An anti-tampering model of sensitive data in link network based on blockchain technology

被引:0
|
作者
Li, Xianghong [1 ]
机构
[1] Jiangsu Vocat Inst Commerce, Sch Trade & Logist, Nanjing 211168, Peoples R China
关键词
Blockchain technology; link network; sensitive data; encounter probability; square difference function; membership mean;
D O I
10.3233/WEB-210469
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In order to overcome the problems of traditional link network sensitive data anti tampering operation, such as long time-consuming and low data security, a tamper proof model of link network sensitive data based on blockchain technology is proposed. Calculate the evenly distributed random variables of sensitive node data and the difference of running distance to obtain the probability of meeting the sensitive data with other neighbor nodes, and determine the sensitive data in the link network; obtain the frequency domain of the sensitive data of the infected link network through the square difference function, and calculate the membership mean value of the infected data samples in the sensitive data; analyze the working principle of blockchain technology, Set the master key and public key of sensitive data, generate the encryption key of sensitive data of link network, and use blockchain technology to complete the design of tamper proof model of sensitive data in link network. The experimental results show that the shortest time-consuming of the proposed method is about 1 s, and the maximum tamper proof security factor is about 9.7.
引用
收藏
页码:227 / 237
页数:11
相关论文
共 50 条
  • [1] Anti-tampering Monitoring Method of Network Sensitive Information Based on Big Data Analysis
    Shen, Yi
    Zhang, Lu
    [J]. ADVANCED HYBRID INFORMATION PROCESSING, ADHIP 2019, PT II, 2019, 302 : 82 - 89
  • [2] A Lightweight Blockchain-based Technique for Anti-Tampering in Wireless Sensor Networks
    Tiberti, Walter
    Carmenini, Alessio
    Pomante, Luigi
    Cassioli, Dajana
    [J]. 2020 23RD EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD 2020), 2020, : 577 - 582
  • [3] Anti-tampering method and verification mechanism design of power data for private key leakage of node in blockchain system
    Ji B.
    Chang L.
    Zhu L.
    Cao B.
    [J]. Dianli Zidonghua Shebei/Electric Power Automation Equipment, 2021, 41 (12): : 87 - 94
  • [4] Anti-tampering technology of digital watermarking in dynamic web page images
    Ling, Zhao
    [J]. AGRO FOOD INDUSTRY HI-TECH, 2017, 28 (01): : 2195 - 2199
  • [5] Container Communities: Anti-tampering Wireless Sensor Network for Global Cargo Security
    Bian, Jiang
    Seker, Remzi
    Ramaswamy, Srini
    Yilmazer, Nuri
    [J]. MED: 2009 17TH MEDITERRANEAN CONFERENCE ON CONTROL & AUTOMATION, VOLS 1-3, 2009, : 464 - 468
  • [6] Research on E-book Text Copyright Protection and Anti-tampering Technology
    Chou, Yung-Chen
    Anggriani, Kurnia
    Wu, Nan-I
    Hwang, Min-Shiang
    [J]. International Journal of Network Security, 2021, 23 (05): : 739 - 749
  • [7] STEP-archival: Storage Integrity and Anti-Tampering using Data Entanglement
    Mercier, Hugues
    Augier, Maxime
    Lenstra, Arjen K.
    [J]. 2015 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2015, : 1590 - 1594
  • [8] The Research and Implement of the Intelligent Web Anti-Tampering System based on Linux kernel
    Huang, Jian-bo
    Ding, Yang
    Fang, Fang
    [J]. ASIA-PACIFIC YOUTH CONFERENCE ON COMMUNICATION TECHNOLOGY 2010 (APYCCT 2010), 2010, : 353 - 356
  • [9] Anti-tampering method of QR code hidden information based on deep learning
    Wang, Nan
    Zhang, Lina
    Jiang, Tian
    Shen, Tengfei
    [J]. Signal, Image and Video Processing, 2025, 19 (04)
  • [10] ARMAND: Anti-Repackaging through Multi-pattern Anti-tampering based on Native Detection
    Merlo, Alessio
    Ruggia, Antonio
    Sciolla, Luigi
    Verderame, Luca
    [J]. PERVASIVE AND MOBILE COMPUTING, 2021, 76