计算机科学 ›› 2021, Vol. 48 ›› Issue (11A): 184-190.doi: 10.11896/jsjkx.210100163

• 大数据&数据科学 • 上一篇    下一篇

基于区块链的大数据交易关键技术与发展趋势

曹萌1,2, 于洋1,2, 梁英1, 史红周1   

  1. 1 中国科学院计算技术研究所 北京100190
    2 中国科学院大学计算机科学与技术学院 北京100190
  • 出版日期:2021-11-10 发布日期:2021-11-12
  • 通讯作者: 史红周(hzshi@ict.ac.cn)
  • 作者简介:caomeng19s@ict.ac.cn
  • 基金资助:
    国家重点研发计划(2018YFB1004700)

Key Technologies and Development Trends of Big Data Trade Based on Blockchain

CAO Meng1,2, YU Yang1,2, LIANG Ying1, SHI Hong-zhou1   

  1. 1 Institute of Computing Technology,Chinese Academy of Sciences,Beijing 100190,China
    2 School of Computer Science and Technology,University of Chinese Academy of Sciences,Beijing 100190,China
  • Online:2021-11-10 Published:2021-11-12
  • About author:AO Meng,born in 1997,postgraduate.Her main research interests include blockchain and big data processing and analysis.
    SHI Hong-zhou,born in 1971,a senior engineer.His main research interests include blockchain,big data processing and analysis,Internet of things security and other technologies.
  • Supported by:
    National Key Research and Development Progra of China(2018YFB1004700).

摘要: 大数据时代下各类数据价值日益凸显,不同主体对大数据交易的需求也愈加迫切。传统集中式平台下的大数据交易存在用户数据被恶意采集、隐私泄露、数据被转售、数据虚假等诸多风险。一般认为,采用具有去中心化、透明性、隐私保护、不可篡改性等特点的区块链技术是解决上述大数据交易问题的一种重要途径。然而,区块链技术在大数据交易领域的应用还处于早期发展阶段,应用方案尚未成熟。对此,对目前学术界提出的多种基于区块链技术的数据交易方案进行总结,从隐私保护、数据转卖和交易公平3个角度出发,介绍使用区块链技术提升集中式数据交易的具体方法,并对各方法的优缺点进行分析;最后从隐私保护、身份认证、海量数据等方面分析“区块链+大数据交易”目前面临的挑战和未来的发展方向。

关键词: 大数据交易, 访问控制, 区块链, 身份认证, 隐私保护

Abstract: In the era of big data,the value of data has become increasingly prominent,and the needs of big data trading for diffe-rent entities are becoming more and more urgent.Traditional big data trading based on centralized platforms have many risks such as malicious collection of user data,privacy leakage,data resale,and data fraud.It is generally believed that using blockchain technology with the characteristics of decentralization,transparency,privacy protection,and tamper resistance is an important way to solve the above problems in big data trading.However,the development of blockchain technology in big data trading is still in the early stage,and the application plans are not yet mature.In this regard,this paper summarizes the current data trading models based on blockchain technology proposed by the academic community,introduces the methods of improving centralized big data trading from the three perspectives of privacy protection,data resale and trading fairness by using blockchain technology,and analyzes the advantages and disadvantages of each method.Then,this paper analyzes the current challenges and future development directions of “blockchain+big data trading” from the aspects of privacy protection,identity authentication,massive data,and va-lue transfer.

Key words: Access control, Blockchain, Data trading, Identity authentication, Privacy protect

中图分类号: 

