Review on Information Privacy Protection based on Blockchain Principle
DOI:
https://doi.org/10.54097/fcis.v5i2.12312Keywords:
Blockchain, Data Privacy, Information Privacy, Information ProtectionAbstract
As a distributed general ledger technology, a basic platform of smart contract, and a new distributed computing paradigm, blockchain is bound to have an impact on the development of all walks of life, and drive a new round of technology and application changes. To have an impact on the development of all walks of life and drive a new round of technology and application changes, blockchain technology improves efficiency, reduces costs, and enhances data security. However, it also faces serious information security problems. However, while block technology improves efficiency, reducing costs and improving data security, block technology also faces serious information privacy leakage problems. promote the research, development and application of blockchain in information privacy protection. This paper uses the literature analysis method to analyze the advantages and disadvantages of the blockchain in the information privacy protection from the aspects of the blockchain privacy protection This paper uses the literature analysis method to analyze the advantages and disadvantages of the blockchain in the information privacy protection from the aspects of the blockchain privacy protection , analyze the privacy leakage threat of the blockchain in the network layer, transaction layer and application layer, and summarizes the main technologies of the blockchain in the information privacy protection of data users.
Downloads
References
NAKAMOTO S. Bitcoin: a peer-to-peer electronic cash system [EB/OL]. [2017-08-21]. https://bitcoin.org/bitcoin.Pdf.
ZHANG Xian, JIANG Yuzhao, YAN Ying. a glimpse at blockchain: from the perspective of privacy [T]. Journal of Information Security Research, 2017, 3 (11) :981-89.
Dash. dash is digital cash [EB/OL]. [2019-12-01]. https:// www. dash.Org/.
PAILLISSE J, SUBIRA J, LOPEZ A, et al. Distributed access control with blockchain [C]// ICC 2019-2019 IEEE International Conferenceon Communications (ICC). Shanghai: ieee, 2019: 1-6.
XU J, WEI L W, ZHANG Y, et al. Dynamic fully homomorphic encryption-based Merkle tree for lightweight streaming authenticated data structures[J]. Journal of Network and Computer Applications, 2018, 107:113-124.
MARSHALL B, ALOR R, MANUEL S, et al. Proofs of useful work [EB/OL]. [2019-12-01]. http://eprint. iacr. org/2017/ 203. pdf .
ZAIN N. Blockchain and smart contract: importance of digital signature [C] //Seminar on Contemporary Islamic Banking priactices, Malaysia . International Islamic University Malaysia, 2017.
ZHANG R, XUE R, LIU L. Security and privacy on blockchain [J]. ACM Computing Surveys, 2019, 52 (3) :51.
Zeng Shiqin, Huo Ru, Huang Tao, Liu Jiang, Wang Shuo, Feng Wei. A review of blockchain technology research: principles, progress and applications[J]. Journal of Communication, 2020, 41 (01):134-151.
Antonopoulos A M. Mastering Bitcoin [EB/OL]. [2017-06-10]. https:// www.bitcoinbook.info/ .
Andy D. THE DAO [EB/OL]. [2017-06-10]. http:// ethlans. org/ posts/127 .
Kang Haiyan, Deng Jie. A review of blockchain data privacy protection research[J]. Journal of Shandong University: Science Edition, 2021.
ZHANG Hong, DUAN Haixin, WU Jianping. IP clustering based reputation system for anti-spam [J]. Journal of Tsinghua University (Science and Technology), 2010, 50 (10):1723-1727.
Rivest R I, Adleman L, Dertouzos M L. On data banks and privacy homomorphisms [J]. Foundations of Secure Computation, 1978, 4(11):169-180.
GentryC. A Fully Homomorphic Encryption Scheme[M]. Stanford, CA: Stanford University, 2009.
Boyle E, Gilboa N, Ishai Y, et al. Foundations of homomorphic secret sharing[C]//9th Innovations in Theoretical Computer Science Conference (ITCS 2018). Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik, 2018: 21:1-21:21.
Dwork C, Roth A. The algorithmic foundations of differential privacy [J]. Found Trends Theor Computer Science, 2014, 9(3-4):211-407.
Xiong P, Zhu TQ, Wang XF. Differential privacy preservation and its application[J]. Journal of Computing, 2014, 37(1):101-122.
Wang T, Ma WP, Luo W. Blockchain-based information sharing and secure multi-party computing model[J]. Computer Science, 2019,46 (9): 162-168.
KIM Y, KIM K H, KIM J H. Power trading blockchain using hyperledger fabric [C]//2020 International Conference on Information Networking (ICOIN).Barcelona: IEEE, 2020:821-824.
Zhu Liehuang, Dong Hui, Shen Meng. Blockchain transaction data privacy protection mechanism[J]. Big Data,2018, 4(01): 46-56.
Szabo N. Smart contracts[J]. Unpublished manuscript, 1994.
LIU J, LI X, YE L, et al. BPDS: A blockchain based privacy-preserving data sharing for electronic medical records [C]// 2018 IEEE Global Communications Conference (GLOBECOM). Abu Dhabi: IEEE, 2018:1-6.
ZHU Liehuang, DONG Hui, SHEN Meng. privacy protection mechanism for blockchain transaction data [J]. Big Data Research, 2018, 4(1): 46-56.
DENG Yu, CHEN Yu. Zero knowledge proof: from mathematics, cryptography to financial technology [T]. Chinese Society of Computer Communications, 2018, 14 (10): 20-22.
WANG Xingwei, HOU Shuhui. improved efficient proxy blind signature scheme [J]. Computer Science, 2019, 46 (z1):358-361.
ZIANG ZONGYANG, et al. Fully anonymous blockchain based on aggregated signatures and encrypted transactions[J]. Computer Research and Development, 2018, 55 (10): 2185-2198.
VALENTA L, ROWAN B. Blindcoin: blinded, accountable mixes for bitcoin [M]// Financial Cryptography and Data Security. Berlin: Springer, 2015:112-126 .
WIJAYA D A, LIU J, STEINFELD R, et al. Monero ring attack: recreating zero mixin transaction effect [C]//2018 17th IEEE International Conference on Trust , Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science and Engineering (TrustCom/ BigDataSE) . New York: IEEE, 2018:1196-1201.
PAN C, LIU Z Q, LIU Z, et al. Research on scalability of blockchain technology: problems and methods [J] . Journal of computer research and development,2018, 55(10):2099-2110.
LIU H, LI X H, LUO B, et al. Distributed K-anonymity location privacy protection scheme based on blockchain[J]. Chinese journal of computers, 2019, 42 (5):942-960.
NIU B, Li Q H, ZHU X Y, et al. Achieving k-anonymity in privacy-aware location-based services [C]//IEEE INFOCOM 2014-IEEE Conference on Computer Communications. toronto: ieee, 2014:754-762.