Based on the unprecedented development of current information technology, under the prevalence of third-party payment, in order to increase the utilization rate of idle resources and meet the diversified economic needs of today’s era, as an emerging economic model-the “sharing economy”, combined with Internet big data, it has effectively realized the perfect connection between supply and demand, and it has quickly swept through all walks of life. However, while promoting economic development, the lack of regulatory measures and the imperfect credit system have severely restricted the further development of the sharing economy. Blockchain technology (BT), as a new distributed infrastructure and computing method, has always been the core technology of Bitcoin. Based on the development of generalized economic model and BT, this paper analyzes the shortcomings of generalized economic model and blockchain technology through information fusion big data and proposes a kind of information based on information fusion big data+public BT. The security management system adapts to the status quo of the sharing economy and uses the functions of information fusion big data+blockchain technology to solve the current information security risks faced by the sharing economy. The experimental results of this article show that the sharing economy information security management system based on information fusion big data+blockchain technology has good protection capabilities. The interception rate of external information reached 95%, and the interception rate of system information reached 93%. Better protection of privacy leaks is needed.

1. Introduction

1.1. Background

A new economic model, the “sharing economy,” has been gradually developed to allow people to voluntarily contribute to the productive economy based on specific projects and special circumstances. The sharing economy is a new economic growth model based on big data technology. It mainly uses cloud computing databases and Internet network technology to merge and allocate idle resources, thereby avoiding time and space constraints [1]. The sharing economy can make society lose its vitality. The greater value of resources has played an important role in the rational distribution and innovation of social resources. According to my country’s economic growth trend, the importance of economic transformation and upgrading to achieve rapid economic growth is self-evident. The distribution of the sharing economy has become an important hub for eliminating social information asymmetry and innovating economic growth models. In the data technology sharing economy model, many problems are gradually exposed, and problems such as information leakage make the integration and development of information fusion big data technology and BT urgent.

1.2. Significance

“Internet+” is a double-edged sword. Although it is easy to manage, it poses a huge security risk to public information security. If these hidden dangers cannot be eliminated in time, they will be brought to the public and the entire country [2]. With the help of Internet information security, the weaknesses of the Internet are endless. Hacking, virus intrusion, enemy surveillance, etc., will damage national defense and directly threaten national security and social stability. In the “Internet +” era, the development of large-scale data and the development of the Internet of Things are all constantly developing [3, 4]. Production and life bring not only convenience but also crisis. Service providers rely on monitored arbitration and may compromise the privacy and security of their users. By promoting the technical integration of big data and BT, the sharing economy can accelerate the process of economic globalization, reduce the operating costs of enterprises, and truly realize the overall progress of the socialist sharing economy in the new era of high information data interaction and high information security.

1.3. Innovation

The innovations of this article are as follows: (1) use information fusion big data to store and process sharing economy information, the BT privacy protection scheme using aggregate signatures, which introduces the core signature algorithm in detail, which is used to verify the legality of the transaction and the identity of the sender of the transaction. (2) The information security system of the sharing economy mainly introduces denial technology and makes full use of the autonomy of agents to improve system functions.(3) Mainly conduct information security protection through information fusion and blockchain technology to prevent hackers from intruding and improve data security.

Zaharia is working to build a hybrid intelligent system (HIS DIVNAR) based on the synergies of multiple sciences and scientific guidelines for the rapid diagnosis of potential information security intruders. Yankovskaya provides the basis for the proposed method and the construction of DIVNAR for mathematical devices. It consists of four parts. The first part is called ISDIOS and aims at quickly diagnosing human tissue pressure. The third component (DIDEV) is used to quickly diagnose and prevent anomalous behavior. Fourth, it uses cognitive techniques to make and prove decisions using the intelligent and rapid information detection system (IS DINARLOG2) of early popular content-based attacker information security. Various laws include error-tolerant unconditional diagnostics, regularity, and decision-making rules that are resistant to hybrid diagnostic tests [5]. According to a study by Ibrahim, the cloud environment is one of the fastest growing technologies in the IT industry. This is due to reliable and reliable services and the ability to access the “cloud” anytime, anywhere. Providing information security is an important issue for the cloud and ICS. Before implementing ICS in the cloud, it is very important that the ICS organization first determine the information security factors for ICS and the cloud. Failure to identify information security factors can lead to application failures and information loss. For the purposes of this investigation, it uses qualitative methods to investigate the verification of information security factors by professionals [6]. However, there are some differences in the experimental results, as there are not many factors that affect the duration of this experiment. Lee’s study argues that economic allocation was an example of a new technology-based tool to improve the efficiency of inert resources utilization. The integration of various parameters and mechanism of allocation of resources became an important tool to increase efficiency and improve service level. BT has no central control system function and can automatically execute smart contracts. BT management has become the most widely used method of economic development as BT has changed significantly to traditional trading methods and financial models. With the advent of the sharing economy model in recent years, there are still many problems in the development of Airbnb and Uber, especially the issue of customer information security, which seriously hinders the development of the sharing economy model. BT functions can solve this problem well, so BT functions facilitate the creation of a common economic model. This article is primarily about information security for customer sharing based on BT. First, we will analyze the relationship between the regional technology of the chain and the sharing economy. Next, we will discuss the security issues facing customer information in the sharing economy. Finally, several information protection strategies and suggestions are provided [7]. However, his experimental process is not over yet.

