浏览全部资源
扫码关注微信
[ "李斌(1985- ),男,国网宁夏电力有限公司信息通信公司高级工程师,主要研究方向为大数据技术、人工智能技术、电力信息系统智能化运维及网络安全等" ]
[ "何辉(1995- ),男,国网宁夏电力有限公司信息通信公司助理工程师,主要研究方向为电力信息安全" ]
[ "赵中英(1990- ),男,国网宁夏电力有限公司信息通信公司工程师,主要研究方向为信息系统运维技术、数据运营管理和数据安全等" ]
[ "郭景维(1984- ),男,国网宁夏电力有限公司信息通信公司高级工程师,主要研究方向为电力信息技术等" ]
网络出版日期:2024-02,
纸质出版日期:2024-02-20
移动端阅览
李斌, 何辉, 赵中英, 等. 基于区块链的多源网络大数据安全访问权限认证仿真[J]. 电信科学, 2024,40(2):107-115.
Bin LI, Hui HE, Zhongying ZHAO, et al. Security access permission authentication simulation of multi-source network big data based on blockchain[J]. Telecommunications science, 2024, 40(2): 107-115.
李斌, 何辉, 赵中英, 等. 基于区块链的多源网络大数据安全访问权限认证仿真[J]. 电信科学, 2024,40(2):107-115. DOI: 10.11959/j.issn.1000-0801.2024021.
Bin LI, Hui HE, Zhongying ZHAO, et al. Security access permission authentication simulation of multi-source network big data based on blockchain[J]. Telecommunications science, 2024, 40(2): 107-115. DOI: 10.11959/j.issn.1000-0801.2024021.
多源网络大数据的频繁交互与存储打破了传统数据“孤岛”,实现了跨区域与跨组织的数据访问,为数据的安全和隐私保护带来巨大挑战。访问认证作为保护数据与资源安全的技术之一,在获取所有数据节点信任的同时,面临巨大的通信负载,会造成数据丢失和破坏,为此,提出一种基于区块链研究多源网络大数据安全访问权限认证方法。以相似关系度量数据在网络传输中的变化状态,根据相似矩阵计算多源网络数据访问概率。通过区块链技术建立数据安全访问合约,标定数据的访问属性以及交易密文,并将数据压缩在对应属性内。根据访问目的分析其访问信度,以信度作为标准对应安全等级,在不同信度下定制访问规则,认证数据安全访问的具体权限,实现方法设计。实验结果表明,以不同数据属性含量作为测试条件,在常规模式和攻击模式下对数据进行加密和解密处理,新方法可以实现较快的认证响应,实现网络数据的安全访问。
The frequent interaction and storage of big data in multi-source networks have broken traditional data silos
enabling cross regional and cross organizational data access
posing significant challenges to data security and privacy protection.As one of the technologies to protect data and resource security
access authentication faces enormous communication loads while obtaining trust from all data nodes
which can cause data loss and damage.Therefore
a blockchain based research method for multi-source network big data security access permission authentication was proposed.The transformation status of data in network transmission using similarity relationships was measured
and the probability of multi-source network data access based on the similarity matrix was calculated.The data security access contracts were established through blockchain technology
calibrating data access attributes and transaction ciphertexts
and compressing data within corresponding attributes.The access reliability based on the purpose of the access was analyzed
reliability was used as the standard to correspond to the security level
rules under different levels of reliability were accessed
specific permissions were authenticated for data security access
and implementation methods were designed.The experimental results show that using different data attribute contents as testing conditions
encrypting and decrypting data in both conventional and attack modes
the new method can achieve fast authentication response and secure access to network data.
唐坤剑 , 冯光辉 . 大规模网络跨域云安全访问控制方法仿真 [J ] . 计算机仿真 , 2023 , 40 ( 2 ): 434 - 437 , 529 .
TANG K J , FENG G H . Simulation of cross domain cloud security access control methods for large-scale networks [J ] . Computer Simulation , 2023 , 40 ( 2 ): 434 - 437 , 529 .
刘东 , 任海玲 . 基于差分隐私的大数据安全访问权限认证仿真 [J ] . 计算机仿真 , 2021 , 38 ( 8 ): 421 - 424 , 486 .
LIU D , REN H L . Big data security access authentication simulation based on differential privacy [J ] . Computer Simulation , 2021 , 38 ( 8 ): 421 - 424 , 486 .
郑荣 , 高志豪 , 魏明珠 , 等 . 基于联盟区块链的政府数据协同治理平台框架研究:以全国碳排放权交易市场为例 [J ] . 情报学报 , 2022 , 41 ( 10 ): 1071 - 1084 .
ZHENG R , GAO Z H , WEI M Z , et al . Framework of the government-data collaborative governance platform based on the alliance blockchain:considering the national carbon emissions trading market as an example [J ] . Journal of the China Society for Scientific and Technical Information , 2022 , 41 ( 10 ): 1071 - 1084 .
