Research on Cross-platform Data Interaction and Information Fusion Mechanism of Public Security Intelligence for National Security
Publié en ligne: 17 mars 2025
Reçu: 22 oct. 2024
Accepté: 02 févr. 2025
DOI: https://doi.org/10.2478/amns-2025-0309
Mots clés
© 2025 Haohang Ye et al., published by Sciendo
This work is licensed under the Creative Commons Attribution 4.0 International License.
Public security intelligence work has always been an important part of public security work. In the early days, intelligence work was dominated by human intelligence activities. With the advancement of public security informatization construction and the deepening of public security organs to implement intelligence-led policing strategy, and vigorously promote the construction of public security intelligence system, public security intelligence work has entered into a period of comprehensive development [1-4]. The development and utilization of various information resources, from which to discover effective intelligence, has become the central task of the current public security intelligence work, the formation of a new public security intelligence work mode - information resources development model [5-7].
This working mode not only conforms to the development trend of public security informatization, promotes the high-end development of public security informatization construction, realizes the close integration of public security intelligence work and public security informatization construction, but also contributes to the development and innovation of public security intelligence work [8-11]. However, due to the public security organs of information resources acquisition, integration and other aspects of the existence of a number of drawbacks and problems, and constraints on the development of this mode of intelligence work. First, too much reliance on the source of information collection, resulting in grass-roots police information collection workload [12-15]. Secondly, information processing and integration face many difficulties. Third, the timeliness of information resources is difficult to be guaranteed. For cross-police, cross-departmental business collaboration, the establishment of public security service platform, based on the public security comprehensive resource base to achieve the public security internal and external data exchange and standardization of service interfaces, to provide cross-police business collaboration, data sharing services is an important direction of development of public security intelligence in the information age [16-19].
In this paper, a cross-platform data interaction method based on a relay chain is proposed, which can meet the requirements of massive data flow and ensure the security and global consistency of cross-platform data transmission.Furthermore, this paper proposes a cross-chain security constraint algorithm.Next, the problem of parallel processing of intelligence distribution based on an information grid is studied, a hierarchical scheduling method is proposed, and the parallel processing flow of information fusion based on an information grid is designed. The article conducts performance tests on the data interaction and information fusion methods proposed in this paper, tests the data security after applying the methods proposed in this paper, and further evaluates the application effect of the cross-platform data interaction and information fusion mechanism proposed in this paper for national security public security intelligence.
With regard to the national security concept, the current literature mainly interprets the national security concept in terms of its background, historical evolution and theoretical connotations in the light of the situation of counter-terrorism and terrorism prevention, the soundness of the legal system, the reform of intelligence work and other specific areas. To summarize, the national security concept talks a lot about the concern for non-traditional security, which fully demonstrates that the new national security concept is inclusive and absorbing of the current security situation and security challenges, and that it is a foundational security theory in line with the development of the times, which determines China’s security governance model. The exploration of the relationship between intelligence work and national security is a gradual process: intelligence work is an important means of maintaining national security, and with the changes in the social situation, the legal status of intelligence work should be improved and intelligence work should be integrated into the national security system. Then proposed to do a good job of maintaining non-traditional security, the key is to establish a sound intelligence early warning mechanism. And then studied the relationship between intelligence work and non-traditional security, and proposed that intelligence work can be used to maintain non-traditional security deficiencies. Nowadays, under the guidance of the new national security concept, more and more researches are centered on the intrinsic requirements of the new national security concept on intelligence work and how to make changes in intelligence work.
This paper aims to design a cross-platform data interaction and information fusion mechanism for public security intelligence. Before the application chain executes the cross-platform protocol, it needs to register relevant information on the relay chain. This is the premise and prerequisite for initiating cross-platform public security intelligence. The registered information mainly consists of two parts: the information about the application chain itself and the information about the smart contract deployed on the application chain, which is related to cross-platform. These messages are also transmitted to and recorded by the relay chain in json format [20]. The specification for the application chain registration message is shown in Table 1.
