Research on the Privacy Protection Technology of Blockchain Spatiotemporal Big Data

被引:1
作者
Zhou, Bao [1 ,2 ,3 ,4 ]
Zhao, Junsan [1 ,2 ,3 ,4 ]
Yin, Ying [5 ]
Chen, Guoping [1 ,2 ,3 ,4 ]
机构
[1] Kunming Univ Sci & Technol, Fac Land Resources Engn, Kunming 650093, Peoples R China
[2] Key Lab Geospatial Informat Integrat Innovat Smart, Kunming 650093, Peoples R China
[3] Spatial Informat Integrat Technol Nat Resources Un, Kunming 650211, Peoples R China
[4] Ind Univ Res Integrat Innovat Base Nat Resources S, Kunming 650211, Peoples R China
[5] West Anhui Univ, Luan 237000, Peoples R China
来源
IEEE ACCESS | 2024年 / 12卷
基金
中国国家自然科学基金;
关键词
Blockchains; Big Data; Spatiotemporal phenomena; Encryption; Data privacy; Security; Protection; Spatio-temporal big data; privacy protection; SHA25; blockchain;
D O I
10.1109/ACCESS.2024.3415590
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
At present, the rapid development of big data technology and the Internet of Things has led to the generation of spatiotemporal data streams on a substantial scale. In this context, data holders often opt for cloud storage of their data to mitigate the pressure of local storage and computing overhead. However, this centralized storage mode renders the data susceptible to risks of tampering and leakage due to the absence of physical control over spatiotemporal big data. Therefore, this paper devises a blockchain-based spatiotemporal big data privacy protection scheme. Initially, to ensure data privacy, the scheme adopts a storage mode where the public and side chains are coordinated. Subsequently, the irreversible SHA256 algorithm is utilized to authenticate the access nodes. Finally, AES and RSA hybrid encryption are applied to encrypt the collected spatiotemporal big data, further enhancing the security of private data. The security performance of the system was evaluated by comparing the success rate of attacks on the blockchain under various circumstances. Additionally, the system throughput of this scheme was analyzed through simulation, revealing that the service life of this system extends to a minimum of 13.79 years when 100 nodes are used. In this context, the system throughput achieves 1607 transactions/s, each node hosts 1.2107 blocks, and querying specific spatiotemporal data takes less than 2 seconds.
引用
收藏
页码:111187 / 111195
页数:9
相关论文
共 25 条
[1]   A Lightweight Blockchain-Based Remote Mutual Authentication for AI-Empowered IoT Sustainable Computing Systems [J].
Deebak, B. D. ;
Memon, Fida Hussain ;
Khowaja, Sunder Ali ;
Dev, Kapal ;
Wang, Weizheng ;
Qureshi, Nawab Muhammad Faseeh ;
Su, Chunhua .
IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (08) :6652-6660
[2]   TAB-SAPP: A Trust-Aware Blockchain-Based Seamless Authentication for Massive IoT-Enabled Industrial Applications [J].
Deebak, B. D. ;
Memon, Fida Hussain ;
Dev, Kapal ;
Khowaja, Sunder Ali ;
Wang, Weizheng ;
Qureshi, Nawab Muhammad Faseeh .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 19 (01) :243-250
[3]   A Secure and Authenticated Mobile Payment Protocol Against Off-Site Attack Strategy [J].
Fang, Liming ;
Li, Minghui ;
Liu, Zhe ;
Lin, Changting ;
Ji, Shouling ;
Zhou, Anni ;
Susilo, Willy ;
Ge, Chunpeng .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (05) :3564-3578
[4]   Revocable Attribute-Based Encryption With Data Integrity in Clouds [J].
Ge, Chunpeng ;
Susilo, Willy ;
Baek, Joonsang ;
Liu, Zhe ;
Xia, Jinyue ;
Fang, Liming .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (05) :2864-2872
[5]   Revocable Identity-Based Broadcast Proxy Re-Encryption for Data Sharing in Clouds [J].
Ge, Chunpeng ;
Liu, Zhe ;
Xia, Jinyue ;
Fang, Liming .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (03) :1214-1226
[6]   Blockchain-based approach for e-health data access management with privacy protection [J].
Hirtan, Liviu ;
Krawiec, Piotr ;
Dobre, Ciprian ;
Batalla, Jordi Mongay .
2019 IEEE 24TH INTERNATIONAL WORKSHOP ON COMPUTER AIDED MODELING AND DESIGN OF COMMUNICATION LINKS AND NETWORKS (IEEE CAMAD), 2019,
[7]  
Intila C. A., 2019, Int. J. Recent Technol. Eng., V8, P1
[8]  
Mingyang Song, 2021, Parallel and Distributed Computing, Applications and Technologies. 21st International Conference, PDCAT 2020. Proceedings. Lecture Notes in Computer Science (LNCS 12606), P154, DOI 10.1007/978-3-030-69244-5_13
[9]   A comparative study of Message Digest 5(MD5) and SHA256 algorithm [J].
Rachmawati, D. ;
Tarigan, J. T. ;
Ginting, A. B. C. .
2ND INTERNATIONAL CONFERENCE ON COMPUTING AND APPLIED INFORMATICS 2017, 2018, 978
[10]   Novel Vote Scheme for Decision-Making Feedback Based on Blockchain in Internet of Vehicles [J].
Ren, Yongjun ;
Zhu, Fujian ;
Wang, Jin ;
Sharma, Pradip Kumar ;
Ghosh, Uttam .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2022, 23 (02) :1639-1648