
-
Previous Article
EMD and GNN-AdaBoost fault diagnosis for urban rail train rolling bearings
- DCDS-S Home
- This Issue
-
Next Article
An algorithm for reversible information hiding of encrypted medical images in homomorphic encrypted domain
Data encryption algorithm for e-commerce platform based on blockchain technology
1. | School of Information Science and Technology, Tibet University, Lhasa, China |
2. | Science and Research Office, Tibet University, Lhasa, China |
Aiming at the poor encryption effect existing in the data encryption algorithm of e-commerce platform, and the data lost and distorted easily after encrypting, a data encryption algorithm based on blockchain technology is proposed in this paper. By analyzing the symmetric key algorithm and the public key algorithm, the DES encryption algorithm is described in detail. The two related technologies of digital envelopes and message authentication are analyzed to ensure the accuracy of the data and the one time encryption of the data. Based on this, in order to ensure the effectiveness of encryption, the process of asymmetric encryption algorithm based on chaotic sequence of neural network and asymmetric encryption algorithm based on neural network chaotic attractor are analyzed, and the security is tested. While ensuring the accuracy of data, it improves the effect of data encryption and realizes the encryption of e-commerce platform data, which is to realize data encryption algorithm based on blockchain technology. Experimental results show that the~proposed algorithm can encrypt the data of e-commerce platform, and the encryption process is relatively simple, the encryption effect is better, and the accuracy of the encrypted data is relatively high, which provides a theoretical basis for further research of the subject.
References:
[1] |
J. Ahmad and S. O. Hwang,
Chaos-based diffusion for highly autocorrelated data in encryption algorithms, Nonlinear Dynamics, 82 (2015), 1839-1850.
doi: 10.1007/s11071-015-2281-0. |
[2] |
A. U. Ahmed, S. Rahman and B. Davvaz, On intuitionistic fuzzy idempotent, prime, strongly irreducible and t-pure ideals of semirings, Journal of Intelligent & Fuzzy Systems, 33 (2017), 433-443. Google Scholar |
[3] |
T. Aste, P. Tasca and T. D. Matteo, Blockchain technologies: The foreseeable impact on society and industry, Computer, 50 (2017), 18-28. Google Scholar |
[4] |
H. Chen, X. Du and Z. Liu, Optical hyperspectral data encryption in spectrum domain by using 3d arnold and gyrator transforms, Spectroscopy Letters, 49 (2016), 103-107. Google Scholar |
[5] |
Y. Chen, Mean square exponential stability of uncertain singular stochastic systems with discrete and distributed delays, Journal of Computational & Applied Mathematics, 20 (2014), 13-26. Google Scholar |
[6] |
P. Cheng, H. Yang, P. Wei and W. Zhang, A fast image encryption algorithm based on chaotic map and lookup table, Nonlinear Dynamics, 79 (2015), 2121-2131. Google Scholar |
[7] |
W. D. H., Data authentication and security assurance based on distributed storage system, Journal of China Academy of Electronics and Information Technology, 6 (2015), 613-619. Google Scholar |
[8] |
P. Fairley, Blockchain world - feeding the blockchain beast if bitcoin ever does go mainstream, the electricity needed to sustain it will be enormous, IEEE Spectrum, 54 (2017), 36-59. Google Scholar |
[9] |
W. Gao and W. Wang,
A tight neighborhood union condition on fractional (g, f, n', m)-critical deleted graphs, Colloquium Mathematicum, 149 (2017), 291-298.
