• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Zhang Zhenghao, Li Yong, Zhang Zhenjiang. Controllable and Accountable Sensitive Data Sharing Scheme[J]. Journal of Computer Research and Development, 2022, 59(12): 2750-2759. DOI: 10.7544/issn1000-1239.20210587
Citation: Zhang Zhenghao, Li Yong, Zhang Zhenjiang. Controllable and Accountable Sensitive Data Sharing Scheme[J]. Journal of Computer Research and Development, 2022, 59(12): 2750-2759. DOI: 10.7544/issn1000-1239.20210587

Controllable and Accountable Sensitive Data Sharing Scheme

Funds: This work was supported by the National Key Research and Development Program of China (2018YFC0832300, 2018YFC0832303).
More Information
  • Published Date: November 30, 2022
  • In the era of big data, the sharing of massive amounts of data is a prerequisite for fully mining the value of data. Some of these data are sensitive data involving user privacy, and special attention should be paid to the data sharing process. However, traditional data sharing methods have defects such as unclear data flow and difficulty in accountability. To solve these problems, a blockchain-based sensitive data controllable sharing solution that supports regulation is proposed. By using the dynamic accumulator technology to achieve access control of sensitive data, the data owner can flexibly grant or revoke the access rights of other participants to the data and realize the controllability of the data by the data owner. A regulator is set up to check the data request process. The regulator will issue a regulatory certificate to the data requester after the check is approved. Only the data requester who has the regulatory certificate and is authorized by the data owner can get the data. To protect the privacy of the data requester, unrelated third parties cannot obtain the identity information of the data requester by using strong designated verifier signature (SDVS). Blockchain technology is used to record data requests and responses. The record can only be read by the regulator, which realizes the regulation of the whole data sharing process. The security analysis proves that the scheme satisfies the privacy of the data requester, the controllability of the data owner, and accountability. The simulation experiment proves the feasibility of the scheme.
  • Related Articles

    [1]Yin Yuyu, Gou Hongshen, Li Youhuizi, Huang Binbin, Wan Jian. Mort: A Dependent Task Offloading Framework Towards Real-Time Data Distribution and Transmission Optimization[J]. Journal of Computer Research and Development, 2023, 60(5): 1002-1020. DOI: 10.7544/issn1000-1239.202220729
    [2]Tu Panpeng, Wang Xingwei, Li Jie, Huang Min. BIRI: A BBO-Inspired MSN Routing Algorithm with Information-Centric Paradigm Support[J]. Journal of Computer Research and Development, 2019, 56(9): 1918-1926. DOI: 10.7544/issn1000-1239.2019.20180861
    [3]Yu Yaxin, Wang Lei. An Advertising Game Theory Decision-Making Mechanism for Overlapping Seeds in Geo-Social Network[J]. Journal of Computer Research and Development, 2019, 56(6): 1302-1311. DOI: 10.7544/issn1000-1239.2019.20180068
    [4]Deng Xiaoheng, Cao Dejuan, Pan Yan, Shen Hailan, Chen Zhigang. An Optimized Credit Distribution Model in Social Networks with Time-Delay Constraint[J]. Journal of Computer Research and Development, 2017, 54(2): 382-393. DOI: 10.7544/issn1000-1239.2017.20151118
    [5]Guo Jingfeng, Lü Jiaguo. Influence Maximization Based on Information Preference[J]. Journal of Computer Research and Development, 2015, 52(2): 533-541. DOI: 10.7544/issn1000-1239.2015.20131311
    [6]Wang Mei, Liao Shizhong. Three-Step Bayesian Combination of SVM on Regularization Path[J]. Journal of Computer Research and Development, 2013, 50(9): 1855-1864.
    [7]Zhu Sifeng, Liu Fang, Chai Zhengyi, Qi Yutao. Immune-Computing-Based Location Planning of Base Station and Relay Station in IEEE 802.16j Network[J]. Journal of Computer Research and Development, 2012, 49(8): 1649-1654.
    [8]Tao Yue, He Zhenying, and Zhang Jiaqi. Keyword Queries over Relational Databases Based on Tuple Combination[J]. Journal of Computer Research and Development, 2011, 48(10): 1890-1898.
    [9]Fu Zhongliang. Effective Property and Best Combination of Classifier Linear Combination[J]. Journal of Computer Research and Development, 2009, 46(7): 1206-1216.
    [10]Zhu Yihua, Zhu Fan, Luo Hezhi. Research on Optimal Paging in Movement-Based Location Management Scheme[J]. Journal of Computer Research and Development, 2007, 44(7): 1199-1204.
  • Cited by

    Periodical cited type(2)

    1. 韩永印,王侠,王志晓. 基于决策树的社交网络隐式用户行为数据挖掘方法. 沈阳工业大学学报. 2024(03): 312-317 .
    2. 刘洪波,臧洪睿,马凯,杨爽,杨晓瑜. 基于网络风险攻守关系的网络空间要素层次体系建设. 信息记录材料. 2022(09): 59-62 .

    Other cited types(5)

Catalog

    Article views (271) PDF downloads (169) Cited by(7)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return