<listing id="l9bhj"><var id="l9bhj"></var></listing>
<var id="l9bhj"><strike id="l9bhj"></strike></var>
<menuitem id="l9bhj"></menuitem>
<cite id="l9bhj"><strike id="l9bhj"></strike></cite>
<cite id="l9bhj"><strike id="l9bhj"></strike></cite>
<var id="l9bhj"></var><cite id="l9bhj"><video id="l9bhj"></video></cite>
<menuitem id="l9bhj"></menuitem>
<cite id="l9bhj"><strike id="l9bhj"><listing id="l9bhj"></listing></strike></cite><cite id="l9bhj"><span id="l9bhj"><menuitem id="l9bhj"></menuitem></span></cite>
<var id="l9bhj"></var>
<var id="l9bhj"></var>
<var id="l9bhj"></var>
<var id="l9bhj"><strike id="l9bhj"></strike></var>
<ins id="l9bhj"><span id="l9bhj"></span></ins>
  • 《工程索引》(EI)刊源期刊
  • 中文核心期刊
  • 中國科技論文統計源期刊
  • 中國科學引文數據庫來源期刊

留言板

尊敬的讀者、作者、審稿人, 關于本刊的投稿、審稿、編輯和出版的任何問題, 您可以本頁添加留言。我們將盡快給您答復。謝謝您的支持!

姓名
郵箱
手機號碼
標題
留言內容
驗證碼

網絡安全等級保護下的區塊鏈評估方法

朱巖 張藝 王迪 秦博涵 郭倩 馮榮權 趙章界

朱巖, 張藝, 王迪, 秦博涵, 郭倩, 馮榮權, 趙章界. 網絡安全等級保護下的區塊鏈評估方法[J]. 工程科學學報, 2020, 42(10): 1267-1285. doi: 10.13374/j.issn2095-9389.2019.12.17.007
引用本文: 朱巖, 張藝, 王迪, 秦博涵, 郭倩, 馮榮權, 趙章界. 網絡安全等級保護下的區塊鏈評估方法[J]. 工程科學學報, 2020, 42(10): 1267-1285. doi: 10.13374/j.issn2095-9389.2019.12.17.007
ZHU Yan, ZHANG Yi, WANG Di, QIN Bo-han, GUO Qian, FENG Rong-quan, ZHAO Zhang-jie. Research on blockchain evaluation methods under the classified protection of cybersecurity[J]. Chinese Journal of Engineering, 2020, 42(10): 1267-1285. doi: 10.13374/j.issn2095-9389.2019.12.17.007
Citation: ZHU Yan, ZHANG Yi, WANG Di, QIN Bo-han, GUO Qian, FENG Rong-quan, ZHAO Zhang-jie. Research on blockchain evaluation methods under the classified protection of cybersecurity[J]. Chinese Journal of Engineering, 2020, 42(10): 1267-1285. doi: 10.13374/j.issn2095-9389.2019.12.17.007

網絡安全等級保護下的區塊鏈評估方法

doi: 10.13374/j.issn2095-9389.2019.12.17.007
基金項目: 國家科技部重點研發計劃資助項目(2018YFB1402702);國家自然科學基金資助項目(61972032);北京市經濟和信息化局資助項目(HTBH_20200901_573)
詳細信息
    通訊作者:

    E-mail:zhuyan@ustb.edu.cn

  • 中圖分類號: TP306

Research on blockchain evaluation methods under the classified protection of cybersecurity

More Information
  • 摘要: 等級保護(簡稱等保)是我國信息安全的基本政策,隨著區塊鏈技術在各行業中的應用日趨廣泛,有必要同步推進區塊鏈系統的等級保護測評工作,這將有利于推動該技術在我國的持續健康發展。有鑒于此,依據等保第三級的應用和數據安全要求,給出了區塊鏈系統中對等網絡、分布式賬本、共識機制和智能合約等核心技術的具體測評要求及實施方案,并從等保2.0規定的控制點出發,分別對當前區塊鏈系統運行數據與基于日志流程的安全審計機制進行了歸納與分析。通過上述評估與分析可知區塊鏈系統在軟件容錯、資源控制和備份與恢復等方面滿足等保要求,而在安全審計、身份鑒別、數據完整性等方面則有待進一步改進。

     

  • 圖  1  區塊鏈框架

    Figure  1.  Blockchain framework

    圖  2  比特幣P2P網絡規模變化圖。(a)近3個月比特幣網絡規模變化圖;(b) 2009年之后比特幣網絡規模變化圖

    Figure  2.  Scale change of Bitcoin P2P network: (a) scale change of Bitcoin P2P network in last three months; (b) scale change of Bitcoin P2P network since 2009

    圖  3  共識過程時序關系圖

    Figure  3.  Consensus timing diagram

    圖  4  比特幣全網算力圖

    Figure  4.  Bitcoin hashrate historical chart

    圖  5  共識機制難度變化趨勢圖(比特幣)

    Figure  5.  Consensus difficulty change trend diagram(Bitcoin)

    圖  6  區塊鏈交易結構

    Figure  6.  Structure of blockchain transaction

    圖  7  區塊鏈系統中已確認和未確認交易數量對比(近3個月)。(a)比特幣與以太坊確認交易量圖;(b)比特幣中未確認交易增長變化圖

    Figure  7.  Comparison between confirmed and unconfirmed transactions in the blockchain systems: (a) diagram of confirmed transactions for Bitcoin and Ethereum; (b) growth chart of unconfirmed transactions for Bitcoin

    圖  8  常用腳本機制

    Figure  8.  Common scripting mechanism

    圖  9  區塊鏈日志生成流程圖

    Figure  9.  Blockchain log workflow chart

    表  1  定級要素與安全等級的關系

    Table  1.   Relation between grading elements and safety level

    程度
    Degree
    公民、法人、其他組織
    Citizens, corporations and other organizations
    社會秩序、社會公共利益
    Social order, public interest
    國家安全
    National security
    損害
    General damage
    第一級
    Level 1
    第二級
    Level 2
    第三級
    Level 3
    嚴重損害
    Significant damage
    第二級
    Level 2
    第三級
    Level 3
    第四級
    Level 4
    特別嚴重損害
    Especially significant damage
    第三級
    *Level 3
    第四級
    Level 4
    第五級
    Level 5
    * Classified protection 1.0 is level 2.
    下載: 導出CSV

    表  2  等級保護1.0與2.0三級應用層控制點對比

    Table  2.   Comparison of application layer control points in classified protection 1.0 and 2.0 at level 3

    版本
    Version
    類別
    Category
    控制點
    Control points
    等級保護1.0
    Classified protection 1.0
    應用安全
    Application security
    身份鑒別、訪問控制、安全審計、通信完整性、通信保密性、軟件容錯、資源控制
    Identity authentication, access control, security audit, communication integrity, communication confidentiality, software fault tolerance, resource control
    數據安全及備份恢復
    Data security and backup recovery
    數據完整性、數據保密性、備份和恢復
    Data integrity, data confidentiality, backup and recovery
    等級保護2.0
    Classified protection 2.0
    應用和數據安全
    Application and data security
    身份鑒別、訪問控制、安全審計、軟件容錯、資源控制、數據完整性、數據保密性、
    數據備份和恢復、剩余信息保護、個人信息保護
    Identity authentication, access control, security audit, software fault tolerance, resource control, data integrity, data confidentiality, data backup and recovery, residual
    information protection, personal information protection
    下載: 導出CSV

    表  3  分布式對等網絡測評

    Table  3.   Distributed peer-to-peer network assessment

    類別
    Categories
    測評項
    Items
    實施
    Implementation
    預期效果
    Expected Effectiveness
    實際測評結果說明
    Description of actual evaluation results
    達標
    Y/N
    身份鑒別
    Identification
    節點接入控制
    Node link control
    查看連入區塊鏈是否
    需要認證
    Check if the connection to the Blockchain requires authentication
    當節點連入系統時,對其進行身份認證,控制節點接入
    When nodes are connected, the system authenticates themto restrict node access.
    節點接入時沒有對身份
    進行認證
    The identity is not authenticated when the node is connected.

    N
    軟件容錯
    Software fault tolerance
    自我保護與自適應
    Self-protection and self-adaptation
    網絡不穩定時查看信息傳輸情況
    Inspect information transmission when the network is unstable.
    網絡抖動對傳輸不會造成太大影響,系統運行穩定Network jitter does not have much impact on transmission. Blockchain runs stably.網絡抖動時,區塊鏈
    系統運行穩定
    Blockchain system runs stably when network jitter occurs.

    Y
    資源控制
    Resource control
    并發連接限制
    Concurrent connection restriction
    查看節點最大連接數目
    View the maximum number of connections on nodes
    對最大并發連接進行限制,防止系統資源耗盡
    Limit maximum concurrent connections to prevent system resource exhaustion
    節點連接不超過117個輸入連接,向其他節點發起
    8個輸出連接。
    Node connections do not exceed 117 input connections and 8 output connections.

    Y
    連接超時限制
    Connection timeout limit
    查看相關網絡配置
    View related network configurations
    自動結束長期無應答的會話防止系統資源占用
    Automatically end long-term unanswered sessions to prevent system resource usage.
    某個節點超過30 min沒有新消息,則發送心跳消息,長達90 min沒有通信,則結束會話
    If there is no communication for more than 30 minutes, a heartbeat message is sent. End the session if there is no communication for 90 minutes.

    Y
    數據完整性
    Data integrity
    單播通信防篡改
    Anti-tampering of unicast
    查看數據傳輸是否加密防
    篡改安全
    Check whether data transmission is encrypted and tamper-proof
    數據在點對點通信過程中不被篡改
    Data is not tampered with in the process of point-to-point communication.
    不能保障數據在單播通信過程中的完整性
    The integrity of data in unicast communication cannot be guaranteed.

    N
    廣播通信防篡改
    Multicast communication tamper-proof
    能否提供通信多播,廣播功能,通信過程中數據是否防篡改
    Check whether the system can provide communication multicast, broadcast function and tamper-proof data in the process of communication
    數據在廣播通信過程中
    不被篡改
    Data is not tampered with during broadcast communication.
    不能保障數據在廣播通信過程中的完整性
    The Bitcoin system does not guarantee the integrity of data in the broadcast communication process.

    N
    轉發通信防篡改
    Forwarding communication tamper-proof
    轉發功能及數據防篡改
    Data tampering prevention in forwarding communication
    數據在某節點通過轉發時
    不被篡改
    Data is not tampered with when forwarded by a node.
    不能保障數據在轉發通信過程中的完整性
    The integrity of data in the process of forwarding communication cannot be guaranteed

    N
    安全審計
    Security audit
    網絡狀態獲取更新
    Network status get update
    查看日志是否記錄
    節點狀態信息
    Check whether the log records
    node status information.
    能夠為系統的穩定運行提供可信的節點數據
    Ability to provide trusted node data for stable operation of the system.
    存在單個節點的狀態更新記錄,但更新記錄不進行全網交換,無法獲取全網狀態
    There is a status update record for a single node. However, update records are not exchanged in the whole network, the whole network status cannot be obtained.

    N
    網絡節點動態監測
    Network node dynamic monitoring
    是否對在線節點數量
    進行統計
    Statistics on the number of
    online nodes
    具備對節點動態增加和減少的識別能力
    Ability to recognize nodes dynamically increasing and decreasing.
    區塊鏈系統具備全網節點數量實時統計能力
    The Bitcoin system does not have the real-time statistical ability of the number of nodes in the whole network.

    Y
    下載: 導出CSV

    表  4  不同區塊鏈參數選擇對網絡傳輸影響[43]

    Table  4.   Impact of parameter selection on network transmission in different blockchains[43]

    ParameterBitcoinLitecoinDogecoinEthereum
    區塊間隔
    Block interval
    10 min
    10 min
    2.5 min
    2.5 min
    1 min
    1 min
    10?20 s
    10?20 s
    公共節點
    Public nodes
    60008006004000
    挖礦池
    Mining pools
    16121213
    陳腐塊率/%
    Stale block rate
    0.410.2730.6196.8
    區塊大小/KB
    Block size
    534.86.1181.5
    下載: 導出CSV

    表  5  共識機制測評

    Table  5.   Consensus mechanism assessment

    類別
    Categories
    測評項
    Items
    實施
    Implementation
    預期效果
    Expected effectiveness
    實際測評結果說明
    Description of actual
    evaluation results
    達標
    Y/N
    資源控制
    Resource control
    共識資源控制
    Consensus resource control
    檢測計算機中資源
    使用情況。
    Check the use of resources in the computer
    共識機制消耗計算機資源
    應該最小化原則
    Consensus mechanisms should minimize the consumption of computer resources.
    PoW共識機制計算資源耗費較大,但系統資源可控
    PoW consumes a lot of computing resources, but the system resources are controllable.

    Y
    備份與恢復
    Backup and recovery
    實時備份
    Real-time backup
    查看節點是否同步了
    新共識區塊
    Check whether the node has synchronized the new consensus block
    全網節點具有相同的數據副本
    All network nodes have the
    same data replica.
    節點實時備份區塊鏈中產生的交易數據
    Real-time backup of transaction data generated in Bitcoin system by nodes.

    Y
    系統熱冗余
    System hot redundancy
    查看節點癱瘓后
    系統可用性
    View system availability after node paralysis
    業務連續性未被中斷
    Business continuity not interrupted.
    節點之間互為冗余,單一或少數節點故障不影響系統穩定性和可用性
    Nodes are redundant to each other and single or few node failures do not affect the stability and availability of the system.

    Y
    共識效果
    Consensus effect
    共識容錯性
    Consensus fault tolerance
    設置異常節點,查看共識情況
    Set exception nodes and view consensus.
    存在共識閾值,使得超過閾值的節點達到共識即代表全網共識完成
    There is a consensus threshold, so that the node exceeding the threshold reaches the consensus, which means that the consensus of the whole network is completed.
    系統可容納5%的節點共識錯誤。95%以上的節點
    共識成功即可
    The system can accommodate 5% node consensus errors. More than 95% of the nodes are successful.

    Y
    共識有效性
    Consensus Effectiveness
    發起非法交易,查看共識是否失敗
    Initiate an illegal transaction to see if the consensus failed
    非法交易共識失敗。通過對交易進行正確性和邏輯性驗證,使惡意造假交易的代價昂貴,避免惡意共識
    Illegal transaction consensus failed. By verifying the correctness and logic of the transaction, the cost of malicious fraudulent transactions is expensive and avoids malicious consensus.
    非法交易不能被共識通過
    Illegal transactions cannot be passed by consensus.

    Y
    共識結果一致性
    Consensus consistency
    發起合法交易,查看共識結果是否滿足一致
    Initiate a legal transaction and see if the consensus result is consistent
    忠誠參與方共識結果
    具有一致性
    Loyal participant consensus results are consistent.
    對于合法交易區塊鏈系統達成共識后寫入區塊鏈
    After agreeing on the legal transaction of Bitcoin system, it is written into the blockchain.

    Y
    下載: 導出CSV

    表  6  分布式賬本測評

    Table  6.   Distributed ledger assessment

    類別
    Categories
    測評項
    Items
    實施
    Implementation
    預期效果
    Expected effectiveness
    實際測評結果說明
    Description of actual evaluation results
    達標
    Y/N
    軟件容錯
    Software fault tolerance
    賬本格式規范性
    Standardization of ledger
    查看賬本中的數據格式是否有統一標準
    Check whether the data format in the ledger has a uniform standard
    交易、區塊等數據按照數據格式進行存儲
    Data such as transactions and blocks are stored
    in data format.
    區塊鏈系統交易、區塊等均有統一組織標準
    Blockchain system transactions, blocks, etc. have unified organizational standards.

    Y
    訪問控制
    Access control
    賬本訪問控制
    Ledger access control
    查看是否存在訪問策略監管節點及訪問控制策略
    Check whether there is an access policy supervision node and access control policy
    對賬本上的數據資源進行保護,防止非法訪問
    Protect the data resources
    on the ledger against
    illegal access
    作為公有鏈系統沒有完備的訪問控制策略
    Bitcoin as a public blockchain, there is no complete access control strategy

    N
    數據完整性
    Data integrity
    存儲完整性
    Storage integrity
    查看數據存儲是否存在哈希、指紋等機制保障存儲的完整性
    Check if there is a hash mechanism in the data storage to ensure the integrity of the storage
    存儲內容被哈希處理,完整性得到保障
    Stored data is hashed and integrity is guaranteed.
    將交易按照默克爾樹的形式進行哈希并存儲于區塊
    Bitcoin hashes transactions in the form of Merkel trees and stores them in blocks.

    Y
    數據保密性
    Data confidentiality
    存儲保密性
    Storage Confidentiality
    查看機密數據的存儲
    是否加密
    Check if the storage of confidential data is encrypted
    數據存儲不是以明文格式
    Data is not stored in plaintext format.
    數據存儲是以明文的16進制形式進行存儲,方便查詢和驗證
    Bitcoin data storage is stored in plaintext in hexadecimal form, which is convenient for query and verification.

    N
    賬本功能
    Ledgerfunction
    數據抗抵賴
    Data non-repudiation
    查看賬本中的交易數據來源是否有效
    Check if the transaction data in the ledger is signed
    交易被各個參與方簽名,使交易可溯源,以達到抗抵賴的作用。
    The transaction is signed by each participant, so that the transaction can be traceable to achieve the role of non-repudiation.
    區塊鏈系統通過對交易數據進行簽名達到了數據
    抗抵賴的作用
    Bitcoin achieves data non-repudiation by signing transaction data.

    Y
    賬本數據同步
    Ledger data synchronization
    查看是否有完全節點,
    節點間存儲賬本數據
    是否一致
    Check if there is a full node, store all data in the ledger
    全節點中同步了賬本中所有的數據,可以通過全節點得到區塊鏈數據的完整副本
    All the data in the ledger is synchronized in the full node. A complete copy of the blockchain data can be obtained from full nodes.
    區塊鏈系統中存在同步了賬本所有數據的全節點,并能對同步過程中發現的數據錯誤予以檢測及確認
    There are full nodes in the Bitcoin system that synchronize all the data of the ledger.

    Y
    賬本數據冪等
    Ledger data idempotentce
    查看賬本信息中檢索同樣的數據結果是否一致
    Check if the results of retrieving the same data
    are consistent
    在查詢相同記錄時具有
    相同的結果,確保
    數據的一致性
    Ensure data consistency by querying the same records with the same results.
    區塊鏈系統存入賬本的數據均通過共識,賬本數據具有冪等性
    The data of Bitcoin deposited in the ledger has passed the consensus, and ledger data has idempotency.

    Y
    下載: 導出CSV

    表  7  區塊鏈頭信息及長度限制

    Table  7.   Information and length limit of Blockchain Header

    數據項
    Items
    用途
    Use
    大小(字節)
    Size(byte)
    區塊版本V
    Version
    區塊版本號
    Block version number
    4
    難度D
    Difficulty Target
    用以標注挖礦難度
    To indicate the difficulty of mining
    4
    前區塊哈希
    PreH Pre-block hash
    基于區塊中所有交易的256位hash值
    Based on the 256-bit hash value of all transactions in the block
    32
    默克爾樹根M
    Merkletree Root
    交易內容hash256值
    The value of the transaction content 256-bit hash
    32
    隨機數N
    Nonce
    用以調整當前區塊頭hash值
    To adjust the current block head hash value
    4
    時間戳T
    Timestamp
    UNIX時間戳A
    UNIX timestamp
    4
    下載: 導出CSV

    表  8  區塊鏈合約計算層測評

    Table  8.   Blockchain contract computing layer evaluation

    類別
    Categories
    測評項
    Items
    實施
    Implementation
    預期效果
    Expected effectiveness
    實際測評結果說明
    Description of actual evaluation results
    達標
    Y/N
    身份鑒別
    Identification
    執行身份驗證
    Performingentity authentication
    查看合約是否許可查看或限定執行者身份
    Check if the contract can be viewed or qualify executor’s identity
    應對登錄的用戶進行身份標識和鑒別,身份標識具有唯一性,身份鑒別信息具有復雜度
    The identification and authentication should be carried out for the logged-in user. The identification is required to be unique and complicated.
    在發布交易時,區塊鏈會對執行者身份進行驗證,因此可以控制執行合約的身份
    When publishing a transaction, the blockchain verifies the executor’s identity, thus constraining the execution of contract.

    Y
    安全審計
    Security audit
    行為事件審計
    Behavioral event audit
    能否驗證智能
    合約的執行
    Check if to verify the execution of smart contract
    應啟用安全審計功能,審計覆蓋到每個用戶,對重要的用戶行為和重要
    安全事件進行審計
    The security audit function should be enabled to cover every user over significant user actions and
    security events.
    所有參與挖礦節點會
    驗證智能合約執行的
    正確性
    All nodes involved in mining can verify the correctness of smart contract execution.

    Y
    審計記錄
    Audit records
    是否記錄了審計的
    相關信息
    Check if audit information is recorded
    審計記錄應包括事件的日期和時間、用戶、事件類型、事件是否成功等。應對審計記錄進行保護,定期備份,避免受到未預期的刪除、修改或覆蓋等
    The audit record should include the date and time of event, the executor, the type
    of event, the state if the event was successful, etc. Audit records should
    be protected and backed up regularly to avoid unexpected deletions, modifications or overwrites.
    區塊中的交易記錄了智能合約的執行時間、執行用戶、執行的輸入與輸出
    The transactions in the block record the execution time, the executors, the input and output of the smart contract.

    N
    惡意代碼防范
    Malicious code protection
    免受惡意代碼攻擊
    Protection from
    malicious code
    是否有免受惡意代碼攻擊的機制
    Check if there is a mechanism to protect against malicious code
    應采用免受惡意代碼攻擊的技術措施或主動免疫可信驗證機制及時識別入侵和病毒行為,并將其有效阻斷。
    It is necessary to adopt the technical measures to avoid the attack of malicious code or the trusted verification mechanism with active immunity to identify the intrusion and virus behavior in time and block it effectively.
    通過限定的尋址方式、
    限定的指令集以及Docker等運行環境或其他機制使得本地計算機及區塊鏈系統不會
    受到影響
    Local computers and blockchain systems do not be affected byrestricted addressing methods, limited instruction sets, operating platforms such as Docker, or other mechanisms.

    Y
    數據完整性
    Data integrity
    傳輸完整性
    Transmission integrity
    查看是否通過校驗技術或密碼技術保證
    數據完整性
    Check if data integrity is guaranteed by CRC or cryptography
    應采用校驗技術或密碼技術保證重要數據在傳輸過程中的完整性。
    Verification technology or cryptography should be adopted to ensure the integrity of important data during transmission.
    存在單個節點的狀態
    更新記錄
    There are status updating records for individual nodes.

    Y
    數據保密性
    Data confidentiality
    傳輸保密性
    Transmission confidentiality
    查看是否通過密碼技術保證數據保密性
    Check if data onidenticality is guaranteed by cryptography.
    應采用密碼技術保證重要數據
    在傳輸過程中的保密性。
    Cryptography should be adopted to ensure the confidentiality of important data during transmission.
    區塊鏈系統不具備全網節點數量實時統計能力
    The blockchain system does not have the real-time statistical ability on the number of nodes in the whole network.

    N
    下載: 導出CSV

    表  9  區塊鏈系統error審計分類

    Table  9.   Blockchain error audit classification

    功能
    Function
    接口函數
    Interface function
    輸出錯誤
    Output error
    初始化錯誤
    Initialization error
    AppInit2_Cold()Winsock庫、初始化完整性檢測、錢包文件損壞等
    Winsock Library, Initial Integrity Detection, Wallet File Damage, etc.
    交易錯誤
    Transaction error
    CheckTransaction()檢查交易時出錯,如輸入輸出為空等交易格式錯誤
    Errors in checking transactions, such as empty input and output, etc.
    AcceptToMemoryPool()驗證交易合理性并存入交易池時發生錯誤,如輸入已經被花費等
    Errors occur when validating the reasonableness of transactions
    and storing them in the trading pool, such as input being spent, etc.
    CScriptCheck()腳本簽名錯誤
    Script signature error
    CheckInputs()交易輸入錯誤,如:交易總輸入<總輸出
    Transaction input errors, such as: total transaction input <total output
    CheckSignature()檢查簽名時出錯
    Error in checking signature
    區塊錯誤
    Block error
    WriteBlockToDisk()將區塊寫入磁盤出錯,如文件打開失敗
    Errors in writing blocks to disk, such as file opening failure
    ReadBlockFromDisk()從磁盤讀出區塊出錯,如打開區塊文件失敗
    Error reading block from disk, such as failure to open block file
    DisconnectBlock()斷開區塊鏈接時出錯
    Error while disconnecting block links
    ConnectBlock()連接區塊時出錯,如資產提交時出錯
    Error connecting blocks, such as asset submission
    CheckBlock()檢查區塊時出錯,如默克爾樹根不匹配
    Error checking blocks, such as Merkle root mismatch
    ContextualCheckBlockHeader檢查區塊頭部信息是否出錯,如塊的時間戳太早
    Check if block header information is wrong, such as block timestamp too early
    LoadBlockIndex()加載區塊索引出錯,如將創世塊寫入磁盤失敗
    Error loading block index, such as failure to write Genesis block to disk
    共識錯誤
    Consensus error
    CheckBlockHeader()工作量證明失敗 Proof-of-work error
    AcceptBlock()未找到工作量證明
    Accepting blocks makes errors, such as failing to find proof-of-work
    網絡錯誤
    Network error
    RecvLine()socket錯誤Socket error
    Read()連接節點數據文件peer.dat讀錯誤
    Error in peer.dat reading of connection node data file
    Write()連接節點數據文件peer.dat寫錯誤
    Error in peer.dat writing of connection node data file
    Connect()連接錯誤 Connection error
    ProcessMessage()偵聽并處理網絡中的不同的消息時出錯
    Errors in listening for and processing different messages in the network
    遠程過程調用
    Remote procedure call
    JSONRPCError遠程過程調用請求、解析、參數等錯誤
    Errors in remote procedure call requests, parsing, parameters, etc.
    下載: 導出CSV

