期刊文献+

基于区块链的网络数据加密共享技术

Network Data Encryption and Sharing Technology Based on Blockchain
下载PDF
导出
摘要 使用当前的网络数据加密共享模型加密后的信息安全程度并不高,甚至会导致网络数据处理的哈希值下降,为此提出了基于区块链的网络数据加密共享技术。针对网络数据处理的需求和标准提取网络数据属性特征,同时在标定的位置上布设多区块加密节点,采用混合式区块链数据加密共享形式,实现区块链混合网络数据加密共享模型的设计,最终达到采用分层解密和多维共享的方式完善数据共享工作的目的。实验测试结果表明,设计方法的哈希值为2.36,数据传输安全度较高,具有实际的应用价值。 Absrtact:The current network data encryption sharing model does not have a high degree of security after encryption,resulting in a decline in the hash value of network data processing.Therefore,this paper proposes an analysis and research on the network data encryption sharing technology based on blockchain.According to the requirements and standards of network data processing,extract the characteristics of network data attributes,and at the same time deploy multi block encryption nodes at the calibrated locations.Adopt the hybrid blockchain data encryption sharing form to achieve the design of the blockchain hybrid network data encryption sharing model.Finally,adopt the hierarchical decryption and multi-dimensional sharing methods to improve the data sharing work at the same time.The experimental results show that the hash value obtained by the design method in this paper is 2.36,which is better than the comparison method,and the data transmission security is higher,which has practical application value.
作者 刘智明 张闯 LIU Zhiming;ZHANG Chuang(Department of Information Engineering,Zhengzhou University of Science and Technology,Zhengzhou Henan 450064,China)
出处 《信息与电脑》 2022年第23期216-218,共3页 Information & Computer
关键词 区块链 网络数据 数据加密 共享技术 数据处理 网络远程控制 blockchain network data data encryption sharing technology data processing network remote control
  • 相关文献

参考文献10

二级参考文献60

  • 1PERVEZ Z, KHATTAK A M, LEE S, et al. SAPDS: self-healingattribute-based privacy aware data sharing in cloud[ J]. The Journalof Supercomputing, 2012, 62(1): 431 -460.
  • 2GERON E, WOOL A. CRUST: cryptographic remote untrusted stor-age without public keys[ J]. International Journal of Information Se-curity, 2009, 8(5): 357 -377.
  • 3GOH E-J,SHACHAM H, MODADUGU N, et al. SiRitiS: secu-ring remote untrusted storage [ C]// Proceedings of the 2003 Sympo-sium on Network and Distributed Systems Security. San Diego, Cali-fornia: Hie Internet Society, 2003: 131 - 145.
  • 4BACKES M, CACHIN C,OPREA A. Lazy revocation in crypto-graphic file systems [ C] // Proceedings of the Third IEEE Interna-tional Security in Storage Workshop. Washington, DC: IEEE Com-puter Society, 2005: 1 -11.
  • 5BENALOH J, CHASE M, HORVITZ E,et al. Patient controlledencryption: ensuring privacy of electronic medical records [ C]//Proceedings of the 2009 ACM Workshop on Cloud Computing Secur-ity. New York: ACM Press, 2009: 103 -114.
  • 6FU K,KAMARA S, KOHNO T. Key regression: enabling efficientkey distribution for secure distributed storage[ C]// Proceedings ofthe 2006 Symposium on Network and Distributed Systems Security.San Diego, California: The Internet Society, 2006: 149.
  • 7SHAMIR A. Identity-based cryptosystems and signature schemes[C]// Advances in Cryptology, LNCS 196. Berlin: Springer,1985: 47 -53.
  • 8BONEH D,MATT F. Identity-based encryption from the Weil pai-ring [C] // Advances in Cryptology—CRYPTO 2001, LNCS 2139.Berlin: Springer, 2001: 213 -229.
  • 9SAHAI A,WATERS B. Fuzzy identity-based encryptionj J] . Advancesin Ciyptology - EUROCRYPT 2005, LNCS 3494. 2005: 457 - 473.
  • 10BETHENCOURT J, SAHAI A, WATERS B. Ciphertext-policy at-tribute-based encryption [ C]// Proceedings of the 2007 IEEE Sym-posium on Security and Privacy. Washinton, DC: IEEE ComputerSociety, 2007: 321 - 334.

共引文献104

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部