Skip to main content
Log in

BCPPT: A blockchain-based privacy-preserving and traceability identity management scheme for intellectual property

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Currently, more and more intellectual property (IP) applications, including blockchain-based platforms, are presented to protect personal intellectual achievement. However, these applications are independent of each other, and the user’s identity information is controlled by an organization, which may not only reveal the user’s identity information due to the single point of failure, but also add extra communication overhead when the user accesses other applications. Additionally, current research focuses on the user’s control over their information, while the IP field requires tracing the user’s identity information in the event of IP dispute. In this paper, we propose a blockchain-based privacy-preserving and traceability identity management scheme for IP, where the user’s identity information is private and traceable. Our proposed scheme lets users generate their identity (ID) and corresponding public keys and private keys. Key pairs are used for authentication when accessing the services. We use blockchain to record ID and public key of the legitimate user, and adopt improved-Shamir secret sharing to achieve privacy-preserving and traceability of real identity information and reduce storage overhead. Experimental results confirm that our proposed scheme can protect user’s privacy and effectively reduce storage and computation overhead.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Zhang Y, Yu J, Hao R et al (2018) Enabling efficient user revocation in identity-based cloud storage auditing for shared big data. IEEE Trans Dependable Secure Comput 17(3):608–619

    Google Scholar 

  2. Goodell G, Aste T (2019) A decentralized digital identity architecture. Frontiers in Blockchain 2:17

    Article  Google Scholar 

  3. Othman A, Callahan J (2018) The Horcrux protocol: a method for decentralized biometric-based self-sovereign identity[C]//2018 international joint conference on neural networks (IJCNN). IEEE 1–7

  4. Nofer M, Gomber P, Hinz O et al (2017) Blockchain. Bus Inf Syst Eng 59(3):183–187

    Article  Google Scholar 

  5. Zheng Z, Xie S, Dai HN et al (2018) Blockchain challenges and opportunities: a survey. Int J Web Grid Serv 14(4):352–375

    Article  Google Scholar 

  6. Francisco K, Swanson D (2018) The supply chain has no clothes: Technology adoption of blockchain for supply chain transparency. Logistics 2(1):2

    Article  Google Scholar 

  7. Saberi S, Kouhizadeh M, Sarkis J et al (2019) Blockchain technology and its relationships to sustainable supply chain management. Int J Prod Res 57(7):2117–2135

    Article  Google Scholar 

  8. Yu KP, Tan L, Aloqaily M et al (2021) Blockchain-enhanced data sharing with traceable and direct revocation in IIoT. IEEE Trans Ind Inform

  9. Wang W, Xu H, Alazab M et al (2021) Blockchain-Based Reliable and Efficient Certificateless Signature for IIoT Devices. IEEE Trans Ind Inform

  10. Cai X, Geng S, Zhang J et al (2021) A sharding scheme based many-objective optimization algorithm for enhancing security in blockchain-enabled industrial internet of things. IEEE Trans Ind Inform

  11. Yaqoob I, Salah K, Jayaraman R et al (2021) Blockchain for healthcare data management: Opportunities, challenges, and future recommendations. Neural Comput App 1–16

  12. Ekblaw A, Azaria A, Halamka JD et al (2016) A case study for blockchain in healthcare: MedRec prototype for electronic health records and medical research data. Proc IEEE Open Big Data Conf 13:13

  13. Jacobovitz O (2016) Blockchain for identity management. The Lynne and William Frankel Center for Computer Science Department of Computer Science. Ben-Gurion University, Beer Sheva

  14. Gao Z, Xu L, Turner G et al (2018) Blockchain-based identity management with mobile device. Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for Distributed Systems 66–70

  15. Liu Y, He D, Obaidat MS et al (2020) Blockchain-based identity management systems: a review. J Netw Computer App 166:102731

  16. Hammi MT, Hammi B, Bellot P et al (2018) Bubbles of trust: a decentralized blockchain-based authentication system for IoT. Comput Secur 78:126–142

    Article  Google Scholar 

  17. Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613

    Article  MathSciNet  Google Scholar 

  18. Chen H, Wu HL, Chang CC et al (2019) Light repository blockchain system with multisecret sharing for industrial big data. Secur Commun Netw 2019

  19. Xue K et al (2019) A secure, efficient, and accountable edge-based access control framework for information centric networks. IEEE/ACM Trans Netw 27(3):1220–1233

    Article  Google Scholar 

  20. Wu F, Li X, Sangaiah A et al (2017) A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks. Futur Gener Comput Syst 82:9

    Google Scholar 

  21. Liu Z, Liu Z, Zhang L, Lin X (2020) MARP: a distributed mac layer attack resistant pseudonym scheme for VANET. IEEE Trans Dependable Secure Comput 17(4):869–882

    Article  Google Scholar 

  22. Premarathne U, Khalil I, Tari Z, Zomaya A (2015) Cloud-based utility service framework for trust negotiations using federated identity management. IEEE Trans Cloud Comput 5(2):290–302

    Article  Google Scholar 

  23. Bendiab G, Shiaeles S, Boucherkha S et al (2019) FCMDT: a novel fuzzy cognitive maps dynamic trust model for cloud federated identity management. Comput Secur 86:270–290

