We use cookies to improve your experience with our site.

Indexed in:

SCIE, EI, Scopus, INSPEC, DBLP, CSCD, etc.

Submission System
(Author / Reviewer / Editor)
Bao-Kun Zheng, Lie-Huang Zhu, Meng Shen, Feng Gao, Chuan Zhang, Yan-Dong Li, Jing Yang. Scalable and Privacy-Preserving Data Sharing Based on Blockchain[J]. Journal of Computer Science and Technology, 2018, 33(3): 557-567. DOI: 10.1007/s11390-018-1840-5
Citation: Bao-Kun Zheng, Lie-Huang Zhu, Meng Shen, Feng Gao, Chuan Zhang, Yan-Dong Li, Jing Yang. Scalable and Privacy-Preserving Data Sharing Based on Blockchain[J]. Journal of Computer Science and Technology, 2018, 33(3): 557-567. DOI: 10.1007/s11390-018-1840-5

Scalable and Privacy-Preserving Data Sharing Based on Blockchain

More Information
  • Author Bio:

    Bao-Kun Zheng received his M.S. degree in computer science from the School of Information, Renmin University of China, Beijing, in 2010. He is currently a Ph.D. candidate at the School of Computer Science and Technology, Beijing Institute of Technology, Beijing, and an associate professor at the School of Information Management for Law, China University of Political Science and Law, Beijing. His research interests include blockchain, network and information security.

  • Corresponding author:

    Meng Shen E-mail: shenmeng@bit.edu.cn

  • Received Date: November 19, 2017
  • Revised Date: March 27, 2018
  • Published Date: May 04, 2018
  • With the development of network technology and cloud computing, data sharing is becoming increasingly popular, and many scholars have conducted in-depth research to promote its flourish. As the scale of data sharing expands, its privacy protection has become a hot issue in research. Moreover, in data sharing, the data is usually maintained in multiple parties, which brings new challenges to protect the privacy of these multi-party data. In this paper, we propose a trusted data sharing scheme using blockchain. We use blockchain to prevent the shared data from being tampered with, and use the Paillier cryptosystem to realize the confidentiality of the shared data. In the proposed scheme, the shared data can be traded, and the transaction information is protected by using the (p, t)-threshold Paillier cryptosystem. We conduct experiments in cloud storage scenarios and the experimental results demonstrate the efficiency and effectiveness of the proposed scheme.
  • [1]
    Sharma S. Expanded cloud plumes hiding big data ecosystem. Future Generation Computer Systems, 2016, 59:63-92.
    [2]
    Yu Y, Ni J B, Man H A, Mu Y, Wang B Y, Li H. Comments on a public auditing mechanism for shared cloud data service. IEEE Trans. Services Computing, 2015, 8(6):998-999.
    [3]
    Kandukuri B R, Ramakrishna P V, Rakshit A. Cloud security issues. In Proc. IEEE International Conference on Services Computing (SCC), September 2009, pp.517-520.
    [4]
    Stinson D R. An explication of secret sharing schemes. Designs, Codes and Cryptography, 1992, 2(4):357-390.
    [5]
    Beimel A. Secret-sharing schemes:A survey. In Coding and Cryptology, Chee Y M, Guo Z B, Ling S, Shao F J, Tang Y S, Wang H X, Xing C P (eds.), Springer, 2011, pp.11-46.
    [6]
    Peng K. Critical survey of existing publicly verifiable secret sharing schemes. IET Information Security, 2012, 6(4):249-257.
    [7]
    Maheshwari N, Kiyawat K. Structural framing of protocol for secure multiparty cloud computation. In Proc. the 5th Asia Modelling Symp. (AMS), July 2011, pp.187-192.
    [8]
    Hamari J, Sjöklint M, Ukkonen A. The sharing economy:Why people participate in collaborative consumption. Journal of the Association for Information Science and Technology, 2016, 67(9):2047-2059.
    [9]
    Shamir A. How to share a secret. Communications of the ACM, 1979, 22(11):612-613.
    [10]
    Blakley G R. Safeguarding cryptographic keys. In Proc. AFIPS 1979 National Computer Conf., June 1979, pp.313-317.
    [11]
    Antonopoulos A M. Mastering Bitcoin:Unlocking Digital Crypto-Currencies. O'Reilly Media, 2014.
    [12]
    Rivest R, Shamir A, Adleman L M. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 1978, 26(2):96-99.
    [13]
    Paillier P. Public-key cryptosystems based on composite degree residuosity classes. In Advances in Cryptology, Stern J (ed.), Springer, 1999, pp.223-238.
    [14]
    Lindell Y, Pinkas B. Privacy preserving data mining. Journal of Cryptology, 2002, 15(3):177-206.
    [15]
    Gaetani E, Aniello L, Baldoni R, Lombardi F, Margheri A, Sassone V. Blockchain-based database to ensure data integrity in cloud computing environments. In Proc. the 1st International Italian Conference on Cybersecurity, January 2017, pp.146-155.
    [16]
    Ali M, Nelson J, Shea R, Freedman R J. Blockstack:A global naming and storage system secured by blockchains. In Proc. USENIX Annu. Technical Conf. (ACT), June 2016, pp.181-194.
    [17]
    Liang X P, Shetty S, Tosh D, Kamhoua C, Kwiat K, Njilla L. ProvChain:A blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability. In Proc. the 17th IEEE/ACM International Symposium on Cluster Cloud and Grid Computing (CCGRID), May 2017, pp.468-477.
    [18]
    Cai C J, Yuan X L, Wang C. Towards trustworthy and private keyword search in encrypted decentralized storage. In Proc. IEEE International Conference on Communications (ICC), May 2017.
    [19]
    Miller A, Juels A, Shi E, Parno B, Katz J. Permacoin:Repurposing bitcoin work for data preservation. In Proc. IEEE Symp. Security and Privacy (SP), May 2014, pp.475-490.
    [20]
    Frikken K B. Secure multiparty computation. In Algorithms and Theory of Computation Handbook, Atallah M J (ed.), Chapman and Hall/CRC, 2010.
    [21]
    Fouque P A, Poupard G, Stern J. Sharing decryption in the context of voting or lotteries. In Financial Cryptography, Frankel Y (ed.), Springer, 2000, pp.90-104.
    [22]
    Baudron O, Fouque P A, Pointcheval D, Stern J, Poupard G. Practical multi-candidate election system. In Proc. the 20th Annu. ACM Symp. Principles of Distributed Computing (PODC), August 2001, pp.274-283.
  • Related Articles

