Telecommunications Science ›› 2018, Vol. 34 ›› Issue (3): 10-16.doi: 10.11959/j.issn.1000-0801.2018135
Special Issue: 区块链
• Topic:Cyberspace Security • Previous Articles Next Articles
Ye CHEN,Dongjin XU,Liang XIAO
Revised:
2018-03-01
Online:
2018-03-01
Published:
2018-04-02
Supported by:
CLC Number:
Ye CHEN,Dongjin XU,Liang XIAO. Survey on network security based on blockchain[J]. Telecommunications Science, 2018, 34(3): 10-16.
"
应用类型 | 相关工作 | 技术概述 | 性能优势 |
网络数据安全和隐私保护 | 移动平台上基于区块链的应用程序数据管理系统[ | 数据与权限分离,权限设置与数据访问情况记录于区块链 | 数据访问权限完全可控,数据操作过程对用户透明 |
基于区块链与智能合约的医疗信息管理体系MedRec[ | 数据权限与操作记录于区块链,由智能合约完成指令的执行 | 跨提供商整合完整的医疗信息,实现数据认证、保密、审计和共享 | |
基于区块链的无密钥签名架构[ | 每个时隙构造散列树,根散列值记录于区块链,进行多文件签名 | 对签名的文件进行篡改所需开销巨大,以保证文件的完整性 | |
物联网设备的权限与通信管理 | 基于区块链的物联网设备管理和通信系统[ | 设备权限设置与设备控制指令记录于区块链,设备通过密钥进行 | 保障物联网设备的权限安全和数据隐私,提升系统的安全性 |
基于云计算和区块链的制造产业管理体系[ | 物联网设备操作指令记录至区块链,生产和支付操作由智能合约执行 | 提供分布式资产清单和交易详情,保障记录的完整可靠和可追溯 | |
抵抗DDoS攻击 | 基于区块链的分布式域名解析系统 Blockstack、Nebulis等[ | 分布式存储,将域名解析逻辑与底层区块链共识机制进行分层 | 分布式存储域名与IP地址映射对,有效抵抗DDoS攻击 |
[1] | XIAO L , LI Y , HAN G , et al. A secure mobile crowdsensing game with deep reinforcement learning[J]. IEEE Transactions on Information Forensics & Security, 2017,136(1):35-47. |
[2] | 肖亮, 李强达, 刘金亮 . 云存储安全技术研究进展综述[J]. 数据采集与处理, 201631(3):464-472. |
XIAO L , LI Q D , LIU J L , . Survey on secure cloud storage[J]. Journal of Data Acquisition & Processing, 201631(3):464-472. | |
[3] | XIAO L , XU D , XIE C , et al. Cloud storage defense against advanced persistent threats:a prospect theoretic study[J]. IEEE Journal on Selected Areas in Communications, 2011,35(3):534-544. |
[4] | 刘明辉, 张尼, 张云勇 , 等. 云环境下的敏感数据保护技术研究[J]. 电信科学, 201430(11):2-8. |
LIU M H , ZHANG N , ZHANG Y Y , , et al. Research on sensitive data protection technology on cloud computing[J]. Telecommunications Science, 201430(11):2-8. | |
[5] | 袁勇, 王飞跃 . 云环境下的敏感数据保护技术研究[J]. 自动化学报, 201642(4):481-494. |
YUAN Y , WANG F Y . Blockchain:the state of the art and future trends[J]. Acta Automatica Sinica, 201642(4):481-494. | |
[6] | NAKAMOTO S . Bitcoin:a peer-to-peer electronic cash system[J]. Consulted, 2008. |
[7] | BUTERIN V A . Next-generation smart contract and decentralized application platform[R]. 2014. |
[8] | 邵奇峰, 金澈清, 张召 , 等. 区块链技术:架构及进展[J]. 计算机学报, 2017:1-20. |
SHAO Q F , JIN C Q , ZHANG Z , , et al. Blockchain technology:architecture and progress[J]. Chinese Journal of Computers, 2017:1-20. | |
[9] | ZYSKIND G , NATHAN O . Decentralizing privacy:Using blockchain to protect personal data[C]// IEEE Security and Privacy Workshops, May 21-22, 2015, San Jose,CA,USA.Piscataway: IEEE Press, 2015:180-184. |
[10] | WOOD G . Ethereum:a secure decentralised generalized transaction ledger[EB]. 2014. |
[11] | AZARIA A , EKBLAW A , VIEIRA T , et al. MedRec:using blockchain for medical data access and permission management[C]// IEEE International Conference on Open and Big Data, Dec 5-8, 2016, Washington,DC,USA.Piscataway: IEEE Press, 2016:25-30. |
[12] | BULDAS A , LAANOJA R , TRUU A , et al. Keyless signature infrastructure and PKI:hash-tree signatures in pre-and post-quantum world[J]. International Journal of Services Technology & Management, 2017,23(1/2):117. |
