Otwarty dostęp

Financial transaction data security management based on blockchain technology

  
24 mar 2025

Zacytuj
Pobierz okładkę

Introduction

With the development of informationization, the financial industry has begun to pay attention to the utilization and protection of financial transaction data. Since the financial transaction data covers market data, industry index and enterprise data and other important indicators, its security has also become the focus of people’s attention [1-3]. At the same time, blockchain technology has also become a research hotspot in the financial field. As an emerging technology, blockchain has the advantages of decentralization and high security, which can provide new solutions for financial transactions and play a due role in reshaping the operation mode of traditional financial system [4-6].

Blockchain technology as a distributed ledger technology, its core concept lies in decentralization, data tampering and consensus mechanism [7-8]. Now it seems that these concepts subvert the traditional centralized data processing mode on the one hand, and on the other hand provide a more reliable guarantee for the security and authenticity of data [9-10]. First, among the core concepts of blockchain technology, decentralization can be regarded as its cornerstone. The reason is that decentralization breaks the traditional situation where data is controlled by a single institution or server, which allows data to be synchronously verified at all participating nodes [11-13]. In this way, this decentralized data storage and processing model reduces the risk of single point of failure on top of enhancing data reliability. Secondly, data tampering is another core feature of blockchain technology [14-15]. Through the use of encryption algorithms, timestamps and other technical means, blockchain can ensure that once the data is recorded, it is very difficult to be privately modified or deleted, which makes blockchain technology has a significant advantage in application scenarios that need to ensure the authenticity and integrity of data [16-17]. Finally, consensus mechanism is also a major feature of blockchain technology. Consensus mechanism is to reach a consensus among many participating nodes, which is the key to the normal operation of the blockchain network [18-19].

At present, the most widely used consensus mechanisms in blockchain technology are “proof of workload” and “proof of interest”. These two consensus mechanisms are used in different ways to motivate nodes to participate in verifying and recording data, so as to ensure the security and stability of the network [20-22]. As far as the architecture of blockchain technology is concerned, it consists of several components such as data layer, network layer, consensus layer and application layer. Among them, the data layer is responsible for data storage and encryption, the network layer is responsible for communication and data transmission between nodes, the consensus layer is responsible for reaching consensus between nodes, and the application layer is responsible for applying blockchain technology to specific business scenarios [23-24]. With such a complete architecture, blockchain technology has shown wide applicability in various scenarios. For example, in the financial field, blockchain technology can enhance the transparency and security of digital currency transactions, in the supply chain, it can realize the traceability and anti-counterfeiting of products and improve efficiency, and in the field of public services, it can be used for identity authentication and record-keeping to promote the fairness and openness of government services [25-27].

In the current research on blockchain technology in financial transaction data security management, scholars mainly focus on financial transaction security mechanism, financial transaction environment monitoring, financial transaction data security backup, financial transaction audit and other topics to carry out in-depth research. Literature [28] evaluates the financial transaction system composed of RFID technology with identity authentication, blockchain technology protection and other security mechanisms to effectively meet the data security needs of financial transactions. Literature [29] reveals that the integration of artificial intelligence and blockchain technology can realize the monitoring of financial transaction anomalies, which contributes to the creation of a secure and transparent environment for financial transactions. Literature [30] conceptualized a practical path of blockchain technology for financial transaction data backup mechanism on a decentralized network, which strengthens the security and stability of financial transaction database. Literature [31] designed a high-performance secure blockchain framework and confirmed through simulation experiments that the proposed framework ensures the smooth implementation of financial business activities and intelligent interactive services, while also protecting the integrity and security of financial data. Literature [32] demonstrates that blockchain technology and intelligent processing techniques based on machine learning algorithms play an active role in assisting proper financial decision making and can circumvent malicious transactions generated in a malicious network environment. Literature [33] analyzes the characteristics of MapReduce technology integrating big data mining analysis theory and blockchain strategy and its practice in financial transactions, and gives some optimization suggestions based on the technical perspective. Literature [34] analyzed that the audit platform (bbap) with blockchain technology as the core logic effectively improves the mutual trust and transparency of financial transactions, but it still needs to be improved at the technical and regulatory levels. The above studies focus on the practice of blockchain technology in financial transaction data security from different perspectives, but there is a lack of side-by-side comparisons in the studies, which also leads to the fact that the effect of the improvement of financial transaction data security management brought by methodological innovation and optimization cannot be effectively compared.

The application of blockchain technology in the security management of transaction data is conducive to optimizing the efficiency of financial transactions, improving overall efficiency, and reducing risks. In this paper, the general framework of Ethernet account portrait technology is introduced, based on the behavior of financial transactions on blockchain. Then after modeling the Ethernet financial transaction data, the account portrait technology is introduced from two aspects: centrality and deep account portrait based on graph embedding algorithm. An online measurement algorithm of centrality (Ada-Katz Centrality) that combines transaction time information and transaction amount information is proposed to describe the degree of importance of an account, and further construct the centrality-based account portrait. The general framework of abnormal account detection is also given, and the accurate determination of the identity of the risky node is accomplished by completing the private chain company node registration verification work, tracing the risky company user, and obtaining the identity information of the company user. To evaluate the performance of the Ada-Katz model, this study conducted experiments on three public datasets, UCI Message, Bitcoin-Alpha, and Bitcoin-OTC, and further verified the model’s effect on private pyramid schemes datasets. Finally, the data of 20 enterprises served by Z platform in the past three years are selected, and a credit risk evaluation system including 26 qualitative and quantitative indicators, such as enterprise operation data, financial data, blockchain utility, etc., is established, and an in-depth analysis of the role of blockchain technology in reducing the supply chain finance risk of Z platform is carried out.

