Blockchain user digital identity big data and information security process protection based on network trust
This study aims to delve into the knowledge graph, functional pathways, and qualitative logic among elements such as network trust, blockchain organization, user identity, big data, and information security in the digital economy era. Through an analysis of the endogenous and exogenous explicit mana...
Hoofdauteurs: | , , |
---|---|
Formaat: | Artikel |
Taal: | English |
Gepubliceerd in: |
Elsevier
2024-04-01
|
Reeks: | Journal of King Saud University: Computer and Information Sciences |
Onderwerpen: | |
Online toegang: | http://www.sciencedirect.com/science/article/pii/S1319157824001204 |
_version_ | 1827249339647393792 |
---|---|
author | Feng Wang Yongjie Gai Haitao Zhang |
author_facet | Feng Wang Yongjie Gai Haitao Zhang |
author_sort | Feng Wang |
collection | DOAJ |
description | This study aims to delve into the knowledge graph, functional pathways, and qualitative logic among elements such as network trust, blockchain organization, user identity, big data, and information security in the digital economy era. Through an analysis of the endogenous and exogenous explicit management logic relationships among these elements, this study innovatively constructs three primary dimensions and nine secondary dimensions of digital identity attributes for users. Additionally, it establishes a collaborative management mechanism between government organizations and non-governmental blockchain alliances corresponding to identity attributes based on the delegated proxy mechanism. Furthermore, it reconstructs the big data chain management framework for user digital identity under the zero-trust model and establishes a management process for blockchain digital identity information security protection under the zero-trust model. These efforts provide innovative solutions with both research and application value for the “virtual-real integration” global security governance of the metaverse, digital economy, and digital government. |
first_indexed | 2024-04-24T10:04:18Z |
format | Article |
id | doaj.art-825e449365924d3cb467f7124bc31054 |
institution | Directory Open Access Journal |
issn | 1319-1578 |
language | English |
last_indexed | 2025-03-21T23:46:04Z |
publishDate | 2024-04-01 |
publisher | Elsevier |
record_format | Article |
series | Journal of King Saud University: Computer and Information Sciences |
spelling | doaj.art-825e449365924d3cb467f7124bc310542024-05-18T06:35:31ZengElsevierJournal of King Saud University: Computer and Information Sciences1319-15782024-04-01364102031Blockchain user digital identity big data and information security process protection based on network trustFeng Wang0Yongjie Gai1Haitao Zhang2School of Economics and Management, Hainan Normal University, 571158 Hainan, China; Big Data Management Research Center, Jilin University, 130021 Jilin, ChinaSchool of Economics and Management, Hainan Normal University, 571158 Hainan, China; Corresponding author.Big Data Management Research Center, Jilin University, 130021 Jilin, ChinaThis study aims to delve into the knowledge graph, functional pathways, and qualitative logic among elements such as network trust, blockchain organization, user identity, big data, and information security in the digital economy era. Through an analysis of the endogenous and exogenous explicit management logic relationships among these elements, this study innovatively constructs three primary dimensions and nine secondary dimensions of digital identity attributes for users. Additionally, it establishes a collaborative management mechanism between government organizations and non-governmental blockchain alliances corresponding to identity attributes based on the delegated proxy mechanism. Furthermore, it reconstructs the big data chain management framework for user digital identity under the zero-trust model and establishes a management process for blockchain digital identity information security protection under the zero-trust model. These efforts provide innovative solutions with both research and application value for the “virtual-real integration” global security governance of the metaverse, digital economy, and digital government.http://www.sciencedirect.com/science/article/pii/S1319157824001204BlockchainInformation securityBig dataDigital identityNetwork trust |
spellingShingle | Feng Wang Yongjie Gai Haitao Zhang Blockchain user digital identity big data and information security process protection based on network trust Journal of King Saud University: Computer and Information Sciences Blockchain Information security Big data Digital identity Network trust |
title | Blockchain user digital identity big data and information security process protection based on network trust |
title_full | Blockchain user digital identity big data and information security process protection based on network trust |
title_fullStr | Blockchain user digital identity big data and information security process protection based on network trust |
title_full_unstemmed | Blockchain user digital identity big data and information security process protection based on network trust |
title_short | Blockchain user digital identity big data and information security process protection based on network trust |
title_sort | blockchain user digital identity big data and information security process protection based on network trust |
topic | Blockchain Information security Big data Digital identity Network trust |
url | http://www.sciencedirect.com/science/article/pii/S1319157824001204 |
work_keys_str_mv | AT fengwang blockchainuserdigitalidentitybigdataandinformationsecurityprocessprotectionbasedonnetworktrust AT yongjiegai blockchainuserdigitalidentitybigdataandinformationsecurityprocessprotectionbasedonnetworktrust AT haitaozhang blockchainuserdigitalidentitybigdataandinformationsecurityprocessprotectionbasedonnetworktrust |