Analysis of Safe Storage of Network Information Data and Financial Risks Under Blockchain Combined With Edge Computing

IF 4.5 3区 管理学 Q1 INFORMATION SCIENCE & LIBRARY SCIENCE Journal of Global Information Management Pub Date : 2022-04-07 DOI:10.4018/jgim.312580
Xiao Liang, Wenxi Ruan, Zheng Xu, Ji Liu
{"title":"Analysis of Safe Storage of Network Information Data and Financial Risks Under Blockchain Combined With Edge Computing","authors":"Xiao Liang, Wenxi Ruan, Zheng Xu, Ji Liu","doi":"10.4018/jgim.312580","DOIUrl":null,"url":null,"abstract":"To discuss the control of financial risks (FRs) under blockchain (BC) and improve network information security (NIS) and data security, edge computing (EC) combined with BC is proposed to control the risks of the big data (BD) financial system. Firstly, the BC-based financial system is introduced, and the characteristics of BC such as decentralization, tamper-resistant, and smart contract are analyzed. Secondly, the development status of NIS and the characteristics of marginal computing are explained, and the control model of NIS is established. Then, EC is used to encrypt the identity authentication system to ensure data security, and the BC-based FR evaluation model is established. Finally, a questionnaire is designed regarding the NIS model, and the results are analyzed. A simulation experiment is conducted regarding the index evaluation of the BC-based FR evaluation model. The experimental results indicate that network personnel control, environment, and technology have positive effects on NIS, and the impact factors are 0.26, 0.24, and 0.33, respectively.","PeriodicalId":46306,"journal":{"name":"Journal of Global Information Management","volume":"1 1","pages":""},"PeriodicalIF":4.5000,"publicationDate":"2022-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Global Information Management","FirstCategoryId":"91","ListUrlMain":"https://doi.org/10.4018/jgim.312580","RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"INFORMATION SCIENCE & LIBRARY SCIENCE","Score":null,"Total":0}
引用次数: 6

Abstract

To discuss the control of financial risks (FRs) under blockchain (BC) and improve network information security (NIS) and data security, edge computing (EC) combined with BC is proposed to control the risks of the big data (BD) financial system. Firstly, the BC-based financial system is introduced, and the characteristics of BC such as decentralization, tamper-resistant, and smart contract are analyzed. Secondly, the development status of NIS and the characteristics of marginal computing are explained, and the control model of NIS is established. Then, EC is used to encrypt the identity authentication system to ensure data security, and the BC-based FR evaluation model is established. Finally, a questionnaire is designed regarding the NIS model, and the results are analyzed. A simulation experiment is conducted regarding the index evaluation of the BC-based FR evaluation model. The experimental results indicate that network personnel control, environment, and technology have positive effects on NIS, and the impact factors are 0.26, 0.24, and 0.33, respectively.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
区块链与边缘计算相结合的网络信息数据安全存储与金融风险分析
为了探讨区块链(BC)下金融风险(FRs)的控制,提高网络信息安全(NIS)和数据安全,提出边缘计算(EC)与BC相结合来控制大数据(BD)金融系统的风险。首先,介绍了基于比特币的金融体系,分析了比特币的去中心化、防篡改、智能合约等特点。其次,阐述了NIS的发展现状和边缘计算的特点,建立了NIS的控制模型;然后,采用EC对身份认证系统进行加密,保证数据安全,并建立了基于bc的FR评估模型。最后,针对NIS模型设计了问卷调查,并对调查结果进行了分析。对基于bc的FR评价模型的指标评价进行了仿真实验。实验结果表明,网络人员控制、网络环境和网络技术对网络信息系统有正向影响,影响因子分别为0.26、0.24和0.33。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Journal of Global Information Management
Journal of Global Information Management INFORMATION SCIENCE & LIBRARY SCIENCE-
CiteScore
5.80
自引率
14.90%
发文量
118
期刊介绍: Authors are encouraged to submit manuscripts that are consistent to the following submission themes: (a) Cross-National Studies. These need not be cross-culture per se. These studies lead to understanding of IT as it leaves one nation and is built/bought/used in another. Generally, these studies bring to light transferability issues and they challenge if practices in one nation transfer. (b) Cross-Cultural Studies. These need not be cross-nation. Cultures could be across regions that share a similar culture. They can also be within nations. These studies lead to understanding of IT as it leaves one culture and is built/bought/used in another. Generally, these studies bring to light transferability issues and they challenge if practices in one culture transfer.
期刊最新文献
Digital Supply Chain Management Exploring the Potential of Large Language Models in Supply Chain Management Using the ELM to Explore the Impact of Fake News on Panic Vaccination Intention Managing Carbon Efficiency and Carbon Equity The Effect of Information Resources Management in the UK on Financial Institutions
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1