ABSTRACT
Promoting data sharing to recreate greater value has been an important development trend in recent years. However, the drawbacks of centralized storage, data leakage risk, and the lack of trust mechanisms among entities exposed by traditional data sharing models have seriously reduced users' willingness to share data and hindered the maximization of data value. Blockchain technology, which has emerged and gradually popularized, provides new ideas for secure data sharing by virtue of its decentralization, traceability, trustlessness and programmability, but a series of problems such as compatibility, performance, security and privacy have also brought serious challenges to it. According to the research results in recent years, we conduct an overview of the layered technology architecture of blockchain-based secure data sharing model by particularly emphasizing on the distributed storage technology, data sharing mechanisms and associated cryptography algorithms. And we also expound the challenges faced by the current research as well as the prospect of future research directions.
- Parks A. Unfair Collection: Reclaiming Control of Publicly Available Personal Information from Internet Data Scrapers[J]. 2021.Google Scholar
- Nicolas Sklavos. Book Review: Stallings, W. Cryptography and Network Security: Principles and Practice, Information Security Journal: A Global Perspective, 2014, 23:1-2, 49-50, DOI: 10.1080/19393555.2014.900834Google ScholarDigital Library
- Donet J A D, Pérez-Sola C, Herrera-Joancomartí J. The Bitcoin P2P network[C]//International conference on financial cryptography and data security. Springer, Berlin, Heidelberg, 2014: 87-102.Google Scholar
- Tan M, Yang J, Li X, Review of Consensus Mechanism of Blockchain[J]. Computer Engineering, 2020, 46(12): 1-11.Google Scholar
- Zheng Z, Xie S, Dai H N, An overview on smart contracts: Challenges, advances and platforms[J]. Future Generation Computer Systems, 2020, 105: 475-491.Google ScholarDigital Library
- Nakamoto S. Bitcoin: A peer-to-peer electronic cash system[J]. Decentralized Business Review, 2008: 21260.Google Scholar
- Chen L, Lee W K, Chang C C, Blockchain based searchable encryption for electronic health record sharing[J]. Future generation computer systems, 2019, 95: 420-429.Google Scholar
- Nguyen D C, Pathirana P N, Ding M, Blockchain for secure ehrs sharing of mobile cloud based e-health systems[J]. IEEE access, 2019, 7: 66792-66806.Google ScholarCross Ref
- Vora J, Nayyar A, Tanwar S, BHEEM: A blockchain-based framework for securing electronic health records[C]//2018 IEEE Globecom Workshops (GC Wkshps). IEEE, 2018: 1-6.Google Scholar
- Kong Q, Su L, Ma M. Achieving privacy-preserving and verifiable data sharing in vehicular fog with blockchain[J]. IEEE Transactions on Intelligent Transportation Systems, 2020.Google Scholar
- Su Z, Wang Y, Xu Q, LVBS: Lightweight vehicular blockchain for secure data sharing in disaster rescue[J]. IEEE Transactions on dependable and secure computing, 2020.Google Scholar
- Wang D, Zhang X. Secure data sharing and customized services for intelligent transportation based on a consortium blockchain[J]. IEEE Access, 2020, 8: 56045-56059.Google ScholarCross Ref
- Esposito C, Ficco M, Gupta B B. Blockchain-based authentication and authorization for smart city applications[J]. Information Processing & Management, 2021, 58(2): 102468.Google ScholarCross Ref
- Qian Y, Liu Z, Yang J, A method of exchanging data in smart city by blockchain[C]//2018 IEEE 20th International Conference on High Performance Computing and Communications; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC/SmartCity/DSS). IEEE, 2018: 1344-1349.Google Scholar
- Alcarria R, Bordel B, Robles T, A blockchain-based authorization system for trustworthy resource monitoring and trading in smart communities[J]. Sensors, 2018, 18(10): 3561.Google ScholarCross Ref
- Wu H, Cao J, Yang Y, Data management in supply chain using blockchain: Challenges and a case study[C]//2019 28th International Conference on Computer Communication and Networks (ICCCN). IEEE, 2019: 1-8.Google Scholar
- Xu L, Chen L, Gao Z, Coc: Secure supply chain management system based on public ledger[C]//2017 26th International Conference on Computer Communication and Networks (ICCCN). IEEE, 2017: 1-6.Google Scholar
