Enhancing Security in Recommendation Systems with Blockchain Technology

被引:0
作者
Liang, Xiong [1 ]
Liu, Yang [2 ]
Liu, Yingkai [3 ]
Chi, Cheng [2 ]
Yin, Zihang [2 ]
Xu, Xiangrui [3 ]
机构
[1] Natl Energy Grp, Shuohuang Railway Dev Co Ltd, Cangzhou 062356, Hebei, Peoples R China
[2] China Acad Informat & Commun Technol, Beijing 100191, Peoples R China
[3] Beijing Jiaotong Univ, Beijing 100044, Peoples R China
来源
PROCEEDINGS OF THE ACM TURING AWARD CELEBRATION CONFERENCE-CHINA 2024, ACM-TURC 2024 | 2024年
基金
国家重点研发计划; 北京市自然科学基金; 中国国家自然科学基金;
关键词
Blockchain; Smart contracts; Web; 3.0; Railway;
D O I
10.1145/3674399.3674449
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the expanding mileage of China's railroads, efficiently managing and maintaining railroad operation data, particularly for heavy railroads, has become increasingly crucial. However, the mainstream railroad data management system is based on the "server-client" Web 2.0 model, which has some unsolvable security problems. This paper introduces the advantages of the blockchain-based Web 3.0 railroad data management system in managing and maintaining railroad facilities and operation data, such as decentralization to improve security, comparability to ensure data security, and traceability to support data traceability. Additionally, this paper introduces a grade recommendation mechanism for evaluating and recommending various safety and performance indicators for heavy railroads and ports to ensure that the operation of each link meets safety standards.
引用
收藏
页码:132 / 137
页数:6
相关论文
共 24 条
[11]  
Lyu Xiaoting, 2024, 33ST USENIX SEC S US
[12]  
Lyu Xiaoting, 2024, KDD 2024
[13]  
Nieva T., 1999, Proceedings of the Seventeenth IASTED International Conference. Applied Informatics, P93
[14]  
Nieva Toxmin, 2001, Remote monitoring of railway equipment using internet technologies
[15]   Distributed Ledger for Cybersecurity: Issues and Challenges in Railways [J].
Patwardhan, Amit ;
Thaduri, Adithya ;
Karim, Ramin .
SUSTAINABILITY, 2021, 13 (18)
[16]  
Prabhu Devika, 2017, Application of web 2.0 and web 3.0: an overview, V2
[17]  
Tsvetkov V.Ya., P INT SCI PRACT C DI, P846, DOI [10.2991/iscde-19.2019.34, DOI 10.2991/ISCDE-19.2019.34]
[18]   DeFiScanner: Spotting DeFi Attacks Exploiting Logic Vulnerabilities on Blockchain [J].
Wang, Bin ;
Yuan, Xiaohan ;
Duan, Li ;
Ma, Hongliang ;
Su, Chunhua ;
Wang, Wei .
IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2024, 11 (02) :1577-1588
[19]   Ethereum smart contract security research: survey and future research opportunities [J].
Wang, Zeli ;
Jin, Hai ;
Dai, Weiqi ;
Choo, Kim-Kwang Raymond ;
Zou, Deqing .
FRONTIERS OF COMPUTER SCIENCE, 2021, 15 (02)
[20]   CGIR: Conditional Generative Instance Reconstruction Attacks Against Federated Learning [J].
Xu, Xiangrui ;
Liu, Pengrui ;
Wang, Wei ;
Ma, Hong-Liang ;
Wang, Bin ;
Han, Zhen ;
Han, Yufei .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (06) :4551-4563