通过在交易广播期间限制验证节点来保护区块链隐私

Aisha Zahid Junejo, Manzoor Ahmed Hashmani, Abdullah Abdulrehman Alabdulatif
{"title":"通过在交易广播期间限制验证节点来保护区块链隐私","authors":"Aisha Zahid Junejo, Manzoor Ahmed Hashmani, Abdullah Abdulrehman Alabdulatif","doi":"10.1109/ICECCE52056.2021.9514212","DOIUrl":null,"url":null,"abstract":"The increasing awareness of the Blockchain technology has gained interest of researchers and industrialists in recent years, hence several business enterprises are keen on using blockchain technology for their day-to-day transactions and record keeping. However, due to public availability of data on the blockchain, it is not advisable for organizations dealing with sensitive and confidential data to risk their data privacy by using blockchain networks. In this study we talk about privacy vulnerabilities and challenges in blockchain based applications. We verify the extent of the problem by both, literary findings, and empirical analyses. Next, we propose a conceptual framework to strengthen privacy preservation of the blockchain networks. The proposed framework is based on the idea of limiting the number of nodes that a transaction is broadcast to, for verification. The selected nodes will differ for each transaction, decreasing the possibilities of network listening and deanonymization of users. Moreover, limiting the number of verifying nodes will result in drastic reduction of computation overhead of the network, along with improved scalability. The proposed framework is analyzed based on various privacy features and risks. The evaluation results show that the model has a privacy rank of 0.76.","PeriodicalId":302947,"journal":{"name":"2021 International Conference on Electrical, Communication, and Computer Engineering (ICECCE)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Blockchain Privacy Preservation by Limiting Verifying Nodes' During Transaction Broadcasting\",\"authors\":\"Aisha Zahid Junejo, Manzoor Ahmed Hashmani, Abdullah Abdulrehman Alabdulatif\",\"doi\":\"10.1109/ICECCE52056.2021.9514212\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The increasing awareness of the Blockchain technology has gained interest of researchers and industrialists in recent years, hence several business enterprises are keen on using blockchain technology for their day-to-day transactions and record keeping. However, due to public availability of data on the blockchain, it is not advisable for organizations dealing with sensitive and confidential data to risk their data privacy by using blockchain networks. In this study we talk about privacy vulnerabilities and challenges in blockchain based applications. We verify the extent of the problem by both, literary findings, and empirical analyses. Next, we propose a conceptual framework to strengthen privacy preservation of the blockchain networks. The proposed framework is based on the idea of limiting the number of nodes that a transaction is broadcast to, for verification. The selected nodes will differ for each transaction, decreasing the possibilities of network listening and deanonymization of users. Moreover, limiting the number of verifying nodes will result in drastic reduction of computation overhead of the network, along with improved scalability. The proposed framework is analyzed based on various privacy features and risks. The evaluation results show that the model has a privacy rank of 0.76.\",\"PeriodicalId\":302947,\"journal\":{\"name\":\"2021 International Conference on Electrical, Communication, and Computer Engineering (ICECCE)\",\"volume\":\"9 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-06-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 International Conference on Electrical, Communication, and Computer Engineering (ICECCE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICECCE52056.2021.9514212\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Electrical, Communication, and Computer Engineering (ICECCE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICECCE52056.2021.9514212","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

近年来,区块链技术的意识日益增强,引起了研究人员和实业家的兴趣,因此一些商业企业热衷于使用区块链技术进行日常交易和记录保存。然而,由于区块链上数据的公开可用性,处理敏感和机密数据的组织不建议通过使用区块链网络来冒数据隐私的风险。在本研究中,我们讨论了基于区块链的应用程序中的隐私漏洞和挑战。我们通过文献研究和实证分析来验证问题的严重程度。接下来,我们提出了一个概念框架来加强区块链网络的隐私保护。所提出的框架基于限制事务广播到的节点数量以进行验证的想法。每个交易所选择的节点将有所不同,从而减少了网络侦听和用户去匿名化的可能性。此外,限制验证节点的数量将大大减少网络的计算开销,并提高可伸缩性。基于各种隐私特征和风险分析了所提出的框架。评价结果表明,该模型的隐私等级为0.76。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Blockchain Privacy Preservation by Limiting Verifying Nodes' During Transaction Broadcasting
The increasing awareness of the Blockchain technology has gained interest of researchers and industrialists in recent years, hence several business enterprises are keen on using blockchain technology for their day-to-day transactions and record keeping. However, due to public availability of data on the blockchain, it is not advisable for organizations dealing with sensitive and confidential data to risk their data privacy by using blockchain networks. In this study we talk about privacy vulnerabilities and challenges in blockchain based applications. We verify the extent of the problem by both, literary findings, and empirical analyses. Next, we propose a conceptual framework to strengthen privacy preservation of the blockchain networks. The proposed framework is based on the idea of limiting the number of nodes that a transaction is broadcast to, for verification. The selected nodes will differ for each transaction, decreasing the possibilities of network listening and deanonymization of users. Moreover, limiting the number of verifying nodes will result in drastic reduction of computation overhead of the network, along with improved scalability. The proposed framework is analyzed based on various privacy features and risks. The evaluation results show that the model has a privacy rank of 0.76.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信