Analysis of Safe Storage of Network Information Data and Financial Risks Under Blockchain Combined With Edge Computing

17Citations
Citations of this article
52Readers
Mendeley users who have this article in their library.

Abstract

To discuss the control of financial risks (FRs) under blockchain (BC) and improve network information security (NIS) and data security, edge computing (EC) combined with BC is proposed to control the risks of the big data (BD) financial system. Firstly, the BC-based financial system is introduced, and the characteristics of BC such as decentralization, tamper-resistant, and smart contract are analyzed. Secondly, the development status of NIS and the characteristics of marginal computing are explained, and the control model of NIS is established. Then, EC is used to encrypt the identity authentication system to ensure data security, and the BC-based FR evaluation model is established. Finally, a questionnaire is designed regarding the NIS model, and the results are analyzed. A simulation experiment is conducted regarding the index evaluation of the BC-based FR evaluation model. The experimental results indicate that network personnel control, environment, and technology have positive effects on NIS, and the impact factors are 0.26, 0.24, and 0.33, respectively.

References Powered by Scopus

Embedding Blockchain Technology into IoT for Security: A Survey

264Citations
N/AReaders
Get full text

Knowledge base graph embedding module design for Visual question answering model

193Citations
N/AReaders
Get full text

Smart and Practical Privacy-Preserving Data Aggregation for Fog-Based Smart Grids

154Citations
N/AReaders
Get full text

Cited by Powered by Scopus

COVID-19 fake news detection: A hybrid CNN-BiLSTM-AM model

22Citations
N/AReaders
Get full text

Blockchain technology adaptation and organizational inertia: moderating role between knowledge management processes and supply chain resilience

11Citations
N/AReaders
Get full text

Enforcing Information System Security: Policies and Procedures for Employee Compliance

9Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Liang, X., Ruan, W., Xu, Z., & Liu, J. (2022). Analysis of Safe Storage of Network Information Data and Financial Risks Under Blockchain Combined With Edge Computing. Journal of Global Information Management, 30(11). https://doi.org/10.4018/JGIM.312580

Readers over time

‘23‘24‘25015304560

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 6

67%

Professor / Associate Prof. 2

22%

Lecturer / Post doc 1

11%

Readers' Discipline

Tooltip

Business, Management and Accounting 4

50%

Psychology 2

25%

Philosophy 1

13%

Computer Science 1

13%

Save time finding and organizing research with Mendeley

Sign up for free
0