Educational Data Management

Algorithm for security management and privacy protection of education big data based on smart contracts

  • Shaojie QIAO ,
  • Yuhe JIANG ,
  • Chenxu LIU ,
  • Cheqing JIN ,
  • Nan HAN ,
  • Shuaiwei HE
Expand
  • 1. School of Software Engineering, Chengdu University of Information Technology, Chengdu 610225, China
    2. School of Data Science and Engineering, East China Normal University, Shanghai 200062, China
    3. School of Management, Chengdu University of Information Technology, Chengdu 610103, China

Received date: 2024-06-20

  Online published: 2024-09-23

Abstract

Conventional education big data management is faced with security risks such as privacy data leakage, questionable data credibility, and unauthorized access. To avoid the above risks, a novel type of education big data security management and privacy protection method, Algorithm for security management and privacy protection of education big data based on smart contracts (ASPES), is proposed. It integrates an improved key splitting and sharing algorithm based on the secret sharing of Shamir, a hybrid encryption algorithm based on SM2-SHA256-AES, and a smart contract management algorithm based on hierarchical data access control. Experiments are conduced on the real dataset of MOOCCube and the results indicate that the execution efficiency and security of ASPES are significantly improved when compared with the state-of-the-art methods, which can effectively store and manage education big data and realize the reasonable distribution of educational resources. By embedding smart contracts into the blockchain and inputting operations like data reading and writing into the blockchain, ASPES can optimize the management path, improve management efficiency, ensure the fairness of education, and considerably improve the quality of education.

Cite this article

Shaojie QIAO , Yuhe JIANG , Chenxu LIU , Cheqing JIN , Nan HAN , Shuaiwei HE . Algorithm for security management and privacy protection of education big data based on smart contracts[J]. Journal of East China Normal University(Natural Science), 2024 , 2024(5) : 128 -140 . DOI: 10.3969/j.issn.1000-5641.2024.05.012

