基于联盟链的安全公平细粒度数据交易方案
A Secure and Fair Fine-Grained Data Trading Scheme Based on Consortium Blockchain
DOI: 10.12677/ORF.2023.133182, PDF,    国家自然科学基金支持
作者: 白 瑞, 陈玉玲, 谭超月, 杨宇项:贵州大学公共大数据国家重点实验室、计算机科学与技术学院,贵州 贵阳
关键词: 数据交易联盟链智能合约属性基加密群签名Data Trading Consortium Blockchain Smart Contracts Attribute-Based Encryption Group Signature
摘要: 针对当前区块链数据交易中数据安全、数据滥用、数据隐私等问题,提出一种基于联盟链与属性基加密的数据交易方案,为满足数据卖家的细粒度访问控制的需求,提高数据价值,利用密文策略属性基加密技术保护待售数据安全,保证只有拥有特定属性的数据买家才可以购买并正确解密数据;针对数据交易中身份隐私保护与监管追溯难以平衡问题,引入智能合约以及群签名技术实现了数据交易的安全可信以及匿名可追溯。最后,对提出的方案进行安全性分析以及仿真实验,结果表明所提方案可以实现安全公平的细粒度数据交易。
Abstract: This paragraph presents a data trading scheme that leverages a consortium blockchain and attribute-based encryption to address various issues such as data security, misuse, and privacy in blockchain data trading. In order to meet the fine-grained access control requirements of data sellers and increase data value, the scheme employs ciphertext-policy attribute-based encryption technology to secure data for sale and ensure that only data buyers with specific attributes can purchase and correctly decrypt the data. Furthermore, to strike a balance between identity privacy protection and regulatory traceability in data trading, the scheme utilizes smart contracts and group signature technology to achieve secure and anonymous traceability of data trading. Finally, through security analysis and simulation experiments, the effectiveness of the proposed scheme is demonstrated in achieving efficient and fine-grained data trading.
文章引用:白瑞, 陈玉玲, 谭超月, 杨宇项. 基于联盟链的安全公平细粒度数据交易方案[J]. 运筹与模糊学, 2023, 13(3): 1824-1838. https://doi.org/10.12677/ORF.2023.133182

参考文献

[1] Muschalle, A., Stahl, F., Löser, A. and Vossen, G. (2013) Pricing Approaches for Data Markets. In: Castellanos, M., Dayal, U. and Rundensteiner, E.A., Eds., Enabling Real-Time Business Intelligence. BIRTE 2012. Lecture Notes in Business Information Processing, Vol. 154, Springer, Berlin, 129-144. [Google Scholar] [CrossRef
[2] 刘峰, 杨杰, 齐佳音. 区块链密码学隐私保护技术综述[J]. 网络与信息安全学报, 2022, 8(4): 29-44.
[3] 江东, 袁野, 张小伟, 王国仁. 数据定价与交易研究综述[J]. 软件学报, 2023, 34(3): 1396-1424.
[4] 袁勇, 王飞跃. 区块链技术发展现状与展望[J]. 自动化学报, 2016, 42(4): 481-494.
[5] 曹萌, 于洋, 梁英, 史红周. 基于区块链的大数据交易关键技术与发展趋势[J]. 计算机科学, 2021, 48(S2): 184-190.
[6] Jung, T., Li, X.-Y., Huang, W., Qiao, Z., Qian, J., Chen, L., Han, J. and Hou, J. (2019) AccountTrade: Accountability against Dishonest Big Data Buyers and Sellers. IEEE Transactions on Information Forensics and Security, 14, 223-234. [Google Scholar] [CrossRef
[7] Sadiq, A., Javaid, N., Samuel, O., Khalid, A., Haider, N. and Imran, M. (2020) Efficient Data Trading and Storage in Internet of Vehicles using Consortium Blockchain. 2020 International Wireless Communications and Mobile Computing (IWCMC), Limassol, 15-19 June 2020, 2143-2148. [Google Scholar] [CrossRef
[8] Abubaker, Z., Khan, A.U., Almogren, A., Abbas, S., Javaid, A., Radwan, A. and Javaid, N. (2022) Trustful Data Trading through Monetizing IoT Data Using BlockChain Based Review System. Concurrency and Computation: Practice and Experience, 34, e6739. [Google Scholar] [CrossRef
[9] Chen, F., Wang, J., Jiang, C., Xiang, T. and Yang, Y. (2022) Blockchain Based Non-Repudiable IoT Data Trading: Simpler, Faster, and Cheaper. IEEE INFOCOM 2022—IEEE Conference on Computer Communications, London, 2-5 May 2022, 1958-1967. [Google Scholar] [CrossRef
[10] Li, C., Liang, S.Y., Zhang, J., Wang, Q. and Luo, Y. (2022) Blockchain-Based Data Trading in Edge-Cloud Computing Environment. Information Processing & Management, 59, Article ID: 102786. [Google Scholar] [CrossRef
[11] 杨洸. 数字媒体时代的数据滥用: 成因、影响与对策[J]. 中国出版, 2020(12): 3-8.
[12] Sahai, A. and Waters, B. (2005) Fuzzy Identity-Based Encryption. In: Cramer, R., Ed., Advances in Cryptology—EUROCRYPT 2005. EUROCRYPT 2005. Lecture Notes in Computer Science, Vol. 3494, Springer, Berlin, 457-473. [Google Scholar] [CrossRef
[13] Goyal, V., Pandey, O., Sahai, A. and Waters, B. (2006) Attrib-ute-Based Encryption for Fine-Grained Access Control of Encrypted Data. Proceedings of the 13th ACM Conference on Computer and Communications Security, Alexandria, 30 October-3 November 2006, 89-98. [Google Scholar] [CrossRef
[14] Chaum, D. and van Heyst, E. (1991) Group Signatures. In: Davies, D.W., Ed., Advances in Cryptology—EUR- OCRYPT ’91. EUROCRYPT 1991. Lecture Notes in Computer Science, Vol. 547, Springer, Berlin, 257-265. [Google Scholar] [CrossRef
[15] Li, R., Shen, C., He, H., Gu, X., Xu, Z. and Xu, C.-Z. (2018) A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing. IEEE Transactions on Cloud Computing, 6, 344-357. [Google Scholar] [CrossRef
[16] Szabo, N. (1997) Formalizing and Securing Rela-tionships on Public Networks. First Monday, 2. [Google Scholar] [CrossRef
[17] 贺海武, 延安, 陈泽华. 基于区块链的智能合约技术与应用综述[J]. 计算机研究与发展, 2018, 55(11): 2452-2466.
[18] Bethencourt, J., Sahai, A. and Waters, B. (2007) Cipher-text-Policy Attribute-Based Encryption. 2007 IEEE Symposium on Security and Privacy (SP ’07), Berkeley, 20-23 May 2007, 321-334. [Google Scholar] [CrossRef
[19] 李姝, 赵培培, 于金刚, 王海汀. 基于区块链的数据交易平台的研究与设计[J]. 小型微型计算机系统, 2021, 42(5): 1109-1114.
[20] Li, T., Li, D. and Wang, M. (2022) Blockchain-Based Fair and Decentralized Data Trading Model. The Computer Journal, 65, 2133-2145. [Google Scholar] [CrossRef
[21] 朱自强, 姚中原, 祝卫华, 赵海鸿, 潘长风, 斯雪明. 匿名可追溯的区块链数据交易方案[J]. 应用科学学报, 2022, 40(4): 653-665.