A new blockchain-based personal privacy protection scheme

Nowadays, personal privacy disclosure issues become increasingly prominent in the process of data publishing. Targeting at this issue, a secure blockchain-based personal privacy protection scheme is proposed. In this paper, firstly, the information is stored in cloud service, and its hash value is used for the index, which is encrypted and stored on the blockchain. Secondly, based on the principles of cryptography and the characters of blockchain technology, we propose our scheme and use it to provide an access control mechanism for personal privacy. It can make the personal privacy protection easier and more efficient. At last, through our analysis, this scheme can sufficiently protect personal privacy in using mobile devices and provide a safe and trustworthy information acquisition method for data mining. More importantly, this proposed scheme also can provide a reliable and unique source tracing for multimedia copyright protection in terms of multimedia security.

[1]  Anirban Basu,et al.  MediBchain: A Blockchain Based Privacy Preserving Platform for Healthcare Data , 2017, SpaCCS Workshops.

[2]  Xindong Wu,et al.  Data mining with big data , 2014, IEEE Transactions on Knowledge and Data Engineering.

[3]  Naixue Xiong,et al.  Abnormal event detection in crowded scenes based on deep learning , 2016, Multimedia Tools and Applications.

[4]  Yusheng Ji,et al.  Mobile Edge Computing for the Internet of Vehicles: Offloading Framework and Job Scheduling , 2019, IEEE Vehicular Technology Magazine.

[5]  Michael Devetsikiotis,et al.  Blockchains and Smart Contracts for the Internet of Things , 2016, IEEE Access.

[6]  Ashiq Anjum,et al.  Blockchain Standards for Compliance and Trust , 2017, IEEE Cloud Computing.

[7]  Andreas Mitschele-Thiel,et al.  Latency Critical IoT Applications in 5G: Perspective on the Design of Radio Interface and Network Architecture , 2017, IEEE Communications Magazine.

[8]  Nn Van,et al.  A Blockchain-based Access Control for Big Data , 2017 .

[9]  Massimo Bartoletti,et al.  A Survey of Attacks on Ethereum Smart Contracts (SoK) , 2017, POST.

[10]  Naixue Xiong,et al.  On the throughput-energy tradeoff for data transmission between cloud and mobile devices , 2014, Inf. Sci..

[11]  J. Mervis U.S. science policy. Agencies rally to tackle big data. , 2012, Science.

[12]  Yang Xiao,et al.  Energy-efficient node scheduling algorithms for wireless sensor networks using Markov Random Field model , 2016, Inf. Sci..

[13]  Alfred Menezes,et al.  The Elliptic Curve Digital Signature Algorithm (ECDSA) , 2001, International Journal of Information Security.

[14]  Guoping Zhang,et al.  The Research of Access Control Based on UCON in the Internet of Things , 2011, J. Softw..

[15]  D. Boyd,et al.  CRITICAL QUESTIONS FOR BIG DATA , 2012 .

[16]  Oscar Novo,et al.  Blockchain Meets IoT: An Architecture for Scalable Access Management in IoT , 2018, IEEE Internet of Things Journal.

[17]  Naixue Xiong,et al.  A sustainable heuristic QoS routing algorithm for pervasive multi-layered satellite wireless networks , 2010, Wirel. Networks.

[18]  Ittay Eyal,et al.  Blockchain Technology: Transforming Libertarian Cryptocurrency Dreams to Finance and Banking Realities , 2017, Computer.

[19]  Naixue Xiong,et al.  Adaptive unequal protection for wireless video transmission over IEEE 802.11e networks , 2013, Multimedia Tools and Applications.

[20]  Feng Gao,et al.  A Blockchain-Based Privacy-Preserving Payment Mechanism for Vehicle-to-Grid Networks , 2018, IEEE Network.

[21]  Yuan-Shun Dai,et al.  Personalized Search Over Encrypted Data With Efficient and Secure Updates in Mobile Clouds , 2018, IEEE Transactions on Emerging Topics in Computing.

[22]  Qingyi Zhu,et al.  Applications of Distributed Ledger Technologies to the Internet of Things , 2019, ACM Comput. Surv..

[23]  Xuemin Shen,et al.  Securing Fog Computing for Internet of Things Applications: Challenges and Solutions , 2018, IEEE Communications Surveys & Tutorials.

[24]  P. Giungato,et al.  Current Trends in Sustainability of Bitcoins and Related Blockchain Technology , 2017 .

[25]  Praneeth Babu Marella,et al.  Ancile: Privacy-Preserving Framework for Access Control and Interoperability of Electronic Health Records Using Blockchain Technology , 2018 .

[26]  Ying Sun,et al.  A Secure Cryptocurrency Scheme Based on Post-Quantum Blockchain , 2018, IEEE Access.

[27]  Deepak Puthal,et al.  The Blockchain as a Decentralized Security Framework [Future Directions] , 2018, IEEE Consumer Electronics Magazine.

[28]  Anas Abou El Kalam,et al.  FairAccess: a new Blockchain-based access control framework for the Internet of Things , 2016, Secur. Commun. Networks.

[29]  Ke Xiao,et al.  A Blockchain Based Privacy-Preserving Incentive Mechanism in Crowdsensing Applications , 2018, IEEE Access.

[30]  Toshitaka Tsuda,et al.  Data Driven Cyber-Physical System for Landslide Detection , 2019, Mob. Networks Appl..

[31]  Domenico Rotondi,et al.  A capability-based security approach to manage access control in the Internet of Things , 2013, Math. Comput. Model..

[32]  Gang Xu,et al.  Secure multiparty computation of a comparison problem , 2016, SpringerPlus.