Position: Home page » Blockchain » Play the role of blockchain in promoting data sharing

Play the role of blockchain in promoting data sharing

Publish: 2021-05-10 16:46:07
1. The characteristics of blockchain ensure that the information can not be tampered with and stored in a decentralized way, which can greatly promote data sharing, optimize business processes, rece operating costs, improve collaboration efficiency, and build a trusted system
at present, many local governments in China are promoting blockchain government application platforms, such as Chongqing's blockchain government service platform, Guangzhou's tax chain platform, Hunan Changsha's SMIC blockchain public service platform, etc
from the perspective of technical characteristics, value and domestic cases, it is very necessary.
2. In view of the security characteristics and shortcomings of the existing blockchain technology, we need to build a security system around the physical, data, application system, encryption, risk control and other aspects to improve the security performance of the blockchain system as a whole
1. Physical security
the network and host running the blockchain system should be in a protected environment. According to the regulatory requirements of specific business, the protection measures can be used to protect the physical network and host by means of VPN, firewall, physical isolation, etc
2. Data security
in principle, the data exchange between nodes of the blockchain should not be transmitted in clear text. For example, asymmetric encryption can be used to negotiate key, and symmetric encryption algorithm can be used to encrypt and decrypt data. The data provider should also strictly evaluate the sensitivity and security level of the data, decide whether to send the data to the blockchain, whether to desensitize the data, and adopt strict access control measures
3. Application system security
application system security needs to start from the aspects of identity authentication, authority system, transaction rules, anti fraud strategy, etc.
relevant personnel, transaction nodes and transaction data involved in application operation should be controlled in advance and auditable afterwards. Taking financial blockchain as an example, consensus algorithm with stronger fault tolerance, anti fraud and higher performance can be adopted to avoid joint fraud of some nodes
4. Key security
to encrypt the communication data between the blockchain nodes and the key to encrypt the data stored on the blockchain nodes, the plaintext should not exist on the same node, and the private key should be properly saved by the encryption machine. When the key is lost or leaked, the system can identify the relevant records of the original key, such as account control, communication encryption, data storage encryption, etc., and implement response measures to make the original key invalid. The key should also be managed strictly in the life cycle, and should not be permanently valid. It needs to be replaced after reaching a certain time cycle
5. Risk control mechanism
there should be careful detection measures for the network layer, host operation, data access of application system, transaction frequency and other dimensions of the system. For any suspicious operation, alarm, record and verification should be carried out. If illegal operation is found, loss assessment should be carried out, remedial measures should be taken at the technical and business levels, and security measures should be strengthened, And trace the source of illegal operation to prevent further attacks

Article source: white paper on blockchain technology and application development in China
3.

Blockchain technology can help us improve the security of encryption, authentication and other protection mechanisms, which is absolutely good news for the Internet of things security and DDoS Defense Community

blockchain has the potential to become an important solution for safe communities, as well as for the financial, energy and manufacturing instries. At present, verifying bitcoin transaction is one of its main uses, but this technology can also be extended to smart grid system, content delivery network and other application scenarios

how to apply blockchain to network security

whether it's protecting data integrity or using digital identification technology to prevent Internet of things devices from DDoS attacks, blockchain technology can play a key role, at least now it has shown this ability

Internet of things security and DDoS Defense Community

a blockchain startup claims that its decentralized "billing" system can help users resist DDoS attacks with traffic over 100gbps. Interestingly, the company said that this decentralized system allows users to rent their own extra bandwidth and submit their bandwidth access rights to the distributed nodes of the blockchain. When a website suffers from DDoS attacks, the website can use the leased bandwidth to mitigate DDoS attacks

improve confidentiality and data integrity

although the original design of blockchain did not consider the specific access control, now some blockchain technology implementation has solved the problems of data confidentiality and access control. In this era, any data may be tampered, which is obviously a serious problem, but the complete data encryption maliciously guarantees that the data will not be accessed or tampered by others through man in the middle attack in the transmission process

the whole IOT instry needs data integrity protection. For example, IBM's Watson IOT platform allows users to manage IOT data in a private blockchain network, which has been integrated into their big blue cloud service. In addition, Ericsson's blockchain data integrity service provides comprehensive audit, compatible and reliable data services to allow developers to use predix PAAS platform for technical implementation

one of the best applications is the transformation of our public sector and the creation of citizen centered infrastructure. This will enable the public to have their own identity and every transaction can be verified. We can use smart contracts and signed assertions to formulate elements of public services, such as benefits, etc

Internet of things & amp; Smart devices

now the attention of the whole IT community has begun to shift to the Internet of things & amp; Smart devices are on the rise, and security is absolutely one of the primary considerations. Although the Internet of things can improve our work and proction efficiency, it also means that we need to face more security risks. As a result, many companies seek to apply blockchain to protect IOT and instrial IOT (iiot) devices because blockchain technology can enhance authentication, improve data traceability and mobility, and assist record management

according to Alexey malanov, an anti-virus expert at Kaspersky laboratory, blockchain technology helps to track hacker attacks, adding:

"network intruders usually clear the permission log to hide traces of unauthorized access to devices. But if the logs are distributed in multiple devices (for example, through blockchain Technology), the risk can be reced as much as possible. "

German Klimenko, chairman of the digital economy development fund, said: "at present, the Ministry of defense is vigorously promoting it development and research, which is a good thing for the instry."

