Security access permission authentication simulation of multi-source network big data based on blockchain
The frequent interaction and storage of big data in multi-source networks have broken traditional data silos, enabling cross regional and cross organizational data access, posing significant challenges to data security and privacy protection.As one of the technologies to protect data and resource se...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Beijing Xintong Media Co., Ltd
2024-02-01
|
Series: | Dianxin kexue |
Subjects: | |
Online Access: | http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2024021/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841533916852256768 |
---|---|
author | Bin LI Hui HE Zhongying ZHAO Jingwei GUO |
author_facet | Bin LI Hui HE Zhongying ZHAO Jingwei GUO |
author_sort | Bin LI |
collection | DOAJ |
description | The frequent interaction and storage of big data in multi-source networks have broken traditional data silos, enabling cross regional and cross organizational data access, posing significant challenges to data security and privacy protection.As one of the technologies to protect data and resource security, access authentication faces enormous communication loads while obtaining trust from all data nodes, which can cause data loss and damage.Therefore, a blockchain based research method for multi-source network big data security access permission authentication was proposed.The transformation status of data in network transmission using similarity relationships was measured, and the probability of multi-source network data access based on the similarity matrix was calculated.The data security access contracts were established through blockchain technology, calibrating data access attributes and transaction ciphertexts, and compressing data within corresponding attributes.The access reliability based on the purpose of the access was analyzed, reliability was used as the standard to correspond to the security level, rules under different levels of reliability were accessed, specific permissions were authenticated for data security access, and implementation methods were designed.The experimental results show that using different data attribute contents as testing conditions, encrypting and decrypting data in both conventional and attack modes, the new method can achieve fast authentication response and secure access to network data. |
format | Article |
id | doaj-art-9e106606b58c4aacb1bb4dab3000eec4 |
institution | Kabale University |
issn | 1000-0801 |
language | zho |
publishDate | 2024-02-01 |
publisher | Beijing Xintong Media Co., Ltd |
record_format | Article |
series | Dianxin kexue |
spelling | doaj-art-9e106606b58c4aacb1bb4dab3000eec42025-01-15T02:48:35ZzhoBeijing Xintong Media Co., LtdDianxin kexue1000-08012024-02-014010711559556055Security access permission authentication simulation of multi-source network big data based on blockchainBin LIHui HEZhongying ZHAOJingwei GUOThe frequent interaction and storage of big data in multi-source networks have broken traditional data silos, enabling cross regional and cross organizational data access, posing significant challenges to data security and privacy protection.As one of the technologies to protect data and resource security, access authentication faces enormous communication loads while obtaining trust from all data nodes, which can cause data loss and damage.Therefore, a blockchain based research method for multi-source network big data security access permission authentication was proposed.The transformation status of data in network transmission using similarity relationships was measured, and the probability of multi-source network data access based on the similarity matrix was calculated.The data security access contracts were established through blockchain technology, calibrating data access attributes and transaction ciphertexts, and compressing data within corresponding attributes.The access reliability based on the purpose of the access was analyzed, reliability was used as the standard to correspond to the security level, rules under different levels of reliability were accessed, specific permissions were authenticated for data security access, and implementation methods were designed.The experimental results show that using different data attribute contents as testing conditions, encrypting and decrypting data in both conventional and attack modes, the new method can achieve fast authentication response and secure access to network data.http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2024021/blockchainmulti-source networkbig datasecure accessauthority authentication |
spellingShingle | Bin LI Hui HE Zhongying ZHAO Jingwei GUO Security access permission authentication simulation of multi-source network big data based on blockchain Dianxin kexue blockchain multi-source network big data secure access authority authentication |
title | Security access permission authentication simulation of multi-source network big data based on blockchain |
title_full | Security access permission authentication simulation of multi-source network big data based on blockchain |
title_fullStr | Security access permission authentication simulation of multi-source network big data based on blockchain |
title_full_unstemmed | Security access permission authentication simulation of multi-source network big data based on blockchain |
title_short | Security access permission authentication simulation of multi-source network big data based on blockchain |
title_sort | security access permission authentication simulation of multi source network big data based on blockchain |
topic | blockchain multi-source network big data secure access authority authentication |
url | http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2024021/ |
work_keys_str_mv | AT binli securityaccesspermissionauthenticationsimulationofmultisourcenetworkbigdatabasedonblockchain AT huihe securityaccesspermissionauthenticationsimulationofmultisourcenetworkbigdatabasedonblockchain AT zhongyingzhao securityaccesspermissionauthenticationsimulationofmultisourcenetworkbigdatabasedonblockchain AT jingweiguo securityaccesspermissionauthenticationsimulationofmultisourcenetworkbigdatabasedonblockchain |