Skip to main content
Log in

A new blockchain-based personal privacy protection scheme

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Nowadays, personal privacy disclosure issues become increasingly prominent in the process of data publishing. Targeting at this issue, a secure blockchain-based personal privacy protection scheme is proposed. In this paper, firstly, the information is stored in cloud service, and its hash value is used for the index, which is encrypted and stored on the blockchain. Secondly, based on the principles of cryptography and the characters of blockchain technology, we propose our scheme and use it to provide an access control mechanism for personal privacy. It can make the personal privacy protection easier and more efficient. At last, through our analysis, this scheme can sufficiently protect personal privacy in using mobile devices and provide a safe and trustworthy information acquisition method for data mining. More importantly, this proposed scheme also can provide a reliable and unique source tracing for multimedia copyright protection in terms of multimedia security.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Al Omar A, Rahman MS, Basu A et al (2017) Medibchain: A blockchain based privacy preserving platform for healthcare data [C]//International conference on security, privacy and anonymity in computation, communication and storage. Springer, Cham, pp 534–543

    Book  Google Scholar 

  2. Anjum A, Sporny M, Sill A (2017) Blockchain standards for compliance and trust. IEEE Cloud Comput 4(4):84–90

    Article  Google Scholar 

  3. Atzei, Nicola, BartolettI, Massimo, Cimoli, Tiziana. (2017) A survey of attacks on ethereum smart contracts (sok). In: Principles of security and trust. Springer, Berlin, Heidelberg, pp. 164–186

  4. Boyd D, Crawford K (2012) Critical questions for big data: provocations for a cultural, technological, and scholarly phenomenon. Inf Commun Soc 15(5):662–679

    Article  Google Scholar 

  5. Buterin V (2014) Ethereum: A next-generation smart contract and decentralized application platform. URL https://github.com/ethereum/wiki/wiki/%5BEnglish%5D-White-Paper

  6. Cheng H, Su Z, Xiong N, Xiao Y (2016) Energy-efficient node scheduling algorithms for wireless sensor networks using Markov random field model. Inf Sci 329:461–477

    Article  Google Scholar 

  7. Christidis K, Devetsikiotis M (2016) Blockchains and smart contracts for the internet of things. IEEE Access 4:2292–2303

    Article  Google Scholar 

  8. Dagher GG, Mohler J, Milojkovic M, Marella PB (2018) Ancile: privacy-preserving framework for access control and interoperability of electronic health records using blockchain technology. Sustain Cities Soc 39:283–297

    Article  Google Scholar 

  9. Decker C, Wattenhofer R (2013) Information propagation in the bitcoin network, Peer-to-Peer Computing (P2P), 2013 IEEE Thirteenth International Conference on. IEEE, Trento

  10. Deng Z, Ren Y, Liu Y, Yin X, Shen Z, Kim H-J (2019) Blockchain-based trusted electronic records preservation in cloud storage, computers. Mater Cont 58(1):135–151

    Google Scholar 

  11. Es-Samaali H, Outchakoucht A, Leroy JP (2017) A blockchain-based access control for big data. Int J Comput Netw Commun Secur 5(7):137–147

    Google Scholar 

  12. Eyal I (2017) Blockchain technology: transforming libertarian Cryptocurrency dreams to finance and banking realities. Computer 50(9):38–49

    Article  Google Scholar 

  13. Fang W, Li Y, Zhang H, Xiong N, Lai J, Vasilakos AV (2014) On the throughput-energy tradeoff for data transmission between cloud and mobile devices. Inf Sci 283:79–93

    Article  Google Scholar 

  14. Fang Z, Fei F, Fang Y, Lee C, Xiong N, Shu L, Chen S (2016) Abnormal event detection in crowded scenes based on deep learning. Multimed Tools Appl 75(22):14617–14639

    Article  Google Scholar 

  15. Fayyad U M, Piatetsky-Shapiro G, Smyth P et al. (1996) Advances in knowledge discovery and data mining. American Association for Artificial Intelligence Menlo Park

  16. Feng J, Liu Z, Wu C et al (2018) Mobile edge computing for the internet of vehicles: offloading framework and job scheduling. IEEE Veh Technol Mag 14(1):28–36

    Article  Google Scholar 

  17. Ferraiolo D, Cugini J, Kuhn DR (1995) Role-based access control (RBAC): features and motivations. Proceedings of 11th annual computer security application conference, pp 241-48

  18. Gao F, Zhu L, Shen M, Sharif K, Wan Z, Ren K (2018) A blockchain-based privacy-preserving payment mechanism for vehicle-to-grid networks. IEEE Netw 32(6):184–192

    Article  Google Scholar 

  19. Gao YL, Chen XB, Chen YL, Sun Y, Niu XX, Yang YX (2018) A secure cryptocurrency scheme based on post-quantum blockchain. IEEE Access 6:27205–27213

    Article  Google Scholar 

  20. Giungato P, Rana R, Tarabella A, Tricase C (2017) Current trends in sustainability of Bitcoins and related Blockchain technology. Sustainability 9(12):2214

    Article  Google Scholar 

  21. Guoping Z, Wentao G (2011) The research of access control based on UCON in the internet of things. J Softw 6(4):724–731

    Google Scholar 

  22. Gusmeroli S, Piccione S, Rotondi D (2013) A capability-based security approach to manage access control in the internet of things. Math Comput Model 58(5–6):1189–1205

