Although numerous advances have been made in information technology in the past decades,there is still a lack of progress in information systems dynamics(ISD),owing to the lack of a mathematical foundation needed to d...Although numerous advances have been made in information technology in the past decades,there is still a lack of progress in information systems dynamics(ISD),owing to the lack of a mathematical foundation needed to describe information and the lack of an analytical framework to evaluate information systems.The value of ISD lies in its ability to guide the design,development,application,and evaluation of largescale information system-of-systems(So Ss),just as mechanical dynamics theories guide mechanical systems engineering.This paper reports on a breakthrough in these fundamental challenges by proposing a framework for information space,improving a mathematical theory for information measurement,and proposing a dynamic configuration model for information systems.In this way,it establishes a basic theoretical framework for ISD.The proposed theoretical methodologies have been successfully applied and verified in the Smart Court So Ss Engineering Project of China and have achieved significant improvements in the quality and efficiency of Chinese court informatization.The proposed ISD provides an innovative paradigm for the analysis,design,development,and evaluation of large-scale complex information systems,such as electronic government and smart cities.展开更多
With the development of network technology and cloud computing, data sharing is becoming increasingly popular, and many scholars have conducted in-depth research to promote its flourish. As the scale of data sharing e...With the development of network technology and cloud computing, data sharing is becoming increasingly popular, and many scholars have conducted in-depth research to promote its flourish. As the scale of data sharing expands, its privacy protection has become a hot issue in research. Moreover, in data sharing, the data is usually maintained in multiple parties, which brings new challenges to protect the privacy of these multi-party data. In this paper, we propose a trusted data sharing scheme using blockchain. We use blockchain to prevent the shared data from being tampered, and use the Paillier cryptosystem to realize the confidentiality of the shared data. In the proposed scheme, the shared data can be traded, and the transaction information is protected by using the (p, t)-threshold Paillier cryptosystem. We conduct experiments in cloud storage scenarios and the experimental results demonstrate the efficiency and effectiveness of the proposed scheme.展开更多
To date,bitcoin has been the most successful application of blockchain technology and has received considerable attention from both industry and academia.Bitcoin is an electronic payment system based on cryptography r...To date,bitcoin has been the most successful application of blockchain technology and has received considerable attention from both industry and academia.Bitcoin is an electronic payment system based on cryptography rather than on credit.Regardless of whether people are in the same city or country,bitcoin can be sent by any one person to any other person when they reach an agreement.The market value of bitcoin has been rising since its advent in 2009,and its current market value is US160 billion.Since its development,bitcoin itself has exposed many problems and is facing challenges from all the sectors of society;therefore,adversaries may use bitcoin's weakness to make considerable profits.This survey presents an overview and detailed investigation of data security and privacy in bitcoin system.We examine the studies in the literature/Web in two categories:1)analyses of the attacks to the privacy,availability,and consistency of bitcoin data and 2)summaries of the countermeasures for bitcoin data security.Based on the literature/Web,we list and describe the research methods and results for the two categories.We compare the performance of these methods and illustrate the relationship between the performance and the methods.Moreover,we present several important open research directions to identify the follow-up studies in this area.展开更多
基金supported by the National Key Research and Development Program of China(2016YFC0800801)the Research and Innovation Project of China University of Political Science and Law(10820356)the Fundamental Research Funds for the Central Universities。
文摘Although numerous advances have been made in information technology in the past decades,there is still a lack of progress in information systems dynamics(ISD),owing to the lack of a mathematical foundation needed to describe information and the lack of an analytical framework to evaluate information systems.The value of ISD lies in its ability to guide the design,development,application,and evaluation of largescale information system-of-systems(So Ss),just as mechanical dynamics theories guide mechanical systems engineering.This paper reports on a breakthrough in these fundamental challenges by proposing a framework for information space,improving a mathematical theory for information measurement,and proposing a dynamic configuration model for information systems.In this way,it establishes a basic theoretical framework for ISD.The proposed theoretical methodologies have been successfully applied and verified in the Smart Court So Ss Engineering Project of China and have achieved significant improvements in the quality and efficiency of Chinese court informatization.The proposed ISD provides an innovative paradigm for the analysis,design,development,and evaluation of large-scale complex information systems,such as electronic government and smart cities.
文摘With the development of network technology and cloud computing, data sharing is becoming increasingly popular, and many scholars have conducted in-depth research to promote its flourish. As the scale of data sharing expands, its privacy protection has become a hot issue in research. Moreover, in data sharing, the data is usually maintained in multiple parties, which brings new challenges to protect the privacy of these multi-party data. In this paper, we propose a trusted data sharing scheme using blockchain. We use blockchain to prevent the shared data from being tampered, and use the Paillier cryptosystem to realize the confidentiality of the shared data. In the proposed scheme, the shared data can be traded, and the transaction information is protected by using the (p, t)-threshold Paillier cryptosystem. We conduct experiments in cloud storage scenarios and the experimental results demonstrate the efficiency and effectiveness of the proposed scheme.
基金supported by the Key-Area Research and Development Program of Guangdong Province of China under Grant No.2019B010137003the National Natural Science Foundation of China under Grant Nos.U1836212,61972039,61872041,61602039 and 61871037+2 种基金the Beijing Natural Science Foundation of China under Grant No.4192050the Key Laboratory of Information Network Security,Ministry of Public Securitythe Pre Study Foundation of Weapons and Equipment under Grant No.31511020401.
文摘To date,bitcoin has been the most successful application of blockchain technology and has received considerable attention from both industry and academia.Bitcoin is an electronic payment system based on cryptography rather than on credit.Regardless of whether people are in the same city or country,bitcoin can be sent by any one person to any other person when they reach an agreement.The market value of bitcoin has been rising since its advent in 2009,and its current market value is US160 billion.Since its development,bitcoin itself has exposed many problems and is facing challenges from all the sectors of society;therefore,adversaries may use bitcoin's weakness to make considerable profits.This survey presents an overview and detailed investigation of data security and privacy in bitcoin system.We examine the studies in the literature/Web in two categories:1)analyses of the attacks to the privacy,availability,and consistency of bitcoin data and 2)summaries of the countermeasures for bitcoin data security.Based on the literature/Web,we list and describe the research methods and results for the two categories.We compare the performance of these methods and illustrate the relationship between the performance and the methods.Moreover,we present several important open research directions to identify the follow-up studies in this area.