This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
1. Introduction
Since the 21st century, the Internet has given traditional industries the explosive growth of data in the Industrial Internet of Things [1, 2]. The massive amount of data generated in different fields (such as smart home, smart city, and smart manufacturing) has extremely high research value, which has aroused research interest in industry and academia. How to share data safely and efficiently, use data to provide users with better and convenient services, and improve user experience has become a widespread concern today. However, most of the data generated by IIoT is the user’s private data. In the process of data sharing, it is necessary to ensure the privacy, integrity, and validity of the data [3–5]. For example, sensitive and private data is tampered with or leaked during the sharing process. Data owners may provide irrelevant or false data to cloud service providers. Cloud service providers do not want data owners to provide information to other research institutions. Therefore, the following problems still exist in the data sharing of the Industrial Internet of Things. (1) There is lack of protection of data privacy and security in the data sharing process. (2) The data recipient cannot ensure that the data obtained is valid and relevant information. (3) Data integrity and data transaction records cannot be verified and traced during the data sharing process. Therefore, due to the above-mentioned problems, there is an urgent need for a solution to realize data sharing while protecting privacy and security.
Zero-knowledge proof is a cryptographic technology, which can make the verifier believe that a certain assertion is correct without providing any valuable information to the verifier. Zero-knowledge succinct noninteractive knowledge argumentation (zk-SNARKs) is one of the tools for generating zero-knowledge proofs. In the blockchain transaction platform, it is used in cryptocurrencies such as Zcash [6] and ZETH [7] to hide private information such as the address of the sender and receiver of the transaction and the transaction amount. In the data sharing between the cloud service provider and the data owner, zero-knowledge proof combined with smart contract technology can realize data availability verification between the two parties’ data transactions and ensure the provision of effective data information.
Blockchain is an effective method to solve verifiable and traceable transactions due to its decentralization, immutability, traceability, and executable smart contracts. Due to the characteristics of its distributed data ledger, it is widely used in multiple scenarios such as virtual currency, electronic bidding, and Industrial Internet of Things. In terms of addressing data privacy, blockchain can be combined with a variety of cryptographic methods, for example, attribute encryption [8], homomorphic encryption [9], searchable encryption, and proxy reencryption combined [10], to achieve the protection of data privacy and identity privacy on the blockchain.
In the data sharing scheme based on blockchain, some researchers have implemented data sharing schemes for individual users. However, these solutions focus on the aggregation of data and the balance between data privacy and data accessibility in the process of data sharing transactions, and data transmission between multiple entities cannot ensure user data privacy in the entire process. In response to these existing problems, this paper proposes a blockchain data privacy protection and sharing scheme based on zero-knowledge proof. It solves the problems of data privacy security, data availability and consistency, and data transaction traceability in data sharing.
The main research contributions of this paper are as follows.
(1) In multientity data sharing, a zero-knowledge proof-based blockchain data privacy protection and sharing scheme is proposed to achieve privacy protection. Use proxy reencryption technology to ensure data sharing between cloud service providers and data owners. Realize data sharing, traceability, and verifiability among multiple entities based on blockchain characteristics
(2) A method of combining zero-knowledge proof and smart contract is proposed. The data owner can prove that the data meets the requirements of the cloud service organization without revealing any data privacy, realize the consistency and availability of the data in the sharing process, and protect the interests of both parties. After the verification is passed, the improved consensus algorithm enables the nodes to reach consensus directly and faster
(3) Through security analysis and comparison with other solutions, this solution realizes the sharing of data among multiple entities under the premise of not revealing any data privacy, and the consistency, availability, and traceability, and verifiable characteristics of the sharing process during the sharing process. And it has better consensus efficiency
2. Related Work
In a data sharing scheme based on cloud services, it relies on some encryption methods to protect data privacy. However, the data is difficult to trace and verify, and the data is easy to be stolen and tampered. Blockchain can be used to solve some of the current problems in data sharing due to its decentralization, immutability, traceability, and other characteristics. In the data sharing scheme based on blockchain [11, 12], data privacy protection combined with data encryption mainly uses encryption methods such as attribute encryption and proxy reencryption.
In the research of data sharing based on cloud services, Muthusenthil et al. [13] proposed a new secure data sharing reencryption scheme based on trusted institutions, using proxy reencryption methods to ensure data privacy and security, with better performance. However, the solution cannot guarantee user identity privacy and does not have the traceability of transactions and data. Mahakalkar and Sahare [14] proposed SAPA, a privacy protection authentication protocol based on sharing authority, which uses reencryption to realize data sharing between multiple users. The use of an access request matching mechanism realizes the user’s identity is private, but cannot guarantee the traceability of data and transactions. Wang et al. [15] proposed an identity-based data sharing audit scheme, which uses an information-hiding mechanism and a security mechanism that simplifies the signature algorithm to protect sensitive information and prevent malicious managers. However, the validity and consistency of the data cannot be guaranteed. Cheng et al. [16] proposed a reliable and efficient data sharing solution for the Industrial Internet of Things (IIoT). The scheme is based on an adaptive decentralized inadvertent transmission protocol, combined with zero-knowledge proof technology, so that the private key of the data recipient can be hidden from the data owner during the data sharing process. The traceability of data is realized, but the traceability of transactions cannot be realized.
In the research of blockchain-based data sharing solutions, Chowdhury et al. [17] proposed a notarization service framework based on blockchain-based personal data storage and sharing. This framework will ensure the authenticity of real-time shared data, and the transaction privacy is provided in the chain network. However, the complete traceability of the data is guaranteed in the process, but the privacy of the data cannot be guaranteed. Lu et al. [18] designed and implemented a blockchain-authorized secure data sharing architecture, combined with federal learning combined with privacy protection, transformed data sharing problems into machine learning problems, and maintained data privacy. However, the traceability of the transaction and the integrity of the data cannot be guaranteed. Wang et al. [19] proposed a blockchain-based security and privacy protection electronic medical record sharing protocol, which combines searchable encryption and conditional proxy reencryption to achieve data security, privacy protection, and access control. However, the validity of the data cannot be guaranteed. Sani et al. [20] proposed a high-performance, scalable blockchain that enhances the security and privacy of IIoT, using time-based zero-knowledge proof and authentication encryption to perform mutual authentication between multiple attributes. The evaluation from the three aspects of security, privacy, and performance shows that the scheme is safe, and the computational complexity and delay performance are significantly reduced. The privacy of identity and data is guaranteed, but the traceability of transactions cannot be achieved. Shen et al. [21] proposed a reliable sharing and collaboration model based on blockchain. Data owners, miners, and third parties share data through blockchain and record through smart contracts. Participants can use private clouds or public clouds to obtain and store data sharing. The identity privacy of data participants is guaranteed, but the content privacy of data cannot be guaranteed. Kouicem et al. [22] proposed a decentralized and anonymous vehicle data sharing scheme, allowing each vehicle to anonymously verify each data record without revealing the identity of the vehicle sharing this data. Each vehicle sends a certificate to the data record, which uses zero-knowledge proof (ZKP) to anonymously combine the data record and the user’s identity. Identity privacy is guaranteed, but the traceability of data transactions cannot be achieved. Manzoor et al. [23] proposed a blockchain-based IoT data sharing scheme. Use proxy reencryption to store and share Internet of Things data in a cloud proxy server, and establish smart contracts between sensors and data consumers without the involvement of a trusted third party. The privacy of the data is guaranteed, but the validity and consistency of the data cannot be guaranteed.
From the above scheme, we can see that the blockchain-based cloud data sharing scheme has achieved certain research results, and a variety of data sharing schemes have been proposed using blockchain technology and cryptographic methods. However, the consistency and availability of data in data sharing and the traceability and verifiability of data sharing transactions between multiple entities have not been effectively improved.
3. Problem Description
The solution proposed in this article combines blockchain, agent heavy intelligence, smart contracts, and zk-SNARK technology to achieve privacy protection and data security sharing among data owners, cloud service organizations, and semitrusted cloud servers. The system model of our proposal is shown in Figure 1.
[figure omitted; refer to PDF]
It includes 6 participating entities: (1) data owner, (2) cloud service organization (CSP), (3) semitrusted cloud server (semitrusted CS), (4) private key generator (PKG), (5) smart contract, and (6) blockchain (Blockchain). Their functions are described as follows.
