Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3475992.3476000acmotherconferencesArticle/Chapter ViewAbstractPublication PagesbiotcConference Proceedingsconference-collections
research-article

Overview of Blockchain Data Privacy Protection

Published: 02 October 2021 Publication History

Abstract

Blockchain has the advantages of decentralization and distributed sharing of global ledger, but at the same time, it also has the risk of data privacy leakage. In order to prevent the privacy of blockchain users from being stolen by malicious attackers, there is still a large space for development of various protection mechanisms. At first, this paper analyzes the architecture of chain block, the Blockchain data privacy threat mainly summarized data for the application layer, network layer, data privacy threats to privacy, consensus layer data and transaction layer data privacy threats to privacy, and respectively summarized this paper introduces the principle of all kinds of privacy protection mechanism, characteristics, and different ways of implementation, Finally, it points out the future research direction of blockchain data privacy protection.

References

[1]
NAKAMOTO S. Bitcoin: A peer-to-peer electronic cash system[EB/OL]. https://bitcoin.org /bitcoin.pdf. 2008.
[2]
WOOD G. Ethereum: A secure decentralised generalised transaction ledger[EB/OL]. http://gavwood.com/Paper.pdf. 2014.
[3]
SWAN M. Blockchain: blueprint for a new economy[M]. “O'Reilly Media, Inc.”, 2015: 212-235.
[4]
Ron D, Shamir A . Quantitative Analysis of the Full Bitcoin Transaction Graph[C]// International Conference on Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2012.
[5]
LIU Hai,LI Xinghua,LUO Bin, etal.Distributed k-anonymity location privacy protection scheme based on blockchaiin[J].Chinese journal of Computers,2019,42(5):942-960.
[6]
BAYARDO R J, AGRAWAL R. Data privacy through optimal k-anonymization[C]//Proceedings. 21st International Conference on Data Engineering, 2005, ICDE 2005. 2005: 217-228.
[7]
DWORK C. A firm foundation for private data analysis[J]. Communications of the ACM, 2011, 54(1):86-95.
[8]
DWORK C, KENTHAPADI K, MCSHERRY F, Our data, ourselves: privacy via distributed noise generation[C]//International Conference on the Theory and Applications of Cryptographic Techniques. 2006:486-503.
[9]
DWORK C, MCSHERRY F, NISSIM K. Calibrating noise to sensitivity in private data analysis[M]//Theory of Cryptography. Springer Berlin Heidelberg, 2006:637-648.
[10]
DWORK C, NAOR M, PITASSI T, Differential privacy under continual observation[J]. Stoc, 2010:715-724. [10]DWORK C, NAOR M, PITASSI T, Pan-private streaming algorithms[C]//The First Symposium on Innovations in Computer Science. 2010: 66-80.
[11]
GENTRY C. A fully homomorphic encryption scheme [M]. Stanford University, 2009:112-130.
[12]
Bonneau J, Narayanan A, Miller A, Clark J, Kroll JA, Felten EW. Mixcoin: Anonymity for Bitcoin with accountable mixes. In: Proc. of the Int'l Conf. on Financial Cryptography and Data Security. 2014. 486−504.
[13]
Valenta L, Rowan B. Blindcoin: Blinded, accountable mixes for Bitcoin. In: Proc. of the Int'l Conf. on Financial Cryptography and Data Security. 2015. 112−126.
[14]
Ziegeldorf JH, Grossmann F, Henze M, Inden N, Wehrle K. Coinparty: Secure multi-party mixing of Bitcoins. In: Proc. of the 5th ACM Conf. on Data and Application Security and Privacy. 2015. 75−86 [22]Zhang N, Han N, Wen N . SMER:
[15]
O'reilly. Blockchain blueprint for a new economy.
[16]
Foroglou G, Tsilidou A L. Further Applications of the Blockchain [J /OL] Columbia Univ. PhD Sustain. Dev., 2015, 10.
[17]
Kosba A, Miller A, Shi E, Hawk: The Blockchain Model of Cryptography and Privacy − Preserving SmartContracts [C]/ / in 2016 IEEE Symposium on Security and Privacy (SP), 2016:839−858.
[18]
Zhang Y, Wen J, An IoT Electric Business Model Based on the Protocol of Bitcoin [C]/ / in Intelligence in Next Generation Networks (ICIN), 2015 18th International Conference on, 2015:184−191.
[19]
Zimmermann H. OSI Reference Model – The ISO Model of Architecture for Open Systems Interconnection [J]. IEEE Trans. Commun., 1980, 28(4):425−432.
[20]
Banasik W, Dziembowski S, Malinowski D.Efficient Zero− knowledge Contingent Payments in Cryptocurrencies without Scripts [C]/ /in European Symposium on Research in Computer Security,2016:261−280
[21]
Lua E K . A survey and comparison of peer-to-peer overlay network schemes[J]. IEEE Communications Surveys & Tutorials, 2006, 7(2):72-93.
[22]
Zhang N, Han N, Wen N . SMER: a secure method of exchanging resources in heterogeneous internet of things[J]. Frontiers of Computer Science in China, 2019, 13(6):1198-1209.
[23]
LUO J H. Overview on peer-to-peer[EB/OL]. http://www.intsci.ac.cn/users/luojw/P2P/.
[24]
Wang S, Zhang B . Research on RFID Information Security Technology Based on Elliptic Curve Algorithms[C]// 2019 International Conference on Communications, Information System and Computer Engineering (CISCE). Wuhan Donghu University;Wuhan Donghu University;, 2019.
[25]
EYAL I, SIRER E G. Majority is not enough: Bitcoin mining is vulnerable[C]. In: Financial Cryptography and Data Security—FC 2014. Springer Berlin Heidelberg, 2014: 436–454. [
[26]
NAYAK K, KUMAR S, MILLER A, Stubborn mining: Generalizing selfish mining and combining with an eclipse attack[C]. In: IEEE European Symposium on Security and Privacy. IEEE, 2016: 305–320. [
[27]
Zhang H, Duan H, Jianping W U . IP clustering based reputation system for anti-spam[J]. Journal of Tsinghua University, 2010, 50(10):1723-1727.
[28]
Alqahtani A A, El-Alfy E . Anonymous Connections Based on Onion Routing: A Review and a Visualization Tool[J]. Procedia Computer Science, 2015, 52(1):121-128.
[29]
Luo J, Yang M, Ling Z, Anonymous Communication and Darknet: A Survey[J]. Journal of Computer Research and Development, 2019.
[30]
Divecha H, Mehta S . Privacy Preserving Based on Geometric Transformation Using Data Perturbation Technique.
[31]
Qiao Kang. Research on Key Technologies of blockchain for 5g Internet of things data sharing [D]. University of information engineering of strategic support force, 2020
[32]
Wang X W, Hou S H . Improved Efficient Proxy Blind Signature Scheme[J]. Computer Science, 2019.
[33]
Gentry C, Brakerski Z, Vaikuntanathan V . (Leveled) Fully Homomorphic Encryption without Bootstrapping[J]. ACM transactions on computation theory, 2014.
[34]
Ateniese G, Benson K, Hohenberger S . Key-Private Proxy Re-encryption[C]// Topics in Cryptology - CT-RSA 2009, The Cryptographers' Track at the RSA Conference 2009, San Francisco, CA, USA, April 20-24, 2009. Proceedings. Springer, Berlin, Heidelberg, 2009.
[35]
Peng K . Attack against a batch zero-knowledge proof system[J]. Iet Information Security, 2012, 6(1):1-5.
[36]
Johnson D B, Matyas S M . Asymmetric Encryption: Evolution and Enhancements[J]. Cryptobytes, 1996.
[37]
Wang Y . The Digital Signature Technology Based on Digital Digest[J]. Journal of Nantong Textile Vocational Technology College, 2006.
[38]
Ding N, Gu D W . On sequential composition of precise zero-knowledge[J]. JOURNAL- SHANGHAI JIAOTONG UNIVERSITY -SCIENCE-, 2010.
[39]
Liu Lu, Li Yuxi, Zhou Fucai. Anonymous electronic investigation system based on non interactive zero knowledge proof [J]. Journal of network and information security, 2016, 2 (12): 39 ∼ 46
[40]
Liu J H, Yong Y U, Yang B, Related Randomness Attacks on Quasi-adaptive NIZK for Linear Subspaces Revisited[J]. Journal of Cryptologic Research, 2018.
[41]
Ren H, Zhang P, Shentu Q, Compact Ring Signature in the Standard Model for Blockchain[C]// International Conference on Information Security Practice & Experience. Springer, Cham, 2018.
[42]
Zhang J H, Xiao H, Wang J L . Efficient Identity-based RSA Multi-signature Scheme[J]. Journal of Chinese Computer Systems, 2018.
[43]
CHJANGO U. Consensus compare Casper vs Tendermin[EB/OL]. https://blog.cosmos.network/consensuscompare-casper-vs-tendermint-6df154ad56ae.
[44]
Liu Donghua, Xu Zhiwei, Li Wei. Two layer grid monitoring system based on directed acyclic graph [J]. Computer research and development, 2002,39 (8): 937-942 Human and societal aspects of security and privacy

