AI Chat Paper
Note: Please note that the following content is generated by AMiner AI. SciOpen does not take any responsibility related to this content.
{{lang === 'zh_CN' ? '文章概述' : 'Summary'}}
{{lang === 'en_US' ? '中' : 'Eng'}}
Chat more with AI
PDF (1 MB)
Collect
Submit Manuscript AI Chat Paper
Show Outline
Outline
Show full outline
Hide outline
Outline
Show full outline
Hide outline
Open Access

A Blockchain-Based Copyright Management Scheme for Open-Source Software and Hardware Designs

School of Information Science and Technology, Fudan University, Shanghai 200433, China
Show Author Information

Abstract

Plagiarism in software code and hardware design threatens the open-source movement and the software and hardware industries. It is essential to differentiate between the unethical act of plagiarism and the legitimate use of open-source resources. Existing copyright protection measures, such as license design, inadequately address copyright ownership and protection issues. Furthermore, they fail to detect plagiarism methods for open-source hardware projects, such as circuit location modification. To address these challenges, this paper proposes a blockchain-based copyright management scheme, which introduces a general originality detection model based on community detection, extracting adjustable granularity digests from code and design files. These digests are stored on a peer-to-peer blockchain, enabling nodes to verify the originality via smart contracts. Additionally, the scheme improves the storage structure, protecting the rights of authors and contributors. Experimental results demonstrate the effectiveness and runtime efficiency of the proposed model in extracting digests for blockchain storage while maintaining verification accuracy. The scheme offers enhanced generality, practical performance, and suitability for distributed development and maintenance, with considerable implications for evidence gathering, fostering innovation and integrity.

References

[1]
M. Langenkamp and D. N. Yue, How open source machine learning software shapes AI, in Proc. 2022 AAAI/ACM Conf. AI, Ethics, and Society, New York, NY, USA, 2022, pp. 385–395.
[2]

M. Oellermann, J. W. Jolles, D. Ortiz, R. Seabra, T. Wenzel, H. Wilson, and R. L. Tanner, Open hardware in science: The benefits of open electronics, Integr. Comp. Biol., vol. 62, no. 4, pp. 1061–1075, 2022.

[3]

T. Wenzel, Open hardware: From DIY trend to global transformation in access to laboratory equipment, PLoS Biol., vol. 21, no. 1, p. e3001931, 2023.

[4]
S. Pech, Copyright unchained: How blockchain technology can change the administration and distribution of copyright protected works, SSRN Electron. J., no. 6, p.1, 2020.
[5]
C. Liu, C. Chen, J. Han, and P. S. Yu, GPLAG: Detection of software plagiarism by program dependence graph analysis, in Proc. 12th ACM SIGKDD Int. Conf. Knowledge Discovery and Data Mining, Philadelphia, PA, USA, 2006, pp. 872–881.
[6]
M. Wang, P. Wang, and Y. Xu, Ccsharp: An efficientthree-phase code clone detector using modified pdgs, in Proc. 24th Asia-Pacific Software Engineering Conference (APSEC), Nanjing, China, 2017, pp. 100–109.
[7]
Y. Zou, B. Ban, Y. Xue, and Y. Xu, CCGraph: A PDG-based code clone detector with approximate graph matching, in Proc. 35th IEEE/ACM Int. Conf. Automated Software Engineering, Virtual Event, 2020, pp. 931–942.
[8]
C. Fang, Z. Liu, Y. Shi, J. Huang, and Q. Shi, Functional code clone detection with syntax and semantics fusion learning, in Proc. 29th ACM SIGSOFT Int. Symp. on Software Testing and Analysis, Virtual Event, 2020, pp. 516–527.
[9]

N. Jing, Q. Liu, and V. Sugumaran, A blockchain-based code copyright management system, Inf. Process. Manag., vol. 58, no. 3, p. 102518, 2021.

[10]

W. Liang, D. Zhang, X. Lei, M. Tang, K.-C. Li, and A. Y. Zomaya, Circuit copyright blockchain: Blockchain-based homomorphic encryption for IP circuit protection, IEEE Trans. Emerg. Top. Comput., vol. 9, no. 3, pp. 1410–1420, 2021.

[11]

L. Xiao, W. Huang, Y. Xie, W. Xiao, and K.-C. Li, A blockchain-based traceable IP copyright protection algorithm, IEEE Access, vol. 8, pp. 49532–49542, 2020.

[12]
S. Nakamoto, Bitcoin: A peer-to-peer electronic cash system, https://bitcoin.org/bitcoin.pdf, 2008.
[13]

G. Wood, Ethereum: A secure decentralized generalized transaction ledger, Ethereum Project Yellow Paper, vol. 151, no. 2014, pp. 1–32, 2014.

[14]
V. Buterin, A next generation smart contract & decentralized application platform, https://www.mendeley.com/catalogue/eb928e92-f764-3dee-ab4d-dd9430eb10c0/, 2023.
[15]
F. Yamaguchi, N. Golde, D. Arp, and K. Rieck, Modeling and discovering vulnerabilities with code property graphs, in Proc. IEEE Symp. on Security and Privacy, Berkeley, CA, USA, 2014, pp. 590–604.
[16]

M. E. J. Newman and M. Girvan, Finding and evaluating community structure in networks, Phys. Rev. E, vol. 69, no. 2, p. 026113, 2004.

[17]

A. Leman and B. Weisfeiler, A reduction of a graph to a canonical form and an algebra arising during this reduction, (in Russian), Nauchno-Technicheskaya Informatsiya, vol. 2, no. 9, pp. 12–16, 1968.

[18]

N. Shervashidze, P. Schweitzer, E. J. Van Leeuwen, K. Mehlhorn, and K. M, Borgwardt, Weisfeiler-Lehman graph kernels, J. Mach. Learn. Res., vol. 12, no. 9, pp. 2539–2561, 2011.

[19]
J. Benet, IPFS - content addressed, versioned, P2P file system, arXiv preprint arXiv: 1407.3561, 2014.
[20]

H. Yi, Machine learning method with applications in hardware security of post-quantum cryptography, J. Grid Comput., vol. 21, no. 2, p. 19, 2023.

[21]

A. Walker, T. Cerny, and E. Song, Open-source tools and benchmarks for code-clone detection, SIGAPP Appl. Comput. Rev., vol. 19, no. 4, pp. 28–39, 2020.

[22]
J. Svajlenko, J. F. Islam, I. Keivanloo, C. K. Roy, and M. M. Mia, Towards a big data curated benchmark of inter-project code clones, in Proc. IEEE Int. Conf. Software Maintenance and Evolution, Victoria, Canada, 2014, pp. 476–480.
[23]
V. Saini, F. Farmahinifarahani, Y. Lu, P. Baldi, and C. V. Lopes, Oreo: Detection of clones in the twilight zone, in Proc. 2018 26th ACM Joint Meeting on European Software Engineering Conf. and Symp. on the Foundations of Software Engineering, Lake Buena Vista, FL, USA, 2018, pp. 354–365.
Tsinghua Science and Technology
Pages 1157-1173
Cite this article:
Jin Y, Ling L. A Blockchain-Based Copyright Management Scheme for Open-Source Software and Hardware Designs. Tsinghua Science and Technology, 2025, 30(3): 1157-1173. https://doi.org/10.26599/TST.2023.9010112

801

Views

277

Downloads

0

Crossref

0

Web of Science

0

Scopus

0

CSCD

Altmetrics

Received: 18 July 2023
Revised: 27 September 2023
Accepted: 28 September 2023
Published: 08 July 2024
© The Author(s) 2025.

The articles published in this open access journal are distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/).

Return