2022
DOI: 10.3390/app12199657
|View full text |Cite
|
Sign up to set email alerts
|

A Blockchain-Based Trust Model for Uploading Illegal Data Identification

Abstract: Malicious users can upload illegal data to the blockchain to spread it, resulting in serious threats due to the tamper-proof characteristics of the blockchain. However, the existing methods for uploading illegal data identification cannot select trust nodes and ensure the credibility of the identification results, leading to a decrease in the credibility of the methods. To solve the problem, this paper proposes a blockchain-based trust model for uploading illegal data identification. The trust model mainly has… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 24 publications
0
2
0
Order By: Relevance
“…Based on Equation ( 6), we can obtain Equation (7) and it can be asserted that A has the capability to generate all possible private keys with the exception of its own if c * = c and e * = e from Equation (7). According to [40], it can be concluded that the likelihood of the adversary A succeeding in generating two distinct outputs that satisfy the verification criteria is exceedingly small.…”
Section: Security Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…Based on Equation ( 6), we can obtain Equation (7) and it can be asserted that A has the capability to generate all possible private keys with the exception of its own if c * = c and e * = e from Equation (7). According to [40], it can be concluded that the likelihood of the adversary A succeeding in generating two distinct outputs that satisfy the verification criteria is exceedingly small.…”
Section: Security Analysismentioning
confidence: 99%
“…As a state-of-the-art technology, the Internet of Things (IoT) has garnered extensive application in various facets of modern life, ranging from smart cities [1] and connected vehicles [2] to intelligent healthcare [3][4][5]. The proliferation of IoT devices has resulted in the generation of voluminous and dynamic data [6], which often contains sensitive user information, including personal identification, health, physiological data, and transaction records [7]. The exponential growth of data has placed significant pressure on the storage and computing capabilities of IoT devices.…”
Section: Introductionmentioning
confidence: 99%