Abstract
The essence of blockchain is to solve trust problems and realize value transfer. The traditional centralized processing method adopts centralized transmission and storage of users’ data privacy, which improves the security and reliability of processing. The non central blockchain technology uses distributed ledger technology to realize the characteristics of disintermediation, data tampering, traceability, work audit, etc. encryption algorithm is used to encrypt the data, and consensus mechanism makes the data sharing of blockchain system more fair and stable. The current passive data privacy schemes are basically based on cryptography. On the premise of satisfying the constraint mechanism of blockchain, this paper studies the technical framework, encryption mechanism and empirical analysis of blockchain, and discusses the information privacy protection method of hiding the original big data as much as possible, so as to improve the system performance and protect the security and privacy of user data. At the same time, we study data privacy protection from the perspective of software architecture, and propose a data privacy protection scheme through algorithm decomposition multi center collaboration method, which provides guidance for big data sharing and transaction based on blockchain.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
References
Zheng, Z., Xie, S., Dai, H., Chen, X., Wang, H.: An overview of blockchain technology: architecture, consensus, and future trends. In: IEEE International Congress on Big Data (BigData Congress), pp. 557–564. IEEE (2017)
Aitzhan, N.Z., Svetinovic, D.: Security and privacy in decentralized energy trading through multi-signatures, blockchain and anonymous messaging streams. IEEE Trans. Dependable Secure Comput. 15(5), 840–852 (2018)
Zheng, Z., Xie, S., Dai, H.N., Chen, X., Wang, H.: Blockchain challenges and opportunities: a survey. Int. J. Web Grid Serv. 14(4), 352–375 (2018)
Hu, L., Song, L.: Review and development of cryptographic hash function. Commun. China Comput. Assoc. 15(7), 23–28 (2019)
Zhu, L., et al.: Survey on privacy preserving techniques for blockchain technology. J. Comput. Res. Dev. 54(10), 2170–2186 (2017)
Andreas, M.: Antonopoulos. Mastering Bitcoin. The United States of America (2010)
Luu, L., Chu, D.-H., Olickel, H., Saxena, P., Hobor, A.: Making smart contracts smarter. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, pp. 254–269. ACM (2016)
Reyna, A., Martin, C., Chen, J., Soler, E., Diaz, M.: On blockchain and its integration with loT: challenges and opportunities. Future Gener. Comput. Syst. Int. J. Escience 88, 173–190 (2018)
Tosh, D.K., Shetty, S., Liang, X., Kamhoua, C.A., Kwiat, K.A., Njilla, L.: Security implications of blockchain cloud with analysis of block withholding attack. In: 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID), p. 458 (2017)
Dorri, A., Steger, M., Kanhere, S.S., Jurdak, R.: BlockChain: A distributed solution to automotive security and privacy. IEEE Commun. Mag. 55(12), 119–125 (2017)
Barnas, N.: Blockchains in national defense: trustworthy systems in a trustless world. Blue Horizons Fellowship, Air University, Maxwell Air Force Base, Alabama (2016)
Hurich, P.: The virtual is real: an argument for characterizing bitcoins as private property. Bank. Finance Law Rev. 31, 573 (2016)
He, Z., Cai, Z., Yu, J.: Latent-data privacy preserving with customized data utility for social network data. IEEE Trans. Veh. Technol. 67, 665–673 (2018). https://doi.org/10.1109/TVT.2017.2738018.CrossRef
Solat, S., Potop Butucaru, M.: Zeroblock: preventing selfish mining in bitcoin. Ph.D. thesis, University of Paris (2016)
Zheng, X., Cai, Z., Li, Y.: Data linkage in smart IoT systems: a consideration from privacy perspective. IEEE Commun. Mag. 56(9), 55–61 (2018)
Zheng, W., Zheng, Z., Chen, X., Dai, K., Li, P., Chen, R.: NutBaaS: a blockchain-as-a-service platform. IEEE Access 7, 134422–134433 (2019)
Acknowledgments
This research has been supported by the Natural Science Foundation of China (No. 61562024, No. 61463012).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Wang, Z., Wen, B., Luo, Z. (2020). Towards on Blockchain Data Privacy Protection with Cryptography and Software Architecture Approach. In: Zheng, Z., Dai, HN., Fu, X., Chen, B. (eds) Blockchain and Trustworthy Systems. BlockSys 2020. Communications in Computer and Information Science, vol 1267. Springer, Singapore. https://doi.org/10.1007/978-981-15-9213-3_16
Download citation
DOI: https://doi.org/10.1007/978-981-15-9213-3_16
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-9212-6
Online ISBN: 978-981-15-9213-3
eBook Packages: Computer ScienceComputer Science (R0)