DEPLEST: A blockchain-based privacy-preserving distributed database toward user behaviors in social networks

被引:51
作者
Chen, Yun [1 ]
Xie, Hui [1 ]
Lv, Kun [1 ]
Wei, Shengjun [1 ]
Hu, Changzhen [1 ]
机构
[1] Beijing Inst Technol, Beijing, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Blockchain technology; Privacy protection; Social network; Big data;
D O I
10.1016/j.ins.2019.05.092
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Social networks record a significant amount of user behavior data every day. By analyzing this behavior data, companies or attackers use it for marketing or more questionable purposes. We propose a blockchain-based model to protect the privacy of users' data in such big data environments. Traditional blockchain methods require too many resources for this task, so we propose a model that secures sensitive user information in a distributed blockchain and passes nonsensitive information through to the primary system in order to manage the blockchain size. Our DEPLEST algorithm performs these synchronization operations to keep local database storage and computational capacity within the limits of individual users' devices. We also propose a consensus protocol for blockchain ledger maintenance that runs well on typical client systems and prove that this protocol has excellent Byzantine fault tolerance (BFT). Our experimental results show that DEPLEST meets the architectural and performance needs and that our consensus protocol outperforms the existing proof of work (PoW) and proof of stake (PoS) methods in this application. (C) 2019 Elsevier Inc. All rights reserved.
引用
收藏
页码:100 / 117
页数:18
相关论文
共 30 条
[1]   COMPARISON OF LIST SCHEDULES FOR PARALLEL PROCESSING SYSTEMS [J].
ADAM, TL ;
CHANDY, KM ;
DICKSON, JR .
COMMUNICATIONS OF THE ACM, 1974, 17 (12) :685-690
[2]   Malicious accounts: Dark of the social networks [J].
Adewole, Kayode Sakariyah ;
Anuar, Nor Badrul ;
Kamsin, Amirrudin ;
Varathan, Kasturi Dewi ;
Razak, Syed Abdul .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 79 :41-67
[3]   Security and Privacy in Decentralized Energy Trading Through Multi-Signatures, Blockchain and Anonymous Messaging Streams [J].
Aitzhan, Nurzhan Zhumabekuly ;
Svetinovic, Davor .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (05) :840-852
[4]   Leveraging Analysis of User Behavior to Identify Malicious Activities in Large-Scale Social Networks [J].
Al-Qurishi, Muhammad ;
Hossain, M. Shamim ;
Alrubaian, Majed ;
Rahman, Sk Md Mizanur ;
Alamri, Atif .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (02) :799-813
[5]  
[Anonymous], 2018, IEEE Network, DOI DOI 10.1109/MNET.2018.1700269
[6]  
Chen Y., 2018, S FDN APPL BLOCKCH F
[7]   Blockchains and Smart Contracts for the Internet of Things [J].
Christidis, Konstantinos ;
Devetsikiotis, Michael .
IEEE ACCESS, 2016, 4 :2292-2303
[8]  
Crypti, 2014, DEC APPL PLATF
[9]   Hummingbird: Privacy at the time of Twitter [J].
De Cristofaro, Emiliano ;
Soriente, Claudio ;
Tsudik, Gene ;
Williams, Andrew .
2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2012, :285-299
[10]   The Blockchain: A New Framework for Robotic Swarm Systems [J].
Ferrer, Eduardo Castello .
PROCEEDINGS OF THE FUTURE TECHNOLOGIES CONFERENCE (FTC) 2018, VOL 2, 2019, 881 :1037-1058