    Article  Google Scholar 

  23. Johnson D, Menezes A, Vanstone S (2001) The elliptic curve digital signature algorithm (ECDSA). Int J Inf Secur 1(1):36–63

    Article  Google Scholar 

  24. Li H, Liu D, Dai Y, Luan TH, Yu S (2018) Personalized search over encrypted data with efficient and secure updates in Mobile clouds. IEEE Trans Emerg Top Comput 6(1):97–109

    Article  Google Scholar 

  25. Liu X, Li S, Liu J, Chen X, Xu G (2016) Secure multiparty computation of a comparison problem. SpringerPlus 5(1):1489

    Article  Google Scholar 

  26. Liu Z, Tsuda T, Watanabe H, Ryuo S, Iwasawa N (2019) Data driven cyber-physical system for landslide detection. Mobile Netw Appl 24(3):991–1002

    Article  Google Scholar 

  27. Long F, Xiong N, Vasilakos AV, Yang LT, Sun F (2010) A sustainable heuristic QoS routing algorithm for pervasive multi-layered satellite wireless networks. Wirel Netw 16(6):1657–1673

    Article  Google Scholar 

  28. Mervis J (2012) Science policy: agencies rally to tackle big data. Science 336(6077):22

    Article  Google Scholar 

  29. Nakamoto S (2008) Bitcoin: A peer-to-peer electronic cash system. [online]. Available: https://bitcoin.org/bitcoin.pdf

  30. Ni J, Zhang K, Lin X et al (2017) Securing fog computing for internet of things applications: challenges and solutions. IEEE Commun Surveys Tutor 20(1):601–628

    Article  Google Scholar 

  31. Novo O (2018) Blockchain meets IoT: an architecture for scalable access management in IoT. IEEE Internet Things J 5(2):1184–1195

    Article  Google Scholar 

  32. Ouaddah A, Abou Elkalam A, Ait Ouahman A (2016) FairAccess: A new Blockchain-based access control framework for the internet of things. Secur Commun Netw 9(18):5943–5964

    Article  Google Scholar 

  33. Puthal D, Malik N, Mohanty SP, Kougianos E, Yang C (2018) The Blockchain as a decentralized security framework. IEEE Consumer Electron Mag 7(2):18–21

    Article  Google Scholar 

  34. Schulz P, Matthe M, Klessig H, Simsek M, Fettweis G, Ansari J, Ashraf SA, Almeroth B, Voigt J, Riedel I, Puschmann A, Mitschele-Thiel A, Muller M, Elste T, Windisch M (2017) Latency critical IoT applications in 5G: perspective on the design of radio interface and network architecture. IEEE Commun Mag 55(2):70–78

    Article  Google Scholar 

  35. Song R, Song Y, Liu Z, Tang M, Zhou K (2019) GaiaWorld: A novel Blockchain system based on competitive PoS consensus mechanism, computers. Mater Cont 60(3):973–987

    Google Scholar 

  36. Vishwa A, Hussain FK (2018) A Blockchain based approach for multimedia privacy protection and provenance. 2018 IEEE Symposium Series on Computational Intelligence (SSCI). IEEE, pp 1941-1945

  37. Wan Z, Xiong N, Ghani N, Vasilakos AV, Zhou L (2014) Adaptive unequal protection for wireless video transmission over IEEE 802.11 e networks. Multimed Tools Appl 72(1):541–571

    Article  Google Scholar 

  38. Wang J, Li M, He Y, Li H, Xiao K, Wang C (2018) A blockchain based privacy-preserving incentive mechanism in crowdsensing applications. IEEE Access 6:17545–17556

    Article  Google Scholar 

  39. Wu X, Zhu X, Wu GQ, Ding W (2014) Data mining with big data. IEEE Trans Knowl Data Eng 26(1):97–107

    Article  Google Scholar 

  40. Zhu Q, Loke SW, Trujillo-Rasua R et al (2019) Applications of distributed ledger technologies to the internet of things: A survey. ACM Comput Survey (CSUR) 52(6):1–34

    Google Scholar 

  41. Zyskind G, Nathan O (2015) Decentralizing privacy: using blockchain to protect personal data, IEEE Security and Privacy Workshops (SPW), San Jose, 180–184

Download references

Acknowledgements

This work is supported by the NSFC (Grant Nos. 61671087, 61962009, 61572246, 61602232), the Fundamental Research Funds for the Central Universities (Grant No. 2019XD-A02), the Open Foundation of Guizhou Provincial Key Laboratory of Public Big Data (Grant Nos. 2018BDKFJJ018, 2019BDKFJJ010), the BUPT Excellent Ph.D. Students Foundation (Grant No. CX2019232), the High-quality and Cutting-edge Disciplines Construction Project for Universities in Beijing (Internet Information, Communication University of China), the Open Research Project of the State Key Laboratory of Media Convergence and Communication (Communication University of China) (Grant No. SKLMCC2020KF006), the Scientific Research Foundation of North China University of Technology, the JSPS KAKENHI(Grant No. JP20F20080).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gang Xu.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Gao, YL., Chen, XB., Xu, G. et al. A new blockchain-based personal privacy protection scheme. Multimed Tools Appl 80, 30677–30690 (2021). https://doi.org/10.1007/s11042-020-09867-6

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-09867-6

Keywords

Navigation