基于扩展区块链的数据共享方案
Data Sharing Scheme Based on Extended Blockchain
DOI: 10.12677/CSA.2021.111007, PDF,    国家自然科学基金支持
作者: 徐墨庚, 张兴兰:北京工业大学信息学部,北京
关键词: 区块链数据共享默克尔帕特丽夏树公钥密码Blockchain Data Sharing Merkle Patricia Tree Public Key Cryptography
摘要: 近年来,数据已经成为各行各业的宝贵财富,传统的数据共享大多依赖第三方机构,这种集中式的存储和共享方式存在两个关键的挑战,一个是实现数据的安全和隐私保护存储,另一个是如何实现数据的共享,确保共享过程的安全性。针对以上问题,本文提出一个基于扩展区块链的数据共享方案,该方案结合区块链、存储服务器和加密技术,以创建一个可靠和安全的环境。链下存储服务器以加密形式存储原始数据,而数据的散列信息存储在区块链上。密码学技术用于处理数据加密和消息数字签名。与此同时,该方案使用扩展区块结构提供了一个灵活的授权访问模型,数据所有者可以在任何时间更改权限集,添加或撤消数据请求者对自己数据的访问权限,同时对第三方服务器的行为进行有效监督。实验及分析表明,该方案能够实现安全数据共享。
Abstract: In recent years, the data have become precious wealth of all walks of life. Traditional data sharing mostly rely on third parties, and this centralized way of storing and sharing has two key challenge: one is to realize the data storage security and privacy protection, and the other concern is how to realize the sharing of data and ensure the security of the sharing process. To solve the above problems, this paper proposes a data sharing scheme based on extended blockchain, which combines blockchain, storage server and encryption technology to create a reliable and secure environment. The offchain storage server stores the raw data in encrypted form, and the hash information of the data is stored on the blockchain. Cryptography is used to deal with data encryption and message digital signature. At the same time, the solution uses an extended block structure to provide a flexible authorization access model where data owners can change the permission set at any time, add or revoke access to their data from data requesters, and effectively monitor the behavior of third-party servers. The experiment and analysis show that the scheme can realize secure data sharing.
文章引用:徐墨庚, 张兴兰. 基于扩展区块链的数据共享方案[J]. 计算机科学与应用, 2021, 11(1): 56-66. https://doi.org/10.12677/CSA.2021.111007

参考文献

[1] 张聪丛, 郜颍颍, 赵畅, 杜洪涛. 开放政府数据共享与使用中的隐私保护问题研究——基于开放政府数据生命周期理论[J]. 电子政务, 2018(9): 24-36. http://dx.chinadoi.cn/10.16582/j.cnki.dzzw.2018.09.003
[2] Blockchain, S.M. (2015) Blueprint for a New Economy. O’Reilly Media, Sebastopol.
[3] 杨宝华, 陈昌. 区块链原理、设计与应用[M]. 北京: 机械工业出版社, 2017: 20-33.
[4] Nakamoto, S. (2008) Bitcoin: A Peer-to-Peer Electronic Cash Sys-tem.
https://bitcoin.org/bitcoin.pdf
[5] Kosba, A., Miller, A., Shi, E., Wen, Z. and Papamanthou, C. (2016) Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts. 2016 IEEE Symposium on Security and Privacy, San Jose, 22-26 May 2016, 839-858. [Google Scholar] [CrossRef
[6] Underwood, S. (2016) Blockchain Beyond Bitcoin. Communications of the ACM, 59, 15-17. [Google Scholar] [CrossRef
[7] Dorri, A., Kanhere, S.S., Jurdak, R. and Gauravaram, P. (2017) Blockchain for IoT Security and Privacy: The Case Study of a Smart Home. 2017 IEEE International Conference on Pervasive Computing and Communications Workshops, Kona, 13-17 March 2017, 618-623. [Google Scholar] [CrossRef
[8] Huh, S., Cho, S. and Kim, S. (2017) Managing IoT De-vices Using Blockchain Platform. 2017 19th International Conference on Advanced Communication Technology, Bongpyeong, 19-22 Febrary 2017, 464-467. [Google Scholar] [CrossRef
[9] Karame, G. and Capkun, S. (2018) Blockchain Security and Privacy. IEEE Security & Privacy, 16, 11-12. [Google Scholar] [CrossRef
[10] Wang, Y., Shen, Y., Wang, H., Cao, J.L. and Jiang, X.H. (2018) Mtmr: Ensuring Mapreduce Computation Integrity with Merkle Tree-Based Verifications. IEEE Transactions on Big Data, 4, 418-431. [Google Scholar] [CrossRef
[11] Koo, D., Shin, Y., Yun, J. and Hur, J. (2017) An Online Data-Oriented Authentication Based on Merkle Tree with Improved Reliability. 2017 IEEE International Conference on Web Services, Honolulu, 25-30 June 2017, 840-843. [Google Scholar] [CrossRef
[12] Zhu, J., Li, Q., Wang, C. and Ren, K. (2018) Enabling Generic, Verifiable, and Secure Data Search in Cloud Services. IEEE Transactions on Parallel and Distributed Systems, 29, 1721-1735. [Google Scholar] [CrossRef
[13] Salman, T., Zolanvari, M., Erbad, A., Jain, R. and Samaka, M. (2019) Security Services Using Blockchains: A State of the Art Survey. IEEE Communications Surveys & Tutorials, 21, 858-880. [Google Scholar] [CrossRef
[14] Qin, B., Huang, J., Wang, Q., Luo, X., Liang, B. and Shi, W. (2017) Cecoin: A Decentralized PKI Mitigating MitM Attacks. Future Generation Computer Systems, 107, 805-815. [Google Scholar] [CrossRef
[15] Fenu, G., Marchesi, L., Marchesi, M. and Tonelli, R. (2018) The ICO Phenomenon and Its Relationships with Ethereum Smart Contract Environment. 2018 International Workshop on Blockchain Oriented Software Engineering, Campobasso, 20 March 2018, 26-32. [Google Scholar] [CrossRef
[16] 祝跃飞, 张亚娟. 公钥密码学[M]. 北京: 高等教育出版社, 2010.
[17] 杨波. 现代密码学[M]. 北京: 清华大学出版社, 2007.