The Application of Blockchain Technology in Network Security and Authentication: Issues and Strategies

被引:0
|
作者
Lu, Yanli [1 ]
机构
[1] Guangzhou Songtian Vocat Coll, Sch Informat Engn, Guangzhou 511370, Peoples R China
关键词
Blockchain; network security; identity verification; deep regression model;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the advent of the digital age, the importance of network security and authentication is gradually highlighted. Blockchain technology, as a distributed, immutable record technology, brings great potential value to both areas. This study aims to delve into how blockchain technology can ensure network security and its application in authentication. Through extensive questionnaires and data collection, the study successfully built a deep regression model to reveal relevant causal relationships. The findings show that the adoption of blockchain technology can significantly improve the perceived effectiveness of cybersecurity, especially when organizations have a high opinion of it. This finding provides a valuable reference for organizations to make better use of this technology. However, there are still some limitations in the study, such as the scope of data collection and the complexity of the model. For these problems, this paper also puts forward corresponding solutions.
引用
收藏
页码:1103 / 1113
页数:11
相关论文
共 50 条
  • [21] IOT Security Issues Via Blockchain: A Review Paper
    Sultan, Abid
    Mushtaq, Muhammad Azhar
    Abubakar, Muhammad
    2019 INTERNATIONAL CONFERENCE ON BLOCKCHAIN TECHNOLOGY (ICBCT 2019), 2019, : 60 - 65
  • [22] Security Issues in the Blockchain(ed) World
    Kadena, Esmeralda
    Holicza, Peter
    2018 18TH IEEE INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND INFORMATICS (CINTI), 2018, : 211 - 215
  • [23] Review on Cryptography and Network Security Zero Knowledge Technique in Blockchain Technology
    Chandran, Anjana S.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2022, 16 (02)
  • [24] Digital Signature Technology Research of Distance Education Network Security Authentication
    Wei Wenshan
    Meng Xianxiao
    Li Haihua
    MANUFACTURING SYSTEMS AND INDUSTRY APPLICATIONS, 2011, 267 : 831 - 836
  • [25] Security technology for data transmission to the internet of things devices under the application of blockchain technology
    Zhou, Guangping
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2023, 14 (2-3) : 122 - 135
  • [26] A Voting Application Which Provides Data Security via Blockchain Technology
    Gani, Yagiz
    Askaroglu, Mustafa Mert
    2019 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2019, : 773 - 777
  • [27] A Blockchain-based Authentication and Security Mechanism for IoT
    Li, Dongxing
    Peng, Wei
    Deng, Wenping
    Gai, Fangyu
    2018 27TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN), 2018,
  • [28] IoT Security Access Authentication Method Based on Blockchain
    Cheng, Yang
    Lei, Min
    Chen, Shiyou
    Fang, Zigang
    Yang, Shuaipeng
    ADVANCED HYBRID INFORMATION PROCESSING, ADHIP 2019, PT II, 2019, 302 : 229 - 238
  • [29] Blockchain-Technology-Based Solutions for IOT Security
    Al-Barazanchi I.
    Murthy A.
    Al Rababah A.A.Q.
    Khader G.
    Abdulshaheed H.R.
    Rauf H.T.
    Daghighi E.
    Niu Y.
    Iraqi Journal for Computer Science and Mathematics, 2022, 3 (01): : 53 - 63
  • [30] Log File Authentication and Storage on Blockchain Network
    Feher, David Janos
    Sandor, Barnabas
    2018 IEEE 16TH INTERNATIONAL SYMPOSIUM ON INTELLIGENT SYSTEMS AND INFORMATICS (SISY 2018), 2018, : 243 - 247