期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
CRBFT:A Byzantine Fault-Tolerant Consensus Protocol Based on Collaborative Filtering Recommendation for Blockchains
1
作者 Xiangyu Wu xuehui du +3 位作者 Qiantao Yang Aodi Liu Na Wang Wenjuan Wang 《Computers, Materials & Continua》 SCIE EI 2024年第7期1491-1519,共29页
Blockchain has been widely used in finance,the Internet of Things(IoT),supply chains,and other scenarios as a revolutionary technology.Consensus protocol plays a vital role in blockchain,which helps all participants t... Blockchain has been widely used in finance,the Internet of Things(IoT),supply chains,and other scenarios as a revolutionary technology.Consensus protocol plays a vital role in blockchain,which helps all participants to maintain the storage state consistently.However,with the improvement of network environment complexity and system scale,blockchain development is limited by the performance,security,and scalability of the consensus protocol.To address this problem,this paper introduces the collaborative filtering mechanism commonly used in the recommendation system into the Practical Byzantine Fault Tolerance(PBFT)and proposes a Byzantine fault-tolerant(BFT)consensus protocol based on collaborative filtering recommendation(CRBFT).Specifically,an improved collaborative filtering recommendation method is designed to use the similarity between a node’s recommendation opinions and those of the recommender as a basis for determining whether to adopt the recommendation opinions.This can amplify the recommendation voice of good nodes,weaken the impact of cunningmalicious nodes on the trust value calculation,andmake the calculated resultsmore accurate.In addition,the nodes are given voting power according to their trust value,and a weight randomelection algorithm is designed and implemented to reduce the risk of attack.The experimental results show that CRBFT can effectively eliminate various malicious nodes and improve the performance of blockchain systems in complex network environments,and the feasibility of CRBFT is also proven by theoretical analysis. 展开更多
关键词 Blockchain CONSENSUS byzantine fault-tolerant collaborative filtering TRUST
下载PDF
Big Data Access Control Mechanism Based on Two-Layer Permission Decision Structure
2
作者 Aodi Liu Na Wang +3 位作者 xuehui du Dibin Shan Xiangyu Wu Wenjuan Wang 《Computers, Materials & Continua》 SCIE EI 2024年第4期1705-1726,共22页
Big data resources are characterized by large scale, wide sources, and strong dynamics. Existing access controlmechanisms based on manual policy formulation by security experts suffer from drawbacks such as low policy... Big data resources are characterized by large scale, wide sources, and strong dynamics. Existing access controlmechanisms based on manual policy formulation by security experts suffer from drawbacks such as low policymanagement efficiency and difficulty in accurately describing the access control policy. To overcome theseproblems, this paper proposes a big data access control mechanism based on a two-layer permission decisionstructure. This mechanism extends the attribute-based access control (ABAC) model. Business attributes areintroduced in the ABAC model as business constraints between entities. The proposed mechanism implementsa two-layer permission decision structure composed of the inherent attributes of access control entities and thebusiness attributes, which constitute the general permission decision algorithm based on logical calculation andthe business permission decision algorithm based on a bi-directional long short-term memory (BiLSTM) neuralnetwork, respectively. The general permission decision algorithm is used to implement accurate policy decisions,while the business permission decision algorithm implements fuzzy decisions based on the business constraints.The BiLSTM neural network is used to calculate the similarity of the business attributes to realize intelligent,adaptive, and efficient access control permission decisions. Through the two-layer permission decision structure,the complex and diverse big data access control management requirements can be satisfied by considering thesecurity and availability of resources. Experimental results show that the proposed mechanism is effective andreliable. In summary, it can efficiently support the secure sharing of big data resources. 展开更多
关键词 Big data access control data security BiLSTM
下载PDF
面向外包服务的可验证技术研究进展
3
作者 孙奕 杨帆 +2 位作者 陈性元 杜学绘 林玮 《中国科学:信息科学》 CSCD 北大核心 2024年第3期514-565,共52页
