计算机科学 ›› 2024, Vol. 51 ›› Issue (6A): 230400056-5.doi: 10.11896/jsjkx.230400056

• 信息安全 • 上一篇    下一篇

基于标识与区块链融合的数据安全框架研究

朱军1, 张国印1, 万静静2   

  1. 1 哈尔滨工程大学计算机科学与技术学院 哈尔滨 150001
    2 江苏杰瑞信息科技有限公司 江苏 连云港 222042
  • 发布日期:2024-06-06
  • 通讯作者: 朱军(zhujun15121869283@163.com)

Study on Data Security Framework Based on Identity and Blockchain Integration

ZHU Jun1, ZHANG Guoyin1, WAN Jingjing2   

  1. 1 School of Computer Science and Technology,Harbin Engineering University,Harbin 150001,China
    2 Jiangsu JARI Information Technology Co.,LTD,Lianyungang,Jiangsu 222042,China
  • Published:2024-06-06
  • About author:ZHU Jun,born in 1987,Ph.D candidate.His main research interests include industrial network security,blockchain,identity analysis,etc.

摘要: 工业互联网标识解析系统已经成为支撑产业数字化转型的重要新型基础设施。结合目前数据的安全性问题,通过对标识解析架构的梳理,在区块链分布式拓扑结构及其信息安全特性的基础上提出标识与区块链融合的数据安全框架,构建协同模式的安全监管融合的数据安全框架,重点介绍了数据的收集、存储、传输、共享、确权和交易的全流程安全,然后从保密性、完整性、可用性、可追溯性等维度提出标识数据监测的安全指数体系。最后提出数据安全的保护要从固定位置数据的资产保护转变为业务系统数据的加工保护,从关注攻击行为转变为数据生命周期,从防漏洞、补漏洞转变为理数据、管数据的思路上来。

关键词: 标识解析, 区块链, 数据融合, 安全指数

Abstract: Industrial Internet sign analysis system has become an important new infrastructure to support industrial digital transformation.Combined with the current data security issues,this paper combs the identity parsing architecture and proposes the data security framework of identity and blockchain integration based on the distributed topology of blockchain and its information security features.The collaborative data security framework is the data security framework of supervision amount integration.This paper focuses on the whole process security of data collection,storage,transmission,sharing,right confirmation and transaction.Finally,from the dimensions of confidentiality,integrity,availability,traceability and so on,a security index system of identification data monitoring is proposed.Finally,it is proposed that the protection of data security should be changed from the asset protection of fixed location data to the processing protection of business system data,from the concern of attack behavior to the life cycle of data,and from the idea of preventing and filling loopholes to data management and data management.

Key words: Identification parsing, Blockchain, Data fusion, Safety index

中图分类号: 

  • TP309
[1]CHI C,MA B L,TIAN J.Research on security risk AnalysisModel of Industrial Internet Identity Analysis[J].Information Communication Technology and Policy,2020(10):23-27.
[2]LI Z P,LIU D P,ZHANG B,et al.Identity parsing technology based on blockchain[J].Network Security Technology and Application,2023(2):6-8.
[3]BAI Y M,DENG X F.A safe storage and sharing model of medi-cal data integrating blockchain and cloud storage[J].Journal of Jiaozuo University,2023,37(1):75-79.
[4]ZHAO Y X,ZHAO Q,HUANG C,et al.Marine data security sharing system based on blockchain[J].Marine Development and Management,2023,40(1):37-43.
[5]CHEN A Q,XIAO Z H,PAN X Y.Analysis of Blockchain security Technology based on data Trusted Sharing[J].Electronic Technology,2023,52(1):280-281.
[6]CUI L J.Security Protection of accounting information Big Data under blockchain technology[J].Marketing,2022(24):105-107.
[7]ZHAN B.Design of Network privacy data security protectionModel based on blockchain[J].Information and Computer(Theoretical Edition),2022,34(24):219-221.
[8]LI Z L.Research on Cloud accounting data Security under theapplication of blockchain encryption technology[J].Business News,2022(27):32-35.
[9]XU J P,HAN J Q,ZHANG X,et al.Research on Traceability of grain and oil Quality Safety based on trusted blockchain and trusted Label[J].Food Science,2023,44(3):48-59.
[10]WANG B.Secure storage and analysis of medical device identification based on blockchain technology[D].Chongqing:Chongqing University of Posts and Telecommunications,2022.
[11]CUI Y,HE B W,SONG X,et al.Research on IdentificationAnalysis Technology of Aerospace Industry for Industrial Internet[C]//Proceedings of the 33rd China Simulation Conference.2021:683-694.
[12]SU X R,XU X F,GUO W T.Integrated application of identity parsing and blockchain technology in Supply chain management[J].Science and Technology Industries,2021,21(9):283-289.
[13]YU J Y.Design and implementation of Identity Resolution Re-gistration Authentication and Trust Resolution Mechanism for Industrial Internet[D].Beijing:Beijing University of Posts and Telecommunications,2021
[14]ZENG S Q.Design and implementation of Industrial Internet Sign Parsing System based on Blockchain[D].Beijing:Beijing University of Posts and Telecommunications,2021.
[15]ZHAO H R.Design and implementation of Industrial Internet sign parsing System Performance optimization Scheme based on blockchain[D].Beijing:Beijing University of Posts and Telecommunications,2021.
[16]WANG L J,LIU J,WANG S,et al.Research on the application of Industrial Internet logo public service based on blockchain[J].Frontiers of Data and Computing Development,2021,3(1):60-73.
[17]LIU X J,CAO T C,XIA Y J.Research on Efficient Cross-domain Data Security Sharing of Internet of Vehicles based on Blockchain architecture[J/OL].Journal of Communications,1-12.
[18]FAN Y.Distributed Logo Design and Analysis of Internet ofThings based on blockchain[D].Beijing:Beijing University of Posts and Telecommunications,2020.
[19]WANG S,YAN M,LIU J,et al.Innovative application mode of scientific data identification technology based on blockchain[J].Frontiers of Data and Computing Development,2019,1(6):62-74.
[20]WANG Y M,LI H,WANG H,et al.Research of Blockchain in Industrial Internet logo data management strategy[J].Compu-ter Engineering and Applications,20,56(7):1-7.
[21]ZHANG D X.Research on heterogeneous identity equivalence Analysis Technology of Internet of Things based on Blockchain[D].Chongqing:Chongqing University of Posts and Telecommunications,2018.
[22]LIANG X.Design and Implementation of a Security Module for Service Identification parsing System[D].Beijing:Beijing Jiaotong University,2009.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!