Skip to main content
Log in

Data privacy mechanisms development and performance evaluation for personal and ubiquitous blockchain-based storage

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

In the era of global communication and the sharing economy, the demand for personal and ubiquitous storage among enterprises and individual users has increased; thus, the flexible expansion of the data access architecture has become crucial. According to the storage requirements, the aim of this study was to develop store and access mechanisms for achieving data privacy, decentralisation, and load balancing in a data storage system. We explore how factors such as data privacy, file segmentation, security processes, and auditing mechanisms affect the performance of ubiquitous storage systems. We developed a trust evaluation model to reduce the access error rates, which are caused by the abnormal storage hosts or transmission failed. The file segmentation and encryption methods are used to store data in untrustworthy decentralised hosts. Although such data can be decrypted, they are difficult to recognise because a part of the transformed file is adopted to protect user privacy. Furthermore, with the developed mechanism, any user can share their storage and computing power to achieve blockchain-based peer-to-peer storage functions. We conducted a series of simulations to evaluate and compare the performance of the proposed data privacy mechanism and existing data privacy mechanisms in ubiquitous storage. The results indicated that the proposed mechanism outperformed other mechanisms.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17

Similar content being viewed by others

Data availability

The datasets generated and analysed during the current study are available in the cloud storage (https://drive.google.com/drive/folders/10KZtNpFkpTUTbPaBpzUzNx8AfFhV1oGm?usp=sharing).

References

  1. Fan Y, Zou J, Liu S, Yin Q, Guan X, Yuan X, Wu W, Du D (2020) A blockchain-based data storage framework: a rotating multiple random masters and error-correcting approach. Peer-to-Peer Netw Appl 13:1486–1504

    Article  Google Scholar 

  2. Zahed Benisi N, Aminian M, Javadi B (2020) Blockchain-based decentralized storage networks: a survey. J Netw Comput Appl 162:102656

    Article  Google Scholar 

  3. Lee K, Kim J, Kwak J, Kim Y (2022) Dynamic multi-resource optimization for storage acceleration in cloud storage systems. IEEE Trans Serv Comput (online first). https://doi.org/10.1109/TSC.2022.3173333

    Article  Google Scholar 

  4. Li J, Wu J, Chen L (2018) Block-secure: blockchain based scheme for secure P2P cloud storage. Inf Sci 465:219–231

    Article  Google Scholar 

  5. Vivekanandan M, Sastry VN, Reddy SU (2021) Blockchain based privacy preserving user authentication protocol for distributed mobile cloud environment. Peer-to-Peer Netw Appl 14:1572–1595

    Article  Google Scholar 

  6. Yang P, Xiong N, Ren J (2020) Data security and privacy protection for cloud storage: a survey. IEEE Access 8:131723–131740

    Article  Google Scholar 

  7. Ezhil Arasi V, Indra Gandhi K, Kulothungan K (2022) Auditable attribute-based data access control using blockchain in cloud storage. J Supercomput 78:10772–10798

    Article  Google Scholar 

  8. Kurmanbaev EA, Syrgabekov IN, Zadauly E, Karipzhanova AZ, Urazbaeva KT (2017) Information security system on the basis of the distributed storage with splitting of data. Int J Appl Eng Res 12(8):1703–1711

    Google Scholar 

  9. Chai B, Yan B, Yu J, Wang G (2022) BHE-AC: A blockchain-based high-efficiency access control framework for Internet of things. Pers Ubiquit Comput 26:971–982

    Article  Google Scholar 

  10. Tran QN, Turnbull BP, Wu HT, de Silva AJS, Kormusheva K, Hu J (2021) A survey on privacy-preserving blockchain systems (PPBS) and a novel PPBS-based framework for smart agriculture. IEEE open J Comput Soc 2:72–84

    Article  Google Scholar 

  11. Zhuang C, Dai Q, Zhang Y (2022) BCPPT: a blockchain-based privacy-preserving and traceability identity management scheme for intellectual property. Peer-to-Peer Netw Appl 15:724–738

    Article  Google Scholar 

  12. Miao Y, Huang Q, Xiao M, Li H (2020) Decentralized and privacy-preserving public auditing for cloud storage based on blockchain. IEEE Access 8:139813–139826

    Article  Google Scholar 

  13. Abbas A, Alroobaea R, Krichen M, Rubaiee S, Vimal S, Almansour FM (2021) Blockchain-assisted secured data management framework for health information analysis based on Internet of Medical Things. Pers Ubiquit Comput. https://doi.org/10.1007/s00779-021-01583-8

    Article  Google Scholar 

  14. Liang X, Zhao J, Shetty S, Liu J, Li D (2017) Integrating blockchain for data sharing and collaboration in mobile healthcare applications. In: 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), pp 1–5.

