首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
This paper presents a continuous delivery/continuous verifiability (CD/CV) method for IoT dataflows in edge–fog–cloud. A CD model based on extraction, transformation, and load (ETL) mechanism as well as a directed acyclic graph (DAG) construction, enable end-users to create efficient schemes for the continuous verification and validation of the execution of applications in edge–fog–cloud infrastructures. This scheme also verifies and validates established execution sequences and the integrity of digital assets. CV model converts ETL and DAG into business model, smart contracts in a private blockchain for the automatic and transparent registration of transactions performed by each application in workflows/pipelines created by CD model without altering applications nor edge–fog–cloud workflows. This model ensures that IoT dataflows delivers verifiable information for organizations to conduct critical decision-making processes with certainty. A containerized parallelism model solves portability issues and reduces/compensates the overhead produced by CD/CV operations. We developed and implemented a prototype to create CD/CV schemes, which were evaluated in a case study where user mobility information is used to identify interest points, patterns, and maps. The experimental evaluation revealed the efficiency of CD/CV to register the transactions performed in IoT dataflows through edge–fog–cloud in a private blockchain network in comparison with state-of-art solutions.  相似文献   

2.
The blockchain is considered to be the potential driver of the digital economy. The Blockchain technology outweighs the challenges associated with the traditional transaction business governed and regulated by the third trusted party. There is a growth in the interest among the researchers, the industry, and the academia to study and leverage the potential of Blockchain. Blockchain provides a decentralized and distributed public ledger for all the participating parties. Though it seems that blockchain is a viable choice and solution for all the centralized governed and regulated transactions (in digital online space), it has potential challenges that need to be resolved; opportunities to be explored, and applications to be studied. This paper utilizes a systematic literature review to study several research endeavors made in the domain of blockchain. To further research on blockchain adoption, the paper theoretically constructs an integrated framework of the blockchain innovation adoption process in an organization considering organizational and user acceptance perspectives. This would facilitate its widespread adoption, thereby achieving sustained leadership solutions. The paper offers 23 propositions to information systems (IS)/information management (IM) scholars with respect to innovation characteristics, organizational characteristics, environmental characteristics, and user acceptance characteristics. Further, the paper explores several areas of future research and directions that can provide deep insights for overcoming challenges and for the adoption of blockchain technology.  相似文献   

3.
As time went on, technological progress inevitably altered our daily routines. Many new technologies, such as the Internet of Things (IoT) and cryptocurrency, offer revolutionary possibilities. To put it simply, the blockchain is a distributed, public, and auditable database that can be used to record financial transactions. The IoT, or “Internet of Things,” is a system of interconnected electronic devices that can communicate with one another and be remotely monitored and handled. This paper reviews the most recent findings in the field of blockchain and Internet of Things with the goal of examining blockchain as a possible answer to secure IoT data management within supply networks. There is a dearth of literature in the early stages of both blockchain and IoT study because they are such novel topics. The study's findings suggest that in order to improve their leadership quality to intentionally impact employee performance, industry managers should pay attention to human resource management indicators like collaboration, involvement, actualization, perception, and teamwork. This is primarily because of the inherent limitations of IoT devices and the distributed ledger architecture of the blockchain technology. There is potential for IoT to provide many advantages if blockchain capabilities can be optimized for it.  相似文献   

4.
张岚  何良生 《科技通报》2006,22(6):834-840
在安全数据通信中,身份认证和会话密钥的协商是极为重要的问题,近年来,实现这种类型的密码协议主要是通过可信第三方参与身份的认证和会话密钥的协商,因而,可信第三方的可靠性和安全性是系统性能的瓶颈。提出了一个双向的认证密码协议,解决了可信第三方的性能瓶颈问题,是一个更为有效的、安全的密码协议。用串空间的认证测试理论对其进行了形式分析,最后探讨了它在TLS协议中的应用。  相似文献   

5.
Due the advent of new wireless communication, Internet of Things (IoT) and cloud computing, outsourcing the data processing and management to the cloud servers has become a typical transformative computing paradigm. In this context, a cloud auditing protocol is an effective way to check the data integrity for cloud data management. We present a cryptanalysis of two recently proposed certificateless public verifiable auditing protocols, the Zhang et al.’s protocol and the Kang et al.’s protocol. We argue that the tags in the Zhang et al.’s protocol and the semi-tags in the Kang et al.’s protocol can be forged, leading to insecure protocols. We propose improved versions of both protocols and analyze their security and efficiency. Our new protocols can be used as a very effective way for checking the integrity of outsourced cloud storage in the context of transformative computation.  相似文献   

6.
基于信息流的可信操作系统度量架构   总被引:2,自引:0,他引:2  
将信息流和可信计算技术结合,可以更好地保护操作系统完整性.但现有的可信计算度量机制存在动态性和效率方面的不足,而描述信息流的Biba完整性模型在应用时又存在单调性缺陷.本文将两者结合起来,基于Biba模型,以可信计算平台模块TPM为硬件信任根,引入信息流完整性,并提出了可信操作系统度量架构:BIFI.实验表明,BIFI不仅能很好地保护信息流完整性,而且对现有系统的改动很少,保证了效率.  相似文献   

7.
周耀 《现代情报》2019,39(4):94-102
[目的]智慧图书馆建设是一项综合性系统工程,融合了诸多学科和各类先进技术。区块链技术作为当今最具颠覆性的新技术,图书馆必须努力学习掌握,积极构建"区块链+"图书馆应用系统,从而加快推动图书馆智慧化建设。[内容]文章介绍了区块链技术及其核心价值,详细分析了区块链技术在智慧图书馆建设中的应用优势,最后设计了4个基于区块链技术的智慧图书馆应用系统。[方法]采用了文献调研法和比较分析法对区块链技术在图书馆智慧服务中的应用可行性进行了研究,并对新老应用系统进行了比较分析。[成果/结论]区块链技术具有数据稳定、共识机制、去中心化的3大主要特征,能够有效解决传统图书馆在信息收集、存储安全和信息传播等方面的难题,是构建智慧图书馆的一项关键性技术。区块链技术在我国图书馆的实际应用中还存在许多不足,需要我国图书馆界持续不断的学习与改革,以期与其他区块链产业的快速发展相同步。  相似文献   

8.
云存储技术迅猛发展的同时也引起诸多安全问题,在云存储环境中,数据被外包给云服务器而处于用户控制之外,如何实施新颖可信的访问控制技术就变得非常关键。作为一类新兴的公钥加密技术,基于属性的加密算法以其灵活性被广泛应用在云存储访问控制方案的设计中。文章提出了一种基于属性加密的云存储访问控制方案,方案可以实现安全的云存储,系统采用基于角色的访问控制技术实现身份验证、对属性的加密/解密以及对非敏感数据的访问。最后通过仿真实验证明该方案是一种可以保证数据完整性和机密性的云存储访问控制。  相似文献   

9.
This paper aims to explain the implementation of blockchain technology in the production and supply chain delivery system for eggs from farm to consumer by a company based in the Midwestern USA. One of the primary research questions answered is how blockchain can be utilized and applied to more accurately and transparently move goods through global supply chains. This company is at the forefront of developing such systems for use in industry, and a use case for egg distribution is detailed. The goal is to track products from farm to fork using blockchain and internet of things (IoT) enabled technologies. By creating traceable and transparent supply chains for food, consumers can attain the information they need to make informed choices about the food they buy and the companies they support. For stakeholders in the food supply chain, having traceability and transparency builds better relationships with their customers, increases efficiency, and reduces the risk and cost of food recalls, fraud, and product loss. The blockchain technology and this business are creating a case for fixing and transforming the world’s food system.  相似文献   

10.
With the development of information technology and economic growth, the Internet of Things (IoT) industry has also entered the fast lane of development. The IoT industry system has also gradually improved, forming a complete industrial foundation, including chips, electronic components, equipment, software, integrated systems, IoT services, and telecom operators. In the event of selective forwarding attacks, virus damage, malicious virus intrusion, etc., the losses caused by such security problems are more serious than those of traditional networks, which are not only network information materials, but also physical objects. The limitations of sensor node resources in the Internet of Things, the complexity of networking, and the open wireless broadcast communication characteristics make it vulnerable to attacks. Intrusion Detection System (IDS) helps identify anomalies in the network and takes the necessary countermeasures to ensure the safe and reliable operation of IoT applications. This paper proposes an IoT feature extraction and intrusion detection algorithm for intelligent city based on deep migration learning model, which combines deep learning model with intrusion detection technology. According to the existing literature and algorithms, this paper introduces the modeling scheme of migration learning model and data feature extraction. In the experimental part, KDD CUP 99 was selected as the experimental data set, and 10% of the data was used as training data. At the same time, the proposed algorithm is compared with the existing algorithms. The experimental results show that the proposed algorithm has shorter detection time and higher detection efficiency.  相似文献   

