Agri-CBI: Agricultural Big Data Security Governance Model Leveraging Cloud-Blockchain Integration

Expand
  • 1. School of Computer Science and Technology, Xinjiang University, Urumqi 830017, China
    2. Xinjiang Key Laboratory of Signal Detection and Processing, Urumqi 830017, China
    3. Department of Electronic Engineering, and Beijing National Research Center for Information Science and Technology, Tsinghua University, Beijing 100084, China
    4. Mechanical and Electrical Engineering College, Gansu Agricultural University, Lanzhou 730070, Gansu, China
    5. School of Agricultural Engineering, Jiangsu University, Zhenjiang 212013, Jiangsu, China

Received date: 2024-03-08

  Accepted date: 2024-04-25

  Online published: 2024-10-01

Abstract

The current agricultural production model in China is transitioning from traditional to smart agriculture. In response to the continuous expansion of data scale in various agricultural organizations and the problem of "Data Silos" in data sharing, it is difficult to gather agricultural data on a large scale to guide precise agricultural decision-making. This study is based on Cloud-Blockchain Integration and data security governance related technologies in distributed agriculture scenarios to solve the above-mentioned problems and explore their practical application effects. In a distributed agricultural scenario, based on IPFS, blockchain, and cloud computing, design an agricultural big data governance algorithm that can be deployed on smart contracts, construct a multi-party agricultural data aggregation model, as well as a complete, secure, traceable data protection model and typical scenario application model. Taking the agricultural production of Huaxing Farm and its affiliated agricultural organizations in Changji, Xinjiang as an example, further build a Cloud-Blockchain Integration agricultural big data platform. By comparing the performance of the agricultural big data governance model based on Cloud-Blockchain Integration with two traditional models, the experiment shows that the comprehensive performance of the model in this article can achieve a better balance and achieved better performance compared to the traditional models.

Cite this article

YUE RuiJun, HE Liang, TANG MinRui, YAN Wei, LIU ShengQuan, YANG WanXia, SUN WeiHong, HUANG YongFeng . Agri-CBI: Agricultural Big Data Security Governance Model Leveraging Cloud-Blockchain Integration[J]. Journal of Agricultural Big Data, 2024 , 6(3) : 333 -350 . DOI: 10.19788/j.issn.2096-6369.000039

References

[1] 孙忠富, 马浚诚, 郑飞翔, 等. 区块链支撑农业大数据安全初探[J]. 农业大数据学报, 2020, 2(2): 25-37.
[2] 王佳方. 智慧农业时代大数据的发展态势研究[J]. 技术经济与管理研究, 2020, (2):124-128.
[3] 马晨, 李瑾, 张骞, 等. 农业软件产业发展的现实格局与路径选择[J]. 中国工程科学, 2021, 23(4):19-29.
[4] 杨晨雪, 孙志国. 基于区块链技术的农产品供应链数据管理系统设计[J]. 农业大数据学报, 2020, 2(2): 74-83.
[5] 侯玥, 彭长辉, 杨铭霞, 等. 基于区块链技术的生态观测数据存储与共享模式[J]. 农业大数据学报, 2020, 2(2): 55-66.
[6] 左敏, 何思宇, 张青川. 基于区块链的食品溯源技术研究[J]. 农业大数据学报, 2020, 2(3):52-60.
[7] YANG X, LI M, YU H, et al. A trusted blockchain-based traceability system for fruit and vegetable agricultural products[J]. IEEE Access, 2021, 9: 36282-36293.
[8] SAJJA G S, RANE K P, PHASINAM K, et al. Towards applicability of blockchain in agriculture sector[J]. Materials Today: Proceedings, 2023, 80: 3705-3708.
[9] 李婷婷, 马娟娟, 张建华. 农业大数据信息采集平台建设研究[J]. 中国农学通报, 2022, 38(3):158-164.
[10] 王文生. 可信区块链在农业农村应用展望[J]. 农业大数据学报, 2020, 2(2): 14-24.
[11] 孙九林, 李灯华, 许世卫, 等. 农业大数据与信息化基础设施发展战略研究[J]. 中国工程科学, 2021, 23(4):10-18.
[12] LI S, LI R, ZHANG Y, et al. CBI: A Data Access Control System Based on Cloud and Blockchain Integration[C]// 2020 IEEE 22nd International Conference on High Performance Computing and Communications. IEEE, 2020: 715-721. doi: 10.1109/HPCC-SmartCity-DSS50907.2020.00093.
[13] 齐伊宁, 秦宣梅, 孙东红, 等. 面向领域数据安全可信共享的云链融合系统[J]. 中国传媒大学学报(自然科学版), 2022, 29(2):9-18.
[14] 杨俊, 马霆, 郭丹. 提升数字能力赋能智慧农业发展[J]. 华中农业大学学报, 2023, 42(5):282-288.
[15] 王利朋, 关志, 李青山, 等. 区块链数据安全服务综述[J]. 软件学报, 2023, 34(1):1-32.
[16] 丁博文, 徐跃东, 王亮. IPFS网络内容和性能测量[J]. 计算机工程与应用, 2022, 58(7):97-105.
[17] JOHNSON D, MENEZES A, VANSTONE S. The elliptic curve digital signature algorithm (ECDSA)[J]. International Journal of Information Security, 2001, 1: 36-63.
[18] BETHENCOURT J, SAHAI A, WATERS B. Ciphertext-policy attribute-based encryption[C]// 2007 IEEE symposium on security and privacy (SP'07). IEEE, 2007: 321-334.
[19] DAEMEN J, RIJMEN V. AES proposal: Rijndael[M]. 1999.
[20] ZODPE H, ARBAZ S. A Survey on various cryptanalytic attacks on the aes algorithm[J]. International Journal of Next-Generation Computing, 2021, 12(2):115-123. https://doi.org/10.47164/ijngc.v12i2.202.
[21] AMARA M, SIAD A. Elliptic curve cryptography and its applications[C]// International workshop on systems, signal processing and their applications, WOSSPA. IEEE, 2011: 247-250.
[22] 王红珍, 李竹林. ECC算法在软件保护中的应用及安全性分析[J]. 计算机技术与发展, 2012, 22(8):155-158.
Outlines

/