Computer Science ›› 2020, Vol. 47 ›› Issue (3): 281-286.doi: 10.11896/jsjkx.190300086

Special Issue: Block Chain Technology

• Information Security • Previous Articles     Next Articles

Data Privacy Protection Method of Block Chain Transaction

XU Chong-jian,LI Xian-feng   

  1. (Peking University Shenzhen Graduate School, Shenzhen, Guangdong 518000, China)
  • Received:2019-03-19 Online:2020-03-15 Published:2020-03-30
  • About author:XU Chong-jian,born in 1982,postgra-duate.His main research interests include blockchain,bigdata and AI. LI Xian-feng,born in 1973,Ph.D,associate professor.His main research interests include networked embedded system and internet of things technology.

Abstract: Block chain has the advantages of openness,non-tampering and distributed sharing of global accounts,but at the same time,these characteristics also bring about the privacy disclosure of transaction data,which seriously affects its application in many business areas,especially in the field of enterprise alliance chain.With the continuous development of block chain,how to protect the privacy of transaction data on block chain platform is a very worthwhile problem to study.To this end,firstly,the exi-sting methods of data privacy protection in block chain transactions were studied and their shortcomings were pointed out.Se-condly,the requirements of data privacy protection in block chain transactions were qualitatively analyzed.Each transaction data was divided into sensitive data and basic data.A demand analysis matrix was established to obtain the essential and implicit needs of transaction privacy protection and possible application scenarios.Then,combining the characteristics of symmetric encryption and asymmetric encryption and the consensus of intelligent contract,a privacy protection method of block chain transaction data based on double encryption was designed.The method mainly includes three modules:encrypting and storing transaction data by private data provider,using and decrypting private data to read transaction data,and sharing transaction data by private data accessible party.The workflow of each module was discussed in detail.Finally,the method was validated on the Mychain Platform,which combines with the actual business of multi-party participation in international trade.The evaluation results show that the proposed method can achieve fine-grained transaction data privacy protection at the field level,and can efficiently and steadily share private data on the chain and complete the full-link operation of private data.More than 1 million transaction tests have been completed on the block chain platform constructed by four nodes,and the TPS has reached 800.Compared with the original transaction performance without privacy protection,there is no significant reduction in performance.Compared with Bitcoin,Ethereum and other block chain platforms,the performance of the proposed method is improved dozens of times.

Key words: Block chain, Data sharing, Double encryption, Global ledger, Privacy protection, Smartcontract

CLC Number: 

