• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Zhang Zhenghao, Li Yong, Zhang Zhenjiang. Controllable and Accountable Sensitive Data Sharing Scheme[J]. Journal of Computer Research and Development, 2022, 59(12): 2750-2759. DOI: 10.7544/issn1000-1239.20210587
Citation: Zhang Zhenghao, Li Yong, Zhang Zhenjiang. Controllable and Accountable Sensitive Data Sharing Scheme[J]. Journal of Computer Research and Development, 2022, 59(12): 2750-2759. DOI: 10.7544/issn1000-1239.20210587

Controllable and Accountable Sensitive Data Sharing Scheme

Funds: This work was supported by the National Key Research and Development Program of China (2018YFC0832300, 2018YFC0832303).
More Information
  • Published Date: November 30, 2022
  • In the era of big data, the sharing of massive amounts of data is a prerequisite for fully mining the value of data. Some of these data are sensitive data involving user privacy, and special attention should be paid to the data sharing process. However, traditional data sharing methods have defects such as unclear data flow and difficulty in accountability. To solve these problems, a blockchain-based sensitive data controllable sharing solution that supports regulation is proposed. By using the dynamic accumulator technology to achieve access control of sensitive data, the data owner can flexibly grant or revoke the access rights of other participants to the data and realize the controllability of the data by the data owner. A regulator is set up to check the data request process. The regulator will issue a regulatory certificate to the data requester after the check is approved. Only the data requester who has the regulatory certificate and is authorized by the data owner can get the data. To protect the privacy of the data requester, unrelated third parties cannot obtain the identity information of the data requester by using strong designated verifier signature (SDVS). Blockchain technology is used to record data requests and responses. The record can only be read by the regulator, which realizes the regulation of the whole data sharing process. The security analysis proves that the scheme satisfies the privacy of the data requester, the controllability of the data owner, and accountability. The simulation experiment proves the feasibility of the scheme.
  • Related Articles

    [1]Li Yuxi, Chen Jingjing, Zhuo Fucai, Xu Jian, Ji Dong. Verifiable Boolean Searchable Encryption Based on Blockchain Index[J]. Journal of Computer Research and Development. DOI: 10.7544/issn1000-1239.202440501
    [2]Ke Yuhong, Lin Chao, Huang Xinyi, Wu Wei, Chen Yujie. An Efficient Passwordless Authentication Scheme Based on Blockchain[J]. Journal of Computer Research and Development, 2024, 61(10): 2514-2525. DOI: 10.7544/issn1000-1239.202440468
    [3]Zhong Lujie, Wang Mu. Blockchain-Enpowered Cooperative Resource Allocation Scheme for Computing First Network[J]. Journal of Computer Research and Development, 2023, 60(4): 750-762. DOI: 10.7544/issn1000-1239.202330002
    [4]Wang Chenxu, Cheng Jiacheng, Sang Xinxin, Li Guodong, Guan Xiaohong. Data Privacy-Preserving for Blockchain: State of the Art and Trends[J]. Journal of Computer Research and Development, 2021, 58(10): 2099-2119. DOI: 10.7544/issn1000-1239.2021.20210804
    [5]Meng Xiaofeng, Liu Lixin. Blockchain-Based Data Transparency: Issues and Challenges[J]. Journal of Computer Research and Development, 2021, 58(2): 237-252. DOI: 10.7544/issn1000-1239.2021.20200017
    [6]Huang Kezhen, Lian Yifeng, Feng Dengguo, Zhang Haixia, Liu Yuling, Ma Xiangliang. Cyber Security Threat Intelligence Sharing Model Based on Blockchain[J]. Journal of Computer Research and Development, 2020, 57(4): 836-846. DOI: 10.7544/issn1000-1239.2020.20190404
    [7]Xu Wenyu, Wu Lei, Yan Yunxue. Privacy-Preserving Scheme of Electronic Health Records Based on Blockchain and Homomorphic Encryption[J]. Journal of Computer Research and Development, 2018, 55(10): 2233-2243. DOI: 10.7544/issn1000-1239.2018.20180438
    [8]Liu Yining, Zhou Yuanjian, Lan Rushi, Tang Chunming. Blockchain-Based Verification Scheme for Deletion Operation in Cloud[J]. Journal of Computer Research and Development, 2018, 55(10): 2199-2207. DOI: 10.7544/issn1000-1239.2018.20180436
    [9]Chen Weili, Zheng Zibin. Blockchain Data Analysis: A Review of Status, Trends and Challenges[J]. Journal of Computer Research and Development, 2018, 55(9): 1853-1870. DOI: 10.7544/issn1000-1239.2018.20180127
    [10]Zhu Liehuang, Gao Feng, Shen Meng, Li Yandong, Zheng Baokun, Mao Hongliang, Wu Zhen. Survey on Privacy Preserving Techniques for Blockchain Technology[J]. Journal of Computer Research and Development, 2017, 54(10): 2170-2186. DOI: 10.7544/issn1000-1239.2017.20170471
  • Cited by

    Periodical cited type(5)

    1. 夏心锋,陈泽,周于超,刘莉莉. 面向区块链的电力营销大数据安全共享研究. 电气技术与经济. 2025(02): 245-248 .
    2. 吴昊,李贝,贺小伟,王宾,李思远. 基于侧链和信任管理模型的数据共享方案. 计算机工程与设计. 2024(01): 24-31 .
    3. 李鸣,宋文鹏,宗燕,刘冕宸. 基于区块链的元宇宙生态体系架构. 计算机研究与发展. 2024(09): 2364-2383 . 本站查看
    4. 陈月静,朴春慧,卢晓天,霍仁崇,白英杰. 工业互联网安全评测数据隐私保护与共享方法. 情报杂志. 2023(06): 180-186 .
    5. 于欣海,黄欣哲,梁海,丁勇. 基于区块链的高速联网收费数据传输应用研究. 计算机技术与发展. 2023(10): 51-58 .

    Other cited types(5)

Catalog

    Article views (272) PDF downloads (169) Cited by(10)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return