Trusted Blockchain-based Data Fingerprinting Differential-Traceability and SkipList Indexing Methods in Privacy Protection

被引:0
作者
Zhang, Jiazheng [1 ]
Bai, Fenhua [1 ]
Shen, Tao [1 ]
Gong, Bei [2 ]
Luo, Jianzhao [3 ]
机构
[1] Kunming Univ Sci & Technol, Fac Informat Engn & Automat, Kunming, Peoples R China
[2] Kunming Univ Sci & Technol, Kunming, Peoples R China
[3] Yunnan Key Lab Blockchain Applicat Technol, Kunming, Peoples R China
来源
PROCEEDINGS OF 2022 4TH BLOCKCHAIN AND INTERNET OF THINGS CONFERENCE, BIOTC 2022 | 2022年
关键词
Data Fingerprinting; Blockchain; Trusted Computing; Secure Traceability; SkipList Table;
D O I
10.1145/3559795.3559806
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The process of data interaction is often criticized by the public for data privacy leakage, attribution disputes, as well as being maliciously tampered with and difficult to trace the source of data. This paper proposes a data privacy protection and fingerprint tracing method based on the features of decentralization, traceability and non-tampering in blockchain technology. And we combined with the protection of data by secure network platform in trusted computing and differential-traceability algorithm (DTA). We propose a data privacy protection and fingerprint traceability method, and use the SkipList table index structure to improve interaction efficiency. We discuss the proposed data fingerprint-based traceability framework model in a trusted environment using the features of blockchain and trusted computing platforms. In this paper, the data can be processed safely and efficiently to solve the privacy problem, the transaction data is encrypted and recorded on the chain by DTA, and the interaction process uses the SkipList table index to enhance retrieval efficiency. Finally, through multiple experiments and comparison of the results obtained from security testing, it is verified that the blockchain-trusted computing data privacy protection and data fingerprint traceability SkipList table indexing method can achieve traceability for data privacy protection, transaction security management and peer-to-peer verification of encryption and decryption algorithms. We not only provide a secure, trustworthy and efficient data privacy protection model, but also bring a time efficiency optimization of 6ms per 10,000 queries.
引用
收藏
页码:73 / 83
页数:11
相关论文
共 19 条
  • [1] Multi -Authority CP-ABE-Based user access control scheme with constant -size key and ciphertext for IoT deployment
    Banerjee, Soumya
    Roy, Sandip
    Odelu, Vanga
    Das, Ashok Kumar
    Chattopadhyay, Samiran
    Rodrigues, Joel J. P. C.
    Park, Youngho
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 53
  • [2] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [3] CHEN Y, 2018, Journal on Communications, V39, P118
  • [4] ELIA M, 2011, Applicable Algebra in Engineering Communication & Computing, V26, P1
  • [5] Es-Samaali H., 2017, INT J COMPUTER NETWO, V5, P137
  • [6] FAN Y D, 2018, Computer Engineering, V44, P149
  • [7] Gao Zelong, 2021, Cyberspace All, V12, P27
  • [8] Intel, 2016, INT SOFTW GUARD EXT
  • [9] A blockchain based approach for the definition of auditable Access Control systems
    Maesa, Damiano Di Francesco
    Mori, Paolo
    Ricci, Laura
    [J]. COMPUTERS & SECURITY, 2019, 84 : 93 - 119
  • [10] Blockchain Based Access Control
    Maesa, Damiano Di Francesco
    Mori, Paolo
    Ricci, Laura
    [J]. DISTRIBUTED APPLICATIONS AND INTEROPERABLE SYSTEMS, DAIS 2017, 2017, 10320 : 206 - 220