Font Size: a A A

Research On Trusted Data Sharing Based On Blockchain

Posted on:2024-02-19Degree:MasterType:Thesis
Country:ChinaCandidate:Y P JiaFull Text:PDF
GTID:2568306944962589Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
As the information industry evolves rapidly,advanced technologies such as the Internet of Things,Big Data,and Artificial Intelligence have become indispensable parts of modern society,greatly facilitating people’s daily lives.At the same time,they have also brought various challenges in data storage and usage.The informatization of modern industry and the intelligentization of public life are inseparable from data security.From the data generated at the end to the cloud storage and processing,as well as the distribution and application of processed data,all data sharing processes have certain requirements for the accuracy,completeness,and credibility of data.On the one hand,in the current architecture,the amount of stored data is too large,and the cost of verifying the integrity and accuracy of data is too high,making it difficult to efficiently obtain correct data,which may cause damage to assets if inaccurate data is obtained.On the other hand,the existing architecture lacks secure and credible data exchange mechanisms,resulting in data leakage problems.Blockchain,as a distributed data ledger,has excellent characteristics such as decentralization,anti-tampering,and traceability,making it suitable to solve data sharing issues with blockchain technology.This thesis aims to study the data sharing problem and proposes a credible data sharing plan based on blockchain.The specific research work is as follows:(1)Proposed a keyless signature mechanism based on blockchain and polynomial commitment.Traditional keyless signature technology uses Merkle Tree to do a vector proof.When the number of signature requests increases within a time slot,the size of the Merkle proof will also increase.In addition,the signature server will generate a large number of intermediate nodes in the Merkle Tree,resulting in additional storage and retrieval pressures.This paper uses polynomial commitment to improve the keyless signature and uses the Carte proof to replace the Merkle proof.Regardless of how many signature requests the signature server receives in one time slot,the size of the generated proof is constant.This plan can also prove multiple documents at once,and the proof size is the same as that of a single document.In this way,the time and space required for data receivers to verify the data are more stable,which is more conducive to verifying the integrity and accuracy of the data.Moreover,this paper introduces blockchain and smart contracts as the release layer of keyless signature,using blockchain’s built-in timestamp,tamper-proof,decentralization,and public safety and reliability characteristics,saving the hash calendar expenses of traditional keyless signature technology.Performance analysis shows that this plan can effectively improve the cost of keyless signature and achieve secure and credible data integrity and accuracy validation.(2)Proposed a blockchain-based encrypted data sharing scheme.This scheme utilizes the characteristics of decentralization,traceability,and tamper resistance of blockchain technology to ensure the authenticity and trustworthiness of the stored data,while achieving trustworthy data sharing while protecting data security.This scheme encrypts the source file and stores it in the IPFS system,and only stores the file hash digest and relevant key information on the chain,which not only plays the advantages of blockchain,but also relieves the data storage pressure on the chain.To further protect the security of data and keys,this scheme incorporates a certificateless password mechanism to encrypt and decrypt file keys.The certificateless password mechanism avoids the introduction of certificates and effectively associates user identity with keys.Performance tests show that this scheme can achieve efficient,secure and trustworthy data sharing.
Keywords/Search Tags:blockchain, data sharing, polynomial commitment, keyless signature, certificateless public key encryption
PDF Full Text Request
Related items