Security risk and response analysis of typical application architecture of information and communication blockchain
文献类型:期刊论文
作者 | Zhao, Hongwei1; Zhang, Moli2; Wang, Shi3; Li, Entang4; Guo, Zhenhua5; Sun, Dianmin6 |
刊名 | NEURAL COMPUTING & APPLICATIONS
![]() |
出版日期 | 2020-11-23 |
页码 | 11 |
关键词 | Information and communication blockchain Network security risks Homomorphic verifiable secret sharing Risk response |
ISSN号 | 0941-0643 |
DOI | 10.1007/s00521-020-05508-z |
英文摘要 | As the role of blockchain technology in various industries becomes more and more important, the technical limitations of its consensus mechanism, private key management and smart contracts are gradually emerging. However, security events such as blockchain platform applications are emerging one after another. As a new round of transformative power in the network era, it combines the blockchain with existing technologies to generate new formats and new models. Technology applications and existing cybersecurity regulatory policies have brought new challenges. This paper analyzes the typical application architecture of blockchain technology, and analyzes the security risks of blockchain application architecture from key layers such as storage layer, protocol layer, extension layer, and application layer. This article combines the DOC mechanism with IOT application scenarios to propose a blockchain-based confidential IOT service model (Beekeeper 1.0) that supports first-order homomorphic multiplication, and a blockchain-based confidential IOT service model that supports high-order homomorphic multiplication (Beekeeper 2.0), Beekeeper 2.0 significantly improves Beekeeper 1.0 in server capabilities, verification efficiency, verification key length, and device work diversity. This article finds that the chain code call delay basically increases with the increase in the transaction sending rate. When the transaction sending rate reaches 300TPS, the chain code calling delay only increases a little, and when the transaction sending rate reaches 300TPS, the success rate of the transaction on the chain increases. Finally, the average blockchain access delay increases with the increase in the transaction sending rate. The blockchain access delay is affected by less throughput, and the transaction success rate is stable at 98%. |
资助项目 | Major scientific and technological innovation projects in Shandong Province[2019JZZY011101] |
WOS研究方向 | Computer Science |
语种 | 英语 |
WOS记录号 | WOS:000592104700001 |
出版者 | SPRINGER LONDON LTD |
源URL | [http://119.78.100.204/handle/2XEOYT63/16067] ![]() |
专题 | 中国科学院计算技术研究所期刊论文_英文 |
通讯作者 | Sun, Dianmin |
作者单位 | 1.Shandong Luneng Software Technol Co Ltd, Jinan 256001, Shandong, Peoples R China 2.Henan Univ Sci & Technol, Sch Informat Engn, Luoyang 471000, Henan, Peoples R China 3.Chinese Acad Sci, Inst Comp Technol, Key Lab Intelligent Informat Proc, Beijing, Peoples R China 4.Shandong First Med Univ, Shandong Prov Hosp, Sci Res Dept, Jinan 250117, Shandong, Peoples R China 5.Inspur Elect Informat Ind Co Ltd, State Key Lab High End & Storage Technol, Jinan 250013, Shandong, Peoples R China 6.Shandong First Med Univ, Shandong Univ, Shandong Canc Hosp & Inst,Shandong Canc Hosp, Dept Thorac Surg,Shandong Acad Med Sci, Jinan 250117, Shandong, Peoples R China |
推荐引用方式 GB/T 7714 | Zhao, Hongwei,Zhang, Moli,Wang, Shi,et al. Security risk and response analysis of typical application architecture of information and communication blockchain[J]. NEURAL COMPUTING & APPLICATIONS,2020:11. |
APA | Zhao, Hongwei,Zhang, Moli,Wang, Shi,Li, Entang,Guo, Zhenhua,&Sun, Dianmin.(2020).Security risk and response analysis of typical application architecture of information and communication blockchain.NEURAL COMPUTING & APPLICATIONS,11. |
MLA | Zhao, Hongwei,et al."Security risk and response analysis of typical application architecture of information and communication blockchain".NEURAL COMPUTING & APPLICATIONS (2020):11. |
入库方式: OAI收割
来源:计算技术研究所
浏览0
下载0
收藏0
其他版本
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。