Blockchain Data Availability Scheme with Strong Data Privacy Protection

被引:1
作者
Liu, Xinyu [1 ]
Ji, Shan [2 ]
Wang, Xiaowan [3 ]
Liu, Liang [2 ]
Ren, Yongjun [1 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Engn Res Ctr Digital Forens, Sch Comp Sci, Minist Educ, Nanjing 210044, Peoples R China
[2] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing 210016, Peoples R China
[3] Xian Univ Posts & Telecommun, Coll Digital Arts, Xian 710061, Peoples R China
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
blockchain; privacy protection; data availability; zero knowledge accumulator; STORAGE MECHANISM; MANAGEMENT;
D O I
10.3390/info14020088
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Blockchain, with its characteristics of non-tamperability and decentralization, has had a profound impact on various fields of society and has set off a boom in the research and application of blockchain technology. However, blockchain technology faces the problem of data availability attacks during its application, which greatly limits the scope and domain of blockchain applications. One of the most advantageous researches to address this problem is the scalable data availability solution that integrates coding theory design into the Merkle tree promise. Based on this scheme, this paper combines a zero-knowledge accumulator with higher efficiency and security with local repair coding, and proposes a data availability scheme with strong dataset privacy protection. The scheme first encodes the data block information on the blockchain to ensure tamper-proof data, and then uses a zero-knowledge accumulator to store the encoded data block information. Its main purpose is to use zero-knowledge property to protect the accumulation set information stored in the accumulator from being leaked and to ensure that no other information about the accumulation set is revealed during the data transmission. It fundamentally reduces the possibility of attackers generating fraudulent information by imitating block data and further resists data availability attacks.
引用
收藏
页数:13
相关论文
共 37 条
[11]  
Halbawi W, 2016, IEEE INT SYMP INFO, P935, DOI 10.1109/ISIT.2016.7541436
[12]   Binary Linear Locally Repairable Codes [J].
Huang, Pengfei ;
Yaakobi, Eitan ;
Uchikawa, Hironori ;
Siegel, Paul H. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2016, 62 (11) :6268-6283
[13]   Privacy-Preserving Recommendation Based on Kernel Method in Cloud Computing [J].
Li, Tao ;
Qian, Qi ;
Ren, Yongjun ;
Ren, Yongzhen ;
Xia, Jinyue .
CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 66 (01) :779-791
[14]   PDPChain: A Consortium Blockchain-Based Privacy Protection Scheme for Personal Data [J].
Liang, Wei ;
Yang, Yang ;
Yang, Ce ;
Hu, Yonghua ;
Xie, Songyou ;
Li, Kuan-Ching ;
Cao, Jiannong .
IEEE TRANSACTIONS ON RELIABILITY, 2023, 72 (02) :586-598
[15]   Optimal Locally Repairable Codes of Distance 3 and 4 via Cyclic Codes [J].
Luo, Yuan ;
Xing, Chaoping ;
Yuan, Chen .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2019, 65 (02) :1048-1053
[16]   Reliable and Secure Multishot Network Coding Using Linearized Reed-Solomon Codes [J].
Martinez-Penas, Umberto ;
Kschischang, Frank R. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2019, 65 (08) :4785-4803
[17]   Blockchain State Sharding With Space-Aware Representations [J].
Mizrahi, Avi ;
Rottenstreich, Ori .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2021, 18 (02) :1571-1583
[18]  
Mohammed B., 2022, IEEE ACCESS, V8, P20067
[19]  
Nakamoto S, 2008, BITCOIN PEER TO PEER
[20]   Scalable Access Management in IoT Using Blockchain: A Performance Evaluation [J].
Novo, Oscar .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (03) :4694-4701