随着数字经济时代的到来,数据已成为重要生产要素,将数据外包给第三方存储、管理、分析、计算等应用越来越广泛,随之而来的外包数据、外包计算等外包服务的可信性问题也日益突出,可验证技术被视为判定外包服务可信的一种有效且具有广泛... 随着数字经济时代的到来,数据已成为重要生产要素,将数据外包给第三方存储、管理、分析、计算等应用越来越广泛,随之而来的外包数据、外包计算等外包服务的可信性问题也日益突出,可验证技术被视为判定外包服务可信的一种有效且具有广泛应用前景的技术.该技术发展迅速、研究内容丰富、技术多样、种类繁多,且随着区块链、人工智能、隐私计算等新型外包服务需求的出现,为可验证技术带来了新的挑战和发展契机.本文对面向外包服务的可验证技术研究进展进行了梳理与总结.首先梳理总结给出了面向外包服务的可验证技术框架、分类方法、安全目标与评价体系.接着从外包数据和外包计算两个角度给出可验证技术的形式化定义,并分别论述其典型的可验证方案.然后从外包数据的角度,以验证数据类型为主线结合实现的功能和方法分别详细论述了不同数据类型、不同场景、不同实现方式的外包数据持有性验证和完整性验证技术;从外包计算的角度,根据外包计算类型的不同,总结归纳了5种典型外包计算的可验证技术特点及研究进展,并基于提出的评价体系对典型方案进行了详细的对比分析.最后结合新兴技术和应用热点,展望了可验证技术在前沿方向上的发展趋势、应用前景及其面临的挑战. 展开更多
关键词 外包服务 外包数据验证 可验证计算 可认证数据结构 动态可验证结构
原文传递
Business-Oriented Dynamic Reconfiguration Model of Cloud Computing Network
4
作者 Xin Lu Lifeng Cao +1 位作者 xuehui du Zhanbing Zhu 《国际计算机前沿大会会议论文集》 2019年第2期243-245,共3页
The complexity and diversity of the cloud business and the continuous growth of new services put forward higher requirements for businessoriented adaptive reconstruction of cloud networks. Therefore, by introducing th... The complexity and diversity of the cloud business and the continuous growth of new services put forward higher requirements for businessoriented adaptive reconstruction of cloud networks. Therefore, by introducing the construction idea of reconfiguration network into cloud network, this paper designs a business-oriented dynamic reconfiguration model of cloud computing network. In the design process of the model, the formal description of the model reconfigurable goal, the target-tree decomposition method and the target ordergraph relation representation method were proposed. A rapid-reconfiguration method based on similar node transformation, a specific reconfiguration process of the model and reconfiguration optimization algorithm were also presented in detail. The model provided an effective resolution to better realize the flexibility, scalability, security and self-adaptability of the network in the cloud environment, which ensures the reconfiguration continuity of the cloud network to meet ever-changing business requirements. Finally, the performance of the model is verified, which proves the high efficiency of the model the dynamic reconfiguration. 展开更多
关键词 RECONFIGURATION cloud NETWORK Business-oriented Reconfigurable virtual routing node Meta-component RECONFIGURATION optimization
下载PDF
Internet Web Trust System Based on Smart Contract
5
作者 Shaozhuo Li Na Wang +1 位作者 xuehui du Aodi Liu 《国际计算机前沿大会会议论文集》 2019年第1期309-311,共3页
The current Internet web trust system is based on the traditional PKI system, to achieve the purpose of secure communication through the trusted third party. However, with the increase of network nodes, various proble... The current Internet web trust system is based on the traditional PKI system, to achieve the purpose of secure communication through the trusted third party. However, with the increase of network nodes, various problems appear in the centralization system of public key infrastructure (PKI). In recent years, in addition to cryptographic problems, attacks against PKI have focused on the single point of failure of certificate authority (CA). Although there are many reasons for a single point of failure, the purpose of the attack is to invalidate the CA. Thus a distributed authentication system is explored to provide a feasible solution to develop distributed PKI with the rise of the blockchain. Due to the automation and economic penalties of smart contracts, a PKI system is proposed based on smart contracts. The certificate chain was constructed in the blockchain, and a mechanism was adopted for auditing access to CA nodes in the blockchain. Experimental results show that security requirements of CA are met in this system. 展开更多
关键词 PUBLIC key INFRASTRUCTURE Blockchain SMART CONTRACT
下载PDF
Supervisable Anonymous Management of Digital Certificates for Blockchain PKI
6
作者 Shaozhuo Li Na Wang +1 位作者 xuehui du Xuan Li 《国际计算机前沿大会会议论文集》 2020年第1期130-144,共15页
Aiming at the requirement of anonymous supervision of digital certificates in blockchain public key infrastructure(PKI),this paper proposes a ring signature with multiple indirect verifications(RS-MIV).This mechanism ... Aiming at the requirement of anonymous supervision of digital certificates in blockchain public key infrastructure(PKI),this paper proposes a ring signature with multiple indirect verifications(RS-MIV).This mechanism can ensure multiple and indirect verification of certificate signer identity while preserving its anonymity.On this basis,a supervisable anonymous management scheme was designed based on smart contracts,which realizes the anonymity of certificate authority nodes,the anonymous issuance of digital certificates,the anonymous verification of digital certificates,and the traceability of illegal certificate issuers in the blockchain PKI.It is proved that the scheme can guarantee the anonymity and traceability of the certificate issuer’s identity at an acceptable cost. 展开更多
关键词 Blockchain Digital certificate PKI Ring signature
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部