11.
With the deployment of fifth-generation (5G) wireless networks worldwide, research on sixth-generation (6G) wireless communications has commenced. It is expected that 6G networks can accommodate numerous heterogeneous devices and infrastructures with enhanced efficiency and security over diverse, e.g. spectrum, computing and storage, resources. However, this goal is impeded by a number of trust-related issues that are often neglected in network designs. Blockchain, as an innovative and revolutionary technology that has arisen in the recent decade, provides a promising solution. Building on its nature of decentralization, transparency, anonymity, immutability, traceability and resiliency, blockchain can establish cooperative trust among separate network entities and facilitate, e.g. efficient resource sharing, trusted data interaction, secure access control, privacy protection, and tracing, certification and supervision functionalities for wireless networks, thus presenting a new paradigm towards 6G. This paper is dedicated to blockchain-enabled wireless communication technologies. We first provide a brief introduction to the fundamentals of blockchain, and then we conduct a comprehensive investigation of the most recent efforts in incorporating blockchain into wireless communications from several aspects. Importantly, we further propose a unified framework of the blockchain radio access network (B-RAN) as a trustworthy and secure paradigm for 6G networking by utilizing blockchain technologies with enhanced efficiency and security. The critical elements of B-RAN, such as consensus mechanisms, smart contract, trustworthy access, mathematical modeling, cross-network sharing, data tracking and auditing and intelligent networking, are elaborated. We also provide the prototype design of B-RAN along with the latest experimental results.  相似文献   

12.
Blockchain plays a vital task in cybersecurity. With the exerted efforts for realising large-scale quantum computers, most current cryptographic mechanisms may be hacked. Accordingly, we need a quantum tool utilised for designing blockchain frameworks to have the ability to be executed in the level of digital computers and resist the probable attacks from both digital and quantum computers. Quantum walks may be utilised as a quantum-inspired model for designing new cryptographic algorithms. In this paper, we present a new authentication and encryption protocol based on quantum-inspired quantum walks (QIQW). The proposed protocol is utilized to build a blockchain framework for secure data transmission among IoT devices. Instead of using classical cryptographic hash functions, quantum hash functions based on QIQW are employed for linking blocks of the chain. The main advantages of the presented framework are helping IoT nodes to effectively share their data with other nodes and full control of their records. Security analysis demonstrates that our proposed protocol can defend against message attack and impersonation attacks, thus ensuring secure transmission of data among IoT devices.  相似文献   

13.
区块联盟链视角下产学研信息平台框架构建研究   总被引:1,自引:0,他引:1  
崔金栋  王胜文 《现代情报》2019,39(8):143-151
[目的/意义]将区块联盟链引入到产学研信息平台进行数据管理,旨在依托分布式存储、非对称加密等技术打破产学研参与方之间的信息壁垒,提升产学研数据的安全性和可追溯性,高效解决产学研联盟的信息处理难题。[方法/过程]结合区块链技术对产学研信息平台进行需求分析,提出了联盟链产学研信息平台的框架构建,并在此基础上剖析了产学研信息平台的运行机理及数据处理流程,利用系统动力学阐述了产学研信息平台的运行动力。[结果/结论]研究成果归纳了4种联盟链产学研信息平台的应用场景,提出的发展建议与相关对策为区块联盟链视角下产学研信息平台的建设与应用提供了理论依据。  相似文献   

14.
Immunization is an indispensable mechanism for preventing infectious diseases in modern society, and vaccine safety is closely related to public health and national security. However, issues such as vaccine expiration and vaccine record fraud are still widespread in vaccine supply chains. Therefore, an effective management system for the supervision of vaccine supply chains is urgently required. As the next generation of core technology after the Internet, blockchain is designed to build trust mechanisms that can change current information management methods. Meanwhile, the development of machine learning technologies provides additional ways to analyze the data in information management systems. The main objective of this study is to develop a “vaccine blockchain” system based on blockchain and machine learning technologies. This vaccine blockchain system is designed to support vaccine traceability and smart contract functions, and can be used to address the problems of vaccine expiration and vaccine record fraud. Additionally, the use of machine learning models can provide valuable recommendations to immunization practitioners and recipients, allowing them to choose better immunization methods and vaccines.  相似文献   

