周幸妤, 张艳硕, 恩克, 徐津. 面向大数据应用的匿名凭证研究综述[J]. 北京电子科技学院学报, 2025, 33(2): 49-62.
    引用本文: 周幸妤, 张艳硕, 恩克, 徐津. 面向大数据应用的匿名凭证研究综述[J]. 北京电子科技学院学报, 2025, 33(2): 49-62.
    ZHOU Xingyu, ZHANG Yanshuo, EN Ke, XU Jin. A Survey on Anonymous Credential for Big Data Applications[J]. Journal of Beijing Electronic Science and Technology Institute, 2025, 33(2): 49-62.
    Citation: ZHOU Xingyu, ZHANG Yanshuo, EN Ke, XU Jin. A Survey on Anonymous Credential for Big Data Applications[J]. Journal of Beijing Electronic Science and Technology Institute, 2025, 33(2): 49-62.

    面向大数据应用的匿名凭证研究综述

    A Survey on Anonymous Credential for Big Data Applications

    • 摘要: 随着大数据时代的全面到来,隐私保护和身份认证已成为亟需解决的关键问题。为了应对这些挑战,学术界提出了多种解决方案,其中匿名凭证备受关注。本文综述了面向大数据应用的匿名凭证,并深入探讨了其在物联网、区块链和云计算关键技术领域中的应用。本文首先阐明了匿名凭证的基本概念,然后系统地对比分析了该技术在物联网、区块链以及云计算三类典型大数据场景下的实际应用情况及其优势。在物联网领域,匿名凭证被应用于身份认证与分布式管理;在区块链领域中,该技术被用于实现去中心化智能合约的隐私保护;而在云计算环境中,匿名凭证通过提供细粒度的访问控制,显著提升了数据共享的安全性。本文最后对以上领域中匿名凭证的研究前景提出了技术融合、计算效率优化和实际应用测试等建议,以期推动构建更加安全和可信的数字社会。

       

      Abstract: In the big data era, privacy protection and identity authentication have become key challenges requiring urgent solutions. In response to these challenges, researchers have proposed a range of solutions, with anonymous credential emerging as a particularly promising approach. In this paper, we present a survey on anonymous credentials tailored for big data applications, focusing on their roles in three typical big data scenarios: IoT, blockchain, and cloud computing. The fundamental concepts of anonymous credentials are first introduced, followed by an explanation of their practical applications and benefits in the three scenarios. In IoT, anonymous credentials are applied to identity authentication and distributed management, and they also provide privacy protection for decentralized smart contracts in blockchain. In cloud computing environments, anonymous credentials significantly enhance the security of data sharing by providing fine-grained access control. Finally, suggestions for future research on anonymous credentials in the three scenarios are presented, including technology integration, computation efficiency optimization, and practical application testing, aiming to facilitate the development of a more secure and reliable digital society.

       

    /

    返回文章
    返回