Font Size: a A A

Hyperledger Fabric-Oriented Research On Optimization Of Cryptographic Components And Security Application

Posted on:2024-03-03Degree:MasterType:Thesis
Country:ChinaCandidate:J L MengFull Text:PDF
GTID:2568306941995429Subject:Cyberspace security
Abstract/Summary:PDF Full Text Request
With the rapid development of blockchain technology in the financial field,its security and controllability have received great attention.Based on this,the Chinese government has put forward technical requirements for the application of cryptography to the blockchain industry,indicating that the commercial use of blockchain services in China needs to support the national cryptography algorithm.However,the native Fabric only supports the international encryption algorithm,so it is particularly necessary to embed the domestic encryption algorithm independently developed by China into the Fabric platform.At the same time,there are some problems in traditional identity authentication,access control and security audit technology,such as single point of failure,data easy to be tampered with and data untrustworthy.A distributed system and trust mechanism are needed as the underlying system support.In response to the above problems,the paper proposes a research and security application scheme for the optimization of cryptographic components for Hyperledger Fabric,and designs and implements a high-level information security support platform for Hyperledger Fabric based on the combination of blockchain technology,national security algorithm,identity authentication,access control technology and security audit.The main work of this paper is as follows:First,this paper studies the optimization model of cryptographic components for Hyperledger Fabric.According to the requirements of the government and the industry,based on the pluggable mechanism of Fabric,this paper has enhanced the state secret algorithm of Fabric architecture.Firstly,this paper combs and studies the overall architecture of the Fabric blockchain,including Fabric CA and Fabric ontology.Secondly,this paper combs the route of fabric cipher component optimization,develops a specific scheme of cipher component optimization,and then designs and implements the cipher component optimization of Fabric CA,Bccsp module and X509 certificate in detail.Second,this paper studies the key technologies involved in the security application protocol based on blockchain.First of all,based on the access permission mechanism of the alliance chain,this paper proposes the identity authentication protocol based on the blockchain,designs the identity authentication scheme based on the blockchain certificate and Fabric CA in detail,and uses the double signature method to further improve its security and reliability.Secondly,this paper proposes blockchain-based access control protocol and security audit protocol,and implements them based on smart contracts,providing a flexible and dynamically configurable real-time access control and security audit mechanism based on blockchain,further improving the security and controllability of the system.Third,this paper designs and implements a high-level information security support platform based on Hyperledger Fabric optimized by cryptographic components.On the basis of the research on the cryptographic components of Fabric and the security application protocol based on the blockchain,this paper builds the underlying blockchain platform using the enhanced Fabric alliance chain of State Security,and implements the prototype system of the high-level information security support platform based on smart contract,front-end and back-end interaction and other technologies.The back-end interface and algorithm are written in java language,and the smart contract is written in go language.The prototype system includes user identity management,access control,security audit and early warning modules,and shows the functions of the key modules of the system.Finally,the function and performance of the high-level information security support platform of Hyperledger Fabric based on cryptographic component optimization are evaluated.The test results show that the system can meet the interaction function of security technology,and has flexibility and scalability.
Keywords/Search Tags:Hyperledger Fabric, State Secret Algorithm, Identity Authentication, Access Control, Security Audit
PDF Full Text Request
Related items