Computer Science ›› 2025, Vol. 52 ›› Issue (11): 398-407.doi: 10.11896/jsjkx.241000169

• Information Security • Previous Articles     Next Articles

Data Trusted Sharing Scheme Based on Consortium Blockchain

LIU Zhanghui1,2, LIN Zhexu1,2, CHEN Hanlin1,2, MA Xinjian3,4, CHEN Xing1,2   

  1. 1 College of Computer and Data Science,Fuzhou University,Fuzhou 350116,China
    2 Fujian Key Laboratory of Network Computing and Intelligent Information Processing(Fuzhou University),Fuzhou 350116,China
    3 National Key Laboratory of Data Space Technology and System,Beijing 100195,China
    4 Advanced Institute of Big Data,Beijing,Beijing 100195,China
  • Received:2024-10-29 Revised:2025-03-03 Online:2025-11-15 Published:2025-11-06
  • About author:LIU Zhanghui,born in 1971,master,associate professor,master's supervisor,is a member of CCF(No.79769M).His main research interests include big data technology and intelligent computing.
    MA Xinjian,born in 1987,Ph.D,asso-ciate researcher,is a member of CCF(No.C5681M).His main research interests include information security and distributed system.
  • Supported by:
    National Natural Science Foundation of China(62072108),Special Funds for Promoting High-quality Development of Marine and Fishery Industries in Fujian Province(FJHYF-ZH-2023-02),Fujian Key Technological Innovation and Industrialization Projects(2024XQ004) and National Key Laboratory of Data Space Technology and System(QZQC2024007).

Abstract: With the advent of the big data era,securing and trustworthily sharing data on an open,dynamic,and difficult-to-control Internet has become an urgent problem to solve.Blockchain can reasonably be introduced into the trust resolution mechanism for data sharing,leveraging its significant advantages in decentralization and tamper resistance.Thus,a data trusted sharing scheme based on consortium blockchain is proposed.Firstly,a consortium blockchain-based data architecture is defined to solve the problem of heterogeneous data sources and domains.Through standardized registration processes,data resources are integra-ted efficiently.Secondly,a trusted data traceability mechanism is designed and implemented to ensure the security and integrity of data flow among data requesters,compute nodes,and data providers by leaving the traces of the data sharing process on consor-tium blockchain.In addition,a data-processing-as-a-service data sharing framework is developed to support key steps in data sharing:demand matching,data sharing,and satisfaction evaluation,addressing trust challenges during the data sharing process.The experimental results show that,compared with traditional data sharing schemes,the proportion of additional time in the proposed scheme decreases to less than 30% of the total time cost as the dataset size increases.Additionally,the average latency for querying smart contracts remains stable between 0.12 and 0.2 seconds,while the average latency for writing smart contracts stays consistent at 3 to 5 seconds.

Key words: Blockchain, Chaincode, Hyperledger Fabric, Data sharing, Trusted credential

CLC Number: 

