区块链

基于区块链的图书侵权记录存证平台

展开
  • 1. 北京印刷学院 信息工程学院, 北京 102600;
    2. 北京印刷学院 经济管理学院, 北京 102600
杨彦红,博士,讲师,研究方向为区块链技术.E-mail:yangyanhong@bigc.edu.cn

收稿日期: 2019-10-29

  网络出版日期: 2020-01-19

基金资助

国家自然科学基金(No.61472461);北京市教委科研计划基金(No.KM201810015010)资助

Book Infringement Record Depositing Platform Based on Blockchain

Expand
  • 1. School of Information Engineering, Beijing Institute of Graphic Communication, Beijing 102600, China;
    2. School of Economics and Management, Beijing Institute of Graphic Communication, Beijing 102600, China

Received date: 2019-10-29

  Online published: 2020-01-19

摘要

针对越来越频繁的音频阅读图书内容对图书构成侵权行为而未能及时有效存证的困境,提出一种以区块链技术对图书版权侵权记录进行自动存证的方案.首先,将网络爬取的音频信息进行处理,与图书内容查重比对后将结果存入私有区块链结构;其次,在基于工作量证明共识的基础上设计实现了复杂度可行的共识算法;最后,结合密码学的摘要信息认证与数字签名验证机制对区块数据进行安全性检查.系统测试结果验证了平台的效率和可靠性.

本文引用格式

张逸飞, 曹少中, 祁德力, 王亮, 杨彦红 . 基于区块链的图书侵权记录存证平台[J]. 应用科学学报, 2020 , 38(1) : 184 -196 . DOI: 10.3969/j.issn.0255-8297.2020.01.014

Abstract

Aiming at the dilemma that more and more frequent audio reading books failing to validate the infringement of books in a timely and effective manner, this paper proposes a scheme for using the blockchain technology to automatically deposit certificates of copyright infringement records. Firstly, the audio information crawled from the network, then, the results are stored in the private blockchain structure after checking and comparing with the content of the book. Secondly, based on the proof of work (PoW) consensus, the platform designs and implements a feasible consensus algorithm. Finally, the security of block data is verified by combining the cryptographic summary information authentication as well as digital signature verification mechanism. System testing results show the efficiency and reliability of the platform, providing it a valid and feasible book infringement record deposit scheme.

