Education, Science, Technology, Innovation and Life
Open Access
Sign In

Blockchain-Based Information Security Management: A Brief Review

Download as PDF

DOI: 10.23977/jeis.2022.070204 | Downloads: 26 | Views: 800

Author(s)

Wenxin Zhao 1

Affiliation(s)

1 Taiyuan University of Technology, Taiyuan, China

Corresponding Author

Wenxin Zhao

ABSTRACT

Blockchain integrates P2P network, cryptography, consensus mechanism, smart contract and other technologies, realizing the functions of reliable information transfer between nodes in decentralized transactions, security of trading accounts, and information transfer between nodes will not be tampered with. Block chain technology uses distributed data management technology to store data in chain structure. It plays an important role in information security management and, to a certain extent, ensures user information security. From the perspective of data security management, this paper describes and analyzes the problems existing in data storage security, privacy security, data access security and data sharing security, and the solutions proposed by scholars. In data storage, it mainly introduces on-chain storage and on-chain collaborative storage, introduces privacy security from identity privacy and transaction privacy, and focuses on identity authentication and access control for data access security. Finally, it introduces data sharing security. In the future research, the application of blockchain in information security management is still worthy of attention.

KEYWORDS

Blockchain, Data management, Information security

CITE THIS PAPER

Wenxin Zhao, Blockchain-Based Information Security Management: A Brief Review. Journal of Electronics and Information Science (2022) Vol. 7: 21-26. DOI: http://dx.doi.org/10.23977/jeis.2022.070204.

REFERENCES

[1] EL-HINDI M, BINNIG C, ARASU A, et al. BlockchainDB: a shared database on blockchains [C]// Proceedings of the VLDB Endowment. Los Angeles: VLDB, 2019: 1597–1609.
[2] ALI S, WANG G, WHITE B, et al. A blockchain-based decentralized data storage and access framework for pinger [C]//Proceedings of the 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science and Engineering. New York: IEEE, 2018: 1303–1308.
[3] XIAO Yang, ZHANG Ning, LI Jin, et al. PrivacyGuard:enforcing private data usage control with blockchain and attested off-chain contract execution [C]// Proceedings of the European Symposium on Research in Computer Security. Cham: Springer, 2020: 610–629.
[4] BONNEAU J, NARAYANAN A, MILLER A, et al. Mixcoin: anonymity for bitcoin with accountable mixes [C]// International Conference on Financial Cryptography and Data Security. Berlin: Springer, 2014: 486–504.
[5] MAXWELL G. CoinJoin: Bitcoin privacy for the real world [EB/OL]. (2013-08-22). https://bitcointalk.org/index. php?topic=279249.0.
[6] FROMKNECHT C, VELICANU D, YAKOUBOY S. Certcoin: a namecoin based decentralized authentication system 6.857 class project [EB/OL]. (2014-03-14). http://courses.csail.mit.edu/6.857/2014/files/19-fromknecht-velicann-yakoubov- certcoin.pdf.
[7] MATSUMOTO S, REISCHUK R. IKP: turning a PKI around with decentralized automated incentives [C]// Proceedings of 2017 IEEE Symposium on Security and Privacy. San Jose: IEEE, 2017: 410–426.
[8] CRUZ J, KAJI Y, YANAI N. RBAC-SC: role-based access control using smart contract [J]. IEEE Access, 2018, 6: 12240–12251.
[9] OUADDAH A, ABOU E A, AIT O A. FairAccess: a new blockchain-based access control framework for the Internet of things [J]. Security and Communication Networks, 2016, 9(18): 5943–5964.
[10] JIANG Peng, GUO Fu-chun, LIANG Kai-tai, et al. Searchain: blockchain-based private keyword search in decentralized storage [J]. Future Generation Computer Systems, 2020, 107: 781–792.
[11] SHEN Meng, TANG Xiang-yun, ZHU Lie-huang, et al. Privacypreserving support vector machine training over blockchain-based encrypted IoT data in smart cities [J]. IEEE Internet of Things Journal, 2019, 6(5): 7702–7712.
[12] GAO Feng, ZHU Lie-huang, GAI Ke-ke, et al. Achieving a covert channel over an open blockchain network [J]. IEEE Network, 2020, 34(2): 6–13.
[13] JIA Da-yu, XIN Jun-chang, WANG Zhi-qiong, et al. ElasticChain: support very large blockchain by reducing data redundancy [C]// Proceedings of the Asia-Pacific Web and Web-Age Information Management Joint International Conference on Web and Big Data. Cham: Springer, 2018: 440–454.
[14] ALI S, WANG G, WHITE B, et al. A blockchain-based decentralized data storage and access framework for pinger [C] //Proceedings of the 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science and Engineering. New York: IEEE, 2018: 1303–1308.

Downloads: 6306
Visits: 248650

Sponsors, Associates, and Links


All published work is licensed under a Creative Commons Attribution 4.0 International License.

Copyright © 2016 - 2031 Clausius Scientific Press Inc. All Rights Reserved.