doi: 10.4064/cm6959-8-2016. |
[10] |
L. Guo and L. University, Big data encryption to protect privacy data environment improvement and simulation of the algorithm, Computer Simulation, 338-341. Google Scholar |
[11] |
T. Hua, J. Chen, D. Pei, W. Zhang and N. Zhou, Quantum image encryption algorithm based on image correlation decomposition, International Journal of Theoretical Physics, 54 (2015), 526-537. Google Scholar |
[12] |
Y. Jiang, G. Li, W. Che, Y. Liu, B. Xu, G. Shan, D. Zhu, Z. Su and M. R. Bryce, A neutral dinuclear ir(ⅲ) complex for anti-counterfeiting and data encryption, Chemical Communications, 53 (2017), 3022-3025. Google Scholar |
[13] |
K. Lata, Secure data aggregation in wireless sensor networks using homomorphic encryption, International Journal of Electronics, 102 (2015), 690-702. Google Scholar |
[14] |
Z. L. F., Research on new data encryption algorithm in big data environment, Bulletin of Science and Technology, 205-208. Google Scholar |
[15] |
H. Y. Lin, Location-based data encryption for wireless sensor network using dynamic keys, Wireless Networks, 21 (2015), 1-8. Google Scholar |
[16] |
S. Lopez and F. Muntaner-Batle,
Rainbow eulerian multidigraphs and the product of cycles, Discrete Mathematics and Theoretical Computer Science, 17 (2016), 91-104.
|
[17] |
A. Panchbudhe, System and method for combining deduplication and encryption of data, 2015. Google Scholar |
[18] |
K. Suthar and J. Patel, Encryscation: An secure approach for data security using encryption and obfuscation techniques for iaas and daas services in cloud environment, Astrophysical Journal, 663 (2017), 799-807. Google Scholar |
[19] |
X. J. Tong, Z. Wang and M. Zhang,
An image encryption algorithm based on the perturbed high-dimensional chaotic map, Nonlinear Dynamics, 80 (2015), 1493-1508.
doi: 10.1007/s11071-015-1957-9. |
[20] |
X. Yang, Z. Shen, X. Hu and W. Hu, Chaotic encryption algorithm against chosen-plaintext attacks in optical ofdm transmission, IEEE Photonics Technology Letters, 28 (2016), 2499-2502. Google Scholar |
[21] |
G. Ye and X. Huang, An image encryption algorithm based on autoblocking and electrocardiography, IEEE Multimedia, 23 (2016), 64-71. Google Scholar |
[22] |
H. Q. Zhang, Y. Z. Zhao and Z. Xu,
Encryption and decryption algorithm based on rotation matrix, J. Jilin Univ. Sci., 54 (2016), 229-233.
|
[23] |
Q. Zhao, Computer simulation of reliability algorithm for wind-induced vibration response control of high structures, Journal of Discrete Mathematical Sciences & Cryptography, 20 (2017), 1519-1523. Google Scholar |
show all references
References:
[1] |
J. Ahmad and S. O. Hwang,
Chaos-based diffusion for highly autocorrelated data in encryption algorithms, Nonlinear Dynamics, 82 (2015), 1839-1850.
doi: 10.1007/s11071-015-2281-0. |
[2] |
A. U. Ahmed, S. Rahman and B. Davvaz, On intuitionistic fuzzy idempotent, prime, strongly irreducible and t-pure ideals of semirings, Journal of Intelligent & Fuzzy Systems, 33 (2017), 433-443. Google Scholar |
[3] |
T. Aste, P. Tasca and T. D. Matteo, Blockchain technologies: The foreseeable impact on society and industry, Computer, 50 (2017), 18-28. Google Scholar |
[4] |
H. Chen, X. Du and Z. Liu, Optical hyperspectral data encryption in spectrum domain by using 3d arnold and gyrator transforms, Spectroscopy Letters, 49 (2016), 103-107. Google Scholar |
[5] |
Y. Chen, Mean square exponential stability of uncertain singular stochastic systems with discrete and distributed delays, Journal of Computational & Applied Mathematics, 20 (2014), 13-26. Google Scholar |
[6] |
P. Cheng, H. Yang, P. Wei and W. Zhang, A fast image encryption algorithm based on chaotic map and lookup table, Nonlinear Dynamics, 79 (2015), 2121-2131. Google Scholar |
[7] |
W. D. H., Data authentication and security assurance based on distributed storage system, Journal of China Academy of Electronics and Information Technology, 6 (2015), 613-619. Google Scholar |
[8] |
P. Fairley, Blockchain world - feeding the blockchain beast if bitcoin ever does go mainstream, the electricity needed to sustain it will be enormous, IEEE Spectrum, 54 (2017), 36-59. Google Scholar |
[9] |
W. Gao and W. Wang,
A tight neighborhood union condition on fractional (g, f, n', m)-critical deleted graphs, Colloquium Mathematicum, 149 (2017), 291-298.