参考文献

[1] 李兆森,李彩虹.基于区块链的电子数据存证应用研究[J].软件,2017, 38(8):63-67. Li J S, Li C H. Research on application of electronic evidence based on blockchain[J]. Computer Engineering&Software, 2017, 38(8):63-67.(in Chinese)
[2] 张岩,梁耀丹.基于区块链技术的去中心化数字出版平台研究[J].出版科学,2017, 25(6):13-18. Zhang Y, Liang Y D. Research on decentralized digital publishing platform based on block chain technology[J]. Publishing Journal, 2017, 25(6):13-18.(in Chinese)
[3] 陈伟利,郑子彬.区块链数据分析:现状、趋势与挑战[J].计算机研究与发展,2018, 55(9):1853-1870. Chen W L, Zheng Z B. Blockchain data analysis:a review of status, trends and challenges[J]. Journal of Computer Research and Development, 2018, 55(9):1853-1870.(in Chinese)
[4] 孙国梓,王纪涛.浅析区块链取证与存证[J].中国信息安全,2019(5):61-64. Sun G Z, Wang J T. Analysis of blockchain forensics and storage[J]. China Information Security, 2019(5):61-64.(in Chinese)
[5] 刘品新.电子取证的法律规制[J].法学家,2010(3):73-82, 178. Liu P X. On the legal regulation of E-discovery[J]. Jurists Review, 2010(3):73-82, 178.(in Chinese)
[6] 尚蕾.基于区块链技术的电子数据取证研究综述[J].办公自动化,2019, 24(10):33-34. Shang L. Survey on forensics techniques of electronic evidence in blockchain[J]. Mobile Office, 2019, 24(10):33-34.(in Chinese)
[7] Hyla T, Pejaś J. EHealth integrity model based on permissioned blockchain[J]. Future Internet, 2019, 11(3):76.
[8] 冒小乐,陈鼎洁,孙国梓.基于区块链的电子数据存证的设计与实现[J].中兴通讯术,2018, 24(6):28-34. Mao X L, Chen D J, Sun G Z. Design and implementation of electronic data storage and certificate system based on blockchain[J]. ZTE Technology Journal, 2018, 24(6):28-34.(in Chinese)
[9] 黄晓芳,徐蕾,杨茜.一种区块链的云计算电子取证模型[J].北京邮电大学学报,2017, 40(6):120-124. Huang X F, Xu L, Yang X. Blockchain model of cloud forensics[J]. Journal of Beijing University of Posts and Telecommunications, 2017, 40(6):120-124.(in Chinese)
[10] 黄永洪,刘宇超,凌国玮,等.基于私有链的存证云盘系统方案设计[J].信息技术与标准化, 2018(7):16-20. Huang Y H, Liu Y C, Ling G W, et al. Scheme design of cloud storage system based on private chain[J]. Information Technology&Standardization, 2018(7):16-20.(in Chinese)
[11] Nakamoto S. Bitcoin:a peer-to-peer electronic cash system[EB/OL].[2017-05-29]. HTTP://www.bitcoin.org/bitcoin.pdf.
[12] Castro M, Liskov B. Practical Byzantine fault tolerance[C]//Proceedings of the 3rd Symposium on Operating Systems Design and Implementation. New Orleans, USA:OSDI, 1999:173-186.
[13] King S, Nadal S. PPCoin:peer-to-peer crypto-currency with proof-of-stake. 2012.https://peercoin.net/assets/paper/peercoin-paper.pdf.
[14] 长铗.从数字货币到信用社会[M].北京:中信出版社,2018.
[15] 李立耀,孙鲁敬,杨家海.社交网络研究综述[J].计算机科学,2015, 42(11):8-21, 42. Li L Y, Sun L J, Yang J H. Research on online social network[J]. Computer Science, 2015, 42(11):8-21, 42.(in Chinese)
[16] 徐晨初,张燕平,刘国涛.一种优化路径的聚焦爬虫爬行策略[J].小型微型计算机系统, 2016, 37(8):1721-1724. Xu C C, Zhang Y P, Liu G T. Novel focused crawler algorithm for optimizing crawling pathways[J]. Journal of Chinese Computer Systems, 2016, 37(8):1721-1724.(in Chinese)
[17] 宾晟,孙更新,周双.基于区块链技术的社交网络中舆情传播模型[J].应用科学学报,2019, 37(2):191-202. Bin S, Sun G X, Zhou S. Public opinion propagation model in social network based on blockchain[J]. Journal of Applied Sciences, 2019, 37(2):191-202.(in Chinese)
[18] 邵奇峰,金澈清,张召,等.区块链技术:架构及进展[J].计算机学报,2018, 41(5):969-988. Shao Q F, Jin C Q, Zhang Z, et al. Blockchain:architecture and research progress[J]. Computer Science, 2018, 41(5):969-988.(in Chinese)
