Welcome to Francis Academic Press

Academic Journal of Computing & Information Science, 2025, 8(8); doi: 10.25236/AJCIS.2025.080803.

Implementation of Blockchain Technology in Computer Network Information Security

Author(s)

An Yang

Corresponding Author:
An Yang
Affiliation(s)

Information & Network Center, Beijing Information Science & Technology University, Beijing, China

Abstract

In today’s highly interconnected digital environment, computer network information security faces multiple threats such as data breaches, identity forgery, and malicious attacks. As a decentralized and tamper-proof distributed ledger system, blockchain technology provides a new technical path for data security through its core features of cryptographic algorithms and consensus mechanisms. This technology can ensure the integrity of information during data transmission and storage, effectively enhance the overall credibility of network systems, and inject new vitality into the information security protection system. Based on this, this paper explores the implementation of blockchain technology in computer network information security.

Keywords

Blockchain Technology; Computer; Network Information Security; Implementation

Cite This Paper

An Yang. Implementation of Blockchain Technology in Computer Network Information Security. Academic Journal of Computing & Information Science (2025), Vol. 8, Issue 8: 15-19. https://doi.org/10.25236/AJCIS.2025.080803.

References

[1] Fang Xiang. Protection of Computer Network Information Security in Power Systems [J]. Network Security and Informatization, 2024, (11): 137-139.

[2] Wei Min. Research on Computer Network Information Security Protection Models Based on Artificial Intelligence [J]. Information Recording Materials, 2024, 25(11): 130-132.

[3] Gan Jianfang. Research on Computer Network Information Security Protection Based on Big Data Technology [J]. Information & Computer (Theoretical Edition), 2024, 36(20): 200-202.

[4] Shen Wenxu, Cui Mingliang, Xu Qingshu. Analysis of Network Information Security Protection Measures Based on Virtual Network Technology [J]. Computer Knowledge and Technology, 2024, 20(30): 82-84.

[5] Dong Hongmeng. Application and Protection Strategies of Data Encryption Technology in Computer Network Information Security [J]. Papermaking Equipment and Materials, 2024, 53(10): 130-132.