    表  10  區塊鏈系統測評結果總結

    Table  10.   Summary of evaluation results of blockchain system

    類別
    Categories
    測評項
    Items
    達標 √/×
    比特幣
    Bitcoin
    以太坊
    Ethereum
    超級賬本
    Hyperledger
    分布式對等網絡測評
    Distributed P2P network assessment
    軟件容錯
    Software fault tolerance
    自我保護與自適應
    Self-protection and self-adaptation
    資源控制
    Resource control
    并發連接限制
    Concurrent connection restriction
    連接超時限制
    Connection timeout limit
    身份鑒別
    Identification
    節點接入控制
    Node link control
    ××
    分布式對等網絡測評
    Distributed P2P network assessment
    數據完整性
    Data integrity
    單播通信防篡改
    Anti-tampering of unicast
    ×××
    廣播通信防篡改
    Multicast communication tamper-proof
    ×××
    轉發通信防篡改
    Forwarding communication tamper-proof
    ×××
    安全審計
    Security audit
    網絡狀態獲取更新
    Network status get update
    ××
    網絡節點動態監測
    Network node dynamic monitoring
    分布式賬本測評
    Distributed ledgers assessment
    軟件容錯
    Software fault tolerance
    賬本格式規范性
    Standardization of ledger
    訪問控制
    Access control
    賬本訪問控制
    Ledger access control
    ××
    數據完整性
    Data integrity
    存儲完整性
    Storage integrity
    數據保密性
    Data confidentiality
    存儲保密性
    Storage confidentiality
    ×××
    賬本功能
    Ledger function
    數據抗抵賴
    Data non-repudiation
    賬本數據同步
    Ledger data synchronization
    賬本數據冪等
    Ledger data idempotence
    共識機制測評
    Consensus mechanism assessment
    資源控制
    Resource control
    共識資源測評
    Consensus Resource Control
    備份與恢復
    Backup and recovery
    實時備份
    Real-time backup
    系統熱冗余
    System hot redundancy
    共識效果
    Consensus effect
    共識容錯性
    Consensus fault tolerance
    共識有效性
    Consensus effectiveness
    共識結果一致性
    Consensus Consistency
    合約計算層測評
    Contract computing layer assessment
    身份鑒別
    Identification
    執行身份驗證
    Performing entity authentication
    安全審計
    Security audit
    行為事件審計
    Behavioral event audit
    審計記錄
    Audit records
    ×××
    惡意代碼防范
    Malicious code protection
    免受惡意代碼攻擊
    Protection from malicious code
    數據完整性
    Data integrity
    傳輸完整性
    Transmission integrity
    數據保密性
    Data confidentiality
    傳輸保密性
    Transmission confidentiality
    ×××
    統計
    Statistics
    達標個數
    Number of qualified items
    19
    Nineteen
    19
    Nineteen
    22
    Twenty-two
    下載: 導出CSV
    久色视频
  • [1] Nakamoto S, Bitcoin: a peer-to-peer electronic cash system[J/OL]. Bitcoin Online (2008-10-31)[2019-12-17] https://bitcoin.org/bitcoin.pdf
    [2] Mettler M. Blockchain technology in healthcare: the revolution starts here // 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom). Munich, 2016: 1
    [3] An R, He D B, Zhang Y R, et al. The design of an anti-counterfeiting system based on blockchain. J Cryptol Res, 2017, 4(2): 199

    安瑞, 何德彪, 張韻茹, 等. 基于區塊鏈技術的防偽系統的設計與實現. 密碼學報, 2017, 4(2):199
    [4] Tian H B, He J J, Fu L Q. A privacy preserving fair contract signing protocol based on block chains. J Cryptologic Res, 2017, 4(2): 187

    田海博, 何杰杰, 付利青. 基于公開區塊鏈的隱私保護公平合同簽署協議. 密碼學報, 2017, 4(2):187
    [5] Wijaya D A. Extending asset management system functionality in bitcoin platform // 2016 International Conference on Computer, Control, Informatics and its Applications (IC3INA). Tangerang, 2016: 97
    [6] Tian Z H, Wang B L, Ye Z W, et al. The survey of information system security classified protection // Electrical Engineering and Control. Springer, Berlin, Heidelberg, 2011: 975
    [7] Xia B. Cybersecurity Law and Classified Protection of Cybersecurity 2.0. Beijing: Publishing House of Electronics Industry, 2017