Theory of financial transaction data security management based on blockchain technology
Financial transaction data security modeling

This paper constructs a data security model for financial transactions based on blockchain technology. The model adds an auction mechanism for financial dealers, where the seller can specify whether the auction of factoring rights is open to all factoring dealers or only some factoring dealers.

The roles of specific entities in the model are as follows.

Seller: a company that finances through invoices on the platform and needs to sell goods to a buyer. It is possible to find investors on the platform through the smart contract auction.

Buyer: a business that needs to buy goods from a seller on the platform and can delay payment of the invoice amount through factoring financing.

Factoring: refers to financial institutions (e.g. banks) that can provide factoring for buyers and sellers. In the context of this platform it refers to a person or financial institution that allows the purchase of invoices at auction for less than the actual value of the merchandise in order to make a profit.

Transporters: Transportation of goods and provision of relevant information on the status of transportation.

The general overview of the proposed data security model for financial transactions is as follows: (1) the seller writes the invoice data into the data layer, creates a contract in the blockchain technology smart contract and deploys it into the blockchain technology smart contract, which contains the minimum amount to participate in the auction as well as the hash value of the invoice; (2) the buyer accepts the invoice after confirming that the invoice provided by the seller is genuine; (3) the transporter is responsible for transporting the goods and updating the latest status of the goods to the Ethereum smart contract; (4) the seller acknowledges receipt of the goods; (5) After reviewing the uniqueness and authenticity of the invoice, the factor begins to participate in the auction on the platform and puts forward its own offer, and the investor can view the buyer’s credit record on the Ethereum platform; (6) The seller accepts the advance payment from the factor, i.e., the financing is successful; (7) the buyer pays the factor in full when due; (8) If the buyer fails to pay in time, the factor will demand payment from the buyer, but the factor has no recourse; (9) The buyer pays the full amount, and the factor pays the balance to the seller.

Account Profiling Techniques Based on Ethernet Financial Transaction Behavior

Ethernet is a public blockchain application platform implemented based on blockchain technology, which has the characteristics of decentralization, anonymity, and non-tampering. This chapter firstly introduces the general framework of Ethernet account portrait technology, and then after modeling the financial transaction data of Ethernet, it introduces the account portrait technology from two aspects: centrality and deep account portrait based on graph embedding algorithm.

Overall Framework of Ethernet Account Profiling Technology

In order to construct a high-quality Ethernet account portrait, this chapter first models Ethernet transfer transaction data, contract creation transaction data and contract invocation transaction data as three kinds of graph structure data, namely, transfer transaction graph, contract creation graph and contract invocation graph, respectively, and then constructs the account portrait from four aspects, namely, manual features of transaction behaviors, cascade features, centrality, and deep account portrait based on graph embedding algorithm, respectively, with the overall framework The overall framework is shown in Figure 1.

Figure 1.

Ethernet account profile technology overall framework

Among them, the manual features of transaction behavior comprehensively analyze the behavioral information of the accounts contained in the transfer transaction network in three kinds of transactions: transfer transaction, contract creation transaction and contract invocation transaction. Based on the manual features, the cascade feature analysis analyzes the behavioral information of the neighboring accounts in the transfer transaction network in the three types of transactions: transfer transaction, contract creation transaction, and contract invocation transaction. Centrality describes the degree of importance of an account, and in-depth account profiling based on graph embedding algorithms captures information about the spatial structure of the transaction network.

Centrality-Based Portrait of Ethernet Accounts

Ada-Katz centrality measurement algorithm is generally divided into two parts, the first part is the node centrality computation model, and the second part is the node centrality online updating algorithm, the following will be the main line of these two parts, and gradually analyze Ada-Katz centrality measurement algorithm.

Ada-Katz node centrality calculation model

Ada-Katz centrality is KatzIndex class centrality, the base model of this kind of centrality is centrality measurement based on path weights, which is essentially to count the sum of the weights of all paths pointing to the node. In the base KatzIndex algorithm, when calculating the Katz centrality of a node, the length of the paths pointing to that node is decayed exponentially, and then summed to obtain the Katz centrality. The formula for the base KatzIndex is: Katz=k=1βkAk$$\overrightarrow {Katz} = \sum\limits_{k = 1}^\infty {{\beta ^k}} {A^k}$$

where Katz$$\overrightarrow {Katz}$$ is the vector representation of Katz centrality, A denotes the adjacency matrix of the directed graph, k is the length of the path (number of hops), β is the path length decay factor, and 0 < β < 1. For a given node u, its Katz centrality is computed as: Katz(u)=nk=1βk|{paths of length k from n to u}|$$\overrightarrow {Katz} (u) = \sum\limits_n {\sum\limits_{k = 1}^\infty {{\beta ^k}} } \left| {\left\{ {paths{\text{ }}of{\text{ }}length{\text{ }}k{\text{ }}from{\text{ }}n{\text{ }}to{\text{ }}u} \right\}} \right|$$

where n denotes the node that can reach node u after k hops of the path.

