Journal of Information Security Reserach ›› 2023, Vol. 9 ›› Issue (3): 208-.
Previous Articles Next Articles
Online:
2023-03-04
Published:
2023-03-03
余晗1梁音2宋继勐1李何筱2奚溪2原洁璇2
通讯作者:
余晗
硕士,工程师.主要研究方向为区块链、能源互联网、大数据.
han-yu1@sgcc.com.cn
作者简介:
余晗
硕士,工程师.主要研究方向为区块链、能源互联网、大数据.
hanyu1@sgcc.com.cn
梁音
硕士研究生.主要研究方向为区块链、数据安全.
18801326002@163.com
宋继勐
硕士,高级工程师.主要研究方向为大数据、区块链、电碳核算方法学体系.
jimengsong@sgcc.com.cn
李何筱
硕士研究生.主要研究方向为深度强化学习、网络安全.
15554506998@163.com
奚溪
硕士研究生.主要研究方向为网络安全.
xixi1018225@126.com
原洁璇
硕士研究生.主要研究方向为区块链、电力信息安全.
jxyuan0621@163.com
参考文献 [1]孟丹. 区块链背景下的数据安全共享机制研究[J]. 企业科技与发展, 2021 (10): 5254[2]潘兰芬.大数据时代统计数据共享的分析[J]. 财经界,2019(14):157158[3]McMahan B, Moore E, Ramage D, et al. Communicationefficient learning of deep networks from decentralized data[C] Proc of Artificial Intelligence and Statistics. Brazil: Federal University of Pernambuco, 2017: 12731282[4]Xu L, Wu X, Zhang X. CLPRE: A certificateless proxy reencryption scheme for secure data sharing with public cloud[C] Proc of the 7th ACM Symp on Information, Computer and Communications Security. New York: ACM, 2012: 8788[5]Elhoseny M, Abdelaziz A, Salama A S, et al. A hybrid model of Internet of things and cloud computing to manage big data in health services applications[J]. Future Generation Computer Systems, 2018, 86: 13831394[6]王岽. 基于云服务的远程医疗数据共享系统设计与实现[D]. 石家庄: 河北科技大学, 2020[7]王战红, 姚瑶, 张文, 等. Oracle Database 11g实用教程: 计算机基础与实训教材系列[M]. 北京: 清华大学出版社, 2014[8]Ng W S, Ooi B C, Tan K L, et al. Peerdb: A P2Pbased system for distributed data sharing[C] Proc of the 19th Int Conf on Data Engineering. Piscataway, NJ: IEEE, 2003: 633644[9]Jonathan M, Anna Q, Daniel G, et al. Dataclay: A distributed data store for effective interplayer data sharing[J]. Journal of Systems and Software, 2017, 131: 129145[10]Nakamoto S. Bitcoin: A peertopeer electronic cash system[JOL]. 2008 [20230205]. http:www.bitcoin.orgbitcoin.pdf[11]Swan M. Blockchain: Blueprint for a New Economy[M]. Sebastopol: O’Reilly Media, Inc, 2015[12]Sun J, Yan J, Zhang K Z K. Blockchainbased sharing services: What blockchain technology can contribute to smart cities[J]. Financial Innovation, 2016, 2(1): 19[13]McConaghy T, Marques R, Muller A, et al. Bigchaindb: A scalable blockchain database[JOL]. 2016 [20230205]. https:www.bigchaindb.comwhitepaperbigchaindbwhitepaper.pdf[14]Zikratov I, Kuzmin A, Akimenko V, et al. Ensuring data integrity using blockchain technology[C] Poc of the 20th Conf of Open Innovations Association(FRUCT). StPetersburg, Russia: TRIK Studio, 2017: 534539[15]Shafagh H, Burkhalter L, Hithnawi A, et al. Towards blockchainbased auditable storage and sharing of IoT data[C] Proc of the 2017 Conf on Cloud Computing Security Workshop. New York: ACM, 2017: 4550[16]Muzammal M, Qu Q, Nasrulin B. A blockchain database application platform[J]. ArXiv preprint, arXiv:1808.05199, 2018[17]张超, 李强, 陈子豪, 等. Medical chain: 联盟式医疗区块链系统[J]. 