  24. Selvanathan N, Jayakody D, Damjanovic-Behrendt V (2019) Federated identity management and interoperability for heterogeneous cloud platform ecosystems. Proceedings of the 14th International Conference on Availability, Reliability and Security 1–7

  25. Basney J, Flanagan H, Fleury T et al (2019) CILogon: Enabling federated identity and access management for scientific collaborations. Proc Sci 351:031

    Google Scholar 

  26. Lenz T, Krnjic V (2018) Towards domain-specific and privacy-preserving qualified eID in a user-centric identity model. 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE). IEEE 1157–1163

  27. Beltran V, Martinez JA, Skarmeta AF (2017) User-centric access control for efficient security in smart cities. 2017 Global Internet of Things Summit (GIoTS). IEEE 1–6

  28. Dash P, Rabensteiner C, Hörandner F et al (2017) Towards privacy-preserving and user-centric identity management as a service. Open Identity Summit 2017

  29. Laborde R, Oglaza A, Wazan S et al (2020) A user-centric identity management framework based on the W3C verifiable credentials and the FIDO universal authentication framework. 2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC). IEEE 1–8

  30. Singh BC, Carminati B, Ferrari E (2019) Privacy-aware personal data storage (p-pds): Learning how to protect user privacy from external applications. IEEE Trans Dependable Secur Comput

  31. Ruffing T, Moreno-Sanchez P, Kate A (2014) Coinshuffle: Practical decentralized coin mixing for bitcoin. European Symposium on Research in Computer Security. Springer, Cham, pp 345–364

    Google Scholar 

  32. Ruffing T, Moreno-Sanchez P, Kate A (2017) P2P mixing and unlinkable bitcoin transactions. NDSS 1–15

  33. Ziyu W, Jianwei L, Zongyang Z et al (2018) Full anonymous blockchain based on aggregate signature and confidential transaction. J Comput Res Dev 55(10):2185

    Google Scholar 

  34. Saxena A, Misra J, Dhar A (2014) Increasing anonymity in bitcoin. International Conference on Financial Cryptography and Data Security. Springer, Berlin, Heidelberg, pp 122–139

  35. Xu J, Xue K, Tian H et al (2020) An identity management and authentication scheme based on redactable blockchain for mobile networks. IEEE Trans Veh Technol 69(6):6688–6698

    Article  Google Scholar 

  36. Gao S, Su Q, Zhang R et al (2021) A privacy-preserving identity authentication scheme based on the blockchain. Secur Commun Netw 2021

  37. Faber B, Michelet GC, Weidmann N et al (2019) BPDIMS: a blockchain-based personal data and identity management system

  38. ElGayyar MM, ElYamany HF, Grolinger K et al (2020) Blockchain-based federated identity and auditing. Int J Blockchains Cryptocurrencies 1(2):179–205

    Article  Google Scholar 

  39. Rathor S, Agrawal A (2020) A robust verification system for recruitment process by using blockchain technology. Int J Blockchains Cryptocurrencies 1(4):389–399

    Article  Google Scholar 

  40. He D, Zeadally S, Xu B et al (2015) An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Trans Inf Forensics Secur 10(12):2681–2691

    Article  Google Scholar 

  41. Chang CC, Tsai HC (2010) An anonymous and self-verified mobile authentication with authenticated key agreement for large-scale wireless networks. IEEE Trans Wireless Commun 9(11):3346–3353

    Article  MathSciNet  Google Scholar 

  42. Cui Z, Fei XUE, Zhang S et al (2020) A hybrid blockchain-based identity authentication scheme for multi-WSN. IEEE Trans Serv Comput 13(2):241–251

    Google Scholar 

  43. Almadhoun R, Kadadha M, Alhemeiri M et al (2018) A user authentication scheme of IoT devices using blockchain-enabled fog nodes. 2018 IEEE/ACS 15th International Conference on Computer Systems and Applications (AICCSA). IEEE 1–8

  44. Khan S, Jadhav A, Bharadwaj I et al (2020) Blockchain and the identity based encryption scheme for high data security. 2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC). IEEE 1005–1008

  45. Ito T, Kotani D, Okabe Y (2017) A threshold-based authentication system which provides attributes using secret sharing. 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC). IEEE 2:730–737

    Google Scholar 

  46. Liu Y, Cheng ZY, Chang CC et al (2012) A secure dynamic identity based remote user authentication scheme using secret sharing. J Internet Technol 13(3):463–470

    Google Scholar 

Download references

Acknowledgements

This work is supported by the Joint Fund of the National Natural Science Foundation of China and Guangdong Province (No. U1701266), and Key Laboratory Project of Intellectual Property Big Data in Guangdong Province (No. 2018B030322016).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chuxin Zhuang.

Ethics declarations

Conflict of interest

The authors have no conflicts of interest to declare that are relevant to the content of this article.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhuang, C., Dai, Q. & Zhang, Y. BCPPT: A blockchain-based privacy-preserving and traceability identity management scheme for intellectual property. Peer-to-Peer Netw. Appl. 15, 724–738 (2022). https://doi.org/10.1007/s12083-021-01277-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-021-01277-1

Keywords

Navigation