检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:李斌 何辉 赵中英 郭景维 LI Bin;HE Hui;ZHAO Zhongying;GUO Jingwei(State Grid Ningxia Electric Power Company,Yinchuan 750004,China)
机构地区:[1]国网宁夏电力有限公司信息通信公司,宁夏银川750004
出 处:《电信科学》2024年第2期107-115,共9页Telecommunications Science
摘 要:多源网络大数据的频繁交互与存储打破了传统数据“孤岛”,实现了跨区域与跨组织的数据访问,为数据的安全和隐私保护带来巨大挑战。访问认证作为保护数据与资源安全的技术之一,在获取所有数据节点信任的同时,面临巨大的通信负载,会造成数据丢失和破坏,为此,提出一种基于区块链研究多源网络大数据安全访问权限认证方法。以相似关系度量数据在网络传输中的变化状态,根据相似矩阵计算多源网络数据访问概率。通过区块链技术建立数据安全访问合约,标定数据的访问属性以及交易密文,并将数据压缩在对应属性内。根据访问目的分析其访问信度,以信度作为标准对应安全等级,在不同信度下定制访问规则,认证数据安全访问的具体权限,实现方法设计。实验结果表明,以不同数据属性含量作为测试条件,在常规模式和攻击模式下对数据进行加密和解密处理,新方法可以实现较快的认证响应,实现网络数据的安全访问。The frequent interaction and storage of big data in multi-source networks have broken traditional data silos,enabling cross regional and cross organizational data access,posing significant challenges to data security and priva-cy protection.As one of the technologies to protect data and resource security,access authentication faces enormous communication loads while obtaining trust from all data nodes,which can cause data loss and damage.Therefore,a blockchain based research method for multi-source network big data security access permission authentication was proposed.The transformation status of data in network transmission using similarity relationships was measured,and the probability of multi-source network data access based on the similarity matrix was calculated.The data security access contracts were established through blockchain technology,calibrating data access attributes and transaction ciphertexts,and compressing data within corresponding attributes.The access reliability based on the purpose of the access was analyzed,reliability was used as the standard to correspond to the security level,rules under different lev-els of reliability were accessed,specific permissions were authenticated for data security access,and implementation methods were designed.The experimental results show that using different data attribute contents as testing condi-tions,encrypting and decrypting data in both conventional and attack modes,the new method can achieve fast au-thentication response and secure access to network data.
分 类 号:TP393[自动化与计算机技术—计算机应用技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.7