基于区块链的验证,用于安全共享数据

Y. Liu, Hao-peng Chen, Fei Hu
{"title":"基于区块链的验证,用于安全共享数据","authors":"Y. Liu, Hao-peng Chen, Fei Hu","doi":"10.1109/PIC.2017.8359552","DOIUrl":null,"url":null,"abstract":"For the sake of protecting users' privacy from the malicious data which is shared by other people and leasing the pressure of the clouds, an approach of verification based on the Blockchain is put forward in our article. By using the Blockchain to record the hash value and other necessary information of data sharing by other people, we can guarantee that the data user received from a third-party source (such as a cloud storage platform) is the original uploaded data indeed. After taking some experiments on the following method. We confirm that it can be easily distinguished whether a data has been modified by malicious people through our Blockchain-based approach. This Blockchain-based approach of verification can effectively help users find out if the data received is the one exactly he wants. In addition, our approach will imply that the data is not the original one and that data cannot be opened or executed.","PeriodicalId":370588,"journal":{"name":"2017 International Conference on Progress in Informatics and Computing (PIC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"A blockchain-based verification for sharing data securely\",\"authors\":\"Y. Liu, Hao-peng Chen, Fei Hu\",\"doi\":\"10.1109/PIC.2017.8359552\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"For the sake of protecting users' privacy from the malicious data which is shared by other people and leasing the pressure of the clouds, an approach of verification based on the Blockchain is put forward in our article. By using the Blockchain to record the hash value and other necessary information of data sharing by other people, we can guarantee that the data user received from a third-party source (such as a cloud storage platform) is the original uploaded data indeed. After taking some experiments on the following method. We confirm that it can be easily distinguished whether a data has been modified by malicious people through our Blockchain-based approach. This Blockchain-based approach of verification can effectively help users find out if the data received is the one exactly he wants. In addition, our approach will imply that the data is not the original one and that data cannot be opened or executed.\",\"PeriodicalId\":370588,\"journal\":{\"name\":\"2017 International Conference on Progress in Informatics and Computing (PIC)\",\"volume\":\"2 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 International Conference on Progress in Informatics and Computing (PIC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/PIC.2017.8359552\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Conference on Progress in Informatics and Computing (PIC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PIC.2017.8359552","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

摘要

为了保护用户的隐私不受他人共享的恶意数据的影响,也为了减轻云的压力,本文提出了一种基于区块链的验证方法。通过使用区块链记录其他人共享数据的哈希值等必要信息,我们可以保证数据用户从第三方来源(如云存储平台)接收的数据确实是原始上传的数据。在对以下方法进行了一些实验后。我们确认,通过我们基于区块链的方法,可以很容易地区分数据是否被恶意人员修改。这种基于区块链的验证方法可以有效地帮助用户确定收到的数据是否正是他想要的。此外,我们的方法将意味着数据不是原始数据,不能打开或执行数据。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
A blockchain-based verification for sharing data securely
For the sake of protecting users' privacy from the malicious data which is shared by other people and leasing the pressure of the clouds, an approach of verification based on the Blockchain is put forward in our article. By using the Blockchain to record the hash value and other necessary information of data sharing by other people, we can guarantee that the data user received from a third-party source (such as a cloud storage platform) is the original uploaded data indeed. After taking some experiments on the following method. We confirm that it can be easily distinguished whether a data has been modified by malicious people through our Blockchain-based approach. This Blockchain-based approach of verification can effectively help users find out if the data received is the one exactly he wants. In addition, our approach will imply that the data is not the original one and that data cannot be opened or executed.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信