信息网络安全 ›› 2024, Vol. 24 ›› Issue (11): 1739-1748.doi: 10.3969/j.issn.1671-1122.2024.11.013

• 入选论文 • 上一篇    下一篇

基于布隆过滤器查找树的日志数据区块链溯源机制

张鹏, 罗文华()   

  1. 中国刑事警察学院公安信息技术与情报学院,沈阳 110035
  • 收稿日期:2024-04-25 出版日期:2024-11-10 发布日期:2024-11-21
  • 通讯作者: 罗文华 luowenhua770404@126.com
  • 作者简介:张鹏(2001—),男,山东,硕士研究生,CCF会员,主要研究方向为网络安全执法|罗文华(1977—),男,辽宁,教授,硕士,主要研究方向为网络安全执法
  • 基金资助:
    国家重点研发计划(2021YFC3301801)

Blockchain-Based Log Data Provenance Mechanism Using Bloom Filter Search Tree

ZHANG Peng, LUO Wenhua()   

  1. School of Public Security Information Technology and Intelligence, Criminal Investigation Police University of China, Shenyang 110035, China
  • Received:2024-04-25 Online:2024-11-10 Published:2024-11-21

摘要:

针对现有溯源机制在处理日志数据时的不足,文章提出一种基于布隆过滤器查找树的日志数据区块链溯源机制。该机制采用链上摘要与链下数据相结合的存储模式,以保证数据的安全性与隐私性。针对链上摘要,文章提出一种以访问时间为核心索引信息的BT-BFT机制,将时间戳通过位图进行索引,利用布隆过滤器实现日志数据分析粒度的刻画,并构造均衡分布的树状结构,从而高效映射和索引时间维度的数据。该机制通过智能合约的形式进行部署,有效排查非目标溯源节点,支持时间戳溯源和基于关键词的全时段溯源,并引入身份过滤机制,以应对布隆过滤器固有的冲突问题。实验结果表明,文章所提机制能够在保证数据安全的前提下,高效且准确地对时间敏感类数据进行溯源。

关键词: 区块链, 日志数据, 数据溯源, 布隆过滤器

Abstract:

To address the shortcomings of existing provenance mechanisms in handling log data, this article proposed a blockchain-based log data provenance mechanism using Bloom filter search tree. This mechanism adopted a storage model combining on-chain data hashes and off-chain actual data was adopted to ensure data security and privacy. For the on-chain data hashes, this article introduced a bittimemap-Bloom filter tree (BT-BFT) mechanism centered around access time as the core index information. This mechanism indexed timestamps using a bitmap, then leveraged the number of Bloom filters to delineate the granularity of log data analysis, subsequently constructing a balanced tree-like structure that enabled efficient mapping and indexing of time-dimensional data. Deployed in the form of smart contracts, it effectively filtered out non-target provenance nodes, supported timestamp-based provenance and full-period provenance based on keywords, and incorporated an identity filtering mechanism to address the inherent conflict issues of Bloom filters. Experimental results demonstrate that the mechanism proposed in the article can accurately and efficiently trace time-sensitive data while ensuring data security.

Key words: blockchain, log data, data provenance, Bloom filter

中图分类号: