• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Zhang Zhenghao, Li Yong, Zhang Zhenjiang. Controllable and Accountable Sensitive Data Sharing Scheme[J]. Journal of Computer Research and Development, 2022, 59(12): 2750-2759. DOI: 10.7544/issn1000-1239.20210587
Citation: Zhang Zhenghao, Li Yong, Zhang Zhenjiang. Controllable and Accountable Sensitive Data Sharing Scheme[J]. Journal of Computer Research and Development, 2022, 59(12): 2750-2759. DOI: 10.7544/issn1000-1239.20210587

Controllable and Accountable Sensitive Data Sharing Scheme

Funds: This work was supported by the National Key Research and Development Program of China (2018YFC0832300, 2018YFC0832303).
More Information
  • Published Date: November 30, 2022
  • In the era of big data, the sharing of massive amounts of data is a prerequisite for fully mining the value of data. Some of these data are sensitive data involving user privacy, and special attention should be paid to the data sharing process. However, traditional data sharing methods have defects such as unclear data flow and difficulty in accountability. To solve these problems, a blockchain-based sensitive data controllable sharing solution that supports regulation is proposed. By using the dynamic accumulator technology to achieve access control of sensitive data, the data owner can flexibly grant or revoke the access rights of other participants to the data and realize the controllability of the data by the data owner. A regulator is set up to check the data request process. The regulator will issue a regulatory certificate to the data requester after the check is approved. Only the data requester who has the regulatory certificate and is authorized by the data owner can get the data. To protect the privacy of the data requester, unrelated third parties cannot obtain the identity information of the data requester by using strong designated verifier signature (SDVS). Blockchain technology is used to record data requests and responses. The record can only be read by the regulator, which realizes the regulation of the whole data sharing process. The security analysis proves that the scheme satisfies the privacy of the data requester, the controllability of the data owner, and accountability. The simulation experiment proves the feasibility of the scheme.
  • Cited by

    Periodical cited type(5)

    1. 夏心锋,陈泽,周于超,刘莉莉. 面向区块链的电力营销大数据安全共享研究. 电气技术与经济. 2025(02): 245-248 .
    2. 吴昊,李贝,贺小伟,王宾,李思远. 基于侧链和信任管理模型的数据共享方案. 计算机工程与设计. 2024(01): 24-31 .
    3. 李鸣,宋文鹏,宗燕,刘冕宸. 基于区块链的元宇宙生态体系架构. 计算机研究与发展. 2024(09): 2364-2383 . 本站查看
    4. 陈月静,朴春慧,卢晓天,霍仁崇,白英杰. 工业互联网安全评测数据隐私保护与共享方法. 情报杂志. 2023(06): 180-186 .
    5. 于欣海,黄欣哲,梁海,丁勇. 基于区块链的高速联网收费数据传输应用研究. 计算机技术与发展. 2023(10): 51-58 .

    Other cited types(6)

Catalog

    Article views (273) PDF downloads (170) Cited by(11)
    Turn off MathJax
    Article Contents

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return