朱向荣 , 吴鸿祜 , 胡伟 . FactChain:一个基于区块链的众包知识融合系统 [J ] . 软件学报 , 2022 , 33 ( 10 ): 3546 - 3564 .
ZHU X R , WU H H , HU W . FactChain:a blockchain-based crowdsourcing knowledge fusion system [J ] . Journal of Software , 2022 , 33 ( 10 ): 3546 - 3564 .
赖业宁 , 封科 , 于同伟 , 等 . 基于 DHT 和区块链技术的电网安全稳定控制终端分布式认证 [J ] . 中国电力 , 2022 , 55 ( 4 ): 44 - 53 .
LAI Y N , FENG K , YU T W , et al . Distributed authentication of power grid safety and stability control terminals based on DHT and blockchain [J ] . Electric Power , 2022 , 55 ( 4 ): 44 - 53 .
杨坤伟 , 杨波 , 周彦伟 . 群智网络中基于区块链的有序聚合签名认证方案 [J ] . 电子学报 , 2022 , 50 ( 2 ): 358 - 365 .
YANG K W , YANG B , ZHOU Y W . A sequential aggregate signature authentication scheme based on blockchain for crowdsensing system [J ] . Acta Electronica Sinica , 2022 , 50 ( 2 ): 358 - 365 .
宋涛 , 李秀华 , 李辉 , 等 . 大数据时代下车联网安全加密认证技术研究综述 [J ] . 计算机科学 , 2022 , 49 ( 4 ): 340 - 353 .
SONG T , LI X H , LI H , et al . Overview of research on security encryption authentication technology of IoV in big data era [J ] . Computer Science , 2022 , 49 ( 4 ): 340 - 353 .
廉文娟 , 赵朵朵 , 范修斌 , 等 . 基于认证及区块链的 CFL BLP_BC模型 [J ] . 计算机科学 , 2021 , 48 ( 11 ): 36 - 45 .
LIAN W J , ZHAO D D , FAN X B , et al . CFL BLP BC model based on authentication and blockchain [J ] . Computer Science , 2021 , 48 ( 11 ): 36 - 45 .
张利华 , 张赣哲 , 曹宇 , 等 . 基于区块链的智能家居认证与访问控制方案 [J ] . 计算机应用研究 , 2022 , 39 ( 3 ): 863 - 867 , 873 .
ZHANG L H , ZHANG G Z , CAO Y , et al . Authentication and access control scheme for smart home based on blockchain [J ] . Application Research of Computers , 2022 , 39 ( 3 ): 863 - 867 , 873 .
耿文莉 , 高梦瑜 . 基于灰色神经网络的云平台大数据安全风险评估 [J ] . 科学技术与工程 , 2021 , 21 ( 28 ): 11932 - 11937 .
GENG W L , GAO M Y . Security risk assessment of big data on cloud platform based on grey neural network [J ] . Science Technology and Engineering , 2021 , 21 ( 28 ): 11932 - 11937 .
张山山 . 基于区块链的舰船航行大数据共享安全认证研究 [J ] . 舰船科学技术 , 2021 , 43 ( 18 ): 82 - 84 .
ZHANG S S . Research on security authentication of ship navigation big data sharing based on blockchain [J ] . Ship Science and Technology , 2021 , 43 ( 18 ): 82 - 84 .
彭红艳 , 李杰 , 石贞奎 , 等 . 一种基于区块链可验证的加密图像检索方案 [J ] . 计算机工程 , 2022 , 48 ( 2 ): 25 - 33 , 39 .
PENG H Y , LI J , SHI Z K , et al . A blockchain-based verifiable encrypted image retrieval scheme [J ] . Computer Engineering , 2022 , 48 ( 2 ): 25 - 33 , 39 .
黄更生 , 黄宇红 , 郭漫雪 , 等 . DT 时代面向数据服务的新型基础设施架构 [J ] . 电信科学 , 2022 , 38 ( 7 ): 138 - 145 .
HUANG G S , HUANG Y H , GUO M X , et al . Architecture of a new infrastructure for data service in DT era [J ] . Telecommunications Science , 2022 , 38 ( 7 ): 138 - 145 .
李养群 , 张登银 . 物品万维网资源管理框架研究与应用 [J ] . 物联网学报 , 2022 , 6 ( 2 ): 50 - 64 .
LI Y Q , ZHANG D Y . Research and application of Web of things resource management framework [J ] . Chinese Journal on Internet of Things , 2022 , 6 ( 2 ): 50 - 64 .
晏燕 , 丛一鸣 , MAHMOOD A , 等 . 基于深度学习的位置大数据统计发布与隐私保护方法 [J ] . 通信学报 , 2022 , 43 ( 1 ): 203 - 216 .
YAN Y , CONG Y M , MAHMOOD A , et al . Statistics release and privacy protection method of location big data based on deep learning [J ] . Journal on Communications , 2022 , 43 ( 1 ): 203 - 216 .
