期刊文献+

区块链在数据安全领域的研究进展 被引量:97

Research Progress of Blockchain in Data Security
在线阅读 下载PDF
导出
摘要 大数据时代,数据已成为驱动社会发展的重要的资产.但是数据在其全生命周期均面临不同种类、不同层次的安全威胁,极大降低了用户进行数据共享的意愿.区块链具有去中心化、去信任化和防篡改的安全特性,为降低信息系统单点化的风险提供了重要的解决思路,能够应用于数据安全领域.该文从数据安全的核心特性入手,介绍区块链在增强数据机密性、数据完整性和数据可用性三个方向的最新研究成果,对各研究方向存在的缺陷进行分析,进而对未来发展方向进行了展望.该文认为,区块链技术的合理应用能够增强分布式环境下的数据安全,有着广阔的前景. In the era of big data,data has become an important asset driving social development.However,data faces different types and different levels of security threats throughout its life cycle,which greatly reduces users’willingness to share data.Blockchain has several security features such as decentralization,immutable,and tamper resistance.It provides an important solution for reducing the risk of a single point of information systems and can be applied to the field of data security.This article starts with the core characteristics of data security,and introduces the latest research results of blockchain in three directions:confidentiality,integrity,and availability.At first,this paper analyzes the shortcomings of each research direction.In terms of data confidentiality,the blockchain can effectively supplement data confidentiality protection in 5 areas.(1)Blockchain can be applied to enhance the security of data encryption,establish a decentralized trusted third party for cryptographic protocols,and provide a reliable incentive mechanism.For example,it can be applied to searchable encryption,proxy re-encryption,and secure multiparty computing.(2)Blockchain is applied to identity authentication,which can realize decentralized PKI technology and identity management,solve the single point problem in identity authentication,the problem of certificate transparency,and the problem of malfeasance by certification centers.And it can establish a safe and trusted digital identity authentication system.(3)Blockchain can apply access control.On the one hand,it can solve the problem of single point of access control,providing a more robust access control system for common scenarios and IoT scenarios,and achieving the management of access policies and transactions of access rights.On the other hand,it can improve the credibility of attribute-based encryption authorization institutions,which improves the security of ABE.(4)The combination of blockchain and trusted execution technology can establish trusted remote state management which enhances the availability of TEE.(5)The application of blockchain to the construction of covert channels can solve problems such as communication tampering,single channels and poor privacy.In terms of data integrity,blockchain has three applications.(1)Blockchain can achieve data confirmation and traceability,establishing a credible flow trajectory for data.(2)Blockchain can be used to build a more credible log audit system and improve the security of information systems.(3)Blockchain can be combined with various industry applications to achieve more reliable data integrity protection.In terms of data availability,blockchain has two kinds of applications.(1)The blockchain itself is a solution to consistency in the byzantine environment,which can achieve byzantine consensus in a large-scale network environment.(2)A more secure and reliable distributed database system based on the blockchain.On the one hand,the blockchain itself can be used to implement a byzantine fault-tolerant distributed storage system.On the other hand,blockchain can supplement the shortcomings of existing distributed storage.Finally,this article analyzes the research of blockchain in the field of data security,summarizes the current research challenges.At last,focusing on blockchain efficiency,data security,privacy protection,infrastructure security,blockchain isomorphization,and practicality,this paper looks forward to future research.We believes that the correct application of blockchain technology can enhance data security in a distributed environment with broad prospects.
作者 刘明达 陈左宁 拾以娟 汤凌韬 曹丹 LIU Ming-Da;CHEN Zuo-Ning;SHI Yi-Juan;TANG Ling-Tao;CAO Dan(Jiangnan Institute of Computing Technology,Wuxi,Jiangsu 214083;Chinese Academy of Engineering,Beijing 100088)
出处 《计算机学报》 EI CSCD 北大核心 2021年第1期1-27,共27页 Chinese Journal of Computers
基金 国家科技重点专项“核高基”(2017ZX01028101) 国家自然科学基金(91430214,6732018)资助.
关键词 区块链 数据安全 数据共享 机密性 完整性 可用性 blockchain data security data sharing confidentiality integrity availability
作者简介 刘明达,博士研究生,主要研究方向为信息安全、区块链.E-mail:happyliumd@163.com;陈左宁,博士,教授,中国工程院院士,中国计算机学会(CCF)会士(提供会员号),主要研究领域为软件理论、操作系统、信息安全;拾以娟,博士,副研究员,主要研究方向为信息安全、区块链;汤凌韬,博士研究生,主要研究方向为网络安全;曹丹,博士,工程师,主要研究方向为网络安全、密码学.
  • 相关文献

参考文献36

二级参考文献327

  • 1周明天,谭良.可信计算及其进展[J].电子科技大学学报,2006,35(S1):686-697. 被引量:30
  • 2陈兰香,许力.云存储服务中可证明数据持有及恢复技术研究[J].计算机研究与发展,2012,49(S1):19-25. 被引量:28
  • 3林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:253
  • 4LIU Gang ZHOU Jingli SUN Yufen QIN Leihua.A Fault Detection Mechanism in Erasure-Code Byzantine Fault-Tolerance Quorum[J].Wuhan University Journal of Natural Sciences,2006,11(6):1453-1456. 被引量:1
  • 5Redman T. The impact of poor data quality on the typical enterprise [J]. Communications of the ACM, 1998, 41(2) : 79-82.
  • 6Miller D W, Yeast J D, Evans R L. Missing prenatal records at a birth center: A communication problem quantified [C] // Proc of AMIA Annual Syrup Proceedings. Maryland: American Medical Informatics Association, 2005 : 535-539.
  • 7Swartz N. Gartner warns firms of 'dirty data' [J]. Information Management Journal, 2007, 41(3): 6.
  • 8Kohn L T, Corrigan J M, Donaldson M S. To Err is Human: Building a Safer Health System [M]. Washington: National Academies Press, 2000.
  • 9Eckerson W. Data Warehousing Special Report Data quality and the bottom line [R]. Applications Development Trends, 2002.
  • 10English L P. Improving Data Warehouse and Business Information Quality: Methods for Reducing Costs and Increasing Profits [M]. New York: Wiley, 1999.

共引文献2176

同被引文献1073

引证文献97

二级引证文献469

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部