Cited By

View all
  • (2024)Introduction to Cybersecurity Applications in Blockchain TechnologyBuilding Cybersecurity Applications with Blockchain and Smart Contracts10.1007/978-3-031-50733-5_1(3-28)Online publication date: 22-Feb-2024
  • (2023)Architectural Patterns for Blockchain Systems and Application DesignApplied Sciences10.3390/app13201153313:20(11533)Online publication date: 21-Oct-2023
  • (2023)EIP Security Analysis: Application Program Standards, Attack Events, and Security VulnerabilitiesProceedings of the 2023 7th International Conference on Electronic Information Technology and Computer Engineering10.1145/3650400.3650609(1239-1244)Online publication date: 20-Oct-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
BIOTC '21: Proceedings of the 2021 3rd Blockchain and Internet of Things Conference
July 2021
82 pages
ISBN:9781450389518
DOI:10.1145/3475992
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 02 October 2021

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Blockchain
  2. Data privacy protection
  3. Privacy protection technology
  4. Zero knowledge proof

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

BIOTC 2021

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)75
  • Downloads (Last 6 weeks)3
Reflects downloads up to 13 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Introduction to Cybersecurity Applications in Blockchain TechnologyBuilding Cybersecurity Applications with Blockchain and Smart Contracts10.1007/978-3-031-50733-5_1(3-28)Online publication date: 22-Feb-2024
  • (2023)Architectural Patterns for Blockchain Systems and Application DesignApplied Sciences10.3390/app13201153313:20(11533)Online publication date: 21-Oct-2023
  • (2023)EIP Security Analysis: Application Program Standards, Attack Events, and Security VulnerabilitiesProceedings of the 2023 7th International Conference on Electronic Information Technology and Computer Engineering10.1145/3650400.3650609(1239-1244)Online publication date: 20-Oct-2023
  • (2023)P‐2.24: A Survey of Privacy Protection Research based on Virtual RealitySID Symposium Digest of Technical Papers10.1002/sdtp.1635854:S1(572-576)Online publication date: 3-Aug-2023

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media