自动化学报, 2019, 45(8): 14951510[18]AlZahrani F A. Subscriptionbased datasharing model using blockchain and data as a service[J]. IEEE Access, 2020, 8: 115966115981[19]Elayan H, Aloqaily M, Guizani M. Deep federated learning for IoTbased decentralized healthcare systems[C] Proc of 2021 Int Wireless Communications and Mobile Computing (IWCMC). Piscataway, NJ: IEEE, 2021: 105109[20]Yang H, Bai Y, Zou Z, et al. Research on the security sharing model of power grid data based on federated learning[C] Proc of the 5th IEEE Information Technology, Networking, Electronic and Automation Control Conf(ITNEC). Piscataway, NJ: IEEE, 2021: 15661569[21]Qu Y, Gao L, Luan T H, et al. Decentralized privacy using blockchainenabled federated learning in fog computing[J]. IEEE Internet of Things Journal, 2020, 7(6): 51715183[22]Chai H, Leng S, Chen Y, et al. A hierarchical blockchainenabled federated learning algorithm for knowledge sharing in Internet of vehicles[J]. IEEE Trans on Intelligent Transportation Systems, 2020, 22(7): 39753986[23]Bonawitz K, Eichner H, Grieskamp W, et al. Towards federated learning at scale: System design[J]. arXiv preprint, arXiv:1902.01046, 2019[24]Yuan Xiaoming, Chen Jiahui, Zhang Ning, et al. A federated bidirectional connection broad learning scheme for secure data sharing in Internet of vehicles[J]. China Communications, 2021, 18(7): 117133[25]Yang Q, Liu Y, Chen T, et al. Federated machine learning: Concept and applications[JOL]. 2019 [20230205]. https:arxiv.orgpdf1902.04885v1[26]Ghimire B, Rawat D B. Recent advances on federated learning for cybersecurity and cybersecurity for federated learning for Internet of things[J]. IEEE Internet of Things Journal, 2022, 9(11): 82298249[27]Murshed M G S, Murphy C, Hou D, et al. Machine learning at the network edge: A survey[J]. ACM Computer Survey, 2022, 54(8): 137[28]周传鑫. 面向联邦学习的数据安全共享关键技术研究[D]. 郑州: 战略支援部队信息工程大学, 2022[29]Arcolezi H H, Couchot J F, Al Bouna B, et al. Random sampling plus fake data: Multidimensional frequency estimates with local differential privacy[C] Proc of the 30th ACM Int Conf on Information & Knowledge Management. New York: ACM, 2021: 4757[30]Wang N, Xiao X K, Yang Y, et al. Collecting and analyzing multidimensional data with local differential privacy[C] Proc of the 35th IEEE Int Conf on Data Engineering (ICDE). Piscataway, NJ: IEEE, 2019: 638649[31]Xi P, Zhang X, Wang L, et al. A review of blockchainbased secure sharing of healthcare data[J]. Applied Sciences, 2022, 12(15): 7912[32]刘明达, 陈左宁, 拾以娟, 等. 区块链在数据安全领域的研究进展[J]. 计算机学报, 2021, 44(1): 127[33]Cheng X, Chen F, Xie, D, et al. Design of a secure medical data sharing scheme based on blockchain[JOL]. Journal of Med System, 2020 [20230205]. https:doi.org10.1007s1091601914681[34]Xu Hongbiao, Qian He, Xuecong Li, et al. BDSSFA: A blockchainbased data security sharing platform with finegrained access control[J]. IEEE Access, 2020, 8: 8755287561[35]Zhong C, Liu K, Liang Z, et al. Research on data security sharing in blockchain: Challenges and prospects[C] Proc of 2022 IEEE Int Conf on Electrical Engineering, Big Data and Algorithms (EEBDA). Piscataway, NJ: IEEE, 2022: 13221327[36]Kamara S, Lauter K. Cryptographic cloud storage[C] Proc of the 14th Int Conf on Financial Cryptograpy and Data Security (FC’10). Berlin: Springer, 2010: 136149[37]Oualha N, Roudier Y. Reputation and audits for selforganizing storage[C] Proc of the Workshop on Security in Opportunistic and Social Networks. New York: ACM, 2008: 110[38]Emil S, Marten V D, Ari J, Alina O. Iris: A scalable cloud file system with efficient integrity checks[C] Proc of ACSAC. New York: ACM, 2012: 229238[39]Wang Q, Wang C, Ren K, et al. Enabling public auditability and data dynamics for storage security in cloud computing [J]. IEEE Trans on Parallel and Distributed Systems, 2011, 22(5): 847859[40]张戈, 华蓓. 