TY - JOUR
T1 - CL-BC
T2 - A Secure Data Storage Model for Social Networks
AU - Xu, Dawei
AU - Wang, Weiqi
AU - Zhu, Liehuang
AU - Zhao, Jian
AU - Wu, Fudong
AU - Gao, Jiaqi
N1 - Publisher Copyright:
Copyright © 2022 Dawei Xu et al.
PY - 2022
Y1 - 2022
N2 - While bringing convenience to people, social networks cause various security problems, such as information leakage, which belongs to the security category of data storage. The related research focuses more on the confidentiality design and lacks the discussion of data integrity protection technology. Thus, the electronic data editability invites the risk of data tampering and destruction, making other operations meaningless once the data are inaccurate. A social network-oriented data security storage model, CL-BC, included conceptual design, preliminary framework design, and detailed flow design, to improve the security threats such as overauthorization and illegal execution in data storage. The blockchain technology is combined with the improved Clark-Wilson model to achieve data integrity access control protection through execution rules and authentication rules. The system uses the subalgorithm of DR-BFT for reference when deploying the algorithm program and adopts the intelligent contract to complete the design rules. The experimental analysis shows the CL-BC model adapts to the actual security environment, ensures the data storage integrity in the social network stored process, and has application value.
AB - While bringing convenience to people, social networks cause various security problems, such as information leakage, which belongs to the security category of data storage. The related research focuses more on the confidentiality design and lacks the discussion of data integrity protection technology. Thus, the electronic data editability invites the risk of data tampering and destruction, making other operations meaningless once the data are inaccurate. A social network-oriented data security storage model, CL-BC, included conceptual design, preliminary framework design, and detailed flow design, to improve the security threats such as overauthorization and illegal execution in data storage. The blockchain technology is combined with the improved Clark-Wilson model to achieve data integrity access control protection through execution rules and authentication rules. The system uses the subalgorithm of DR-BFT for reference when deploying the algorithm program and adopts the intelligent contract to complete the design rules. The experimental analysis shows the CL-BC model adapts to the actual security environment, ensures the data storage integrity in the social network stored process, and has application value.
UR - http://www.scopus.com/inward/record.url?scp=85126344258&partnerID=8YFLogxK
U2 - 10.1155/2022/5428539
DO - 10.1155/2022/5428539
M3 - Article
AN - SCOPUS:85126344258
SN - 1939-0114
VL - 2022
JO - Security and Communication Networks
JF - Security and Communication Networks
M1 - 5428539
ER -