检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:于枫 孟令辉 彭家辉 李先贤[1,2,3] 瞿斌 YU Feng;MENG Linghui;PENG Jiahui;LI Xianxian;QU Bin(School of Computer Science and Engineering,Guangxi Normal University,Guilin Guangxi 541004,China;Key Lab of Education Blockchain and Intelligent Technology,Ministry of Education(Guangxi Normal University),Guilin Guangxi 541004,China;Guangxi Collaborative Innovation Center of Multi-source Information Integration and Intelligent Processing(Guangxi Normal University),Guilin Guangxi 541004,China;Guangxi Power Grid Materials Co.LTD,Nanning Guangxi 530022,China)
机构地区:[1]广西师范大学计算机科学与工程学院,广西桂林541004 [2]教育区块链与智能技术教育部重点实验室(广西师范大学),广西桂林541004 [3]广西多源信息挖掘与安全重点实验室(广西师范大学),广西桂林541004 [4]广西电网物资有限责任公司,广西南宁530022
出 处:《广西师范大学学报(自然科学版)》2023年第4期84-95,共12页Journal of Guangxi Normal University:Natural Science Edition
基 金:国家自然科学基金(62062016,U21A20474);广西自然科学基金(2019JJA170060);广西科技计划项目(AA22067070,桂科AD21220114);江苏省网络与信息安全重点实验室项目(BM2003201);广西区域多源信息集成与智能处理协同创新中心项目;广西“八桂学者”项目。
摘 要:物联网在我国第一、第二、第三产业中得到大规模应用,物联网设备(如摄像头)产生了海量的图像、视频类多媒体数据,其所蕴含的价值日益得到重视。但在面向数据增值互通、有偿共享这一新需求背景下,传统第三方进行物联网数据交易方案存在隐私泄露、安全性不足等弊端,并且在交易过后数据确权问题也成为影响市场活跃的重要因素。本文利用区块链可溯源、防篡改等技术特性实现物联网数据的安全交易,将物联网数据安全交易转化为两阶段Stackelberg博弈,使用双链架构保障交易过程的安全性和隐私保护,同时使用感知哈希技术实现数据确权,最大程度保障交易中各参与者权益。经实验验证,本文方案在时间、TPS以及零知识证明上均有提升,且使用两阶段Stackelberg博弈后能优化利润分配,进一步验证了本文方案的优势和可行性。对本文方案可能存在的安全威胁进行分析,结果显示本文方案在不同场景下能够有效抵抗合谋攻击、抵赖与陷害风险。The Internet of Things(IoT)has been widely applied in the primary,secondary and tertiary industries in China.IoT devices(such as cameras)have generated a huge amount of image and video multimedia data,and the value contained in it has been paid more and more attention.How to meet the new demand of value-added data exchange and paid sharing and build a safe and fair data transaction mechanism is one of the important foundations of data element value exchange.In view of problems such as privacy leakage and lack of security in the scheme of using traditional third parties to conduct Internet of Things data transaction,this paper realizes secure transaction of Internet of Things data by using technical features such as traceability and tamper-proof of blockchain,and turns security transaction of Internet of Things data into two-stage Stackelberg game.The double-chain architecture is used to ensure the security and privacy protection of the transaction process,and the perceptive hash technology is used to realize data right confirmation,so as to protect the rights and interests of all participants in the transaction to the greatest extent.The improvement of the proposed scheme in time,TPS and zero-knowledge proof,as well as the trend of optimal profit distribution after two-stage Stackelberg game are verified by experiments,further verifying the advantages and feasibility of the proposed scheme.Finally,the possible security threats of this scheme are analyzed,and it is proved that the scheme can effectively resist the risks of collusive attack,denial and frame-up under different scenarios.
关 键 词:安全交易 数据交易 区块链 STACKELBERG博弈 双链
分 类 号:TP309[自动化与计算机技术—计算机系统结构]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:18.117.132.49