计算机科学 ›› 2021, Vol. 48 ›› Issue (11): 36-45.doi: 10.11896/jsjkx.201000002
廉文娟1, 赵朵朵1, 范修斌1,2, 耿玉年2, 范新桐3
LIAN Wen-juan1, ZHAO Duo-duo1, FAN Xiu-bin1,2, GENG Yu-nian2, FAN Xin-tong3
摘要: 5G时代的到来给新兴信息产业的信息安全问题带来了新的挑战,现有的安全技术已不能满足5G时代下特定场景对毫秒级认证、可信认证等的相关需求。因此,以CFL技术为信息安全原点技术,提出了CFL_BLP_BC模型。CFL_BLP_BC模型在局部修改原BLP模型安全公理的基础上,结合区块链技术对该模型的基本元素、安全公理和状态转换规则进行了形式化描述。该模型不仅支持信息安全五性,而且具有毫秒级、指令级、实证制等信息安全属性。该模型支持内生安全、先天免疫、主动防御技术,可为当今网络空间新兴信息产业提供重要的理论指标。
中图分类号:
[1]PLOUTON V.Grammatikos,Panayotis G.Cottis.IMT Vision-Framework and overall objectives of the future development of IMT for 2020 and beyond[S].ITU-R Recommendation M.2083-0,2015. [2]View on 5G architecture Version 3.0[M/OL].The 5G Infra-structure Public Private Partnership Architecture Working Group,2019:18-19.https://5g-ppp.eu/wp-content/uploads/2019/07/5G-PPP-5G-Architecture-White-Paper_v3.0_PublicConsultation.pdf. [3]ZHANG S,WANG Y,ZHOU W.Towards Secure 5G Net-works:A Survey[J].Computer Networks,2019,162:106871. [4]SCHNEIDER P,HORN G.Towards 5G Security[C]//Trustcom/bigdatase/ispa.IEEE,2015:1165-1170. [5]SORENSEN L T,KHAJURIA S,SKOUBY K E.5G Visions ofUser Privacy[J].IEEE Vehicular Technology Conference,2015,81(5):1-4. [6]KUTSCHER D.It's the network:Towards better security andtransport performance in 5G[C]//2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).San Francisco,CA,2016:656-661. [7]FAN X B,LIU X,WANG X L,et al.Identification-basedauthentication system CFL-netspace authentication and its examples[M].Beijing:Beijing University of Posts and Teleco-munications Press,2019:33-69. [8]FAN W Z,FAN Y N,HE Z Z,et al.CFL_BLP model[J].Journal of Taishan University,2018,40(6):60-66. [9]DU C L,LIU J M,FAN X B,et al.CFL is Statistical Zero-Knowledge Proof System[J].Journal of Information Security Research,2016,2(7):621-627. [10]QIN H B,PAN Y J,FAN X B,et al.Analysis on CFL Provable Security[J].Journal of Information Security Research,2016,2(7):589-599. [11]FAN X B.New generation of identity authentication technology CFL[J].Journal of Information Security Research,2016,2(7):587-588. [12]LI C C,JI S W,FAN X B,et al.The Overview of Authentication Systems[J].Journal of Information Security Research,2016,2(7):649-659. [13]DU C L,FAN X B.CFL Authentication System and Its Applications in the Blockchain[J].Journal of Information Security Research,2017,3(3):220-226. [14]BELL D E,LAPADULA L J.Secure Computer Systems:AMathematical Model[J].The MITRE Corporation,1973,2:239-263. [15]NOFER M,GOMBER P,HINZ O,et al.Blockchain[J].Busi-ness & Information Systems Engineering,2017,59(3):183-187. [16]ZHENG Z B,XIE S A.Blockchain challenges and opportunities:a survey[J].International Journal of Web and Grid Services,2018,14(4):352-375. [17]WANG Y,SHEN Y,WANG H,et al.MtMR:Ensuring MapReduce Computation Integrity with Merkle Tree-based Verifications[J].IEEE Transactions on Big Data,2016,4(3):418-431. [18]YUAN Y,WANG F Y.Blockchain:The State of the Art and Future Trends[J].Acta Automatica Sinica,2016,42(4):481-494. [19]LI Q,TAN Y,YU X,et al.Resear on Blockchain Authentication Based on CFL[C]//Proceedings of the 6th China command and Control Conference (Volume 2).2018:587-589. [20]SHU Z X,LI T F,YU X,et al.Research on cfl-based blockchain system authentication Mechan-ism[J].Application Research of Computers,2020,38(2):1-10. [21]LI Q,SHU Z X,YU X,et al.Authentication Mechanism inBlockchain Systems[J].Journal of Command and Control,2019(1):1-17. [22]YAN S J,MIN L Q,FAN X B.Researchon the knowledge security[J].Journal on Communications,2014,35(Z2):204-211. [23]YAN S J,FAN X B,CHEN Y G,et al.Construction of Narrow Security Knowledge Base[J].Information Security and Communications Privac,2015(6):99-103. [24]Ten academicians unveil BCS 2019 Qian xin first proposes the concept of “SECURITY:BUILT-IN DNA”[J].China