The Application of Blockchain Technology in Network Security and Authentication: Issues and Strategies

被引:0
|
作者
Lu, Yanli [1 ]
机构
[1] Guangzhou Songtian Vocat Coll, Sch Informat Engn, Guangzhou 511370, Peoples R China
关键词
Blockchain; network security; identity verification; deep regression model;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the advent of the digital age, the importance of network security and authentication is gradually highlighted. Blockchain technology, as a distributed, immutable record technology, brings great potential value to both areas. This study aims to delve into how blockchain technology can ensure network security and its application in authentication. Through extensive questionnaires and data collection, the study successfully built a deep regression model to reveal relevant causal relationships. The findings show that the adoption of blockchain technology can significantly improve the perceived effectiveness of cybersecurity, especially when organizations have a high opinion of it. This finding provides a valuable reference for organizations to make better use of this technology. However, there are still some limitations in the study, such as the scope of data collection and the complexity of the model. For these problems, this paper also puts forward corresponding solutions.
引用
收藏
页码:1103 / 1113
页数:11
相关论文
共 50 条
  • [21] The application and analysis of network security technology
    Wu, Na
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON EDUCATION, SPORTS, ARTS AND MANAGEMENT ENGINEERING, 2016, 54 : 1328 - 1331
  • [22] Ontological Representation of Healthcare Application Security Using Blockchain Technology
    Matulevicius, Raimundas
    Iqbal, Mubashar
    Elhadjamor, Emna Ammar
    Ghannouchi, Sonia Ayachi
    Bakhtina, Mariia
    Ghannouchi, Slaheddine
    INFORMATICA, 2022, 33 (02) : 365 - 397
  • [23] From Bitcoin to Cybersecurity: a Comparative Study of Blockchain Application and Security Issues
    Dai, Fangfang
    Shi, Yue
    Meng, Nan
    Wei, Liang
    Ye, Zhiguo
    2017 4TH INTERNATIONAL CONFERENCE ON SYSTEMS AND INFORMATICS (ICSAI), 2017, : 975 - 979
  • [24] A comprehensive survey on security, privacy and authentication in blockchain
    Alghamdi, Turki Ali
    Javaid, Nadeem
    INTERNATIONAL JOURNAL OF WEB AND GRID SERVICES, 2023, 19 (03) : 259 - 286
  • [25] Performance Analysis of Data Sharing Using Blockchain Technology in IoT Security Issues
    Babu, R. Ganesh
    Yuvaraj, S.
    Manjula, M. Muthu
    Kaviyapriya, S.
    Harini, R.
    INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING AND COMMUNICATIONS, ICICC 2022, VOL 3, 2023, 492 : 507 - 515
  • [26] Application of Virtual Network Technology in Computer Network Security
    Zhang, Jianjun
    FORTHCOMING NETWORKS AND SUSTAINABILITY IN THE IOT ERA (FONES-IOT 2021), VOL 2, 2022, 130 : 356 - 361
  • [27] Security Issues in the Blockchain(ed) World
    Kadena, Esmeralda
    Holicza, Peter
    2018 18TH IEEE INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND INFORMATICS (CINTI), 2018, : 211 - 215
  • [28] Blockchain Security Hole: Issues and Solutions
    Abd Halim, Norul Suhaliana Bt
    Rahman, Md Arafatur
    Azad, Saiful
    Kabir, Muhammad Nomani
    RECENT TRENDS IN INFORMATION AND COMMUNICATION TECHNOLOGY, 2018, 5 : 739 - 746
  • [29] Review on Cryptography and Network Security Zero Knowledge Technique in Blockchain Technology
    Chandran, Anjana S.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2022, 16 (02)
  • [30] Security authentication technology based on dynamic Bayesian network in Internet of Things
    Qing Zhang
    Dilong Xu
    Journal of Ambient Intelligence and Humanized Computing, 2020, 11 : 573 - 580