  • TP311
[1]LUO C,MA Y,JING X,et al.Internet of data:a solution for dataspace infrastructure and its technical challenges [J].Big Data Research,2023,9(2):110-121.
[2]ZHENG Z,XIE S,DAI H N,et al.Blockchain challenges and opportunities:A survey [J].International Journal of Web and Grid Services,2018,14(4):352-375.
[3]NAKAMOTO S.Bitcoin:A peer-to-peer electronic cash system [J/OL].Decentralized Business Review,2008:21260.https://www.bitcoin.org/bitcoin.pdf.
[4]CHEN H,PENDLETON M,NJILLA L,et al.A survey onethereum systems security:Vulnerabilities,attacks,and defenses [J].ACM Computing Surveys,2020,53(3):1-43.
[5]DANIEL E,TSCHORSCH F.IPFS and friends:A qualitativecomparison of next generation peer-to-peer data networks [J].IEEE Communications Surveys & Tutorials,2022,24(1):31-52.
[6]VASILE A,GUILLAUME S,AOUINI M,et al.Le Digital Object Identifier,une impérieuse nécessité? L'exemple de l'attribution de DOI à la Collection Pangloss,archive ouverte de langues en danger [J].I2D-Information,Données & Documents,2020(2):155-175.
[7]ZHANG N,LIU Y,MA X J,et al.Identifier Resolution Tech-nology for Human-cyberphysical Ternary Based on Internet of Data [J].Journal of Software,2024,35(10):4681-4695.
[8]ZHONG B,WU H,DING L,et al.Hyperledger fabric-basedconsortium blockchain for construction quality information management [J].Frontiers of Engineering Management,2020,7(4):512-527.
[9]ANDROULAKI E,BARGER A,BORTNIKOV V,et al.Hyperledger fabric:a distributed operating system for permissioned blockchains[C]//Proceedings of the thirteenth EuroSys Confe-rence.2018:1-15.
[10]ANTWI M S,ADNANE A,AHMAD F,et al.The case of HyperLedger Fabric as a blockchain solution for healthcare applications [J].Blockchain:Research and Applications,2021,2(1):100012.
[11]HONAR PAJOOH H,RASHID M,ALAM F,et al.Hyperledger fabric blockchain for securing the edge internet of things [J].Sensors,2021,21(2):359.
[12]HAO Y,PIAO C,ZHAO Y,et al.Privacy preserving government data sharing based on hyperledger blockchain[C]//Advances in E-Business Engineering for Ubiquitous Computing:Proceedings of the 16th International Conference on E-Business Engineering(ICEBE 2019).Springer,2020:373-388.
[13]RAVI D,RAMACHANDRAN S,VIGNESH R,et al.Privacypreserving transparent supply chain management through Hyperledger Fabric [J].Blockchain:Research and Applications,2022,3(2):100072.
[14]CHEN Y,LIN B,CHEN X,et al.Blockchain-based TrustedService-oriented Architecture [J].Computer Science,2023,50(1):342-350.
[15]ZHENG S,PAN L,HU D,et al.A blockchain-based tradingplatform for big data[C]//IEEE INFOCOM 2020-IEEE Conference on Computer Communications Workshops(INFOCOM WKSHPS).IEEE,2020:991-996.
[16]DAI W,DAI C,CHOO K K R,et al.SDTE:A secure blockchain-based data trading ecosystem [J].IEEE Transactions on Information Forensics and Security,2019,15:725-737.
[17]WANG Y,SU Z,ZHANG N,et al.SPDS:A secure and auditable private data sharing scheme for smart grid based on blockchain [J].IEEE Transactions on Industrial Informatics,2020,17(11):7688-7699.
[18]TRUONG N B,SUN K,LEE G M,et al.Gdpr-compliant personal data management:A blockchain-based solution [J].IEEE Transactions on Information Forensics and Security,2019,15:1746-1761.
[19]TIAN Z,ZHONG R Y,VATANKHAH B A,et al.A blockchain-based evaluation approach for customer delivery satisfaction in sustainable urban logistics [J].International Journal of Production Research,2021,59(7):2229-2249.
[20]CHOI W,HONG J W K.Performance evaluation of ethereum private and testnet networks using hyperledger caliper[C]//2021 22nd Asia-Pacific Network Operations and Management Symposium(APNOMS).IEEE,2021:325-329.
[21]ZHAI Z,SHEN S,MAO Y.A Toolbox for Migrating the Blockchain-Based Application From Ethereum to Hyperledger Fabric [J].The Computer Journal,2024,67(4):1309-1323.
[1] ZHOU Tao, DU Yongping, XIE Runfeng, HAN Honggui. Vulnerability Detection Method Based on Deep Fusion of Multi-dimensional Features from Heterogeneous Contract Graphs [J]. Computer Science, 2025, 52(9): 368-375.
[2] LI Li, CHEN Jie, ZHU Jiangwen. Multi-authority Revocable Ciphertext-policy Attribute-based Encryption Data Sharing Scheme [J]. Computer Science, 2025, 52(9): 388-395.
[3] FENG Yimeng, FENG Yan, XIE Sijiang, ZHANG Qing. Proxy-based Bidirectional Coin Mixing Mechanism of Blockchain [J]. Computer Science, 2025, 52(8): 385-392.
[4] ZHAO Chanchan, WEI Xiaomin, SHI Bao, LYU Fei, LIU Libin, ZHANG Ziyang. Edge Computing Based Approach for Node Trust Evaluation in Blockchain Networks [J]. Computer Science, 2025, 52(6A): 240600153-8.
[5] WANG Pu, GAO Zhanyun, WANG Zhenfei, SONG Zheli. BDBFT:A Consensus Protocol Based on Reputation Prediction Model for IoT Scenario [J]. Computer Science, 2025, 52(5): 366-374.
[6] YANG Fan, SUN Yi, LIN Wei, GAO Qi. Blockchain-based Highly Trusted Query Verification Scheme for Streaming Data [J]. Computer Science, 2025, 52(4): 352-361.
[7] JIAO Jian, CHEN Ruixiang, HE Qiang, QU Kaiyang, ZHANG Ziyi. Study on Smart Contract Vulnerability Repair Based on T5 Model [J]. Computer Science, 2025, 52(4): 362-368.
[8] DU Likuan, LIU Chen, WANG Junlu, SONG Baoyan. Self-learning Star Chain Space Adaptive Allocation Method [J]. Computer Science, 2025, 52(3): 359-365.
[9] ZHOU Kai, CHEN Fu, LU Tianyuan, CAO Huaihu. Review of Blockchain Consensus Algorithm [J]. Computer Science, 2025, 52(11): 255-269.
[10] FANG Zhipeng, LI Xiaoyu. Using Ring Blind Signature+Arbitration Authentication Mixed Coin Scheme [J]. Computer Science, 2025, 52(11): 390-397.
[11] WU Moxun, PENG Zeshun, YU Minghe, LI Xiaohua, DONG Xiaomei, NIE Tiezheng, YU Ge. Approach for Lightweight Verifiable Data Management Based on Blockchains [J]. Computer Science, 2025, 52(10): 348-356.
[12] WANG Dong, LI Xiaoruo, ZHU Bingnan. Transaction Granularity Modifiable Consortium Blockchain Scheme Based on Dual Merkel Trees Block Structure [J]. Computer Science, 2024, 51(9): 408-415.
[13] ZANG Wenyang, LYU Jinlai. Study on Time Rotation Notary Group Model Based on Threshold Signature [J]. Computer Science, 2024, 51(8): 403-411.
[14] XIANG Yanjie, HUANG Xiaofang, XIANG Kefeng, ZHENG Ji’nan. Blockchain Certificateless Encryption Mechanism Based on National Secret Algorithm [J]. Computer Science, 2024, 51(8): 440-446.
[15] SUN Li. Application,Challenge and New Strategy of Block Chain Technology in Metaverse [J]. Computer Science, 2024, 51(7): 373-379.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!