[13] | BULDAS A , LAANOJA R , TRUU A , et al. Efficient quantum-immune keyless signatures with identity[J]. IACR Cryptology ePrint Archive, 2014:321. |
[14] | DORRI A , STEGER M , KANHERE S , et al. Blockchain:a distributed solution to automotive security and privacy[J]. IEEE Communications Magazine, 2017,55(12):119-125. |
[15] | DORRI A , KANHERE S , JURDAK R , et al. Blockchain for IoT security and privacy:the case study of a smart home[C]// IEEE International Conference on Pervasive Computing and Communications, March 13-17, 2017, Kona,HI,USA.Piscataway: IEEE Press, 2017:618-623. |
[16] | BAHGA A , MADISETTI V K . Blockchain platform for industrial Internet of things[J]. Journal of Software Engineering and Applications, 2016,9(10):533. |
[17] | ALI A , NELSON J , SHEA R , et al. Blockstack:a global naming and storage system secured by blockchains[C]// USENIX Annual Technical Conference, July 12-14, 2016, Santa Clara,CA,USA.Piscataway: IEEE Press, 2016:181-194. |
[18] | AITZHAN N , SVETINOVIC D . Security and privacy in decentralized energy trading through multi-signatures,blockchain and anonymous messaging streams[J]. IEEE Transactions on Dependable & Secure Computing, 2016(99):1. |
[19] | 赵明慧, 张琭, 亓晋 . 基于区块链的社会物联网可信服务管理框架[J]. 电信科学, 2017,33(10):19-25. |
ZHAO M H , ZHANG L , QI J . A framework of trusted services management based on block chain in social internet of things[J]. Telecommunications Science, 2017,33(10):19-25. | |
[20] | WANG B , ZHENG Y , LOU W , et al. DDoS attack protection in the era of cloud computing and software-defined networking[J]. Computer Networks, 2015(81):308-319. |
[21] | 李传煌, 孙正君, 袁小雍 , 等. 基于深度学习的实时DDoS攻击检测[J]. 电信科学, 2017,33(7):53-65. |
LI C H , SUN Z J , YUAN X Y , et al. Real-time DDoS attack detection based on deep learning[J]. Telecommunications Science, 2017,33(7):53-65. | |
[22] | 王帅, 汪来富, 金华敏 , 等. 网络安全分析中的大数据技术应用[J]. 电信科学, 2015,31(7):145-150. |
WANG S , WANG L F , JIN H M , et al. Big data application in network security analysis[J]. Telecommunications Science, 2015,31(7):145-150. | |
[23] | KOSBA A , MILLER A , SHI E , et al. Hawk:the blockchain model of cryptography and privacy-preserving smart contracts[C]// IEEE Symposium on Security and Privacy (SP), May 23-25, 2016, San Jose,CA,USA.Piscataway: IEEE Press, 2016:839-858. |
[24] | SIVARAMAN V , CHAN D , EARL D , et al. Smart-phones attacking smart-homes[C]// ACM Conference on Security &Privacy in Wireless and Mobile Networks, July 18-20, 2016, Darmstadt,Germany.New York: ACM Press, 2016:195-200. |
[25] | HU Q , LV S , SHI Z , et al. Defense Against advanced persistent threats with expert system for internet of things// IEEE/IFIP International Conference on Wireless Algorithms Systems and Application, June 19-21, 2017, Guilin,China.Piscataway: IEEE Press, 2017. |
[26] | NARAYANAN A , BONNEAU J , FELTEN E , et al. Bitcoin and cryptocurrency technologies:a comprehensive introduction[M]. Princeton: Princeton University Press, 2016. |
[27] | RODRIGUES B , BOCEK T , LAREIDA A , et al. A blockchain-based architecture for collaborative DDoS mitigation with smart contracts[C]// IFIP International Conference on Autonomous Infrastructure,Management and Security, July 10-13, 2017, University of Zurich,Zurich,Switzerland.Berlin: Springer-Verlag, 2017:16-29. |
