skip to main content
10.1145/3400286.3418242acmconferencesArticle/Chapter ViewAbstractPublication PagesracsConference Proceedingsconference-collections
research-article

Enhanced Privacy with Blockchain-based Storage for Data Sharing

Authors Info & Claims
Published:25 November 2020Publication History

ABSTRACT

The core concept of electronic money is blockchain, which can be regarded as a decentralized database. It is a decentralized storage service that does not rely on third-party storage. It records each transaction information on the block. Related applications include electronic ledgers, which further extend smart contracts. In storage, not only record transactions, but the extended smart contract can be used in medical treatment, recording the patient's medical records. However, there is a need for privacy in medical records, and it must be able to be accessed by appropriate people in accordance with the authority. So it needs a technology like Enigma to achieve it. Enigma uses multi-party computation (hereinafter referred to as MPC) and distributed hash-table (hereinafter referred to as DHT) technology, combined with the blockchain to divide the data to be stored into public blocks and private parts The blockchain has an existing way of computing and storing, and private data is Enigma's method of computing and storing by using the method called Off-Chain. Only authenticated users can access private data. However, many applications have the need for group sharing and decentralized records. This study uses Enigma to encrypt the data that requires privacy using the key of the encrypted file and then uploads it to DHT for storage, so that the owner of the private data can further share the data securely.

References

  1. Bela Gipp, Norman Meuschke, and André Gernandt. 2015. Decentralized trusted time stamping using the crypto currency bitcoin. arXiv preprint arXiv:1502.04015 (2015).Google ScholarGoogle Scholar
  2. James Heather and David Lundin. 2008. The append-only web bulletin board. In International Workshop on Formal Aspects in Security and Trust. Springer, 242--256.Google ScholarGoogle Scholar
  3. Mohamed Ali Kandi, Hicham Lakhlef, Abdelmadjid Bouabdallah, and Yacine Challal. 2020. A versatile Key Management protocol for secure Group and Device-to-Device Communication in the Internet of Things. Journal of Network and Computer Applications 150 (2020), 102480.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. C. Liao, Y. Lu, A. Pang, and T. Kuo. 2008. A Secure Routing Protocol for Wireless Embedded Networks. In 2008 14th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications. 421--426.Google ScholarGoogle Scholar
  5. Yung-Feng Lu and Chin-Fu Kuo. 2013. Robust and flexible tunnel management for secure private cloud. ACM SIGAPP Applied Computing Review 13, 1 (2013), 41--50.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Yung-Feng Lu, Jun Wu, and Chin-Fu Kuo. 2014. A Path Generation Scheme for Real-Time Green Internet of Things. ACM SIGAPP Applied Computing Review 14 (06 2014), 45--58. https://doi.org/10.1145/2656864.2656868Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Erik Meijering. 2002. A chronology of interpolation: from ancient astronomy to modern signal and image processing. Proc. IEEE 90, 3 (2002), 319--342.Google ScholarGoogle ScholarCross RefCross Ref
  8. Keju Meng, Fuyou Miao, and Yue Yu. 2019. A secure and efficient on-line/off-line group key distribution protocol. Designs, Codes and Cryptography 87, 7 (2019), 1601--1620.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Satoshi Nakamoto. 2019. Bitcoin: A peer-to-peer electronic cash system. Technical Report. Manubot.Google ScholarGoogle Scholar
  10. Sandro Rafaeli and David Hutchison. 2003. A survey of key management for secure group communication. ACM Computing Surveys (CSUR) 35, 3 (2003), 309--329.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Nakamoto Satoshi. 2008. Bitcoin: A peer-to-peer electronic cash system. Consulted 1, 2012 (2008), 28.Google ScholarGoogle Scholar
  12. Melanie Swan. 2015. Blockchain: Blueprint for a new economy. "O'Reilly Media, Inc.".Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. R Velumadhava Rao, K Selvamani, S Kanimozhi, and A Kannan. 2019. Hierarchical group key management for secure data sharing in a cloud-based environment. Concurrency and Computation: Practice and Experience 31, 12 (2019), e4866.Google ScholarGoogle Scholar
  14. Andrew C Yao. 1982. Protocols for secure computations. In 23rd annual symposium on foundations of computer science (sfcs 1982). IEEE, 160--164.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Guy Zyskind, Oz Nathan, and Alex Pentland. 2015. Enigma: Decentralized computation platform with guaranteed privacy. arXiv preprint arXiv:1506.03471 (2015).Google ScholarGoogle Scholar

Index Terms

  1. Enhanced Privacy with Blockchain-based Storage for Data Sharing

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        RACS '20: Proceedings of the International Conference on Research in Adaptive and Convergent Systems
        October 2020
        300 pages
        ISBN:9781450380256
        DOI:10.1145/3400286

        Copyright © 2020 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 25 November 2020

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed limited

        Acceptance Rates

        RACS '20 Paper Acceptance Rate42of148submissions,28%Overall Acceptance Rate393of1,581submissions,25%
      • Article Metrics

        • Downloads (Last 12 months)14
        • Downloads (Last 6 weeks)3

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader