Skip to main content

Protection Method of Network Data Privacy Security Issues Based on Blockchain Technology

  • Conference paper
  • First Online:
2021 International Conference on Applications and Techniques in Cyber Intelligence (ATCI 2021)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1398))

  • 1558 Accesses

Abstract

As a new model of Internet-based computers, blockchain technology has always been a hot spot for scholars and the industry. Although blockchain technology has been developed for many years, data security and reliable computing are still the main challenges facing the current blockchain technology applications. In order to solve this problem, many researchers have conducted a lot of research on it and proposed many models, including data integrity verification and secure multi-part calculation. However, most of these solutions face problems such as high computational complexity or lack of scalability. This paper proposes a data release method based on differential privacy protection for the problems of the release of static data sets and the release of dynamic data, and uses the built platform for experimental verification. Aiming at the privacy leakage problem faced by the multi-level and fine-grained search of big data, this paper proposes an incremental data indexing strategy based on conceptual lattice granular deduction, and builds a complete data retrieval service system that supports differentiation on the cloud platform architecture, it also supports practical search modes such as multi-keyword ranking search, similarity search and fuzzy search, and systematic research on the protection methods of network data privacy security issues under blockchain technology. The experimental results surface: Compared with other methods, the algorithm in this paper has greatly reduced information loss under the same privacy requirements, and the algorithm has high execution efficiency. This shows that the results of this study can provide ideas for the research of big data security and privacy protection, and have certain reference significance.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Sikorski, J.J., Haughton, J., Kraft, M.: Blockchain technology in the chemical industry: machine-to-machine electricity market. Appl. Energy 195(JUN.1), 234–246 (2017)

    Google Scholar 

  2. Yeoh, P.: Regulatory issues in blockchain technology. J. Financ. Regul. Compliance 25(2), 196–208 (2017)

    Article  Google Scholar 

  3. Miraz, M.H., Ali, M.: Applications of blockchain technology beyond cryptocurrency. Ann. Emerg. Technol. Comput. 2(1), 1–6 (2018)

    Article  Google Scholar 

  4. Sun, J., Yan, J., Zhang, K.Z.K.: Blockchain-based sharing services: what blockchain technology can contribute to smart cities. Financ. Innov. 2(1), 1–9 (2016). https://doi.org/10.1186/s40854-016-0040-y

    Article  Google Scholar 

  5. Beck, R., Avital, M., Rossi, M., Thatcher, J.B.: Blockchain technology in business and information systems research. Bus. Inf. Syst. Eng. 59(6), 381–384 (2017). https://doi.org/10.1007/s12599-017-0505-1

    Article  Google Scholar 

  6. Sun, H., Luo, H., Sun, Y., et al.: Reversible Image Mosaic Technology Providing Large Protection Size and High Image Quality. 42(3-4), 259–293 (2018)

    Google Scholar 

  7. Zhang, Y., Luo, X., Luo, H.: A multi-step attack-correlation method with privacy protection. J. Commun. Inf. Netw. 1(4), 133–142 (2016). https://doi.org/10.1007/BF03391586

    Article  Google Scholar 

  8. Cao, J., Yu, P., Xiang, X., et al.: Anti-quantum fast authentication and data transmission scheme for massive devices in 5g NB-IOT system. IEEE Internet Things J. 6(6), 9794–9805 (2019)

    Article  Google Scholar 

  9. Zou, Y., He, W., Zhang, L., Ni, J., Chen, Q.: Research on privacy protection of large-scale network data aggregation process. Int. J. Wireless Inf. Netw. 26(3), 193–200 (2019). https://doi.org/10.1007/s10776-019-00443-w

    Article  Google Scholar 

  10. Mao, B., Kawamoto, Y., Kato, N.: AI-based joint optimization of qos and security for 6g energy harvesting internet of things. IEEE Internet Things J. 7(8), 7032–7042 (2020)

    Article  Google Scholar 

Download references

Acknowledgement

This research was financially supported by Teaching Reform Research Project of Jiangxi’s Universities (Grant NO.JXJG-20-50-9) and Science and Technology Research Project of Jiangxi Provincial Department of Education (under Grant no.GJJ191100).

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhou, H., Gu, M. (2021). Protection Method of Network Data Privacy Security Issues Based on Blockchain Technology. In: Abawajy, J., Xu, Z., Atiquzzaman, M., Zhang, X. (eds) 2021 International Conference on Applications and Techniques in Cyber Intelligence. ATCI 2021. Advances in Intelligent Systems and Computing, vol 1398. Springer, Cham. https://doi.org/10.1007/978-3-030-79200-8_79

Download citation

Publish with us

Policies and ethics