Application chain registration message specification
| Parameter | Remark |
|---|---|
| App ChainID | Application chain id |
| Type | Application chain type |
| Certificate | The letter of the endorsement node is the letter of the letter |
| CBP | The CBP contract address deployed on the application chain |
| Extra | Other information |
In the above parameters, AppChainID is the unique identifier and primary key of the application chain on the relay chain, Type parameter identifies the type of the application chain, Certificate indicates the information of the endorsing node, CBP identifies the address of the CBP contract deployed on the application chain. The registration message also retains Extra for further expansion.
The message specification of the smart contract is shown in Table 2. AppChainID is the ID of the application chain where the smart contract is located, and ChaincodelD is the ID of the smart contract, which is the primary key of the smart contract.
Intelligent contract registration message specification
| Parameter | Remark |
|---|---|
| Appchainid | Application Chain Id |
| Chaincodeld | Service Id |
| Type | Service Type |
| Policy | <Privacy Type>:<Chainld+Chaincodeld> |
| Extra | Other Information |
The cross-chain transaction information structure is shown in Figure 1. Firstly, the initiating chain initiates the public security intelligence cross-platform tx1 and submits it to the relay chain. The relay chain verifies whether the transaction is legal, i.e., whether it has been agreed on the initiating chain and recorded into the world state.

Information structure
Description of protocol-related parameters
The protocol is divided into five phases: communication request phase, relay chain response phase, key generation phase, session key generation phase and data transmission phase. Among them, the communication request phase is the data transmission request initiated by the application chain to the relay chain. The relay chain response phase is when the relay link receives the request and prepares the relevant parameters for generation [21].
Communication request phase.
The application chain sends a link establishment request to the relay chain, which contains the ID information Appchain_ID registered on the relay chain in the early stage of the application chain, the certificate CertificateAC returned to the application chain by the relay chain, a random number Random_AC generated by the client of the application chain, and the unique identifier Session ID of this session. The phase of communication requests is shown in Figure 2.
Communication request stage
The relay chain response phase is shown in Figure 3.
Relay chain response phase
After the relay links to the application chain request, it first checks the legitimacy of the application chain certificate. After confirming its legitimacy, a random number is generated
The public-private key pair 〈
The key generation phase is shown in Fig. 4.
Key generation
The application chain generates a pre-master key
Calculate the elliptic curve point
Calculate the following elliptic curve points and convert the data types of
Calculate
The final output is the ciphertext:
When encryption is complete, the message is encapsulated as an ACKey Exchange and sent to the relay chain. At the same time, a Change Cipher Spec message is sent to inform the relay chain that subsequent communications are carried out using session key encryption.
The session key generation phase is shown in Fig. 5.
Session key generation
The application chain and the relay chain use the random numbers generated in the previous stage and the pre-master key to generate the session key, respectively. The relay chain needs to decrypt the received ciphertext
Take out bit string
Calculate point [
Calculate
Take bit string
Verify the integrity of the plaintext by checking whether
Data transfer phase
The application chain encrypts the file using the session key and then transmits the file to the relay chain, which transmits it to the IPFS system and records the encrypted file digest on the relay chain via
This mechanism allows each application chain to set its own visibility policy, i.e., which of its own data is allowed to be queried, forwarded, and saved by Public Security Intelligence across platforms on the relay chain. At the same time, there is a clear order of priority for visibility between different blockchain application systems [22]. The source owner of a file refers to the blockchain system from which the file originally originated, which should have the highest privilege over the blockchain’s sharing policy. The source owner of the file should not lose control of the file when it is forwarded to other blockchain systems. The data transfer phase is shown in Figure 6.

Data transmission phase
Privacy Leakage due to Visibility Policy Conflict As shown in Figure 7, blockchain system

Privacy leaks caused by visible policy conflicts
The public security intelligence processing task scheduling based on the information grid is shown in Figure 8.

Task scheduling based on the information grid
The complexity of the scheduling mechanism mainly includes: the time complexity of the scheduling algorithm and the communication overhead in parallel computation, effective scheduling of the tasks executed on the grid and the communication between the tasks is the key for the whole scheduling mechanism to meet the performance requirements, in this paper, we mainly take into account the above factors, and design a multi-platform collaborative task scheduling algorithm based on the improved Back-filling algorithm.
