Institute of Computing Technology, Chinese Academy IR
Security risk and response analysis of typical application architecture of information and communication blockchain | |
Zhao, Hongwei1; Zhang, Moli2; Wang, Shi3; Li, Entang4; Guo, Zhenhua5; Sun, Dianmin6 | |
2020-11-23 | |
发表期刊 | NEURAL COMPUTING & APPLICATIONS |
ISSN | 0941-0643 |
页码 | 11 |
摘要 | As the role of blockchain technology in various industries becomes more and more important, the technical limitations of its consensus mechanism, private key management and smart contracts are gradually emerging. However, security events such as blockchain platform applications are emerging one after another. As a new round of transformative power in the network era, it combines the blockchain with existing technologies to generate new formats and new models. Technology applications and existing cybersecurity regulatory policies have brought new challenges. This paper analyzes the typical application architecture of blockchain technology, and analyzes the security risks of blockchain application architecture from key layers such as storage layer, protocol layer, extension layer, and application layer. This article combines the DOC mechanism with IOT application scenarios to propose a blockchain-based confidential IOT service model (Beekeeper 1.0) that supports first-order homomorphic multiplication, and a blockchain-based confidential IOT service model that supports high-order homomorphic multiplication (Beekeeper 2.0), Beekeeper 2.0 significantly improves Beekeeper 1.0 in server capabilities, verification efficiency, verification key length, and device work diversity. This article finds that the chain code call delay basically increases with the increase in the transaction sending rate. When the transaction sending rate reaches 300TPS, the chain code calling delay only increases a little, and when the transaction sending rate reaches 300TPS, the success rate of the transaction on the chain increases. Finally, the average blockchain access delay increases with the increase in the transaction sending rate. The blockchain access delay is affected by less throughput, and the transaction success rate is stable at 98%. |
关键词 | Information and communication blockchain Network security risks Homomorphic verifiable secret sharing Risk response |
DOI | 10.1007/s00521-020-05508-z |
收录类别 | SCI |
语种 | 英语 |
资助项目 | Major scientific and technological innovation projects in Shandong Province[2019JZZY011101] |
WOS研究方向 | Computer Science |
WOS类目 | Computer Science, Artificial Intelligence |
WOS记录号 | WOS:000592104700001 |
出版者 | SPRINGER LONDON LTD |
引用统计 | |
文献类型 | 期刊论文 |
条目标识符 | http://119.78.100.204/handle/2XEOYT63/16068 |
专题 | 中国科学院计算技术研究所期刊论文_英文 |
通讯作者 | Sun, Dianmin |
作者单位 | 1.Shandong Luneng Software Technol Co Ltd, Jinan 256001, Shandong, Peoples R China 2.Henan Univ Sci & Technol, Sch Informat Engn, Luoyang 471000, Henan, Peoples R China 3.Chinese Acad Sci, Inst Comp Technol, Key Lab Intelligent Informat Proc, Beijing, Peoples R China 4.Shandong First Med Univ, Shandong Prov Hosp, Sci Res Dept, Jinan 250117, Shandong, Peoples R China 5.Inspur Elect Informat Ind Co Ltd, State Key Lab High End & Storage Technol, Jinan 250013, Shandong, Peoples R China 6.Shandong First Med Univ, Shandong Univ, Shandong Canc Hosp & Inst,Shandong Canc Hosp, Dept Thorac Surg,Shandong Acad Med Sci, Jinan 250117, Shandong, Peoples R China |
推荐引用方式 GB/T 7714 | Zhao, Hongwei,Zhang, Moli,Wang, Shi,et al. Security risk and response analysis of typical application architecture of information and communication blockchain[J]. NEURAL COMPUTING & APPLICATIONS,2020:11. |
APA | Zhao, Hongwei,Zhang, Moli,Wang, Shi,Li, Entang,Guo, Zhenhua,&Sun, Dianmin.(2020).Security risk and response analysis of typical application architecture of information and communication blockchain.NEURAL COMPUTING & APPLICATIONS,11. |
MLA | Zhao, Hongwei,et al."Security risk and response analysis of typical application architecture of information and communication blockchain".NEURAL COMPUTING & APPLICATIONS (2020):11. |
条目包含的文件 | 条目无相关文件。 |
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。
修改评论