云存储环境下基于时释性加密的CPABE方案[J]. 计算机系统应用, 2021, 30(1): 4553[41]Bonatti P,Samarati P. A uniform framework for regulating service access and information release on the web [J]. Journal of Computer Security, 2002, 10 (3): 241271[42]Fredrikson M, Jha S, Ristenpart T. Model inversion attacks that exploit confidence information and basic countermeasures[C] Proc of the 22nd ACM SIGSAC Conf on Computer and Communications Security. New York: ACM, 2015: 13221333[43]Tramèr F, Zhang F, Juels A, et al. Stealing machine learning models via prediction apis[C] Proc of the 25th USENIX Security Symp. Berkeley, CA: USENIX Association, 2016: 601618[44]Shokri R,Stronati M, Song C, et al. Membership inference attacks against machine learning models[C] Proc of 2017 IEEE Symp on Security and Privacy (SP). Piscataway, NJ: IEEE, 2017: 318[45] Liu X, Li H, Xu G, et al. Adaptive privacypreserving federated learning[J]. PeertoPeer Networking and Applications, 2020, 13(6): 23562366[46]Bonawitz K, Ivanov V, Kreuter B, et al. Practical secure aggregation for privacypreserving machine learning[C] Proc of the 2017 ACM SIGSAC Conf on Computer and Communications Security. New York: ACM, 2017: 11751191[47] Horvath S, Ho C Y, Horvath L, et al. Natural compression for distributed deep learning[J]. arXiv preprint, arXiv:1905.10988, 2019[48]Gilbert S, Lynch N. Perspectives on the CAP Theorem[J]. Computer, 2012, 45(2): 3036[49]Abadi D. Consistency tradeoffs in modern distributed database system design: CAP is only part of the story[J]. Computer, 2012, 45(2): 3742[50]Zheng S, Jin X, Huang G, et al. Coordination of commercial prosumers with distributed demandside flexibility in energy sharing and management system[JOL]. Energy, 2022 [20230205]. https:doi.org10.1016j.energy.2022.123634[51]Mengelkamp E, Notheisen B, Beer C, et al. A blockchainbased smart grid: Towards sustainable local energy markets[J]. Computer ScienceResearch and Development, 2018, 33(12): 207214[52]Antal C, Cioara T, Antal M, et al. Blockchain based decentralized local energy flexibility market[J]. Energy Report, 2021, 7: 52695288[53]Mu C, Ding T, Sun Y, et al. Energy blockbased peertopeer contract trading with secure multiparty computation innanogrid[J]. IEEE Trans on Smart Grid, 2022, 13(6): 47594772[54]Huh S, Cho S, Kim S. Managing IoT devices using blockchain platform[C] Proc of the 19th Int Conf on Advanced Communication Technology (ICACT). Piscataway, NJ: IEEE, 2017: 464467[55]Lao L, Li Z, Hou S, et al. A survey of IoT applications in blockchain systems[J]. ACM Computer Survey, 2020, 53(1): 132[56]Li M, Pei P, Yu F R, et al. Cloudedge collaborative resource allocation for blockchainenabled Internet of things: A collective reinforcement learning approach[J]. IEEE Internet of Things Journal, 2022, 9(22): 2311523129[57]Si F, Zhang N, Wang Y, et al. Distributed optimization for integrated energy systems with secure multiparty computation[JOL]. IEEE Internet of Things Journal, 2022 [20230205]. https:doi.org10.1109JIOT.2022.3209017[58]Song H, Zhou E, Pi B, et al. Apply blockchain technology to electric vehicle battery refueling[C] Proc of Hawaii Int Conf on System Sciences. 