PETchain: A Blockchain-Based Privacy Enhancing Technology

被引:18
作者
Javed, Ibrahim Tariq [1 ]
Alharbi, Fares [2 ]
Margaria, Tiziana [1 ]
Crespi, Noel [3 ]
Qureshi, Kashif Naseer [4 ]
机构
[1] Univ Limerick, Lero Sci Fdn, Ireland Res Ctr Software, Limerick V94 T9PX, Ireland
[2] Shaqra Univ, Comp Sci Dept, Riyadh 11961, Saudi Arabia
[3] Inst Polytech Paris, Telecom SudParis, F-91011 Evry, France
[4] Bahria Univ, Dept Comp Sci, Islamabad 44000, Pakistan
来源
IEEE ACCESS | 2021年 / 9卷
基金
爱尔兰科学基金会; 欧盟地平线“2020”;
关键词
Blockchain; Data privacy; Encryption; Privacy; Cryptography; Access control; Differential privacy; Ethereum; privacy enhancing technology; privacy preservation; smartcontract; DIFFERENTIAL PRIVACY; INTERNET;
D O I
10.1109/ACCESS.2021.3064896
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the increasing use of smart devices and sensors, enormous amounts of data are being generated continuously. The data is commonly stored in centralized cloud platforms and consumed by different services. The data is indeed a valuable resource for many service providers who provide advanced features and utilities to their subscribers. However, user data include personal and sensitive information which can be misused in many ways. There is no way for a subscriber to confirm that their service provider is compliant with data privacy regulations. The existing privacy enhancing techniques such as anonymization and differential privacy substantially reduce data usability while ensuring privacy. Therefore, it remains essential to provide a feasible solution that allows service providers to take advantage of user data while guaranteeing their privacy. In this paper, we present PETchain: a novel privacy enhancing technology using blockchain and smartcontract. In PETchain, data is stored securely in a distributed manner and processed in a user-selected trusted execution environment. Users deploy the smartcontract that allows them to decide whether and how their data can be exploited by service providers. The feasibility and performance of PETchain are presented by implementing PETchain over a consortium Ethereum blockchain.
引用
收藏
页码:41129 / 41143
页数:15
相关论文
共 34 条
  • [1] Alamri Bandar, 2020, Edge Computing - EDGE 2020. 4th International Conference Held as Part of the Services Conference Federation, SCF 2020. Proceedings. Lecture Notes in Computer Science (LNCS 12407), P103, DOI 10.1007/978-3-030-59824-2_9
  • [2] A Vademecum on Blockchain Technologies: When, Which, and How
    Belotti, Marianna
    Bozic, Nikola
    Pujolle, Guy
    Secci, Stefano
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (04): : 3796 - 3838
  • [3] Benet J., 2014, Technical report
  • [4] Privacy-preserving distributed learning of radiomics to predict overall survival and HPV status in head and neck cancer
    Bogowicz, Marta
    Jochems, Arthur
    Deist, Timo M.
    Tanadini-Lang, Stephanie
    Huang, Shao Hui
    Chan, Biu
    Waldron, John N.
    Bratman, Scott
    O'Sullivan, Brian
    Riesterer, Oliver
    Studer, Gabriela
    Unkelbach, Jan
    Barakat, Samir
    Brakenhoff, Ruud H.
    Nauta, Irene
    Gazzani, Silvia E.
    Calareso, Giuseppina
    Scheckenbach, Kathrin
    Hoebers, Frank
    Wesseling, Frederik W. R.
    Keek, Simon
    Sanduleanu, Sebastian
    Leijenaar, Ralph T. H.
    Vergeer, Marije R.
    Leemans, C. Rene
    Terhaard, Chris H. J.
    van den Brekel, Michiel W. M.
    Hamming-Vrieze, Olga
    van der Heijden, Martijn A.
    Elhalawani, Hesham M.
    Fuller, Clifton D.
    Guckenberger, Matthias
    Lambin, Philippe
    [J]. SCIENTIFIC REPORTS, 2020, 10 (01)
  • [5] Privacy Enhancing Technologies in the Internet of Things: Perspectives and Challenges
    Cha, Shi-Cho
    Hsu, Tzu-Yang
    Xiang, Yang
    Yeh, Kuo-Hui
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (02): : 2159 - 2187
  • [6] D Team, BLOCKCHAINS TUTORIAL
  • [7] Dib Omar, 2018, Int. J. Adv. Telecommun, V11, P51
  • [8] The Algorithmic Foundations of Differential Privacy
    Dwork, Cynthia
    Roth, Aaron
    [J]. FOUNDATIONS AND TRENDS IN THEORETICAL COMPUTER SCIENCE, 2013, 9 (3-4): : 211 - 406
  • [9] ElSalamouny E, 2016, TRANS DATA PRIV, V9, P15
  • [10] Gervais A., 2016, Proceedings of the 2016 ACM SIGSAC conference on computer and communications security, P3, DOI DOI 10.1145/2976749.2978341