Article Preview
TopIntroduction
In the current era of network information, data, which contains massive important information, has become the main source for people to obtain information. Moreover, data transmission and storage are very convenient, which can help people achieve fast, effective and accurate information transmission (Mobashar et al., 2021). Furthermore, the data age will also produce many security problems. In the Internet age, data are being produced all the time, and the storage, encryption and transmission of data may be subject to malicious attacks (Liu and Ye, 2021; Liu et al., 2022; Lv et al., 2022). In addition, databases, edge devices, and cloud storage have great security risks and are vulnerable to attacks such as hackers and Trojans. Once the data is damaged and polluted, it will cause serious information loss (Mukherjee et al., 2021; Sun et al., 2022; Sheng et al., 2022). To ensure the network information security (NIS), effective security measures must be taken to store data. Encrypting data according to its security level is a very effective method (Indrakumari et al., 2021; Wang et al., 2022; Yang et al., 2022).
In addition, the identities of visitors and administrators of the data storage system must be identified. Different permissions should be given to different visitors, so that low-level managers can’t modify and encrypt data, thereby preventing data leakage and pollution and strengthening the protection of private data (He et al., 2021; Jan et al., 2021; Cao et al., 2021; Sun et al., 2021; Liu et al., 2020). In recent years, the concept of blockchain (BC) has been gradually accepted. Data storage system based on BC has a good advantage in dealing with single point of failure. However, how to build a secure and efficient network storage system based on this advantage is the main problem to be solved at present (Huang et al., 2021a; Yang et al., 2021; Yan et al., 2021; Li et al., 2022). The access of Internet of Things (IoT) adoptions on edge nodes can ensure the bidirectional identity security of the system and data sources collected by IoT, and improve the security of network storage.
The NIS and financial risks (FRs) are analyzed regarding the BC. The NIS model is established from three aspects, i.e., network control personnel, environment, and technology which affect data security, and a questionnaire is designed to propose hypotheses. At the same time, the evaluation index system of FR is established, and the risk evaluation of financial system under BC is carried out by using edge calculation and dynamic theory. The resource allocation and operation efficiency of the financial industry are optimized to ensure the sustainable development and long-term stability of the financial industry. The innovation lies in the use of edge computing (EC) to encrypt the network identity authentication system, and from the perspective of dynamics, FRs are correctly evaluated by establishing first-level evaluation indexes and calculating weight values. After BC is introduced into traditional network information system, NIS storage mode is enhanced, and FR assessment model is established, which plays a positive role in accelerating the progression of BC in the era of data, and has reference significance for the research of FR control. The research innovation point is combining BC with EC, so as to improve the performance of the system and effectively address the issue of financial security.