[19] 祝烈煌,高峰,沈蒙,等.区块链隐私保护研究综述[J].计算机研究与发展, 2017, 54(10):2170-2186. Zhu H L, Gao F, Shen M, et al. Survey on privacy preserving techniques for blockchain technology[J]. Journal of Computer Research and Development, 2017, 54(10):2170-2186.(in Chinese)
[20] 谭海波,周桐,赵赫,等.基于区块链的档案数据保护与共享方法[J/OL].软件学报,2019, 30(9):2620-2635. Tan H B, Zhou T, Zhao H, et al. Archives data protection and sharing method based on blockchain[J/OL]. Journal of Software, 2019, 30(9):2620-2635.(in Chinese)
[21] 张超,李强,陈子豪,等. Medical Chain:联盟式医疗区块链系统[J/OL].自动化学报, 2019, 45(8):1495-1510. Zhang C, Li Q, Chen Z H, et al. Medical chain:alliance medical blockchain system[J/OL]. Acta Automatica Sinica, 2019, 45(8):1495-1510.(in Chinese)
[22] 韩璇,袁勇,王飞跃.区块链安全问题:研究现状与展望[J].自动化学报,2019, 45(1):206-225. Han X, Yuan Y, Wang F Y. Security problems on blockchain:the state of the art and future trends[J]. Acta Automatica Sinica, 2019, 45(1):206-225.(in Chinese)
[23] 闵新平,李庆忠,孔兰菊,等.许可链多中心动态共识机制[J].计算机学报, 2018, 41(5):1005-1020. Min X P, Li Q Z, Kong L J, et al. Permissioned blockchain dynamic consensus mechanism based multi-centers[J]. Chinese Journal of Computers, 2018, 41(5):1005-1020.(in Chinese)
[24] 袁勇,倪晓春,曾帅,等.区块链共识算法的发展现状与展望[J/OL].自动化学报,2018, 44(11):2011-2022. Yuan Y, Ni X C, Zeng S, et al. Blockchain consensus algorithms:the state of the art and future trends[J/OL]. Acta Automatica Sinica, 2018, 44(11):2011-2022.(in Chinese)
[25] 武岳,李军祥.区块链共识算法演进过程[J].计算机应用研究,2019:1-9.[2019-11-28]. https://DOI/10.19734/j.issn.1001-3695.2019.02.0004. Wu Y, Li J X. Evolution process of blockchain consensus algorithm[J]. Application Research of Computers, 2019:1-9.[2019-11-28]. https://DOI/10.19734/j.issn.1001-3695.2019.02.0004.(in Chinese)
[26] 佘维,陈建森,刘琦,等.一种面向医疗大数据安全共享的新型区块链技术[J].小型微型计算机系统,2019, 40(7):1449-1454. She W, Chen J S, Liu Q, et al. New blockchain technology for medical big datas security sharing[J]. Journal of Chinese Computer Systems, 2019, 40(7):1449-1454.(in Chinese)
[27] 武勇,李斌.区块链安全技术体系研究[J].信息安全与通信保密,2018(7):44-52. Wu Y, Li B. Research on blockchain security technology architecture[J]. Information Security and Communications Privacy, 2018(7):44-52.(in Chinese)
[28] 邓毅,陈秀清,王志豪,等.基于区块链的隐私安全保护可行性分析[J].软件导刊,2019, 18(1):166-168. Deng Y, Chen X Q, Wang Z H, et al. Blockchain-based privacy security protection feasibility analysis[J]. Software Guide, 2019, 18(1):166-168.(in Chinese)
[29] 宋宪荣,张猛.网络可信身份认证技术问题研究[J].网络空间安全,2018, 9(3):69-77. Song X R, Zhang M. Research on the technology of network trusted identity authentication[J]. Cyberspace Security, 2018, 9(3):69-77.(in Chinese)
[30] 唐长兵,杨珍,郑忠龙,等. PoW共识算法中的博弈困境分析与优化[J].自动化学报,2017, 43(9):1520-1531. Tang C B, Yang Z, Zheng Z L, et al. Game dilemma analysis and optimization of pow consensus algorithm[J]. Acta Automatica Sinica, 2017, 43(9):1520-1531.(in Chinese)
[31] 孙国钰.浅谈对区块链的攻击方式与安全性[J].网络安全技术与应用,2018(8):26-27. Sun G Y. On the attack mode and security of blockchain[J]. Network Security Technology&Application, 2018(8):26-27.(in Chinese)
[32] Nayak K, Kumar S, Miller A, et al. Stubborn mining:generalizing selfish mining and combining with an eclipse attack[C]//Proceedings of the 2016 IEEE European Symposium on Security and Privacy, 2016:305-320. DOI:10.1109/Euro SP.2016.32.
[33] 叶聪聪,李国强,蔡鸿明,等.区块链的安全检测模型[J].软件学报,2018, 29(5):1348-1359. Ye C C, Li G Q, Cai H M, et al. Security detection model of blockchain[J]. Journal of Software, 2018, 29(5):1348-1359.(in Chinese)
文章导航

/