电信科学 ›› 2024, Vol. 40 ›› Issue (2): 107-115.doi: 10.11959/j.issn.1000-0801.2024021

• 研究与开发 • 上一篇    

基于区块链的多源网络大数据安全访问权限认证仿真

李斌, 何辉, 赵中英, 郭景维   

  1. 国网宁夏电力有限公司信息通信公司,宁夏 银川 750004
  • 修回日期:2023-12-30 出版日期:2024-02-01 发布日期:2024-02-01
  • 作者简介:李斌(1985- ),男,国网宁夏电力有限公司信息通信公司高级工程师,主要研究方向为大数据技术、人工智能技术、电力信息系统智能化运维及网络安全等
    何辉(1995- ),男,国网宁夏电力有限公司信息通信公司助理工程师,主要研究方向为电力信息安全
    赵中英(1990- ),男,国网宁夏电力有限公司信息通信公司工程师,主要研究方向为信息系统运维技术、数据运营管理和数据安全等
    郭景维(1984- ),男,国网宁夏电力有限公司信息通信公司高级工程师,主要研究方向为电力信息技术等

Security access permission authentication simulation of multi-source network big data based on blockchain

Bin LI, Hui HE, Zhongying ZHAO, Jingwei GUO   

  1. State Grid Ningxia Electric Power Company, Yinchuan 750004, China
  • Revised:2023-12-30 Online:2024-02-01 Published:2024-02-01

摘要:

多源网络大数据的频繁交互与存储打破了传统数据“孤岛”,实现了跨区域与跨组织的数据访问,为数据的安全和隐私保护带来巨大挑战。访问认证作为保护数据与资源安全的技术之一,在获取所有数据节点信任的同时,面临巨大的通信负载,会造成数据丢失和破坏,为此,提出一种基于区块链研究多源网络大数据安全访问权限认证方法。以相似关系度量数据在网络传输中的变化状态,根据相似矩阵计算多源网络数据访问概率。通过区块链技术建立数据安全访问合约,标定数据的访问属性以及交易密文,并将数据压缩在对应属性内。根据访问目的分析其访问信度,以信度作为标准对应安全等级,在不同信度下定制访问规则,认证数据安全访问的具体权限,实现方法设计。实验结果表明,以不同数据属性含量作为测试条件,在常规模式和攻击模式下对数据进行加密和解密处理,新方法可以实现较快的认证响应,实现网络数据的安全访问。

关键词: 区块链, 多源网络, 大数据, 安全访问, 权限认证

Abstract:

The frequent interaction and storage of big data in multi-source networks have broken traditional data silos, enabling cross regional and cross organizational data access, posing significant challenges to data security and privacy protection.As one of the technologies to protect data and resource security, access authentication faces enormous communication loads while obtaining trust from all data nodes, which can cause data loss and damage.Therefore, a blockchain based research method for multi-source network big data security access permission authentication was proposed.The transformation status of data in network transmission using similarity relationships was measured, and the probability of multi-source network data access based on the similarity matrix was calculated.The data security access contracts were established through blockchain technology, calibrating data access attributes and transaction ciphertexts, and compressing data within corresponding attributes.The access reliability based on the purpose of the access was analyzed, reliability was used as the standard to correspond to the security level, rules under different levels of reliability were accessed, specific permissions were authenticated for data security access, and implementation methods were designed.The experimental results show that using different data attribute contents as testing conditions, encrypting and decrypting data in both conventional and attack modes, the new method can achieve fast authentication response and secure access to network data.

Key words: blockchain, multi-source network, big data, secure access, authority authentication

中图分类号: 

No Suggested Reading articles found!