4.7 Article

PDPChain: A Consortium Blockchain-Based Privacy Protection Scheme for Personal Data

Related references

Note: Only part of the references are listed.
Article Engineering, Multidisciplinary

Towards Secure and Privacy-Preserving Data Sharing for COVID-19 Medical Records: A Blockchain-Empowered Approach

Liang Tan et al.

Summary: This paper proposes a blockchain-empowered security and privacy protection scheme for COVID-19 medical records, using ciphertext policy attribute-based encryption and uniform identity authentication to ensure security and privacy. With this scheme, medical institutions and users can safely and effectively manage and share COVID-19 electronic medical records.

IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING (2022)

Article Computer Science, Information Systems

A Mutual Security Authentication Method for RFID-PUF Circuit Based on Deep Learning

Wei Liang et al.

Summary: The Industrial Internet of Things (IIoT) aims to improve economic benefits by optimizing process controls, but the use of Radio Frequency Identification (RFID) technology in IIoT raises concerns about security and cost. To address these issues, a mutual authentication scheme incorporating Deep Learning techniques is proposed for secure access authentication of IC circuits on the IoT.

ACM TRANSACTIONS ON INTERNET TECHNOLOGY (2022)

Article Automation & Control Systems

A Blockchain-Based Auditable Access Control System for Private Data in Service-Centric IoT Environments

Dezhi Han et al.

Summary: This article proposes an auditable access control model based on attribute-based access control for managing private data's access control policy in IoT environments. A blockchain-based auditable access control system is also introduced to ensure data security and auditable access in IoT environments. Experimental results demonstrate high throughput and data security for real application scenarios.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2022)

Article Computer Science, Information Systems

Data Fusion Approach for Collaborative Anomaly Intrusion Detection in Blockchain-Based Systems

Wei Liang et al.

Summary: This article proposes a collaborative clustering-characteristic-based data fusion approach for intrusion detection in a Blockchain-based system. By using mathematical and AI models to train and analyze data, it accurately detects abnormal intrusion behavior.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Computer Science, Information Systems

EHRChain: A Blockchain-Based EHR System Using Attribute-Based and Homomorphic Cryptosystem

Fengqi Li et al.

Summary: This paper proposes a blockchain-based EHR system to solve the problems of secure storage, reliable sharing, access control, and privacy protection in the medical industry. The system achieves high performance by designing a medical record storage scheme, improving cryptographic primitives, and applying an additive homomorphic cryptosystem.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2022)

Article Computer Science, Information Systems

Deep Neural Network Security Collaborative Filtering Scheme for Service Recommendation in Intelligent Cyber-Physical Systems

Wei Liang et al.

Summary: Cyber-physical systems (CPSs) are secure real-time embedded systems that integrate physical and information worlds through high-speed real-time transmission. This study proposes a security collaborative filtering recommendation algorithm based on artificial intelligence to capture complex interaction information and accurately predict rating information.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Computer Science, Information Systems

A Blockchain-Based Multi-Cloud Storage Data Auditing Scheme to Locate Faults

Cheng Zhang et al.

Summary: This article introduces a blockchain-based multi-cloud storage data auditing scheme to ensure data integrity and resolve service disputes. The scheme utilizes blockchain to record interactions between users, service providers, and organizers as evidence, and employs smart contracts to identify malicious service providers. Theoretical analysis and experiments demonstrate the effectiveness and acceptable cost of the scheme in multi-cloud environments.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2022)

Article Computer Science, Artificial Intelligence

Attribute-based public integrity auditing for shared data with efficient user revocation in cloud storage

Jaya Rao Gudeme et al.

Summary: The paper proposes an attribute-based public auditing scheme for shared data in cloud storage, where users can sign data blocks over a set of attributes without revealing any identity information, and a unique public key is used to verify integrity. The scheme also achieves user revocation through proxy re-signatures.

JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2021)

Article Telecommunications

Novel private data access control scheme suitable for mobile edge computing

Wei Liang et al.

Summary: The study proposes an anonymous privacy data protection and access control scheme based on ECC and bilinear pairing to ensure the security of MEC communication, with freshness guaranteed by timestamps and random numbers, effectively reducing costs.

CHINA COMMUNICATIONS (2021)

Article Computer Science, Information Systems

Latency performance modeling and analysis for hyperledger fabric blockchain network

Xiaoqiong Xu et al.

Summary: Latency performance is crucial in assessing the effectiveness of Fabric blockchain, with many empirical studies analyzing this performance based on different hardware platforms.