Similar to the KatzIndex algorithm, the node centrality computation model of the Ada-Katz Centrality algorithm is also modeled based on the weights of the paths pointing to the node, but the difference lies in the fact that the process of calculating the path weights needs to be combined with the time and weight attributes, as shown in Fig. 2, the Ada-Katz centrality of node u is the sum of the weights of all paths pointing to it, and the paths include All paths that node a, b, c, d, e can reach node u.

Figure 2.

Ada-Katz centrality calculation model

By counting the sum of the weights of all the paths to node u, the node centrality in Ada-Katz algorithm is calculated as: Cu=n temporal weighted paths z formntouΦ(z)$${C_u} = \mathop \sum \limits_n \mathop \sum \limits_{\begin{array}{*{20}{c}} {temporal\;weighted\;paths}\;z \\ {form\:n\:to\:u} \end{array}} \Phi (z)$$

where Φ(z) is the path z weight function and n is the start node of path z.

The computation of path weight Φ(z) in the Ada-Katz algorithm needs to be introduced with the following background knowledge. In a network structure data scenario that changes dynamically over time, edge flow data implies the transfer of information, e.g., social information transfer is represented in social networks, and money transfer is represented in financial transfer networks. In the process of information transfer, time passes and causes the node centrality to decay. At the same time, in the process of information transfer, a certain amount of information is lost after each transfer, i.e., the longer the path in the network, the more information is lost, and here we call it the information transfer decay property. To summarize, the path weight calculation rule in Ada-Katz algorithm needs to refer to the temporal time decay and information transfer decay characteristics.

Based on the above background knowledge, we model the paths as temporal sequential paths (Temporal Walks) with weight properties, which are called Temporal Weighted Walks in this paper, as shown in Figure 3.

Figure 3.

Temporal Weighted Walks

Temporal Weighted Walks is defined mathematically as: z=(n0,n1,t1,w1),(n1,n2,t2,w2),,(nj1,nj,tj,wj);ti1ti$$z = \left( {{n_0},{n_1},{t_1},{w_1}} \right),\left( {{n_1},{n_2},{t_2},{w_2}} \right), \cdots ,\left( {{n_{j - 1}},{n_j},{t_j},{w_j}} \right);{t_{i - 1}} \leq {t_i}$$

For the path Z in Eq. (4), the weights are specified as: Φ(z)=w1β|z|i=1jϕ(ti,ti+1)$$\Phi (z) = {w_1}{\beta ^{|z|}}\prod\limits_{i = 1}^j \phi \left( {{t_i},{t_{i + 1}}} \right)$$

Where w1 is the starting path weight, i.e., the amount of information carried by path z during information transfer. β(0 < β < 1) is the path length attenuation factor, from which the path weights are processed for information transfer attenuation. ϕ(ti,ti+1)$$\phi \left( {{t_i},{t_{i + 1}}} \right)$$ is the time decay function, from which the path weights are subjected to time decay processing. Combining Eq. (3) and Eq. (5), all the path weights pointing to node u are counted, and the Ada-Katz node centrality of node u is calculated as: Cu=n temporal weighted paths z formntouw1β|z|i=1jϕ(ti,ti+1)$${C_u} = \mathop \sum \limits_n \mathop \sum \limits_{\begin{array}{*{20}{c}} {temporal\;weighted\;paths}\;z \\ {form\:n\:to\:u} \end{array}} {w_1}{\beta ^{|z|}}\mathop \prod \limits_{i = 1}^j \phi \left( {{t_i},{t_{i + 1}}} \right)$$

Where n is the start node of the temporally sequential weighted path z pointing to node u, β is the path length decay factor, w1 is the weight of the start edge of the path, and ϕ(ti,ti+1)$$\phi \left( {{t_i},{t_{i + 1}}} \right)$$ is the time decay function, the degree of time decay can be controlled by using different types of time decay functions, and here we introduce two special time decay functions:

ϕ(t1,t2)=1$$\phi \left( {{t_1},{t_2}} \right) = 1$$

This time decay function is constant. When this function is used and weight w1 is not considered, the Ada-Katz node centrality is the same as the KatzIndex node centrality, so it can be seen that the KatzIndex algorithm is a special case of the Ada-Katz centrality measurement algorithm.

ϕ(t1,t2)=ec(t2t1)$$\phi \left( {{t_1},{t_2}} \right) = {e^{ - c\left( {{t_2} - {t_1}} \right)}}$$

This time decay function is exponential because ea × eb = e(a + b), so the weighting formula for path Z can be rewritten as: Φ(z)=w1β|z|ec(tjt1)$$\Phi (z) = {w_1}{\beta ^{|z|}}{e^{ - c\left( {{t_j} - {t_1}} \right)}}$$

Where c = ln 2/τ is the HALF-LIFE (half-life) factor, τ is the half-life time, and the half-life factor c is determined by the half-life time τ. In this paper, the time decay function is time decayed using an exponential function to capture the temporal change information in the dynamic network.

