共享数据链:采用区块链的一种基于负数据库的新型防内部泄漏共享数据方案(英文)Shared-data chain:a new anti-internal leakage shared data scheme using negative database with blockchain
朱宏峰;王紫熙;刘天华;
摘要(Abstract):
计算机科技的崛起给人们带来了很多的便利,但与此同时,网络安全面临着前所未有的挑战。以满足未来更高级别安全能力为出发点,提出了一种新型的基于区块链的抗泄露认证数据分享方案。在互联网企业之间分享用户信息的过程中,用户信息易被窃取或篡改,其中公司内部员工有意或无意泄露敏感数据尤为严重,影响到信息作为资产进行统一安全共享的效率,为此,本文使用信息负表示进行信息共享,结合区块链的去中心化、开放性、难以篡改的技术特征,并利用运行在区块链上的智能合约降低公司信任成本,解决上述问题,提高工作效率,同时推动社会发展智能化。
关键词(KeyWords): 信息安全;区块链;智能合约;负数据库
基金项目(Foundation): Project supported by Plan of Natural Science Foundation of Liaoning province(201602680,20180550536)
作者(Author): 朱宏峰;王紫熙;刘天华;
Email:
DOI:
参考文献(References):
- [1]PRENEEL B.State of the Art in Applied Cryptography[M].Berlin:Springer,1999:49-104.
- [2]ASHOK A,POORNACHANDRAN P,ACHUTHAN K.Recent Trends in Computer Networks and Distributed Systems Security[M].Berlin:Springer,2012:168-177.
- [3]ITAKURA Y,TSUJII S.Proposal on a multifactor biometric authentication method based on cryptosystem keys containing biometric signatures[J].International Journal of Information Security,2005,4(4):288-296.
- [4]ESPONDA F,ACKLEY E S,FORREST S,et al.Artificial Immune Systems[M].Berlin:Springer,2004:175-188.
- [5]ESPONDA F,FORREST S,HELMAN P.A formal framework for positive and negative detection schemes[J].IEEETransactions on Systems Man&Cybernetics Part B Cybernetics A Publication of the IEEE Systems Man&Cybernetics Society,2004,34(1):357-73.
- [6]ESPONDA F,FORREST S,HELMAN P.Negative representations of information[J].International Journal of Information Security,2009,8(5):331-345.
- [7]ESPONDA F,ACKLEY E S,FORREST S,et al.Online Negative Databases(with Experimental Result)[J].International Journal of Unconventional Computing,2005,1(3):201-220.
- [8]ESPONDA F,ACKLEY E S,HELMAN P,et al.Protecting data privacy through hard-to-reverse negative databases[J].International Journal of Information Security,2007,6(6):403-415.
- [9]ESPONDA F,TRIAS E D,FORREST S,et al.A relational algebra for negative databases[J].University of New Mexico,2007.
- [10]ESPONDA F.Everything that is not important:Negative databases[J].Computational Intelligence Magazine IEEE,2008,3(2):60-63.
- [11]ESPONDA F.Hiding a Needle in a Haystack Using Negative Databases[M].Berlin:Springer,2008:15-29.
- [12]SZABO N.Formalizing and Securing Relationships on Public Networks[J].First Monday,1997,2(9).
- [13]KOSBA A,MILLER A,SHI E,et al.Hawk:The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts[C]∥2016IEEE Symposium on Security and Privacy(SP).IEEE,2016.
- [14]NAKAMOTO S.Bitcoin:A peer-to-peer electronic cash system[EB/OL].[2018-08-28].https:∥bitcoin.org/bitcoin.pdf.
- [15]MILLER V S.Use of Elliptic Curves in Cryptography[M].Berlin:Springer,1985:417-426.
- [16]XIE H,KULIK L,TANIN E.Privacy-aware collection of aggregate spatial data[J].Data and Knowledge Engineering,2011,70(6):576-595.
- [17]HOREY J,GROAT M M,FORREST S,et al.Anonymous Data Collection in Sensor Networks[C]∥Mobile and Ubiquitous Systems:Networking&Services,2007.MobiQuitous 2007.Fourth Annual International Conference on.IEEE,2007.
- [18]GROAT M M,EDWARDS B,HOREY J,et al.Enhancing privacy in participatory sensing applications with multidimensional data[C]∥IEEE International Conference on Pervasive Computing&Communications.IEEE,2012.
- [19]GROAT M M,EDWARDS B,HOREY J,et al.Application and Analysis of Multidimensional Negative Surveys in Participatory Sensing Applications[J].Pervasive and Mobile Computing,2013,9(3):327-391.
- [20]HOREY J,FORREST S,GROAT M.Reconstructing Spatial Distributions from Anonymized Locations[C]∥IEEEInternational Conference on Data Engineering Workshops.IEEE Computer Society,2012:243-250.
- [21]BAO Y,LUO W,ZHANG X.Estimating positive surveys from negative surveys[J].Statistics&Probability Letters,2013,83(2):551-558.
- [22]BAO Y,LUO W,LU Y.On the dependable level of the negative survey[J].Statistics&Probability Letters,2014,89:31-40.
- [23]DU X,LUO W,ZHAO D.Negative Publication of Data[J].International Journal of Immune Computation,2014,2(2):1-14.
- [24]ESPONDA F,FORREST S,HELMAN P.Enhancing privacy through negative representations of data[J].Enhancing Privacy Through Negative Representations of Data,2004.
- [25]JIA H,MOORE C,STRAIN A D.Generating Hard Satisfiable Formulas by Hiding Solutions Deceptively[J].Journal of Artificial Intelligence Research,2007,28(1):384-389.
- [26]LIU R,LUO W,WANG X.A Hybrid of the prefix algorithm and the q-hidden algorithm for generating single negative databases[C]∥Computational Intelligence in Cyber Security.IEEE,2011.
- [27]LIU R,LUO W,YUE L.The p-hidden Algorithm:Hiding Single Databases More Deeply[J].International Journal of Immune Computation,2014,2(1):43-55.
- [28]STALLINGS W.Cryptography and Network Security:Principles and Practice[M].Upper Saddle River:Prentice Hall,2010.
- [29]ZHAO D,LUO W,LIU R,et al.A fine-grained algorithm for generating hard-toreverse negative databases[C]∥International Workshop on Artificial Immune Systems.IEEE,2016.