3. BT Privacy Protection Scheme Based on Aggregated Signature

3.1. The Privacy Protection Needs of BT

Due to the publicity of the BT network, data mining can be used to monitor the transaction process and extract user identity information [8, 9]. For the protection of privacy, it is necessary to address the after two considerations: (1) identity confidentiality refers to keeping the user’s true identity and information confidential, even if it is accessed in BT, only limited identity permissions can be provided [10, 11]. (2) Many BT-based applications require confidentiality of transactions, such as electronic medical record management or anonymous identity verification and big data authorization [12, 13]. The classification of common information vulnerabilities is shown in Table 1.

In order to solve this problem, the commonly used method is to shift from a network-centric to a data-centric full lifecycle protection strategy, that is, implement data classification and classification, sort out the data life cycle status, and plan corresponding data encryption, desensitization, auditing and other data protection strategies according to different data sensitivity levels and data usage status to ensure that data security is fully controllable.

3.2. Signature Core Algorithm

For example, in Bitcoin, ECDSAI04, RIPEMDI I0.161, and SHA25107.1081 are used to complete the transaction signature [14, 15]. The detailed description is shown in Figure 1.

As shown in Figure 1, a transaction consists of inputs and outputs and has . By the calculation rule of curves of ellipse, we obtain

Through equations (1) and (2), we have , we can verify , because the attacker cannot get and through and .Through the cone circle algorithm, we can get

Further, you can get

In the normal network, the sum of all input amounts is

The sum of all output amounts is

The set and are the set , a subset of . Because it is easy to get and . Through the application of the above formula, the data information of this transaction can be obtained, and the data security can be guaranteed to a certain extent.

3.3. Protection Methods of BT Transaction Privacy

BT has its own agreement and can only access the computer through the agreement. Only when the user uses the designated computer can the corresponding data information be read.

There are two main methods to protect the confidentiality of BT transactions, namely, noninteractive zero-knowledge proof (NIZK) and homomorphic cryptography [11, 16]. (1)Zero-knowledge noninteractive proof, including the prover and verifier [17]: for a sentence, the prover can create a proof to persuade the verifier to recognize the correctness of the sentence [18]. In this process, the verifier can only know that the Dao proposition is correct (possibly zero knowledge). Zero-knowledge evidence is divided into interactive and noninteractive. The zero-knowledge interactive proof requires several rounds of exchanges between proverbs and the verifier to complete the zero-knowledge noninteractive proof (NIZK) does not require an interactive process between the verifier and the verifier and is more suitable for difficult scenarios for and verification. The program is connected at the same time [19](2)Homomorphic cryptographic system: homomorphic cryptography (HC) is an encryption method that satisfies homomorphism. The arithmetic operations performed in the form of cipher text can be maintained [20]. Allows calculate encrypted currency anywhere, while protecting the privacy of digital data. Operates as a black box,when encryption sum functions are given, the encryption result of the same function will be exported to the corresponding original data. This attractive feature makes homomorphic encryption very suitable for hiding and updating transaction amounts and other metadata [21]

Zero-knowledge proof is a method by which one party can prove to the other party that they know the value without conveying any information, except that they know the value . The essence of zero-knowledge proof is that it is trivial to prove that someone has knowledge of certain information by simply revealing the information. Fully homomorphic encryption is regarded as the holy grail of information security because it can protect the privacy of data stored in the cloud or in transit.