Ada-Katz node centrality online update algorithm

In dynamic networks such as the Ethernet transaction network, the Ada-Katz centrality measurement algorithm tracks the centrality of nodes associated with edge streams as the edge stream data arrives and updates the node centrality online based on the node centrality computation model described above. When edge stream data arrives, two new parts of the path to the destination node u are added for edge stream data e(u,v,tuv,wuv)$$e\left( {u,v,{t_{uv}},{w_{uv}}} \right)$$, as shown in Fig. 4.

Figure 4.

Side flow data demonstration diagram

The first part of the path is the start node of this edge pointing to the destination node, i.e., the edge flow data just arrived itself as a path. At moment t = tuv, the weight of this path is wuvβ;

The second part of the path is the path composed of the path pointing to the start node of the edge connected to the current edge. At moment t = tuv, the sum of the weights of this part of the path is Cuβϕ(tuv,tu)$${C_u}\beta \phi \left( {{t_{uv}},{t_u}} \right)$$, where tu is the time when node u last appeared in the edge stream.

At the moment 7 when the edge flow reaches the moment tuv, the sum of these two partial path weights is used as the incremental part of the centrality of the node v, while the centrality of the node u is time decayed, the centrality of the node u, v will be updated as: CuCuϕ(tuv,tu) CvCvϕ(tuv,tu)+(wuv+Cu)β$$\begin{array}{c} {C_u}: = {C_u}\phi \left( {{t_{uv}},{t_u}} \right) \\ {C_v}: = {C_v}\phi \left( {{t_{uv}},{t_u}} \right) + \left( {{w_{uv}} + {C_u}} \right)\beta \\ \end{array}$$

where Cu, Cv is the centrality of node u, v, tu, tv is the time before node u, v appears at moment tuv, wuv is the weight of edge flow data, β is the path length decay factor, and ϕ is the time decay function, respectively. Based on the above node centrality update formula, the

In summary, the Ada-Katz node centrality measurement algorithm can complete the online update operation of node centrality when the edge flow arrives, which achieves the purpose of real-time update.

Detection of anomalous accounts in Ethernet based on account profiling

This chapter firstly gives the general framework of abnormal account detection in this paper, and then by completing the private chain company node registration verification work, tracing the risky company user, obtaining the identity information of the company user, and completing the accurate determination of the identity of the risky node.

General Framework for Detecting Abnormal Accounts in Ethernet

The Ethernet anomalous account detection in this paper is based on the Ethernet account portrait technology in Chapter 3, takes the anonymous accounts in the transfer transaction network as the research object, combines the machine learning classification model, and solves the data imbalance problem common in the real scenarios in the field of anomaly detection through the data imbalance processing method, so as to improve the accuracy of anomalous account detection, and the overall framework is shown in Figure 5. Later, we will introduce the Ethernet account portrait technology as well as the machine learning classification model and data imbalance processing algorithm used in this chapter, and gradually analyze the advantages and disadvantages of the model through experiments, so as to gradually improve the accuracy of anomaly account detection.

Figure 5.

Ethereum abnormal account detection overall framework

Traceability process

The private chain company node registration verification work can be completed through the chameleon hash authentication algorithm, so that the regulator of the alliance blockchain module can accurately trace the risky company users through the information in the alliance blockchain module, obtain the identity information of the company users, and complete the accurate determination of the risky node identity.

In the company node registration phase of the private chain, the user node is denoted by uid. The user node will firstly generate its own chameleon hash public and private key pairs by key generation algorithm, respectively (pk, sk), where the public key pk = gx mod p, and generate a random number r. Using the generated meta- and public key pair information from the previous two steps m to perform the hash computation to get the Hash(y, m, r) = gmpkr to compute its chameleon hash value to get the chameleon hash value for the user’s identity, which will be used as the chameleon hash value as the result of chameleon hash encryption is stored in the enterprise table of the federated blockchain to generate the user identity. At the same time, the alliance blockchain regulatory node stores the trapdoor information of the node of the company, and if the user’s identity is validated, the storage is authorized by the alliance blockchain arbitration node and the node registration information is released through the Merkle tree. The flow of node registration stage is shown in Fig. 6.

Figure 6.

Flowchart of node registration phase

In the node identity tracing process, first input the private chain node data dataDu$$data_{D_u}$$ to be traced and initialize the identity sequence ID = ∅, obtain the data on the private chain, separate the private chain node information, parse to get the user node identity encryption result CT={CTuid}$$CT = \left\{ {C{T_{{u_{id}}}}} \right\}$$, determine whether the chameleon hash encryption result belongs to the hash table in the union blockchain, if not, output ID = 0; if it belongs to the hash table in the union blockchain, then calculate the private chain node of the chameleon hash public key pair PK value, retrieve the records on the chain, so as to obtain the identity of the company user corresponding to the chameleon hash value. And show the information uid of the company user to the supervisory node to complete the node tracing, so as to realize the accurate tracing of the risky company, and the node tracing process is shown in Fig. 7.