    夏冰. 網絡安全法和網絡安全等級保護2.0. 北京: 電子工業出版社, 2017
    [8] Guo Q Q. Book of Cybersecurity Law and Classified Protection of Cybersecurity. Beijing: Publishing House of Electronics Industry, 2018

    郭啟全. 網絡安全法與網絡安全等級保護制度培訓教程(2018版). 北京: 電子工業出版社, 2018
    [9] Deng R Y, Yu M L, Ding Y, et al. Safeguarding cyberspace security by law and building a cyber power— —Interpretation of cybersecurity law of the People’s Republic of China and National cyberspace security strategy. E-Government, 2017(02): 2

    鄧若伊, 余夢瓏, 丁藝, 等. 以法制保障網絡空間安全構筑網絡強國——《網絡安全法》和《國家網絡空間安全戰略》解讀. 電子政務, 2017(02):2
    [10] Zhu J F, Zhao Y J, Yang H, et al. The evolution of classified protection idea. Inform Security Commun Privacy, 2011(4): 70 doi: 10.3969/j.issn.1009-8054.2011.04.029

    朱繼鋒, 趙英杰, 楊賀, 等. 等級保護思想的演化. 信息安全與通信保密, 2011(4):70 doi: 10.3969/j.issn.1009-8054.2011.04.029
    [11] Ma L, Zhu G B, Lu L. Baseline for classified protection of cybersecurity (GB/T 22239—2019) standard interpretation. Netinfo Security, 2019, 19(2): 77 doi: 10.3969/j.issn.1671-1122.2019.02.010

    馬力, 祝國邦, 陸磊. 《網絡安全等級保護基本要求》(GB/T 22239—2019)標準解讀. 信息網絡安全, 2019, 19(2):77 doi: 10.3969/j.issn.1671-1122.2019.02.010
    [12] Gao Y, Huang X K, Li X W. Cloud computing security requirements and measurement practices in the classified protection 2.0Era. J Inform Security Res, 2018, 4(11): 987 doi: 10.3969/j.issn.2096-1057.2018.11.004

    高員, 黃曉昆, 李秀偉. 等保2.0時代云計算安全要求及測評實踐. 信息安全研究, 2018, 4(11):987 doi: 10.3969/j.issn.2096-1057.2018.11.004
    [13] Huang Z, Chen X, Wen S H, et al. Security testing frame and technology of big data. Commun Technol, 2017, 50(8): 1810 doi: 10.3969/j.issn.1002-0802.2017.08.038

    黃鐘, 陳肖, 文書豪, 等. 大數據安全測評框架和技術研究. 通信技術, 2017, 50(8):1810 doi: 10.3969/j.issn.1002-0802.2017.08.038
    [14] Wang N, Liu Z J. The internet of things security protection level of the research. Netinfo Security, 2011(6): 5

    王寧, 劉志軍. 物聯網安全中的等級保護研究. 信息網絡安全, 2011(6):5
    [15] Wood G. Ethereum: a secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper, 2014, 151: 1
    [16] Androulaki E, Barger A, Bortnikov V, et al. Hyperledger fabric: A distributed operating system for permissioned Blockchains // Proceedings of the Thirteenth EuroSys Conference (EuroSys 2018). Porto, 2018: 1
    [17] Kosba A, Miller A, Shi E, et al. Hawk: The blockchain model of cryptography and privacy-preserving smart contracts // 2016 IEEE Symposium on Security and Privacy (SP). San Jose, 2016: 839
    [18] Zhu Y, Gan G H, Deng D, et al. Security architecture and key technologies of blockchain. J Inform Security Res, 2016, 2(12): 1090

