拟态区块链——区块链安全解决方案
作者:
作者简介:

徐蜜雪(1993-),女,山东莱州人,硕士生,主要研究领域为区块链隐私与安全,对称密码攻击;苑超(1992-),男,硕士生,主要研究领域为区块链隐私与安全;王永娟(1982-),女,博士,副教授,CCF专业会员,主要研究领域为密码算法设计与分析;付金华(1980-),男,博士生,CCF学生会员,主要研究领域为区块链,大数据;李斌(1955-),男,博士,教授,博士生导师,主要研究领域为计算机辅助几何设计,计算机图形学,科学计算可视化,医学图像处理.

通讯作者:

苑超,E-mail:yc_xxgcdx@163.com

基金项目:

国家重点研发计划(2016YFB0800101,2016YF0800100);国家自然科学基金(61521003)


Mimic Blockchain—Solution to the Security of Blockchain
Author:
Fund Project:

National Key Research Program of China (2016YFB0800101, 2016YF0800100); National Natural Science Foundation of China (61521003)

  • 摘要
  • | |
  • 访问统计
  • |
  • 参考文献 [30]
  • |
  • 相似文献 [20]
  • | | |
  • 文章评论
    摘要:

    区块链起源于比特币,其核心是去中心化、去信任、防篡改、防伪造、可溯源,因此在任何高价值数据的管理、存储与流通的过程中都可以用到区块链.区块链已经在多种场景中得到应用,但是区块链的安全问题一直存在,且对用户权益影响极大.拟态防御是由中国的研究团队提出的新型网络防御技术,对新型系统的网络防御具有重要的作用.首先介绍区块链面临的安全威胁以及目前存在的应对方案,然后对拟态防御中核心的动态异构冗余(dynamic heterogeneous redundance,简称DHR)架构进行介绍;其次,针对区块链存在的潜在安全问题,借鉴动态异构冗余架构和密码抽签的思想,结合安全性定义和参数选择规则,从动态异构共识机制以及动态异构冗余签名算法两个角度提出了区块链的安全解决方案,称为拟态区块链;最后进一步分析了拟态区块链的安全性和性能,结果显示,动态异构冗余区块链可以在多个方面得到比典型区块链更好的安全性.

    Abstract:

    Blockchain, originated from Bitcoin, for whose core is decentralized, detrusted, tamper-resistant, unforgeable, and traceable, can be used in management, storage, and circulation of high value data. Blockchain has been applied in a variety of scenarios, but the security problems of blockchain have always existed and have great influence on users' rights and interests. Mimetic defense is a new network defense technology proposed by Chinese research team, which plays an important role in network defense of a new class of system. This paper first introduces the security threats faced by the blockchain and the existing solutions. Then the core ideas of mimetic defense, the typical dynamic heterogeneous redundance (DHR) architecture are introduced. Second, in view of the potential security problems of blockchain, combining the definition of security and parameter selection, dynamic heterogeneous consensus mechanism and DHR signature mechanism are put forward from the ideas of DHR architecture and cryptographic sortition to construct a security solution for blockchain which is called the mimic blockchain in this paper. Finally, the security and property of the mimic blockchain is further analyzed, the result shows that the dynamic heterogeneous blockchain can provide increased security over the typical blockchain in many aspects.

    参考文献
    [1] Gandal N, Halaburda H. Competition in the cryptocurrency market. Social Science Electronic, 2014,10:14-17.[doi:10.2139/ssrn. 2506463]
    [2] Korpela K, Hallikas J, Dahlberg T. Digital supply chain transformation toward blockchain integration. In:Proc. of the 50th Hawaii Int'l Conf. on System Sciences. Honolulu:University of Hawaii, 2017.4182-4191.[doi:10.24251/HICSS.2017.506]
    [3] Chen PW, Jiang BS, Wang CH. Blockchain-based payment collection supervision system using pervasive bitcoin digital wallet. In:Proc. of the Int'l Conf. on Wireless and Mobile Computing, Networking and Communications (WiMob). Rome:IEEE, 2017.25-28.[doi:10.1109/WiMOB.2017.8115844]
    [4] Dorri A, Kanhere SS, Jurdak R. Towards an optimized blockchain for IoT. In:Proc. of the IEEE/ACM 2nd Int'l Conf. on Internet- of-Things Design and Implementation. Pittsburgh:IEEE, 2017.173-178.[doi:10.1145/3054977.3055003]
    [5] Bozic N, Pujolle G, Secci S. A tutorial on blockchain and applications to secure network control-planes. In:Proc. of the 20163rd Smart Cloud Networks & Systems. Dubai:IEEE, 2017.1-8.[doi:10.1109/SCNS.2016.7870552]
    [6] Sato M, Matsuo S. Long-term public blockchain:resilience against compromise of underlying cryptography. In:Proc. of the IEEE European Symp. on Security and Privacy Workshops. IEEE, 2017.1-8.
    [7] Sukhwani H, Martínez JM, Chang X, et al. Performance modeling of PBFT consensus process for permissioned blockchain network (hyperledger fabric). In:Proc. of the 2017 IEEE 36th Symp. on Reliable Distributed Systems (SRDS). Hong Kong:IEEE, 2017.253-255.[doi:10.1109/SRDS.2017.36]
    [8] Dinh TTA, Wang J, Chen G, et al. BLOCKBENCH:A framework for analyzing private blockchains. In:Proc. of the 2017 ACM Int'l Conf. on Management of Data. Chicago:ACM Press, 2017.1085-1100.[doi:10.1145/3035918.3064033]
    [9] Melanie. Blockchain:Blueprint for a New Economy. O'Reilly Media, 2015.
    [10] Ulieru M. Blockchain 2.0 and Beyond:Adhocracies. Springer Int'l Publishing, 2016.297-305.[doi:10.1007/978-3-319-42448-4_15]
    [11] Red VA. Practical comparison of distributed ledger technologies for IoT. In:Proc. of the Society of Photo-Optical Instrumentation Engineers (SPIE) Conf. Series, 2017.[doi:10.1117/12.2262793]
    [12] Bender MA, Farach-Colton M, Pemmasani G, et al. Lowest common ancestors in trees and directed acyclic graphs. Journal of Algorithms, 2005,57(2):75-94.[doi:10.1016/j.jalgor.2005.08.001]
    [13] Delmolino K, Arnett M, Kosba A, et al. Step by step towards creating a safe smart contract:Lessons and insights from a cryptocurrency lab. In:Proc. of the Int'l Conf. on Financial Cryptography and Data Security. Berlin, Heidelberg:Springer-Verlag, 2015.[doi:10.1007/978-3-662-53357-4_6]
    [14] Sapirshtein A, Sompolinsky Y, Zohar A. Optimal selfish mining strategies in bitcoin. In:Proc. of the Int'l Conf. on Financial Cryptography and Data Security. Berlin, Heidelberg:Springer-Verlag, 2016.515-532.[doi:10.1007/978-3-662-54970-4_30]
    [15] Aitzhan NZ, Svetinovic D. Security and privacy in decentralized energy trading through multi-signatures, blockchain and anonymous messaging streams. IEEE Trans. on Dependable & Secure Computing, 2016,15:840-852.[doi:10.1109/TDSC.2016.2616861]
    [16] Yuan C, Xu MX, Si XM. Research on a new signature scheme on blockchain. In:Proc. of the Security and Communication Networks. 2017.1-10.[doi:10.1155/2017/4746586]
    [17] Yuan C, Xu M, Si X, et al. A new aggregate signature scheme in cryptographic currency. Int'l Journal of Performability Engineering, 2017,13(5):754-762.[doi:10.23940/ijpe.17.05.p18.754762]
    [18] Gilad Y, Hemo R, Micali S, et al. Algorand:Scaling Byzantine agreements for cryptocurrencies. In:Proc. of the 26th Symp. on Operating Systems Principles. Shanghai:ACM Press, 2017.51-68.[doi:10.1145/3132747.3132757]
    [19] Si XM, Wang W, Zeng JJ, Yang BC, Li GS, Yuan C, Zhang F. A review of the basic theory of mimic defense. Strategic Study of CAE, 2016,18(6):62-68(in Chinese with English abstract).[doi:10.15302/J-SSCAE-2016.06.013]
    [20] Wu JX. Research on cyber mimic defense. Journal of Cyber Security, 2016,1(4):1-10. (in Chinese with English abstract)
    [21] Yuan C. Research on key technology of privacy protection in blockchain[MS. Thesis]. Zhengzhou:Information Engineering University, 2018. (in Chinese with English abstract)
    [22] Castro M, Liskov B. Practical Byzantine fault tolerance. In:Proc. of the 3rd Symp. on Operating Systems Design and Implementation. New Orleans:ACM Press, 1999.173-186.[doi:10.1145/571637.571640]
    [23] Nayak K, Kumar S, Miller A, et al. Stubborn mining:Generalizing selfish mining and combining with an eclipse attack. In:Proc. of the IEEE European Symp. on Security and Privacy. Saarbrucken:IEEE, 2016.305-320.[doi:10.1109/EuroSP.2016.32]
    [24] Zhang R, Preneel B. Publish or perish:A backward-compatible defense against selfish mining in bitcoin. In:Proc. of the Topics in Cryptology (CT-RSA 2017). San Francisco:Springer-Verlag, 2017.277-292.[doi:10.1007/978-3-319-52153-4_16]
    [25] Decker C, Wattenhofer R. Information propagation in the Bitcoin network. In:Proc. of the IEEE P2P 2013. Trento:IEEE, 2013.[doi:10.1109/P2P.2013.6688704]
    [26] Courtois NT, Finiasz M, Sendrier N. How to achieve a McEliece-based digital signature scheme. In:Proc. of the ASIACRYPT 2001, Vol.2248.2001.157-174.[doi:10.1007/3-540-45682-1_10]
    附中文参考文献:
    [19] 斯雪明,王伟,曾俊杰,等.拟态防御基础理论研究综述.中国工程科学,2016,18(6):62-68.[doi:10.15302/J-SSCAE-2016.06.013]
    [20] 邬江兴.网络空间拟态防御研究.信息安全学报,2016,1(4):1-10.
    [21] 苑超.区块链隐私保护关键技术研究[硕士学位论文].郑州:信息工程大学,2018.
    引证文献
引用本文

徐蜜雪,苑超,王永娟,付金华,李斌.拟态区块链——区块链安全解决方案.软件学报,2019,30(6):1681-1691

复制
分享
文章指标
  • 点击次数:4508
  • 下载次数: 8321
  • HTML阅读次数: 3342
  • 引用次数: 0
历史
  • 收稿日期:2018-06-25
  • 最后修改日期:2018-10-12
  • 在线发布日期: 2019-03-28
文章二维码
您是第19794394位访问者
版权所有:中国科学院软件研究所 京ICP备05046678号-3
地址:北京市海淀区中关村南四街4号,邮政编码:100190
电话:010-62562563 传真:010-62562533 Email:jos@iscas.ac.cn
技术支持:北京勤云科技发展有限公司

京公网安备 11040202500063号