15.
赵斌  姜雪  周洋 《情报科学》2023,41(1):158-165
【目的/意义】为了完善电子商务信用体系,优化电子商务环境,提高电子商务活动的安全性,提出基于区块链技术的在线电子商务信用信息共享方法。【方法/过程】本文首先构建了在线电子商务信用信息共享平台构架,通过将数字区块链技术和交易区块链技术融入到在线电子商务信用信息共享平台中,由数字区块链技术完成数据信息预处理过程,并利用拜占庭容错机制构建共识模型,保障在线电子商务信用信息共享平台的稳定性;由交易区块链技术中的盲签名算法提高信用信息的安全性和共享效率,实现电子商务信用信息的共享。最后,通过对比实验,对所提出的电子商务信用信息共享方法进行测试。【结果/结论】实验结果表明,所提方法的通信开销小、吞吐量高、时延小、安全性高、实用性强。【创新/局限】由于本文未结合实际案例对所提方法进行验证,研究结论具有一定局限性,因此今后需进一步深究与探讨。  相似文献   

16.
郑荣  张薇  高志豪 《情报科学》2022,40(5):137-143
【目的/意义】在国家安全观总体背景下,数字政府建设对数据安全提出了更高的要求。政府数据协同治理 过程中的政府数据资源开放和共享存在一定程度的安全隐患,将区块链技术应用到政府数据开放共享平台的构建 中,可应对开放共享过程中存在的数据安全问题,从而进一步充分发掘政府数据价值,保证数据安全并释放数据红 利。【方法/过程】本文利用区块链技术分布式、透明性、可追溯性和公开性等特点进行政府数据开放共享平台构建, 并研究其运行机制,以碳交易数据协同治理为例,探究区块链技术下政府数据开放共享平台在政府数据协同治理 中的价值体现。【结果/结论】基于区块链技术构建的政府数据开放共享平台与运行机制有助于强化政府部门和非 政府部门之间的协作,明确政府数据开放共享和数据协同治理过程中的数据标准、归属权、可信度等问题。【创新/ 局限】运用区块链技术为国家安全观背景下的政府数据协同治理及开放共享提供强有力的数据安全保障。  相似文献   

17.
[目的/意义]文章明确了目前影响学术信息资源云存储安全的关键影响因素。基于关键影响因素构建学术信息资源云存储安全保障策略,从而指导学术信息资源云存储安全保障实施。[方法/过程]结合学术信息资源云存储安全威胁分析和文献调研,对学术信息资源云存储安全的影响因素进行提取,再利用DEMATEL方法提炼出关键影响因素。[结果/结论]发现影响学术信息资源云存储安全的4大关键因素:访问控制、人员身份管理风险、数据完整性、数据丢失与泄露,并基于关键因素构建学术信息资源云存储安全保障方案。  相似文献   

18.
针对产业链转型升级过程中存在的标准信息不匹配、传递效率低下和监管不到位等问题,本文构建了基于区块链技术的产品标准链,设计了以标准链为主链、企业链为侧链的主侧链双链系统。该系统采用信誉积分的委托权益证明(DPOS)共识机制,并引入中心化监管机制的逻辑架构。基于区块链技术的标准链体系可以弱化产品标准的信息不对称程度,实现企业间标准信息的高效传递、匹配和共享,对科技赋能产业升级具有重要的理论与现实意义。  相似文献   

19.
This conceptual paper explores the impact of blockchain technology on public sector processes through the lens of information security. It includes an overview of the evolution of e-government, a synopsis of existing applications of blockchain technology, and innovative blockchain developments. We utilize the Confidentiality-Integrity-Accessibility (CIA) triad to guide our discussion of the security, governance, and regulatory implications of this technology. Leveraging the CIA triad model, we provide context for public managers who may consider blockchain technologies, and we highlight certain advantages arising from the “non-reputability” of distributed ledgers.In particular, we highlight the advantages of blockchain technologies with regards to non-reputability to help public managers understand how to best leverage blockchain technology to transform operations.  相似文献   

20.
娄雪  耿子健  刘成立 《情报科学》2021,39(6):103-107
【目的/意义】互联网信息技术的兴起带动了区域经济的发展,由此也产生了大量的经济信息。区块链作为 变革互联网的新力量,将对信息资源共享活动和信息服务机构带来巨大改变。【方法/过程】区块链技术是一种新兴 科技,通过去中心化的方式建设系统信任机制,具有开放、透明和不可篡改等技术特点,将该技术作为实现系统数 据存储安全、使用安全的关键,本文针对基于区块链技术的区域经济信息共享进行了框架设计。【结果/结论】利用 区块链技术设置区域经济信息双链式存储方式,并利用P2P实现了区域经济信息共享。【创新/局限】在接下来的研 究中将从理论研究转向实践应用。区块链及其技术还存在一些问题,实现基于区块链的区域经济信息共享仍需克 服诸多困难。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号