  15. Zhang Z, Zhang H, Wang J, Hu X, Li J, Yu W, Yu P, Li W, Cui B, Zhu G, Sood K, Will B, Guan H (2023) QKPT: securing your private keys in cloud with performance, scalability and transparency. IEEE Trans Dependable Secure Comput 20(1):478–491

    Article  Google Scholar 

  16. Chen D, Zhang R (2022) An open source project for tuning and analyzing MapReduce performance in Hadoop and Spark. IEEE Softw 39(1):61–69

    Article  Google Scholar 

  17. Wen YF, Chen YF, Chiu TK, Chen YC (2020) Performance enhancement for iterative data computing with in-memory concurrent processing. Concurr Comput: Pract Exper 32(7):e5593

    Article  Google Scholar 

  18. Li H, Han D, Tang M (2022) A privacy-preserving storage scheme for logistics data with assistance of blockchain. IEEE Internet Things J 9(6):4704–4720

    Article  Google Scholar 

  19. Filecoin, https://filecoin.io/, Access data: Apr. 20, 2023.

  20. Sia, https://sia.tech/, Access date: Apr. 20th, 2023.

  21. Wen YF, Huang CY (2022) Exploration of mined block temporarily holding and enforce fork attacks by selfish mining pool in proof-of-work blockchain systems. IEEE Access 10:61159–61174

    Article  Google Scholar 

  22. Gourisetti SNG, Mylrea M, Patangia H (2020) Evaluation and demonstration of blockchain applicability framework. IEEE Trans Eng Manag 67(4):1142–1156

    Article  Google Scholar 

  23. Wen YF, Hsu CM (2023) A performance evaluation of modular functions and state databases for hyperledger fabric blockchain systems. J Supercomput 79(3):2654–2690

    Article  Google Scholar 

  24. Huang L, Zhang G, Fu A (2018) Privacy-preserving public auditing for non-manager group shared data. Wireless Pers Commun 100:1277–1294

    Article  Google Scholar 

  25. Abdullah ZH, Udzir NI, Mahmod R, Samsudin K (2011) File integrity monitor scheduling based on file security level classification. Software Engineering and Computer Systems, Berlin, Heidelberg, J. M. Zain, W. M. b. Wan Mohd, and E. El-Qawasmeh, Eds., 2011, Springer Berlin Heidelberg, 177–189.

  26. Boneh D, Franklin M (2001) (2001) Identity-based encryption from the weil pairing. In: Kilian J (ed) Advances in Cryptology—CRYPTO, Berlin, Heidelberg. Springer, Berlin Heidelberg, pp 213–229

    Google Scholar 

  27. Sahai A, Waters B (2005) (2005) Fuzzy identity-based encryption. In: Cramer R (ed) Advances in Cryptology-Eurocrypt, Berlin, Heidelberg. Springer, Berlin Heidelberg, pp 457–473

    Google Scholar 

  28. Benet J (2014) IPFS-content addressed, versioned, P2P file system. arXiv preprint arXiv:1407.3561.

  29. Chen Y, Li H, Li K, Zhang J (2017) An improved P2P file system scheme based on IPFS and blockchain. In: 2017 IEEE International Conference on Big Data, pp 2652–2657.

  30. Zheng Q, Li Y, Chen P, Dong X (2018) An innovative IPFS-based storage model for blockchain. In: IEEE/WIC/ACM International Conference on Web Intelligence (WI), pp 704–708.

  31. Sigwart M, Borkowski M, Peise M, Schulte S, Stefan Tai S (2020) A secure and extensible blockchain-based data provenance framework for the Internet of Things. Pers Ubiquit Comput (online first). https://doi.org/10.1007/s00779-020-01417-z

    Article  Google Scholar 

  32. Lai C, Ma Z, Guo R, Zheng D (2022) Secure medical data sharing scheme based on traceable ring signature and blockchain. Peer-to-Peer Netw Appl 15:1562–1576

    Article  Google Scholar 

  33. Liu L, Zhang W, Han C (2021) A survey for the application of blockchain technology in the media. Peer-to-Peer Netw Appl 14:3143–3165

    Article  Google Scholar 

  34. Kamboj P, Khare S, Pal S (2021) User authentication using blockchain based smart contract in role-based access control. Peer-to-Peer Netw Appl 14:2961–2976

    Article  Google Scholar 

  35. Khalid MI, Ehsan I, Al-Ani AK, Iqbal J, Hussain S, UllahA SS, Nayab. (2023) Comprehensive survey on blockchain-based decentralized storage networks. IEEE Access 11:10995–11015

    Article  Google Scholar 

  36. Park GS, Song H (2016) A novel hybrid P2P and cloud storage system for retrievability and privacy enhancement. Peer-to-Peer Netw Appl 9:299–312

    Article  Google Scholar 

  37. Díaz AF, Anguita M, Camacho HE, Erik N, Julio O (2013) Two-level hash/table approach for metadata management in distributed file systems. J Supercomput 64:144–155

    Article  Google Scholar 

  38. MaidSafe, https://maidsafe.net/, Access date: Apr. 20th, 2023.

  39. Tian G, Hu Y, Wei J, Liu Z, Huang X, Chen X, Susilo W (2022) Blockchain-based secure deduplication and shared auditing in decentralized storage. IEEE Trans Dependable Secure Comput 19(6):3941–3954. https://doi.org/10.1109/TDSC.2021.3114160

    Article  Google Scholar 

  40. Hsieh MY, Huang YM, Chao HC (2007) Adaptive security design with malicious node detection in cluster-based sensor networks. Comput Commun 30(11):2385–2400

    Article  Google Scholar 

  41. Pires WR, Figueiredo THdP, Wong HC, Loureiro AAF (2004) Malicious node detection in wireless sensor networks. In: Proceedings of 18th International Parallel and Distributed Processing Symposium, pp 24.

  42. She W, Liu Q, Tian Z, Chen JS, Wang B, Liu W (2019) Blockchain trust model for malicious node detection in wireless sensor networks. IEEE Access 7:38947–38956

    Article  Google Scholar 

  43. Sultan S, Javaid Q, Malik AJ, Al-Turjman F, Attique M (2022) Collaborative-trust approach toward malicious node detection in vehicular ad hoc networks. Environ Dev Sustain 24(6):7532–7550

    Article  Google Scholar 

  44. Lessig L. (2008) Remix: Making art and commerce thrive in the hybrid economy. Penguin.

Download references

Funding

This work was supported in part by the National Science and Technology Council (NSTC), Taiwan, under Grant NSTC 111–2410-H-305–023, and National Taipei University, Taiwan, under Grant 2022-NTPU-ORDA-02.

Author information

Authors and Affiliations

Authors

Contributions

Y-FW and C-P Wang wrote the manuscript text and prepared all figures and tables together. Y-F handles the submission as well as correspond the following review processes and respond reviewers' and editors' comments. All authors reviewed the manuscript.

Corresponding author

Correspondence to Yean-Fu Wen.

Ethics declarations

Conflict of interest

The authors declare that they have no competing interests as defined by Springer, or other interests that might be perceived to influence the results and/or discussion reported in this paper.

Consent to publish

This manuscript is the authors' original work that the results/data/figures have not been published elsewhere, nor are they under consideration by another publisher.

Ethical approval

No participation of humans takes place in this implementation process.

Human and animal rights

No violation of Human and Animal Rights is involved.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wen, YF., Wang, CP. Data privacy mechanisms development and performance evaluation for personal and ubiquitous blockchain-based storage. J Supercomput 79, 19636–19670 (2023). https://doi.org/10.1007/s11227-023-05425-7

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-023-05425-7

Keywords

Navigation