林楠 , 吴林峰 , 方洪波 . 大数据环境下电力网络数据安全入侵模型仿真 [J ] . 现代电子技术 , 2022 , 45 ( 4 ): 118 - 122 .
LIN N , WU L F , FANG H B . Simulation of intrusion model for power network data security in big data environment [J ] . Modern Electronics Technique , 2022 , 45 ( 4 ): 118 - 122 .
牛淑芬 , 方丽芝 , 宋蜜 , 等 . 智慧城市中隐私保护性广播加密算法 [J ] . 计算机工程与科学 , 2022 , 44 ( 6 ): 1003 - 1012 .
NIU S F , FANG L Z , SONG M , et al . Privacy-preserving broadcast encryption in smart city [J ] . Computer Engineering &Science , 2022 , 44 ( 6 ): 1003 - 1012 .
曾智勇 , 洪睿 , 李祥林 . 物联网下差异设备兼容数据安全访问控制模型研究 [J ] . 自动化仪表 , 2022 , 43 ( 8 ): 112 - 117 .
ZENG Z Y , HONG R , LI X L . Research on disparate device compatible data security access control model under IoT [J ] . Process Automation Instrumentation , 2022 , 43 ( 8 ): 112 - 117 .
谭继安 . 基于决策树和混合神经网络的大数据攻击增量检测研究 [J ] . 计算机应用与软件 , 2022 , 39 ( 7 ): 329 - 335 , 349 .
TAN J A . Incremental detection for big data attacks based on decision tree and hybrid neural network [J ] . Computer Applications and Software , 2022 , 39 ( 7 ): 329 - 335 , 349 .
刘龙庚 . 基于异构网络空管安全监控关联算法研究 [J ] . 信息网络安全 , 2022 ( 4 ): 58 - 66 .
LIU L G . Research on association algorithm of heterogeneous network security monitoring [J ] . Netinfo Security , 2022 ( 4 ): 58 - 66 .
殷昱煜 , 叶炳跃 , 梁婷婷 , 等 . 边缘计算场景下的多层区块链网络模型研究 [J ] . 计算机学报 , 2022 , 45 ( 1 ): 115 - 134 .
YIN Y Y , YE B Y , LIANG T T , et al . Research on multi-layer blockchain network model in edge computing [J ] . Chinese Journal of Computers , 2022 , 45 ( 1 ): 115 - 134 .
王育齐 , 陈庚 , 钱伟中 . 区块链环境下用户身份匿名的量子委托计算协议 [J ] . 电子科技大学学报 , 2022 , 51 ( 6 ): 802 - 811 .
WANG Y Q , CHEN G , QIAN W Z . Quantum delegate computing protocol with anonymous user identity in blockchain scenario [J ] . Journal of University of Electronic Science and Technology of China , 2022 , 51 ( 6 ): 802 - 811 .
黄晓舸 , 刘鑫 , 何勇 , 等 . 基于区块链的雾网络中的任务卸载优化方案研究 [J ] . 电子与信息学报 , 2022 , 44 ( 7 ): 2440 - 2448 .
HUANG X G , LIU X , HE Y , et al . Research on optimization scheme of task offloading in blockchain-enabled fog networks [J ] . Journal of Electronics & Information Technology , 2022 , 44 ( 7 ): 2440 - 2448 .
钟运琴 , 朱月琴 , 焦守涛 . 边缘大数据分析预测建模方法研究 [J ] . 高技术通讯 , 2022 , 32 ( 10 ): 1067 - 1075 .
ZHONG Y Q , ZHU Y Q , JIAO S T . Research on edge big data analysis and predictive modeling method [J ] . Chinese High Technology Letters , 2022 , 32 ( 10 ): 1067 - 1075 .
杨昌霖 , 王继光 , 汪清 . 无线物联网中局部有向无环图区块链研究 [J ] . 计算机应用研究 , 2022 , 39 ( 9 ): 2597 - 2602 .
YANG C L , WANG J G , WANG Q . Local directed acyclic graph blockchain in wireless Internet of Things [J ] . Application Research of Computers , 2022 , 39 ( 9 ): 2597 - 2602 .
李娜 , 周瑛 , 曹丽娜 . 串口服务器内外网数据安全通信方法仿真 [J ] . 计算机仿真 , 2022 , 39 ( 7 ): 208 - 212 .
LI N , ZHOU Y , CAO L N . Simulation of secure data communication method between internal and external network of serial port server [J ] . Computer Simulation , 2022 , 39 ( 7 ): 208 - 212 .
姚云霞 , 张国权 . 区块链数据防篡改备份恢复算法与仿真 [J ] . 计算机仿真 , 2022 , 39 ( 11 ): 411 - 415 .
YAO Y X , ZHANG G Q . Algorithm and simulation for blockchain data tamper-proof backup and recovery [J ] . Computer Simulation , 2022 , 39 ( 11 ): 411 - 415 .
0
浏览量
155
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构