Computer Science ›› 2018, Vol. 45 ›› Issue (6A): 352-355.

• Information Security • Previous Articles     Next Articles

Security Incidents and Solutions of Blockchain Technology Application

WANG Jun-sheng1,2,LI Li-li1,2,YAN Yong3,ZHAO Wei4,XU Yu1,2   

  1. Beijing Huitong Financial Information Technology Co.,Ltd.,Beijing 100053,China1
    State Grid Electronic Commerce Co.,Ld.,Beijing 100032,China2
    State Grid Zhejiang Electric Power Co.,LTD.,Hangzhou 310014,China3
    Beijing Xinyuan Technology Co.,Ltd.,Beijing 100080,China4
  • Online:2018-06-20 Published:2018-08-03

Abstract: Blockchain technology has been widely used.It has many advantages,such as distributed storage,high redundant data,centering and so on.The safety of its application and regulatory issues has been paid attention to.Firstly,this paper collected and analyzed all kinds of blockchain security incidents,and the causes of the incident were classified,corresponding safety precautions were put forward.Secondly,the present situation of China blockchain supervision was analyzed.Referring to the international policy on blockchain supervision,the model for China blockchain monitoring situation was put forward.Finally,the technology development needs of blockchain were summarized in the pattern of supervision.

Key words: Blockchain, Distributed storage, Precautionary measures, Security incident

CLC Number: 

