计算机科学 ›› 2019, Vol. 46 ›› Issue (9): 162-168.doi: 10.11896/j.issn.1002-137X.2019.09.023
所属专题: 区块链技术
王童, 马文平, 罗维
WANG Tong, MA Wen-ping, LUO Wei
摘要: 在大数据背景下,数据信息隐私和可控性成为了关注点。现有的计算模式大多依赖于第三方机构,第三方的不可依赖性和对信息的掌控易导致信息的安全性无法得到保证,容易出现大量隐私问题。为解决此问题,文中结合区块链的特征和安全多方计算,提出了一种安全、高性能的共享及多方计算模型,使得用户能在自主控制数据的同时也能保证数据计算和共享的安全性。该方案首先以链上存储和链下存储相结合作为基础,在该存储环境下,利用代理重加密方式进行数据共享;然后使用改进的共识算法确保节点间的一致性,进而在MapReduce计算框架中使用改进的同态加密算法实现在无需解密隐私数据的情况下直接用密文进行数据处理和安全计算;最后对方案的正确性与安全性进行分析并进行实验仿真。分析结果及仿真结果表明,该模型在数据量较大时具有高性能的优点,且在运算效率方面有比较大的提升。
中图分类号:
[1]ZHU L H,GAO F,SHEN M,et al.Survey on Privacy Preserving Techniques for Blockchain Techniques[J].Computer engineering and Application,2017,54(10):2170-2186.(in Chinese)祝烈煌,高峰,沈蒙,等.区块链隐私保护研究综述[J].计算机研究与发展,2017,54(10):2170-2186. [2]DORRI A,STEGER M,KANHERE S S,et al.BlockChain:A Distributed Solution to Automotive Security and Privacy[J].IEEE Communications Magazine,2017,55(12):119-125. [3]LI X,JIANG P,CHEN T,et al.A Survey on the security ofblockchain systems[J].Future Generation Computer Systems,2017:1-13.doi:10.1016. [4]CASTRO M,LISKOV B.Practical Byzantine fault tolerance[C]//Symposium on operating Systems Design & Implementation.ACM,1999,173-186. [5]黄步添,王云霄,王从礼,等.一种应用于区块链的拜占庭容错共识方法:中国,CN106445711A[P].2017-02-22. [6]ZYSKIND G,NATHAN O,ALE X,et al.Decentralizing Privacy:Using Blockchain to Protect Personal Data[C]//IEEE Security and Privacy Workshops.IEEE Computer Society,2015:180-184. [7]RIVEST R L,ADLEM A L,DERTOUZOS M L.On DataBanks and Privacy Homomorphism [C]//Foundations of Secure Computation.New York:Academic Press,1978:169-179. [8]PLANTARD T,SUSILO W,ZHANG Z.Fully HomomorphicEncryption Using Hidden Ideal Lattice[J].IEEE Transactions on Information Forensics and Security,2013,8(12):2127-2137. [9]DIJK M V,GENTRY C,HALEVI S,et al.Fully Homomorphic Encryption over the Integers[J].Lecture Notes in Computer Science,2010,2009(4):24-43. [10]TAN Z L,ZHANG W.Multiparty Cloud Computation and Homomorphic Proxy Re-encrypt Scheme[J].Journal of Chinese Computer Systems,2015,36(8):1739-1742. [11]FU D,FANG L.Blockchain-based trusted computing in social network[C]//IEEE International Conference on Computer and Communications.IEEE,2017:19-22. [12]DO H G,NG W K.Blockchain-Based System for Secure Data Storage with Private Keyword Search[C]//Services.IEEE,2017:90-93. [13]ZHENG Z H,ZHANG M Q,WANG X A.Identity based proxy re-encryption scheme for secure cloud data sharing[J].Compu-ter Engineering and Application,2016,33(11):3450-3454.(in Chinese)郑志恒,张敏情,王绪安.一种适合云数据共享的身份代理重加密方案[J].计算机应用研究,2016,33(11):3450-3454. [14]DITTRICH J,QUIANÉ-RUIZ J A.Efficient big data processing in Hadoop MapReduce[J].Proceedings of the Vldb Endowment,2012,5(12):2014-2015. [15]XIE X S.A full homomorphic encryption scheme that is valid for a class of integers[D].Jinan:Shandong university,2014.(in Chinese)谢学说.一类整数上有效的全同态加密方案[D].济南:山东大学,2014. [16]TIBOUCHI M,MANDAL A.Fully Homomorphic Encryptionover the Integers with Shorter Public Keys[C]//Conference on Advances in Cryptology.Springer-verlag,2011:487-504. [17]TANG D H,ZHU S X,CAO Y F,et al.A full homomorphic encryption scheme on a faster integer[J].Computer Engineering and Application,2012,48(28):117-122.(in Chinese)汤殿华,祝世雄,曹云飞,等.一个较快速的整数上的全同态加密方案[J].计算机应用与研究,2012,48(28):117-122. |
[1] | 汤凌韬, 王迪, 张鲁飞, 刘盛云. 基于安全多方计算和差分隐私的联邦学习方案 Federated Learning Scheme Based on Secure Multi-party Computation and Differential Privacy 计算机科学, 2022, 49(9): 297-305. https://doi.org/10.11896/jsjkx.210800108 |
[2] | 王子凯, 朱健, 张伯钧, 胡凯. 区块链与智能合约并行方法研究与实现 Research and Implementation of Parallel Method in Blockchain and Smart Contract 计算机科学, 2022, 49(9): 312-317. https://doi.org/10.11896/jsjkx.210800102 |
[3] | 吕由, 吴文渊. 隐私保护线性回归方案与应用 Privacy-preserving Linear Regression Scheme and Its Application 计算机科学, 2022, 49(9): 318-325. https://doi.org/10.11896/jsjkx.220300190 |
[4] | 窦家维. 保护隐私的汉明距离与编辑距离计算及应用 Privacy-preserving Hamming and Edit Distance Computation and Applications 计算机科学, 2022, 49(9): 355-360. https://doi.org/10.11896/jsjkx.220100241 |
[5] | 刘卫明, 安冉, 毛伊敏. 基于聚类和WOA的并行支持向量机算法 Parallel Support Vector Machine Algorithm Based on Clustering and WOA 计算机科学, 2022, 49(7): 64-72. https://doi.org/10.11896/jsjkx.210500040 |
[6] | 周航, 姜河, 赵琰, 解相朋. 适用于各单元共识交易的电力区块链系统优化调度研究 Study on Optimal Scheduling of Power Blockchain System for Consensus Transaction ofEach Unit 计算机科学, 2022, 49(6A): 771-776. https://doi.org/10.11896/jsjkx.210600241 |
[7] | 傅丽玉, 陆歌皓, 吴义明, 罗娅玲. 区块链技术的研究及其发展综述 Overview of Research and Development of Blockchain Technology 计算机科学, 2022, 49(6A): 447-461. https://doi.org/10.11896/jsjkx.210600214 |
[8] | 高健博, 张家硕, 李青山, 陈钟. RegLang:一种面向监管的智能合约编程语言 RegLang:A Smart Contract Programming Language for Regulation 计算机科学, 2022, 49(6A): 462-468. https://doi.org/10.11896/jsjkx.210700016 |
[9] | 卫宏儒, 李思月, 郭涌浩. 基于智能合约的秘密重建协议 Secret Reconstruction Protocol Based on Smart Contract 计算机科学, 2022, 49(6A): 469-473. https://doi.org/10.11896/jsjkx.210700033 |
[10] | 毛典辉, 黄晖煜, 赵爽. 符合监管合规性的自动合成新闻检测方法研究 Study on Automatic Synthetic News Detection Method Complying with Regulatory Compliance 计算机科学, 2022, 49(6A): 523-530. https://doi.org/10.11896/jsjkx.210300083 |
[11] | 王健. 基于隐私保护的反向传播神经网络学习算法 Back-propagation Neural Network Learning Algorithm Based on Privacy Preserving 计算机科学, 2022, 49(6A): 575-580. https://doi.org/10.11896/jsjkx.211100155 |
[12] | 李博, 向海昀, 张宇翔, 廖浩德. 面向食品溯源场景的PBFT优化算法应用研究 Application Research of PBFT Optimization Algorithm for Food Traceability Scenarios 计算机科学, 2022, 49(6A): 723-728. https://doi.org/10.11896/jsjkx.210800018 |
[13] | 王思明, 谭北海, 余荣. 面向6G可信可靠智能的区块链分片与激励机制 Blockchain Sharding and Incentive Mechanism for 6G Dependable Intelligence 计算机科学, 2022, 49(6): 32-38. https://doi.org/10.11896/jsjkx.220400004 |
[14] | 孙浩, 毛瀚宇, 张岩峰, 于戈, 徐石成, 何光宇. 区块链跨链技术发展及应用 Development and Application of Blockchain Cross-chain Technology 计算机科学, 2022, 49(5): 287-295. https://doi.org/10.11896/jsjkx.210800132 |
[15] | 阳真, 黄松, 郑长友. 基于区块链与改进CP-ABE的众测知识产权保护技术研究 Study on Crowdsourced Testing Intellectual Property Protection Technology Based on Blockchain and Improved CP-ABE 计算机科学, 2022, 49(5): 325-332. https://doi.org/10.11896/jsjkx.210900075 |
|