Blockchain data sharing scheme based on localized difference privacy and attribute-based searchable encryption

被引:0
|
作者
Feng T. [1 ]
Chen L. [1 ]
Fang J. [1 ]
Shi J. [1 ]
机构
[1] School of Computer and Communication, Lanzhou University of Technology, Lanzhou
来源
Tongxin Xuebao/Journal on Communications | 2023年 / 44卷 / 05期
基金
中国国家自然科学基金;
关键词
attribute-based searchable encryption; block chain; data sharing; localized differential privacy; privacy protection;
D O I
10.11959/j.issn.1000-436x.2023103
中图分类号
学科分类号
摘要
Aiming at the problem that traditional cloud-based data sharing schemes rely on trusted third parties and only focus on data privacy protection or access control, a blockchain data sharing scheme based on localized difference privacy and attribute-based searchable encryption was proposed. The blockchain and cloud server were combined to store data chain by chain and provide efficient, reliable and tamper-proof data sharing. Firstly, the localization difference privacy was introduced to preprocess the shared data to protect the privacy of the data owner and resist the attack of the untrusted third party. Secondly, the searchable encryption technology and attribute-based encryption were combined to realize data privacy protection, support ciphertext retrieval, and provide fine-grained access control for shared data. Finally, the safety, the correctness proof, and the experimental analysis proves that the proposed scheme meets the safety objectives. © 2023 Editorial Board of Journal on Communications. All rights reserved.
引用
收藏
页码:224 / 233
页数:9
相关论文
共 21 条
  • [1] JACYNYCZ V, CALVO A, HASSAN S, Et al., Betfunding: a distributed bounty-based crowdfunding platform over Ethereum, Proceedings of the 13th International Conference on Distributed Computing and Artificial Intelligence, pp. 403-411, (2016)
  • [2] FAN K, WANG S, REN Y, Et al., MedBlock: efficient and secure medical data sharing via blockchain, Journal of Medical Systems, 42, 8, pp. 1-11, (2018)
  • [3] XIA Q, SIFAH E B, ASAMOAH K O, Et al., MeDShare: trust-less medical data sharing among cloud service providers via blockchain, IEEE Access, 5, pp. 14757-14767, (2017)
  • [4] DU R Z, TAN A L, TIAN J F., Public key searchable encryption scheme based on blockchain, Journal on Communications, 41, 4, pp. 114-122, (2020)
  • [5] SWEENEY L., K-anonymity: a model for protecting privacy, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10, 5, pp. 557-570, (2002)
  • [6] SWEENEY L., Achieving K-anonymity privacy protection using generalization and suppression, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10, 5, pp. 571-588, (2002)
  • [7] MACHANAVAJJHALA A, KIFER D, GEHRKE J, Et al., L-diversity: privacy beyond K-anonymity, ACM Transactions on Knowledge Discovery from Data, 1, 1, (2007)
  • [8] LI N H, LI T C, VENKATASUBRAMANIAN S., T-closeness: privacy beyond K-anonymity and L-diversity, Proceedings of 2007 IEEE 23rd International Conference on Data Engineering, pp. 106-115, (2007)
  • [9] XIAO X K, TAO Y F., M-invariance: towards privacy preserving re-publication of dynamic datasets, Proceedings of the 2007 ACM SIGMOD International Conference on Management of Data, pp. 689-700, (2007)
  • [10] MUH A, MHR B, JC A., Differential privacy in blockchain technology: a futuristic approach, Journal of Parallel and Distributed Computing, 145, pp. 50-74, (2020)