International Core Journal of Engineering 2020-26 | Page 32

information in the response cycle in time into the blockchain. Each block is connected end to end, and the hash value stored in the next block is used to ensure the accuracy and untouchability of the previous block. At the same time, for the sake of information security and requirements security, various security algorithms are used to ensure the secrecy of information in blockchain network. However, a single algorithm is often difficult to meet the needs of demand response business, so it needs to be used in combination. Table 1 shows the security levels of different mechanisms. energy consumption. But the drawback of the DPoS mechanism is that the votes of each node are not very motivated. The vast majority of shareholders (90%+) never participated in the voting. 4) PBFT(Practical Byzantine Fault Tolerance)漡PBFT is also a common proof of consensus. It is different from the previous three. PBFT is based on computation and no token reward. Everyone in the chain votes, and less than (N-1) / three nodes have the right to publicize information when they object. His advantage is that the algorithm has strict mathematical proof of its reliability and (n-1)/3 fault- tolerance. His disadvantage is that the system will not be able to provide services when one third or more of the bookkeepers stop working. TABLE I. COMPARISON OF VARIOUS SECURITY MECHANISMS Algorithm Symmetric encryption Public key encryption Digital signature Key agreement Unidirectional hash Message validation confidentiality consistency integrity key management ● ○ ○ ● ● ○ ○ ● ○ ● ● ○ ● Optional ○ ● ○ ○ ● ○ ○ ● ● ○ Polkadot technology is a new type of blockchain technology proposed by Ethereum, which exposes blockchains without any third party authorization. The original idea of the design is similar to that of the side chain technology which is popularized in Ethereum. Similarly, another blockchain besides the main chain is constructed, which is docked with the external system or main chain of another blockchain, and finally funds or data can be transferred [10] . Polkadot technology regards many different blockchains as main chains and keeps their original consistency, while other blockchains corresponding to these chains inherit their effective functions. In other words, the main chain only retains the original workload certification mechanism to confirm the consistency of its network-wide distributed accounting, and the data size is recorded by the other chain. The main chain is named as parallel chain, and the other chain is named relay chain. A parallel chain can correspond to multiple relay chains, and a relay chain can also correspond to multiple parallel links. The combination of each relay chain and parallel chain can be regarded as an independent blockchain. This not only ensures data and evidence isolation, but also ensures a unified management and collaboration among multiple parallel chains, deepens the joint development of a variety of services and improves the practicality of data sharing. The specific implementation structure is shown in Figure 3. B. Multi agent mutual trust Multi-agent mutual trust is a very important link in blockchain. The key point of consensus mechanism is to let multiple nodes maintain the same database. It decides to let one node write and not be changed by other nodes. The main consensus mechanisms are as follows: 1) PoW(Proof of Work): PoW is the first generation consensus mechanism and the foundation of bitcoin. His idea is to "pay for work" and decide on the reward (encrypted currency such as bitcoin) based on the amount of work each node has to do. The labor of each node refers to the computing service provided for the network (computing time x), and the process of providing this service is called "mining". The shortcomings of the PoW mechanism are also obvious, because the calculation is provided by computer hardware (CPU, GPU, etc.), "digging" will consume a lot of electricity, which is a direct consumption of energy and contrary to the pursuit of human’s concept of energy-saving, clean, environmental protection. At the same time, users also develop from individual mining to large pools and mines. This runs counter to the direction of centralization, and threatens the network security gradually. Aggregate trader A Aggregate trader B Aggregate trader C Miner supervisor 2) PoS(Proof of Stake): PoS has no mining process, just need to write in the share allocation ratio of creation block, and then through transfer, trading and other means, dispersed to the user's hands gradually, and through the "interest" way to add money, to achieve the node reward. PoW is combined with PoS. But the PoS mechanism is also flawed, pure PoS mechanism of encrypted currency, can only be issued through IPO, which leads to a "minority" (usually developers) access to a large number of very low- cost encrypted currency, in front of the interests, it is difficult to guarantee that they will not sell a lot. Therefore, the credit base of the PoS mechanism is not strong enough. Broadcast transaction Verifying main cluster account distributed generation A distributed generation B Cross chain record distributed generation C Transaction user cluster Parallel chain Parallel chain region 3) DPoS(Delegated Proof of Stake):The realization of DPoS is similar to that of an uncontrolled company issuing shares, generating profits and distributing them to shareholders. The advantage of this mechanism is lower Parallel chain bridging (queue and I/O) Virtual parallel chain Fig. 3. Multi agent mutual trust in demand response mechanism 10