Blockchain user digital identity big data and information security process protection based on network trust

This study aims to delve into the knowledge graph, functional pathways, and qualitative logic among elements such as network trust, blockchain organization, user identity, big data, and information security in the digital economy era. Through an analysis of the endogenous and exogenous explicit mana...

Volledige beschrijving

Bibliografische gegevens
Hoofdauteurs: Feng Wang, Yongjie Gai, Haitao Zhang
Formaat: Artikel
Taal:English
Gepubliceerd in: Elsevier 2024-04-01
Reeks:Journal of King Saud University: Computer and Information Sciences
Onderwerpen:
Online toegang:http://www.sciencedirect.com/science/article/pii/S1319157824001204
_version_ 1827249339647393792
author Feng Wang
Yongjie Gai
Haitao Zhang
author_facet Feng Wang
Yongjie Gai
Haitao Zhang
author_sort Feng Wang
collection DOAJ
description This study aims to delve into the knowledge graph, functional pathways, and qualitative logic among elements such as network trust, blockchain organization, user identity, big data, and information security in the digital economy era. Through an analysis of the endogenous and exogenous explicit management logic relationships among these elements, this study innovatively constructs three primary dimensions and nine secondary dimensions of digital identity attributes for users. Additionally, it establishes a collaborative management mechanism between government organizations and non-governmental blockchain alliances corresponding to identity attributes based on the delegated proxy mechanism. Furthermore, it reconstructs the big data chain management framework for user digital identity under the zero-trust model and establishes a management process for blockchain digital identity information security protection under the zero-trust model. These efforts provide innovative solutions with both research and application value for the “virtual-real integration” global security governance of the metaverse, digital economy, and digital government.
first_indexed 2024-04-24T10:04:18Z
format Article
id doaj.art-825e449365924d3cb467f7124bc31054
institution Directory Open Access Journal
issn 1319-1578
language English
last_indexed 2025-03-21T23:46:04Z
publishDate 2024-04-01
publisher Elsevier
record_format Article
series Journal of King Saud University: Computer and Information Sciences
spelling doaj.art-825e449365924d3cb467f7124bc310542024-05-18T06:35:31ZengElsevierJournal of King Saud University: Computer and Information Sciences1319-15782024-04-01364102031Blockchain user digital identity big data and information security process protection based on network trustFeng Wang0Yongjie Gai1Haitao Zhang2School of Economics and Management, Hainan Normal University, 571158 Hainan, China; Big Data Management Research Center, Jilin University, 130021 Jilin, ChinaSchool of Economics and Management, Hainan Normal University, 571158 Hainan, China; Corresponding author.Big Data Management Research Center, Jilin University, 130021 Jilin, ChinaThis study aims to delve into the knowledge graph, functional pathways, and qualitative logic among elements such as network trust, blockchain organization, user identity, big data, and information security in the digital economy era. Through an analysis of the endogenous and exogenous explicit management logic relationships among these elements, this study innovatively constructs three primary dimensions and nine secondary dimensions of digital identity attributes for users. Additionally, it establishes a collaborative management mechanism between government organizations and non-governmental blockchain alliances corresponding to identity attributes based on the delegated proxy mechanism. Furthermore, it reconstructs the big data chain management framework for user digital identity under the zero-trust model and establishes a management process for blockchain digital identity information security protection under the zero-trust model. These efforts provide innovative solutions with both research and application value for the “virtual-real integration” global security governance of the metaverse, digital economy, and digital government.http://www.sciencedirect.com/science/article/pii/S1319157824001204BlockchainInformation securityBig dataDigital identityNetwork trust
spellingShingle Feng Wang
Yongjie Gai
Haitao Zhang
Blockchain user digital identity big data and information security process protection based on network trust
Journal of King Saud University: Computer and Information Sciences
Blockchain
Information security
Big data
Digital identity
Network trust
title Blockchain user digital identity big data and information security process protection based on network trust
title_full Blockchain user digital identity big data and information security process protection based on network trust
title_fullStr Blockchain user digital identity big data and information security process protection based on network trust
title_full_unstemmed Blockchain user digital identity big data and information security process protection based on network trust
title_short Blockchain user digital identity big data and information security process protection based on network trust
title_sort blockchain user digital identity big data and information security process protection based on network trust
topic Blockchain
Information security
Big data
Digital identity
Network trust
url http://www.sciencedirect.com/science/article/pii/S1319157824001204
work_keys_str_mv AT fengwang blockchainuserdigitalidentitybigdataandinformationsecurityprocessprotectionbasedonnetworktrust
AT yongjiegai blockchainuserdigitalidentitybigdataandinformationsecurityprocessprotectionbasedonnetworktrust
AT haitaozhang blockchainuserdigitalidentitybigdataandinformationsecurityprocessprotectionbasedonnetworktrust