Computer Science ›› 2018, Vol. 45 ›› Issue (11A): 367-368.

Special Issue: Block Chain Technology

• Information Security • Previous Articles     Next Articles

Security Provenance Model for RFID Big Data Based on Blockchain

LIU Yao-zong1, LIU Yun-heng2   

  1. School of Computer Science,Wuyi University,Jiangmen,Guangdong 529020,China1
    School of Information Technology,Nanjing Forest Police College,Nanjing 210023,China2
  • Online:2019-02-26 Published:2019-02-26

Abstract: In recent years,with the development of the block chain technology,it has received extensive attention.It is generally regarded as an important tool to solve the problem of data security.RFID big data is important source of data in the Internet of things,and the security requirements for data are also very high.Data tracing is one of the important applications of RFID networking technology,it is widely used in original traceability of agricultural products,raw materials,industrial production and consumer goods and parts traceability,security and other aspects.Block chain plays an important role in improving the safety of big data source.This paper presented a RFID data source security model based on block chain technology,and block chain technology is used in the tracing process of RFID data,the formation of multi information transparency,sharing,participation and fidelity in the traceability chain.The block chain books are formed in production,processing,marketing and other aspects of the establishment of RFID tracing goods,the whole chain traceability path RFID big data is established,to end users,so as to realize the safety management of the traceability of RFID big data.

Key words: Block chain technique, RFID big data, Security provenance

CLC Number: 

  • TP393
[1]刘耀宗.RFID数据流管理与挖掘若干关键技术研究[D].南京:南京理工大学,2016.
[2]明华,张勇,符小辉.数据溯源技术综述[J].小型微型计算机系统,2012,33(9):1917-1923.
[3]魏亚东,李康.一种基于物联网技术的大数据应用系统:CN205091639U[P].2016.
[4]魏银珍,邓仲华.云环境下科学工作流的溯源数据收集和查询框架研究[J].情报理论与实践,2015,38(7):115-118.
[5]NAKAMOTO S.Bitcoin:a peer-to-peer electronic cash system[OL].https://bitcoin.org/bitcoin.pdf,2009.
[6]SWAN M.Blockchain:Blueprint for a New Economy[M].USA: O0Reilly Media Inc.,2015.
[7]何蒲,于戈,张岩峰,等.区块链技术与应用前瞻综述[J].计算机科学,2017,44(4):1-7.
[8]朱岩,甘国华,邓迪,等.区块链关键技术中的安全性研究[J].信息安全研究,2016,2(12):1090-1097.
[9]谢雨来.溯源的高效存储管理及在安全方面的应用研究[D].武汉:华中科技大学,2013.
[10]XIE Y,FENG D,TAN Z,et al.Design and evaluation of a pro-venance-based rebuild framework[J].IEEE Transactions on Magnetics,2013,49(6):2805-2811.
[11]WIDOM J.Trio:A System for Integrated Management of Data,Accuracy,and Lineage[C]∥Proceedings of the International Conference on Innovation Data Systems Research(CIDR).Asilomar,CA,January,2005:262-276.
[12]IKEDA R,WIDOM J.Panda:a system for provenance and data[C]∥Proceedings for the 2nd Conference on Theory and Practice of Provenance.San Jose,CA,2010:1-4.
[13]LIANG X,SHETTY S,TOSH D,et al.Provchain:A block-chain-based data provenance architecture in cloud environment with enhanced privacy and availability[C]∥Proceedings of the 17th IEEE/ACM International Symposium on Cluster,Cloud and Grid Computing.IEEE Press,2017:468-477.
[14]MCCONAGHY T,MARQUES R,MÜLLER,et al.BigchainDB:A Scalable Blockchain Database (DRAFT)[OL].http://s3amazonaw5.com/arena-attachemnts/830378/db1ff2fb010d68e67dd5bfe1d20f5e33.pdf?1484096147.
[15]梅海涛,刘洁.区块链的产业现状、存在问题和政策建议[J].电信科学,2016(11):134-138.
[1] LIU Xin, WANG Jun, SONG Qiao-feng, LIU Jia-hao. Collaborative Multicast Proactive Caching Scheme Based on AAE [J]. Computer Science, 2022, 49(9): 260-267.
[2] GUO Peng-jun, ZHANG Jing-zhou, YANG Yuan-fan, YANG Shen-xiang. Study on Wireless Communication Network Architecture and Access Control Algorithm in Aircraft [J]. Computer Science, 2022, 49(9): 268-274.
[3] HU An-xiang, YIN Xiao-kang, ZHU Xiao-ya, LIU Sheng-li. Strcmp-like Function Identification Method Based on Data Flow Feature Matching [J]. Computer Science, 2022, 49(9): 326-332.
[4] JIANG Yang-yang, SONG Li-hua, XING Chang-you, ZHANG Guo-min, ZENG Qing-wei. Belief Driven Attack and Defense Policy Optimization Mechanism in Honeypot Game [J]. Computer Science, 2022, 49(9): 333-339.
[5] WANG Lei, LI Xiao-yu. LBS Mobile Privacy Protection Scheme Based on Random Onion Routing [J]. Computer Science, 2022, 49(9): 347-354.
[6] WANG Xing-wei, XIN Jun-chang, SHAO An-lin, BI Yuan-guo, YI Xiu-shuang. Study on Development Status and Countermeasures of Industrial Intranet in Enterprises [J]. Computer Science, 2022, 49(7): 1-9.
[7] ZHANG Chong-yu, CHEN Yan-ming, LI Wei. Task Offloading Online Algorithm for Data Stream Edge Computing [J]. Computer Science, 2022, 49(7): 263-270.
[8] FEI Xing-rui, XIE Yi. Click Streams Recognition for Web Users Based on HMM-NN [J]. Computer Science, 2022, 49(7): 340-349.
[9] ZHAO Dong-mei, WU Ya-xing, ZHANG Hong-bin. Network Security Situation Prediction Based on IPSO-BiLSTM [J]. Computer Science, 2022, 49(7): 357-362.
[10] WANG Si-ming, TAN Bei-hai, YU Rong. Blockchain Sharding and Incentive Mechanism for 6G Dependable Intelligence [J]. Computer Science, 2022, 49(6): 32-38.
[11] Ran WANG, Jiang-tian NIE, Yang ZHANG, Kun ZHU. Clustering-based Demand Response for Intelligent Energy Management in 6G-enabled Smart Grids [J]. Computer Science, 2022, 49(6): 44-54.
[12] WEI Hui, CHEN Ze-mao, ZHANG Li-qiang. Anomaly Detection Framework of System Call Trace Based on Sequence and Frequency Patterns [J]. Computer Science, 2022, 49(6): 350-355.
[13] TAO Li-jing, QIU Han, ZHU Jun-hu, LI Hang-tian. Model for the Description of Trainee Behavior for Cyber Security Exercises Assessment [J]. Computer Science, 2022, 49(6A): 480-484.
[14] HE Xi, HE Ke-tai, WANG Jin-shan, LIN Shen-wen, YANG Jing-lin, FENG Yu-chao. Analysis of Bitcoin Entity Transaction Patterns [J]. Computer Science, 2022, 49(6A): 502-507.
[15] GAO Wen-long, ZHOU Tian-yang, ZHU Jun-hu, ZHAO Zi-heng. Network Attack Path Discovery Method Based on Bidirectional Ant Colony Algorithm [J]. Computer Science, 2022, 49(6A): 516-522.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!