INFORMATION PROCESSING & MANAGEMENT (2021)

Article Computer Science, Theory & Methods

Achieving efficient and Privacy-preserving energy trading based on blockchain and ABE in smart grid

Zhitao Guan et al.

Summary: With the arrival of the Industry 4.0 era, the development of smart cities based on the Internet of Things has reached a new level, with a focus on the security of wireless sensor networks. The Energy Internet, a key component supporting smart city construction, is increasingly emphasizing security and reliability, particularly in the use of blockchain technology for energy trading. However, privacy disclosure remains a challenge for many blockchain-based trading models, leading to the introduction of Ciphertext-Policy Attribute-Based Encryption as a core algorithm to address this issue.

JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING (2021)

Article Computer Science, Hardware & Architecture

An Efficient NIZK Scheme for Privacy-Preserving Transactions Over Account-Model Blockchain

Shunli Ma et al.

Summary: The study introduces an abstract framework of a decentralized smart contract system with balance and transaction amount hiding property over an account-model blockchain. A homomorphic public-key encryption scheme is used to build a concrete system with such properties and a highly efficient non-interactive zero knowledge (NIZK) argument is constructed based on the encryption scheme to ensure the validity of transactions. The proposed NIZK argument significantly improves the time efficiency in generating a proof compared to previous similar constructions, albeit at the expense of a relatively longer proof size.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2021)

Article Computer Science, Information Systems

BSSPD: A Blockchain-Based Security Sharing Scheme for Personal Data with Fine-Grained Access Control

Hongmin Gao et al.

Summary: Privacy protection and open sharing are essential in data governance in the AI-driven era. The BSSPD scheme combines blockchain, CP-ABE, and IPFS technologies to achieve secure sharing of personal data, allowing data owners to have fine-grained access control over their data.

WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2021)

Article Computer Science, Information Systems

Privacy preserving in blockchain-based government data sharing: A Service-On-Chain (SOC) approach

Chunhui Piao et al.

Summary: Sharing government data in blockchain systems is important for social development, but privacy breaches must be addressed. The Service-On-Chain (SOC) approach uses smart contracts to ensure data sharing trustworthiness and controllability among government departments.

INFORMATION PROCESSING & MANAGEMENT (2021)

Proceedings Paper Engineering, Electrical & Electronic

Blockchain-based Personal Data Trading System using Decentralized Identifiers and Verifiable Credentials

DaeGeun Yoon et al.

Summary: With the rise of artificial intelligence, the demand for personal data has increased, leading to companies collecting and utilizing user data. A proposed blockchain-based personal data trading system aims to provide users with decentralized means of authentication and ownership proof, reducing reliance on centralized service providers. Through the use of Decentralized Identifiers (DID) and Verifiable Credentials (VC), users are able to securely trade personal data without the need for intermediaries.

12TH INTERNATIONAL CONFERENCE ON ICT CONVERGENCE (ICTC 2021): BEYOND THE PANDEMIC ERA WITH ICT CONVERGENCE INNOVATION (2021)

Proceedings Paper Computer Science, Information Systems

Zether: Towards Privacy in a Smart Contract World

Benedikt Bunz et al.

FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2020 (2020)

Proceedings Paper Engineering, Electrical & Electronic

A Framework for Prediction and Storage of Battery Life in IoT Devices using DNN and Blockchain

Siva Rama Krishnan Somayaji et al.

2020 IEEE GLOBECOM WORKSHOPS (GC WKSHPS) (2020)

Proceedings Paper Computer Science, Information Systems

Blockchain Enabled Distributed Storage and Sharing of Personal Data Assets

Janis Grabis et al.

2020 IEEE 36TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING WORKSHOPS (ICDEW 2020) (2020)

Article Computer Science, Hardware & Architecture

Efficient decentralized multi-authority attribute based encryption for mobile cloud data storage

Voundi Koe Arthur Sandor et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2019)

Article Computer Science, Information Systems

A Blockchain-Based Framework for Data Sharing With Fine-Grained Access Control in Decentralized Storage Systems

Shangping Wang et al.

IEEE ACCESS (2018)

Proceedings Paper Computer Science, Information Systems

Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains

Elli Androulaki et al.

EUROSYS '18: PROCEEDINGS OF THE THIRTEENTH EUROSYS CONFERENCE (2018)

Proceedings Paper Computer Science, Information Systems

Ciphertext-policy attribute-based encryption

John Bethencourt et al.

2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS (2007)