- Min Y, Baek Y T. A Study on the Application of Block Chain Ethereum Technology to Activate Digital Contents Trading as Sharing economy-data encryption and modify merkle tree[J]. Journal of The Korea Society of Computer and Information, 2018, 23(10): 73-80.Google Scholar
- Buterin V. A next-generation smart contract and decentralized application platform[J]. white paper, 2014, 3(37).Google Scholar
- IBM. Hyperledger Architecture [EB/OL]. [2019-05-18].Google Scholar
- https://www.hyperledger.org/wpcontent/uploads/2017/08/Hyperledger_Arch_WG_Paper_1_Consensus.pdf.Google Scholar
- Jin H, Luo Y, Li P, A review of secure and privacy-preserving medical data sharing[J]. IEEE Access, 2019, 7: 61656-61669.Google ScholarCross Ref
- Benet J. Ipfs-content addressed, versioned, p2p file system[J]. arXiv preprint arXiv:1407.3561, 2014.Google Scholar
- Karger D, Lehman E, Leighton T, Consistent hashing and random trees: Distributed caching protocols for relieving hot spots on the world wide web[C]//Proceedings of the twenty-ninth annual ACM symposium on Theory of computing. 1997: 654-663.Google Scholar
- Liu B, Yu X L, Chen S, Blockchain based data integrity service framework for IoT data[C]//2017 IEEE International Conference on Web Services (ICWS). IEEE, 2017: 468-475.Google Scholar
- Wang S, Zhang Y, Zhang Y. A blockchain-based framework for data sharing with fine-grained access control in decentralized storage systems[J]. Ieee Access, 2018, 6: 38437-38450.Google ScholarCross Ref
- Ali M S, Dolui K, Antonelli F. IoT data privacy via blockchains and IPFS[C]//Proceedings of the seventh international conference on the internet of things. 2017: 1-7.Google Scholar
- Zyskind G, Nathan O. Decentralizing privacy: Using blockchain to protect personal data[C]//2015 IEEE Security and Privacy Workshops. IEEE, 2015: 180-184.Google Scholar
- Sukhodolskiy I, Zapechnikov S. A blockchain-based access control system for cloud storage[C]//2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus). IEEE, 2018: 1575-1578.Google Scholar
- Dubovitskaya A, Xu Z, Ryu S, Secure and trustable electronic medical records sharing using blockchain[C]//AMIA annual symposium proceedings. American Medical Informatics Association, 2017, 2017: 650.Google Scholar
- Kang J, Yu R, Huang X, Blockchain for secure and efficient data sharing in vehicular edge computing and networks[J]. IEEE Internet of Things Journal, 2018, 6(3): 4660-4670.Google ScholarCross Ref
- Zhang A, Lin X. Towards secure and privacy-preserving data sharing in e-health systems via consortium blockchain[J]. Journal of medical systems, 2018, 42(8): 1-18.Google Scholar
- Gaetani E, Aniello L, Baldoni R, Blockchain-based database to ensure data integrity in cloud computing environments[J]. 2017.Google Scholar
- Poon J, Dryja T. The Bitcoin lightning network: Scalable off-chain instant payments. https://lightning.network/lightning-networkpaper.pdfGoogle Scholar
- Lerner SD. RSK white paper overview. https://bravenewcoin.com/assets/Whitepapers/RootstockWhitePaperv9-Overview.pdfGoogle Scholar
- Wood G. Polkadot: Vision for a heterogeneous multi-chain framework. https://github.com/polkadot-io/polkadotpaper/raw/master/ PolkaDotPaper.pdfGoogle Scholar
- Kwon J, Buchman E. Cosmos: A network of distributed ledgers. https://github.com/cosmos/cosmos/blob/master/WHITEPAPER.mdGoogle Scholar
- Hearn M. Corda: A distributed ledger. https://docs.corda.net/_static/corda-technical-whitepaper.pdfGoogle Scholar
- Thomas S, Schwartz E. A protocol for interledger payments. https://interledger.org/interledger.pdfGoogle Scholar
- Ouaddah A, Abou Elkalam A, Ait Ouahman A. FairAccess: a new Blockchain‐based access control framework for the Internet of Things[J]. Security and communication networks, 2016, 9(18): 5943-5964.Google Scholar
- Ouaddah A, Abou Elkalam A, Ouahman A A. Towards a novel privacy-preserving access control model based on blockchain technology in IoT[M]//Europe and MENA cooperation advances in information and communication technologies. Springer, Cham, 2017: 523-533.Google Scholar
- Ekblaw A, Azaria A, Halamka J D, A Case Study for Blockchain in Healthcare:“MedRec” prototype for electronic health records and medical research data[C]//Proceedings of IEEE open & big data conference. 2016, 13: 13.Google Scholar
- Azaria A, Ekblaw A, Vieira T, Medrec: Using blockchain for medical data access and permission management[C]//2016 2nd international conference on open and big data (OBD). IEEE, 2016: 25-30.Google Scholar
