Blockchain-Based System and Methods for Sensitive Data Transactions

被引:6
作者
Su, Xin [1 ]
Ullah, Inam [2 ]
Wang, Meiling [1 ]
Choi, Chang [3 ]
机构
[1] Hohai Univ, Coll Internet Things Engn, Changzhou, Peoples R China
[2] Hohai Univ, Changzhou, Peoples R China
[3] Gachon Univ, Seongnam, South Korea
基金
新加坡国家研究基金会;
关键词
Blockchain; Printing; Business; Encoding; Production facilities; Industries; Consumer electronics;
D O I
10.1109/MCE.2021.3076985
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A blockchain-based processing framework for sensitive data is proposed. The smart network comprises a blockchain module, an electronic contract (E-contract) layer node, and a Software-as-a-Service (SaaS) layer module. The underlying blockchain module provides technical support, such as virtual machines, consensus algorithms, transaction verification mechanisms, and accounting mechanisms. The E-contract layer module provides a distributed application service and uses the blockchain technology to support it. In addition, it runs the code of the sensitive data transaction system and the code created by the algorithm for encoding generation at the E-contract layer. The SaaS layer module offers a cloud-platform service that allows each party to easily engage in business collaboration via web portals or clients. The proposed smart system is used by each party get involved in the production of sensitive data. The final sensitive data are produced by the final data generator, and other modules involved in the process of data production are unaware of the final data. This approach prevents the leakage of sensitive data into the circulation.
引用
收藏
页码:87 / 96
页数:10
相关论文
共 20 条
  • [1] An Efficient Blockchain-Based Privacy-Preserving Collaborative Filtering Architecture
    Casino, Fran
    Patsakis, Constantinos
    [J]. IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, 2020, 67 (04) : 1501 - 1513
  • [2] Mechanical verification of transaction processing systems
    Chkliaev, D
    Hooman, J
    van der Stok, P
    [J]. ICFEM 2000: THIRD INTERNATIONAL CONFERENCE ON FORMAL ENGINEERING METHODS, PROCEEDINGS, 2000, : 89 - 97
  • [3] Chung KS, 2014, I C INF COMM TECH CO, P621, DOI 10.1109/ICTC.2014.6983231
  • [4] API Method Recommendation without Worrying about the Task-API Knowledge Gap
    Huang, Qiao
    Xia, Xin
    Xing, Zhenchang
    Lo, David
    Wang, Xinyu
    [J]. PROCEEDINGS OF THE 2018 33RD IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMTED SOFTWARE ENGINEERING (ASE' 18), 2018, : 293 - 304
  • [5] Known-Plaintext Attack and Ciphertext-Only Attack for Encrypted Single-Pixel Imaging
    Jiao, Shuming
    Gao, Yang
    Lei, Ting
    Xie, Zhenwei
    Yuan, Xiaocong
    [J]. IEEE ACCESS, 2019, 7 : 119557 - 119565
  • [6] Kakade N., 2020, P 11 INT C COMP COMM, P1
  • [7] Kaushik S., 2012, P STUD CONT ENG SYST, P14
  • [8] Secured by Blockchain
    Kolokotronis, Nicholas
    Limniotis, Konstantinos
    Shiaeles, Stavros
    Griffiths, Romain
    [J]. IEEE CONSUMER ELECTRONICS MAGAZINE, 2019, 8 (03) : 28 - 34
  • [9] CNN Based Malicious Website Detection by Invalidating Multiple Web Spams
    Liu, Dongjie
    Lee, Jong-Hyouk
    [J]. IEEE ACCESS, 2020, 8 : 97258 - 97266
  • [10] Peng L., Digit. Commun. Netw., DOI [10.1016/j.dcan2020.05.008, DOI 10.1016/J.DCAN2020.05.008]