Abstract

In recent years, the rapid development of e-commerce and mobile communications has ushered in a new era in the era of big data and has also given birth to emerging industries such as big data. People are paying more and more attention to data, and all walks of life are trying to analyze data and make use of the potential value of data. Business organizations use big data analysis to reduce business costs, plan real-time traffic routes for thousands of express vehicles to avoid congestion, and use click stream analysis and data mining to avoid fraud. This article combines big data with e-commerce security, deeply studies the composition of e-commerce security system and key security strategies and technologies, and discusses some problems in the combined application of blockchain and electronic settlement. The birth of big data technology can solve the contradictions in today’s e-commerce security, introduce the popular and widely distributed Apache Hadoop platform, deeply study the structure of Hadoop, and focus on the data analysis and processing method products of the second generation of Hadoop YARN. It is recommended to start with data, manage, and monitor e-commerce behaviors and improve the e-commerce security system. Finally, many important aspects that need to be considered in the big data e-commerce security system will be discussed. The analysis results show that the credential management and control system based on blockchain technology proposed in this paper can resist most frauds and realize the safe storage of transaction data and cannot be tampered with. Experiments have proved that the types of vulnerabilities and defects show that improper input is the main reason; the system error rate is mainly concentrated at 0.50%, and all the data indicate that the application of big data blockchain in electronic settlement provides great value, and the security of the electronic economy has increased by at least 60%.

1. Introduction

The rapid development of electronic network technology has enabled international trade to move towards efficient, safe, and low-cost online operations in the past two years. After more than 5 years of preparations, a BOLERO network that is based on the Internet and supports all parties involved in the international trade process to transmit and exchange electronic documents and data has been established and started to operate. It not only solves the problem of inconvenience for the consignee to pick up the goods because the traditional bill of lading arrives at the port of destination later than the ship but also has certain transaction security, so it has broad application prospects [1, 2]. The development of society, the progress of the times, and the innovation of Internet technology have completely changed the traditional forms of trade and promoted the rapid development of most industries including e-commerce, modern logistics, and electronic payment. Today, when cross-border e-commerce is gaining momentum, e-payment not only constitutes the core link of e-commerce but also attracts important industries at all levels of transactions and trade with its convenience and security. In recent years, the development of electronic payment models has entered a bottleneck state, which includes multiple issues such as payment methods, information transmission, and information credibility. In the current Internet and information technology era, if there is no electronic payment, e-commerce will not achieve further rapid development, and the development of modern cross-border e-commerce has put forward higher demands for the development of electronic payment. It can not only save space and time cost but also ensure the authenticity of payment information, strengthen the security of payment information, and increase the means of transmission of trade information, which will all become problems that need to be solved urgently in the development of electronic payment models [3].

From the perspective of historical development, it is critical to first explain the development model of the electronic economy. The electronic application of business documents began in the 1960s, but people used telegrams to send business documents for business activities. Later, as technology progressed, the invention of the facsimile machine replaced the telegraph. With the maturity of computer technology, in the 1980s and 1990s, the development and application of information systems can already be processed electronically. This is the early EDI (Electronic Data Interchange) and the early interenterprise e-commerce. The real application of modern electronic payment is based on the emergence and development of Internet technology after the 1990s. In the beginning, the role of the Internet was limited to browsing goods, and it did not constitute a real electronic payment method. With the further development of financial enterprises and Internet information networks, electronic checks, electronic money, and electronic banks have gradually formed application technology models. This laid the technical foundation for the modern electronic payment model and truly realized the integration and practical application of online transactions and offline delivery. This has led to the gradual development of e-finance and corporate payment models such as online banking, gateway payment, and third-party payment. As a result, the blockchain electronic economy has also obtained a huge development, and the security liquidation and other issues derived from it have been solved with the abovementioned tracing back to the source [4, 5].

