{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T03:42:51Z","timestamp":1743133371675,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":21,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789813349216"},{"type":"electronic","value":"9789813349223"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2021,1,19]],"date-time":"2021-01-19T00:00:00Z","timestamp":1611014400000},"content-version":"vor","delay-in-days":384,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Building a national unified ISEMS (industrial internet security emergency management system) plays an important role in industrial cybersecurity defense. However, due to technical and management constraints, the current ISEMS has problems such as scattered security organizations, poor sharing channels, and fails to form an overall security guarantee capability for threat reporting, analyzing, warning, and disposing. The blockchain technology has the characters of decentralized trust construction, inter-organizational data sharing, data integrity assurance, data traceability, which just meets the requirements of the emergency management process. This paper analyzes the situation and challenges of ISEMS, describes the system architecture and organizational structure based on the blockchain, and describes the key implementation processes of blockchain-based ISEMS, including threat report, risk analysis, warning release and emergency response.<\/jats:p>","DOI":"10.1007\/978-981-33-4922-3_6","type":"book-chapter","created":{"date-parts":[[2021,1,18]],"date-time":"2021-01-18T11:21:04Z","timestamp":1610968864000},"page":"71-85","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Research on Industrial Internet Security Emergency Management Framework Based on Blockchain: Take China as an Example"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7391-9697","authenticated-orcid":false,"given":"Haibo","family":"Huang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5948-5362","authenticated-orcid":false,"given":"Yuxi","family":"Gao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8832-2009","authenticated-orcid":false,"given":"Min","family":"Yan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4867-6352","authenticated-orcid":false,"given":"Xiaofan","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,19]]},"reference":[{"key":"6_CR1","unstructured":"China blockchain technology and Industry Development Forum. White paper on China blockchain technology and application development. Department of information technology and software services, Ministry of industry and information technology (2016)"},{"key":"6_CR2","unstructured":"Zhang, Z., Sun, B., Li, B.: The US cybersecurity emergency management system and its enlightenment. Intell. J. (3), 94\u201398105 (2018)"},{"key":"6_CR3","unstructured":"Liu, F.: Cybersecurity situation awareness and emergency response platform solutions. Inf. Technol. Stand. 405(09), 18\u201320 (2018)"},{"key":"6_CR4","unstructured":"Zhao, X., Wen, J.: Research on provincial cybersecurity emergency management platform based on security access design. Laboratory Research and Exploration, vol. 37, no. 268 (06), pp. 300\u2013303 (2018)"},{"key":"6_CR5","unstructured":"Li, R., Jia, R.: Research on cybersecurity emergency response system. Network Security Technology and Application, p. 2 (2019)"},{"key":"6_CR6","unstructured":"Zhang, X., Xiao, Y.: Overview of the construction of cyberspace situational awareness, early warning and protection system in the United States and Its Enlightenment to China. Confidential Science and Technology, no. 67(04), pp. 22\u201328 (2016)"},{"key":"6_CR7","unstructured":"Wu, H.: Research on the information sharing mechanism of Chinese government in the era of big data (2017)"},{"key":"6_CR8","unstructured":"Kang, K.: Analysis of isolated information island in the field of e-government (2016)"},{"key":"6_CR9","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1016\/j.jnca.2019.01.012","volume":"132","author":"G Abhishek","year":"2019","unstructured":"Abhishek, G., Alagan, A., Glaucio, C.: Prevailing and emerging cyber threats and security practices in IoT-Enabled smart grids: a survey. J. Netw. Comput. Appl. 132, 118\u2013148 (2019)","journal-title":"J. Netw. Comput. Appl."},{"key":"6_CR10","unstructured":"Shi, Y.: Research on security defense technology of IT\/OT integration in industrial internet environment. Inf. Technol. Netw. Secur. 38(7), 1\u20135 (2019)"},{"key":"6_CR11","unstructured":"Zhou, P., Tang, X., Li, B.: Research Report on China\u2019s blockchain technology and application development. China blockchain technology and Industry Development Forum (2018)"},{"key":"6_CR12","unstructured":"Yang, L., Zhang, C., Wang, F.: Overview of blockchain technology research and application. Contemp. Econ. 4, 126\u2013128 (2018)"},{"key":"6_CR13","unstructured":"Zhang, S., Yang, Y.: Block chain technology foundation and application. Inf. Secur. Res. 4 33(06), 89\u201394 (2018)"},{"key":"6_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-17016-9_1","volume-title":"Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance","author":"J Herrera-Joancomart\u00ed","year":"2015","unstructured":"Herrera-Joancomart\u00ed, J.: Research and challenges on bitcoin anonymity. In: Garcia-Alfaro, J., et al. (eds.) DPM\/QASA\/SETOP -2014. LNCS, vol. 8872, pp. 3\u201316. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-17016-9_1"},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Saxena, A., Misra, J., Dhar, A.: Increasing Anonymity in Bitcoin (2014)","DOI":"10.1007\/978-3-662-44774-1_9"},{"key":"6_CR16","doi-asserted-by":"crossref","unstructured":"Kishigami, J., Fujimura, S., Watanabe, H., et al.: The blockchain-based digital content distribution system. In: 2015 IEEE Fifth International Conference on Big Data and Cloud Computing (BDCloud). IEEE (2015)","DOI":"10.1109\/BDCloud.2015.60"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Paul, G., Sarkar, P., Mukherjee, S.: Towards a more democratic mining in bitcoins. In: International Conference on Information Systems Security (2014)","DOI":"10.1007\/978-3-319-13841-1_11"},{"key":"6_CR18","unstructured":"Mougayar, W.: Why Fragmentation Threatens the Promise of Blockchain Identity (2016). https:\/\/www.coindesk.com\/fragment-blockchain-identity-market"},{"key":"6_CR19","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1016\/j.future.2019.05.023","volume":"100","author":"M Sana","year":"2019","unstructured":"Sana, M., Ahmad, K., Zanab, S.: Securing IoTs in distributed blockchain: analysis, requirements and open issues. Future Gener. Comput. Syst. 100, 325\u2013343 (2019)","journal-title":"Future Gener. Comput. Syst."},{"key":"6_CR20","doi-asserted-by":"publisher","first-page":"100107","DOI":"10.1016\/j.iot.2019.100107","volume":"8","author":"KM Bhabendu","year":"2019","unstructured":"Bhabendu, K.M., Debasish, J., Soumyashree, S.P.: Blockchain technology: a survey on applications and security privacy challenges. Internet Things 8, 100107 (2019)","journal-title":"Internet Things"},{"key":"6_CR21","doi-asserted-by":"publisher","first-page":"1122","DOI":"10.1016\/j.future.2019.07.037","volume":"101","author":"J Chen","year":"2019","unstructured":"Chen, J., Lv, Z., Song, H.: Design of personnel big data management system based on blockchain. Future Gener. Comput. Syst. 101, 1122\u20131129 (2019)","journal-title":"Future Gener. Comput. Syst."}],"container-title":["Communications in Computer and Information Science","Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-33-4922-3_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,18]],"date-time":"2021-01-18T11:26:28Z","timestamp":1610969188000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-33-4922-3_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9789813349216","9789813349223"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-981-33-4922-3_6","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"19 January 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CNCERT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China Cyber Security Annual Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Beijing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 August 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 August 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cncert2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/conf.cert.org.cn","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}