Nongye tushu qingbao xuebao (Apr 2023)
Design and Analysis of a Blockchain Security Framework Model for Smart Libraries
Abstract
[Purpose/Significance] Smart libraries are an important component of the construction plan for the public cultural system for the smart society and at the national level. However, in the development process of smart libraries, there are security issues such as data leaks, interruptions, attacks, and tampering in data storage and transmission, smart services, and user privacy, leading to a decrease in the user experience of smart libraryies and a lack of trust in library services. Utilizing the technological advantages of blockchain to build a security protection system for smart libraries can solve security issues such as big data, smart services, and user interaction, forming a well documented security protection system for smart libraries. [Method/Process] This article provides a detailed analysis of the contradictions between smart library services and security protection. It is found that there are three major contradictions: data freedom and openness and data security protection, user behavior analysis and user privacy data protection, and dynamic editing and static protection of smart services. Based on this, the possibility and technical support of blockchain to solve the above contradictions was analyzed. Then, based on the provisions of the Data Security Law of the People's Republic of China, combined with the uniqueness and security risks of smart library services, the four principles of smart library security management were established, namely classification and grading, and a dynamic, editable, and evaluatable system. Finally, based on the constituent elements of a smart library, including people, resources, space, and its operational process, a security guarantee system for a smart library was constructed, covering basic layer, data layer, service layer, interactive application layer, and evaluation layer. [Results/Conclusions] The smart library blockchain security framework model is data-driven, relying on the advantages of blockchain technology such as decentralization, distributed storage, trust mechanism, consensus mechanism, smart contracts, timestamps, record operation traces, data traceability, and asset authentication, to achieve terminal security detection response at the basic layer, data-driven at the data layer, risk correlation analysis at the service layer, and user privacy protection at the application layer The closed-loop management of the evaluation layer can effectively ensure the authenticity, integrity, and security of smart library data, build a safe and trustworthy environment for smart library services, and achieve secure management of smart libraries, secure transmission and traceable digital resources, improved user experience, and sustainable development. However, the application of blockchain technology is not achieved overnight. Although the application of some levels or links has been carried out, the application of the complete system needs to be promoted, and the operational exploration at the practical level needs to be further verified.
Keywords