Please wait a minute...

����Ŀ¼

    15 April 2019, Volume 5 Issue 2
    Special Column:Blockchain Technology
    Traceability permissioned chain consensus mechanism based on double-layer architecture
    Qingyang DING, Jianming ZHU, Jin ZHANG, Biao SONG, Yanjing XU, Chuanchang JIA, Zheng GAO
    2019, 5(2):  1-12.  doi:10.11959/j.issn.2096-109x.2019011
    Asbtract ( 3825 )   HTML ( 1054)   PDF (1291KB) ( 3137 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The blocks in the blockchain are arranged in chronological and historical order,and the blockchain is incapable of modification through data encryption technology and consensus mechanism,which makes product trace ability to be an important application scenario of blockchain.To choose product information traceability technology,not only the feasibility of the technology but also the market attributes of the product and the producer should be considered,which makes the permissioned chain replace the public chain as an important deployment method of product information traceability.In the existing research results,the research on the traceability license chain mainly focuses on mechanism design and framework construction,and the consensus algorithm applicable to product information traceability is rarely studied.In the process of technology of engineering practice,practical byzantine fault tolerance was chosen more in league chain as the consensus of traceability chain mechanism (such as Hyperledger),but with the increasing number of participating nodes of the traceability chain efficiency will be significantly reduced,and the delay time will be significantly improved,resulting in most of the project is still in the stage of experiment.Based on this,a traceability license chain consensus mechanism based on double-layer architecture (DLPCM) is proposed,and its security is analyzed.Participants are divided into two layers on the vertical dimension,and different consensus mechanisms are adopted at different levels according to different deployment modes of blockchain.Finally,the traceability information query mechanism under the consensus mechanism is introduced,an important reference for the development and design of traceability system based on license chain is provided.

    Design and analysis of enterprise management system framework based on blockchain
    Wei ZHAO,Wenyin ZHANG,Jiuru WANG,Yawei ZHANG
    2019, 5(2):  13-22.  doi:10.11959/j.issn.2096-109x.2019013
    Asbtract ( 3091 )   HTML ( 89)   PDF (1128KB) ( 893 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    How to enhance the management of modern enterprises by blockchain technology has attracted more and more attention.ERP (enterprise resource planning) technology combined modern information technology with enterprise production process management,and effectively strengthened the work efficiency and management level of enterprises.But there were inherent pain points such as equipment security,data security,industrial control security,information leakage and so on.Aimed at the problems exposed by ERP system,a blockchain based framework mod el of ERP system proposed by taking advantage of the characteristics of decentralization,de-trust,openness and transparency,trusted database and traceability of blockchain.The key point is to solved the problem of credible and efficient data collaboration in the production and management process of enterprises.Combine with the incentive mechanism of blockchain,use token to strengthen collaborative management and improve efficiency,which provide a new idea for enterprise performance evaluation and assessment.

    Decentralized searchable encryption scheme based on dynamic accumulator
    Yan ZHANG,Jinfan WANG,Zhuyun QI,Rongwei YANG,Yi WANG
    2019, 5(2):  23-29.  doi:10.11959/j.issn.2096-109x.2019014
    Asbtract ( 1838 )   HTML ( 35)   PDF (690KB) ( 872 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Since the flourish of the blockchain technology,a series of applications based on blockchain technology are emerging,and the decentralized storage service becomes the killer App in the decentralized markets,such as StorJ,Filecoin.Comparing with the centralized storage,decentralized storage are more secure,cheaper and more scalable.However,client’s privacy cannot be protected in existed decentralized storage apps.The idea of implementing the searchable encryption scheme with decentralized storage was proposed to improve the user’s privacy and utilizing the dynamic accumulator to improve the search efficiency of the searchable encryption scheme.

    Truthful incentive mechanism for “digital currency”based on privacy protection
    Xiao CHEN,Xinran LYU,Zhi LIU
    2019, 5(2):  30-39.  doi:10.11959/j.issn.2096-109x.2019012
    Asbtract ( 1409 )   HTML ( 21)   PDF (702KB) ( 843 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Many national central banks have conducted legal digital currency research based on distributed ledger technology,but only the UK has disclosed the accounting structure of the legal digital currency framework RSCoin,and the incentive mechanisms was proposed to encourage mintettes to provide honest collaborative accounting services.However,this mechanism does not take into account the differential service costs of mintettes,nor does it give a definite compensation distribution.The privacy costs of the mintettes were fully considered,the incentive model of the central bank and mintettes were established,and the methods were clarified to compensate mintettes.In the legal digital currency research area,an incentive mechanism POPTIM was proposed firstly,that not only protects the private cost of the mintettes,but also guarantees the mintettes report their truthful bidding prices to the central banks.POPTIM first encrypts the biddings of mintettes by coding hash encryption method,then adopts privacy-preserving sorting algorithm to select the winner mintettes,and finally calculates the reward of mintettes based on the homomorphic addition algorithm.The analysis shows that the mechanism is privacy security,computationally efficient,individually rational and truthful simultaneously.

    Papers
    Delegation authorization mechanism with controllable permissions propagation for IoT devices sharing
    Yubo SONG, Shanshan QI, Aiqun HU
    2019, 5(2):  40-49.  doi:10.11959/j.issn.2096-109x.2019015
    Asbtract ( 1655 )   HTML ( 567)   PDF (689KB) ( 1660 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to solve the problems of privilege sensitivity protection and the abuse of authorization by the agent when the device owner delegates authorization in IoT devices sharing environment,a trust-based delegation mechanism for controllable partial permissions was proposed with the trust access control model and the proxy signature.This mechanism generates trust values and authorization policies based on the relationship between the users,and implements controllable partial authority delegation through the proxy signature.According to the security analysis,the mechanism can meet the security attributes such as verifiability,non-repudiation,distinguishability,identifiability and non-abuse required by the permission transfer,and ensure the controllable security transfer of the device owner's permission.The problem of over authorization of an intermediary agent is effectively prevented.

