• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Wang Chenxu, Cheng Jiacheng, Sang Xinxin, Li Guodong, Guan Xiaohong. Data Privacy-Preserving for Blockchain: State of the Art and Trends[J]. Journal of Computer Research and Development, 2021, 58(10): 2099-2119. DOI: 10.7544/issn1000-1239.2021.20210804
Citation: Wang Chenxu, Cheng Jiacheng, Sang Xinxin, Li Guodong, Guan Xiaohong. Data Privacy-Preserving for Blockchain: State of the Art and Trends[J]. Journal of Computer Research and Development, 2021, 58(10): 2099-2119. DOI: 10.7544/issn1000-1239.2021.20210804

Data Privacy-Preserving for Blockchain: State of the Art and Trends

Funds: This work was supported by the National Natural Science Foundation of China (61602370), the Natural Science Foundation of Shanxi Province(2021JM-018), Shenzhen Fundamental Research Program (JCYJ20170816100819428), and the Fundamental Research Funds for the Central Universities (1191320006).
More Information
  • Published Date: September 30, 2021
  • As a distributed ledger, blockchain solves the decentralized trust problem by integrating a series of techniques such as distributed consensus, P2P (Peer to Peer) network, smart contracts, and cryptography. Blockchain has a meaningful impact on the society and lifts a bloom of researches and applications due to the characteristics of immutability and decentralization. Blockchain technology has a broad scope of applications, and its unique advantages can deal with the pain points in many industry scenarios. However, the blockchain technology is faced with the problem of data privacy leakage in its applications, such as the disclosure of transaction, account and personal information privacy, which greatly impose restrictions on the application scope and fields. Data privacy-preserving for blockchain has become one of the key problems concerned by researchers. In this survey, we first describe the evolutionary history of blockchain technology, define the concept of corresponding privacy according to applications in the field of blockchain and introduce the main technical points and the technology architecture of blockchain. Then we summarize the privacy-preserving problems faced by the blockchain technology and explore the existing solutions based on the proposed concept of data privacy protection. Finally, some problems that still need to be addressed and future research directions of data privacy-preserving for blockchain are discussed based on the analysis.
  • Related Articles

    [1]Fu Hao, Long Chun, Gong Liangyi, Wei Jinxia, Huang Pan, Lin Yanzhong, Sun Degang. Malicious Domain Detection Technology Based on Semantic Graph Learning[J]. Journal of Computer Research and Development. DOI: 10.7544/issn1000-1239.202440375
    [2]Liu Qixu, Liu Jiaxi, Jin Ze, Liu Xinyu, Xiao Juxin, Chen Yanhui, Zhu Hongwen, Tan Yaokang. Survey of Artificial Intelligence Based IoT Malware Detection[J]. Journal of Computer Research and Development, 2023, 60(10): 2234-2254. DOI: 10.7544/issn1000-1239.202330450
    [3]Pan Jianwen, Cui Zhanqi, Lin Gaoyi, Chen Xiang, Zheng Liwei. A Review of Static Detection Methods for Android Malicious Application[J]. Journal of Computer Research and Development, 2023, 60(8): 1875-1894. DOI: 10.7544/issn1000-1239.202220297
    [4]Fan Zhaoshan, Wang Qing, Liu Junrong, Cui Zelin, Liu Yuling, Liu Song. Survey on Domain Name Abuse Detection Technology[J]. Journal of Computer Research and Development, 2022, 59(11): 2581-2605. DOI: 10.7544/issn1000-1239.20210121
    [5]Yang Zheng, Yin Qilei, Li Haoran, Miao Yuanli, Yuan Dong, Wang Qian, Shen Chao, Li Qi. Study of Wechat Sybil Detection[J]. Journal of Computer Research and Development, 2021, 58(11): 2319-2332. DOI: 10.7544/issn1000-1239.2021.20210461
    [6]Yang Wang, Gao Mingzhe, Jiang Ting. A Malicious Code Static Detection Framework Based on Multi-Feature Ensemble Learning[J]. Journal of Computer Research and Development, 2021, 58(5): 1021-1034. DOI: 10.7544/issn1000-1239.2021.20200912
    [7]Wang Jialai, Zhang Chao, Qi Xuyan, Rong Yi. A Survey of Intelligent Malware Detection on Windows Platform[J]. Journal of Computer Research and Development, 2021, 58(5): 977-994. DOI: 10.7544/issn1000-1239.2021.20200964
    [8]Wang Lina, Tan Cheng, Yu Rongwei, Yin Zhengguang. The Malware Detection Based on Data Breach Actions[J]. Journal of Computer Research and Development, 2017, 54(7): 1537-1548. DOI: 10.7544/issn1000-1239.2017.20160436
    [9]Li Peng, Wang Ruchuan, Wu Ning. Research on Unknown Malicious Code Automatic Detection Based on Space Relevance Features[J]. Journal of Computer Research and Development, 2012, 49(5): 949-957.
    [10]Dai Hua, Qin Xiaolin, and Bai Chuanjie. A Malicious Transaction Detection Method Based on Transaction Template[J]. Journal of Computer Research and Development, 2010, 47(5): 921-929.

Catalog

    Article views (2637) PDF downloads (1718) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return