Figure 7.

Node traceability phase flowchart

Experimental verification

In order to evaluate the performance of the above models, this study conducted experiments on three public datasets, UCI Message, Bitcoin-Alpha, and Bitcoin-OTC, and further validated the models on private MLM datasets. These experiments aim to assess the model’s performance and stability in detail to gain a better understanding of its practical application value.

Financial transaction anomaly detection experiment and analysis
Experimental data set

UCI Message is a social networking dataset collected from an online community of students at the University of California, Irvine. In the constructed dynamic graph, each node represents a user and each edge represents a message between two users.

Bitcoin-Alpha and Bitcoin-OTC, two publicly available datasets of the Bitcoin exchange network, are used to study the problem of node identification and classification in the Bitcoin network. In these two datasets, nodes are users on the platform, and when a user evaluates another user on the platform, edges appear between the corresponding two nodes.

Private MLM dataset: In this experiment, the data from the original data from June 2021 to July 2024 are selected for the experiment, and after data preprocessing, a financial transaction network containing 6739 account nodes and 72834 transaction edges is constructed.

The statistics of the above data set after preprocessing are shown in Table 1.

Data set information

Datasets Number of nodes Edge number Average degree
UCI Message 2617 170358 1533
Bitcoin-Alpha 4283 31966 13.26
Bitcoin-OTC 6195 45492 12.84
MLM data set 6739 72834 8.33
Baseline methodology and experimental set-up

In order to verify the effectiveness of the proposed model Ada-Katz when used for anomalous account detection, this paper conducts comparison experiments with the following methods.

Netwalk: this method is based on a random walk approach to generate contextual information and learns node embedding using an autoencoder model.

AddGraph: this method is an end-to-end dynamic graph anomaly edge detection method. It utilizes the GCN module to capture spatial information and the GRU attention module to extract the short-term and long-term dynamic evolution.

TADDY: This method captures information representations from dynamic graphs with coupled spatio-temporal patterns through a dynamic graph anomaly edge detection model based on the Transformer model.

In this experiment, a comparison of the performance of different models on several publicly available datasets is presented, and this part of the analysis helps to understand the performance of various models and their applicability on different datasets.

The average AUC performance comparison for all tested time-slice networks is anomalous, as shown in Table 2.

Model performance comparison

Datasets UCI Message Bitcoin-Alpha Bitcoin-OTC
1% 5% 10% 1% 5% 10% 1% 5% 10%
Netwalk 0.785 0.756 0.754 0.858 0.851 0.857 0.876 0.784 0.776
AddGraph 0.792 0.789 0.778 0.870 0.839 0.842 0.869 0.842 0.855
TADDY 0.874 0.851 0.848 0.957 0.941 0.928 0.961 0.957 0.942
Ada-Katz 0.931 0.872 0.860 0.945 0.936 0.917 0.928 0.950 0.953

Analyzing the experimental results in Table 2, the following conclusions can be obtained:

The accuracy of detection results of Netwalk, AddGraph, TADDY and model Ada-Katz can reach more than 75% in each dataset, which indicates that the detection effect of the four models can learn the effective information of the graph to a certain extent, which is conducive to the detection of anomalous accounts in financial transactions. These methods all adopt the idea of deep learning and combine the characteristics of graph-structured data. They learn the dynamic evolution of the graph by considering the interactions in the previous time-slice network.

The model Ada-Katz has a large performance gain when there are fewer anomalies. Specifically, at 1% anomaly ratio, the average performance of model Ada-Katz on AUC is 0.935, and the average performance of other baselines is 0.871, with a gap of 6.33%, while at 5% and 10% anomaly ratios, the average performance of model Ada-Katz is 0.919 and 0.910, respectively, and the average performance of other baselines is 0.846 and 0.842, with a difference of 7.38% and 6.78%, respectively. Compared to the other models, the model in this paper has the best relative performance on the Bitcoin-Alpha dataset, and the model is slightly worse than the model TADDY on the Bitcoin-OTC dataset, and a possible reason is that the experiment uses an effective negative sampling strategy to train the framework, which constructs an excessive number of negative samples that have a certain negative impact on the final results.

Experimental results and analysis

In this experiment, box plots are used to show the AUC results of different datasets with different training ratios. Box plot is a commonly used data visualization method, its upper and lower edges represent the upper and lower quartiles, the line in the middle represents the median, the “tentacles” at the top and bottom represent the maximum and minimum values in the dataset, the hollow circle represents the average value, and the solid circle represents the outliers. The horizontal axis in the box plot represents the training scale of the dataset, and the vertical axis represents the AUC value of the model at that training scale.

The training results of the model on UCI Message, Bitcoin-Alpha, and Bitcoin-OTC are shown in Figure 8, Figure 9, and Figure 10, respectively.

Figure 8.

AUC of different training ratio on the UCI-Message dataset

Figure 9.

AUC of different training ratio on the Bitcoin-Alpha dataset

Figure 10.

