Computer Science ›› 2021, Vol. 48 ›› Issue (11): 36-45.doi: 10.11896/jsjkx.201000002

• Blockchain Technology • Previous Articles     Next Articles

CFL_BLP_BC Model Based on Authentication and Blockchain

LIAN Wen-juan1, ZHAO Duo-duo1, FAN Xiu-bin1,2, GENG Yu-nian2, FAN Xin-tong3   

  1. 1 College of Computer Science & Engineering,Shandong University of Science and Technology,Qingdao,Shandong 266590,China
    2 Qingdao Branch,Institute of Software,Chinese Academy of Sciences,Qingdao,Shandong 266114,China
    3 School of Computer Science,Qufu Normal University,Rizhao,Shandong 276800,China
  • Received:2020-10-02 Revised:2020-12-18 Online:2021-11-15 Published:2021-11-10
  • About author:LIAN Wen-juan,born in 1977,Ph.D,associate professor,is a member of China Computer Federation.Her main research interests include deep learning,cyber security.
    FAN Xiu-bin,born in 1966,Ph.D,professor,Ph.D supervisor.His main research interests include cryptology,cyber Security.
  • Supported by:
    Qingdao Social Science Planning Project(QDSKL2001156).

Abstract: The coming of 5G era brings new challenges to the information security of emerging information industries.The exis-ting security technologies can't meet the requirements of millisecond level authentication and trusted authentication for specific scenarios in 5G era.Therefore,CFL technology is taken as the origin technology of information security.Based on the local modification of the security axioms of the original BLP model,combined with the Blockchain technology,CFL_BLP_BC model formally describes the basic elements,security axioms and state transition rules of the model.The model can support the construction of five aspects of information security,and has the attributes of millisecond level,instruction level and empirical system.The model belongs to endogenous safety,innate immunity and active defense technology.The model can provide important theoretical gui-dance for theemerging information industry.

Key words: Blockchain, BLP model, CFL authentication system, Trusted authentication

CLC Number: 

