Content of Data Governance in our journal

        Published in last 1 year |  In last 2 years |  In last 3 years |  All
    Please wait a minute...
    For Selected: Toggle Thumbnails
    An integrity auditing scheme based on MHT for power equipment images stored in the cloud
    ZHANG Xun, BAI Wanrong, WEI Feng, WANG Rong, TIAN Xiuxia, LIU Tianshun
    Journal of East China Normal University(Natural Science)    2020, 2020 (5): 33-43.   DOI: 10.3969/j.issn.1000-5641.202091012
    Abstract498)   HTML50)    PDF (1090KB)(143)      
    This paper proposes an integrity auditing scheme suitable for power equipment images stored in the cloud with the aim of addressing the risks of being attacked, tampered with, or lost. First, each image is cut into four image blocks, and then a Scale Invariant Feature Transform (SIFT) algorithm is used to extract features from the image blocks. The four image blocks for each image are subsequently used as a leaf node to construct a Merkle Hash Tree (MHT). Finally, access level bits and update status bits are added to the nodes of the tree. Theoretical analysis and experimental results show that the proposed image integrity auditing scheme has lower computational overhead and higher audit efficiency compared to existing approaches; hence, the scheme can accurately locate the incomplete area of an image and is suitable for auditing integrity of power equipment images in a cloud storage environment.
    Reference | Related Articles | Metrics
    Research on an endogenous data interaction protocol for the dual-middle platform and dual-chain architecture
    LIU Feng, YANG Jie, LI Zhibin, QI Jiayin
    Journal of East China Normal University(Natural Science)    2020, 2020 (5): 44-55.   DOI: 10.3969/j.issn.1000-5641.202091014
    Abstract611)   HTML61)    PDF (1123KB)(251)      
    Since dual-middle platform architecture of “data and business” was first proposed, the efficiency of secure data interaction between middle platforms has become particularly important. This paper proposes an efficient interaction protocol, while ensuring data security and credibility with the help of a blockchain dual-chain structure, to optimize the efficiency of endogenous data interaction between middle platforms. By extracting the core threshold signature technology in the new protocol, the simulation experiment showed that the protocol reduced 42.1% of the overhead time used in the off-chain signature and on-chain verification processes compared with the method for traditional single signature and on-chain verification. The new protocol will have a positive impact on the integration of blockchain technology in the middle platform and on accelerating the overall adoption of the middle platform and blockchain.
    Reference | Related Articles | Metrics