Xiaoping Wang, Akhtar Badshah, Shanshan Tu, M. Waqas
{"title":"基于可信计算的区块链边界安全防护","authors":"Xiaoping Wang, Akhtar Badshah, Shanshan Tu, M. Waqas","doi":"10.1109/ASSP54407.2021.00042","DOIUrl":null,"url":null,"abstract":"Blockchain has the characteristics of openness and decentralization and faces many security threats in application scenarios. Apply trusted computing technology to establish trusted blockchain boundaries and build a systematic security protection framework to meet the security requirements in blockchain application scenarios. Therefore, this paper combines trusted computing technology with blockchain security protection requirements, proposes blockchain trusted boundary, focuses on blockchain boundary trusted measurement technology, and ensures the security and credibility of blockchain boundary from systematization.","PeriodicalId":153782,"journal":{"name":"2021 2nd Asia Symposium on Signal Processing (ASSP)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Blockchain Boundary Security Protection based on Trusted Computing\",\"authors\":\"Xiaoping Wang, Akhtar Badshah, Shanshan Tu, M. Waqas\",\"doi\":\"10.1109/ASSP54407.2021.00042\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Blockchain has the characteristics of openness and decentralization and faces many security threats in application scenarios. Apply trusted computing technology to establish trusted blockchain boundaries and build a systematic security protection framework to meet the security requirements in blockchain application scenarios. Therefore, this paper combines trusted computing technology with blockchain security protection requirements, proposes blockchain trusted boundary, focuses on blockchain boundary trusted measurement technology, and ensures the security and credibility of blockchain boundary from systematization.\",\"PeriodicalId\":153782,\"journal\":{\"name\":\"2021 2nd Asia Symposium on Signal Processing (ASSP)\",\"volume\":\"17 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 2nd Asia Symposium on Signal Processing (ASSP)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ASSP54407.2021.00042\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 2nd Asia Symposium on Signal Processing (ASSP)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ASSP54407.2021.00042","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Blockchain Boundary Security Protection based on Trusted Computing
Blockchain has the characteristics of openness and decentralization and faces many security threats in application scenarios. Apply trusted computing technology to establish trusted blockchain boundaries and build a systematic security protection framework to meet the security requirements in blockchain application scenarios. Therefore, this paper combines trusted computing technology with blockchain security protection requirements, proposes blockchain trusted boundary, focuses on blockchain boundary trusted measurement technology, and ensures the security and credibility of blockchain boundary from systematization.