Skip to main content

2024 | OriginalPaper | Buchkapitel

Two-Round Private Set Intersection Mechanism and Algorithm Based on Blockchain

verfasst von : Yue Wang, Zhanshan Wang, Xiaofeng Ma, Jing He

Erschienen in: Digital Forensics and Watermarking

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In the contemporary era of the digital economy, the significance of data as a fundamental production factor cannot be overstated, as it serves as a driving force behind the development of the digital economy. Despite the existence of numerous algorithms that have been proposed to achieve intersection of datasets while ensuring privacy, challenges related to computational efficiency and trust costs between institutions persist. This paper presents the BTPSI (Blockchain-based Two-round Private Set Intersection) algorithm, which aims to efficiently and reliably compute the intersection of datasets within the unbalanced private set intersection framework. The proposed BTPSI algorithm has been thoroughly tested and evaluated on various datasets of varying sizes.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Chen, M., Mao, S., Liu, Y.: Big data: a survey. Mob. Netw. Appl. 19, 171–209 (2014)CrossRef Chen, M., Mao, S., Liu, Y.: Big data: a survey. Mob. Netw. Appl. 19, 171–209 (2014)CrossRef
2.
Zurück zum Zitat Wylde, V., et al.: Cybersecurity, data privacy and blockchain: a review. SN Comput. Sci. 3, 12 (2022)CrossRef Wylde, V., et al.: Cybersecurity, data privacy and blockchain: a review. SN Comput. Sci. 3, 12 (2022)CrossRef
3.
Zurück zum Zitat Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. Consulted (2008) Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. Consulted (2008)
4.
Zurück zum Zitat Tan, L., Yu, K., Shi, N., Yang, C., Lu, H.: Towards secure and privacy-preserving data sharing for covid-19 medical records: a blockchain-empowered approach. IEEE Trans. Netw. Sci. Eng. 1 (2021) Tan, L., Yu, K., Shi, N., Yang, C., Lu, H.: Towards secure and privacy-preserving data sharing for covid-19 medical records: a blockchain-empowered approach. IEEE Trans. Netw. Sci. Eng. 1 (2021)
5.
Zurück zum Zitat Piao, C., Hao, Y., Yan, J., Jiang, X.: Privacy preserving in blockchain-based government data sharing: a service-on-chain (SOC) approach. Inf. Process. Manage. 58, 12 (2021)CrossRef Piao, C., Hao, Y., Yan, J., Jiang, X.: Privacy preserving in blockchain-based government data sharing: a service-on-chain (SOC) approach. Inf. Process. Manage. 58, 12 (2021)CrossRef
6.
Zurück zum Zitat Jiang, S., Cao, J., Wu, H., Chen, K., Liu, X.: Privacy-preserving and efficient data sharing for blockchain-based intelligent transportation systems. Inf. Sci.: Int. J. (2023) Jiang, S., Cao, J., Wu, H., Chen, K., Liu, X.: Privacy-preserving and efficient data sharing for blockchain-based intelligent transportation systems. Inf. Sci.: Int. J. (2023)
7.
Zurück zum Zitat Lu, Y., Huang, X., Dai, Y., Maharjan, S., Zhang, Y.: Blockchain and federated learning for privacy-preserved data sharing in industrial IoT. IEEE Trans. Industr. Inf. 16, 4177–4186 (2020)CrossRef Lu, Y., Huang, X., Dai, Y., Maharjan, S., Zhang, Y.: Blockchain and federated learning for privacy-preserved data sharing in industrial IoT. IEEE Trans. Industr. Inf. 16, 4177–4186 (2020)CrossRef
8.
Zurück zum Zitat Sultana, T., Ghaffar, A., Azeem, M., Abubaker, Z., Javaid, N.: Data sharing system integrating access control based on smart contracts for IoT. In: in 14th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (2019) Sultana, T., Ghaffar, A., Azeem, M., Abubaker, Z., Javaid, N.: Data sharing system integrating access control based on smart contracts for IoT. In: in 14th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (2019)
9.
Zurück zum Zitat Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89–98. Association for Computing Machinery, Alexandria (2006) Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89–98. Association for Computing Machinery, Alexandria (2006)
10.
Zurück zum Zitat Rouhani, S., Deters, R.: Blockchain based access control systems: State of the art and challenges. IEEE/WIC/ACM International Conference on Web Intelligence, pp. 423–428. Association for Computing Machinery, Thessaloniki (2019) Rouhani, S., Deters, R.: Blockchain based access control systems: State of the art and challenges. IEEE/WIC/ACM International Conference on Web Intelligence, pp. 423–428. Association for Computing Machinery, Thessaloniki (2019)
11.
Zurück zum Zitat Wang, Z., Tian, Y., Zhu, J.: Data sharing and tracing scheme based on blockchain. In: 8th International Conference on Logistics, Informatics and Service Sciences (LISS), Toronto, ON, Canada, pp. 1–6 (2018) Wang, Z., Tian, Y., Zhu, J.: Data sharing and tracing scheme based on blockchain. In: 8th International Conference on Logistics, Informatics and Service Sciences (LISS), Toronto, ON, Canada, pp. 1–6 (2018)
12.
Zurück zum Zitat Zheng, B.-K., et al.: Scalable and privacy-preserving data sharing based on blockchain. J. Comput. Sci. Technol. 33, 557–567 (2018)MathSciNetCrossRef Zheng, B.-K., et al.: Scalable and privacy-preserving data sharing based on blockchain. J. Comput. Sci. Technol. 33, 557–567 (2018)MathSciNetCrossRef
13.
Zurück zum Zitat Feng, T., Pei, H., Ma, R., Tian, Y., Feng, X.: Blockchain data privacy access control based on searchable attribute encryption. Comput. Mater. Continua (2020) Feng, T., Pei, H., Ma, R., Tian, Y., Feng, X.: Blockchain data privacy access control based on searchable attribute encryption. Comput. Mater. Continua (2020)
15.
Zurück zum Zitat Wenge, O., Lampe, U., Müller, A., Schaarschmidt, R.: Data privacy in cloud computing - an empirical study in the financial industry (2014) Wenge, O., Lampe, U., Müller, A., Schaarschmidt, R.: Data privacy in cloud computing - an empirical study in the financial industry (2014)
16.
Zurück zum Zitat Freedman, M.J., Pinkas, B., Nissim, K., Hazay, C.: Efficient set intersection with simulation-based security. J. Cryptol.: J. Int. Assoc. Cryptol. Res. (2016) Freedman, M.J., Pinkas, B., Nissim, K., Hazay, C.: Efficient set intersection with simulation-based security. J. Cryptol.: J. Int. Assoc. Cryptol. Res. (2016)
19.
Zurück zum Zitat Jiang, H., Xu, Q.: Secure multiparty computation in cloud computing. J. Comput. Res. Dev. (2016) Jiang, H., Xu, Q.: Secure multiparty computation in cloud computing. J. Comput. Res. Dev. (2016)
20.
Zurück zum Zitat Kerschbaum, F.: Collusion-resistant outsourcing of private set intersection. In: ACM Symposium on Applied Computing (2012) Kerschbaum, F.: Collusion-resistant outsourcing of private set intersection. In: ACM Symposium on Applied Computing (2012)
21.
Zurück zum Zitat Liu, F., Ng, W.K., Zhang, W., Giang, D.H., Han, S.: Encrypted set intersection protocol for outsourced datasets. In: Proceedings of the 2014 IEEE International Conference on Cloud Engineering, pp. 135–140. IEEE Computer Society (2014) Liu, F., Ng, W.K., Zhang, W., Giang, D.H., Han, S.: Encrypted set intersection protocol for outsourced datasets. In: Proceedings of the 2014 IEEE International Conference on Cloud Engineering, pp. 135–140. IEEE Computer Society (2014)
23.
Zurück zum Zitat Fan, B., Andersen, D.G., Kaminsky, M., Mitzenmacher, M.D.: Cuckoo filter: practically better than bloom. In: Proceedings of the 10th ACM International on Conference on emerging Networking Experiments and Technologies, pp. 75–88. Association for Computing Machinery, Sydney (2014) Fan, B., Andersen, D.G., Kaminsky, M., Mitzenmacher, M.D.: Cuckoo filter: practically better than bloom. In: Proceedings of the 10th ACM International on Conference on emerging Networking Experiments and Technologies, pp. 75–88. Association for Computing Machinery, Sydney (2014)
Metadaten
Titel
Two-Round Private Set Intersection Mechanism and Algorithm Based on Blockchain
verfasst von
Yue Wang
Zhanshan Wang
Xiaofeng Ma
Jing He
Copyright-Jahr
2024
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-97-2585-4_18

Premium Partner