Step 1 A platform
Step 2 The task scheduler
Step 3 When
a. Task processing delay
Step 4 If
Step 5 If the processing delay does not meet the requirement, and the public security intelligence platform still has free resources to meet the resource requirement, the processing nodes in the set
Step 6 shifts to step 7 for cross-platform scheduling for task slices that cannot be processed because there are no free resources on this platform to meet the resource requirements.
Step 7 makes a resource request to the higher-level task scheduler (global scheduler). The global scheduler looks up the set of resource sets from each platform in the resource database that satisfy the resource demand
Step 8 calculates whether the information processing delay of the public security intelligence cross-platform meets the information processing requirements, and the information processing delay of the public security intelligence cross-platform is
The communication delay
Step 9 maps the processing node that satisfies the processing delay to the task slice, and sends the task slice to the processing node for processing, otherwise turn to step 10.
Step 10 If the processing delay does not meet the requirements, remove the processing nodes that have formed a mapping in the set
The overall process of data fusion parallel processing for rasterization is divided into the following steps: a. Judge the amount of fusion processing jobs and form the set of node resources participating in the fusion processing. b. Derive the fusion processing application on the raster node according to the specified configuration. c. Register the fusion processing tasks after the application process is started. d. Perform the initialization of the user application. e. Gather the node machine names of all the other fusion process nodes and the related resource information. f. Judge the node type of this process according to the discriminating rules, in terms of processing node allocation, there is only one master node, several primary fusion slave nodes, and one secondary fusion slave node.g. According to the node type, sub-tasks of this fusion process are derived. The sub-tasks on the master node are: intelligence network reception task, information source target management task, intelligence division task, parallel computing scheduling, and work status display task, and the sub-tasks on the fusion slave node are: intelligence network reception task, information source target management task, and data fusion processing task. h. Enter into a message event processing loop, and terminate the sub-tasks that this fusion process has derived subtasks. The subtasks release occupied system resources and other cleanup work before termination.i. End the operation of the data fusion processor.
In order to test the application performance of the design platform in realizing the cross-platform information interaction and sharing of public security intelligence, simulation tests are carried out, the time interval of the feature collection of the cross-platform information of public security intelligence is 100 s, the length of the big data distribution is 2000, the size of the feature training set of the cross-platform information of public security intelligence is 500, and the width of the code element of the intelligent scheduling of the cross-platform information of public security intelligence is 0.12 ms. According to the above-mentioned simulation parameter settings, simulation experiments are carried out. The public security intelligence data interaction results are shown in Figure 9. From the figure, it can be seen that the method presented in this paper for cross-platform data interaction in public security intelligence is more effective.

Public security information mining results
The comparison of real-time and recall of cross-platform data interaction for public security intelligence is shown in Figure 10. The real-time and information recall capabilities of various methods for public security intelligence information interaction and sharing are tested, and comparison results are obtained. From the figure, the average information recall of the data interaction method proposed in this paper is 9.11%, while the recall of the other two reference methods (OpenMP and MPI) is 5.74% and 3.12%, respectively. Therefore, the cross-platform data interaction for public security intelligence proposed in this paper can accurately realize the adaptive scheduling of cross-platform data for public security intelligence, with higher information recall and better checking accuracy.

Real-time and recall contrast
The accuracy of information fusion under other variable loads is shown in Fig. 11. The figure shows the statistical graph of training the model with other loads and testing it with another load.The analysis of the experimental results shows that the average accuracy of the fusion method proposed in this paper is 0.9842.The fusion method still has a high accuracy rate under a large number of experiments with variable loads, which verifies the validity and feasibility of the fusion method that is also applicable in the case of variable loads.

The accuracy of the fusion algorithm under other variable loads
The security comparison is shown in Table 3. The table shows the security comparison between the data interaction and information fusion mechanism proposed in this paper and BH, RLL, and DCD, where “Y” represents that the mechanism has the corresponding attributes and “N” represents that the mechanism does not have the corresponding attributes. As can be seen from the table, the mechanism proposed in this paper has verified the validity of the ciphertext in the equivalence test phase, which is not available in other mechanisms.
