International Journal of Big Data Intelligent Technology, 2026, 7(1); doi: 10.38007/IJBDIT.2026.070116.
Weiyao Ma
Robert H. Smith School of Business, University of Maryland, College Park, 20742, Maryland, USA
The research background focuses on the core demands of secure and efficient transmission in the era of data sharing, revealing the three major challenges currently faced: economic value loss caused by cross organizational data silos, single point failure and privacy leakage risks in centralized platforms, and performance bottlenecks in large-scale node scenarios of blockchain. The research method innovatively proposes two technological paths: a blockchain dynamic sharding model based on trust management, which quantifies trust timeliness through spatiotemporal decay factors, achieves real-time sharding reassembly and load balancing, and solves the problem of traditional sharding security and performance imbalance; The revocable attribute based encryption scheme based on the blockchain adopts a private key/pre decryption key separation architecture and a computing outsourcing protocol to reduce computing overhead while ensuring revocation efficiency and adapt to edge computing scenarios. The research results have verified the superiority of the proposed scheme: experiments have shown that the system throughput significantly increases and latency decreases at the user scale; Effectively resist malicious node attacks and reduce the probability of failure through distributed ledger and trust management mechanisms; Compared to traditional attribute based encryption, key generation and encryption time overhead are reduced. The research conclusion emphasizes that this automated operation approach achieves full chain collaborative optimization through multidimensional technological innovation, supports the scalability and robustness of cloud data platforms in complex scenarios, and provides a secure and efficient technological paradigm for data sharing. Its value continues to be highlighted over time, supporting the development of enterprises, society, and government in multiple fields.
Blockchain dynamic fragmentation model, revocable attribute based encryption, federated learning trust evaluation, zero knowledge proof authentication, edge computing outsourcing verification.
Weiyao Ma. Automated Operation Approach for Scalable Cloud Data Platform. International Journal of Big Data Intelligent Technology (2026), Vol. 7, Issue 1: 131-139. https://doi.org/10.38007/IJBDIT.2026.070116.
[1] Chithaluru P , Al-Turjman F , Dhatterwal K J S .An enhanced consortium blockchain diversity mining technique for IoT metadata aggregation[J].Future generations computer systems: FGCS, 2024, 152(Mar.):239-253.DOI:10.1016/j.future.2023.10.020.
[2] Vali S J .ATTRIBUTE BASED ENCRYPTION IN IOT DEVICES[J].Futuristic Trends in IOT Volume 3 Book 4, 2024:171-179.DOI:10.58532/v3bdio4p2ch1.
[3] Inayatulloh, Pelawi D ,Witarsjah,et al.Blockchain Sharding Model to Increase The Efficiency of Waste Management Processes Based on Blockchain Technology[J].2024 4th International Conference on Innovations in Computer Science (ICONICS), 2024:1-5.DOI:10.1109/iconics64289.2024.10824439.
[4] Barber T M , Kabisch S , Pfeiffer A F H ,et al.Optimised Skeletal Muscle Mass as a Key Strategy for Obesity Management[J].Metabolites (2218-1989), 2025, 15(2).DOI:10.3390/metabo15020085.
[5] Zhen Zhong. Big Data Engineering and Intelligent Analysis Framework for Compliance Investigation. Academic Journal of Computing & Information Science (2025), Vol. 8, Issue 11: 107-115
[6] Wu, W. (2025, June). Construction and optimization of intelligent gateway software management platform based on jenkins cluster management under cloud edge integration architecture in industrial internet of things. In International Conference on 6G Communications Networking and Signal Processing (pp. 633-645). Singapore: Springer Nature Singapore.
[7] Wu, L. (2025, December). Design and Application of Automatic Data Set Generation Tool Based on KLEE in Embedded Memory Management Performance Test Framework. In 2025 IEEE 17th International Conference on Computational Intelligence and Communication Networks (CICN) (pp. 1111-1117). IEEE.
[8] Ye, J. (2025). Multimodal medical data intelligent classification method and system implementation based on improved SVM and similarity learning algorithm. International Journal of World Medicine, 2025, 6 (1), 19, 27.
[9] Truong, T. H. (2026). Research on Risks and Countermeasures of Enterprise E-Commerce Transformation in the Cross-Border E-Commerce Environment.
[10] Qi, Y. (2025, October). Research on Privacy Protection of AI Models in Big Data Using Differential Privacy Technology. In 2025 2nd International Conference on Software, Systems and Information Technology (SSITCON) (pp. 1-5). IEEE.
[11] Hong, Y. (2025). Architecture Design and Performance Optimization of a Large-scale Online Simulation Platform for Business Decision-making. Advances in Computer and Communication, 6(4).
[12] Ye, J. (2025). Design of a Non-Invasive Brain Computer Interface System for Handwritten Text Based on L2 Regularization and Attention Supervision Paradigm, and Optimization of EEG Signal Decoding. International Journal of Big Data Intelligent Technology, 2025, 6 (1), 126, 134.
[13] Hong, Y. (2026). Research on Warehouse Capacity Optimization Methods Based on Predictive Modeling. Engineering Advances, 6(1).
[14] Truong, T. H. (2025). Research on the Application of Digital Healthcare Platforms in Chronic Disease Management. Advances in Computer and Communication, 6(5).
[15] Ye, J. (2025). Optimization of Neural Motor Control Model Based on EMG Signals. International Journal of Engineering Advances, 2(4), 1-8.