Security Risk and Response Analysis of Typical Application Architecture of Information and Communication Blockchain

Zhao Hongwei,Zhang Moli,Wang Shi,Li Entang,Guo Zhenhua,Sun Dianmin
DOI: https://doi.org/10.1007/s00521-020-05508-z
2020-01-01
Neural Computing and Applications
Abstract:As the role of blockchain technology in various industries becomes more and more important, the technical limitations of its consensus mechanism, private key management and smart contracts are gradually emerging. However, security events such as blockchain platform applications are emerging one after another. As a new round of transformative power in the network era, it combines the blockchain with existing technologies to generate new formats and new models. Technology applications and existing cybersecurity regulatory policies have brought new challenges. This paper analyzes the typical application architecture of blockchain technology, and analyzes the security risks of blockchain application architecture from key layers such as storage layer, protocol layer, extension layer, and application layer. This article combines the DOC mechanism with IOT application scenarios to propose a blockchain-based confidential IOT service model (Beekeeper 1.0) that supports first-order homomorphic multiplication, and a blockchain-based confidential IOT service model that supports high-order homomorphic multiplication (Beekeeper 2.0), Beekeeper 2.0 significantly improves Beekeeper 1.0 in server capabilities, verification efficiency, verification key length, and device work diversity. This article finds that the chain code call delay basically increases with the increase in the transaction sending rate. When the transaction sending rate reaches 300TPS, the chain code calling delay only increases a little, and when the transaction sending rate reaches 300TPS, the success rate of the transaction on the chain increases. Finally, the average blockchain access delay increases with the increase in the transaction sending rate. The blockchain access delay is affected by less throughput, and the transaction success rate is stable at 98%.
What problem does this paper attempt to address?