    Information flow integrity measurement method using integrity threat tree
    Qixuan WU,Jianfeng MA,Cong SUN
    2019, 5(2):  50-57.  doi:10.11959/j.issn.2096-109x.2019016
    Asbtract ( 1422 )   HTML ( 22)   PDF (828KB) ( 496 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to avert the drawback of traditional information flow integrity analysis on ignoring the specific system architecture and associated attack events,an integrity threat tree to quantify the integrity of the system information flow,and the conditional trigger gate to model the associated attack events were proposed.The attack cost was used to quantify the degree of difficulty on attacking each channel.According to the architecture-related integrity threat tree,the minimum attack cost and corresponding target channel set required to achieve the attack target were solved by using the satisfiability modulo theories.The practicality of our approach was demonstrated by the modeling and analysis of the actual flight control system models,and the influence of the conditional trigger gate parameters on the system integrity was discussed.

    Security evaluation method for confidential and stable complex systems
    Jinxin ZUO,Ziyu GUO,Jin LI,Jie ZHANG,Yueming LU
    2019, 5(2):  58-65.  doi:10.11959/j.issn.2096-109x.2019017
    Asbtract ( 1299 )   HTML ( 21)   PDF (1508KB) ( 635 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Confidential and stable complex systems are characterized by high confidentiality requirements,continuous and stable operation requirements,and complex network structure,but existing evaluation models has a single dimension of security objectives and lack the correlation analysis among indicators.In view of this,a comprehensive security evaluation model based on the correlation analysis of indicators is proposed and eight security objectives covering confidentiality,availability,controllability,identifiability,personnel organization,risk management,enterprise grading and sustainability at three levels of product,system and service have been established.Taking the confidentiality of the smart medical IoT as an example,a sorting and weight confirmation algorithm based on index correlation is constructed,and the fuzzy comprehensive evaluation method is used to evaluate the selected system.

    New collaborative DDoS defense technology based on NFV
    Chuanfeng XU,Hui LIN,Xuancheng GUO,Xiaoding WANG
    2019, 5(2):  66-76.  doi:10.11959/j.issn.2096-109x.2019018
    Asbtract ( 1118 )   HTML ( 29)   PDF (1136KB) ( 713 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To solve the problem of selfish behavior for self-security due to limited resources in the process of resisting distributed denial of service (DDoS) attacks by a collaborative network built with network function virtualization (NFV) technology,a new collaborative DDoS defense network model was proposed.a repeat prisoner's dilemma game model was built in the collaborative network,a reward and punishment incentive mechanism was introduced to strengthen the cooperation of the collaborative network,and a dynamic resource allocation mechanism based on social reputation value assessment was adopted.Simulation results show that the new collaborative DDoS attack defense technology outperforms existing solutions in terms of packet loss rate,cooperation,and resource allocation rate,improving the effectiveness of DDoS attack defense.

    Research and development of network representation learning
    Ying YIN,Lixin JI,Ruiyang HUANG,Lixin DU
    2019, 5(2):  77-87.  doi:10.11959/j.issn.2096-109x.2019019
    Asbtract ( 825 )   HTML ( 43)   PDF (1084KB) ( 980 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Network representation learning is a bridge between network raw data and network application tasks which aims to map nodes in the network to vectors in the low-dimensional space.These vectors can be used as input to the machine learning model for social network application tasks such as node classification,community discovery,and link prediction.The traditional network representation learning methods are based on homogeneous information network.In the real world,the network is often heterogeneous with multiple types of nodes and edges.Moreover,from the perspective of time,the network is constantly changing.Therefore,the research method of network representation learning is continuously optimized with the complexity of network data.Different kinds of network representation learning methods based on different networks were introduced and the application scenarios of network representation learning were expounded.

    Method for robust enhancement of P2P network
    Hao ZHAO,Wei LIN,Shengli LIU
    2019, 5(2):  88-94.  doi:10.11959/j.issn.2096-109x.2019020
    Asbtract ( 551 )   HTML ( 25)   PDF (793KB) ( 419 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the widespread use of the Internet,the stability of network communication management architecture and service provision has become increasingly important.A P2P network model based on neighbor-neighbor lists was constructed,and two algorithms(network repairing and pruning) were proposed to improve the reliability and robustness of the network structure.Simulation experiments show that the proposed model and algorithm can effectively improve the self-healing of P2P networks under given threat conditions.

Copyright Information
Bimonthly, started in 2015
Authorized by:Ministry of Industry and Information Technology of the People's Republic of China
Sponsored by:Posts and Telecommunications Press
Co-sponsored by:Xidian University, Beihang University, Huazhong University of Science and Technology, Zhejiang University
Edited by:Editorial Board of Chinese Journal of Network and Information Security
Editor-in-Chief:FANG Bin-xing
Executive Editor-in-Chief:LI Feng-hua
Director:Xing Jianchun
Address:F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Tel:010-53879136/53879138/53879139
Fax:+86-81055464
ISSN 2096-109X
CN 10-1366/TP
visited
Total visitors:
Visitors of today:
Now online: