Font Size: a A A

Research And Implementation Of Blockchain-Based Cross-domain Trusted Identity Authentication Technology

Posted on:2024-08-04Degree:MasterType:Thesis
Country:ChinaCandidate:K Y DengFull Text:PDF
GTID:2568306941484614Subject:Cyberspace security
Abstract/Summary:PDF Full Text Request
With the continuous development of Internet technology,the network boundary is no longer a traditional fixed concept,but has become more and more blurred.Interconnection between different networks has become the norm in today’s society.While the exchanges and cooperation between enterprises,regions,and industries are getting closer,increasingly organized,complex,and persistent cyber attacks pose a huge threat to the trust between different individuals and organizations in society.In this context,it is particularly important to use cross-domain identity authentication technology to ensure cross-enterprise,cross-region,and cross-industry information security sharing.The traditional cross-domain authentication method based on a centralized and trusted third party has problems such as protocol complexity and single point of failure.However,blockchain technology uses its decentralized characteristics to quickly establish a cross-regional trust relationship.It solves problems such as single point of failure in traditional methods,and is widely used in the field of cross-domain identity authentication.However,in the existing research on credibility-based blockchain consensus,there is a problem that it is difficult to accurately identify malicious nodes due to insufficient consideration of trust factors.In the existing research on cross-domain identity authentication models,how to improve the reliability of the system The problem of ensuring the robustness of the system while extensibility.Therefore,this paper mainly studies the issue of cross-domain trusted identity authentication based on blockchain.The main work is as follows:(1)Aiming at the problem that it is difficult to identify malicious nodes due to insufficient consideration of trust factors in existing consensus algorithms,a blockchain consensus algorithm based on trustworthiness evaluation is proposed,which prevents untrustworthy nodes from becoming consensus nodes and solves the problem of malicious nodes becoming consensus nodes.After the master node brings the problem of increased latency.Based on the original PBFT consensus algorithm,combined with the characteristics of the blockchain consensus layer and the network layer,the algorithm builds a credibility evaluation system,and conducts three aspects of consensus node election,consensus protocol and view switching protocol.Detailed design reduces the communication complexity of consensus.Experimental results show that the method proposed in this paper has lower consensus latency and higher throughput,and can eliminate 90%of malicious nodes through 24 rounds of consensus.(2)Aiming at the poor robustness of the existing cross-domain identity authentication model based on blockchain,a cross-domain identity authentication model based on master-slave blockchain is proposed,and the cross-domain identity authentication is handed over to the inter-domain main chain Responsible,assigning the identity authentication in the domain to the slave chain in the domain,which relieves the resource access pressure of the main chain,and proposes a cross-domain communication node election method based on credible evaluation to ensure the robustness of the system,and then divides identity registration,intra-domain The identity authentication protocol is designed in detail in terms of identity authentication and cross-domain identity authentication.Finally,the security and robustness of the model are verified and analyzed through theory and experiments.Experimental results show that the proposed method is more robust than other methods.(3)A blockchain based cross domain identity authentication system has been designed.Based on the methods proposed in Chapters 3 and 4,it can assist users in convenient and efficient intra domain and cross domain identity authentication,and system functionality and performance tests have been conducted.
Keywords/Search Tags:Cross-domain Authentication, Blockchain, Consensus Algorithm, Trustworthy Analysis
PDF Full Text Request
Related items