(i) Data owner: data owners have the right to securely own and conditionally share their information and data and can obtain corresponding benefits as remuneration during the sharing process
(ii) Cloud service organization (CSP): as a consumer of private data, cloud service organization needs to collect and analyze private data. They issue corresponding privacy data requirements by entrusting smart contracts. But at the same time, they do not believe that the data provided by the data owner meets their needs, so they use smart contracts to ensure the consistency and effectiveness of the data requirements
(iii) Semitrusted cloud server: as a semitrusted entity, it needs to store the original ciphertext of the data owner and is responsible for converting it into intermediate ciphertext, which will be handed over to the cloud service organization after verification and decrypted by its private key
(iv) Private key generator (PKG): it is a completely trusted entity that needs to generate master keys and system parameters and distributes public keys and keys to data owners and cloud service organizations
(v) Smart contract: smart contracts are responsible for predeclaring the requirements and the specific structure of private data and guaranteeing certain data benefits. Automatically judge the validity of the zero-knowledge proof without the participation of a third party
(vi) Blockchain: responsible for reaching a consensus on data transactions. Store the hash of private data in the blockchain to ensure the immutability and traceability of the data, which is the evidence for data disputes
4. Security Model
4.1. Definition
Based on the DBDH assumption, under the random oracle model, if there is a negligible function
4.2. Initialization
Challenger
Stage 1: the adversary
Challenge phase: the adversary
Stage 2: the adversary
The adversary
5. Blockchain Data Privacy Protection Scheme Based on ZKP
5.1. Scheme Steps
As shown in Figure 2, after each entity is registered in the blockchain, the private key generation center assigns a common private key pair to the user. The cloud service provider generates a zero-knowledge proof
[figure omitted; refer to PDF]
Table 1
Notations.
| Symbols | Definitions |
| Security parameter | |
| Private key generation center | |
| Data owner’s private data | |
| The public key of the data owner and cloud service provider | |
| The private key of the data owner and cloud service provider | |
| Reencryption key | |
| Reencrypted ciphertext | |
| Digital signature | |
| Zero-knowledge proof | |
| Generate the key for zero-knowledge proof | |
| Key to verify zero-knowledge proof |
6. Specific Structure
The specific construction process of the scheme is divided into the following ten stages.
6.1. Join the Network Phase
Equations should be provided in a text format, rather than as an image. Microsoft Word’s equation tool is acceptable. Equations should be numbered consecutively, in round brackets, on the right-hand side of the page. They should be referred to as Equation 1, etc. in the main text.
6.2. Data Initialization Phase
First, PKG chooses to input a security parameter
PKG uses its identity
Among them,
6.3. Smart Contract Release Phase
The cloud service provider uses zk-SNARKs to generate a zero-knowledge proof
6.4. Encryption Phase
After the data owner generates the private data, it will encrypt private data
Then, the data owner uploads the ciphertext
6.5. Data Record On-Chain Phase
The data owner will store the hash value and digital signature of the data record on the blockchain platform, and the private data will be encrypted and stored on the proxy cloud server. The data owner will submit the hash value of his private data
[figure omitted; refer to PDF]
PBFT stage:
Step 1.
After receiving client
Step 2.
After the secondary node (Replica) receives more than
Step 3.
After receiving more than
Raft stage:
Step 4.
The leader in Raft broadcasts the message.
Step 5.
After the follower nodes receive the message, they will verify the feedback.
Step 6.
The leader node judges whether a consensus is reached according to the feedback result and submits the log.
Step 7.
After completing the consensus, return the consensus result to the smart contract and write it into the blockchain ledger.
Related variables of RBFT:
(1) The RBFT consensus mechanism needs to meet the number of groups
(2) The maximum fault tolerance range
7. Specific Structure
7.1. Security Proof
Lemma 1.
Based on the DBDH assumption, our scheme can resist selected plaintext attacks under the random oracle model; our solution is IND-CPA secure, that is, it satisfies the indistinguishability under the selected plaintext attack.
Proof.
Assuming that
Stage 1:
(1) Preparation stage:
(2) Key generation:
Stage 2:
Reencryption key generation: when
Reencryption: when
Challenge: let
The opponent
8. Performance Analysis
8.1. Content Privacy
In this solution, all private data is encrypted by the data owner using a sufficiently secure encryption algorithm and then uploaded to the proxy cloud server. We assume that the encryption algorithm used is sufficiently secure under the security model. If the key cannot be obtained, any internal adversary or external adversary cannot obtain the ciphertext. The data owner uses the private key of the cloud service provider to generate a reencryption key, which is reencrypted by the proxy cloud server and sent to the cloud service provider. Therefore, only authorized institutions can decrypt to obtain the ciphertext, and other entities in the process cannot obtain the ciphertext information.
8.2. Identity Privacy
When each participant entity registers, the identity certificate authority in the alliance chain will strictly examine the legality of the data owner or cloud service provider’s identity and generate pseudoidentities for participants to ensure the privacy of their identities in transactions. In data sharing transactions, the real identity of the user cannot be obtained in the interaction between the participating entities and the smart contract. The cloud service provider only publishes the required keywords to achieve partial privacy protection and prevent the data owner from forging false data.
8.3. Data Validity
In this solution, only organizations authorized by the data owner can decrypt private data. The data owner generates a zero-knowledge proof
8.4. Verifiability
The data owner sends the digital signature together with the generated zero-knowledge proof, and other entities can verify the validity of the signature, ensuring the validity of the zero-knowledge proof. The hash of the data is stored on the blockchain. The characteristics of the blockchain ensure that the data cannot be tampered with, and other entities receiving the data can verify the integrity of the data.
8.5. Traceability
In this solution, when the data owner and the cloud service provider reach a transaction on the premise that the data is complete and valid, the transaction is stored in the blockchain. If the data owner fails to abide by the promise of no longer selling information to others and sells the information multiple times, the transaction history can be traced back in the blockchain to impose punishment.
9. Performance Analysis
Through comparative analysis of existing data sharing schemes, literature [20] uses time-based zero-knowledge proof and authentication encryption to perform mutual authentication between multiple attributes, ensuring security and privacy in data sharing. Literature [16] combined with zero-knowledge proof technology to achieve confidentiality and correctness in the data sharing process. Literature [21] realizes the reliability of data in data sharing among participants through an incentive mechanism, but the shared data is neither anonymous nor encrypted. Literature [22] realizes the sharing of vehicle data, but when there is an error in the data transaction, the traceability of the data source cannot be realized. Literature [23] uses proxy reencryption based on blockchain to store and share Internet of Things data in a cloud proxy server to achieve confidentiality and integrity in the data sharing process, but it cannot guarantee the validity and consistency of the data.
This article realizes the validity and consistency of the data sharing process under the premise of protecting data privacy and the privacy of the data owner’s identity. Utilize the immutability and traceability of the blockchain to realize data integrity and traceability of data transactions. The comparison between this article and other programs is shown in Table 2.
Table 2
Performance comparison between this article and other solutions.
| Scheme | Not rely on trusted third parties | Content privacy | Identity privacy | Data validity | Verifiability | Traceability |
| [16] | √ | √ | √ | × | ─ | √ |
| [20] | √ | √ | ─ | × | √ | × |
| [21] | √ | × | × | √ | ─ | × |
| [22] | √ | √ | √ | × | √ | × |
| [23] | × | √ | ─ | × | √ | ─ |
| This paper | × | √ | √ | √ | √ | √ |
10. Conclusions
Blockchain combined with zero-knowledge proof provides a new solution to the data sharing model. A large amount of data in the Industrial Internet of Things is the basis for promoting better development of services. How to maintain data privacy as much as possible on the premise of effective use of data is an important issue facing now. In response to these problems, this article combines zero-knowledge proof and smart contracts to achieve data validity and consistency between data owners and cloud service providers. Use proxy reencryption technology to realize the safe sharing of data among multiple participants. And combined with the nontamperable and traceable characteristics of the blockchain, the data can be verified and the transaction can be traced. Future work will study the realization of the secure sharing of data without a third-party server and the realization of a completely decentralized data sharing scheme.
Acknowledgments
This work is supported by the National Natural Science Foundation of China (Grant Nos. 62162039 and 61762060) and the Foundation for the Key Research and Development Program of Gansu Province, China (Grant No. 20YF3GA016).
[1] E. Sisinni, A. Saifullah, S. Han, U. Jennehag, M. Gidlund, "Industrial Internet of things: challenges, opportunities, and directions," IEEE Transactions on Industrial Informatics, vol. 14 no. 11, pp. 4724-4734, DOI: 10.1109/TII.2018.2852491, 2018.
[2] Q. Li, B. Xia, H. Huang, Y. Zhang, T. Zhang, "TRAC: traceable and revocable access control scheme for mHealth in 5G-enabled IIoT," IEEE Transactions on Industrial Informatics, vol. 18 no. 5, pp. 3437-3448, DOI: 10.1109/TII.2021.3109090, 2022.
[3] Z. Li, J. Kang, R. Yu, D. Ye, Q. Deng, Y. Zhang, "Consortium blockchain for secure energy trading in industrial Internet of things," IEEE Transactions on Industrial Informatics, vol. 14 no. 8, pp. 3690-3700, DOI: 10.1109/TII.2017.2786307, 2017.
[4] J. Xiong, R. Bi, M. Zhao, J. Guo, Q. Yang, "Edge-assisted privacy-preserving raw data sharing framework for connected autonomous vehicles," IEEE Wireless Communications, vol. 27 no. 3, pp. 24-30, DOI: 10.1109/MWC.001.1900463, 2020.
[5] J. Xiong, R. Ma, L. Chen, Y. Tian, Q. Li, X. Liu, Z. Yao, "A personalized privacy protection framework for mobile crowdsensing in IIoT," IEEE Transactions on Industrial Informatics, vol. 16 no. 6, pp. 4231-4241, DOI: 10.1109/TII.2019.2948068, 2020.
[6] E. B. Sasson, A. Chiesa, C. Garman, M. Green, I. Miers, E. Tromer, M. Virza, "Zerocash: decentralized anonymous payments from bitcoin," 2014 IEEE symposium on security and privacy, pp. 459-474, .
[7] A. Rondelet, M. Zajac, ZETH: On Integrating Zerocash on Ethereum, 2019.
[8] J. Li, S. Wu, Y. Yang, F. Duan, H. Lu, Y. Lu, "Controlled sharing mechanism of data based on the consortium blockchain," Security and Communication Networks, vol. 2021,DOI: 10.1155/2021/5523489, 2021.
[9] F. Loukil, C. Ghedira-Guegan, K. Boukadi, A. N. Benharkat, "Privacy-preserving IoT data aggregation based on blockchain and homomorphic encryption," Sensors, vol. 21 no. 7,DOI: 10.3390/s21072452, 2021.
[10] X. Qin, Y. Huang, Z. Yang, X. Li, "LBAC: a lightweight blockchain-based access control scheme for the Internet of things," Information Sciences, vol. 554, pp. 222-235, DOI: 10.1016/j.ins.2020.12.035, 2021.
[11] Y. Tian, Z. Wang, J. Xiong, J. Ma, "A blockchain-based secure key management scheme with trustworthiness in DWSNs," IEEE Transactions on Industrial Informatics, vol. 16 no. 9, pp. 6193-6202, DOI: 10.1109/TII.2020.2965975, 2020.
[12] Y. Tian, T. Li, J. Xiong, M. Z. Bhuiyan, J. Ma, C. Peng, "A blockchain-based machine learning framework for edge services in IIoT," IEEE Transactions on Industrial Informatics, vol. 18 no. 3, pp. 1918-1929, DOI: 10.1109/TII.2021.3097131, 2022.
[13] B. Muthusenthil, D. Nivetha, H. Kim, "Reencryption scheme for secure data sharing," 2016 International Conference on Communication and Signal Processing (ICCSP), pp. 1170-1174, .
[14] N. Mahakalkar, V. Sahare, "Implementation of re-encryption based security mechanism to authenticate shared access in cloud computing," 2017 International Conference on Trends in Electronics and Informatics (ICEI), pp. 547-550, .
[15] Y. Fan, Y. Liao, F. Li, S. Zhou, G. Zhang, "Identity-based auditing for shared cloud data with efficient and secure sensitive information hiding," IEEE Access, vol. 7, pp. 114246-114260, DOI: 10.1109/ACCESS.2019.2932430, 2019.
[16] C. Huang, D. Liu, J. Ni, R. Lu, X. Shen, "Achieving accountable and efficient data sharing in industrial Internet of things," IEEE Transactions on Industrial Informatics, vol. 17 no. 2, pp. 1416-1427, DOI: 10.1109/TII.2020.2982942, 2021.
[17] M. J. M. Chowdhury, A. Colman, M. A. Kabir, J. Han, P. Sarda, "Blockchain as a notarization service for data sharing with personal data store," 2018 17th ieee international conference on trust, security and privacy in computing and communications/12th ieee international conference on big data science and engineering (TrustCom/BigDataSE), pp. 1330-1335, .
[18] Y. Lu, X. Huang, Y. Dai, S. Maharjan, Y. Zhang, "Blockchain and federated learning for privacy-preserved data sharing in industrial IoT," IEEE Transactions on Industrial Informatics, vol. 16 no. 6, pp. 4177-4186, DOI: 10.1109/TII.2019.2942190, 2020.
[19] Y. Wang, A. Zhang, P. Zhang, H. Wang, "Cloud-assisted EHR sharing with security and privacy preservation via consortium blockchain," IEEE Access, vol. 7, pp. 136704-136719, DOI: 10.1109/ACCESS.2019.2943153, 2019.
[20] A. S. Sani, D. Yuan, W. Bao, P. L. Yeoh, Z. Y. Dong, B. Vucetic, E. Bertino, "Xyreum: a high-performance and scalable blockchain for IIoT security and privacy," 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS), pp. 1920-1930, .
[21] M. Shen, J. Duan, L. Zhu, J. Zhang, X. Du, M. Guizani, "Blockchain-based incentives for secure and collaborative data sharing in multiple clouds," IEEE Journal on Selected Areas in Communications, vol. 38 no. 6, pp. 1229-1241, DOI: 10.1109/JSAC.2020.2986619, 2020.
[22] D. E. Kouicem, A. Bouabdallah, H. Lakhlef, "An efficient and anonymous blockchain-based data sharing scheme for vehicular networks," 2020 IEEE Symposium on Computers and Communications (ISCC), .
[23] A. Manzoor, A. Braeken, S. S. Kanhere, M. Ylianttila, M. Liyanage, "Proxy re-encryption enabled secure and anonymous IoT data sharing platform based on blockchain," Journal of Network and Computer Applications, vol. 176, article 102917,DOI: 10.1016/j.jnca.2020.102917, 2021.
[24] R. Kashyap, K. Arora, M. Sharma, A. Aazam, "Security-aware GA based practical byzantine fault tolerance for permissioned blockchain," 2019 4th International Conference on Control, Robotics and Cybernetics (CRC), .
[25] L. Hou, X. Xu, K. Zheng, X. Wang, "An intelligent transaction migration scheme for RAFT-based private blockchain in Internet of things applications," IEEE Communications Letters, vol. 25 no. 8, pp. 2753-2757, DOI: 10.1109/LCOMM.2021.3079201, 2021.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
Copyright © 2022 Tao Feng et al. This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Abstract
The data generated in the Industrial Internet of Things (IIoT) has important research value. In the process of data sharing, data privacy, security, and data availability are important issues that cannot be ignored. This paper proposes a blockchain privacy protection scheme based on zero-knowledge proof to realize the secure sharing of data among data owners, cloud service providers, and semitrusted cloud servers. First, the method of combining zero-knowledge proof and smart contract is used to verify the availability of data between the data owner and the cloud service provider under the premise of protecting data privacy. Second, proxy reencryption technology is used to realize the secure sharing of data among authorized cloud service providers. In addition, data sharing transaction information between multiple parties and data hashes with digital signatures are stored on the blockchain to achieve public and verifiable data sharing information and data validity. Finally, the theoretical analysis of the scheme shows that the scheme meets the confidentiality requirements of security, integrity, and validity.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer





