检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:陈志彬 杨芳 CHEN Zhibin;YANG Fang(School of Mechatronics and Information Technology,Zhangzhou Vocational Institute of Technology,Zhangzhou 363007,China;School of Economics and Management,Tsinghua University,Beijing 100084,China)
机构地区:[1]漳州理工职业学院机电与信息学院,福建漳州363007 [2]清华大学经济管理学院,北京100084
出 处:《成都工业学院学报》2024年第5期22-28,共7页Journal of Chengdu Technological University
基 金:漳州理工职业学院科研项目(20230201H)。
摘 要:针对当前用户隐私数据的安全问题,在区块链环境下,利用非对称加密算法,优化设计用户隐私保护方法。利用数据挖掘的方式采集待保护的用户隐私数据,确定用户隐私数据区块链存储结构。设置身份隐私保护协议与智能合约,作为用户隐私保护的约束条件。区块链环境下利用非对称加密算法,通过生成私钥、公钥,实现用户隐私数据的加密处理。综合用户信息、用户行为以及用户上传公钥,评估用户身份信任度,最终通过用户身份验证、隐私数据访问进程控制,实现用户隐私保护。通过测试实验得出结论:与2种传统保护方法相比,在有、无攻击场景下,应用优化设计用户隐私保护方法,用户隐私数据的泄露量更少,篡改率分别降低约0.9%和0.8%,丢失率分别降低约1.9%和0.9%,由此证明优化设计方法在隐私保护效果方面具有明显优势。In view of the security problem of user privacy data,in the blockchain environment,the asymmetric encryption algorithm was used to optimize the design of user privacy protection methods.The data mining method was used to collect user privacy data to be protected,and the blockchain storage structure of user privacy data was determined.The identity privacy protection protocol and smart contract were set as the constraint conditions for user privacy protection.In the blockchain environment,asymmetric encryption algorithms were used to generate private keys and public keys to encrypt user privacy data.By synthesizing user information,user behavior and user upload public key,the user s identity trust was evaluated,and finally the user identity authentication and private data access process control were implemented to protect user privacy.The test results show that compared with the two traditional protection methods,the user privacy protection method with optimized design can reduce the leakage of user privacy data in both attack and non-attack scenarios.The tampering rate is reduced by about 0.9%and 0.8%,and the loss rate is reduced by about 1.9%and 0.9%,respectively,which proves that the optimized design method has obvious advantages in terms of privacy protection effect.
分 类 号:TP311[自动化与计算机技术—计算机软件与理论]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.170