  • TP311
[1]SUN Y,SONG H,JARA A J,et al.Internet of things and big data analytics for smart and connected communities[J].IEEE Access,2016(4):766-773.
[2]STANKOVIC J A.Research directions for the internet of things[J].IEEE Internet of Things Journal,2014,1(1):3-9.
[3]WU J,ZHAO W.Design and realization of winternet:From net of things to internet of things[J].ACM Transactions on Cyber-Physical Systems,2016,1(1):1-12.
[4]LIN J,YU W,ZHANG N,et al.A survey on internet of things:Architecture,enabling technologies,security and privacy,and applications[J].IEEE Internet of Things Journal,2017,4(5):1125-1142.
[5]JAN B,FARMAN H,KHAN M,et al.Deep learning in big data analytics:a comparative study[J].Computers & Electrical Engineering,2019,75:275-287.
[6]GROVES P,KAYYALI B,KNOTT D,et al.The “big data” revolution in healthcare:Accelerating value and innovation[M].Centre for US Health System Reform; Business Technology Office,2013.
[7]IOTA blockchain data trading market[EB/OL].https://data.iota.org/.
[8]Databroker Dao[EB/OL].https://databrokerdao.com/.
[9]BAIC [EB/OL].http://baic.io/.
[10]Gxb Blockchain White Paper [EB/OL].https://cryptorating.eu/whitepapers/GXChain/GXB_Blockchain_White_Paper_v1.2_EN.pdf.
[11]LE NGUYEN B,LYDIA E L,ELHOSENY M,et al.Privacy preserving blockchain technique to achieve secure and reliable sharing of IoT data[J].Computers,Materials & Continua,2020,65(1):87-107.
[12]HUH S,CHO S,KIM S.Managing IoT devices using blockchain platform[C]//2017 19th International Conference on Advanced Communication Technology (ICACT).IEEE,2017:464-467.
[13]REYNA A,MARTÍN C,CHEN J,et al.On blockchain and its integration with IoT.Challenges and opportunities[J].Future Generation Computer Systems,2018,88:173-190.
[14]XIA Q,SIFAH E B,SMAHI A,et al.BBDS:Blockchain-based data sharing for electronic medical records in cloud environments[J].Information,2017,8(2):44.
[15]CHEN Y,DING S,XU Z,et al.Blockchain-based medical records secure storage and medical service framework[J].Journal of Medical Systems,2019,43(1):1-9.
[16]CHEN Y,BELLAVITIS C.Blockchain disruption and decentralized finance:The rise of decentralized business models[J].Journal of Business Venturing Insights,2020,13:e00151.
[17]YANG M J.Design of a data trading platform based on cryptography and blockchain technology[J].Chinese Journal of Information Communication Technology,2016,10(4):24-31.
[18]WANG J W,ZHENG Z Z,WU F,et al.Blockchain-based data market [J].Big Data,2020,6(3):21-35.
[19]NAKAMOTO S.Bitcoin:A peer-to-peer electronic cash system[J].Decentralized Business Review,2008:21260.
[20]BUTERIN V.A next-generation smart contract and decentralized application platform[J].White Paper,2014,3(37).
[21]ALTAWY R,ELSHEIKH M,YOUSSEF A M,et al.Lelantos:A blockchain-based anonymous physical delivery system[C]//2017 15th Annual Conference on Privacy,Security and Trust (PST).IEEE,2017.
[22]CHIESA A,GREEN M,LIU J,et al.Decentralized anonymous micropayments[C]//Annual International Conference on the Theory and Applications of Cryptographic Techniques.Cham:Springer,2017:609-642.
[23]KOPP H,MÖDINGER D,HAUCK F,et al.Design of a privacy-preserving decentralized file storage with financial incentives[C]//2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).IEEE,2017:14-22.
[24]LEIBA O,YITZCHAK Y,BITTON R,et al.Incentivized delivery network of IoT software updates based on trustless proof-of-distribution[C]//2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).IEEE,2018:29-39.
[25]KIYOMOTO S,RAHMAN M S,BASU A.On blockchain-based anonymized dataset distribution platform[C]//2017 IEEE 15th International Conference on Software Engineering Research,Management and Applications (SERA).IEEE,2017:85-92.