NATO and the Pentagon are also studying the "defensive" Application of blockchain. This technology is actively used to protect the system from network attacks. NATO will use blockchains to protect financial information, supply and logistics chains, while the Pentagon is developing a data transmission system to prevent hackers

in general, blockchain technology is not omnipotent, at least not yet. Whether from the perspective of technical integrity or system implementation, the current blockchain technology can not guarantee the security of the device 100%. Note: the above content comes from the Internet

4. China State Grid Corporation is seeking blockchain technology to advance its "energy Internet" program
in a patent application submitted to China's State Intellectual Property Office last November and released last week, the energy giant explored blockchain driven systems in detail, saying that they can store and track consumers' power consumption and share data in a decentralized way. Bt110
5. The five elements are about Yin and Yang, eight trigrams, Qimen, tunjia, heaven, earth, people, gods and ghosts. In general, it refers to gold, wood, water, fire and earth.
6.

first, improve data quality


the essence of blockchain is a decentralized distributed ledger. It can also be understood as a non tampering, full history, distributed database storage technology. Therefore, blockchain technology can liberate more data. The trustworthiness, security and non tampering of blockchain technology fundamentally improve the quality of data and enhance the ability of data inspection


Second, dealing with the problem of data island


big data has a very serious problem of data island, and a lot of data cannot be obtained at present. Blockchain is expected to deal with this problem. This is mainly because blockchain is not only a distributed ledger, but also has the characteristics of decentralization and openness. As order maintainers in the financial market, regulatory organizations can also predict and analyze possible dangerous problems through the data chain in the blockchain


3. Dealing with data leakage


in essence, the blockchain is actually a decentralized database. Therefore, if the data of one node in the blockchain changes, other nodes will find it at the first time, so the possibility of data leakage will be greatly reced. Only in the form of private key can the identity information of each node in the blockchain be obtained successfully, and only the data owner can know the private key


4. Blockchain can protect the relevant rights and interests of data


for valuable data assets of indivials or organizations, blockchain can be used to register them, and transaction records are recognized, transparent and traceable throughout the network. The source, ownership, use right and circulation path of big data assets are clear, which is of great value to the transaction of data assets


v. traceability of blockchain


every step of data collection, trading, circulation, and accounting analysis can be kept on the blockchain, so that the data quality can obtain unprecedented strong trust endorsement. At the same time, it also ensures the correctness of data analysis results and the effect of data mining


sinomeni will share with you the role of blockchain in big data. If you are interested in big data engineering, I hope this article can help you. If you want to know more about the skills and materials of data analysts and big data engineers, you can click other articles on this website to learn

7. The draft of the "fourteenth five year plan" points out that seven key instries of digital economy, such as instrial Internet, blockchain, artificial intelligence and so on, as well as digital application scenarios such as intelligent transportation and intelligent energy, should be further defined, and "accelerating digital development and building digital China" should be regarded as an independent chapter, from creating new advantages of digital economy to speeding up the construction of digital society, From improving the level of digital government construction to creating a good digital ecology, this paper outlines the new prospect of Digital China Construction in the next five years. In 2025, the added value of core instries of digital economy will account for 10% of GDP
through consensus algorithm, the user data can be updated synchronously among judicial nodes such as notary office, Arbitration Commission, Internet court, judicial identification Institute and right institution on the security chain, so that each node on the security chain can realize real-time exchange of data and information, and effectively improve the judicial credibility of the blockchain data
based on the mode of "blockchain + judicature + application", e-security deeply arranges e-signing, and helps enterprises transfer traditional offline paper contracts to online signing by means of professional underlying data storage capability, full evidence chain technology and post signing judicial services, providing real name authentication, E-contract, signature management and other services
, the use of blockchain technology for the original works of online right confirmation, infringement detection and infringement forensics, as well as online right registration and other intellectual property protection services. It provides online arbitration filing application, agent execution, direct evidence to arbitration commission and other services for enterprises and indivial users. At the same time, it can also provide the notary office with the construction of Internet notary system, notary intelligent terminal and corresponding customized services, and help the notary office to comprehensively transform and upgrade its business. At present, it has successfully provided judicial services such as Internet notarization system construction for many notary offices. And other application scenarios, lead the blockchain to different instries and fields, provide full supporting solutions, and accelerate the rapid implementation of blockchain in the whole instry. As the cornerstone of digital economy, blockchain technology plays an important role. Through "blockchain +" to quickly complete the transformation and upgrading, release new momentum for the development of digital economy.
8. 16 mm? Jacking force = piston area * pressure = 10kg
retraction force = jacking force - piston rod area * pressure
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750