Controlled Sharing Mechanism of Data Based on the Consortium Blockchain

In the process of sharing data, the costless replication of electric energy data leads to the problem of uncontrolled data and the difficulty of third-party access verification. )is paper proposes a controlled sharing mechanism of data based on the consortium blockchain. )e data flow range is controlled by the data isolation mechanism between channels provided by the consortium blockchain by constructing a data storage consortium chain to achieve trusted data storage, combining attribute-based encryption to complete data access control and meet the demands for granular data accessibility control and secure sharing; the data flow transfer ledger is built to record the original data life cycle management and effectively record the data transfer process of each data controller. Taking the application scenario of electric energy data sharing as an example, the scheme is designed and simulated on the Linux system and Hyperledger Fabric. Experimental results have verified that the mechanism can effectively control the scope of access to electrical energy data and realize the control of the data by the data owner.

[1]  Hua Zhang,et al.  Exploiting FastDFS Client-based Small File Merging , 2016 .

[2]  Ahmet M. Kondoz,et al.  Privacy-preserving blockchain based IoT ecosystem using attribute-based encryption , 2017, 2017 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS).

[3]  Xiaojiang Du,et al.  A Distributed Deep Learning System for Web Attack Detection on Edge Devices , 2020, IEEE Transactions on Industrial Informatics.

[4]  Xiaojiang Du,et al.  Privacy-Preserving and Efficient Aggregation Based on Blockchain for Power Grid Communications in Smart Communities , 2018, IEEE Communications Magazine.

[5]  Balaji Viswanathan,et al.  Performance Benchmarking and Optimizing Hyperledger Fabric Blockchain Platform , 2018, 2018 IEEE 26th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS).

[6]  Xiaojiang Du,et al.  CorrAUC: A Malicious Bot-IoT Traffic Detection Method in IoT Network Using Machine-Learning Techniques , 2021, IEEE Internet of Things Journal.

[7]  Mohamed H. Khafagy,et al.  Redundant Independent Files (RIF): A Technique for Reducing Storage and Resources in Big Data Replication , 2018, WorldCIST.

[8]  Marko Vukolic,et al.  Hyperledger fabric: a distributed operating system for permissioned blockchains , 2018, EuroSys.

[9]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[10]  Mohan Li,et al.  Deep Reinforcement Learning for Partially Observable Data Poisoning Attack in Crowdsensing Systems , 2020, IEEE Internet of Things Journal.

[11]  Alysson Bessani,et al.  A Byzantine Fault-Tolerant Ordering Service for the Hyperledger Fabric Blockchain Platform , 2017, 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).

[12]  Petar Popovski,et al.  Analysis of the Communication Traffic for Blockchain Synchronization of IoT Devices , 2017, 2018 IEEE International Conference on Communications (ICC).

[13]  Yi Han,et al.  Research on Intelligent Detection of Command Level Stack Pollution for Binary Program Analysis , 2020, Mobile Networks and Applications.

[14]  Michael Devetsikiotis,et al.  Blockchains and Smart Contracts for the Internet of Things , 2016, IEEE Access.

[15]  Xiaojiang Du,et al.  A Successive Framework: Enabling Accurate Identification and Secure Storage for Data in Smart Grid , 2020, ICC 2020 - 2020 IEEE International Conference on Communications (ICC).

[16]  Binxing Fang,et al.  A Survey on Access Control in the Age of Internet of Things , 2020, IEEE Internet of Things Journal.

[17]  Shoushan Luo,et al.  BFR-MPC: A Blockchain-Based Fair and Robust Multi-Party Computation Scheme , 2019, IEEE Access.

[18]  Nadra Guizani,et al.  AutoD: Intelligent Blockchain Application Unpacking Based on JNI Layer Deception Call , 2021, IEEE Network.

[19]  Yaling Zhang,et al.  A Blockchain-Based Framework for Data Sharing With Fine-Grained Access Control in Decentralized Storage Systems , 2018, IEEE Access.

[20]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[21]  Minyi Guo,et al.  Making Big Data Open in Edges: A Resource-Efficient Blockchain-Based Approach , 2019, IEEE Transactions on Parallel and Distributed Systems.

[22]  Meng Wang,et al.  Self-organized cyber physical power system blockchain architecture and protocol , 2018, Int. J. Distributed Sens. Networks.

[23]  Sungyong Park,et al.  A Distributed Oracle Using Intel SGX for Blockchain-Based IoT Applications , 2020, Sensors.

[24]  Yongqiang Lyu,et al.  Hyperconnected Network: A Decentralized Trusted Computing and Networking Paradigm , 2018, IEEE Network.

[25]  Jong-Hyouk Lee,et al.  A Group Signature and Authentication Scheme for Blockchain-Based Mobile-Edge Computing , 2020, IEEE Internet of Things Journal.

[26]  Jinqiao Shi,et al.  Toward a Comprehensive Insight Into the Eclipse Attacks of Tor Hidden Services , 2019, IEEE Internet of Things Journal.

[27]  Qing Yu,et al.  FASTDFS : A HIGH PERFORMANCE DISTRIBUTED FILE SYSTEM , 2014 .