Computer Science ›› 2018, Vol. 45 ›› Issue (2): 57-62.doi: 10.11896/j.issn.1002-137X.2018.02.010

Previous Articles     Next Articles

Blockchain Based Secure Storage Scheme of Dynamic Data

QIAO Rui, DONG Shi, WEI Qiang and WANG Qing-xian   

  • Online:2018-02-15 Published:2018-11-13

Abstract: In order to solve the potential security problems such as tampering and forgery of dynamic data,this paper proposed a secure storage scheme of dynamic data based on blockchain.First,the mathematical model for the problems above was established.Then,the consistency between local behavior of consensus terminals maximizing their own benefits and the overall goals to ensure the system security and effectiveness was analyzed.Furthermore,the consensus mechanism which is suitable for secure storage of dynamic data,the ownership state transition function of instance system and the architecture for the dynamic data storage system were designed.Finally,quality and growth characteristics of the dynamic data storage blockchain were analyzed under stochastic state model.Results show that the scheme can preclude unauthorized changes of “dynamic data book” effectively,thus enhancing the credibility of the dynamic data of instance system.

Key words: Consensus mechanism,Blockchain,Dynamic data,Secure storage

[1] NING H S,XU Q Y.Research on Global Internet of Things’ Developments and it’s Lonstruction in China[J].Acta Electro-nica Sinica,2010,8(11):2590-2599.(in Chinese) 宁焕生,徐群玉.全球物联网发展及中国物联网建设若干思考[J].电子学报,2010,8(11):2590-2599.
[2] HOU J J,BAI Y.Research on the Shortage of Internet ofThings Standards——Take the Development of Key Technical Standards as an Example[J].Science & Technology Progress and Policy,2015,2(12):61-66.(in Chinese) 侯俊军,白杨.物联网标准供给不足问题研究——以关键技术标准发展为例[J].科技进步与对策,2015,2(12):61-66.
[3] WEN C X,LIANG L.Suggestions on Effective Application of Continuous Internal Audit[J].Enterprise Economy,2010,6(4):155-157.(in Chinese) 温彩秀,梁蕾.企业内部审计中有效应用持续审计的建议[J].企业经济,2010,6(4):155-157.
[4] FENG D G,ZHANG M,ZHANG Y,et al.Study on Cloud Computing Security[J].Journal of Software,2011,2(1):71-83.(in Chinese) 冯登国,张敏,张妍,等.云计算安全研究[J].软件学报,2011,22(1):71-83.
[5] SHAN D H,SHI Y C,ZHAO W T,et al.Segmented Fusion Fuzzy Clustering Algorithm for Cloud Data Security Storage[J].Computer Science,2017,44(5):166-169,188.(in Chinese) 单冬红,史永昌,赵伟艇,等.面向云数据安全存储的分段融合模糊聚类算法[J].计算机科学,2017,44(5):166-169,188.
[6] LIU T T.Research on Key Technologies of Data Securitytowards Cloud Computing[D].Zhengzhou:PLA Information Engineering University,2013.(in Chinese) 刘婷婷.面向云计算的数据安全保护关键技术研究[D].郑州:解放军信息工程大学,2013.
[7] HE M,CHEN G H,LIANG W H,et al.Cloud Data Storage Security and Privacy Protection Policies under IoT Environment[J].Computer Science,2012,39(5):62-65,90.(in Chinese) 何明,陈国华,梁文辉,等.物联网环境下云数据存储安全及隐私保护策略研究[J].计算机科学,2012,9(5):62-65,90.
[8] ZHANG Y Q,WANG X F,LIU X F,et al.Survey on Cloud Computing Security[J].Journal of Software,2016,7(6):1328-1348.(in Chinese) 张玉清,王晓菲,刘雪峰,等.云计算环境安全综述[J].软件学报,2016,7(6):1328-1348.
[9] LAI Y P,WU W F.The defense in-depth approach to the protection for browsing users against drive-by cache attacks[J].Security and Communication Networks,2015,8(7):1422-1430.
[10] ARCHER J.Top Threats to Cloud Computing V1.0[EB/OL].
[11] YUAN Y,WANG F Y.Blockchain:The State of the Art and Future Trends[J].Acta Automatica Sinica,2016,2(4):481-494.(in Chinese) 袁勇,王飞跃.区块链技术发展现状与展望[J].自动化学报,2016,2(4):481-494.
[12] NAKAMOTO S.Bitcoin:a peer-to-peer electronic cash system[EB/OL]. /bitcoin.pdf,2008.
[13] FAN J,YI L T,SHU J W.Research on the technologies of Byzantine system[J].Journal of Software,2013,24(6):1346-1360.(in Chinese) 范捷,易乐天,舒继武.拜占庭系统技术研究综述[J].软件学报,2013,4(6):1346-1360.
[14] PASS R,SEEMAN L,SHELAT A.Analysis of the Blockchain Protocol in Asynchronous Networks[C]∥Advances in Crypto-logy-EUROCRYPT.Berlin:Springer,2017:643-673.
[15] GARAY J A,KIAYIAS A,LEONARDOS N.The Bitcoin Backbone Protocol:Analysis and Applications [C]∥Advances in Cryptology-EUROCRYPT.Berlin:Springer,2015:281-310.
[16] EYAL I,GENCDER A E,RENESSE R V.Bitcoin-NG:a scalable blockchain protocol[C]∥Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation.Berkeley:USENIX Association,2016:45-59.
[17] FANNING K,CENTERS D P.Blockchain and its coming impact on financial services[J].Journal of Corporate Accounting & Finance,2016,27(5):53-57.
[18] PINZN C,ROCHA C.Double-spend Attack Models with Time Advantange for Bitcoin[J].Electronic Notes in Theoretical Computer Science,2016,329(12):79-103.
[19] 杨宝华,陈昌.区块链原理、设计与应用[M].北京:机械工业出版社,2017:9-19.
[20] GRAMOLI V.From blockchain consensus back to Byzantineconsensus[J].Future Generation Computer Systems,2017,9:1-20.

No related articles found!
Full text



No Suggested Reading articles found!