计算机科学 ›› 2019, Vol. 46 ›› Issue (4): 129-136.doi: 10.11896/j.issn.1002-137X.2019.04.021

• 信息安全 • 上一篇    下一篇

基于Client Puzzle的公有链接入控制模型

巫岱玥, 李强, 余祥, 黄海军   

  1. 国防科技大学 合肥230037
  • 收稿日期:2018-03-05 出版日期:2019-04-15 发布日期:2019-04-23
  • 通讯作者: 李 强(1962-),男,教授,硕士生导师,主要研究方向为区块链、软件工程、信息安全,E-mail:lychfeei@163.com(通信作者)
  • 作者简介:巫岱玥(1994-),男,硕士生,主要研究方向为区块链;余 祥(1986-),男,硕士,讲师,主要研究方向为信息安全;黄海军(1975-),男,博士,讲师,主要研究方向为信息安全。
  • 基金资助:
    本文受国防科技大学科研基金项目(KYJ2017J351)资助。

Client Puzzle Based Access Control Model in Public Blockchain

WU Dai-yue, LI Qiang, YU Xiang, HUANG Hai-jun   

  1. National University of Defense Technology,Hefei 230037,China
  • Received:2018-03-05 Online:2019-04-15 Published:2019-04-23

摘要: 公有链无集中控制节点、去中心化和允许任意节点加入的特点使其拥有高效、低成本和高数据安全性的优势,但由于其允许任意节点接入,因此将增加公有链网络的脆弱性。基于Client Puzzle,提出一种节点接入控制模型CPACM(Client Puzzle based Access Control Model),使新节点接入公有链前利用算力进行工作量证明,完成工作量证明后才可接入公有链。该模型在维持公有链去中心化的同时,增加了接入控制。实验证明,该模型在不影响诚实节点加入的情况下,能以较高成功率限制低诚意节点和低算力节点的加入,并且能防止节点间的伙同,防范了恶意行为,提高了公有链网络的安全性。

关键词: 工作量证明, 公有链, 计算谜题, 接入控制, 区块链

Abstract: Public blockchain characterizes non-centralization and decentration and allows any node to join,and thus possesses the advantages of high efficiency,low cost and high data security.However,that it allows any node to join increases the vulnerability of blockchain network.This paper proposed a Client Puzzle based access control model named CPACM.In this model,new nodes have to make use of computing power to conduct proof of work before joining the network.Only the successful nodes could join the public blockchain network.This model adopts access control when keeping public blockchain decentralizing.Experimental results show that the proposed model can restrict the low computing-power nodes and unfaithful nodes to access with high probability when not affecting the faithful nodes to access and prevent nodes collusion,thus preventing the malicious behaviors and improving the security of public blockchain.

Key words: Access control, Blockchain, Client Puzzle, Proof of work, Public blockchain

中图分类号: 

