• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Zhang Zhenghao, Li Yong, Zhang Zhenjiang. Controllable and Accountable Sensitive Data Sharing Scheme[J]. Journal of Computer Research and Development, 2022, 59(12): 2750-2759. DOI: 10.7544/issn1000-1239.20210587
Citation: Zhang Zhenghao, Li Yong, Zhang Zhenjiang. Controllable and Accountable Sensitive Data Sharing Scheme[J]. Journal of Computer Research and Development, 2022, 59(12): 2750-2759. DOI: 10.7544/issn1000-1239.20210587

Controllable and Accountable Sensitive Data Sharing Scheme

Funds: This work was supported by the National Key Research and Development Program of China (2018YFC0832300, 2018YFC0832303).
More Information
  • Published Date: November 30, 2022
  • In the era of big data, the sharing of massive amounts of data is a prerequisite for fully mining the value of data. Some of these data are sensitive data involving user privacy, and special attention should be paid to the data sharing process. However, traditional data sharing methods have defects such as unclear data flow and difficulty in accountability. To solve these problems, a blockchain-based sensitive data controllable sharing solution that supports regulation is proposed. By using the dynamic accumulator technology to achieve access control of sensitive data, the data owner can flexibly grant or revoke the access rights of other participants to the data and realize the controllability of the data by the data owner. A regulator is set up to check the data request process. The regulator will issue a regulatory certificate to the data requester after the check is approved. Only the data requester who has the regulatory certificate and is authorized by the data owner can get the data. To protect the privacy of the data requester, unrelated third parties cannot obtain the identity information of the data requester by using strong designated verifier signature (SDVS). Blockchain technology is used to record data requests and responses. The record can only be read by the regulator, which realizes the regulation of the whole data sharing process. The security analysis proves that the scheme satisfies the privacy of the data requester, the controllability of the data owner, and accountability. The simulation experiment proves the feasibility of the scheme.
  • Related Articles

    [1]Yu Ruiqi, Zhang Xinyun, Ren Shuang. A Review of Quantum Machine Learning Algorithms Based on Variational Quantum Circuit[J]. Journal of Computer Research and Development, 2025, 62(4): 821-851. DOI: 10.7544/issn1000-1239.202330979
    [2]Qian Luoxiong, Chen Mei, Ma Xueyan, Zhang Chi, Zhang Jinhong. Multi-View Clustering Based on Adaptive Tensor Singular Value Shrinkage[J]. Journal of Computer Research and Development, 2025, 62(3): 733-750. DOI: 10.7544/issn1000-1239.202330785
    [3]Pan Shijie, Gao Fei, Wan Linchun, Qin Sujuan, Wen Qiaoyan. Quantum Algorithm for Spectral Regression[J]. Journal of Computer Research and Development, 2021, 58(9): 1835-1842. DOI: 10.7544/issn1000-1239.2021.20210366
    [4]Yu Runlong, Zhao Hongke, Wang Zhong, Ye Yuyang, Zhang Peining, Liu Qi, Chen Enhong. Negatively Correlated Search with Asymmetry for Real-Parameter Optimization Problems[J]. Journal of Computer Research and Development, 2019, 56(8): 1746-1757. DOI: 10.7544/issn1000-1239.2019.20190198
    [5]Zhang Cheng, Wang Dong, Shen Chuan, Cheng Hong, Chen Lan, Wei Sui. Separable Compressive Imaging Method Based on Singular Value Decomposition[J]. Journal of Computer Research and Development, 2016, 53(12): 2816-2823. DOI: 10.7544/issn1000-1239.2016.20150414
    [6]Ning Xin, Li Weijun, Li Haoguang, Liu Wenjie. Uncorrelated Locality Preserving Discriminant Analysis Based on Bionics[J]. Journal of Computer Research and Development, 2016, 53(11): 2623-2629. DOI: 10.7544/issn1000-1239.2016.20150630
    [7]Zhao Feng, Huang Qingming, Gao Wen. An Image Matching Algorithm Based on Singular Value Decomposition[J]. Journal of Computer Research and Development, 2010, 47(1): 23-32.
    [8]Lin Yuan, Luo Siwei, and Yang Liner. Recommendation-Based Grid Resource Matching Algorithm[J]. Journal of Computer Research and Development, 2009, 46(11): 1814-1820.
    [9]Sun Yong, Wu Bo, and Feng Yanpeng. A Policy-and Value- Iteration Algorithm for POMDP[J]. Journal of Computer Research and Development, 2008, 45(10): 1763-1768.
    [10]Zhang Shihui, Kong Lingfu, and Feng Liang. An Improved Hestenes SVD Method and Its Parallel Computing and Application in Parallel Robot[J]. Journal of Computer Research and Development, 2008, 45(4): 716-724.
  • Cited by

    Periodical cited type(3)

    1. 白婷,刘轩宁,吴斌,张梓滨,徐志远,林康熠. 基于多粒度特征交叉剪枝的点击率预测模型. 计算机研究与发展. 2024(05): 1290-1298 . 本站查看
    2. 李莎莎,崔铁军. 系统故障演化过程中故障事件发生概率的修正方法研究. 安全与环境学报. 2024(06): 2068-2074 .
    3. 苗忠琦,童向荣. 一种偏差和方差双降的双鲁棒去偏学习模型. 小型微型计算机系统. 2024(11): 2663-2672 .

    Other cited types(1)

Catalog

    Article views (272) PDF downloads (169) Cited by(4)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return