American Institute of Mathematical Sciences

August & September  2019, 12(4&5): 1457-1470. doi: 10.3934/dcdss.2019100

Data encryption algorithm for e-commerce platform based on blockchain technology

 1 School of Information Science and Technology, Tibet University, Lhasa, China 2 Science and Research Office, Tibet University, Lhasa, China

* Corresponding author: Fei Gao

Received  June 2017 Revised  November 2017 Published  November 2018

Aiming at the poor encryption effect existing in the data encryption algorithm of e-commerce platform, and the data lost and distorted easily after encrypting, a data encryption algorithm based on blockchain technology is proposed in this paper. By analyzing the symmetric key algorithm and the public key algorithm, the DES encryption algorithm is described in detail. The two related technologies of digital envelopes and message authentication are analyzed to ensure the accuracy of the data and the one time encryption of the data. Based on this, in order to ensure the effectiveness of encryption, the process of asymmetric encryption algorithm based on chaotic sequence of neural network and asymmetric encryption algorithm based on neural network chaotic attractor are analyzed, and the security is tested. While ensuring the accuracy of data, it improves the effect of data encryption and realizes the encryption of e-commerce platform data, which is to realize data encryption algorithm based on blockchain technology. Experimental results show that the~proposed algorithm can encrypt the data of e-commerce platform, and the encryption process is relatively simple, the encryption effect is better, and the accuracy of the encrypted data is relatively high, which provides a theoretical basis for further research of the subject.

Citation: Fei Gao. Data encryption algorithm for e-commerce platform based on blockchain technology. Discrete & Continuous Dynamical Systems - S, 2019, 12 (4&5) : 1457-1470. doi: 10.3934/dcdss.2019100
References:
 [1] J. Ahmad and S. O. Hwang, Chaos-based diffusion for highly autocorrelated data in encryption algorithms, Nonlinear Dynamics, 82 (2015), 1839-1850.  doi: 10.1007/s11071-015-2281-0.  Google Scholar [2] A. U. Ahmed, S. Rahman and B. Davvaz, On intuitionistic fuzzy idempotent, prime, strongly irreducible and t-pure ideals of semirings, Journal of Intelligent & Fuzzy Systems, 33 (2017), 433-443.   Google Scholar [3] T. Aste, P. Tasca and T. D. Matteo, Blockchain technologies: The foreseeable impact on society and industry, Computer, 50 (2017), 18-28.   Google Scholar [4] H. Chen, X. Du and Z. Liu, Optical hyperspectral data encryption in spectrum domain by using 3d arnold and gyrator transforms, Spectroscopy Letters, 49 (2016), 103-107.   Google Scholar [5] Y. Chen, Mean square exponential stability of uncertain singular stochastic systems with discrete and distributed delays, Journal of Computational & Applied Mathematics, 20 (2014), 13-26.   Google Scholar [6] P. Cheng, H. Yang, P. Wei and W. Zhang, A fast image encryption algorithm based on chaotic map and lookup table, Nonlinear Dynamics, 79 (2015), 2121-2131.   Google Scholar [7] W. D. H., Data authentication and security assurance based on distributed storage system, Journal of China Academy of Electronics and Information Technology, 6 (2015), 613-619. Google Scholar [8] P. Fairley, Blockchain world - feeding the blockchain beast if bitcoin ever does go mainstream, the electricity needed to sustain it will be enormous, IEEE Spectrum, 54 (2017), 36-59.   Google Scholar [9] W. Gao and W. Wang, A tight neighborhood union condition on fractional (g, f, n', m)-critical deleted graphs, Colloquium Mathematicum, 149 (2017), 291-298.  doi: 10.4064/cm6959-8-2016.  Google Scholar [10] L. Guo and L. University, Big data encryption to protect privacy data environment improvement and simulation of the algorithm, Computer Simulation, 338-341. Google Scholar [11] T. Hua, J. Chen, D. Pei, W. Zhang and N. Zhou, Quantum image encryption algorithm based on image correlation decomposition, International Journal of Theoretical Physics, 54 (2015), 526-537.   Google Scholar [12] Y. Jiang, G. Li, W. Che, Y. Liu, B. Xu, G. Shan, D. Zhu, Z. Su and M. R. Bryce, A neutral dinuclear ir(ⅲ) complex for anti-counterfeiting and data encryption, Chemical Communications, 53 (2017), 3022-3025.   Google Scholar [13] K. Lata, Secure data aggregation in wireless sensor networks using homomorphic encryption, International Journal of Electronics, 102 (2015), 690-702.   Google Scholar [14] Z. L. F., Research on new data encryption algorithm in big data environment, Bulletin of Science and Technology, 205-208. Google Scholar [15] H. Y. Lin, Location-based data encryption for wireless sensor network using dynamic keys, Wireless Networks, 21 (2015), 1-8.   Google Scholar [16] S. Lopez and F. Muntaner-Batle, Rainbow eulerian multidigraphs and the product of cycles, Discrete Mathematics and Theoretical Computer Science, 17 (2016), 91-104.   Google Scholar [17] A. Panchbudhe, System and method for combining deduplication and encryption of data, 2015. Google Scholar [18] K. Suthar and J. Patel, Encryscation: An secure approach for data security using encryption and obfuscation techniques for iaas and daas services in cloud environment, Astrophysical Journal, 663 (2017), 799-807.   Google Scholar [19] X. J. Tong, Z. Wang and M. Zhang, An image encryption algorithm based on the perturbed high-dimensional chaotic map, Nonlinear Dynamics, 80 (2015), 1493-1508.  doi: 10.1007/s11071-015-1957-9.  Google Scholar [20] X. Yang, Z. Shen, X. Hu and W. Hu, Chaotic encryption algorithm against chosen-plaintext attacks in optical ofdm transmission, IEEE Photonics Technology Letters, 28 (2016), 2499-2502.   Google Scholar [21] G. Ye and X. Huang, An image encryption algorithm based on autoblocking and electrocardiography, IEEE Multimedia, 23 (2016), 64-71.   Google Scholar [22] H. Q. Zhang, Y. Z. Zhao and Z. Xu, Encryption and decryption algorithm based on rotation matrix, J. Jilin Univ. Sci., 54 (2016), 229-233.   Google Scholar [23] Q. Zhao, Computer simulation of reliability algorithm for wind-induced vibration response control of high structures, Journal of Discrete Mathematical Sciences & Cryptography, 20 (2017), 1519-1523.   Google Scholar

show all references

References:
 [1] J. Ahmad and S. O. Hwang, Chaos-based diffusion for highly autocorrelated data in encryption algorithms, Nonlinear Dynamics, 82 (2015), 1839-1850.  doi: 10.1007/s11071-015-2281-0.  Google Scholar [2] A. U. Ahmed, S. Rahman and B. Davvaz, On intuitionistic fuzzy idempotent, prime, strongly irreducible and t-pure ideals of semirings, Journal of Intelligent & Fuzzy Systems, 33 (2017), 433-443.   Google Scholar [3] T. Aste, P. Tasca and T. D. Matteo, Blockchain technologies: The foreseeable impact on society and industry, Computer, 50 (2017), 18-28.   Google Scholar [4] H. Chen, X. Du and Z. Liu, Optical hyperspectral data encryption in spectrum domain by using 3d arnold and gyrator transforms, Spectroscopy Letters, 49 (2016), 103-107.   Google Scholar [5] Y. Chen, Mean square exponential stability of uncertain singular stochastic systems with discrete and distributed delays, Journal of Computational & Applied Mathematics, 20 (2014), 13-26.   Google Scholar [6] P. Cheng, H. Yang, P. Wei and W. Zhang, A fast image encryption algorithm based on chaotic map and lookup table, Nonlinear Dynamics, 79 (2015), 2121-2131.   Google Scholar [7] W. D. H., Data authentication and security assurance based on distributed storage system, Journal of China Academy of Electronics and Information Technology, 6 (2015), 613-619. Google Scholar [8] P. Fairley, Blockchain world - feeding the blockchain beast if bitcoin ever does go mainstream, the electricity needed to sustain it will be enormous, IEEE Spectrum, 54 (2017), 36-59.   Google Scholar [9] W. Gao and W. Wang, A tight neighborhood union condition on fractional (g, f, n', m)-critical deleted graphs, Colloquium Mathematicum, 149 (2017), 291-298.  doi: 10.4064/cm6959-8-2016.  Google Scholar [10] L. Guo and L. University, Big data encryption to protect privacy data environment improvement and simulation of the algorithm, Computer Simulation, 338-341. Google Scholar [11] T. Hua, J. Chen, D. Pei, W. Zhang and N. Zhou, Quantum image encryption algorithm based on image correlation decomposition, International Journal of Theoretical Physics, 54 (2015), 526-537.   Google Scholar [12] Y. Jiang, G. Li, W. Che, Y. Liu, B. Xu, G. Shan, D. Zhu, Z. Su and M. R. Bryce, A neutral dinuclear ir(ⅲ) complex for anti-counterfeiting and data encryption, Chemical Communications, 53 (2017), 3022-3025.   Google Scholar [13] K. Lata, Secure data aggregation in wireless sensor networks using homomorphic encryption, International Journal of Electronics, 102 (2015), 690-702.   Google Scholar [14] Z. L. F., Research on new data encryption algorithm in big data environment, Bulletin of Science and Technology, 205-208. Google Scholar [15] H. Y. Lin, Location-based data encryption for wireless sensor network using dynamic keys, Wireless Networks, 21 (2015), 1-8.   Google Scholar [16] S. Lopez and F. Muntaner-Batle, Rainbow eulerian multidigraphs and the product of cycles, Discrete Mathematics and Theoretical Computer Science, 17 (2016), 91-104.   Google Scholar [17] A. Panchbudhe, System and method for combining deduplication and encryption of data, 2015. Google Scholar [18] K. Suthar and J. Patel, Encryscation: An secure approach for data security using encryption and obfuscation techniques for iaas and daas services in cloud environment, Astrophysical Journal, 663 (2017), 799-807.   Google Scholar [19] X. J. Tong, Z. Wang and M. Zhang, An image encryption algorithm based on the perturbed high-dimensional chaotic map, Nonlinear Dynamics, 80 (2015), 1493-1508.  doi: 10.1007/s11071-015-1957-9.  Google Scholar [20] X. Yang, Z. Shen, X. Hu and W. Hu, Chaotic encryption algorithm against chosen-plaintext attacks in optical ofdm transmission, IEEE Photonics Technology Letters, 28 (2016), 2499-2502.   Google Scholar [21] G. Ye and X. Huang, An image encryption algorithm based on autoblocking and electrocardiography, IEEE Multimedia, 23 (2016), 64-71.   Google Scholar [22] H. Q. Zhang, Y. Z. Zhao and Z. Xu, Encryption and decryption algorithm based on rotation matrix, J. Jilin Univ. Sci., 54 (2016), 229-233.   Google Scholar [23] Q. Zhao, Computer simulation of reliability algorithm for wind-induced vibration response control of high structures, Journal of Discrete Mathematical Sciences & Cryptography, 20 (2017), 1519-1523.   Google Scholar
DES encryption algorithm structure
Packet symmetric encryption communication scheme based on chaotic neural network
Comparison of SNR for encryption with different algorithms
Comparison of noise after encryption and decryption with different algorithms
Hardware environment
 Name System Software Remark Dell Win7 (64 bit) Weblogic12.1.1 application system Dell Win7 (64 bit) Tamcat6.0.32 SSL Test server HP ProLiant DL380 G5 Windows server2003 Oracle11g Routing database, Business database HP ProLiant DL380 G5 Win7 (32 bit) Oracle11g Business database HP ProLiant DL140 Win7 (32 bit) Oracle11g Business database
 Name System Software Remark Dell Win7 (64 bit) Weblogic12.1.1 application system Dell Win7 (64 bit) Tamcat6.0.32 SSL Test server HP ProLiant DL380 G5 Windows server2003 Oracle11g Routing database, Business database HP ProLiant DL380 G5 Win7 (32 bit) Oracle11g Business database HP ProLiant DL140 Win7 (32 bit) Oracle11g Business database
Software environment
 Name Version Purpose E-mart application system V1.0 Experimental application system platform weblogic 12.1.1 Application server tomcat 6.0.32 SSL test application server Oracle routing database 11.2.0.1.0 Switching enterprise table space Oracle business database 11.2.0.1.0 Storing business data openSSL 1.0.2g Generating certificate file and related signature
 Name Version Purpose E-mart application system V1.0 Experimental application system platform weblogic 12.1.1 Application server tomcat 6.0.32 SSL test application server Oracle routing database 11.2.0.1.0 Switching enterprise table space Oracle business database 11.2.0.1.0 Storing business data openSSL 1.0.2g Generating certificate file and related signature
Running time of different algorithms
 Data size/MB The proposed algorithm /ms Chaotic sequence /ms Chaotic parameter modulation /ms 2 137 186 213 4 189 256 276 6 256 354 342 8 301 427 408 10 387 506 474 15 452 584 542
 Data size/MB The proposed algorithm /ms Chaotic sequence /ms Chaotic parameter modulation /ms 2 137 186 213 4 189 256 276 6 256 354 342 8 301 427 408 10 387 506 474 15 452 584 542
 [1] Jianbin Li, Mengcheng Guan, Zhiyuan Chen. Optimal inventory policy for fast-moving consumer goods under e-commerce environment. Journal of Industrial & Management Optimization, 2020, 16 (4) : 1769-1781. doi: 10.3934/jimo.2019028 [2] Aiwan Fan, Qiming Wang, Joyati Debnath. A high precision data encryption algorithm in wireless network mobile communication. Discrete & Continuous Dynamical Systems - S, 2019, 12 (4&5) : 1327-1340. doi: 10.3934/dcdss.2019091 [3] Archana Prashanth Joshi, Meng Han, Yan Wang. A survey on security and privacy issues of blockchain technology. Mathematical Foundations of Computing, 2018, 1 (2) : 121-147. doi: 10.3934/mfc.2018007 [4] Chiara Spadafora, Riccardo Longo, Massimiliano Sala. A coercion-resistant blockchain-based E-voting protocol with receipts. Advances in Mathematics of Communications, 2021  doi: 