doi: 10.4064/cm6959-8-2016. |
[10] |
L. Guo and L. University, Big data encryption to protect privacy data environment improvement and simulation of the algorithm, Computer Simulation, 338-341. Google Scholar |
[11] |
T. Hua, J. Chen, D. Pei, W. Zhang and N. Zhou, Quantum image encryption algorithm based on image correlation decomposition, International Journal of Theoretical Physics, 54 (2015), 526-537. Google Scholar |
[12] |
Y. Jiang, G. Li, W. Che, Y. Liu, B. Xu, G. Shan, D. Zhu, Z. Su and M. R. Bryce, A neutral dinuclear ir(ⅲ) complex for anti-counterfeiting and data encryption, Chemical Communications, 53 (2017), 3022-3025. Google Scholar |
[13] |
K. Lata, Secure data aggregation in wireless sensor networks using homomorphic encryption, International Journal of Electronics, 102 (2015), 690-702. Google Scholar |
[14] |
Z. L. F., Research on new data encryption algorithm in big data environment, Bulletin of Science and Technology, 205-208. Google Scholar |
[15] |
H. Y. Lin, Location-based data encryption for wireless sensor network using dynamic keys, Wireless Networks, 21 (2015), 1-8. Google Scholar |
[16] |
S. Lopez and F. Muntaner-Batle,
Rainbow eulerian multidigraphs and the product of cycles, Discrete Mathematics and Theoretical Computer Science, 17 (2016), 91-104.
|
[17] |
A. Panchbudhe, System and method for combining deduplication and encryption of data, 2015. Google Scholar |
[18] |
K. Suthar and J. Patel, Encryscation: An secure approach for data security using encryption and obfuscation techniques for iaas and daas services in cloud environment, Astrophysical Journal, 663 (2017), 799-807. Google Scholar |
[19] |
X. J. Tong, Z. Wang and M. Zhang,
An image encryption algorithm based on the perturbed high-dimensional chaotic map, Nonlinear Dynamics, 80 (2015), 1493-1508.
doi: 10.1007/s11071-015-1957-9. |
[20] |
X. Yang, Z. Shen, X. Hu and W. Hu, Chaotic encryption algorithm against chosen-plaintext attacks in optical ofdm transmission, IEEE Photonics Technology Letters, 28 (2016), 2499-2502. Google Scholar |
[21] |
G. Ye and X. Huang, An image encryption algorithm based on autoblocking and electrocardiography, IEEE Multimedia, 23 (2016), 64-71. Google Scholar |
[22] |
H. Q. Zhang, Y. Z. Zhao and Z. Xu,
Encryption and decryption algorithm based on rotation matrix, J. Jilin Univ. Sci., 54 (2016), 229-233.