  • T-01
[1]谭磊,陈刚.区块链2.0[M].北京:电子工业出版社,2015.
[2]隐藏在数字货币身后的力量——浅析区块链技术应用场景[EB/OL].(2015-11-12).http://mingin.baijia.baidu.com/article/228350.
[3]RICHARD D R,GARETH O G.Rep on the block:anext gene- ration reputation system based on the blockchain[C]∥Procee-dings of the 10th International Conference for Internet Techno-logy and Secured Transactions (ICITST).London,Britain:IEEE,2015.
[4]GUY ZYSKIND G,NATHAN O,ALEX’ A S.Decentralizing privacy:using blockchain to protect personal data[C]∥Procee-dings of the Security and Privacy Workshops (SPW).San Jose,USA:IEEE,2015.
[5]赵赫,李晓风,占礼葵,等.基于区块链技术的采样机器人数据保护方法[J].华中科技大学学报,2015,43(S1):216-219.
[6]龚鸣.简单谈谈究竟什么是“区块链”技术[EB/OL].(2015-10-23).http://mt.sohu.com/20151023/n424005566.shtml.
[7]SWAN M.Blockchain thinking:the brain as a decentral-ized autonomous corporation [J].IEEE Technology and Society Magazine,2015,34(4):41-52.
[8]刘孝男,王永涛,白云波.区块链+时代,行业面临的机遇与挑战.中国信息安全,2017(8):100-103.
[9]ANONYMOUS.New kid on the blockchain [J].New Scientist,2015,225(3009):7.
[10]GODSIFF P.Bitcoin:bubble or blockchain [C]∥Proceedings of the 9th KES International Conference on Agent and Multi-Agent Systems:Technologies and Applications (KES-AMSTA).Sorrento,Italy:Springer,2015:191-203.
[11]谢辉,王健.区块链技术及其应用研究[J].信息网络安全,2016(9):192-195.
[12]袁勇,王飞跃.区块链技术发展现状与展望[J].自动化学报,2016,42(4):481-494.
[13]邵宇.区块链技术对金融监管的挑战[J].上海政法学院学报(法治论丛),2017,32(4):30-40.
[14]黄锐.金融区块链技术的监管研究.学术论坛,2016,39(10):53-59.
[15]赵田雨.区块链技术的监管困境[J].经济师,2017(3):26-27.
[16]龚鸣.区块链社会-解码区块链全球应用于投资方案[M].北京:中信出版集团,2016(3):14-16.
[17]杨东.保持动态监管体制[J].中国经济信息,2016(5):9-9.
[18]杨东.互联网金融的法律规制——基于信息工具的视角[J].中国社会科学,2015(4):107-126.
[19]杨东.论金融领域的颠覆创新与监管重构[J].人民论坛·学术前沿,2016(11):30-39.
[20]SAMUL A.Consumer Financial Servicesin Britain:New Ap- proaches to Dispute Resolution and Avoidance[J].European Business Organization Law Review,2002,3(3):649-694.
[21]朱岩,甘国华,邓迪,等.区块链关键技术中的安全性研究[J].信息安全研究,2016,2(12):1090-1097.
[1] WANG Zi-kai, ZHU Jian, ZHANG Bo-jun, HU Kai. Research and Implementation of Parallel Method in Blockchain and Smart Contract [J]. Computer Science, 2022, 49(9): 312-317.
[2] FU Li-yu, LU Ge-hao, WU Yi-ming, LUO Ya-ling. Overview of Research and Development of Blockchain Technology [J]. Computer Science, 2022, 49(6A): 447-461.
[3] GAO Jian-bo, ZHANG Jia-shuo, LI Qing-shan, CHEN Zhong. RegLang:A Smart Contract Programming Language for Regulation [J]. Computer Science, 2022, 49(6A): 462-468.
[4] MAO Dian-hui, HUANG Hui-yu, ZHAO Shuang. Study on Automatic Synthetic News Detection Method Complying with Regulatory Compliance [J]. Computer Science, 2022, 49(6A): 523-530.
[5] ZHOU Hang, JIANG He, ZHAO Yan, XIE Xiang-peng. Study on Optimal Scheduling of Power Blockchain System for Consensus Transaction ofEach Unit [J]. Computer Science, 2022, 49(6A): 771-776.
[6] LI Bo, XIANG Hai-yun, ZHANG Yu-xiang, LIAO Hao-de. Application Research of PBFT Optimization Algorithm for Food Traceability Scenarios [J]. Computer Science, 2022, 49(6A): 723-728.
[7] WANG Si-ming, TAN Bei-hai, YU Rong. Blockchain Sharding and Incentive Mechanism for 6G Dependable Intelligence [J]. Computer Science, 2022, 49(6): 32-38.
[8] SUN Hao, MAO Han-yu, ZHANG Yan-feng, YU Ge, XU Shi-cheng, HE Guang-yu. Development and Application of Blockchain Cross-chain Technology [J]. Computer Science, 2022, 49(5): 287-295.
[9] YANG Zhen, HUANG Song, ZHENG Chang-you. Study on Crowdsourced Testing Intellectual Property Protection Technology Based on Blockchain and Improved CP-ABE [J]. Computer Science, 2022, 49(5): 325-332.
[10] REN Chang, ZHAO Hong, JIANG Hua. Quantum Secured-Byzantine Fault Tolerance Blockchain Consensus Mechanism [J]. Computer Science, 2022, 49(5): 333-340.
[11] FENG Liao-liao, DING Yan, LIU Kun-lin, MA Ke-lin, CHANG Jun-sheng. Research Advance on BFT Consensus Algorithms [J]. Computer Science, 2022, 49(4): 329-339.
[12] WANG Xin, ZHOU Ze-bao, YU Yun, CHEN Yu-xu, REN Hao-wen, JIANG Yi-bo, SUN Ling-yun. Reliable Incentive Mechanism for Federated Learning of Electric Metering Data [J]. Computer Science, 2022, 49(3): 31-38.
[13] ZHANG Ying-li, MA Jia-li, LIU Zi-ang, LIU Xin, ZHOU Rui. Overview of Vulnerability Detection Methods for Ethereum Solidity Smart Contracts [J]. Computer Science, 2022, 49(3): 52-61.
[14] YANG Xin-yu, PENG Chang-gen, YANG Hui, DING Hong-fa. Rational PBFT Consensus Algorithm with Evolutionary Game [J]. Computer Science, 2022, 49(3): 360-370.
[15] FAN Jia-xing, WANG Zhi-wei. Hierarchical Anonymous Voting Scheme Based on Threshold Ring Signature [J]. Computer Science, 2022, 49(1): 321-327.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!