[26]ZHOU J,TANG F,ZHU H,et al.Distributed data vending on blockchain[C]//2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber,Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).IEEE,2018:1100-1107.
[27]YANG L,JIN R.Distance metric learning:A comprehensive survey[J].Michigan State Universiy,2006,2(2):4.
[28]JUNG T,LI X Y,HUANG W,et al.Accounttrade:Accountable protocols for big data trading against dishonest consumers[C]//IEEE INFOCOM 2017-IEEE Conference on Computer Communications.IEEE,2017:1-9.
[29]DAI W,DAI C,CHOO K K R,et al.SDTE:A secure blockchain-based data trading ecosystem[J].IEEE Transactions on Information Forensics and Security,2019,15:725-737.
[30]MCKEEN F,ALEXANDROVICH I,BERENZON A,et al.Innovative instructions and software model for isolated execution[J].Hasp@ isca,2013,10(1).
[31]XIONG W,XIONG L.Smart contract based data trading mode using blockchain and machine learning[J].IEEE Access,2019,7:102331-102344.
[32]PARAMESWARAN S,WEINBERGER K Q.Large marginmulti-task metric learning[J].Advances in Neural Information Processing Systems,2010,23:1867-1875.
[33]ZHAO Y,YU Y,LI Y,et al.Machine learning based privacy-preserving fair data trading in big data market[J].Information Sciences,2019,478:449-460.
[34]POETTERING B,STEBILA D.Double-authentication-preven-ting signatures[J].International Journal of Information Security,2017,16(1):1-22.
[35]FERNÁNDEZ-CARAMÉS T M,FRAGA-LAMAS P.A Review on the Use of Blockchain for the Internet of Things[J].IEEE Access,2018,6:32979-33001.
[36]PATEL V.A framework for secure and decentralized sharing of medical imaging data via blockchain consensus[J].Health Informatics Journal,2019,25(4):1398-1411.
[37]YU H,ZHANG Z Y,LIU J W.Research on the ExpansionTechnology of Bitcoin Blockchain [J].Chinese Journal of Computer Research and Development,2017,54(10):2390.
[38]ZHANG P,HELVIK B E.Towards green P2P:Analysis of energy consumption in P2P and approaches to control[C]//2012 International Conference on High Performance Computing & Simulation (HPCS).IEEE,2012:336-342.
[39]BRUCE J D.The mini-blockchain scheme [EB/OL].http://cryptonite.info/f i les/mbc-scheme-rev3.pdf.
[40]MEIKLEJOHN S,POMAROLE M,JORDAN G,et al.A fistful of bitcoins:characterizing payments among men with no names[C]//Proceedings of the 2013 Conference on Internet Measurement Conference.2013:127-140.
[41]HALPIN H,PIEKARSKA M.Introduction to Security and Privacy on the Blockchain[C]//2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).IEEE,2017:1-3.
[42]Van Saberhagen N.CryptoNote v 2.0[EB/OL].https://www.mendeley.com/catalogue/7e4cdb00-7955-30e1-9185-32a1801bd94b/.
[43]MOORE C,O'NEILL M,O'SULLIVAN E,et al.Practical homomorphic encryption:A survey[C]//2014 IEEE International Symposium on Circuits and Systems (ISCAS).IEEE,2014:2792-2795.
[44]SASSON E B,CHIESA A,GARMAN C,et al.Zerocash:Decentralized anonymous payments from bitcoin[C]//2014 IEEE Symposium on Security and Privacy.IEEE,2014:459-474.
[45]LI R,SONG T,MEI B,et al.Blockchain for large-scale internet of things data storage and protection[J].IEEE Transactions on Services Computing,2018,12(5):762-771.
[46]AL-RIYAMI S S,PATERSON K G.Certificateless public key cryptography[C]//International Conference on the Theory and Application of Cryptology and Information Security.Berlin:Springer,2003:452-473.
[47]OUADDAH A,ABOU ELKALAM A,OUAHMAN A A.Towards a novel privacy-preserving access control model based on blockchain technology in IoT[M]//Europe and MENA Cooperation Advances in Information and Communication Technologies.Cham:Springer,2017:523-533.