    朱巖, 甘國華, 鄧迪, 等. 區塊鏈關鍵技術中的安全性研究. 信息安全研究, 2016, 2(12):1090
    [19] Antonopoulos A M. Mastering Bitcoin: Unlocking Digital Cryptocurrencies. California: O'Reilly Media, Inc, 2014
    [20] Ben Mariem S, Casas P, Donnet B. Vivisecting blockchain P2P networks: Unveiling the bitcoin IP network // ACM CoNEXT Student Workshop. Crete, 2018
    [21] Gencer A E, Basu S, Eyal I, et al. Decentralization in bitcoin and ethereum networks // International Conference on Financial Cryptography and Data Security. Berlin, 2018: 439
    [22] Donet J A D, Pérez-Sola C, Herrera-Joancomartí J. The bitcoin P2P network // Proceedings of the 1st Workshop on Bitcoin Research (in Assocation with Financial Crypto 14). Berlin, 2014: 87
    [23] Du M X, Ma X F, Zhang Z, et al. A review on consensus algorithm of blockchain // 2017 IEEE International Conference on Systems, Man, and Cybernetics (SMC). Banff, 2017: 2567
    [24] Gramoli V. From blockchain consensus back to byzantine consensus. Future Generation Comput Syst, 2020, 107: 760 doi: 10.1016/j.future.2017.09.023
    [25] Nguyen G T, Kim K. A survey about consensus algorithms used in blockchain. J Inform Process Syst, 2018, 14(1): 101
    [26] Fullmer D, Morse A S. Analysis of difficulty control in bitcoin and proof-of-work blockchains // 2018 IEEE Conference on Decision and Control (CDC). Miami Beach, 2018: 5988
    [27] Taylor D. An Analysis of Bitcoin and the Proof of Work Protocols Energy Consumption, Growth, Impact and Sustainability[Dissertation]. Glasgow: University of Strathclyde, 2018
    [28] Castro M, Liskov B. Practical Byzantine fault tolerance // Proceedings of the Third USENIX Symposium on Operating Systems Design and Implementation (OSDI). New Orleans, 1999: 173
    [29] Borran F, Schiper A. A leader-free byzantine consensus algorithm // International Conference on Distributed Computing and Networking. Berlin, 2010: 67
    [30] Saleh, F. Blockchain without waste: proof-of-stake. Economics Networks eJ. http://dx.doi.org/10.2139/ssrn.3183935
    [31] Bach L M, Mihaljevic B, Zagar M. Comparative analysis of blockchain consensus algorithms // 2018 41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO). Opatija, 2018: 1545.
    [32] Kiayias A, Koutsoupias E, Kyropoulou M, et al. Blockchain mining games // Proceedings of the 2016 ACM Conference on Economics and Computation. ACM, 2016: 365
    [33] Levine M. Scientific method and the adversary model: Some preliminary thoughts. Am Psychologist, 1974, 29(9): 661 doi: 10.1037/h0037627
    [34] Dey S. A proof of work: Securing majority-attack in blockchain using machine learning and algorithmic game theory. Int J Wireless Microwave Technol, 2018, 8(5): 1 doi: 10.5815/ijwmt.2018.05.01
    [35] Heusser J. SAT solving-An alternative to brute force bitcoin mining[J/OL]. Technical Report(2013-02-03)[2019-12-17]. https://jheusser.github.io/2013/02/03/satcoin.html
    [36] Eyal I, Sirer E G. Majority is not enough: Bitcoin mining is vulnerable. Commun ACM, 2018, 61(7): 95 doi: 10.1145/3212998
    [37] Heilman E, Kendler A, Zohar A, et al. Eclipse attacks on bitcoin’s peer-to-peer network// Proceedings of the 24th USENIX Conference on Security Symposium (SEC'15). Washington D.C., 2015: 129
    [38] Douceur J R. The sybil attack // International Workshop on Peer-to-Peer Systems. Berlin, 2002: 251
    [39] Chohan, Usman W. The double spending problem and cryptocurrencies. Inf Syst Economics eJ, http://dx.doi.org/10.2139/ssrn.3090174
    [40] Decker C, Wattenhofer R. Information propagation in the bitcoin network // IEEE P2P 2013 Proceedings. Trento, 2013: 1
    [41] Decker C, Wattenhofer R. Bitcoin transaction malleability and MtGox // 19th European Symposium on Research in Computer Security. Wroclaw, 2014: 313
    [42] Zhu Y, Guo R Q, Gan G H, et al. Interactive incontestable signature for transactions confirmation in bitcoin blockchain // 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC). Atlanta, 2016: 443
    [43] Gervais A, Karame G O, Wüst K, et al. On the security and performance of proof of work blockchains // Proceedings of the 2016 ACM SIGSAC Cnference on Computer and Communications Security. New York, 2016: 3
    [44] Sekiguchi K, Chiba M, Kashima M. The Securities Settlement System and Distributed Ledger Technology. Bank of Japan Research Laboratory Series, 2018
    [45] Bowden R, Keeler H P, Krzesinski A E, et al. Block arrivals in the Bitcoin blockchain[J/OL]. arXiv preprint(2018-01-23)[2019-12-17]. https://arxiv.org/pdf/1801.07447.pdf
    [46] Son K T, Thang N T, Dong T M, et al. Blockchain technology for data entirety. Sci Research, 2019, 6(6): 68
    [47] Merkle R C. Protocols for public key cryptosystems // 1980 IEEE Symposium on Security and Privacy. Oakland, 1980: 122
    [48] Szydlo M. Merkle tree traversal in log space and time // International Conference on the Theory and Applications of Cryptographic Techniques. Interlaken, 2004: 541
    [49] Jakobsson M, Leighton T, Micali S, et al. Fractal Merkle tree representation and traversal // Cryptographers’ Track at the RSA Conference. San Francisco, 2003: 314
    [50] Delgado-Segura S, Pérez-Solà C, Herrera-Joancomartí J, et al. Bitcoin private key locked transactions. Inform Process Lett, 2018, 140: 37 doi: 10.1016/j.ipl.2018.08.004
    [51] Stanciu N. Importance of event log management to ensure information system security. Metalurgia Int, 2013, 18(2): 144
    [52] Kreps J, Narkhede N, Rao J. Kafka: a distributed messaging system for log processing // Proceedings of the NetDB. Athens, 2011
    [53] Aniello L, Baldoni R, Gaetani E, et al. A prototype evaluation of a tamper-resistant high performance blockchain-based transaction log for a distributed database // 2017 13th European Dependable Computing Conference (EDCC). Geneva, 2017: 151
  • 加載中
圖(9) / 表(10)
計量
  • 文章訪問數:  5217
  • HTML全文瀏覽量:  1729
  • PDF下載量:  242
  • 被引次數: 0
出版歷程
  • 收稿日期:  2019-12-17
  • 刊出日期:  2020-10-25

目錄

    /

    返回文章
    返回