A new blockchain-based personal privacy protection scheme

  • PDF / 558,022 Bytes
  • 14 Pages / 439.37 x 666.142 pts Page_size
  • 11 Downloads / 173 Views

DOWNLOAD

REPORT


A new blockchain-based personal privacy protection scheme Yu-Long Gao 1 & Xiu-Bo Chen 1 & Gang Xu 2 & Wen Liu 3,4 & Mian-Xiong Dong 5 & Xin Liu 6 Received: 17 February 2020 / Revised: 10 August 2020 / Accepted: 11 September 2020 # Springer Science+Business Media, LLC, part of Springer Nature 2020

Abstract

Nowadays, personal privacy disclosure issues become increasingly prominent in the process of data publishing. Targeting at this issue, a secure blockchain-based personal privacy protection scheme is proposed. In this paper, firstly, the information is stored in cloud service, and its hash value is used for the index, which is encrypted and stored on the blockchain. Secondly, based on the principles of cryptography and the characters of blockchain technology, we propose our scheme and use it to provide an access control mechanism for personal privacy. It can make the personal privacy protection easier and more efficient. At last, through our analysis, this scheme can sufficiently protect personal privacy in using mobile devices and provide a safe and trustworthy information acquisition method for data mining. More importantly, this proposed scheme also can provide a reliable and unique source tracing for multimedia copyright protection in terms of multimedia security. Keywords Blockchain . Multimedia security . Information security . Privacy protection . Data mining

* Gang Xu [email protected]

1

Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China

2

School of Information Science and Technology, North China University of Technology, Beijing 100144, China

3

State Key Laboratory of Media Convergence and Communication, Communication University of China, Beijing 100024, China

4

School of Computer Science and Cybersecurity, Communication University of China, Beijing 100024, China

5

Information and Electronic Engineering, Muroran Institute of Technology, Muroran, Japan

6

School of Information Engineering, Inner Mongolia University of Science and Technology, Baotou 014010, China

Multimedia Tools and Applications

1 Introduction With the development of information technology, more and more technologies have been applied in our daily life, such as cloud computing [16, 24], internet of things [30], secure multiparty computing [25, 34], especially data mining [28]. At present, the exponential growth of information indicates that the era of big data has come [39]. There are a lot of sensitive data related to personal privacy. If we do not provide reliable protection for these data, it will bring huge risk of privacy leakage to users. Therefore, it is an important research to study a secure access control scheme to prevent unauthorized access. As is known to all, researchers have proposed a variety of access control methods and solutions with different objectives. Ferraiolo et al. first proposed a role-based access control (RBAC) model [17], which introduces roles in access control research and maps u