    [1]Dong-Yu Cao, Hao Yin, Bi-Xin Li. A Random Mixing Scheme for Protecting Transaction Privacy on Ethereum[J]. Journal of Computer Science and Technology, 2025, 40(3): 731-747. DOI: 10.1007/s11390-024-3843-8
    [2]Feng Jiang, Huai-Min Wang, Pei-Chang Shi, Xiang Fu, Liao-Liao Feng, Rui Li, Mo-Heng Lin. An Understandable Cross-Chain Authentication Mechanism for JointCloud Computing[J]. Journal of Computer Science and Technology, 2025, 40(3): 621-636. DOI: 10.1007/s11390-025-4733-4
    [3]Qi-Feng Shao, Zhao Zhang, Che-Qing Jin, Ao-Ying Zhou. Query Authentication Using Intel SGX for Blockchain Light Clients[J]. Journal of Computer Science and Technology, 2023, 38(3): 714-734. DOI: 10.1007/s11390-022-1007-2
    [4]Yi Qin, Qin Hu, Dong-Xiao Yu, Xiu-Zhen Cheng. Generous or Selfish? Weighing Transaction Forwarding Against Malicious Attacks in Payment Channel Networks[J]. Journal of Computer Science and Technology, 2022, 37(4): 888-905. DOI: 10.1007/s11390-022-2032-x
    [5]Ying Guo, Zhen-Fu Cao, Xiao-Lei Dong. Generalized Goldwasser and Micali's Type Cryptosystem[J]. Journal of Computer Science and Technology, 2022, 37(2): 459-467. DOI: 10.1007/s11390-021-0806-1
    [6]Li-De Xue, Ya-Jun Liu, Wei Yang, Wei-Lin Chen, Liu-Sheng Huang. A Blockchain-Based Protocol for Malicious Price Discrimination[J]. Journal of Computer Science and Technology, 2022, 37(1): 266-276. DOI: 10.1007/s11390-021-0583-x
    [7]Mingming Wang, Qianhong Wu, Bo Qin, Qin Wang, Jianwei Liu, Zhenyu Guan. Lightweight and Manageable Digital Evidence Preservation System on Bitcoin[J]. Journal of Computer Science and Technology, 2018, 33(3): 568-586. DOI: 10.1007/s11390-018-1841-4
    [8]Rui Yuan, Yu-Bin Xia, Hai-Bo Chen, Bin-Yu Zang, Jan Xie. ShadowEth: Private Smart Contract on Public Blockchain[J]. Journal of Computer Science and Technology, 2018, 33(3): 542-556. DOI: 10.1007/s11390-018-1839-y
    [9]Zhimin Gao, Lei Xu, Lin Chen, Xi Zhao, Yang Lu, Weidong Shi. CoC: A Unified Distributed Ledger Based Supply Chain Management System[J]. Journal of Computer Science and Technology, 2018, 33(2): 237-248. DOI: 10.1007/s11390-018-1816-5
    [10]Tao Renji, Chen Shihua, Chen Xuemei. FAPKC3: A New Finite Automaton PublicKey Cryptosystem[J]. Journal of Computer Science and Technology, 1997, 12(4): 289-305.

Catalog

    Article views (222) PDF downloads (1356) Cited by()
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return