4. Design of Information Security Management System

The information security management system involves a lot of information, and it is necessary to analyze the correlation of information to achieve the simplification of the information [11]. In addition, the system can also customize the data collection policy rules as needed to BT the desired information. The network security management system needs to realize the interaction of network security equipment through linkage modules to achieve the overall protection effect of the network. These functions require related modules based on agent technology to achieve [22]. Below, we discuss in detail the related design and implementation of the proxy module.

4.1. Application Design of Information Fusion Big Data in Information Security Management System

Information fusion big data technology was used to process information data, concentrate information, conduct risk analysis and security assessment of information, and realize information security management. The information security management process of the sharing economy based on information fusion big data is shown in Figure 2.

4.2. Agency Design

The agent is the basic detection unit of the system, which is used various safety equipment. A variety of agents can be configured on the security device to collect various required information according to needs. In the system, each agent has its own independent information source and detection mode and can independently realize the detection task. At the same time, each agent can cooperate with each other or work together under the control of the agent control center, refer to Figure 3 for detailed agent design;

4.3. Design of Agent Management Control Center

The agent management control center mainly completes the remote configuration and management of the agent, the management of the pattern library, the data association analysis from the agent, and the alarm and response functions. The agent management control center can prevent data leakage and loss through centralized management of data and ensure data security to the greatest extent. At the same time, the agent management control center system can conduct comprehensive scheduling management of data information to prevent data from being illegally analyzed and stolen. Once there is an abnormal situation of data information, the system will automatically alarm. The main modules of the agent control center are as follows: agent management and configuration module, pattern library management module, data association analysis module, linkage module, response and alarm module, and management configuration interface, refer to Figure 4 for the detailed design of the agent management control center.

4.4. Agent System Implementation

Data sources for data collection include host data sources and network data sources [23, 24]. Among them, the network data source collection part mainly records, filters, and formats the network connection information of the monitored host system, and then writes it into the log file; the data source on the host mainly includes the storage of system logs and various audit records. It mainly realizes the collection and processing of network data sources.

5. Experimental Analysis of Information Security Management System

5.1. System Reliability Analysis

For the accuracy and validity on the survey data of the questionnaire, we verified as well as analyzed and processed the experiment. Process exclusion of those data with , with the results of validation demonstrated in Table 2.

The standard error (SE) of all model observation variables below the estimated value of the non-standard model in Table 2 is greater than zero. This table shows that the results of the confirmatory analysis meet the reliability and validity requirements. This proves that the quality of the survey data is very good, and we can take the next step in processing the data.

5.2. Research Hypothesis Test Analysis

The structural equation model fits well which shows that the model is constructively reasonable and has credible results, as can be seen from Table 3. Convincing estimates of the structural equations for the study system with associated components are shown in folded Figure 5.

It is evident from Figure 5 in that the relevant parameters in the research hypothesis meet the criterion of significance. It is meaningful to construct a network information security assessment system from the perspective of personal network control, environment and technology, and the impact factor can be used as a security indicator.

As shown in Figure 6, the weight of each vulnerability and security technology is randomly assigned. In order to ensure the comparability of the experimental results, a weight map of vulnerabilities and security technologies was selected by experts.

From Figure 7, it can be found that the error rate of the information management system vulnerability is less than 2%. It is found that the larger the number of particle swarms, the lower the error. The speed of operation increases exponentially as the scale of the problem increases. It can minimize the investment cost of security technology and maximize the effect of vulnerability processing.

6. Conclusions

We analyze the application in the sharing economy information securing of information fusion big data and BT in this paper. It was found through the analysis that BT showed many similarities on the model of economy of share. BT and sharing economy are essentially P2P platforms, and public BT can physically adapt to the sharing economy model. The characteristics of decentralized and stored non-information leakage and information traceability provide an effective solution to the information security problem in the development of the exchange economy. At the same time, the agent technology is introduced to design the information security management system, and the autonomous function of the agent is fully utilized to improve the performance of the network security management system, making the system more powerful in information processing functions. The security management system that has better scalability and stability and surpasses the traditional security management system has a shortcoming, that is, insufficient information processing and response.

Data Availability

No data were used to support this study.

Conflicts of Interest

The author declares that there are no conflicts of interest regarding the publication of this article.