References

1 郑新俊, 田国良, 黄飞虎.. 基于Data Fabric的多模数据管理方法. 华东师范大学学报(自然科学版), 2023, (5): 164- 181.
2 陶慧玲, 马依琳, 王晔, 等.. 基于微服务的研究生信息系统数据同步方案研究与设计. 华东师范大学学报(自然科学版), 2024, (2): 42- 52.
3 王蕤, 刘震.. “数据赋能”驱动智能化政府建设的逻辑与路径. 大数据, 2024, 10 (3): 55- 64.
4 吴坚平, 陈超超, 金加和, 等.. 基于联邦学习的政务大数据平台应用研究. 大数据, 2024, 10 (3): 40- 54.
5 黄超然, 佟兴, 张召, 等.. 面向教育的区块链应用合约架构和数据隐私研究. 华东师范大学学报(自然科学版), 2022, (5): 61- 72.
6 江波, 丁莹雯, 魏雨昂.. 教育数字化转型的核心技术引擎: 可信教育人工智能. 华东师范大学学报(教育科学版), 2023, 41 (3): 52- 61.
7 吴文洋, 蒋海, 唐绅峰.. 数字化转型, 网络关联性与银行系统性风险. 中国管理科学, 2024, 32 (3): 9- 19.
8 李娟娟, 管桑田, 秦蕊, 等.. 智能区块链与区块链智能: 构筑DePIN的基础设施智能. 智能科学与技术学报, 2024, 6 (1): 5- 16.
9 迟佳琳, 冯登国, 张敏, 等.. 隐私保护密文检索技术研究进展. 电子与信息学报, 2024, 46 (5): 1- 24.
10 WU Y C, XING N L, CHEN G, et al.. Falcon: A privacy-preserving and interpretable vertical federated learning system. Proceedings of the VLDB Endowment, 2023, 16 (10): 2471- 2484.
11 李国政, 赵琮, 刘驰, 等.. TokenVis: 面向以太坊区块链 ERC-20 智能合约演变模式的可视分析方法. 电子学报, 2024, 52 (2): 441- 454.
12 李斌, 何辉, 赵中英, 等.. 基于区块链的多源网络大数据安全访问权限认证仿真. 电信科学, 2024, 40 (2): 107- 115.
13 梁茹锦, 于刚, 陈才军.. 基于智能合约的双链数据共享系统. 信息工程大学学报, 2024, 25 (1): 120- 126.
14 YU J F, LUO G, XIAO T, et al. MOOCCube: A large-scale data repository for NLP applications in MOOCs [C]// Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics. Association for Computational Linguistics (ACL), 2020: 3135-3142.
15 FAHEEM M, KUUSNIEMI H, ELTAHAWY B, et al. A lightweight smart contracts framework for blockchain-based secure communication in smart grid applications [J]. IET Generation, Transmission & Distribution, 2024, 18(3): 625-638.
16 SENDNER C, PETZI L, STANG J, et al. Large-scale study of vulnerability scanners for Ethereum smart contracts [C]// 2024 IEEE Symposium on Security and Privacy (SP). IEEE, 2024: 220.
17 蒋伟进, 周文颖, 李恩, 等.. 基于区块链技术的云制造服务架构及共识算法研究. 物联网学报, 2023, 7 (1): 159- 173.
18 LI X T, WANG H, CHEN J Y, et al. Secure multi-party SM2 signature based on SPDZ protocol [C]// Proceedings of the International Conference on Information Security and Cryptology. Singapore: Springer Nature Singapore, 2023: 85-103.
19 王琛, 李佳润, 徐剑.. 基于函数加密的密文卷积神经网络模型. 通信学报, 2024, 45 (3): 50- 65.
20 邓胜利, 钱倩文, 夏苏迪, 等.. 大数据的融合应用与拓展——首届 “大数据管理与应用” 暑期学校纪要. 图书情报知识, 2023, 40 (2): 57- 64.
21 李昊远, 韩绪仓, 曹伟琼, 等.. 基于减轮故障的 SM2 解密算法选择密文组合攻击. 电子学报, 2023, 51 (11): 3187- 3198.
22 MOUAD B, ABDELLATIF H. Performance evaluation of Orange Pi 4 in SHA256 computation for blockchain mining [C]// Proceedings of the 2023 10th International Conference on Future Internet of Things and Cloud (FiCloud). IEEE, 2023: 236-241.
23 黄冬艳, 李琨.. 多地址的时间型区块链隐蔽通信方法研究. 通信学报, 2023, 44 (2): 148- 159.
24 VANDIKA A Y, TANJUNG T.. Study security cloud with SHA-2 algorithm. Jurnal Pendidikan Tambusai, 2023, 7 (2): 18154- 18157.
25 郑永和, 周丹华, 张永和, 等.. 计算教育学视域下的ChatGPT: 内涵、主题、反思与挑战. 华东师范大学学报(教育科学版), 2023, 41 (7): 91- 102.
26 曾诗钦, 霍如, 黄韬, 等.. 区块链技术研究综述: 原理、进展与应用. 通信学报, 2020, 41 (1): 134- 151.
27 李春利, 高良谋.. 区块链技术的本质与社会形塑. 科学学研究, 2024, 42 (5): 914- 921.
28 魏立斐, 刘纪海, 张蕾, 等.. 双云辅助的超阈值多方隐私集合交集计算协议. 软件学报, 2023, 34 (11): 5442- 5456.
29 李建立, 莫燕南, 粟涛, 等.. 基于国密算法SM2、SM3、SM4的高速混合加密系统硬件设计. 计算机应用研究, 2022, 39 (9): 2818- 2825.
30 CHISHTI M S, SUFYAN F, BANERJEE A.. Decentralized on-chain data access via smart contracts in Ethereum blockchain. IEEE Transactions on Network and Service Management, 2022, 19 (1): 174- 187.
31 GUPTA M.. Integration of IoT and blockchain for user authentication. Scientific Journal of Metaverse and Blockchain Technologies, 2023, 1 (1): 72- 84.
32 KLEIN O, KOMARGODSKI I. New bounds on the local leakage resilience of Shamir’s secret sharing scheme [C]// Proceedings of the Annual International Cryptology Conference. Cham: Springer Nature Switzerland. 2023: 139-170.
33 BENALOH J C. Secret sharing homomorphisms: Keeping shares of a secret secret [C]// Proceedings of the Conference on the Theory and Application of Cryptographic Techniques. Heidelberg: Springer, 1986: 251-260.
34 潘洁, 叶兰, 张鹏飞, 等.. 基于国密算法的算力网络安全研究. 电信科学, 2023, 39 (8): 157- 166.
35 HADJ BRAHIM A, ALI PACHA A, HADJ SAID N.. An image encryption scheme based on a modified AES algorithm by using a variable S-box. Journal of Optics, 2024, 53 (2): 1170- 1185.
Outlines

/