区块链数据防篡改备份恢复算法与仿真  被引量:2

Algorithm and Simulation for Blockchain Data Tamper-Proof Backup and Recovery

在线阅读下载全文

作  者:姚云霞[1] 张国权 YAO Yun-xia;ZHANG Guo-quan(School of Information Engineering,Longdong University,Qinyang Gansu 745000,China;School of Mathematics and Computer Science,Northwest Minzu University,Lanzhou Gansu 730030,China)

机构地区:[1]陇东学院信息工程学院,甘肃庆阳745000 [2]西北民族大学数学与计算机科学学院,甘肃兰州730030

出  处:《计算机仿真》2022年第11期411-415,共5页Computer Simulation

基  金:甘肃省科技计划(自筹经费)项目(21JR11RM045);庆阳市科技计划资助项目(QY2021A-F027)。

摘  要:区块链中数据的透明性给攻击者提供了便利条件,会加大数据泄露和篡改的风险,针对区块链数据安全机制不完善的问题,提出区块链数据防篡改备份恢复算法。建立区块链整体架构,具体包含数据层、网络层、应用层等,分析不同层次主要功能和特征;分析篡改攻击过程和影响篡改成功率的因素,建立数据篡改攻击模型,根据该模型建立数据防篡改机制,通过秘密分割、加密等过程实现数据防篡改。确立容灾备份结构,将备份恢复转换为数据上传与下载过程;其中备份过程就是将分解后的数据发送到不同节点,再通过Dec算法解密密文,得出数据明文,完成区块链数据恢复。实验结果表明:所提方法的备份恢复时间较短,CPU运行更加平稳,说明其能够有效抵御篡改攻击。The transparency of the data in the blockchain provides convenience for attackers,which will increase the risk of data leakage and tampering.Aiming at the problem of imperfect blockchain data security mechanism,a blockchain data tamper proof backup and recovery algorithm is proposed.First of all,the overall architecture of blockchain was constructed,including data layer,network layer and application layer.And then,the main functions and characteristics of different layers were analyzed.In the meanwhile,the process of tampering attack and the factors affecting the success rate of tampering were analyzed.After that,a model of data tampering attack was built.Based on this model,a tamper-resistant mechanism was established,and then the tamper resistant of data was realized through secret segmentation and encryption.Moreover,a disaster recovery backup structure was constructed to convert the backup and recovery into a process of data upload and download,where the backup process was to send the decomposed data to different nodes,and then decrypt the ciphertext by Dec algorithm to obtain data plaintext,thus completing the data recovery.Experimental results show that the proposed method has shorter backup and recovery time,and CPU runs more stable,indicating that it can effectively resist tampering attacks.

关 键 词:区块链数据 篡改攻击 备份恢复 秘密共享 上传下载 容灾备份 

分 类 号:TP326[自动化与计算机技术—计算机系统结构]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象