期刊文献+

一种高效安全的去中心化数据共享模型 被引量:39

An Efficient and Secure Decentralizing Data Sharing Model
下载PDF
导出
摘要 数据开放共享是推动数据相关产业发展的源动力,然而,现有的数据共享模型,如数据市场,数据提供方将数据上传至数据存储中心,数据需求方下载数据以实现分析.这种模型存在如下缺陷:(1)以关键字为基础的数据检索无法高效发现可连接数据集;(2)数据交易缺乏透明性,无法有效检测及防患交易参与方串谋等舞弊行为;(3)数据所有者失去数据的控制权、所有权,数据安全无法保障.为此,该文借助区块链技术建立一种全新的去中心化数据共享模型.首先从共享数据集中提取多层面元数据信息,通过各共识节点建立域索引,以解决可连接数据集的高效发现问题;其次,从交易记录格式及共识机制入手,建立基于区块链的数据交易,实现交易的透明性及防串谋等舞弊行为;最后,依据数据需求方的计算需求编写计算合约,借助安全多方计算及差分隐私技术保障数据所有者的计算和输出隐私.实验结果表明,该文提出的域索引机制在可接受的召回率范围内,连接数据集查准率平均提高22%.而以时间及交易区块数相结合的共识机制则能兼顾低交易频率与高交易频率双重需求.同时,与加密方式相比,在保证数据安全的前提下,该文提出的安全计算模型平均节省了近6秒的处理时间. Data opening and sharing is the source power for driving the development of data-related industries.However,the typical data sharing model available at present,e.g.,data market,in which data providers upload their data to a centralized repository and data demanders download their requested data to carry out analysis,has the following flaws:(1)As only considering the frequency of keyword in each dataset(or dataset name),the keyword-based dataset retrieval method,which widely used nowadays,cannot efficiently find the linkable datasets.(2)Being lack of transparency in the process of data transactions,the current data trading model does not take full account of detecting the transaction collusion or other frauds among the involved parties.(3)The data owners lose the power of controlling their own data,which causes no guarantee of data ownership and data security.We found out that these problems exposed in the process of data sharing could be attributed to three factors:linkable dataset discovery,data transaction management,computing security and output security.For the purpose of solving them efficiently and effectively,we proposed a novel blockchain-based decentralization data sharing model,which characterized by followings:(1)It was inspired by restoring data providers greater control over their own data by means of DataSpace(DS).(2)The computation or analysis was completed confidentially among the data providers,instead of in the data demanders,or in the third parties,as the latter two needed to download data into their own spaces which become the source of privacy leak.(3)It obtained computing datasets or tasks through domain indexing and interface mechanisms,and controlled user behavior and data flow by the blockchain technology.Concretely,in this paper,we first introduced the basic conception of the decentralized data sharing model based on the analysis of the traditional data sharing model.Then,we showed the hierarchical structure diagram of decentralized data sharing model,which included interface,transaction,index,and data layers.Finally,we analyzed the related technologies and implementation details of each layer respectively:In the interface layer,we obtained computing datasets through domain searching mechanism,and compiled the computation contract according to the requirements of the data demanders.In the index layer,we extracted multi-aspect metadata information from the shared dataset,and had the consensus nodes set up domain index to search linkable datasets efficiently.In the transaction layer,with the help of consensus mechanism,we implemented data transaction based on blockchain to achieve transparency and to prevent conspiracy.In the data layer,we introduced the computation contract,which assembled the secure multi-party computation and differential privacy,to ensure the computation and output privacy of the data providers.The experimental results show that the domain index mechanism proposed in this paper increases the average precision by 22%without substantially reducing the recall rate.And the modified consensus mechanism,which combines time and transaction block number,takes both low trading frequency and high trading frequency into account.At the same time,on the premise of ensuring data security,comparing with the encryption method,our method saves the processing time of nearly 6 s.
作者 董祥千 郭兵 沈艳 段旭良 申云成 张洪 DONG Xiang-Qian;GUO Bing;SHEN Yan;DUAN Xu-Liang;SHEN Yun-Cheng;ZHANG Hong(College of Computer Science,Sichuan University,Chengdu 610065;College of Control Engineering,Chengdu University of Information Technology,Chengdu 610225;Chengdu Neusoft University,Chengdu 611844)
出处 《计算机学报》 EI CSCD 北大核心 2018年第5期1021-1036,共16页 Chinese Journal of Computers
基金 本课题得到国家自然科学基金(61332001,61772352,61472050)、四川省科技计划项目(2014JY0257,2015GZ0103)、成都市科技惠民技术研发项目(2014-HM01-00326-SF)资助.
关键词 数据共享 区块链 域索引 安全多方计算 差分隐私 data sharing blockchain domain index secure multi-party computation differential privacy
  • 相关文献

参考文献4

二级参考文献78

  • 1王飞跃.人工社会、计算实验、平行系统——关于复杂社会经济系统计算研究的讨论[J].复杂系统与复杂性科学,2004,1(4):25-35. 被引量:231
  • 2王飞跃.计算实验方法与复杂系统行为分析和决策评估[J].系统仿真学报,2004,16(5):893-897. 被引量:147
  • 3王飞跃,蒋正华,戴汝为.人口问题与人工社会方法:人工人口系统的设想与应用[J].复杂系统与复杂性科学,2005,2(1):1-9. 被引量:18
  • 4Satyanarayanan M, Bahl P, Caeeres R, Davies N. The case for VM-based cloudlets in mobile computing. IEEE Pervasive Computing, 2009, 8(4) .. 14-23.
  • 5Othman M, Hailes S. Power conservation strategy for mobile computers using load sharing. Mobile Computing and Communications Review, 1998, 2(1) : 44-50.
  • 6Hunt G C, Scott M L. The Coign automatic distributed parti- tioning system//Proeeedings of the 3rd USENIX Symposium on Operating Systems Design and Implementation. New Orleans, USA, 1999.. 187-200.
  • 7Rudenko A, Reiher P, Popek G J, et al. Saving portable computer battery power through remote process execution. Mobile Computing and Communications Review, 1998, 2(1) : 19-26.
  • 8Weiser M. The computer for the 21st century. Scientific American, 1991, 265(3): 94-104.
  • 9Satyanarayanan M. Pervasive computing:Vision and challenges. IEEE Personal Communications, 2001, 8(4): 10-17.
  • 10Cuervo E, Balasubramanian A, Cho D, et al. MAUI: Making smartphones last longer with code offload//Proceedings of the 8th International Conference on Mobile Systems, Appli- cations, and Services. San Francisco, USA, 2010:49-62.

共引文献2883

同被引文献371

引证文献39

二级引证文献384

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部