- Xue T F, Fu Q C, Wang C, Study on medical data sharing model based on blockchain.[J]. Acta Automatica Sinica, 2017, 43(9): 1555-1562.Google Scholar
- Rivest R L, Adleman L, Dertouzos M L. On data banks and privacy homomorphisms[J]. Foundations of secure computation, 1978, 4(11): 169-180.Google Scholar
- Gentry C. A fully homomorphic encryption scheme[M]. Stanford university, 2009.Google Scholar
- Zhang L, Wang X, Hu F, Data Sharing model of smart grid based on double consortium Blockchain[J]. Journal of Computer Application, 2021, 41(04): 963-969.Google Scholar
- Fiat A, Naor M. Broadcast encryption[C]//Annual International Cryptology Conference. Springer, Berlin, Heidelberg, 1993: 480-491.Google Scholar
- Jin H, Zhou K, Jiang H, Full integrity and freshness for cloud data[J]. Future Generation Computer Systems, 2018, 80: 640-652.Google ScholarDigital Library
- Blaze M, Bleumer G, Strauss M. Divertible protocols and atomic proxy cryptography[C]//International Conference on the Theory and Applications of Cryptographic Techniques. Springer, Berlin, Heidelberg, 1998: 127-144.Google Scholar
- Ateniese G, Fu K, Green M, Improved proxy re-encryption schemes with applications to secure distributed storage[J]. ACM Transactions on Information and System Security (TISSEC), 2006, 9(1): 1-30.Green M, Ateniese G. Identity-based proxy re-encryption[C]//International Conference on Applied Cryptography and Network Security. Springer, Berlin, Heidelberg, 2007: 288-306.Google Scholar
- Green M, Ateniese G. Identity-based proxy re-encryption[C]//International Conference on Applied Cryptography and Network Security. Springer, Berlin, Heidelberg, 2007: 288-306.Google ScholarDigital Library
- Obour Agyekum K O B, Xia Q, Sifah E B, A secured proxy-based data sharing module in IoT environments using blockchain[J]. Sensors, 2019, 19(5): 1235.Google ScholarCross Ref
- Song D X, Wagner D, Perrig A. Practical techniques for searches on encrypted data[C]//Proceeding 2000 IEEE symposium on security and privacy. S&P 2000. IEEE, 2000: 44-55.Google Scholar
- Wang C, Cao N, Li J, Secure ranked keyword search over encrypted cloud data[C]//2010 IEEE 30th international conference on distributed computing systems. IEEE, 2010: 253-262.Google Scholar
- Li J, Wang Q, Wang C, Fuzzy keyword search over encrypted data in cloud computing[C]//2010 Proceedings IEEE INFOCOM. IEEE, 2010: 1-5.Google Scholar
- Shamir A. Identity-based cryptosystems and signature schemes[C]//Workshop on the theory and application of cryptographic techniques. Springer, Berlin, Heidelberg, 1984: 47-53.Google Scholar
- Sahai A, Waters B. Fuzzy identity-based encryption[C]//Annual international conference on the theory and applications of cryptographic techniques. Springer, Berlin, Heidelberg, 2005: 457-473.Google Scholar
- Barua M, Liang X, Lu R, ESPAC: Enabling Security and Patient-centric Access Control for eHealth in cloud computing[J]. International Journal of Security and Networks, 2011, 6(2-3): 67-76.Google ScholarDigital Library
- Back A, Corallo M, Dashjr L, Friedenbach M, Maxwell G, Miller A, Poelstra A, Timón J, Wuille P. Enabling blockchain innovations with pegged sidechains. https://blockstream.com/sidechains.pdfGoogle Scholar
- Poon J, Buterin V. Plasma: Scalable autonomous smart contracts. https://plasma.io/plasma.pdfGoogle Scholar
Recommendations
Blockchain for decentralization of internet: prospects, trends, and challenges
AbstractBlockchain has made an impact on today’s technology by revolutionizing the financial industry through utilization of cryptocurrencies using decentralized control. This has been followed by extending Blockchain to span several other industries and ...
A Blockchain-Based IoT Data Management System for Secure and Scalable Data Sharing
Network and System SecurityAbstractAt present, the centralized architecture for the Internet of Things (IoT) data management faces the risks of data leakage, single-point failure, and vulnerability to malicious attacks. Recently, many researchers and security analysts are focusing ...
Federated deep reinforcement learning based secure data sharing for Internet of Things
AbstractThe increasing number of Internet of Things (IoT) devices motivate the data sharing that improves the quality of IoT services. However, data providers usually suffer from the privacy leakage caused by direct data sharing. To solve this ...
Comments