Security Risk Assessment Model of Blockchain

被引:0
|
作者
Qin C.-X. [1 ]
Guo B. [1 ]
Shen Y. [2 ]
Su H. [1 ]
Zhang Z. [1 ]
Zhou C.-M. [1 ]
机构
[1] College of Computer Science, Sichuan University, Chengdu
[2] School of Control Engineering, Chengdu University of Information Technology, Chengdu
来源
关键词
AHP (analytic hierarchy process); Blockchain; BTCB(blockchain trusted computing base); Hash rate; Risk assessment;
D O I
10.12263/DZXB.20180962
中图分类号
学科分类号
摘要
With the expansion of the application of blockchain technology in the socio-economic fields,increasing attention has been paid to the security of blockchain.This paper proposes a security risk assessment method for blockchain,which quantifies the security risk of blockchain from the aspects of technical architecture and hash rate.At first,we build the Blockchain Trusted Computing Base (BTCB) model based on the technology architecture.Then,we design a sensitivity analysis method combined the AHP and paired comparison to assign security weights to each security risk factor.Finally,we construct a security risk assessment model.In the experimental part,we use this model to score 15 common public-chain blockchain projects,and conducte comparative analysis with the evaluation data of four blockchain rating agencies with high market recognition.The experiment results verify the feasibility of this method. © 2021, Chinese Institute of Electronics. All right reserved.
引用
收藏
页码:117 / 124
页数:7
相关论文
共 15 条
  • [1] Grinberg R., Bitcoin:An Innovative Alternative Digital Currency[J], Hastings Science & Technology Law Journal, 4, pp. 160-210, (2011)
  • [2] HOU Yun-chun, Financial technology to prevent financial risks [J], Business China, 9, pp. 24-25, (2017)
  • [3] Nayak K, Kumar S, Miller A, Et al., Stubborn mining:Generalizing selfish mining and combining with an eclipse attack, Proceedings of the 2016 IEEE European Symposium on Security and Privacy (EuroSP), pp. 305-320, (2016)
  • [4] CHENG Li-chen, LIU Ji-qiang, Technology and security of blockchain, Information and Communications Technologies, 11, 3, pp. 39-45, (2017)
  • [5] Heilman E, Kendler A, Zohar A, Et al., Eclipse attacks on bitcoin's peer-to-peer network, Proceedings of the 24th USENIX Security Symposium (USENIX Security 15), pp. 129-144, (2015)
  • [6] YE Cong-cong, LI Guo-qiang, CAI Hong-ming, Et al., Security detection model of block chain, Journal of Software, 29, pp. 1348-1359, (2018)
  • [7] SHAO Qi-feng, JIN Che-qing, ZHANG Zhao, Et al., Blockchain technology:Architecture and progress, Chinese Journal of Computers, 41, pp. 969-988, (2018)
  • [8] LI He, SUN Ji-fei, YANG Yong, Et al., Preliminary exploration of Ethereum based on block chain 2.0, Financial Computer of China, 6, pp. 57-60, (2017)
  • [9] WU Tao, JING Xiao-jun, Cryptanalysis and improvement of a strong non-forgeable certificateless signature scheme[J], Acta Electronica Sinica, 46, 3, pp. 602-606, (2018)
  • [10] SUN Jun, XIONG Guan, Credit payment of radio resource transaction based on alliance blockchain in SCMA mMTC system[J], Acta Electronica Sinica, 47, 8, pp. 1677-1684, (2019)