Review on privacy threats and protection mechanisms for blockchain technology

被引:0
|
作者
Liu H. [1 ,2 ,3 ]
Zhou Y. [1 ]
Zhou X. [1 ]
Xie J. [1 ]
机构
[1] School of Economics and Management, Yanshan University, Qinhuangdao
[2] Business School, Nankai University, Tianjin
[3] School of Information Science and Engineering, Yanshan University, Qinhuangdao
关键词
blockchain; channel isolation; currency mixing mechanism; privacy protection mechanism; privacy threat;
D O I
10.13196/j.cims.2023.07.014
中图分类号
学科分类号
摘要
As a new distributed computing paradigm for building trusted networks and realizing value interconnection, blockchain drives a new round of technological change and application innovation in traditional industries with its features of decentralization, access controllability and anonymity. However, there is still a serious threat of privacy breaches. By sorting out the research results related to blockchain privacy in recent years, the privacy threats faced by the blockchain were compared and assessed, such as account privacy, transaction privacy and communication privacy, and the currency mixing mechanism, information hiding mechanism and channel isolation mechanism in the blockchain were analyzed from the perspective of privacy protection mechanism. The blockchain had good application prospects in privacy protection, but the privacy threats indicated that there was still room for improvement in blockchain privacy protection technology. The future development of blockchain privacy protection was prospected from four perspectives, and it provided ideas and references for the continuous exploration and in-depth research of blockchain privacy protection technology. © 2023 CIMS. All rights reserved.
引用
收藏
页码:2292 / 2312
页数:20
相关论文
共 50 条
  • [31] Privacy in Crowdsourcing: a Review of the Threats and Challenges
    Huichuan Xia
    Brian McKernan
    [J]. Computer Supported Cooperative Work (CSCW), 2020, 29 : 263 - 301
  • [32] Information security: threats and protection mechanisms
    Howard, A
    Paridaens, O
    Gamm, A
    [J]. ALCATEL TELECOMMUNICATIONS REVIEW, 2001, (02): : 117 - 121
  • [33] Protection or Cynicism? Dual Strategies for Coping with Privacy Threats
    Yu, Lu
    He, Li
    Du, Jian
    Wu, Xiaobo
    [J]. INFORMATION SYSTEMS FRONTIERS, 2024,
  • [34] Online advertising: Analysis of privacy threats and protection approaches
    Estrada-Jimenez, Jose
    Parra-Arnau, Javier
    Rodriguez-Hoyos, Ana
    Forne, Jordi
    [J]. COMPUTER COMMUNICATIONS, 2017, 100 : 32 - 51
  • [35] Anatomization and Protection of Mobile Apps' Location Privacy Threats
    Fawaz, Kassem
    Feng, Huan
    Shin, Kang G.
    [J]. PROCEEDINGS OF THE 24TH USENIX SECURITY SYMPOSIUM, 2015, : 753 - 768
  • [36] Research on Privacy Protection of Technology Service Transactions Based on Blockchain and Zero-Knowledge Proof
    Zhu J.
    Feng W.
    Zhong W.
    Huang M.
    Feng S.
    Shuja J.
    [J]. Wireless Communications and Mobile Computing, 2023, 2023
  • [37] Security and Privacy in IoT Using Machine Learning and Blockchain: Threats and Countermeasures
    Waheed, Nazar
    He, Xiangjian
    Ikram, Muhammad
    Usman, Muhammad
    Hashmi, Saad Sajid
    [J]. ACM COMPUTING SURVEYS, 2021, 53 (06)
  • [38] Cybersecurity, Data Privacy and Blockchain: A Review
    Vinden Wylde
    Nisha Rawindaran
    John Lawrence
    Rushil Balasubramanian
    Edmond Prakash
    Ambikesh Jayal
    Imtiaz Khan
    Chaminda Hewage
    Jon Platts
    [J]. SN Computer Science, 2022, 3 (2)
  • [39] Differential privacy in blockchain technology: A futuristic approach
    Ul Hassan, Muneeb
    Rehmani, Mubashir Husain
    Chen, Jinjun
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2020, 145 : 50 - 74
  • [40] A review of secure federated learning: Privacy leakage threats, protection technologies, challenges and future directions
    Ge, Lina
    Li, Haiao
    Wang, Xiao
    Wang, Zhe
    [J]. NEUROCOMPUTING, 2023, 561