  • TP399
[1]PLOUTON V.Grammatikos,Panayotis G.Cottis.IMT Vision-Framework and overall objectives of the future development of IMT for 2020 and beyond[S].ITU-R Recommendation M.2083-0,2015.
[2]View on 5G architecture Version 3.0[M/OL].The 5G Infra-structure Public Private Partnership Architecture Working Group,2019:18-19.https://5g-ppp.eu/wp-content/uploads/2019/07/5G-PPP-5G-Architecture-White-Paper_v3.0_PublicConsultation.pdf.
[3]ZHANG S,WANG Y,ZHOU W.Towards Secure 5G Net-works:A Survey[J].Computer Networks,2019,162:106871.
[4]SCHNEIDER P,HORN G.Towards 5G Security[C]//Trustcom/bigdatase/ispa.IEEE,2015:1165-1170.
[5]SORENSEN L T,KHAJURIA S,SKOUBY K E.5G Visions ofUser Privacy[J].IEEE Vehicular Technology Conference,2015,81(5):1-4.
[6]KUTSCHER D.It's the network:Towards better security andtransport performance in 5G[C]//2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).San Francisco,CA,2016:656-661.
[7]FAN X B,LIU X,WANG X L,et al.Identification-basedauthentication system CFL-netspace authentication and its examples[M].Beijing:Beijing University of Posts and Teleco-munications Press,2019:33-69.
[8]FAN W Z,FAN Y N,HE Z Z,et al.CFL_BLP model[J].Journal of Taishan University,2018,40(6):60-66.
[9]DU C L,LIU J M,FAN X B,et al.CFL is Statistical Zero-Knowledge Proof System[J].Journal of Information Security Research,2016,2(7):621-627.
[10]QIN H B,PAN Y J,FAN X B,et al.Analysis on CFL Provable Security[J].Journal of Information Security Research,2016,2(7):589-599.
[11]FAN X B.New generation of identity authentication technology CFL[J].Journal of Information Security Research,2016,2(7):587-588.
[12]LI C C,JI S W,FAN X B,et al.The Overview of Authentication Systems[J].Journal of Information Security Research,2016,2(7):649-659.
[13]DU C L,FAN X B.CFL Authentication System and Its Applications in the Blockchain[J].Journal of Information Security Research,2017,3(3):220-226.
[14]BELL D E,LAPADULA L J.Secure Computer Systems:AMathematical Model[J].The MITRE Corporation,1973,2:239-263.
[15]NOFER M,GOMBER P,HINZ O,et al.Blockchain[J].Busi-ness & Information Systems Engineering,2017,59(3):183-187.
[16]ZHENG Z B,XIE S A.Blockchain challenges and opportunities:a survey[J].International Journal of Web and Grid Services,2018,14(4):352-375.
[17]WANG Y,SHEN Y,WANG H,et al.MtMR:Ensuring MapReduce Computation Integrity with Merkle Tree-based Verifications[J].IEEE Transactions on Big Data,2016,4(3):418-431.
[18]YUAN Y,WANG F Y.Blockchain:The State of the Art and Future Trends[J].Acta Automatica Sinica,2016,42(4):481-494.
[19]LI Q,TAN Y,YU X,et al.Resear on Blockchain Authentication Based on CFL[C]//Proceedings of the 6th China command and Control Conference (Volume 2).2018:587-589.
[20]SHU Z X,LI T F,YU X,et al.Research on cfl-based blockchain system authentication Mechan-ism[J].Application Research of Computers,2020,38(2):1-10.
[21]LI Q,SHU Z X,YU X,et al.Authentication Mechanism inBlockchain Systems[J].Journal of Command and Control,2019(1):1-17.
[22]YAN S J,MIN L Q,FAN X B.Researchon the knowledge security[J].Journal on Communications,2014,35(Z2):204-211.
[23]YAN S J,FAN X B,CHEN Y G,et al.Construction of Narrow Security Knowledge Base[J].Information Security and Communications Privac,2015(6):99-103.
[24]Ten academicians unveil BCS 2019 Qian xin first proposes the concept of “SECURITY:BUILT-IN DNA”[J].China Information Security,2019(9):102.
[25]FERNANDES D A B,FREIRE M M,FAZENDEIRO P A P,et al.Applications of artificial immune systems to computer security:A survey[J].Journal of Information Security & Applications,2017,35:138-159.
[26]ZHANG B.Research on key Technologies of Interactive and Attack Proactive Defense in Edge-computing Network [D].Nanjing:Guniversity of Science & Technology,2019.
[27]LUO Y B.Research on Proactive Defense of Computer Network[D].Hunan:National University of Defense Technology,2017.
[28]IFTEKHAR A,TAHMIN N,SHAHINA S U,et al.Protection of Sensitive Data in Zero Trust Model[C]//Proceedings of the International Conference on Computing Advancements (ICCA 2020).Association for Computing Machinery,New York,NY,USA,2020,63:1-5.
[29]ZHANG H G,JIA C F,LIN J Q.Foreword of trusted computing for autonomous security and controllability[J].Journal of Software,2019,30(8):2227-2228.
[1] WANG Zi-kai, ZHU Jian, ZHANG Bo-jun, HU Kai. Research and Implementation of Parallel Method in Blockchain and Smart Contract [J]. Computer Science, 2022, 49(9): 312-317.
[2] FU Li-yu, LU Ge-hao, WU Yi-ming, LUO Ya-ling. Overview of Research and Development of Blockchain Technology [J]. Computer Science, 2022, 49(6A): 447-461.
[3] GAO Jian-bo, ZHANG Jia-shuo, LI Qing-shan, CHEN Zhong. RegLang:A Smart Contract Programming Language for Regulation [J]. Computer Science, 2022, 49(6A): 462-468.
[4] MAO Dian-hui, HUANG Hui-yu, ZHAO Shuang. Study on Automatic Synthetic News Detection Method Complying with Regulatory Compliance [J]. Computer Science, 2022, 49(6A): 523-530.
[5] ZHOU Hang, JIANG He, ZHAO Yan, XIE Xiang-peng. Study on Optimal Scheduling of Power Blockchain System for Consensus Transaction ofEach Unit [J]. Computer Science, 2022, 49(6A): 771-776.
[6] LI Bo, XIANG Hai-yun, ZHANG Yu-xiang, LIAO Hao-de. Application Research of PBFT Optimization Algorithm for Food Traceability Scenarios [J]. Computer Science, 2022, 49(6A): 723-728.
[7] WANG Si-ming, TAN Bei-hai, YU Rong. Blockchain Sharding and Incentive Mechanism for 6G Dependable Intelligence [J]. Computer Science, 2022, 49(6): 32-38.
[8] SUN Hao, MAO Han-yu, ZHANG Yan-feng, YU Ge, XU Shi-cheng, HE Guang-yu. Development and Application of Blockchain Cross-chain Technology [J]. Computer Science, 2022, 49(5): 287-295.
[9] YANG Zhen, HUANG Song, ZHENG Chang-you. Study on Crowdsourced Testing Intellectual Property Protection Technology Based on Blockchain and Improved CP-ABE [J]. Computer Science, 2022, 49(5): 325-332.
[10] REN Chang, ZHAO Hong, JIANG Hua. Quantum Secured-Byzantine Fault Tolerance Blockchain Consensus Mechanism [J]. Computer Science, 2022, 49(5): 333-340.
[11] FENG Liao-liao, DING Yan, LIU Kun-lin, MA Ke-lin, CHANG Jun-sheng. Research Advance on BFT Consensus Algorithms [J]. Computer Science, 2022, 49(4): 329-339.
[12] WANG Xin, ZHOU Ze-bao, YU Yun, CHEN Yu-xu, REN Hao-wen, JIANG Yi-bo, SUN Ling-yun. Reliable Incentive Mechanism for Federated Learning of Electric Metering Data [J]. Computer Science, 2022, 49(3): 31-38.
[13] ZHANG Ying-li, MA Jia-li, LIU Zi-ang, LIU Xin, ZHOU Rui. Overview of Vulnerability Detection Methods for Ethereum Solidity Smart Contracts [J]. Computer Science, 2022, 49(3): 52-61.
[14] YANG Xin-yu, PENG Chang-gen, YANG Hui, DING Hong-fa. Rational PBFT Consensus Algorithm with Evolutionary Game [J]. Computer Science, 2022, 49(3): 360-370.
[15] FAN Jia-xing, WANG Zhi-wei. Hierarchical Anonymous Voting Scheme Based on Threshold Ring Signature [J]. Computer Science, 2022, 49(1): 321-327.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!