Secure Provenance of Electronic Records Based on Blockchain

被引:5
作者
Wang, Qirun [1 ]
Zhu, Fujian [2 ]
Ji, Sai [2 ]
Ren, Yongjun [2 ]
机构
[1] Univ Hertfordshire, Sch Engn & Technol, Hatfield, Herts, England
[2] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Jiangsu Collaborat Innovat Ctr Atmospher Environm, Nanjing 210044, Peoples R China
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2020年 / 65卷 / 02期
关键词
Secure provenance; electronic records; blockchain; MANAGEMENT; MODEL;
D O I
10.32604/cmc.2020.07366
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
At present, the provenance of electronic records is stored centrally. The centralized way of information storage has huge risks. Whether the database itself is destroyed or the communication between the central database and the external interruption occurs, the provenance information of the stored electronic records will not play its role. At the same time, uncertainties such as fires and earthquakes will also pose a potential threat to centralized databases. Moreover, the existing security provenance model is not specifically designed for electronic records. In this paper, a security provenance model of electronic records is constructed based on PREMIS and METS. Firstly, this paper analyses the security requirements of the provenance information of electronic records. Then, based on the characteristics of blockchain decentralization, and combined with coding theory, a distributed secure provenance guarantees technology of electronic records is constructed, which ensures the authenticity, integrity, confidentiality and reliability of the provenance information.
引用
收藏
页码:1753 / 1769
页数:17
相关论文
共 24 条
[1]  
[Anonymous], 2013, NAN HDB
[2]  
Bao ZW, 2009, PROC INT CONF DATA, P808, DOI 10.1109/ICDE.2009.103
[3]  
Dai Chao-fan, 2010, Application Research of Computers, V27, P3215, DOI 10.3969/j.issn.1001-3695.2010.09.004
[4]   Taxonomy and analysis of security protocols for Internet of Things [J].
Das, Ashok Kumar ;
Zeadally, Sherali ;
He, Debiao .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 89 :110-125
[5]  
Karvounarakis G., 2010, SIGMOD, P951
[6]   AUTHENTICITY [J].
Lehman, David W. ;
O'Connor, Kieran ;
Kovacs, Balazs ;
Newman, George E. .
ACADEMY OF MANAGEMENT ANNALS, 2019, 13 (01) :1-42
[7]   A New Transitively Closed Undirected Graph Authentication Scheme for Blockchain-Based Identity Management Systems [J].
Lin, Chao ;
He, Debiao ;
Huang, Xinyi ;
Khan, Muhammad Khurram ;
Choo, Kim-Kwang Raymond .
IEEE ACCESS, 2018, 6 :28203-28212
[8]   It's real, trust me! Establishing supply chain provenance using blockchain [J].
Montecchi, Matteo ;
Plangger, Kirk ;
Etter, Michael .
BUSINESS HORIZONS, 2019, 62 (03) :283-293
[9]   Digital Continuity Guarantee Approach of Electronic Record Based on Data Quality Theory [J].
Ren, Yongjun ;
Qi, Jian ;
Cheng, Yaping ;
Wang, Jin ;
Alfarraj, Osama .
CMC-COMPUTERS MATERIALS & CONTINUA, 2020, 63 (03) :1471-1483
[10]   Data Query Mechanism Based on Hash Computing Power of Blockchain in Internet of Things [J].
Ren, Yongjun ;
Zhu, Fujian ;
Sharma, Pradip Kumar ;
Wang, Tian ;
Wang, Jin ;
Alfarraj, Osama ;
Tolba, Amr .
SENSORS, 2020, 20 (01)