Jin Yong believed that in the era of big data, the exchange of big data can effectively solve the phenomenon of “data island,” data resources can also be effectively integrated, and decentralization, transparency, autonomy, anonymity, and information cannot be changed. The other natural characteristics of the company can promote the secure exchange of big data. In addition, a large amount of government data has huge economic and social value, and the safe disclosure of large government data is essential for transforming the government and changing social demand patterns. However, big data algorithms need continuous improvement to keep up with the society [6]. In the era of big data, data exchange has become more and more convenient, but there are more and more security problems caused by unnecessary data mining. Especially large-scale medical data usually involve privacy, and the leakage of these data can cause great harm to individuals and countries. Therefore, improving the security of medical data storage and communication has become a very important issue. Based on blockchain technology, the author analyzed the three levels of technology, system, and law, discussed the application of blockchain technology in medical data management, and proposed his own solutions. However, this solution has no actual experimental support, and a large number of experiments should be carried out to prove the feasibility of the solution [7]. Wang Jingwei believed that in the Internet era, large amounts of data are created every day, and complex issues such as privacy and ownership will arise during data exchange. Blockchain is a decentralized distributed data storage technology introduced in the blockchain field. The data market can eliminate these drawbacks, but at the same time, the distributed data market also brings security and privacy issues. The industry status and market research progress of mass data exchange at home and abroad have been investigated. It is necessary to meet the type of transportation platform and conduct mass data exchange based on blockchain. However, there are problems with the algorithm, errors will occur, and continuous improvement is needed [8]. Blockchain is a new application mode of computer technology such as distributed data storage, point-to-point transmission, consensus mechanism, and encryption algorithm. If the blockchain is used as a state machine, each transaction is an attempt to change the state, and the block generated by each consensus is the participant’s confirmation of the result of the state change caused by all transactions in the block.

By building an electronic invoice cloud platform based on blockchain technology, it can make full use of blockchain decentralization, consent algorithms, and distributed emission functions. This will help alleviate the pain of the electronic invoice ecology. First, the decentralized function of blockchain technology is used to perform distributed blockchain-based storage, and it is ensured that all nodes become reliable data streams after being calculated by the encryption algorithm. The public ledger jointly solves the problems of duplicate rewards, duplicate electronic invoices, and data inconsistencies. Third, electronic invoices include issuers, recipients, and consumers. The proliferation of distributed blockchain networks is used to avoid inconsistencies in electronic invoice data, avoid data leakage, and improve data accuracy and efficiency. Based on the research of electronic invoices, cloud computing, and blockchain, this article proposes a feasible plan for constructing a blockchain-based electronic invoice cloud platform, describes the application process of the platform in detail, and then discusses the possible occurrences. The main issues have been explained systematically, hoping to provide new ideas for the comprehensive promotion of electronic invoices in our country.

2. Development Method of Big Data Security Sharing System

2.1. Blockchain Cloud Platform Construction

Strictly speaking, big data is not a new technology. However, there are endless methods to study big data, and it is not a new product because big data has always existed, but today it has a larger volume and is more likely to attract our attention. In fact, big data is a new kind of thinking and new understanding, and it is a stage that must go through between quantitative changes and qualitative changes. This subject aims to study the composition strategy of the current e-commerce security system, including the security technologies used in the four-layer structure: firewall technology, antivirus technology, VPN technology, NIDS system, encryption technology, encryption algorithm, security authentication, and data security protocol. Check the security threats faced by e-commerce, understand the widely used security measures, and look for the existing problems [9, 10]. The blockchain asymmetric encryption mechanism is shown in Figure 1.

As more and more applications become service-oriented, the functions provided by these applications can be used by new applications. Although these applications mainly provide services for end users, it also makes them part of the application platform. The cloud platform is composed of cloud servers equipped with cloud platform server-side software, cloud computers equipped with cloud platform client software, and network components. It is used to improve the overall performance of low-configuration or old computers to achieve current popularity speed. Taking the characteristics of data in the era of big data as the starting point and according to the core value of data in the era of big data, a hierarchical analysis of the e-commerce security system is carried out in a big data way of thinking. At the same time, it will focus on big data analysis and distributed frameworks such as HADOOP and understand its workflow and parallel processing principles and operating principles of MapReduce, HDFS, HBASE, and other subprojects. The algorithms and application practices of big data processing are researched, the unstructured data processing flow is mastered, the application of typical natural language processing methods in the e-commerce security strategy is found, and the abnormal behavior in the e-commerce environment is dealt with. Resources are integrated and analyzed in a distributed manner, trying to find a safe and stable state of e-commerce data, and design a security defense model for the e-commerce early warning system [11, 12], as shown in Figure 2.

2.2. Concept and Structure of Blockchain
(1)The version number indicates the version information of the relevant protocol in the blockchain.(2)The Hash Value of the Previous Block. In each block, the hash value of the previous block is marked. The block is connected end to end through this value to form a block chain, which ensures that the transaction time is recorded in the block, become irreversible, and form the security of the blockchain [13, 14].(3)Timestamp can accurately mark the time when the block is generated in the block, ensuring the uniqueness of the block [15].(4)Nonce is randomly generated by the system, that is, the answer to the math problem in the block that will be confirmed by the entire network. In essence, the random number mechanism is essential to ensure the decentralization of the blockchain because once the random number is manipulated or predicted, malicious nodes can use this to control the block and achieve double-spending attacks [16, 17].(5)The Merkle root is the hash value of all transactions recorded in the main body of a block, which is calculated through two-by-two hash calculation. Therefore, the Merkle root is a data structure that can effectively summarize all transactions in a block and is used to index and organize all transaction information in the block [18, 19]. The BcRCACDAM system architecture is shown in Figure 3.

For e-commerce, network security is one of the basic links. Therefore, in order for e-commerce to proceed smoothly, the e-commerce platform must be safe and reliable first, and the services provided must not be interrupted. According to the relevant national standards, when e-commerce is running, actual funding status and information security, the relevant requirements of scientific physical security should be formulated, and then relevant constructions should be adopted to meet the standards. The integrity, confidentiality, and authenticity of e-commerce must be realized; the system’s security vulnerabilities should be resolved as soon as possible; through security reinforcement, further use safety technology to protect the equipment, so that the system’s security protection capabilities can be strengthened.

3. Relevance Experiment of Big Data Research Platform

3.1. MapReduce Method

MapReduce is a data processing method that uses map and reduce as the main data processing methods. Programmers do not need to understand distributed systems, and they can also use their own programs to perform calculations through distributed systems. When MapReduce is executed, the aap function is first written, and the input key-value pairs are combined into new key-value pairs through various mapping methods. After processing, they are handed over to reduce. Sort out the data with the same characteristic value, then integrate the data according to a certain algorithm, and finally get the output value [20, 21].

The logical expression is as follows:

3.2. MapReduce Framework

The MapReduce framework consists of a single main task server and workstations on cluster nodes. The main task server distributes tasks to each workstation and monitors their execution [22, 23]. If it is found that the node is faulty, it is necessary to re-execute the failed task and redesignate a new available node for task assignment through the set backup task data [24, 25].

It can be seen that when Bn = 1, since D > Df, then T1 < T2, the block time is greater than the nonblock time. When , it has to be divided into blocks.

For the block size setting, the algorithm idea compared with the grouping factor {} is adopted. The specific algorithm is as follows [26, 27]:

The subject of data ownership refers to the individual or organization that owns the data files and copies, represented by the symbol S; the object of data ownership refers to the data files and copies, represented by the symbol C [28, 29]. Then, according to the characteristics of the subject’s access control to the ownership of the object, the object can be further divided into two parts:

According to the above definition and division, the following definitions and rules of data ownership can be obtained [30, 31]:

Then, t’s operation on copy c1 does not change s’ ownership of its object c1 [32, 33]. Therefore, the data sharing security model can be described as follows:

Least squares is used to determine and calculate the similarity of the sorting sequence and then calculate the difference between the number of characters in the two sorting sequences and then square. The similarity threshold b is an important parameter used to compare the similarity of the watermark with the selected threshold, which has a certain effect [34, 35].

The nodes in the consensus set R1 participate in the consensus algorithm. Assuming that the maximum number of Byzantine nodes that can be tolerated in R1 is f, then the size of the set R1 satisfies the formula as follows:

Candidate set R2 serves as a buffer to receive new nodes added to the system and Byzantine nodes eliminated from the algorithm and provides active nodes for the consensus set. Without loss of generality, we make

The p value sorted out is as follows:

A consensus proposal is broadcasted for a block to other consensus nodes:

A newly elected representative node sends a synchronization request to the nodes of the consensus set as follows:

The nodes in the consensus set reply to the representative node with a synchronization message as follows:

Node R1 broadcasts a view switching request to other nodes:

4. Electronic Economy Analysis Based on Blockchain

4.1. Leader Node Configuration Analysis

After a follower is successfully elected as the leader node, this role state does not last forever. When the following two situations are encountered, the leader will be replaced: the leader node sends outages such as failures due to network problems and so on. When it can no longer send data to other nodes, it needs to re-elect a new leader; after the leader completes the storage task of the quantitative block, even if there is no failure in the machine, he must return to the role of follower and give up the leadership. One verification node serves as the leader. The node configuration is shown in Table 1.

The client submits data information, such as creating credentials, to the verification node cluster within a specified time such as creating a voucher. As the transaction volume increases, blocks are continuously generated, verified, and stored. The process here guarantees the stability of the algorithm and subsequently provides a template for the International Settlement System process. This basically means one connection and two, and both of them have figured out. Through setting up experimental verification, the results show that the consensus algorithm based on the Raft algorithm proposed in this paper can realize the storage process of transaction data, such as block generation, verification, and leader node replacement, as shown in Table 2.

4.2. Leader Node Security Algorithm and International Settlement Analysis

Due to the consensus algorithm proposed in this article, Raft’s leader mechanism is improved. International settlement is also called “international settlement.” Through international currency receipts and payments, the claims and debts that occurred between countries due to economic, political, and cultural exchanges were settled. This is closely related to the development of the electronic economy, and the security algorithm can directly reflect the methods of international settlement. The leader role is assumed by all verification nodes in turn. After a leader node completes the storage task, it directly transfers the leadership to the next node. Because there is no election process for leader switching at this time, only data transmission occurs between the leader and the next leader node, and all network overheads are low. The abscissa represents the number of verification nodes, and the ordinate represents the number of verification nodes participating in the leader switching process, as shown in Figure 4.

When the consensus mechanism is running between the verification nodes, a single verification node is tested, and its CPU usage is shown in Figure 4. It can be seen from the figure that the CPU usage of the consensus mechanism for stable operation is less than 50%. The computing power overhead is not high, which meets the performance requirements of the voucher management and control system. It can be proved that the efficiency of international settlement has also been guaranteed. The leader re-election process is shown in Figure 5.

As shown in Figure 5, even if the leader does not experience downtime and other failures, he cannot continue to serve as the leader after completing the block storage task. In the blockchain consensus mechanism based on the Raft algorithm designed in this paper, the verification node clusters jointly participate in the accounting process and take turns owning the accounting rights. From the initial successful election as the leader, the number of blocks stored under the leader’s leadership is recorded. When the number of blocks reaches 10,000, the leader node status changes to a follower, and the leadership is delivered to the next verification node. This can prevent a single node from controlling the accounting rights of the ledger and at the same time reduce the number of leader elections and reduce the overhead of the system.

The comparison of the proportion of non-Byzantine nodes between EDA-PBFT and PBFT is shown in Table 3.

Table 4 shows the calculation overhead comparison of BcRCACDAM cross-domain authentication protocol.

BcBICDAM protocol calculation overhead comparison is shown in Table 5.

Major foreign security vulnerability database is shown in Table 6.

Data statistics of major security vulnerability databases at home and abroad are shown in Table 7.

The data volume view of the vulnerability database involved in the system is shown in Figure 6.

Vulnerability and defect type statistics are shown in Figure 7.

The system error rate is shown in Figure 8.

5. Conclusion

On the basis of summarizing the research status at home and abroad, combining with the origin of the development of electronic economy, this paper puts forward the connotation and definition of supply chain finance, summarizes the classification form of supply chain finance, and sorts out the differentiated development of supply chain finance in different historical stages. And it further analyzes the content, motivation, and degree of sharing of the data. Through analysis of security algorithms, international settlement is included. Based on the electronic economy, online settlement methods are also clearer. Experiments have shown that the security of the electronic economy has increased by at least 60%. In the same way, the efficiency of international settlements has also improved accordingly. Finally, this article uses company D as a case to introduce the strategy, organizational structure, specific operations, risk prevention, and results achieved by company D in developing supply chain finance based on data sharing. The shortcomings of this article are as follows. Due to the limited time, some modules of the system need to be further improved, such as the user key management module. Currently, verification nodes cannot enter the network freely. On the basis of completing the basic functions, performance considerations are insufficient. The system implementation of the voucher management and control system is given, and the safety and effectiveness of the system are evaluated. Evaluation shows that the management and control system can resist most frauds and ensure the security of transaction data. Further research work in the future is as follows: improving various modules of the system, such as user key management and other modules. The peer-to-peer network module needs further research and optimization. On the basis of completing system functions, further performance indicators are improved such as CPU usage, and a more comprehensive experimental process is designed.

Data Availability

No data were used to support this study.

Conflicts of Interest

The authors declare that there are no conflicts of interest in this study.