Information Security,2019(9):102. [25]FERNANDES D A B,FREIRE M M,FAZENDEIRO P A P,et al.Applications of artificial immune systems to computer security:A survey[J].Journal of Information Security & Applications,2017,35:138-159. [26]ZHANG B.Research on key Technologies of Interactive and Attack Proactive Defense in Edge-computing Network [D].Nanjing:Guniversity of Science & Technology,2019. [27]LUO Y B.Research on Proactive Defense of Computer Network[D].Hunan:National University of Defense Technology,2017. [28]IFTEKHAR A,TAHMIN N,SHAHINA S U,et al.Protection of Sensitive Data in Zero Trust Model[C]//Proceedings of the International Conference on Computing Advancements (ICCA 2020).Association for Computing Machinery,New York,NY,USA,2020,63:1-5. [29]ZHANG H G,JIA C F,LIN J Q.Foreword of trusted computing for autonomous security and controllability[J].Journal of Software,2019,30(8):2227-2228. |
[1] | 王子凯, 朱健, 张伯钧, 胡凯. 区块链与智能合约并行方法研究与实现 Research and Implementation of Parallel Method in Blockchain and Smart Contract 计算机科学, 2022, 49(9): 312-317. https://doi.org/10.11896/jsjkx.210800102 |
[2] | 周航, 姜河, 赵琰, 解相朋. 适用于各单元共识交易的电力区块链系统优化调度研究 Study on Optimal Scheduling of Power Blockchain System for Consensus Transaction ofEach Unit 计算机科学, 2022, 49(6A): 771-776. https://doi.org/10.11896/jsjkx.210600241 |
[3] | 李博, 向海昀, 张宇翔, 廖浩德. 面向食品溯源场景的PBFT优化算法应用研究 Application Research of PBFT Optimization Algorithm for Food Traceability Scenarios 计算机科学, 2022, 49(6A): 723-728. https://doi.org/10.11896/jsjkx.210800018 |
[4] | 傅丽玉, 陆歌皓, 吴义明, 罗娅玲. 区块链技术的研究及其发展综述 Overview of Research and Development of Blockchain Technology 计算机科学, 2022, 49(6A): 447-461. https://doi.org/10.11896/jsjkx.210600214 |
[5] | 高健博, 张家硕, 李青山, 陈钟. RegLang:一种面向监管的智能合约编程语言 RegLang:A Smart Contract Programming Language for Regulation 计算机科学, 2022, 49(6A): 462-468. https://doi.org/10.11896/jsjkx.210700016 |
[6] | 毛典辉, 黄晖煜, 赵爽. 符合监管合规性的自动合成新闻检测方法研究 Study on Automatic Synthetic News Detection Method Complying with Regulatory Compliance 计算机科学, 2022, 49(6A): 523-530. https://doi.org/10.11896/jsjkx.210300083 |
[7] | 王思明, 谭北海, 余荣. 面向6G可信可靠智能的区块链分片与激励机制 Blockchain Sharding and Incentive Mechanism for 6G Dependable Intelligence 计算机科学, 2022, 49(6): 32-38. https://doi.org/10.11896/jsjkx.220400004 |
[8] | 孙浩, 毛瀚宇, 张岩峰, 于戈, 徐石成, 何光宇. 区块链跨链技术发展及应用 Development and Application of Blockchain Cross-chain Technology 计算机科学, 2022, 49(5): 287-295. https://doi.org/10.11896/jsjkx.210800132 |
[9] | 阳真, 黄松, 郑长友. 基于区块链与改进CP-ABE的众测知识产权保护技术研究 Study on Crowdsourced Testing Intellectual Property Protection Technology Based on Blockchain and Improved CP-ABE 计算机科学, 2022, 49(5): 325-332. https://doi.org/10.11896/jsjkx.210900075 |
[10] | 任畅, 赵洪, 蒋华. 一种量子安全拜占庭容错共识机制 Quantum Secured-Byzantine Fault Tolerance Blockchain Consensus Mechanism 计算机科学, 2022, 49(5): 333-340. https://doi.org/10.11896/jsjkx.210400154 |
[11] | 冯了了, 丁滟, 刘坤林, 马科林, 常俊胜. 区块链BFT共识算法研究进展 Research Advance on BFT Consensus Algorithms 计算机科学, 2022, 49(4): 329-339. https://doi.org/10.11896/jsjkx.210700011 |
[12] | 王鑫, 周泽宝, 余芸, 陈禹旭, 任昊文, 蒋一波, 孙凌云. 一种面向电能量数据的联邦学习可靠性激励机制 Reliable Incentive Mechanism for Federated Learning of Electric Metering Data 计算机科学, 2022, 49(3): 31-38. https://doi.org/10.11896/jsjkx.210700195 |
[13] | 张潆藜, 马佳利, 刘子昂, 刘新, 周睿. 以太坊Solidity智能合约漏洞检测方法综述 Overview of Vulnerability Detection Methods for Ethereum Solidity Smart Contracts 计算机科学, 2022, 49(3): 52-61. https://doi.org/10.11896/jsjkx.210700004 |
[14] | 杨昕宇, 彭长根, 杨辉, 丁红发. 基于演化博弈的理性拜占庭容错共识算法 Rational PBFT Consensus Algorithm with Evolutionary Game 计算机科学, 2022, 49(3): 360-370. https://doi.org/10.11896/jsjkx.210900110 |
[15] | 范家幸, 王志伟. 基于门限环签名的分级匿名表决方案 Hierarchical Anonymous Voting Scheme Based on Threshold Ring Signature 计算机科学, 2022, 49(1): 321-327. https://doi.org/10.11896/jsjkx.201000032 |
|