Font Size: a A A

Research On Data Security Sharing Based On Blockchain

Posted on:2022-01-14Degree:MasterType:Thesis
Country:ChinaCandidate:X Y DuFull Text:PDF
GTID:2518306557468164Subject:Information security
Abstract/Summary:PDF Full Text Request
Data sharing can increase the value of data.However,in the sharing process,there are security risks such as centralized deployment,malicious theft,and tampering,which affect the security of data greatly.In a group-oriented data sharing scenario,a group key is shared between group members,and all communications within the group must be encrypted with the group key,which protects the confidentiality of shared data.Therefore,the security of the data sharing can be ensured by ensuring the security of the key.There are currently three problems with key security.First,distributed key management schemes are widely used because they eliminate the threat of centralization.However,distributed management poses a threat to the consistency and verification of keys.Second,distributed key management requires cooperation between legitimate members.With the development of the Internet of Things,the scale of group communication is getting larger and larger.Efficient identity authentication in large-scale group communication is also one of the important issues for key security.Third,another problem in data security sharing is how to protect the security of the key when the group members change dynamically.In response to the above problems,this article proposes some effective schemes.This paper proposes a blockchain-based key management scheme in distributed network,which solves the problem of distributed management of keys.The scheme has made improvements on the threshold secret sharing scheme.In this scheme,the key and the key share are generated by the cooperation of network nodes.In addition,the relevant value of the key share and the verification parameters are disclosed on the blockchain to realize the traceability of malicious nodes.Security analysis and performance analysis show that,compared with the traditional key management scheme,this scheme can realize the security requirements of distributed network in the in actual scenarios effectively,and the computational cost of verification in actual key management has been optimized.This paper proposes an effective identity authentication and key agreement scheme to improve the efficiency of equipment authentication in large-scale machine communication.This scheme is based on a symmetric quadratic polynomial.This scheme can authenticate a large number of machine type communication devices at the same time,and establish independent session keys with the network respectively,which reduces the signaling congestion caused by concurrent large-scale access requests in the network greatly.Not only that,the scheme can support multiple identity authentication and improve the efficiency greatly.All the schemes proposed in this paper are oriented to dynamic groups,which can protect the security of keys when group members change dynamically.The scheme with a dynamic update strategy can be used in actual application scenarios and solves the security problems faced by data sharing effectively.
Keywords/Search Tags:Verifiable Secret Sharing, Key Management, Key Agreement, Authentication, Blockchain
PDF Full Text Request
Related items