AUC of different training ratio on the Bitcoin-OTC dataset

The experimental results show that on the dataset UCI-Message, the AUC value of the model does not have a significant upward or downward trend as the training ratio increases. On the datasets Bitcoin-Alpha and Bitcoin-OTC, the AUC value of the model shows a zigzag upward trend with the increase of the training ratio.

Additionally, it has been observed that there are some differences in the model’s performance on different datasets. For example, on the Bitcoin-OTC dataset, the AUC value of the model is generally high and can reach more than 94%. On the UCI-Message dataset, on the other hand, the AUC value of the model is lower and the accuracy is above 77%. This indicates that the model in this paper has different adaptability to different datasets and can be used for financial anomaly detection on multiple datasets. However, the model also achieves an AUC value of over 77% in the worst case, and in the best case, the AUC value can reach 97%.

Establishment of Credit Risk Indicator System of Supply Chain Finance Based on Blockchain
Supply chain finance credit risk indicators

Through affiliation analysis, correlation analysis and discriminative power analysis, 17 qualitative indicators and 9 quantitative indicators, totaling 26 indicators, were finally selected to construct a blockchain technology-enabled supply chain finance credit risk evaluation index system, as shown in Table 3.

Supply chain financial credit risk evaluation index system

Primary index Secondary index Three-level index
Small and medium-sized financing enterprise qualification Profit ability X1: Return on equity
X2: Operating margin
X3: Total profit
Management ability X4: Accounts receivable turnover rate
X5: Quick ratio
Solvency ability X6: Asset-liability ratio
X7: Interest cover multiple
Development ability X8: Net profit growth rate
X9: Total asset growth rate
Sales ability X10: Net profit margin on sales
Innovation ability X11: New technology multiplier
X12: Proportion of technical staff
X13: R&D investment intensity
Core enterprise qualification Solvency ability X14: Shareholders’ equity ratio
X15: Inventory turnover
Enterprise assets Asset position X16: Accounts receivable period
X17:Return on invested capital
Blockchain technology utility Node enterprise decentralization X18: Peer-to-peer trading
X19: Distributed ledger
X20:Information sharing degree
Business function X21: Smart payment
X22: Careful investigation
X23:Traceability capability
X24:Enterprise information integrity
Business mechanism security X25: Transaction consensus mechanism
X26: Encryption security
Principal component analysis

In this paper, 20 construction enterprises and suppliers in the engineering and construction industry served by Z platform are selected, and the operation data and financial data of these 20 enterprises from 2021 to 2023 are collected, and the data results of 26 qualitative and quantitative indicators of these three years of the 20 companies are collated and summarized in a weighted average according to the credit risk evaluation index system constructed in Table 3, and the resulting matrix of the component scoring coefficients is as Table 4 Shown.

Component score coefficient matrix

Component
1 2 3 4 5 6 7
X1 0.002 0.984 0.979 -0.018 -0.446 -0.978 0.319
X2 -0.507 0.922 -0.663 0.108 -0.548 0.210 0.175
X3 0.395 0.933 0.704 -0.777 -0.747 -0.259 -0.660
X4 -0.448 -0.887 0.184 -0.571 -0.474 0.870 -0.686
X5 -0.337 0.505 -0.069 0.054 0.066 -0.377 0.097
X6 -0.232 -0.386 -0.714 0.193 -0.337 0.967 -0.705
X7 -0.948 0.911 0.323 -0.802 0.342 -0.106 -0.306
X8 -0.447 0.233 -0.787 0.899 -0.525 0.263 -0.514
X9 -0.292 0.309 0.163 0.999 -0.970 -0.801 0.161
X10 -0.784 0.891 0.196 -0.876 0.134 0.396 0.295
X11 -0.617 -0.951 0.751 0.222 0.814 -0.943 -0.314
X12 0.317 0.288 -0.015 0.088 0.959 0.298 0.476
X13 -0.325 -0.941 -0.062 -0.394 0.373 0.106 0.240
X14 0.359 0.096 0.356 -0.361 -0.178 -0.733 0.991
X15 -0.829 0.079 0.144 0.244 -0.432 0.297 0.823
X16 -0.952 0.176 -0.674 -0.656 -0.111 0.904 -0.295
X17 -0.729 -0.496 -0.617 -0.682 -0.603 0.950 0.063
X18 0.724 -0.585 -0.286 0.302 -0.286 0.523 0.188
X19 0.787 -0.762 -0.035 0.028 -0.216 0.398 0.201
X20 0.846 -0.836 -0.045 0.131 0.361 0.107 -0.544
X21 0.693 0.226 -0.237 -0.875 -0.829 -0.407 0.389
X22 0.948 -0.752 0.203 0.286 -0.284 -0.990 -0.232
X23 0.948 0.287 -0.065 0.104 0.502 0.235 0.129
X24 0.829 -0.933 -0.001 0.206 -0.763 0.476 -0.905
X25 0.794 0.380 0.842 -0.957 0.219 -0.826 0.428
X26 0.872 -0.997 -0.823 -0.994 0.141 -0.614 0.606