10.3934/amc.2021005 [5] Yi Zhang, Xiao-Li Ma. Research on image digital watermarking optimization algorithm under virtual reality technology. Discrete & Continuous Dynamical Systems - S, 2019, 12 (4&5) : 1427-1440. doi: 10.3934/dcdss.2019098 [6] Weiping Li, Haiyan Wu, Jie Yang. Intelligent recognition algorithm for social network sensitive information based on classification technology. Discrete & Continuous Dynamical Systems - S, 2019, 12 (4&5) : 1385-1398. doi: 10.3934/dcdss.2019095 [7] Débora A. F. Albanez, Maicon J. Benvenutti. Continuous data assimilation algorithm for simplified Bardina model. Evolution Equations & Control Theory, 2018, 7 (1) : 33-52. doi: 10.3934/eect.2018002 [8] Kyung Jae Kim, Jin Soo Park, Bong Dae Choi. Admission control scheme of extended rtPS algorithm for VoIP service in IEEE 802.16e with adaptive modulation and coding. Journal of Industrial & Management Optimization, 2010, 6 (3) : 641-660. doi: 10.3934/jimo.2010.6.641 [9] Angsuman Das, Avishek Adhikari, Kouichi Sakurai. Plaintext checkable encryption with designated checker. Advances in Mathematics of Communications, 2015, 9 (1) : 37-53. doi: 10.3934/amc.2015.9.37 [10] Debrup Chakraborty, Sebati Ghosh, Cuauhtemoc Mancillas López, Palash Sarkar. ${\sf {FAST}}$: Disk encryption and beyond. Advances in Mathematics of Communications, 2020  doi: 10.3934/amc.2020108 [11] Jinsong Xu. Reversible hidden data access algorithm in cloud computing environment. Discrete & Continuous Dynamical Systems - S, 2019, 12 (4&5) : 1219-1232. doi: 10.3934/dcdss.2019084 [12] Kazufumi Ito, Karim Ramdani, Marius Tucsnak. A time reversal based algorithm for solving initial data inverse problems. Discrete & Continuous Dynamical Systems - S, 2011, 4 (3) : 641-652. doi: 10.3934/dcdss.2011.4.641 [13] Baolan Yuan, Wanjun Zhang, Yubo Yuan. A Max-Min clustering method for $k$-means algorithm of data clustering. Journal of Industrial & Management Optimization, 2012, 8 (3) : 565-575. doi: 10.3934/jimo.2012.8.565 [14] Luis C. Corchón, Clara Eugenia García. Technology transfer: Barriers and opportunities. Journal of Dynamics & Games, 2018, 5 (4) : 343-355. doi: 10.3934/jdg.2018021 [15] Xu Zhang, Zhanglin Peng, Qiang Zhang, Xiaoan Tang, Panos M. Pardalos. Identifying and determining crowdsourcing service strategies: An empirical study on a crowdsourcing platform in China. Journal of Industrial & Management Optimization, 2021  doi: 10.3934/jimo.2021045 [16] Najeeb Abdulaleem. $V$-$E$-invexity in $E$-differentiable multiobjective programming. Numerical Algebra, Control & Optimization, 2021  doi: 10.3934/naco.2021014 [17] Melody Dodd, Jennifer L. Mueller. A real-time D-bar algorithm for 2-D electrical impedance tomography data. Inverse Problems & Imaging, 2014, 8 (4) : 1013-1031. doi: 10.3934/ipi.2014.8.1013 [18] Yunmei Chen, Xiaojing Ye, Feng Huang. A novel method and fast algorithm for MR image reconstruction with significantly under-sampled data. Inverse Problems & Imaging, 2010, 4 (2) : 223-240. doi: 10.3934/ipi.2010.4.223 [19] Heping Dong, Deyue Zhang, Yukun Guo. A reference ball based iterative algorithm for imaging acoustic obstacle from phaseless far-field data. Inverse Problems & Imaging, 2019, 13 (1) : 177-195. doi: 10.3934/ipi.2019010 [20] Jian-Wu Xue, Xiao-Kun Xu, Feng Zhang. Big data dynamic compressive sensing system architecture and optimization algorithm for internet of things. Discrete & Continuous Dynamical Systems - S, 2015, 8 (6) : 1401-1414. doi: 10.3934/dcdss.2015.8.1401

2020 Impact Factor: 2.425

Metrics

• PDF downloads (529)
• HTML views (1181)
• Cited by (3)

Other articlesby authors

• on AIMS
• on Google Scholar

[Back to Top]