Accountable data trading scheme supporting data integrity verification

被引:0
作者
Chen L. [1 ]
Li X. [1 ]
Gao J. [2 ]
机构
[1] School of Mathematics and Statistics, Xidian University, Xi'an
[2] School of Telecommunication and Engineering, Xidian University, Xi'an
来源
Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics | 2022年 / 44卷 / 04期
关键词
Accountability; Data integrity; Data sharing; Key reconstruction; Smart contract;
D O I
10.12305/j.issn.1001-506X.2022.04.35
中图分类号
学科分类号
摘要
To address security problems existing in data trading schemes such as the key leakage problem, and the collusion problem, an atomic and accountable data trading scheme is proposed. It uses an automatic payment mechanism that combines data auditing technology and smart contracts to ensure data integrity and fairness payment for the trading process. By using the self-certified public keys to design the user registration process, the user's private key is still safe even if it suffers from a single point of failure. In the meanwhile, with the help of the session key to encrypt communication, which solves the problem of symmetric key distribution while efficiently maintains communication security. An accountability mechanism is constructed to implement public auditing to handle user disputes, which resists the collusion attacks. The security analysis and simulation results show that the scheme can not only resist the key leakage attacks and the collusion attacks, but also reduce communication costs and perform accountability efficiently. © 2022, Editorial Office of Systems Engineering and Electronics. All right reserved.
引用
收藏
页码:1364 / 1371
页数:7
相关论文
共 30 条
[1]  
HE Y, ZHU Y Y, ZHAO P, Et al., Panorama of national defense big data, Systems Engineering and Electronics, 38, 6, pp. 1301-1305, (2016)
[2]  
YU H, HE D N, WANG G Y, Et al., Big data for intelligent decision making, Acta Automatica Sinica, 46, 5, pp. 878-896, (2020)
[3]  
ZHAO Z Y, WANG J H, ZHU Z Q, Et al., Attribute-based encryption for data security sharing of internet of things, Journal of Computer Research and Development, 56, 6, pp. 1290-1301, (2019)
[4]  
Statistic: volume of data/information created, captured, copied, and consumed worldwide from 2010 to 2025
[5]  
SUN H F., White paper on China's big data industry development, Internet Economy, C2, pp. 10-21, (2019)
[6]  
AVILA C O., Novel use of apple watch 4 to obtain 3-lead electrocardiogram and detect cardiac ischemia, The Permanente Journal, 23, 3, pp. 19-25, (2019)
[7]  
BOLDT L C, VINAYAGAMOORTHY V, WINDER F, Et al., Forecasting Nike's sales using facebook data, Proc.of the IEEE 4th International Conference on Big Data, pp. 2447-2456, (2016)
[8]  
LI X T, HU X H, GUO X L, Et al., Complicated information sharing technology based on metadata, Systems Engineering and Electronics, 37, 3, pp. 701-706, (2015)
[9]  
NIU L D, WANG J N., Study on big data-based land use performance in Yunnan province, Proc.of the International Conference on Intelligent Transportation, pp. 313-316, (2019)
[10]  
CHEN C L, LIAO J J., Fair offline digital content transaction system, IET Information Security, 6, 3, pp. 123-130, (2012)