[28] | HU W , AO M , SHI L , et al. Review of blockchain-based DNS alternatives[J]. 网络与信息安全学报, 2017,3(3):71-77. |
HU W , AO M , SHI L , et al. Review of blockchain-based DNS alternatives[J]. Chinese Journal of Network and Information Security, 2017,3(3):71-77. |
[1] | Le ZHANG, Hongyuan MA. Practice on edge cloud security of telecom operators [J]. Telecommunications Science, 2023, 39(4): 165-172. |
[2] | Mingrui XU, Yucai YAO, Xiaorong ZHU. A Fisco-Bcos platform based accurate performance analysis model of blockchain system [J]. Telecommunications Science, 2023, 39(1): 79-91. |
[3] | Weixiong CHEN, Xiaochen YANG, Zengjun CHUN, Ruolan LI, Hua ZHANG. Research and practice of network security threat intelligence management system for power enterprise [J]. Telecommunications Science, 2022, 38(7): 184-189. |
[4] | Yatian LIU, Bowen HU, Maofei CHEN, Dongxin LIU. Study on the 5GC security situational awareness system [J]. Telecommunications Science, 2022, 38(11): 73-85. |
[5] | Yingjie HE, Qiwei LI, Han SUN, Di GAO, Jianfeng DONG, Shuhua YANG. A lightweight privacy-preserving truth discovery mechanism for IoT [J]. Telecommunications Science, 2021, 37(5): 124-132. |
[6] | Ying LIU, Hongbo FAN, Shouqun MA, Zhiwei GAO, Jinjiang LIU. Blockchain based trusted traceability system scheme for raw milk supply chain [J]. Telecommunications Science, 2021, 37(5): 148-159. |
[7] | Zhiyong LIU, Zhongjiang HE, Yilong RUAN, Junfeng SHAN, Chao ZHANG. Big data security features and operation practices [J]. Telecommunications Science, 2021, 37(5): 160-169. |
[8] | Shuangxing WANG, Jintang LUO, Lisha SHUAI, Jiamin ZHANG, Min ZHANG, Xiaolong YANG. Cloud data anonymous assured deletion approach based on blockchain [J]. Telecommunications Science, 2021, 37(3): 90-104. |
[9] | Yue GU, Dan LI, Kaihui GAO. Research on network traffic classification based on machine learning and deep learning [J]. Telecommunications Science, 2021, 37(3): 105-113. |
[10] | Chunyan YANG, Dongmei BIN, Xin LI. Storage system of power grid enterprise based on PBFT blockchain technology [J]. Telecommunications Science, 2021, 37(2): 144-153. |
[11] | Gaochang XIE, Hua LU, Qinqin TANG, Han ZHU, Chenghao LIANG, Wen WEN, Renchao XIE. Application of blockchain in urban rail traffic edge computing network [J]. Telecommunications Science, 2021, 37(10): 117-125. |
[12] | Chi ZHANG, Ye LU, Yuping LUO, Xiaokai SUN, Hanke ZHU. A novel approach for face privacy protection based on surveillance video in complex scene [J]. Telecommunications Science, 2021, 37(1): 94-101. |
[13] | Shuting LI,Jinke LIU,Na CHEN. Design and research of clearing-settlement platform based on blockchain technology [J]. Telecommunications Science, 2020, 36(9): 84-93. |
[14] | Lei QI,Hao ZHU,Huiqiong GU,Xu CHEN,Bo HU. Application and farmework of BaaS platform based on blockchain [J]. Telecommunications Science, 2020, 36(9): 172-178. |
[15] | Shaoliang PENG,Liang BAI,Li WANG,Minxia CHENG,Shulin WANG. Trusted edge computing for smart healthcare [J]. Telecommunications Science, 2020, 36(6): 56-63. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|