Skip to main content

DUMPLING: Cross-Domain Data Security Sharing Based on Blockchain

  • Conference paper
  • First Online:
Artificial Intelligence and Security (ICAIS 2020)

Abstract

Blockchain is an effective solution for data sharing. The usual practice is to write metadata and the hash of raw data to the blockchain. This design does not take the confidentiality of metadata into account. The data provider wants to freely decide whether to share data through the data applicant’s search conditions, without exposing what data they have. This paper presents a Cross-Domain data security sharing model called DUMPLING, which is based on consortium blockchain. It achieves trusted data transaction evidence and privacy protection search. Analysis shows that the system has good security and efficiency.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Naimi, A.I., Westreich, D.J.: Big data: a revolution that will transform how we live, work, and think. Math. Comput. Educ. 47(17), 181–183 (2014)

    Google Scholar 

  2. Eyal, I., Gencer, A.E., Sirer, E.G., Renesse, R.V.: Bitcoin-NG: a scalable blockchain protocol. In: Proceedings of the 13th Usenix Conference on Networked Systems Design and Implementation, pp. 45–59. USENIX Association Berkeley, CA, USA (2015)

    Google Scholar 

  3. Deng, Z.L., Ren, Y.J., Liu, Y.P., et al.: Blockchain-based trusted electronic records preservation in cloud storage. Comput. Mater. Continua 58(1), 135–151 (2019)

    Article  Google Scholar 

  4. Song, R., Song, Y., Liu, Z., Tang, M., Zhou, K.: GaiaWorld: a novel blockchain system based on competitive PoS consensus mechanism. Comput. Mater. Continua 60(3), 973–987 (2019)

    Article  Google Scholar 

  5. Jiang, X., Liu, M., Yang, C., Liu, Y., Wang, R.: A blockchain-based authentication protocol for WLAN mesh security access. Comput. Mater. Continua 58(1), 45–59 (2019)

    Article  Google Scholar 

  6. Pass, R., Seeman, L., Shelat, A.: Analysis of the blockchain protocol in asynchronous networks. In: Coron, J.-S., Nielsen, J.B. (eds.) EUROCRYPT 2017. LNCS, vol. 10211, pp. 643–673. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-56614-6_22

    Chapter  MATH  Google Scholar 

  7. Liang, J., Han, W., Guo, Z., et al.: DESC: enabling secure data exchange based on smart contracts. Sci. China (Inf. Sci.) 61(4), 049102 (2018)

    Google Scholar 

  8. Zyskind, G., Nathan, O.A.: Decentralizing privacy: using blockchain to protect personal data. In: 2015 IEEE Security and Privacy Workshops (SPW). IEEE Computer Society (2015)

    Google Scholar 

  9. Kosba, A., Miller, A., Shi, E., et al.: Hawk: the blockchain model of cryptography and privacy-preserving smart contracts. In: 2016 IEEE Symposium on Security and Privacy (SP). IEEE (2016)

    Google Scholar 

  10. Hu, S., Cai, C., Wang, Q., et al.: Searching an encrypted cloud meets blockchain: a decentralized, reliable and fair realization. In: IEEE INFOCOM 2018 - IEEE Conference on Computer Communications. IEEE (2018)

    Google Scholar 

  11. Dong, X.Q., Guo, B., Shen, Y., et al.: An efficient and secure decentralizing data sharing model. Chin. J. Comput. 425(5), 55–70 (2018)

    Google Scholar 

  12. Cheng, R., Zhang, F., Kos, J., et al.: Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contract Execution (2018)

    Google Scholar 

  13. Androulaki, E., Barger, A., Bortnikov, V., et al.: Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains (2018)

    Google Scholar 

  14. Yin, M., Malkhi, D., Reiter, M.K., et al.: HotStuff: BFT consensus with linearity and responsiveness. In: ACM Symposium on Principles of Distributed Computing (PODC 2019) (2019)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mingda Liu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Liu, M., Shi, Y. (2020). DUMPLING: Cross-Domain Data Security Sharing Based on Blockchain. In: Sun, X., Wang, J., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2020. Lecture Notes in Computer Science(), vol 12240. Springer, Cham. https://doi.org/10.1007/978-3-030-57881-7_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-57881-7_21

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-57880-0

  • Online ISBN: 978-3-030-57881-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics