Skip to main content
Log in

Network data security sharing system based on blockchain

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Traditional network data security sharing system ignores that many people share data simultaneously, which leads to poor real-time performance. Therefore, the authors designed a network data security sharing system based on blockchain technology. In the hardware design, the PCI encryption card is used to encode the data. The microprocessor is used to access the system’s external equipment, and DDR-SDRAM dynamic storage area and NAND flash static memory are used as network data. In the software section of the system, a secure transmission mechanism is established. The cp-abe method is used to encrypt the network shared data, and the multi-person digital envelope technology is used to share the data. These two methods contribute to the design of the network data security sharing system. In the experiment, eight users share the data. The system login response time, key distribution time, data encryption time, and key update time are taken as the experimental objects. Experimental results show that the system response time, key distribution time, data encryption time, and key update time of the system are shorter than those of the comparison method.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Abdulla AA (2015) Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.694896

  2. Al-Saleem SM, Ali A, Khan N (2018) Energy efficient key agreement scheme for ubiquitous and continuous remote healthcare systems using data mining technique [J]. Clust Comput 21(5):1–12

    Google Scholar 

  3. Feilong T, Yang LT, Tang C et al (2018) A dynamical and load-balanced flow scheduling approach for big data centers in clouds [J]. IEEE Trans Cloud Comput 6(4):915–928

    Article  Google Scholar 

  4. Geng D (2020) Design of heterogeneous data integration and sharing system for coastal international trade [J]. J Coast Res 103(sp1):718

    Article  Google Scholar 

  5. Hassija V, Chamola V, Garg S, Krishna DNG, Kaddoum G, Jayakody DNK (2020) A Blockchain-based framework for lightweight data sharing and energy trading in V2G network [J]. IEEE Trans Veh Technol 69(6):5799–5812

    Article  Google Scholar 

  6. Herrera-Quintero LF, Samper-Zapater JJ, Svitek M, David W (2018) Special section on ITS services to Smart City context [guest editorial][J]. IEEE Intell Transp Syst Mag 10(2):4–5

    Article  Google Scholar 

  7. Leeuwen GV, Alskaif T, Gibescu M et al (2020) An integrated blockchain-based energy management platform with bilateral trading for microgrid communities [J]. Appl Energy 263(C):114–123

    Google Scholar 

  8. Lei K, Zhang Q, Lou JJ et al (2019) Securing ICN-based UAV Ad Hoc networks with blockchain[J]. IEEE Commun Mag 57(6):26–32

    Article  Google Scholar 

  9. Li CT, Lee CC, Weng CY (2018) A secure three party node authentication and key establishment scheme for the internet of things environment [J]. J Internet Technol 19(1):147–155

    Google Scholar 

  10. Li XY, Ma HD, Yao WB et al (2018) Data-driven and feedback-enhanced trust computing pattern for large-scale multi-cloud collaborative services [J]. IEEE Trans Serv Comput 11(4):671–684

    Article  Google Scholar 

  11. Liao X, Li K, Yin J (2017) Separable data hiding in encrypted image based on compressive sensing and discrete fourier transform [J]. Multimed Tools Appl

  12. Liao X, Guo S, Yin J et al (2017) New cubic reference table based image steganography [J]. Multimed Tools Appl 77(4):1–18

    Google Scholar 

  13. Nowlin BT, Wang J, Schafer JL et al (2018) Monocyte subsets exhibit transcriptional plasticity and a shared response to interferon in SIV-infected rhesus macaques [J]. J Leukoc Biol 103(1):141–155

    Article  Google Scholar 

  14. Pattipati DK, Tentu AN, Venkaiah VC et al (2016) Sequential secret sharing scheme based on level ordered access structure [J]. Int J Netw Secur 18(5):874–881

    Google Scholar 

  15. Shen J, Liu D, Lai C-F et al (2017) A secure identity-based dynamic group data sharing scheme for cloud computing [J]. J Internet Technol 18(4):833–842

    Google Scholar 

  16. Singh M, Aujla GS, Bali RS (2020) A deep learning-based blockchain mechanism for secure internet of drones environment [J]. IEEE Trans Intell Transp Syst PP(99):1–10. https://doi.org/10.1109/TITS.2020.2997469

  17. Wang J, Gao J, Yang X et al (2019) Online data reveal key factors on salary expectation [J]. Dianzi Keji Daxue Xuebao/J Univ Electron Sci Technol China 48(2):307–314

    Google Scholar 

  18. Wen F, Min F, Zhang YJ, Yang C (2019) Crude oil price shocks, monetary policy, and China’s economy [J]. Int J Financ Econ 24(2):812–827

    Article  Google Scholar 

  19. Yang J, Wen J, Jiang B, Wang H (2020) Blockchain-based sharing and tamper-proof framework of big data networking [J]. IEEE Netw 34(4):62–67

    Article  Google Scholar 

  20. Yin H, Guo DC, Wang K et al (2018) Hyperconnected network: a decentralized trusted computing and networking paradigm [J]. IEEE Netw 32(1):112–117

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xinghua Lu.

Ethics declarations

Conflict of interests

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lu, X., Liu, P., Ke, Y. et al. Network data security sharing system based on blockchain. Multimed Tools Appl 80, 31887–31906 (2021). https://doi.org/10.1007/s11042-021-11183-6

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-021-11183-6

Keywords

Navigation