计算机科学 ›› 2018, Vol. 45 ›› Issue (2): 57-62.doi: 10.11896/j.issn.1002-137X.2018.02.010

• 区块链技术 • 上一篇    下一篇

基于区块链技术的动态数据存储安全机制研究

乔蕊,董仕,魏强,王清贤   

  1. 解放军信息工程大学 郑州450001;数学工程与先进计算国家重点实验室 郑州450001;周口师范学院 河南 周口466001,周口师范学院 河南 周口466001,解放军信息工程大学 郑州450001;数学工程与先进计算国家重点实验室 郑州450001,解放军信息工程大学 郑州450001;数学工程与先进计算国家重点实验室 郑州450001
  • 出版日期:2018-02-15 发布日期:2018-11-13
  • 基金资助:
    本文受国家重点研发计划课题(2016YFB0800203),国家自然科学基金(U1504602),河南省科技攻关计划项目(172102210091),河南省知识产权局软科学研究项目(20170106023),河南省高校科技创新团队支持计划项目(17IRTSTHN009)资助

Blockchain Based Secure Storage Scheme of Dynamic Data

QIAO Rui, DONG Shi, WEI Qiang and WANG Qing-xian   

  • Online:2018-02-15 Published:2018-11-13

摘要: 为解决攻击者对动态数据的篡改、伪造等潜在安全问题,提出了一种基于区块链技术的动态数据安全存储方案。首先,给出了动态数据存储安全问题的数学模型;其次,分析了共识终端最大化自身收益的局部行为与保障动态数据存储系统安全性和有效性整体目标的一致性;再次,设计了适用于动态数据存储安全的共识机制、实例系统所有权状态转移函数和动态数据存储体系结构;最后,分析了系统随机状态模型下动态数据存储区块链的质量特性和生长特性。分析结果表明,在核准加入方式下,该方案能够有效杜绝攻击者对“动态数据账本”的非授权改动,有效地提高了动态数据的可信度。

关键词: 共识机制,区块链,动态数据,存储安全

Abstract: In order to solve the potential security problems such as tampering and forgery of dynamic data,this paper proposed a secure storage scheme of dynamic data based on blockchain.First,the mathematical model for the problems above was established.Then,the consistency between local behavior of consensus terminals maximizing their own benefits and the overall goals to ensure the system security and effectiveness was analyzed.Furthermore,the consensus mechanism which is suitable for secure storage of dynamic data,the ownership state transition function of instance system and the architecture for the dynamic data storage system were designed.Finally,quality and growth characteristics of the dynamic data storage blockchain were analyzed under stochastic state model.Results show that the scheme can preclude unauthorized changes of “dynamic data book” effectively,thus enhancing the credibility of the dynamic data of instance system.