  • TP309
[1]LI X,JIANG P,CHEN T,et al.A Survey on the security of blockchain systems[J].Future Generation Computer Systems,2017,9(5):147-154.
[2]BABAIOFF M,DOBZINSKI S,OREN S,et al.On Bitcoin and red balloons[J].Acm Sigecom Exchanges,2011,10(3):5-9.
[3]Hyper Ledger.Hyper Ledger architecture working group paper[EB/OL].[2017-11-10].https://hyperledeger.org/.
[4]HUANG B,LIU Z,CHEN J,et al.Behavior pattern clustering in blockchain networks[J].Multimedia Tools & Applications,2017,76(19):1-12.
[5]CHEN L,MORRISSEY P,SMART N P,et al.Security Notions and Generic Constructions for Client Puzzles[C]∥International Conference on the Theory and Application of Cryptology and Information Security:Advances in Cryptology.Springer-Verlag,2009:505-523.
[6]STEBILA D,KUPPUSAMY L,RANGASAMY J,et al.Stronger Difficulty Notions for Client Puzzles and Denial-of-Service-Resistant Protocols[M]∥Topics in Cryptology- CT-RSA 2011.2011:284-301.
[7]CHEN R C,GUO W J,TANG L Y,et al.Adaptive Client Puzzle Scheme Against Denial-of-Service Attacks[J].Journal of Software,2009,20(9):2558-2573.
[8]NAKAMOTO S.Bitcoin:A peer-to-peer electronic cash system[OL].http://bitcoin.org/bitcoin.pdf.
[9]WANG Z Y,LI B,ZHANG H G.Research on Security of Hash Funtions[J].Computer Engineering and Applications,2005,41(12):18-19.(in Chinese) 王张宜,李波,张焕国.Hash函数的安全性研究[J].计算机工程与应用,2005,41(12):18-19.
[10]ZHANG Z X,DU Y J,LI B,et al.Self-defence model of SIP proxy server for against Dos attack[J].Journal on Communications,2009,30(4):93-99.(in Chinese) 张兆心,杜跃进,李斌,等.SIP代理服务器抗拒绝服务攻击自防御模型[J].通信学报,2009,30(4):93-99.
[11]ZHU L H,GAO F,SHEN M,et al.Survey on Privacy Preserving Techniques for Blockchain Technology[J].Journal of Computer Research and Development,2017,54(10):2170-2186.(in Chinese) 祝烈煌,高峰,沈蒙,等.区块链隐私保护研究综述[J].计算机研究与发展,2017,54(10):2170-2186.
[12]LIU M D,SHI Y J.Remote Attestation Model Based on Blockchain[J].Computer Science,2018,45(2):48-52.(in Chinese) 刘明达,拾以娟.基于区块链的远程证明模型[J].计算机科学,2018,45(2):48-52.
[13]Underwood S.Blockchain beyond bitcoin[M].ACM,2016.
[14]LI W,SFORZIN A,FEDOROV S,et al.Towards Scalable and Private Industrial Blockchains[C]∥ACM Workshop on Blockchain,Cryptocurrencies and Contracts.ACM,2017:9-14.
[15]HE P,YU G,ZHANG Y F,et al.Survey on Blockchain Technology and Its Application Prospect[J].Computer Science,2017,44(4):1-7.(in Chinese) 何蒲,于戈,张岩峰,等.区块链技术与应用前瞻综述[J].计算机科学,2017,44(4):1-7.
[16]YUAN Y,WANG F Y.Blockchain:The State of the Art and Future Trends[J].Acta Automatica Sinica,2016,42(4):481-494.(in Chinese) 袁勇,王飞跃.区块链技术发展现状与展望[J].自动化学报,2016,42(4):481-494.
[1] 王子凯, 朱健, 张伯钧, 胡凯.
区块链与智能合约并行方法研究与实现
Research and Implementation of Parallel Method in Blockchain and Smart Contract
计算机科学, 2022, 49(9): 312-317. https://doi.org/10.11896/jsjkx.210800102
[2] 傅丽玉, 陆歌皓, 吴义明, 罗娅玲.
区块链技术的研究及其发展综述
Overview of Research and Development of Blockchain Technology
计算机科学, 2022, 49(6A): 447-461. https://doi.org/10.11896/jsjkx.210600214
[3] 高健博, 张家硕, 李青山, 陈钟.
RegLang:一种面向监管的智能合约编程语言
RegLang:A Smart Contract Programming Language for Regulation
计算机科学, 2022, 49(6A): 462-468. https://doi.org/10.11896/jsjkx.210700016
[4] 毛典辉, 黄晖煜, 赵爽.
符合监管合规性的自动合成新闻检测方法研究
Study on Automatic Synthetic News Detection Method Complying with Regulatory Compliance
计算机科学, 2022, 49(6A): 523-530. https://doi.org/10.11896/jsjkx.210300083
[5] 周航, 姜河, 赵琰, 解相朋.
适用于各单元共识交易的电力区块链系统优化调度研究
Study on Optimal Scheduling of Power Blockchain System for Consensus Transaction ofEach Unit
计算机科学, 2022, 49(6A): 771-776. https://doi.org/10.11896/jsjkx.210600241
[6] 李博, 向海昀, 张宇翔, 廖浩德.
面向食品溯源场景的PBFT优化算法应用研究
Application Research of PBFT Optimization Algorithm for Food Traceability Scenarios
计算机科学, 2022, 49(6A): 723-728. https://doi.org/10.11896/jsjkx.210800018
[7] 王思明, 谭北海, 余荣.
面向6G可信可靠智能的区块链分片与激励机制
Blockchain Sharding and Incentive Mechanism for 6G Dependable Intelligence
计算机科学, 2022, 49(6): 32-38. https://doi.org/10.11896/jsjkx.220400004
[8] 孙浩, 毛瀚宇, 张岩峰, 于戈, 徐石成, 何光宇.
区块链跨链技术发展及应用
Development and Application of Blockchain Cross-chain Technology
计算机科学, 2022, 49(5): 287-295. https://doi.org/10.11896/jsjkx.210800132
[9] 阳真, 黄松, 郑长友.
基于区块链与改进CP-ABE的众测知识产权保护技术研究
Study on Crowdsourced Testing Intellectual Property Protection Technology Based on Blockchain and Improved CP-ABE
计算机科学, 2022, 49(5): 325-332. https://doi.org/10.11896/jsjkx.210900075
[10] 任畅, 赵洪, 蒋华.
一种量子安全拜占庭容错共识机制
Quantum Secured-Byzantine Fault Tolerance Blockchain Consensus Mechanism
计算机科学, 2022, 49(5): 333-340. https://doi.org/10.11896/jsjkx.210400154
[11] 冯了了, 丁滟, 刘坤林, 马科林, 常俊胜.
区块链BFT共识算法研究进展
Research Advance on BFT Consensus Algorithms
计算机科学, 2022, 49(4): 329-339. https://doi.org/10.11896/jsjkx.210700011
[12] 杨昕宇, 彭长根, 杨辉, 丁红发.
基于演化博弈的理性拜占庭容错共识算法
Rational PBFT Consensus Algorithm with Evolutionary Game
计算机科学, 2022, 49(3): 360-370. https://doi.org/10.11896/jsjkx.210900110
[13] 王鑫, 周泽宝, 余芸, 陈禹旭, 任昊文, 蒋一波, 孙凌云.
一种面向电能量数据的联邦学习可靠性激励机制
Reliable Incentive Mechanism for Federated Learning of Electric Metering Data
计算机科学, 2022, 49(3): 31-38. https://doi.org/10.11896/jsjkx.210700195
[14] 张潆藜, 马佳利, 刘子昂, 刘新, 周睿.
以太坊Solidity智能合约漏洞检测方法综述
Overview of Vulnerability Detection Methods for Ethereum Solidity Smart Contracts
计算机科学, 2022, 49(3): 52-61. https://doi.org/10.11896/jsjkx.210700004
[15] 范家幸, 王志伟.
基于门限环签名的分级匿名表决方案
Hierarchical Anonymous Voting Scheme Based on Threshold Ring Signature
计算机科学, 2022, 49(1): 321-327. https://doi.org/10.11896/jsjkx.201000032
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!