Security comparison
| Scheme | The Test Phase Examines The Validity Of The Information | Safety | Difficulty |
|---|---|---|---|
| Bh | N | Ow-Id-Cca | Bdh |
| Rll | N | Ow-Id-Cca&Ow-Cca | Dlp |
| Dcd | N | Ow-Id-Cca&Ind-Id-Cca | Cdh&Ddh |
| Ours | Y | Ow-Id-Cca&Ind-Id-Cca | Cdh&Ddh |
In this section, we measure privacy security based on a sampling approach, utilizing the maximum and average values of attack success probabilities. To maintain the fairness of random sampling, we take the average of the maximum and average values over 10 iterations. The privacy risk analysis is shown in Table 4. The data from the table shows that the proposed data interaction and information fusion mechanism can ensure the privacy security of public security intelligence data.At the same time, we also notice that the privacy risk of the MovieLens dataset is higher than that of the Amazon dataset. This is because the MovieLens dataset is denser and its corresponding users and items have more overlap, while Amazon is a sparse dataset involving multiple domains with no overlap between items in different regions. Therefore, in a sense, the cross-platform data interaction and information fusion mechanism proposed in this paper can provide better data security.
Privacy risk analysis
| Node Num | Movielen Dataset | Amazon Dataset | ||
|---|---|---|---|---|
| Max | Mean | Max | Mean | |
| 100 | 0.152 | 0.056 | 0.04 | 0.016 |
| 1000 | 0.162 | 0.053 | 0.009 | 0.0065 |
| 10000 | 0.114 | 0.038 | 0.0059 | 0.00455 |
Intelligence evaluation is a comprehensive assessment of the authenticity and usability of the information produced, and plays a very important role in intelligence work. In terms of the function of emergency intelligence, the evaluation of intelligence should focus on the four functional elements of the intelligence system, that is, the evaluation of the “organizational structure” under the operating mechanism, “intelligence personnel” using “intelligence platform” to transform “intelligence sources” into “decision-making intelligence”. Under the operating mechanism of “organizational structure”, “intelligence personnel” use “intelligence platform” to transform “intelligence source” into “effect” of decision-making intelligence. This results in an intelligence evaluation system consisting of four evaluation factors: intelligence personnel, organizational structure, intelligence platform (technology), and the effect of final intelligence. The effect evaluation system after using the cross-platform data interaction and information fusion mechanism proposed in this paper is shown in Table 5.
Effectiveness evaluation system
| Target Layer | Factor Layer | Index Layer |
|---|---|---|
| Public Security Intelligence Evaluation (W) | Intelligence Effect(W1) | Veracity(W11) |
| Comprehensiveness(W12) | ||
| Timeliness(W13) | ||
| Novelty(W14) | ||
| Applicability(W15) | ||
| Organization(W2) | Reasonableness(W21) | |
| Coordination(W22) | ||
| Intelligence Officer(W3) | Intelligence Sensitivity(W31) | |
| Intelligence Level(W32) | ||
| Intelligence Ability(W33) | ||
| Information Platform(W4) | Technical Advance(W41) | |
| Software Quality(W42) | ||
| Economy(W43) | ||
| Ease Of Use(W44) |
This section utilizes the Delphi method, which is commonly used in indicator evaluation, to ask experts to review the indicator system and determine the weight coefficients of the indicators. The weights of the evaluation indicators are shown in table 6.
Index weight
| Factor Layer | Weighting | Index Layer | Weighting |
|---|---|---|---|
| (W1) | 0.36 | (W11) | 0.26 |
| (W12) | 0.15 | ||
| (W13) | 0.22 | ||
| (W14) | 0.2 | ||
| (W15) | 0.17 | ||
| (W2) | 0.15 | (W21) | 0.47 |
| (W22) | 0.53 | ||
| (W3) | 0.23 | (W31) | 0.39 |
| (W32) | 0.32 | ||
| (W33) | 0.29 | ||
| (W4) | 0.26 | (W41) | 0.22 |
| (W42) | 0.18 | ||
| (W43) | 0.36 | ||
| (W44) | 0.24 |
Tier 1 indicators:
Tier 2 indicators:
In view of the characteristics of the effect evaluation after using the cross-platform data interaction and information fusion mechanism of public security intelligence and the selection of evaluation indexes, the set of comment sets is set as C={c1(very good), c2(better), c3(general), c4(worse), c5(very bad)}, which is expressed mathematically and quantitatively as C={5,4,3,2,1}, and the content of the set of comment sets is explained as shown in Table 7.
