Security access permission authentication simulation of multi-source network big data based on blockchain

The frequent interaction and storage of big data in multi-source networks have broken traditional data silos, enabling cross regional and cross organizational data access, posing significant challenges to data security and privacy protection.As one of the technologies to protect data and resource se...

Full description

Saved in:
Bibliographic Details
Main Authors: Bin LI, Hui HE, Zhongying ZHAO, Jingwei GUO
Format: Article
Language:zho
Published: Beijing Xintong Media Co., Ltd 2024-02-01
Series:Dianxin kexue
Subjects:
Online Access:http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2024021/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841533916852256768
author Bin LI
Hui HE
Zhongying ZHAO
Jingwei GUO
author_facet Bin LI
Hui HE
Zhongying ZHAO
Jingwei GUO
author_sort Bin LI
collection DOAJ
description The frequent interaction and storage of big data in multi-source networks have broken traditional data silos, enabling cross regional and cross organizational data access, posing significant challenges to data security and privacy protection.As one of the technologies to protect data and resource security, access authentication faces enormous communication loads while obtaining trust from all data nodes, which can cause data loss and damage.Therefore, a blockchain based research method for multi-source network big data security access permission authentication was proposed.The transformation status of data in network transmission using similarity relationships was measured, and the probability of multi-source network data access based on the similarity matrix was calculated.The data security access contracts were established through blockchain technology, calibrating data access attributes and transaction ciphertexts, and compressing data within corresponding attributes.The access reliability based on the purpose of the access was analyzed, reliability was used as the standard to correspond to the security level, rules under different levels of reliability were accessed, specific permissions were authenticated for data security access, and implementation methods were designed.The experimental results show that using different data attribute contents as testing conditions, encrypting and decrypting data in both conventional and attack modes, the new method can achieve fast authentication response and secure access to network data.
format Article
id doaj-art-9e106606b58c4aacb1bb4dab3000eec4
institution Kabale University
issn 1000-0801
language zho
publishDate 2024-02-01
publisher Beijing Xintong Media Co., Ltd
record_format Article
series Dianxin kexue
spelling doaj-art-9e106606b58c4aacb1bb4dab3000eec42025-01-15T02:48:35ZzhoBeijing Xintong Media Co., LtdDianxin kexue1000-08012024-02-014010711559556055Security access permission authentication simulation of multi-source network big data based on blockchainBin LIHui HEZhongying ZHAOJingwei GUOThe frequent interaction and storage of big data in multi-source networks have broken traditional data silos, enabling cross regional and cross organizational data access, posing significant challenges to data security and privacy protection.As one of the technologies to protect data and resource security, access authentication faces enormous communication loads while obtaining trust from all data nodes, which can cause data loss and damage.Therefore, a blockchain based research method for multi-source network big data security access permission authentication was proposed.The transformation status of data in network transmission using similarity relationships was measured, and the probability of multi-source network data access based on the similarity matrix was calculated.The data security access contracts were established through blockchain technology, calibrating data access attributes and transaction ciphertexts, and compressing data within corresponding attributes.The access reliability based on the purpose of the access was analyzed, reliability was used as the standard to correspond to the security level, rules under different levels of reliability were accessed, specific permissions were authenticated for data security access, and implementation methods were designed.The experimental results show that using different data attribute contents as testing conditions, encrypting and decrypting data in both conventional and attack modes, the new method can achieve fast authentication response and secure access to network data.http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2024021/blockchainmulti-source networkbig datasecure accessauthority authentication
spellingShingle Bin LI
Hui HE
Zhongying ZHAO
Jingwei GUO
Security access permission authentication simulation of multi-source network big data based on blockchain
Dianxin kexue
blockchain
multi-source network
big data
secure access
authority authentication
title Security access permission authentication simulation of multi-source network big data based on blockchain
title_full Security access permission authentication simulation of multi-source network big data based on blockchain
title_fullStr Security access permission authentication simulation of multi-source network big data based on blockchain
title_full_unstemmed Security access permission authentication simulation of multi-source network big data based on blockchain
title_short Security access permission authentication simulation of multi-source network big data based on blockchain
title_sort security access permission authentication simulation of multi source network big data based on blockchain
topic blockchain
multi-source network
big data
secure access
authority authentication
url http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2024021/
work_keys_str_mv AT binli securityaccesspermissionauthenticationsimulationofmultisourcenetworkbigdatabasedonblockchain
AT huihe securityaccesspermissionauthenticationsimulationofmultisourcenetworkbigdatabasedonblockchain
AT zhongyingzhao securityaccesspermissionauthenticationsimulationofmultisourcenetworkbigdatabasedonblockchain
AT jingweiguo securityaccesspermissionauthenticationsimulationofmultisourcenetworkbigdatabasedonblockchain