Abstract
Heterogeneous identity alliance technology solves the identity management problem under heterogeneous networks by building a unified and trusted identity management system, while the risk assessment system of heterogeneous identity alliance can analyze potential security problems in heterogeneous identity alliance in advance, so as to realize timely supervision and maintenance of identity when crossing domains and reduce the proliferation of security problems. A blockchain-based risk assessment model for heterogeneous identity alliance is proposed for existing risk assessment systems that are generally centralized architectures with single point of failure, internal mischief, and loss of control of user data. The model uses attribute encryption to guarantee the secure storage of privacy data, while ensuring that the control of risk assessment-related data is always in the hands of the data owner, and simplifies the three-stage PBFT (Practical Byzantine Fault Tolerance) consensus to two stages to improve the efficiency of risk assessment result processing. Finally, a comparison experiment shows that compared to the three-stage PBFT, the two-stage PBFT reduces the number of communications to reach consensus and improves the throughput by about 7%.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
**g, J.: The development status and tendency of internet trusted identity management. J. Inf. Secur. Res. 2(7), 666–668 (2016)
Jiang, W., Li, H., Hao, Y., Dong, G.: A survey on cyberspace identity management. Inf. Secur. Commun. Priv. 9, 46–57 (2019)
Dong, G., Zhang, Z., Li, H.: Regulatory system architecture and key mechanisms of blockchain-based heterogeneous identity alliance. Commun. Technol. 53(2), 401–413 (2020)
Yang, M., Zhang, S., Zhang, H.: User trust negotiation model based on two-layer blockchain in heterogeneous alliance system. J. Appl. Sci. 37(2), 244–252 (2019)
Chen, W.H., Wan, J.: **a: task-attribute-based access control scheme for IoT via blockchain. Comput. Mater. Continua 53(3), 2441–2453 (2020)
Gan, J., Sheng, Z., Zhang, S., Zhao, Y.: Design and implementation of heterogeneous identity alliance risk assessment system. In: Sun, X., Wang, J., Bertino, E. (eds.) ICAIS 2020. LNCS, vol. 12240, pp. 307–317. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-57881-7_28
Zhang, L., Peng, J., Du, Y.: Information security risk assessment survey. J. Tsinghua Univ. (Sci. Technol.) 52(10), 1364–1369 (2012)
Feng, D., Zhang, Y., Zhang, Y.: Survey of information security risk assessment. J. Commun. 7, 10–18 (2004)
Yuan, Y., Wang, F.: Blockchain: the state of the art and future trends. Acta Automatica Sinica 42(4), 481–494 (2016)
Zeng, S., Huo, R., Huang, T.: Survey of blockchain: principle, progress and application. J. Commun. 41(1), 134–151 (2020)
Fu, Y., Zhu, J., Gao, S.: CPS information security risk evaluation based on blockchain and big data. Tehnicki Vjesnik 25(6), 1843–1850 (2018)
Zhao, Y., Zhang, S., Yang, M.: Research on architecture of risk assessment system based on block chain. Comput. Mater. Continua 61(2), 677–686 (2019)
Kask, R.J.: Cyberspace policy review: assuring a trusted and resilient information and communications infrastructure pp. 49–127 (2011)
Li, C.: Review of the U.S. national action plan on cybersecurity. E-Government 12, 98–109 (2016)
Ronagel, H., et al.: Futureid-sha** the future of electronic identity (2012)
Stevens, T., et al: The state of the electronic identity market: technologies, infrastructure, services and policies. JRC Working Papers (2010)
National Cyberspace Security Strategy. China Information Security 1, 26–31 (2017)
Chen, S., Wang, G., Liu, X.: Study on security risk assessment for information system. Communications Technology 45(1), 128–130 (2012)
Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. https://bitcoin.org/bitcoin.pdf (2008)
Wang, P., Susilo, W.: Data security storage model of the internet of things based on blockchain. Comput. Syst. Sci. Eng. 36(1), 213–224 (2021)
Hsiao, S., Sung, W.: Utilizing blockchain technology to improve wsn security for sensor data transmission. Comput. Mater. Continua 68(2), 1899–1918 (2021)
Alsalamah, S.A., Alsalamah, H.A., Nouh, T., Alsalamah, S.A.: Healthyblockchain for global patients. Comput. Mater. Continua 68(2), 2431–2449 (2021)
Kara, M., Aydın, M.A., Balık, H.H.: Bcvop2p: decentralized blockchain-based authentication scheme for secure voice communication. Intell. Autom. Soft Comput. 31(3), 1901–1918 (2022)
Ali, A., Pasha, M.F., Fang, O.H., Ali, J., Alzain, M.A.: An efficient blockchain-based health- care system using artificial intelligence. Comput. Mater. Continua 71(2), 2721–2738 (2022)
Wang, Q., Li, F., Wang, Z.: Principle and core technology of blockchain. J. Front. Comput. Sci. Technol. 14(10), 1621–1643 (2020)
Acknowledgement
This work is supported by the Key Research and Development Project of Sichuan Province (No. 2021YFSY0012, No. 2020YFG0307, No. 2021YFG0332), the National Natural Science Foundation of China (No. 62076042), the Science and Technology Innovation Project of Sichuan (No. 2020017), the Key Research and Development Project of Chengdu (No. 2019-YF05–02028-GX), the Innovation Team of Quantum Security Communication of Sichuan Province (No. 17TD0009), the Academic and Technical Leaders Training Funding Support Projects of Sichuan Province (No. 2016120080102643).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Yang, Y., Wan, W., Zhang, S., Zhang, J., Qin, Z., **a, J. (2022). A Blockchain-Based Risk Assessment Model for Heterogeneous Identity Alliance. In: Sun, X., Zhang, X., **a, Z., Bertino, E. (eds) Advances in Artificial Intelligence and Security. ICAIS 2022. Communications in Computer and Information Science, vol 1588. Springer, Cham. https://doi.org/10.1007/978-3-031-06764-8_2
Download citation
DOI: https://doi.org/10.1007/978-3-031-06764-8_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-06763-1
Online ISBN: 978-3-031-06764-8
eBook Packages: Computer ScienceComputer Science (R0)