The comments are illustrated
| Commentary set | Explanation |
|---|---|
| c1 (good) | The criteria and requirements of the index are fully met |
| c2 (better) | In conformity with most indicators, only individuals can’t meet the requirements |
| c3 (general) | Basic compliance criteria, less projects that can’t meet the requirements |
| c4 (worse) | The basic discrepancies are not able to meet the requirements of the project |
| c5 (Very bad) | The vast majority of the indicators are inconsistent with the criteria, and only individuals can meet the requirements |
Considering the ease of operation and the representativeness of the experts, we distributed questionnaires to a total of 10 experts in the field of intelligence and security, who have both some practical work experience and deep theoretical training, and whose opinions are quite representative, and asked them to score the various situations of public security intelligence data management capabilities, and then executed specific evaluations using the fuzzy comprehensive evaluation method. Since the experts’ comments on the public security intelligence data management capability were not very uniform, the weighted average method was used rather than the maximum affiliation method for calculation. The specific evaluation grades are shown in Table 8.
Specific evaluation grade
| Index layer | c1 | c2 | c3 | c4 | c5 |
|---|---|---|---|---|---|
| (W11) | 0.5 | 0.3 | 0.1 | 0.1 | 0 |
| (W12) | 0.4 | 0.2 | 0.2 | 0.1 | 0.1 |
| (W13) | 0.4 | 0.3 | 0.2 | 0.1 | 0 |
| (W14) | 0.4 | 0.3 | 0.3 | 0 | 0 |
| (W15) | 0.3 | 0.4 | 0.1 | 0.1 | 0.1 |
| (W21) | 0.5 | 0.1 | 0.2 | 0.2 | 0 |
| (W22) | 0.3 | 0.2 | 0.2 | 0.1 | 0.2 |
| (W31) | 0.6 | 0.3 | 0.1 | 0 | 0 |
| (W32) | 0.4 | 0.5 | 0.1 | 0 | 0 |
| (W33) | 0.5 | 0.3 | 0.1 | 0.1 | 0 |
| (W41) | 0.4 | 0.3 | 0.2 | 0.1 | 0 |
| (W42) | 0.6 | 0.1 | 0.2 | 0.1 | 0 |
| (W43) | 0.5 | 0.3 | 0.2 | 0 | 0 |
| (W44) | 0.3 | 0.2 | 0.4 | 0.1 | 0 |
The evaluation matrix is:
Comprehensive evaluation:
All results are used as the evaluation transformation matrix for the first level, so there is:
If each level in the evaluation set is quantized as c = (5, 4, 3, 2, 1), the comprehensive evaluation results of the management capability of public security intelligence data after the application of the cross-platform data interaction and information fusion mechanism of public security intelligence proposed in this paper are:
It can be seen that the public security intelligence cross-platform data interaction and information fusion mechanism proposed in this paper for national security is utilized to evaluate the management capability of public security intelligence data as good.
It is imperative to utilize cross-platform data interaction and information fusion mechanisms for the maintenance of national security-oriented public security intelligence. Based on this, the article analyzes data interaction technology and information fusion technology, and draws the following conclusions:
In the experimental test analysis, the average information checking rate of the data interaction method proposed in this paper is 9.11%, which is 3.37% higher than the average information checking rate of the other two reference methods, while the checking rates of the other two reference methods are 5.74% and 5.99% respectively. In the comparative analysis of data security, the mechanism proposed in this paper verifies the validity of the ciphertext during the equivalence test phase. By applying the fuzzy comprehensive evaluation method to evaluate the utilization effect of the cross-platform data interaction and information fusion mechanism for public security intelligence proposed in this paper, the evaluation result obtained is good.
National Key Research and Development Program (2023YFC3321604);
Special Fund Project for Basic Scientific Research Business Expenses of Central Universities (2022JKF02002);
Double First-Class Innovation Research Special Project of the People’s Public Security University of China (2023SYL20).
