• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Zhang Zhenghao, Li Yong, Zhang Zhenjiang. Controllable and Accountable Sensitive Data Sharing Scheme[J]. Journal of Computer Research and Development, 2022, 59(12): 2750-2759. DOI: 10.7544/issn1000-1239.20210587
Citation: Zhang Zhenghao, Li Yong, Zhang Zhenjiang. Controllable and Accountable Sensitive Data Sharing Scheme[J]. Journal of Computer Research and Development, 2022, 59(12): 2750-2759. DOI: 10.7544/issn1000-1239.20210587

Controllable and Accountable Sensitive Data Sharing Scheme

Funds: This work was supported by the National Key Research and Development Program of China (2018YFC0832300, 2018YFC0832303).
More Information
  • Published Date: November 30, 2022
  • In the era of big data, the sharing of massive amounts of data is a prerequisite for fully mining the value of data. Some of these data are sensitive data involving user privacy, and special attention should be paid to the data sharing process. However, traditional data sharing methods have defects such as unclear data flow and difficulty in accountability. To solve these problems, a blockchain-based sensitive data controllable sharing solution that supports regulation is proposed. By using the dynamic accumulator technology to achieve access control of sensitive data, the data owner can flexibly grant or revoke the access rights of other participants to the data and realize the controllability of the data by the data owner. A regulator is set up to check the data request process. The regulator will issue a regulatory certificate to the data requester after the check is approved. Only the data requester who has the regulatory certificate and is authorized by the data owner can get the data. To protect the privacy of the data requester, unrelated third parties cannot obtain the identity information of the data requester by using strong designated verifier signature (SDVS). Blockchain technology is used to record data requests and responses. The record can only be read by the regulator, which realizes the regulation of the whole data sharing process. The security analysis proves that the scheme satisfies the privacy of the data requester, the controllability of the data owner, and accountability. The simulation experiment proves the feasibility of the scheme.
  • Related Articles

    [1]Zhang Yuhong, Zhi Wenwu, Li Peipei, Hu Xuegang. Semi-Supervised Method for Cross-Lingual Word Embedding Based on an Adversarial Model with Double Discriminators[J]. Journal of Computer Research and Development, 2023, 60(9): 2127-2136. DOI: 10.7544/issn1000-1239.202220036
    [2]Liu Linfeng, Yu Zixing, Zhu He. A Link Prediction Method Based on Gated Recurrent Units for Mobile Social Network[J]. Journal of Computer Research and Development, 2023, 60(3): 705-716. DOI: 10.7544/issn1000-1239.202110432
    [3]Ma Ang, Yu Yanhua, Yang Shengli, Shi Chuan, Li Jie, Cai Xiuxiu. Survey of Knowledge Graph Based on Reinforcement Learning[J]. Journal of Computer Research and Development, 2022, 59(8): 1694-1722. DOI: 10.7544/issn1000-1239.20211264
    [4]Wang Honglin, Yang Dan, Nie Tiezheng, Kou Yue. Attributed Heterogeneous Information Network Embedding with Self-Attention Mechanism for Product Recommendation[J]. Journal of Computer Research and Development, 2022, 59(7): 1509-1521. DOI: 10.7544/issn1000-1239.20210016
    [5]Yang Yanjie, Wang Li, Wang Yuhang. Rumor Detection Based on Source Information and Gating Graph Neural Network[J]. Journal of Computer Research and Development, 2021, 58(7): 1412-1424. DOI: 10.7544/issn1000-1239.2021.20200801
    [6]Zhang Shenglin, Li Dongwen, Sun Yongqian, Meng Weibin, Zhang Yuzhe, Zhang Yuzhi, Liu Ying, Pei Dan. Unified Anomaly Detection for Syntactically Diverse Logs in Cloud Datacenter[J]. Journal of Computer Research and Development, 2020, 57(4): 778-790. DOI: 10.7544/issn1000-1239.2020.20190875
    [7]Fang Yang, Zhao Xiang, Tan Zhen, Yang Shiyu, Xiao Weidong. A Revised Translation-Based Method for Knowledge Graph Representation[J]. Journal of Computer Research and Development, 2018, 55(1): 139-150. DOI: 10.7544/issn1000-1239.2018.20160723
    [8]Yang Lin, Zhang Libo, Luo Tiejian, Wan Qiyang, Wu Yanjun. Knowledge Schematization Method Based on Link and Semantic Relationship[J]. Journal of Computer Research and Development, 2017, 54(8): 1655-1664. DOI: 10.7544/issn1000-1239.2017.20170177
    [9]Liu Zhiyuan, Sun Maosong, Lin Yankai, Xie Ruobing. Knowledge Representation Learning: A Review[J]. Journal of Computer Research and Development, 2016, 53(2): 247-261. DOI: 10.7544/issn1000-1239.2016.20160020
    [10]Wang Yanshi, Wang Wei, Liu Zhaohui, Wei Jun, Huang Tao. A Mechanism for Transparent Data Caching[J]. Journal of Computer Research and Development, 2015, 52(4): 907-917. DOI: 10.7544/issn1000-1239.2015.20131910
  • Cited by

    Periodical cited type(2)

    1. 张学旺,雷响. 基于层次化群签名的联盟链身份隐私保护方案. 信息安全研究. 2024(12): 1160-1164 .
    2. 夏莹杰,朱思雨,刘雪娇. 区块链架构下具有条件隐私的车辆编队跨信任域高效群组认证研究. 通信学报. 2023(04): 111-123 .

    Other cited types(6)

Catalog

    Article views (273) PDF downloads (170) Cited by(8)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return