Font Size: a A A

Research On Railway Passenger Privacy Protection Technology Based On Blockchain And Distributed Database

Posted on:2019-06-03Degree:DoctorType:Dissertation
Country:ChinaCandidate:L J ZhouFull Text:PDF
GTID:1368330545965371Subject:Traffic Information Engineering & Control
Abstract/Summary:PDF Full Text Request
Different from traditional passenger privacy protection technology,blockchain and distributed data technology can combine to prevent the loss,tamper,and traceability of railway passengers' privacy information data,as well as high reliability,high computing capacity,large-capacity storage,and strong scalability,cost savings and other technical characteristics.Based on this,make full use of the advantages of the above technologies,designing a private blockchain for railway passengers taking passenger information nodes at all levels of stations,roads and head offices as their carrier,and distributing the entire passenger data storage of the head office and railway bureau.Technology architecture and multi-layered data application technology solutions and strategies for passenger privacy protection systems,which meet the explosive growth in the amount of data required to satisfy travelers' private information,complete the requirements for performance and reliability of large data storage and calculations,and protect travelers The privacy information data is not arbitrarily tampered with,and it is of great theoretical and practical significance to realize the traceability of passengers' behavioral traces.In view of this,this article has conducted in-depth research on how to protect the safety of passenger privacy information data and how to construct a protective system that is as complete as possible,based on combing the results of previous studies and combining with the actual background of the railway ticketing business.Some of the important results with reference value are as follows:First,build a private blockchain of railway passengers who use the passenger information network node as their carrier.Within the scope of the whole road,manual ticket window,real-name system verification window,automatic ticket vending machine,automatic ticket collection machine,entrance and exit gate,self-service real-name system check gate,arrival ticket replacement window,inbound replacement ticket window,and city sales outlet,ticket booking servers,Internet ticketing servers and other whole-line ticket transaction terminals are included in the blockchain and design corresponding technical frameworks,including:data storage structure,information coding and security,network technology,consensus mechanism and smart contract.The data storage structure includes a version number,a timestamp,a transaction type,a type quantity,a node code,a node identifier,an authorization information,an algorithm counter,a root value of a Merkle tree,and a rail passenger privacy information data block header storage structure of a preamble block header.,and use Merkle tree type data structure for recording;information encoding and security using asymmetric encryption technology for the passenger's identification number and related information encryption processing;network technology using P2P networking to build a railway blockchain network,to achieve the entire road The link of network nodes;the consensus mechanism is to design an effective workload proof mechanism(VPoW)by optimizing the PoW mechanism,to achieve the proof of effective transaction workload based on the transaction node,and achieve network-wide consistency;the use of the smart contract platform has been Prepare good procedures for the design of digital,electronic encrypted ticketing and ensure that the personal data associated with passengers is effectively protected by standardizing the basic processes.Second,the introduction of distributed cluster data storage structure design.Considering that the current system solves the problems of high reliability,high availability,and coping with large concurrent transaction volumes in centralized data storage,this paper believes that it is possible to consider introducing a distributed environment to the current system,and to put all the central office data bases and total databases into account.The company-level seat databases are jointly built as a distributed database system.All node data are synchronized in real time,real high reliability,and solve the current risks and waste of resources in the master-slave model of the railway bureau and the master-slave model of the head office.master-slave model of the head office.At the same time,combining CAP theory in the choice of database architecture to meet the consistency and availability as much as possible,and then based on the strong consistency,weak consistency,the ultimate consistency of the three trade-offs,proposed a two-phase commit protocol,three-phase commit protocol and improvement The PAXOS algorithm adapts to railway ticket special network,star structure,large bandwidth,high credibility,large-scale concurrent access,frequent data update,and no transaction deviation,and realizes high-speed,reliable,error-free synchronization of data.Third,the preparation of technical solutions for data security applications.In order to ensure data application security under the architecture,this paper has compiled technical solutions and usage specifications covering data security,network security,organizational management security(security specification),application security,and system security.In terms of data security,based on the theory of data full life cycle,data protection,data storage,data mining,and data release are carried out to protect the data.In accordance with the data security features of each link,data security assurance technologies are applied.In terms of network security,Involved in security management domain,network strategy,intrusion prevention management,and network transmission management;in terms of organization and management security,data authorization process must be established based on data security grading standards and data user's job responsibilities to ensure data security and Compliance.Data security management must meet the requirements of business operations and supervision,establish a standardized data security classification and authorization use system for all enterprise data,and apply security,configure application security,and install applications to non-standard directories and ports.Eight aspects of locking applications,securing P2P services,and ensuring the code security of application programmers include multi-perspective and systematic management.The main contents include:application vulnerability management,code auditing,application deployment security,and tamper-resistant management.The common vulnerability audit methods include SQL injection,XSS,CSRF,file operations,code/command execution,variable coverage,session authentication,and logic processing.In terms of system security,security tools,logging tools,and real-time security monitoring tools are used.For system security vulnerabilities,patch management is performed to analyze the status of the system in real time so as to prevent risk in advance and upgrade the system in a timely manner.The security vulnerabilities must be promptly repaired.
Keywords/Search Tags:railway, traveler privacy protection, distributed database, terminal blockchain, technical solutions
PDF Full Text Request
Related items