A new blockchain-based personal privacy protection scheme

被引:0
作者
Yu-Long Gao
Xiu-Bo Chen
Gang Xu
Wen Liu
Mian-Xiong Dong
Xin Liu
机构
[1] Beijing University of Posts and Telecommunications,Information Security Center, State Key Laboratory of Networking and Switching Technology
[2] North China University of Technology,School of Information Science and Technology
[3] Communication University of China,State Key Laboratory of Media Convergence and Communication
[4] Communication University of China,School of Computer Science and Cybersecurity
[5] Muroran Institute of Technology,Information and Electronic Engineering
[6] Inner Mongolia University of Science and Technology,School of Information Engineering
来源
Multimedia Tools and Applications | 2021年 / 80卷
关键词
Blockchain; Multimedia security; Information security; Privacy protection; Data mining;
D O I
暂无
中图分类号
学科分类号
摘要
Nowadays, personal privacy disclosure issues become increasingly prominent in the process of data publishing. Targeting at this issue, a secure blockchain-based personal privacy protection scheme is proposed. In this paper, firstly, the information is stored in cloud service, and its hash value is used for the index, which is encrypted and stored on the blockchain. Secondly, based on the principles of cryptography and the characters of blockchain technology, we propose our scheme and use it to provide an access control mechanism for personal privacy. It can make the personal privacy protection easier and more efficient. At last, through our analysis, this scheme can sufficiently protect personal privacy in using mobile devices and provide a safe and trustworthy information acquisition method for data mining. More importantly, this proposed scheme also can provide a reliable and unique source tracing for multimedia copyright protection in terms of multimedia security.
引用
收藏
页码:30677 / 30690
页数:13
相关论文
共 136 条
[11]  
Devetsikiotis M(2018)Mobile edge computing for the internet of vehicles: offloading framework and job scheduling IEEE Veh Technol Mag 14 28-36
[12]  
Dagher GG(2018)A blockchain-based privacy-preserving payment mechanism for vehicle-to-grid networks IEEE Netw 32 184-192
[13]  
Mohler J(2018)A secure cryptocurrency scheme based on post-quantum blockchain IEEE Access 6 27205-27213
[14]  
Milojkovic M(2017)Current trends in sustainability of Bitcoins and related Blockchain technology Sustainability 9 2214-731
[15]  
Marella PB(2011)The research of access control based on UCON in the internet of things J Softw 6 724-1205
[16]  
Deng Z(2013)A capability-based security approach to manage access control in the internet of things Math Comput Model 58 1189-63
[17]  
Ren Y(2001)The elliptic curve digital signature algorithm (ECDSA) Int J Inf Secur 1 36-109
[18]  
Liu Y(2018)Personalized search over encrypted data with efficient and secure updates in Mobile clouds IEEE Trans Emerg Top Comput 6 97-1002
[19]  
Yin X(2016)Secure multiparty computation of a comparison problem SpringerPlus 5 1489-1673
[20]  
Shen Z(2019)Data driven cyber-physical system for landslide detection Mobile Netw Appl 24 991-628