It can be found that F1 represents X22: due diligence, X24: enterprise information integrity, X26: encryption security, X23: traceability ability, X19: distributed ledger, X20: information sharing degree, X25: transaction consensus mechanism, X21: smart payment, X18: peer-to-peer transaction, reflecting the investment of enterprises in blockchain technology; F2 represents X2: operating profit margin, X10: net sales margin, X1: return on equity, X3: total profit, and X7: interest coverage ratio, reflecting the profitability and quality of earnings and the ability to repay debts. F3 represents X5: quick ratio, X13: R&D investment intensity, and X15: inventory turnover ratio, reflecting the company’s solvency, asset flow, and investment in R&D expenditures. F4 represents X9: the growth rate of total assets and X8: the growth rate of net profit, which reflects the growth ability of the enterprise; F5 represents the proportion of X12: technical personnel and X11: the ratio of new technologies, reflecting the proportion of scientific and technological personnel and the research and development of new technologies; F6 represents X17: return on invested capital, X4: accounts receivable turnover ratio, X16: accounts receivable account period, X6: asset-liability ratio, reflecting the profitability of the company’s investment, the operating capacity of accounts receivable and the company’s capital structure; F7 represents X14: Shareholder Equity Ratio, which reflects the capital structure of the core companies in the supply chain.

Example validation of the model

Guangdong A Investment Holding Co., Ltd. is a company serviced by Platform Z that is mainly engaged in land primary development and urban operation. In the business of primary land development, the Company is entrusted by the Guangdong Provincial Government and the Guangdong Provincial Land Reserve Centre to organize and implement the demolition and relocation, compensation and resettlement, and municipal infrastructure construction of the land reserved by the Guangdong Provincial Government through acquisition, repossession and expropriation in accordance with the law. As the Company belongs to the capital-driven engineering and construction industry, it has a strong demand for capital and needs to apply for loans from financial institutions frequently.

The following is an example of the validation of the regression model constructed in the previous section based on various data of the company.

Enterprise compliance probability based on “blockchain + supply chain finance” model

According to the collected data and expert scoring data obtained through the questionnaire survey, the indicators of Guangdong A Investment Holding Company Limited are shown in Table 5.

Enterprise indicators

Primary index Secondary index Three-level index Indicator data
Small and medium-sized financing enterprise qualification Profit ability X1: Return on equity -1.36%
X2: Operating margin -28.11%
X3: Total profit(10,000RMB) -6281.08
Management ability X4: Accounts receivable turnover rate 6.42
X5: Quick ratio 0.15
Solvency ability X6: Asset-liability ratio 21.34%
X7: Interest cover multiple -0.12
Development ability X8: Net profit growth rate -173.02%
X9: Total asset growth rate -1.26%
Sales ability X10: Net profit margin on sales -31.29%
Innovation ability X11: New technology multiplier 65.73%
X12: Proportion of technical staff 21.07%
X13: R&D investment intensity 0.81%
Core enterprise qualification Solvency ability X14: Shareholders’ equity ratio 53.85%
X15: Inventory turnover -0.16
Enterprise assets Asset position X16: Accounts receivable period(day) 75
X17:Return on invested capital -0.28%
Blockchain technology utility Node enterprise decentralization X18: Peer-to-peer trading 8.82
X19: Distributed ledger 7.90
X20:Information sharing degree 9.72
Business function X21: Smart payment 10.00
X22: Careful investigation 8.66
X23:Traceability capability 7.93
X24:Enterprise information integrity 9.42
Business mechanism security X25: Transaction consensus mechanism 10.00
X26: Encryption security 8.61

The calculated probability of compliance is 97.74%, indicating that with the empowerment of Z Platform blockchain technology, Guangdong A Investment Holding Company Limited has a 97.74% probability of compliance and a low credit risk.

Firms’ probability of compliance in the traditional supply chain finance model

The following calculates the probability of a company’s compliance in a traditional supply chain finance model without the empowerment of blockchain technology. In this model, only 15 quantitative evaluation indicators need to be considered, while 11 indicators related to blockchain technology, such as new technology multiplier, R&D investment intensity, peer-to-peer transaction, distributed ledger, etc. need not be considered. Still taking the data of 20 enterprises served by Z platform from 2021 to 2023 as samples, the probability of compliance of enterprises is calculated by principal component analysis and binary logistic regression analysis.

Through the calculation of IBM SPSS 28.0 software, the results of the principal component analysis method are shown in Table 6, in which the cumulative contribution rate of the five principal component variables with initial eigenvalues greater than 1 is 73.62%, which is greater than 60%, and meets the requirements of Logistic regression analysis.