2018: 44944502[59]Kim N, Kang S M, Hong C S. Mobile charger billing system using lightweight Blockchain[C] Proc of the 19th AsiaPacific Network Operations and Management Symposium (APNOMS). 2017: 374377[60]Tanwar S, Kakkar R, Gupta R, et al. Blockchainbased electric vehicle charging reservation scheme for optimum pricing[J]. International Journal of Energy Research, 2022, 46(11): 1499415007[61]Saputra Y M, Hoang D T, Nguyen D N, et al. Energy demand prediction with federated learning for electric vehicle networks[J]. arXiv preprint, arXiv:1909.00907, 2019[62]Li K, Yang Y, Wang S, et al. A lightweight privacypreserving and sharing scheme with dualblockchain for intelligent pricing system of smart grid[J]. Computer Security, 2021, 103(5): 102189102201[63]Daghmehchi M, Ghorbani A. HyBridge: A hybrid blockchain for privacypreserving and trustful energy transactions in InternetofThings platforms[JOL]. Sensors, 2020 [20230205]. https:doi.org10.3390s20030928 |
[1] | . Energy Data Sharing Access Control Model Based on Blockchain [J]. Journal of Information Security Reserach, 2023, 9(3): 220-. |
[2] | . Research on On-chain and Off-chain Data Supervision Scheme for Energy Big Data [J]. Journal of Information Security Reserach, 2023, 9(3): 235-. |
[3] | . Research on Blockchain Anomaly Transaction Detection Technology Based on Stacking Ensemble Learning [J]. Journal of Information Security Reserach, 2023, 9(2): 98-. |
[4] | . Research on Personal Privacy Data Sharing Technology Based on Blockchain Traceability [J]. Journal of Information Security Reserach, 2023, 9(2): 109-. |
[5] | . Research on the Trusted Identity Scheme of Internet of Vehicles Based on Blockchain Oracle [J]. Journal of Information Security Reserach, 2023, 9(2): 120-. |
[6] | . Research and Implementation of Electronic License Sharing Scheme Based on Blockchain [J]. Journal of Information Security Reserach, 2023, 9(2): 127-. |
[7] | . Blockchainbased Data Element Resources Sharing and Access Control Scheme [J]. Journal of Information Security Reserach, 2023, 9(2): 137-. |
[8] | . [J]. Journal of Information Security Reserach, 2022, 8(8): 760-. |
[9] | . The Detection Method for Token Trading Vulnerability and Authority Transfer Vulnerability Based on Symbolic Execution [J]. Journal of Information Security Reserach, 2022, 8(7): 632-. |
[10] | . [J]. Journal of Information Security Reserach, 2022, 8(6): 605-. |
[11] | . [J]. Journal of Information Security Reserach, 2022, 8(6): 613-. |
[12] | . DB-in-DB: A New Blockchain Database Architecture [J]. Journal of Information Security Reserach, 2022, 8(5): 429-. |
[13] | . Research on Key Issues of Blockchain Experimental Platform for Trusted Transactions [J]. Journal of Information Security Reserach, 2022, 8(5): 437-. |
[14] | . [J]. Journal of Information Security Reserach, 2022, 8(5): 452-. |
[15] | . Design of a Smart Contract Specific Language for Financial Field [J]. Journal of Information Security Reserach, 2022, 8(5): 468-. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||