|
[23] |
Q. Zhao, Computer simulation of reliability algorithm for wind-induced vibration response control of high structures, Journal of Discrete Mathematical Sciences & Cryptography, 20 (2017), 1519-1523. Google Scholar |




Name | System | Software | Remark |
Dell | Win7 (64 bit) | Weblogic12.1.1 | application system |
Dell | Win7 (64 bit) | Tamcat6.0.32 | SSL Test server |
HP ProLiant DL380 G5 | Windows server2003 | Oracle11g | Routing database, Business database |
HP ProLiant DL380 G5 | Win7 (32 bit) | Oracle11g | Business database |
HP ProLiant DL140 | Win7 (32 bit) | Oracle11g | Business database |
Name | System | Software | Remark |
Dell | Win7 (64 bit) | Weblogic12.1.1 | application system |
Dell | Win7 (64 bit) | Tamcat6.0.32 | SSL Test server |
HP ProLiant DL380 G5 | Windows server2003 | Oracle11g | Routing database, Business database |
HP ProLiant DL380 G5 | Win7 (32 bit) | Oracle11g | Business database |
HP ProLiant DL140 | Win7 (32 bit) | Oracle11g | Business database |
Name | Version | Purpose |
E-mart application system | V1.0 | Experimental application system platform |
weblogic | 12.1.1 | Application server |
tomcat | 6.0.32 | SSL test application server |
Oracle routing database | 11.2.0.1.0 | Switching enterprise table space |
Oracle business database | 11.2.0.1.0 | Storing business data |
openSSL | 1.0.2g | Generating certificate file and related signature |
Name | Version | Purpose |
E-mart application system | V1.0 | Experimental application system platform |
weblogic | 12.1.1 | Application server |
tomcat | 6.0.32 | SSL test application server |
Oracle routing database | 11.2.0.1.0 | Switching enterprise table space |
Oracle business database | 11.2.0.1.0 | Storing business data |
openSSL | 1.0.2g | Generating certificate file and related signature |
Data size/MB | The proposed algorithm /ms | Chaotic sequence /ms | Chaotic parameter modulation /ms |
2 | 137 | 186 | 213 |
4 | 189 | 256 | 276 |
6 | 256 | 354 | 342 |
8 | 301 | 427 | 408 |
10 | 387 | 506 | 474 |
15 | 452 | 584 | 542 |
Data size/MB | The proposed algorithm /ms | Chaotic sequence /ms | Chaotic parameter modulation /ms |
2 | 137 | 186 | 213 |
4 | 189 | 256 | 276 |
6 | 256 | 354 | 342 |
8 | 301 | 427 | 408 |
10 | 387 | 506 | 474 |
15 | 452 | 584 | 542 |
[1] |
J. Frédéric Bonnans, Justina Gianatti, Francisco J. Silva. On the convergence of the Sakawa-Shindo algorithm in stochastic control. Mathematical Control & Related Fields, 2016, 6 (3) : 391-406. doi: 10.3934/mcrf.2016008 |
[2] |
Demetres D. Kouvatsos, Jumma S. Alanazi, Kevin Smith. A unified ME algorithm for arbitrary open QNMs with mixed blocking mechanisms. Numerical Algebra, Control & Optimization, 2011, 1 (4) : 781-816. doi: 10.3934/naco.2011.1.781 |
[3] |
Gaurav Nagpal, Udayan Chanda, Nitant Upasani. Inventory replenishment policies for two successive generations price-sensitive technology products. Journal of Industrial & Management Optimization, 2021 doi: 10.3934/jimo.2021036 |
[4] |
Habib Ammari, Josselin Garnier, Vincent Jugnon. Detection, reconstruction, and characterization algorithms from noisy data in multistatic wave imaging. Discrete & Continuous Dynamical Systems - S, 2015, 8 (3) : 389-417. doi: 10.3934/dcdss.2015.8.389 |
[5] |
Marion Darbas, Jérémy Heleine, Stephanie Lohrengel. Numerical resolution by the quasi-reversibility method of a data completion problem for Maxwell's equations. Inverse Problems & Imaging, 2020, 14 (6) : 1107-1133. doi: 10.3934/ipi.2020056 |
[6] |
Xiaoyi Zhou, Tong Ye, Tony T. Lee. Designing and analysis of a Wi-Fi data offloading strategy catering for the preference of mobile users. Journal of Industrial & Management Optimization, 2021 doi: 10.3934/jimo.2021038 |
2019 Impact Factor: 1.233
Tools
Article outline
Figures and Tables
[Back to Top]