Shih Dong-Her, Wu Ting-Wei, Shih Ming-Hung, Chen Guan-Wei, Yen David C. Hyperledger fabric access control for industrial Internet of things. Appl. Sci. 2022;12(6):3125. [Google Scholar]
  • 19.Benet Juan. Ipfs-content addressed, versioned, p2p file system. 2014. arXiv:1407.3561 arXiv preprint.
  • 20.Trautwein Dennis, Raman Aravindh, Tyson Gareth, Castro Ignacio, Scott Will, Schubotz Moritz, Gipp Bela, Psaras Yiannis. Proceedings of the ACM SIGCOMM 2022 Conference. 2022. Design and evaluation of ipfs: a storage layer for the decentralized web; pp. 739–752. [Google Scholar]

Associated Data

This section collects any data citations, data availability statements, or supplementary materials included in this article.

Data Availability Statement

Data included in article/supp.material/referenced in article.


Articles from Heliyon are provided here courtesy of Elsevier

RESOURCES