Key words: Consensus mechanism,Blockchain,Dynamic data,Secure storage

[1] NING H S,XU Q Y.Research on Global Internet of Things’ Developments and it’s Lonstruction in China[J].Acta Electro-nica Sinica,2010,8(11):2590-2599.(in Chinese) 宁焕生,徐群玉.全球物联网发展及中国物联网建设若干思考[J].电子学报,2010,8(11):2590-2599.
[2] HOU J J,BAI Y.Research on the Shortage of Internet ofThings Standards——Take the Development of Key Technical Standards as an Example[J].Science & Technology Progress and Policy,2015,2(12):61-66.(in Chinese) 侯俊军,白杨.物联网标准供给不足问题研究——以关键技术标准发展为例[J].科技进步与对策,2015,2(12):61-66.
[3] WEN C X,LIANG L.Suggestions on Effective Application of Continuous Internal Audit[J].Enterprise Economy,2010,6(4):155-157.(in Chinese) 温彩秀,梁蕾.企业内部审计中有效应用持续审计的建议[J].企业经济,2010,6(4):155-157.
[4] FENG D G,ZHANG M,ZHANG Y,et al.Study on Cloud Computing Security[J].Journal of Software,2011,2(1):71-83.(in Chinese) 冯登国,张敏,张妍,等.云计算安全研究[J].软件学报,2011,22(1):71-83.
[5] SHAN D H,SHI Y C,ZHAO W T,et al.Segmented Fusion Fuzzy Clustering Algorithm for Cloud Data Security Storage[J].Computer Science,2017,44(5):166-169,188.(in Chinese) 单冬红,史永昌,赵伟艇,等.面向云数据安全存储的分段融合模糊聚类算法[J].计算机科学,2017,44(5):166-169,188.
[6] LIU T T.Research on Key Technologies of Data Securitytowards Cloud Computing[D].Zhengzhou:PLA Information Engineering University,2013.(in Chinese) 刘婷婷.面向云计算的数据安全保护关键技术研究[D].郑州:解放军信息工程大学,2013.
[7] HE M,CHEN G H,LIANG W H,et al.Cloud Data Storage Security and Privacy Protection Policies under IoT Environment[J].Computer Science,2012,39(5):62-65,90.(in Chinese) 何明,陈国华,梁文辉,等.物联网环境下云数据存储安全及隐私保护策略研究[J].计算机科学,2012,9(5):62-65,90.
[8] ZHANG Y Q,WANG X F,LIU X F,et al.Survey on Cloud Computing Security[J].Journal of Software,2016,7(6):1328-1348.(in Chinese) 张玉清,王晓菲,刘雪峰,等.云计算环境安全综述[J].软件学报,2016,7(6):1328-1348.
[9] LAI Y P,WU W F.The defense in-depth approach to the protection for browsing users against drive-by cache attacks[J].Security and Communication Networks,2015,8(7):1422-1430.
[10] ARCHER J.Top Threats to Cloud Computing V1.0[EB/OL].http://wenku.baidu.com/view/db3506ea81c758f5f61f67e5.html.
[11] YUAN Y,WANG F Y.Blockchain:The State of the Art and Future Trends[J].Acta Automatica Sinica,2016,2(4):481-494.(in Chinese) 袁勇,王飞跃.区块链技术发展现状与展望[J].自动化学报,2016,2(4):481-494.
[12] NAKAMOTO S.Bitcoin:a peer-to-peer electronic cash system[EB/OL].https://bitcoin.org /bitcoin.pdf,2008.
[13] FAN J,YI L T,SHU J W.Research on the technologies of Byzantine system[J].Journal of Software,2013,24(6):1346-1360.(in Chinese) 范捷,易乐天,舒继武.拜占庭系统技术研究综述[J].软件学报,2013,4(6):1346-1360.
[14] PASS R,SEEMAN L,SHELAT A.Analysis of the Blockchain Protocol in Asynchronous Networks[C]∥Advances in Crypto-logy-EUROCRYPT.Berlin:Springer,2017:643-673.
[15] GARAY J A,KIAYIAS A,LEONARDOS N.The Bitcoin Backbone Protocol:Analysis and Applications [C]∥Advances in Cryptology-EUROCRYPT.Berlin:Springer,2015:281-310.
[16] EYAL I,GENCDER A E,RENESSE R V.Bitcoin-NG:a scalable blockchain protocol[C]∥Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation.Berkeley:USENIX Association,2016:45-59.
[17] FANNING K,CENTERS D P.Blockchain and its coming impact on financial services[J].Journal of Corporate Accounting & Finance,2016,27(5):53-57.
[18] PINZN C,ROCHA C.Double-spend Attack Models with Time Advantange for Bitcoin[J].Electronic Notes in Theoretical Computer Science,2016,329(12):79-103.
[19] 杨宝华,陈昌.区块链原理、设计与应用[M].北京:机械工业出版社,2017:9-19.
[20] GRAMOLI V.From blockchain consensus back to Byzantineconsensus[J].Future Generation Computer Systems,2017,9:1-20.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] 雷丽晖,王静. 可能性测度下的LTL模型检测并行化研究[J]. 计算机科学, 2018, 45(4): 71 -75 .
[2] 孙启,金燕,何琨,徐凌轩. 用于求解混合车辆路径问题的混合进化算法[J]. 计算机科学, 2018, 45(4): 76 -82 .
[3] 张佳男,肖鸣宇. 带权混合支配问题的近似算法研究[J]. 计算机科学, 2018, 45(4): 83 -88 .
[4] 伍建辉,黄中祥,李武,吴健辉,彭鑫,张生. 城市道路建设时序决策的鲁棒优化[J]. 计算机科学, 2018, 45(4): 89 -93 .
[5] 史雯隽,武继刚,罗裕春. 针对移动云计算任务迁移的快速高效调度算法[J]. 计算机科学, 2018, 45(4): 94 -99 .
[6] 周燕萍,业巧林. 基于L1-范数距离的最小二乘对支持向量机[J]. 计算机科学, 2018, 45(4): 100 -105 .
[7] 刘博艺,唐湘滟,程杰仁. 基于多生长时期模板匹配的玉米螟识别方法[J]. 计算机科学, 2018, 45(4): 106 -111 .
[8] 耿海军,施新刚,王之梁,尹霞,尹少平. 基于有向无环图的互联网域内节能路由算法[J]. 计算机科学, 2018, 45(4): 112 -116 .
[9] 崔琼,李建华,王宏,南明莉. 基于节点修复的网络化指挥信息系统弹性分析模型[J]. 计算机科学, 2018, 45(4): 117 -121 .
[10] 王振朝,侯欢欢,连蕊. 抑制CMT中乱序程度的路径优化方案[J]. 计算机科学, 2018, 45(4): 122 -125 .