{"title":"基于区块链的验证,用于安全共享数据","authors":"Y. Liu, Hao-peng Chen, Fei Hu","doi":"10.1109/PIC.2017.8359552","DOIUrl":null,"url":null,"abstract":"For the sake of protecting users' privacy from the malicious data which is shared by other people and leasing the pressure of the clouds, an approach of verification based on the Blockchain is put forward in our article. By using the Blockchain to record the hash value and other necessary information of data sharing by other people, we can guarantee that the data user received from a third-party source (such as a cloud storage platform) is the original uploaded data indeed. After taking some experiments on the following method. We confirm that it can be easily distinguished whether a data has been modified by malicious people through our Blockchain-based approach. This Blockchain-based approach of verification can effectively help users find out if the data received is the one exactly he wants. In addition, our approach will imply that the data is not the original one and that data cannot be opened or executed.","PeriodicalId":370588,"journal":{"name":"2017 International Conference on Progress in Informatics and Computing (PIC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"A blockchain-based verification for sharing data securely\",\"authors\":\"Y. Liu, Hao-peng Chen, Fei Hu\",\"doi\":\"10.1109/PIC.2017.8359552\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"For the sake of protecting users' privacy from the malicious data which is shared by other people and leasing the pressure of the clouds, an approach of verification based on the Blockchain is put forward in our article. By using the Blockchain to record the hash value and other necessary information of data sharing by other people, we can guarantee that the data user received from a third-party source (such as a cloud storage platform) is the original uploaded data indeed. After taking some experiments on the following method. We confirm that it can be easily distinguished whether a data has been modified by malicious people through our Blockchain-based approach. This Blockchain-based approach of verification can effectively help users find out if the data received is the one exactly he wants. In addition, our approach will imply that the data is not the original one and that data cannot be opened or executed.\",\"PeriodicalId\":370588,\"journal\":{\"name\":\"2017 International Conference on Progress in Informatics and Computing (PIC)\",\"volume\":\"2 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 International Conference on Progress in Informatics and Computing (PIC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/PIC.2017.8359552\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Conference on Progress in Informatics and Computing (PIC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PIC.2017.8359552","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A blockchain-based verification for sharing data securely
For the sake of protecting users' privacy from the malicious data which is shared by other people and leasing the pressure of the clouds, an approach of verification based on the Blockchain is put forward in our article. By using the Blockchain to record the hash value and other necessary information of data sharing by other people, we can guarantee that the data user received from a third-party source (such as a cloud storage platform) is the original uploaded data indeed. After taking some experiments on the following method. We confirm that it can be easily distinguished whether a data has been modified by malicious people through our Blockchain-based approach. This Blockchain-based approach of verification can effectively help users find out if the data received is the one exactly he wants. In addition, our approach will imply that the data is not the original one and that data cannot be opened or executed.