Analysis of Safe Storage of Network Information Data and Financial Risks Under Blockchain Combined With Edge Computing

IF 4.5 3区 管理学 Q1 INFORMATION SCIENCE & LIBRARY SCIENCE
Xiao Liang, Wenxi Ruan, Zheng Xu, Ji Liu
{"title":"Analysis of Safe Storage of Network Information Data and Financial Risks Under Blockchain Combined With Edge Computing","authors":"Xiao Liang, Wenxi Ruan, Zheng Xu, Ji Liu","doi":"10.4018/jgim.312580","DOIUrl":null,"url":null,"abstract":"To discuss the control of financial risks (FRs) under blockchain (BC) and improve network information security (NIS) and data security, edge computing (EC) combined with BC is proposed to control the risks of the big data (BD) financial system. Firstly, the BC-based financial system is introduced, and the characteristics of BC such as decentralization, tamper-resistant, and smart contract are analyzed. Secondly, the development status of NIS and the characteristics of marginal computing are explained, and the control model of NIS is established. Then, EC is used to encrypt the identity authentication system to ensure data security, and the BC-based FR evaluation model is established. Finally, a questionnaire is designed regarding the NIS model, and the results are analyzed. A simulation experiment is conducted regarding the index evaluation of the BC-based FR evaluation model. The experimental results indicate that network personnel control, environment, and technology have positive effects on NIS, and the impact factors are 0.26, 0.24, and 0.33, respectively.","PeriodicalId":46306,"journal":{"name":"Journal of Global Information Management","volume":"1 1","pages":""},"PeriodicalIF":4.5000,"publicationDate":"2022-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Global Information Management","FirstCategoryId":"91","ListUrlMain":"https://doi.org/10.4018/jgim.312580","RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"INFORMATION SCIENCE & LIBRARY SCIENCE","Score":null,"Total":0}
引用次数: 6

Abstract

To discuss the control of financial risks (FRs) under blockchain (BC) and improve network information security (NIS) and data security, edge computing (EC) combined with BC is proposed to control the risks of the big data (BD) financial system. Firstly, the BC-based financial system is introduced, and the characteristics of BC such as decentralization, tamper-resistant, and smart contract are analyzed. Secondly, the development status of NIS and the characteristics of marginal computing are explained, and the control model of NIS is established. Then, EC is used to encrypt the identity authentication system to ensure data security, and the BC-based FR evaluation model is established. Finally, a questionnaire is designed regarding the NIS model, and the results are analyzed. A simulation experiment is conducted regarding the index evaluation of the BC-based FR evaluation model. The experimental results indicate that network personnel control, environment, and technology have positive effects on NIS, and the impact factors are 0.26, 0.24, and 0.33, respectively.
区块链与边缘计算相结合的网络信息数据安全存储与金融风险分析
为了探讨区块链(BC)下金融风险(FRs)的控制,提高网络信息安全(NIS)和数据安全,提出边缘计算(EC)与BC相结合来控制大数据(BD)金融系统的风险。首先,介绍了基于比特币的金融体系,分析了比特币的去中心化、防篡改、智能合约等特点。其次,阐述了NIS的发展现状和边缘计算的特点,建立了NIS的控制模型;然后,采用EC对身份认证系统进行加密,保证数据安全,并建立了基于bc的FR评估模型。最后,针对NIS模型设计了问卷调查,并对调查结果进行了分析。对基于bc的FR评价模型的指标评价进行了仿真实验。实验结果表明,网络人员控制、网络环境和网络技术对网络信息系统有正向影响,影响因子分别为0.26、0.24和0.33。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Journal of Global Information Management
Journal of Global Information Management INFORMATION SCIENCE & LIBRARY SCIENCE-
CiteScore
5.80
自引率
14.90%
发文量
118
期刊介绍: Authors are encouraged to submit manuscripts that are consistent to the following submission themes: (a) Cross-National Studies. These need not be cross-culture per se. These studies lead to understanding of IT as it leaves one nation and is built/bought/used in another. Generally, these studies bring to light transferability issues and they challenge if practices in one nation transfer. (b) Cross-Cultural Studies. These need not be cross-nation. Cultures could be across regions that share a similar culture. They can also be within nations. These studies lead to understanding of IT as it leaves one culture and is built/bought/used in another. Generally, these studies bring to light transferability issues and they challenge if practices in one culture transfer.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信