Redundant Data Detection and Deletion to Meet Privacy Protection Requirements in Blockchain-Based Edge Computing Environment

被引:0
|
作者
Zhang Lejun [1 ,2 ,3 ]
Peng Minghui [2 ]
Su Shen [1 ]
Wang Weizheng [4 ]
Jin Zilong [5 ]
Su Yansen [6 ]
Chen Huiling [7 ]
Guo Ran [8 ]
Sergey Gataullin [9 ,10 ]
机构
[1] MIREA - Russian Technological University
[2] Cyberspace Institute Advanced Technology, Guangzhou University
[3] College of Information Engineering, Yangzhou University
[4] School Math & Computer Science, Quanzhou Normal University
[5] Computer Science Department, City University of Hong Kong
[6] School of Computer and Software, Nanjing University of Information Science and Technology
[7] Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology,Anhui University
[8] Department of Computer Science and Artificial Intelligence, Wenzhou University
[9] Guangzhou University Library, Guangzhou University
[10] Central Economic and Mathematics Institute, Russian Academy of Sciences
基金
中国国家自然科学基金;
关键词
D O I
暂无
中图分类号
TP311.13 []; TP309 [安全保密];
学科分类号
081201 ; 0839 ; 1201 ; 1402 ;
摘要
With the rapid development of information technology, IoT devices play a huge role in physiological health data detection. The exponential growth of medical data requires us to reasonably allocate storage space for cloud servers and edge nodes. The storage capacity of edge nodes close to users is limited.We should store hotspot data in edge nodes as much as possible, so as to ensure response timeliness and access hit rate; However, the current scheme cannot guarantee that every sub-message in a complete data stored by the edge node meets the requirements of hot data; How to complete the detection and deletion of redundant data in edge nodes under the premise of protecting user privacy and data dynamic integrity has become a challenging problem. Our paper proposes a redundant data detection method that meets the privacy protection requirements. By scanning the cipher text, it is determined whether each sub-message of the data in the edge node meets the requirements of the hot data. It has the same effect as zero-knowledge proof, and it will not reveal the privacy of users. In addition, for redundant sub-data that does not meet the requirements of hot data, our paper proposes a redundant data deletion scheme that meets the dynamic integrity of the data. We use Content Extraction Signature(CES) to generate the remaining hot data signature after the redundant data is deleted. The feasibility of the scheme is proved through safety analysis and efficiency analysis.
引用
收藏
页码:149 / 159
页数:11
相关论文
共 50 条
  • [1] Redundant Data Detection and Deletion to Meet Privacy Protection Requirements in Blockchain-Based Edge Computing Environment
    Zhang, Lejun
    Peng, Minghui
    Su, Shen
    Wang, Weizheng
    Jin, Zilong
    Su, Yansen
    Chen, Huiling
    Guo, Ran
    Sergey, Gataullin
    [J]. CHINA COMMUNICATIONS, 2024, 21 (03) : 149 - 159
  • [2] An identity privacy scheme for blockchain-based on edge computing
    Mu, Rui
    Gong, Bei
    Ning, Zhenhu
    Zhang, Jiangjiang
    Cao, Yang
    Li, Zheng
    Wang, Wei
    Wang, Xiaoping
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (01):
  • [3] Data privacy protection model based on blockchain in mobile edge computing
    Wu, Junhua
    Bu, Xiangmei
    Li, Guangshun
    Tian, Guangwei
    [J]. SOFTWARE-PRACTICE & EXPERIENCE, 2024, 54 (09): : 1671 - 1696
  • [4] Blockchain-based Data Trading in Edge-cloud Computing Environment
    Li, Chunlin
    Liang, SongYu
    Zhang, Jing
    Wang, Qiao-E
    Luo, Youlong
    [J]. INFORMATION PROCESSING & MANAGEMENT, 2022, 59 (01)
  • [5] A Blockchain-Based Trusted Edge Platform in Edge Computing Environment
    Zhang, Jinnan
    Lu, Changqi
    Cheng, Gang
    Guo, Teng
    Kang, Jian
    Zhang, Xia
    Yuan, Xueguang
    Yan, Xin
    [J]. SENSORS, 2021, 21 (06) : 1 - 16
  • [6] Blockchain-Based Anonymous Authentication in Edge Computing Environment
    Liu, Song
    Chai, Yuxiang
    Hui, Longshuo
    Wu, Weiguo
    [J]. ELECTRONICS, 2023, 12 (01)
  • [7] A Lightweight Blockchain-based Privacy Protection for Smart Surveillance at the Edge
    Fitwi, Alem
    Chen, Yu
    Zhu, Sencun
    [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN (BLOCKCHAIN 2019), 2019, : 552 - 555
  • [8] A Blockchain-Based Privacy Protection Application for Logistics Big Data
    Duan, Huabin
    Yang, Jie
    Yang, Huanjun
    [J]. JOURNAL OF CASES ON INFORMATION TECHNOLOGY, 2022, 24 (05)
  • [9] Blockchain-based AMI framework for data security and privacy protection
    Tian, Hongliang
    Jian, Yuzhi
    Ge, Xiaonan
    [J]. SUSTAINABLE ENERGY GRIDS & NETWORKS, 2022, 32
  • [10] A Blockchain-Based Trusted Data Management Scheme in Edge Computing
    Ma Zhaofeng
    Wang Xiaochang
    Jain, Deepak Kumar
    Khan, Haneef
    Gao Hongmin
    Wang Zhen
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (03) : 2013 - 2021