Abstract
Traditional network data security sharing system ignores that many people share data simultaneously, which leads to poor real-time performance. Therefore, the authors designed a network data security sharing system based on blockchain technology. In the hardware design, the PCI encryption card is used to encode the data. The microprocessor is used to access the system’s external equipment, and DDR-SDRAM dynamic storage area and NAND flash static memory are used as network data. In the software section of the system, a secure transmission mechanism is established. The cp-abe method is used to encrypt the network shared data, and the multi-person digital envelope technology is used to share the data. These two methods contribute to the design of the network data security sharing system. In the experiment, eight users share the data. The system login response time, key distribution time, data encryption time, and key update time are taken as the experimental objects. Experimental results show that the system response time, key distribution time, data encryption time, and key update time of the system are shorter than those of the comparison method.
Similar content being viewed by others
References
Abdulla AA (2015) Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.694896
Al-Saleem SM, Ali A, Khan N (2018) Energy efficient key agreement scheme for ubiquitous and continuous remote healthcare systems using data mining technique [J]. Clust Comput 21(5):1–12
Feilong T, Yang LT, Tang C et al (2018) A dynamical and load-balanced flow scheduling approach for big data centers in clouds [J]. IEEE Trans Cloud Comput 6(4):915–928
Geng D (2020) Design of heterogeneous data integration and sharing system for coastal international trade [J]. J Coast Res 103(sp1):718
Hassija V, Chamola V, Garg S, Krishna DNG, Kaddoum G, Jayakody DNK (2020) A Blockchain-based framework for lightweight data sharing and energy trading in V2G network [J]. IEEE Trans Veh Technol 69(6):5799–5812
Herrera-Quintero LF, Samper-Zapater JJ, Svitek M, David W (2018) Special section on ITS services to Smart City context [guest editorial][J]. IEEE Intell Transp Syst Mag 10(2):4–5
Leeuwen GV, Alskaif T, Gibescu M et al (2020) An integrated blockchain-based energy management platform with bilateral trading for microgrid communities [J]. Appl Energy 263(C):114–123
Lei K, Zhang Q, Lou JJ et al (2019) Securing ICN-based UAV Ad Hoc networks with blockchain[J]. IEEE Commun Mag 57(6):26–32
Li CT, Lee CC, Weng CY (2018) A secure three party node authentication and key establishment scheme for the internet of things environment [J]. J Internet Technol 19(1):147–155
Li XY, Ma HD, Yao WB et al (2018) Data-driven and feedback-enhanced trust computing pattern for large-scale multi-cloud collaborative services [J]. IEEE Trans Serv Comput 11(4):671–684
Liao X, Li K, Yin J (2017) Separable data hiding in encrypted image based on compressive sensing and discrete fourier transform [J]. Multimed Tools Appl
Liao X, Guo S, Yin J et al (2017) New cubic reference table based image steganography [J]. Multimed Tools Appl 77(4):1–18
Nowlin BT, Wang J, Schafer JL et al (2018) Monocyte subsets exhibit transcriptional plasticity and a shared response to interferon in SIV-infected rhesus macaques [J]. J Leukoc Biol 103(1):141–155
Pattipati DK, Tentu AN, Venkaiah VC et al (2016) Sequential secret sharing scheme based on level ordered access structure [J]. Int J Netw Secur 18(5):874–881
Shen J, Liu D, Lai C-F et al (2017) A secure identity-based dynamic group data sharing scheme for cloud computing [J]. J Internet Technol 18(4):833–842
Singh M, Aujla GS, Bali RS (2020) A deep learning-based blockchain mechanism for secure internet of drones environment [J]. IEEE Trans Intell Transp Syst PP(99):1–10. https://doi.org/10.1109/TITS.2020.2997469
Wang J, Gao J, Yang X et al (2019) Online data reveal key factors on salary expectation [J]. Dianzi Keji Daxue Xuebao/J Univ Electron Sci Technol China 48(2):307–314
Wen F, Min F, Zhang YJ, Yang C (2019) Crude oil price shocks, monetary policy, and China’s economy [J]. Int J Financ Econ 24(2):812–827
Yang J, Wen J, Jiang B, Wang H (2020) Blockchain-based sharing and tamper-proof framework of big data networking [J]. IEEE Netw 34(4):62–67
Yin H, Guo DC, Wang K et al (2018) Hyperconnected network: a decentralized trusted computing and networking paradigm [J]. IEEE Netw 32(1):112–117
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interests
The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Lu, X., Liu, P., Ke, Y. et al. Network data security sharing system based on blockchain. Multimed Tools Appl 80, 31887–31906 (2021). https://doi.org/10.1007/s11042-021-11183-6
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-021-11183-6