[48]LIANG X,ZHAO J,SHETTY S,et al.Integrating blockchain for data sharing and collaboration in mobile healthcare applications[C]//2017 IEEE 28th Annual International Symposium on Personal,Indoor,and Mobile Radio Communications (PIMRC).IEEE,2017:1-5.
[49]MERKLE R.Protocols for Public Key Cryptosystems[C]//Proceedings of the 1980 IEEE Symposium on Security and Privacy (Oakland,CA,USA).1980.
[50]KAASHOEK M F,KARGER D R.Koorde:A simple degree-optimal distributed hash table[C]//International Workshop on Peer-to-Peer Systems.Berlin:Springer,2003:98-107.
[51]YU S,WANG C,REN K,et al.Achieving secure,scalable,and fine-grained data access control in cloud computing[C]//2010 Proceedings IEEE INFOCOM.IEEE,2010:1-9.
[52]BENET J.Ipfs-content addressed,versioned,p2p file system[J].arXiv:1407.3561,2014.
[1] 鲁晨阳, 邓苏, 马武彬, 吴亚辉, 周浩浩.
基于分层抽样优化的面向异构客户端的联邦学习
Federated Learning Based on Stratified Sampling Optimization for Heterogeneous Clients
计算机科学, 2022, 49(9): 183-193. https://doi.org/10.11896/jsjkx.220500263
[2] 郭鹏军, 张泾周, 杨远帆, 阳申湘.
飞机机内无线通信网络架构与接入控制算法研究
Study on Wireless Communication Network Architecture and Access Control Algorithm in Aircraft
计算机科学, 2022, 49(9): 268-274. https://doi.org/10.11896/jsjkx.210700220
[3] 汤凌韬, 王迪, 张鲁飞, 刘盛云.
基于安全多方计算和差分隐私的联邦学习方案
Federated Learning Scheme Based on Secure Multi-party Computation and Differential Privacy
计算机科学, 2022, 49(9): 297-305. https://doi.org/10.11896/jsjkx.210800108
[4] 王子凯, 朱健, 张伯钧, 胡凯.
区块链与智能合约并行方法研究与实现
Research and Implementation of Parallel Method in Blockchain and Smart Contract
计算机科学, 2022, 49(9): 312-317. https://doi.org/10.11896/jsjkx.210800102
[5] 吕由, 吴文渊.
隐私保护线性回归方案与应用
Privacy-preserving Linear Regression Scheme and Its Application
计算机科学, 2022, 49(9): 318-325. https://doi.org/10.11896/jsjkx.220300190
[6] 傅丽玉, 陆歌皓, 吴义明, 罗娅玲.
区块链技术的研究及其发展综述
Overview of Research and Development of Blockchain Technology
计算机科学, 2022, 49(6A): 447-461. https://doi.org/10.11896/jsjkx.210600214
[7] 高健博, 张家硕, 李青山, 陈钟.
RegLang:一种面向监管的智能合约编程语言
RegLang:A Smart Contract Programming Language for Regulation
计算机科学, 2022, 49(6A): 462-468. https://doi.org/10.11896/jsjkx.210700016
[8] 毛典辉, 黄晖煜, 赵爽.
符合监管合规性的自动合成新闻检测方法研究
Study on Automatic Synthetic News Detection Method Complying with Regulatory Compliance
计算机科学, 2022, 49(6A): 523-530. https://doi.org/10.11896/jsjkx.210300083
[9] 周航, 姜河, 赵琰, 解相朋.
适用于各单元共识交易的电力区块链系统优化调度研究
Study on Optimal Scheduling of Power Blockchain System for Consensus Transaction ofEach Unit
计算机科学, 2022, 49(6A): 771-776. https://doi.org/10.11896/jsjkx.210600241
[10] 王健.
基于隐私保护的反向传播神经网络学习算法
Back-propagation Neural Network Learning Algorithm Based on Privacy Preserving
计算机科学, 2022, 49(6A): 575-580. https://doi.org/10.11896/jsjkx.211100155
[11] 李博, 向海昀, 张宇翔, 廖浩德.
面向食品溯源场景的PBFT优化算法应用研究
Application Research of PBFT Optimization Algorithm for Food Traceability Scenarios
计算机科学, 2022, 49(6A): 723-728. https://doi.org/10.11896/jsjkx.210800018
[12] 王思明, 谭北海, 余荣.
面向6G可信可靠智能的区块链分片与激励机制
Blockchain Sharding and Incentive Mechanism for 6G Dependable Intelligence
计算机科学, 2022, 49(6): 32-38. https://doi.org/10.11896/jsjkx.220400004
[13] 孙浩, 毛瀚宇, 张岩峰, 于戈, 徐石成, 何光宇.
区块链跨链技术发展及应用
Development and Application of Blockchain Cross-chain Technology
计算机科学, 2022, 49(5): 287-295. https://doi.org/10.11896/jsjkx.210800132
[14] 李利, 何欣, 韩志杰.
群智感知的隐私保护研究综述
Review of Privacy-preserving Mechanisms in Crowdsensing
计算机科学, 2022, 49(5): 303-310. https://doi.org/10.11896/jsjkx.210400077
[15] 阳真, 黄松, 郑长友.
基于区块链与改进CP-ABE的众测知识产权保护技术研究
Study on Crowdsourced Testing Intellectual Property Protection Technology Based on Blockchain and Improved CP-ABE
计算机科学, 2022, 49(5): 325-332. https://doi.org/10.11896/jsjkx.210900075
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!