期刊文献+

一种基于区块链的个人数据保护模型 被引量:1

An individual Data Protection Model Based on Block Chain
下载PDF
导出
摘要 近年来因监听和安全漏洞导致用户数据泄露的事件时有发生,这使得人们开始怀疑现有的第三方机构大量收集和控制个人隐私数据的行为是否会威胁到其信息安全。然而在金融领域,比特币向世人展示了使用"以公账为基础的分散对等网络",完全可以创建出一种受信的、可审计的机制。因此本文通过介绍一种采用"分散式"技术的个人数据管理系统的简要模型,来展示如何使用区块链技术保护个人隐私数据。这个模型实现了一系列将区块链技术转化为一种"去中心化的自动权限控制管理机制"。与比特币交易系统不同的是,这个模型节点间"交易"的不全是虚拟货币,更多的是用于携带存储、查询、分享数据的信息。本文最后还讨论了未来将区块链技术全面拓展成可信计算的可行方案。 In recent years,the leakage of user data due to surveillance and security loopholes has occurred,which has led people to doubt whether the existing third-party agencies'extensive collection and control of personal privacy data will threaten their information security.In finance,however,Bitcoin shows the world that using"decentralized peer-to-peer networks based on public accounts"can create a credible and auditable mechanism.Therefore,this paper introduces a brief model of personal data management system using"decentralized"technology to show how to use block chain technology to protect personal privacy data.This model implements a series of changes in block chain technology to a"decentralized automatic permission control management mechanism."Unlike Bitcoin trading systems,not all"transactions"between this model node are virtual currencies,and more are used to carry information that stores,queries,and shares data.Finally,the paper discusses the feasible scheme of extending the block chain technology into credible computing in the future.
作者 刘帝 吴鹏 Liu Di;Wu Peng(The Software College of Shenyang Normal University,Shenyang Liaoning 110034,China)
出处 《信息与电脑》 2018年第21期140-142,共3页 Information & Computer
关键词 区块链 隐私 比特币 个人数据 block chain privace bitcoin personal data
  • 相关文献

参考文献3

二级参考文献17

  • 1杨博,唐祝寿,朱浩谨,沈备军,林九川.基于静态数据流分析的Android应用权限检测方法[J].计算机科学,2012,39(S3):16-18. 被引量:8
  • 2张中文,雷灵光,王跃武.AndroidPermission机制的实现与安全分析[c]//第27次全国计算机安全学术交流会论文集.出版地不详:出版者不祥,2012:3-6.
  • 3W. Enck, P. Gilbert, B. Chun, L. Cox, J. Jung, P. McDaniel, and A. Sheth. Taintdroid: An information - flow tracking nsystem for realtime privacy monitoring on smartphones[ C ]. In Proc. 9th USENIX Symposium on Operating Systems Design and Implementation, 2010. To appear.
  • 4T. Vennon and D. Stroop. Threat analysis of the android market[ EB/OL]. 2010. http ://www. globahhreatcenter. com/wp - content/uploads/2010/06/ Android - Market - Threat - Analysis - 6 - 22 - 10 - vl. pdf.
  • 5Wook Shin, Shlnsaku Ydyomoto, Kazuhide Fukushima, Toshlaki Tanaka. A formal model to analyze the permis- sion authorization and enforcement in the Android frame- work[C]. In Proceedings of the 2010 IEEE Second In- ternational Conference on Social Computing, SOCIAL- COM 10, 2010. 944-951.
  • 6Wook Shin, Sanghoon Kwak, Shinsaku Kiyomoto, Kazu- hide Fukushima, Toshiaki Tanaka. A small but non - negligible aw in the Android permission scheme [ C ]. In Proceedings of the 2010 IEEE International Symposium on Policies for Distributed Systems and Networks, 2010. 107 -110.
  • 7Machigar Ongtang, McLaughlin S, Willam Enck, et al. Semantically rich application - centric security in Android [ C ] . In ACSAC09 : Proceeding of the 25th Annual Com- puter Security Applications Conference, 2009:340 - 349.
  • 8Mohammad Nauman, Sehail Khan, Xinwen Zhang. A- pex: Extending android permission model and enforce- ment with user - defined runtime constraints [ C ]. Pro- ceedlngs of the 5th ACM Symposium on Information, Computer and Communications Security. USA: ACM, 2010:328 - 332.
  • 9A. Chaudhuri. Language -based security on Android [C]. In PLASIY): Programming Languages and Analy- sis for Security, pages 1 - 7. ACM, 2009.
  • 10文风.第三方逆向物流企业选评研究[J].科技进步与对策,2009,26(22):152-155. 被引量:5

共引文献50

同被引文献21

引证文献1

二级引证文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部