  • TP391
[1]TRELEAVEN P,BROWN R G,YANG D.Blockchain Techno- logy in Finance[J].Computer,2017,50(9):14-17.
[2]BECK,ROMAN.Beyond Bitcoin:The Rise of Blockchain World[J].Computer,2018,51(2):54-58.
[3]TAPSCOTT D,TAPSCOTT A.Blockchain revolution:how the technology behind bitcoin is changing money,business,and the world[M].Penguin,2016.
[4]CROSBY M,PATTANAYAK P,VERMA S,et al.Blockchain technology:Beyond bitcoin[J].Applied Innovation,2016,2(6-10):71.
[5]ZHENG Z,XIE S,DAI H,et al.An overview of blockchain technology:Architecture,consensus,and future trends[C]∥2017 IEEE International Congress on Big Data (BigData Congress).IEEE,2017:557-564.
[6]LACITY M C.Addressing key challenges to making enterprise blockchain applications a reality[J].MIS Quarterly Executive,2018,17(3):201-222.
[7]HALPIN H,PIEKARSKA M.Introduction to Security and Privacy on the Blockchain[C]∥2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).IEEE,2017:1-3.
[8]ZHU L H,GAO F,SHEN M,et al.Survey on Privacy Preserving Techniques for Blockchain Technology[J].Journal of Computer Research and Development,2017,54(10):2170-2186.
[9]BOGNER A,CHANSON M,MEEUW A.A decentralised sharing app running a smart contract on the ethereum blockchain[C]∥Proceedings of the 6th International Conference on the Internet of Things.ACM,2016:177-178.
[10]LIAO K,ZHAO Z,DOUPÉ A,et al.Behind closed doors:mea- surement and analysis of CryptoLocker ransoms in Bitcoin[C]∥2016 APWG Symposium on Electronic Crime Research (eCrime).IEEE,2016:1-13.
[11]WU J X,GAO Y,ZHANG Z Y,et al.A Multi-Party Privacy Preserving Fair Contract Signing Protocol based on Blockchains[J].Journal of Cyber Security,2018,3(3):13-21.
[12]RUFFING T,MORENO-SANCHEZ P,KATE A.CoinShuffle:Practical decentralized coin mixing for Bitcoin[C]∥European Symposium on Research in Computer Security.Springer,Cham,2014:345-364.
[13]ZIEGELDORF J H,GROSSMANN F,HENZE M,et al.Coin- party:Secure multi-party mixing of bitcoins[C]∥Proceedings of the 5th ACM Conference on Data and Application Security and Privacy.ACM,2015:75-86.
[14]BISSIAS G,OZISIK A P,LEVINE B N,et al.Sybil-resistant mixing for bitcoin[C]∥Proceedings of the 13th Workshop on Privacy in the Electronic Society.ACM,2014:149-158.
[15]SNOW P,DEERY B,LU J,et al.Factom business processes secured by immutable audit trails on the blockchain[OL].https://www.factom.com/wp-content/uploads/2018/10/Factom_Whitepaper_v1.2.pdf.
[16]HOU Y B,LIANG X,ZHAN X Y.Block Chain Based Architecture Model of Electronic Evidence System[J].Computer Science,2018,v.45(S1):361-364.
[17]HUANG X F,XU L,YANG X.Blockchain Model of Cloud Forensics[J].Journal of Beijing University of Posts and Telecom, 2017,40(6):120-124.
[18]AZARIA A,EKBLAW A,VIEIRA T,et al.Medrec:Using blockchain for medical data access and permission management[C]∥International Conference on Open and Big Data (OBD).IEEE,2016:25-30.
[19]XING S M,FENG W,WANG Q J.Research on Anti-Lost Scheme of Confidential Files Based on BlockChain Technology[J].Journal of Information Security Research,2017(10):22-30.
[20]XUE T F,FU Q C,WANG C,et al.A Medical Data Sharing Model via Blockchain[J].Acta Automatica Sinica,2017(9):73-80.
[21]XIA Q I,SIFAH E B,ASAMOAH K O,et al.MeDShare:Trust-less medical data sharing among cloud service providers via blockchain[J].IEEE Access,2017,5:14757-14767.
[22]WU Z Q,LIANG Y H,KANG J W,et al.Secure data storage and sharing system based on consortium blockchain in smart grid[J].Journal of Computer Applications,2017,37(10):2742-2747.
[23]TANG C M,GAO L.Multi-parties Key Agreement Protocol in Block Chain[J].Netinfo Security,2017,17(12):17-21.
[1] LU Chen-yang, DENG Su, MA Wu-bin, WU Ya-hui, ZHOU Hao-hao. Federated Learning Based on Stratified Sampling Optimization for Heterogeneous Clients [J]. Computer Science, 2022, 49(9): 183-193.
[2] WANG Mei-shan, YAO Lan, GAO Fu-xiang, XU Jun-can. Study on Differential Privacy Protection for Medical Set-Valued Data [J]. Computer Science, 2022, 49(4): 362-368.
[3] GAO Shi-yao, CHEN Yan-li, XU Yu-lan. Expressive Attribute-based Searchable Encryption Scheme in Cloud Computing [J]. Computer Science, 2022, 49(3): 313-321.
[4] JIN Hua, ZHU Jing-yu, WANG Chang-da. Review on Video Privacy Protection [J]. Computer Science, 2022, 49(1): 306-313.
[5] LEI Yu-xiao , DUAN Yu-cong. AI Governance Oriented Legal to Technology Bridging Framework for Cross-modal Privacy Protection [J]. Computer Science, 2021, 48(9): 9-20.
[6] ZHOU Yi-hua, JIA Yu-xin, JIA Li-yuan, FANG Jia-bo, SHI Wei-min. Data Integrity Verification Scheme of Shared EMR Based on Red Black Tree [J]. Computer Science, 2021, 48(9): 330-336.
[7] GUO Rui, LU Tian-liang, DU Yan-hui. Source-location Privacy Protection Scheme Based on Target Decision in WSN [J]. Computer Science, 2021, 48(5): 334-340.
[8] YAN Kai-lun, ZHANG Ji-lian. Model Chain for Data and Model Sharing [J]. Computer Science, 2021, 48(2): 311-316.
[9] WANG Rui-jin, TANG Yu-cheng, PEI Xi-kai, GUO Shang-tong, ZHANG Feng-li. Block-chain Privacy Protection Scheme Based on Lightweight Homomorphic Encryption and Zero-knowledge Proof [J]. Computer Science, 2021, 48(11A): 547-551.
[10] LI Yu, DUAN Hong-yue, YIN Yu-yu, GAO Hong-hao. Survey of Crowdsourcing Applications in Blockchain Systems [J]. Computer Science, 2021, 48(11): 12-27.
[11] CHEN Xian-lai, ZHAO Xiao-yu, ZENG Gong-mian, AN Ying. Online Patient Communication Model Based on Blockchain [J]. Computer Science, 2021, 48(11): 28-35.
[12] YU Qi-long, LU Ning, SHI Wen-bo. Traceable Mixing Scheme for Bitcoin [J]. Computer Science, 2021, 48(11): 72-78.
[13] WEI Li-qi, ZHAO Zhi-hong, BAI Guang-wei, SHEN Hang. Location Privacy Game Mechanism Based on Generative Adversarial Networks [J]. Computer Science, 2021, 48(10): 266-271.
[14] YU Xue-yong, CHEN Tao. Privacy Protection Offloading Algorithm Based on Virtual Mapping in Edge Computing Scene [J]. Computer Science, 2021, 48(1): 65-71.
[15] LI Yan, SHEN De-rong, NIE Tie-zheng, KOU Yue. Multi-keyword Semantic Search Scheme for Encrypted Cloud Data [J]. Computer Science, 2020, 47(9): 318-323.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!