World-known computer manufacturers are making efforts to develop high-grade typesetting systems. In 1993, the Zhuhai Stone Computer Typesetting System Development Company and Beijing Stone Modem Typesetting and Printi...World-known computer manufacturers are making efforts to develop high-grade typesetting systems. In 1993, the Zhuhai Stone Computer Typesetting System Development Company and Beijing Stone Modem Typesetting and Printing Equipment Company, both subsidiaries of the Beijing Stone Group, marketed the Stone Quick and Easy Tvpesetting Module and展开更多
One of the most extensively used technologies for improving the security of IoT devices is blockchain technology.It is a new technology that can be utilized to boost the security.It is a decentralized peer-to-peer net...One of the most extensively used technologies for improving the security of IoT devices is blockchain technology.It is a new technology that can be utilized to boost the security.It is a decentralized peer-to-peer network with no central authority.Multiple nodes on the network mine or verify the data recorded on the Blockchain.It is a distributed ledger that may be used to keep track of transactions between several parties.No one can tamper with the data on the blockchain since it is unchangeable.Because the blocks are connected by hashes,the transaction data is safe.It is managed by a system that is based on the consensus of network users rather than a central authority.The immutability and tamper-proof nature of blockchain security is based on asymmetric cryptography and hashing.Furthermore,Blockchain has an immutable and tamper-proof smart contract,which is a logic that enforces the Blockchain’s laws.There is a conflict between the privacy protection needs of cyber-security threat intelligent(CTI)sharing and the necessity to establish a comprehensive attack chain during blockchain transactions.This paper presents a blockchain-based data sharing paradigm that protects the privacy of CTI sharing parties while also preventing unlawful sharing and ensuring the benefit of legitimate sharing parties.It builds a full attack chain using encrypted threat intelligence and exploits the blockchain’s backtracking capacity to finish the decryption of the threat source in the attack chain.Smart contracts are also used to send automatic early warning replies to possible attack targets.Simulation tests are used to verify the feasibility and efficacy of the suggested model.展开更多
文摘World-known computer manufacturers are making efforts to develop high-grade typesetting systems. In 1993, the Zhuhai Stone Computer Typesetting System Development Company and Beijing Stone Modem Typesetting and Printing Equipment Company, both subsidiaries of the Beijing Stone Group, marketed the Stone Quick and Easy Tvpesetting Module and
文摘One of the most extensively used technologies for improving the security of IoT devices is blockchain technology.It is a new technology that can be utilized to boost the security.It is a decentralized peer-to-peer network with no central authority.Multiple nodes on the network mine or verify the data recorded on the Blockchain.It is a distributed ledger that may be used to keep track of transactions between several parties.No one can tamper with the data on the blockchain since it is unchangeable.Because the blocks are connected by hashes,the transaction data is safe.It is managed by a system that is based on the consensus of network users rather than a central authority.The immutability and tamper-proof nature of blockchain security is based on asymmetric cryptography and hashing.Furthermore,Blockchain has an immutable and tamper-proof smart contract,which is a logic that enforces the Blockchain’s laws.There is a conflict between the privacy protection needs of cyber-security threat intelligent(CTI)sharing and the necessity to establish a comprehensive attack chain during blockchain transactions.This paper presents a blockchain-based data sharing paradigm that protects the privacy of CTI sharing parties while also preventing unlawful sharing and ensuring the benefit of legitimate sharing parties.It builds a full attack chain using encrypted threat intelligence and exploits the blockchain’s backtracking capacity to finish the decryption of the threat source in the attack chain.Smart contracts are also used to send automatic early warning replies to possible attack targets.Simulation tests are used to verify the feasibility and efficacy of the suggested model.