A Distributed Privacy Preservation Approach for Big Data in Public Health Emergencies Using Smart Contract and SGX

被引:10
作者
Li, Jun [1 ,2 ]
Cheng, Jieren [2 ]
Xiong, Naixue [3 ]
Zhan, Lougao [4 ]
Zhang, Yuan [1 ]
机构
[1] Hainan Univ, Hainan Blockchain Technol Engn Res Ctr, Haikou 570228, Hainan, Peoples R China
[2] Hainan Univ, Sch Comp Sci & Cyberspace Secur, Haikou 570228, Hainan, Peoples R China
[3] Northeastern State Univ, Dept Math & Comp Sci, Tahlequah, OK 74464 USA
[4] Hainan Univ, Key Lab Internet Informat Retrieval Hainan Prov, Haikou 570228, Hainan, Peoples R China
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2020年 / 65卷 / 01期
基金
中国国家自然科学基金; 海南省自然科学基金;
关键词
SGX; big data; privacy protection; smart contract; access control; INTERNET;
D O I
10.32604/cmc.2020.011272
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security and privacy issues have become a rapidly growing problem with the fast development of big data in public health. However, big data faces many ongoing serious challenges in the process of collection, storage, and use. Among them, data security and privacy problems have attracted extensive interest. In an effort to overcome this challenge, this article aims to present a distributed privacy preservation approach based on smart contracts and Intel Software Guard Extensions (SGX). First of all, we define SGX as a trusted edge computing node, design data access module, data protection module, and data integrity check module, to achieve hardware-enhanced data privacy protection. Then, we design a smart contract framework to realize distributed data access control management in a big data environment. The crucial role of the smart contract was revealed by designing multiple access control contracts, register contracts, and history contracts. Access control contracts provide access control methods for different users and enable static access verification and dynamic access verification by checking the user's properties and history behavior. Register contract contains user property information, edge computing node information, the access control and history smart contract information, and provides functions such as registration, update, and deletion. History contract records the historical behavior information of malicious users, receives the report information of malicious requestors from the access control contract, implements a misbehavior check method to determines whether the requestor has misbehavior, and returns the corresponding result. Finally, we design decentralized system architecture, prove the security properties, and analysis to verify the feasibility of the system. Results demonstrate that our method can effectively improve the timeliness of data, reduce network latency, and ensure the security, reliability, and traceability of data.
引用
收藏
页码:723 / 741
页数:19
相关论文
共 42 条
[1]   REALIZING THE TACTILE INTERNET: HAPTIC COMMUNICATIONS OVER NEXT GENERATION 5G CELLULAR NETWORKS [J].
Aijaz, Adnan ;
Dohler, Mischa ;
Aghvami, A. Hamid ;
Friderikos, Vasilis ;
Frodigh, Magnus .
IEEE WIRELESS COMMUNICATIONS, 2017, 24 (02) :82-89
[2]  
Anati I., 2013, P 2 INT WORKSH HARDW, P1
[3]  
[Anonymous], 2015, INT SOFTW GUARD EXT
[4]  
[Anonymous], J SUPERCOMPUT
[5]   MedRec: Using Blockchain for Medical Data Access and Permission Management [J].
Azaria, Asaph ;
Ekblaw, Ariel ;
Vieira, Thiago ;
Lippman, Andrew .
PROCEEDINGS 2016 2ND INTERNATIONAL CONFERENCE ON OPEN AND BIG DATA - OBD 2016, 2016, :25-30
[6]   Formal Verification of Smart Contracts Short Paper [J].
Bhargavan, Karthikeyan ;
Delignat-Lavaud, Antoine ;
Fournet, Cedric ;
Gollamudi, Anitha ;
Gonthier, Georges ;
Kobeissi, Nadim ;
Kulatova, Natalia ;
Rastogi, Aseem ;
Sibut-Pinote, Thomas ;
Swamy, Nikhil ;
Zanella-Beguelin, Santiago .
PROCEEDINGS OF THE 2016 ACM WORKSHOP ON PROGRAMMING LANGUAGES AND ANALYSIS FOR SECURITY (PLAS'16), 2016, :91-96
[7]  
Biryukov A., 2017, FINANCIAL CRYPTOGRAP, V10323
[8]  
Buterin Vitalik, 2014, NEXT GENERATION SMAR, V3, P2
[9]  
Chen M, 2017, BIG DATA COGNITIVE C, V1
[10]  
Chen Y., 2018, P USENIX WORKSH HOT, P1