Component score coefficient matrix

Component
1 2 3 4 5
Return on equity 0.247 0.451 0.878 0.842 -0.694
Total profit 0.177 0.609 0.744 0.796 0.261
Operating margin 0.823 0.895 -0.126 -0.021 0.103
Net profit margin on sales 0.162 -0.339 -0.145 -0.584 -0.782
Interest cover multiple -0.012 0.976 -0.735 0.439 0.757
Quick ratio 0.127 0.115 0.777 0.928 0.305
Inventory turnover 0.411 0.662 0.148 -0.325 0.800
Accounts receivable period -0.048 0.602 0.069 0.307 -0.919
Asset-liability ratio -0.009 -0.034 -0.969 0.611 -0.129
Total asset growth rate 0.409 0.370 0.714 0.549 0.814
Net profit growth rate 0.138 0.898 0.205 0.280 0.058
Accounts receivable turnover rate -0.570 -0.516 -0.130 0.432 0.315
Shareholders’ equity ratio 0.266 0.190 0.128 -0.604 -0.984
Proportion of technical staff 0.003 -0.957 -0.459 -0.360 0.729
Return on invested capital 0.658 -0.211 0.372 0.370 -0.660

The next step is to carry out regression analysis, according to the results of regression analysis, the principal component variable with significance less than 0.05 is F1, the constant is -2.317, the significance is less than 0.001, so the probability of keeping the contract of Guangdong A Investment Holding Co. under the traditional model is 58.29%, there is a higher credit risk, and the bank will reject its loan request.

Comparative analysis

By calculating the probability of compliance of Guangdong A Investment Holding Company Limited under different modes, we find that with the empowerment of blockchain technology, the probability of compliance of the enterprise is 97.74%, which is much higher than the probability of compliance of the enterprise under the traditional supply chain finance mode, which is 58.29%. With such a result, the bank will make a different decision when assessing the risk of the loan application of Guangdong A Investment Holding Co. If the probability of compliance is 97.74%, the bank is more likely to approve the loan application and the enterprise will have the funds to continue the construction project. If the enterprise’s probability of compliance is 58.29%, then the bank will reject its loan application, and as a capital-driven engineering and construction industry, the enterprise will find it difficult to continue its project, thus affecting the enterprise’s project progress and negatively impacting the enterprise or even the entire supply chain. The following analyses the reasons why the likelihood of the enterprise complying is higher than that of the traditional supply chain finance model due to the empowerment of blockchain technology.

First: in the traditional supply chain finance model, the enterprise’s return on net assets, operating profit margin, total profit, accounts receivable turnover, quick ratio, interest coverage multiple, net profit growth rate, total asset growth rate, net sales interest rate, R&D investment intensity, inventory turnover, return on invested capital are weaker than the average of the 20 sample enterprises, which will have a negative impact on the bank’s risk assessment of its loan applications, thus preventing the enterprise from obtaining financing. This will have a negative impact on the bank’s risk assessment of its loan application, thus preventing the enterprise from obtaining financing; And through the empowerment of Z platform blockchain technology, Guangdong A Investment Holding Co., Ltd. scored the highest value of 10 on both indicators of smart payment, and transaction consensus mechanism, and all other blockchain-related indicators scored 7 or more, indicating that blockchain technology can improve the transparency and traceability of enterprise information in the supply chain and reduce the risk of fraud. Banks can learn about the transaction records, inventory, logistics and other information of each enterprise in the supply chain through blockchain technology, so as to more accurately assess the credit risk of the enterprise. Through blockchain technology, transaction records are recorded on a distributed ledger and cannot be tampered with, which prevents tampering of transaction records in the supply chain, reduces the risk of fraud, improves the probability of compliance by enterprises and the trust of banks in the enterprises, helps banks to better assess the credit risk and financing ability of enterprises, and improves the chances of enterprises in the supply chain to obtain bank loans.

Second: In the principal component analysis of the credit risk evaluation index system of supply chain finance, a total of seven principal component variables are extracted, of which F1 denotes X22: prudent investigation, X24: enterprise information integrity, X26: encryption security degree, X23: traceability, X19: distributed ledger, X20: information sharing degree, X25: transaction consensus mechanism, X21: smart Payment, X18: Peer-to-Peer Transaction. We find that the principal component variable F1 contains all the qualitative indicators related to blockchain technology, thus indicating that blockchain technology is an indicator that has a very important impact on the evaluation of credit risk in supply chain finance, which can improve the transparency, credibility, and efficiency of supply chain finance transactions, reduce the credit risk of suppliers, and thus promote the development of the supply chain finance market.

Conclusion

In this paper, based on the research of financial transaction data security management of blockchain technology, the online measurement algorithm of centrality (Ada-Katz Centrality) is proposed, and the application of blockchain technology in supply chain financial risk control is analyzed by Z platform as an example, and the conclusions are as follows:

The accuracy of detection results of Netwalk, AddGraph, TADDY and model Ada-Katz in each dataset can reach more than 75%, which indicates that the detection effect of the four models can learn the effective information of the graphs to a certain extent, which is conducive to the detection of abnormal accounts in financial transactions. The models in this paper are adaptable to different datasets and can be utilized for detecting financial anomalies in multiple datasets. But the model also achieves more than 77% AUC value in the worst case, and in the best case, the AUC value can reach 97%.

With the empowerment of blockchain technology, the model predicts that the probability of compliance of enterprises is 97.74%, which is much higher than the 58.29% of the probability of compliance of enterprises under the traditional supply chain finance model.

Język:
Angielski
Częstotliwość wydawania:
1 razy w roku
Dziedziny czasopisma:
Nauki biologiczne, Nauki biologiczne, inne, Matematyka, Matematyka stosowana, Matematyka ogólna, Fizyka, Fizyka, inne