Secure Sharing and Access Control Mechanism of Library Information Resources Combined with Blockchain Technology
Main Article Content
Abstract
Traditional research has many shortcomings in terms of resource-sharing security, authority management flexibility, transparency, and privacy protection. This paper aims to utilize the advantages of blockchain technology to build a more secure, efficient, and transparent library information resource management system. A decentralized resource-sharing architecture is first designed to connect multiple library nodes through an alliance chain to achieve cross-institutional resource sharing during the research process. The resource content is encrypted using the Advanced Encryption Standard (AES) algorithm and stored in the InterPlanetary File System (IPFS) distributed storage system. The generated key is encrypted using Rivest-Shamir-Adleman (RSA). Metadata and operation records are stored on the blockchain to ensure data security and transparency. The system uses the Practical Byzantine Fault Tolerance (PBFT) algorithm to build a consensus mechanism to verify the authenticity of resource operation records and uses Secure Hash Algorithm 256 (SHA-256) to generate hash values to enhance data integrity. Smart contracts automatically control access authorities based on user roles and support dynamic updating of authorities. In addition, the system protects user privacy through decentralized identity authentication and zero-knowledge proof (ZKP) technology. The experimental results show that under the low load condition, the average response time of the system is low, with the average response time for borrowing operations being 158 milliseconds, for returning operations being 137 milliseconds, and for query operations being 113 milliseconds, indicating good performance. The response time increases as the load increases, but it is still within an acceptable range overall. Moreover, the system also performs well in terms of security protection capabilities. Although the protection capability is reduced under high load, this also indicates the direction for subsequent optimization.