DEPLEST: A blockchain-based privacy-preserving distributed database toward user behaviors in social networks

Abstract Social networks record a significant amount of user behavior data every day. By analyzing this behavior data, companies or attackers use it for marketing or more questionable purposes. We propose a blockchain-based model to protect the privacy of users’ data in such big data environments. Traditional blockchain methods require too many resources for this task, so we propose a model that secures sensitive user information in a distributed blockchain and passes nonsensitive information through to the primary system in order to manage the blockchain size. Our DEPLEST algorithm performs these synchronization operations to keep local database storage and computational capacity within the limits of individual users’ devices. We also propose a consensus protocol for blockchain ledger maintenance that runs well on typical client systems and prove that this protocol has excellent Byzantine fault tolerance (BFT). Our experimental results show that DEPLEST meets the architectural and performance needs and that our consensus protocol outperforms the existing proof of work (PoW) and proof of stake (PoS) methods in this application.

[1]  Laurence T. Yang,et al.  A Secure High-Order CFS Algorithm on Clouds for Industrial Internet of Things , 2018, IEEE Transactions on Industrial Informatics.

[2]  Zhao Yang Dong,et al.  Distributed Blockchain-Based Data Protection Framework for Modern Power Systems Against Cyber Attacks , 2019, IEEE Transactions on Smart Grid.

[3]  Eduardo Castelló Ferrer The blockchain: a new framework for robotic swarm systems , 2016, Proceedings of the Future Technologies Conference (FTC) 2018.

[4]  Laurence T. Yang,et al.  PPHOCFS: Privacy Preserving High-Order CFS Algorithm on the Cloud for Clustering Multimedia Data , 2016, ACM Trans. Multim. Comput. Commun. Appl..

[5]  O. Rand Limit cycles and stability of highly nonlinear periodic systems by harmonic variables , 1993 .

[6]  Nor Badrul Anuar,et al.  Malicious accounts: Dark of the social networks , 2017, J. Netw. Comput. Appl..

[7]  Michael Devetsikiotis,et al.  Blockchains and Smart Contracts for the Internet of Things , 2016, IEEE Access.

[8]  Zenggang Xiong,et al.  Privacy-preserving wireless communications using bipartite matching in social big data , 2017, Future Gener. Comput. Syst..

[9]  Dhiraj K. Pradhan,et al.  Consensus With Dual Failure Modes , 1991, IEEE Trans. Parallel Distributed Syst..

[10]  Muhammad Al-Qurishi,et al.  Leveraging Analysis of User Behavior to Identify Malicious Activities in Large-Scale Social Networks , 2018, IEEE Transactions on Industrial Informatics.

[11]  Dhiraj K. Pradhan,et al.  Degradable Byzantine agreement , 1995 .

[12]  Davor Svetinovic,et al.  Security and Privacy in Decentralized Energy Trading Through Multi-Signatures, Blockchain and Anonymous Messaging Streams , 2018, IEEE Transactions on Dependable and Secure Computing.

[13]  Jin Wang,et al.  Location Privacy Protection Based on Differential Privacy Strategy for Big Data in Industrial Internet of Things , 2018, IEEE Transactions on Industrial Informatics.

[14]  C. N. Zhang An improved binary algorithm for RSA , 1993 .

[15]  Feng Gao,et al.  A Blockchain-Based Privacy-Preserving Payment Mechanism for Vehicle-to-Grid Networks , 2018, IEEE Network.

[16]  Jiguo Yu,et al.  Mutual Privacy Preserving $k$ -Means Clustering in Social Participatory Sensing , 2017, IEEE Transactions on Industrial Informatics.

[17]  Victor I. Chang,et al.  Secure searching on cloud storage enhanced by homomorphic indexing , 2016, Future Gener. Comput. Syst..

[18]  K. Mani Chandy,et al.  A comparison of list schedules for parallel processing systems , 1974, Commun. ACM.

[19]  Victor I. Chang,et al.  Privacy-preserving smart IoT-based healthcare big data storage and self-adaptive access control system , 2018, Inf. Sci..

[20]  Gang Chen,et al.  Untangling Blockchain: A Data Processing View of Blockchain Systems , 2017, IEEE Transactions on Knowledge and Data Engineering.

[21]  Ghassan O. Karame,et al.  Double-spending fast payments in bitcoin , 2012, CCS.

[22]  Ana I. González-Tablas,et al.  Hindering false event dissemination in VANETs with proof-of-work mechanisms , 2012 .

[23]  Victor I. Chang,et al.  Location and trajectory privacy preservation in 5G-Enabled vehicle social network services , 2018, J. Netw. Comput. Appl..

[24]  Muthu Ramachandran,et al.  Efficient location privacy algorithm for Internet of Things (IoT) services and applications , 2017, J. Netw. Comput. Appl..

[25]  Victor I. Chang,et al.  Cross-domain dynamic anonymous authenticated group key management with symptom-matching for e-health social system , 2017, Future Gener. Comput. Syst..

[26]  Victor I. Chang,et al.  A Proposed Solution and Future Direction for Blockchain-Based Heterogeneous Medicare Data in Cloud Environment , 2018, Journal of Medical Systems.