Journal of Frontiers of Computer Science and Technology ›› 2022, Vol. 16 ›› Issue (2): 359-371.DOI: 10.3778/j.issn.1673-9418.2106023
• Network and Information Security • Previous Articles Next Articles
HAN Gang, LYU Yingze+(), LUO Wei, WANG Jiaqian
Received:
2021-06-07
Revised:
2021-08-30
Online:
2022-02-01
Published:
2021-09-01
About author:
HAN Gang, born in 1990, Ph.D., lecturer, member of CCF. His research interests include public key cryptography and attribute-based encryption.Supported by:
通讯作者:
+ E-mail: lvyingze0809@163.com作者简介:
韩刚(1990—),男,陕西宝鸡人,博士,讲师,CCF会员,主要研究方向为公钥密码学、属性基加密。基金资助:
CLC Number:
HAN Gang, LYU Yingze, LUO Wei, WANG Jiaqian. Privacy Data Protection Scheme for Patients with Major Outbreaks[J]. Journal of Frontiers of Computer Science and Technology, 2022, 16(2): 359-371.
韩刚, 吕英泽, 罗维, 王嘉乾. 重大疫情患者隐私数据保护方案研究[J]. 计算机科学与探索, 2022, 16(2): 359-371.
Add to citation manager EndNote|Ris|BibTeX
URL: http://fcst.ceaj.org/EN/10.3778/j.issn.1673-9418.2106023
测试时长/s | 数据请求确认量/个 |
---|---|
100 | 13 143 |
200 | 26 289 |
300 | 39 407 |
400 | 52 486 |
500 | 65 648 |
Table 1 Number of data request confirmation
测试时长/s | 数据请求确认量/个 |
---|---|
100 | 13 143 |
200 | 26 289 |
300 | 39 407 |
400 | 52 486 |
500 | 65 648 |
方案 | 算力 需求 | 链结构 | 所需节 点数 | 区块链 类型 | 加密 效率 |
---|---|---|---|---|---|
Azaria等人[ | 大 | 单链 | 多 | 联盟链 | — |
薛腾飞等人[ | 大 | 单链 | 121 | 私链 | 低 |
张超等人[ | 小 | 单链 | ≥4 | 联盟链 | — |
本文方案 | 小 | 双链 | ≥4 | 联盟链 | 高 |
Table 2 Comparison of programs
方案 | 算力 需求 | 链结构 | 所需节 点数 | 区块链 类型 | 加密 效率 |
---|---|---|---|---|---|
Azaria等人[ | 大 | 单链 | 多 | 联盟链 | — |
薛腾飞等人[ | 大 | 单链 | 121 | 私链 | 低 |
张超等人[ | 小 | 单链 | ≥4 | 联盟链 | — |
本文方案 | 小 | 双链 | ≥4 | 联盟链 | 高 |
[1] | ZYSKIND G, NATHAN O, PENTLAND A. Decentralizing privacy: using blockchain to protect personal data[C]//Pro-ceedings of the 2015 IEEE Symposium on Security and Pri-vacy Workshops, San Jose, May 21-22, 2015. Washington:IEEE Computer Society, 2015: 180-184. |
[2] | LAZAROVICH A. Invisible ink: blockchain for data privacy[D]. Massachusetts: Massachusetts Institute of Technology, 2015. |
[3] | AZARIA A, EKBLAW A, VIEIRA T, et al. MedRec: using blockchain for medical data access and permission manage-ment[C]//Proceedings of the 2nd International Conference on Open and Big Data, Vienna, Aug 22-24, 2016. Washington: IEEE Computer Society, 2016: 25-30. |
[4] |
CHEN Y, DING S, XU Z, et al. Blockchain-based medical records secure storage and medical service framework[J]. Journal of Medical Systems, 2019, 43(1):1-9.
DOI URL |
[5] | OMAR A A, RAHMAN M S, BASU A, et al. MediBchain: a blockchain based privacy preserving platform for health-care data[C]//LNCS 10658: Proceedings of the 2017 Interna-tional Conference on Security, Privacy and Anonymity in Computation, Communication and Storage, Guangzhou, Dec 12-15, 2017. Cham: Springer, 2017: 534-543. |
[6] | 薛腾飞, 傅群超, 王枞, 等. 基于区块链的医疗数据共享模型研究[J]. 自动化学报, 2017, 43(9):1555-1562. |
XUE T F, FUQ C, WANG C, et al. A medical data sharing model via blockchain[J]. Acta Automatica Sinica, 2017, 43(9):1555-1562. | |
[7] | 张超, 李强, 陈子豪, 等. Medical Chain: 联盟式医疗区块链系统[J]. 自动化学报, 2019, 45(8):1495-1510. |
ZHANG C, LI Q, CHEN Z H, et al. Medical Chain: alliance medical blockchain system[J]. Acta Automatica Sinica, 2019, 45(8):1495-1510. | |
[8] | WORLEY C R, SKJELLUM A. Blockchain tradeoffs and challenges for current and emerging applications: generaliza-tion, fragmentation, sidechains, and scalability[C]//Proceed-ings of the 2018 IEEE International Conference on Internet of Things and IEEE Green Computing and Communica-tions and IEEE Cyber, Physical and Social Computing and IEEE Smart Data, Halifax, Jul 30-Aug 3, 2018. Piscataway: IEEE, 2018: 1582-1587. |
[9] | SUTTON A, SAMAVI R. Blockchain enabled privacy audit logs[C]//LNCS 10587: Proceedings of the 16th International Semantic Web Conference, Vienna, Oct 21-25, 2017. Cham:Springer, 2017: 645-660. |
[10] | 王群, 李馥娟, 王振力, 等. 区块链原理及关键技术[J]. 计算机科学与探索, 2020, 14(10):1621-1643. |
WANG Q, LI F J, WANG Z L, et al. Principle and core technology of blockchain[J]. Journal of Frontiers of Com-puter Science and Technology, 2020, 14(10):1621-1643. | |
[11] | 刘懿中, 刘建伟, 张宗洋, 等. 区块链共识机制研究综述[J]. 密码学报, 2019, 6(4):395-432. |
LIU Y Z, LIU J W, ZHANG Z Y, et al. Overview on block-chain consensus mechanisms[J]. Journal of Cryptologic Res-earch, 2019, 6(4):395-432. | |
[12] | KING S, NADAL S. PPCOIN: peer-to-peer crypto-currency with proof-of-stake[R]. 2012: 1-6. |
[13] | LUO Y H, CHEN Y Q, CHEN Q, et al. A new election algorithm for DPos consensus mechanism in blockchain[C]//Proceedings of the 2018 7th International Conference on Digital Home, Guilin, Nov 30-Dec 1, 2018. Piscataway: IEEE, 2018: 116-120. |
[14] | CASTRO M, LISKOY B. Practical Byzantine fault toler-ance and proactive recovery[J]. ACM Transactions on Com-puter Systems, 2002, 20(4):398-461. |
[15] | SUKHWANI H, MARTÍNEZ J M, CHANG X L, et al. Per-formance modeling of PBFT consensus process for permiss-ioned blockchain network (hyperledger fabric)[C]//Proceed-ings of the 36th IEEE Symposium on Reliable Distributed Systems, Hong Kong, China, Sep 26-29, 2017. Washington:IEEE Computer Society, 2017: 253-255. |
[16] | 沈鑫, 裴庆祺, 刘雪峰. 区块链技术综述[J]. 网络与信息安全学报, 2016, 2(11):11-20. |
SHEN X, PEI Q Q, LIU X F. Survey of block chain[J]. Chinese Journal of Network and Information Security, 2016, 2(11):11-20. | |
[17] | WATANABE H, FUJIMURA S, NAKADAIRA A, et al. Blockchain contract: securing a blockchain applied to smart contracts[C]//Proceedings of the 2016 IEEE International Conference on Consumer Electronics, Las Vegas, Jan 7-11, 2016. Piscataway: IEEE, 2016: 467-468. |
[18] | 贺海武, 延安, 陈泽华. 基于区块链的智能合约技术与应用综述[J]. 计算机研究与发展, 2018, 55(11):2452-2466. |
HE H W, YAN A, CHEN Z H. Survey of smart contract technology and application based on blockchain[J]. Journal of Computer Research and Development, 2018, 55(11):2452-2466. | |
[19] | OKADA H, YAMASAKI S, RACAMONTE V. Proposed classification of blockchains based on authority and incen-tive dimensions[C]//Proceedings of the 2017 19th Interna-tional Conference on Advanced Communication Technology, Pyeong Chang, Feb 19-22, 2017. Piscataway: IEEE, 2017: 593-597. |
[20] | ZHENG Z B, XIE S A, DAI H N, et al. An overview of blockchain technology: architecture, consensus, and future trends[C]//Proceedings of the 2017 IEEE International Con-gress on Big Data, Honolulu, Jun 25-30, 2017. Washington:IEEE Computer Society, 2017: 557-564. |
[1] | LIU Tonglai, ZHANG Zikai, WU Jigang. System Model and Access Control Schemes for Medical Image Collaborative Analysis [J]. Journal of Frontiers of Computer Science and Technology, 2022, 16(8): 1779-1791. |
[2] | WANG Qun, LI Fujuan, NI Xueli, XIA Lingling, WANG Zhenli, LIANG Guangjun. Survey on Blockchain Consensus Algorithms and Application [J]. Journal of Frontiers of Computer Science and Technology, 2022, 16(6): 1214-1242. |
[3] | TIAN Jing, DU Yunming, LI Shuai, LIU Yi. Paillier Homomorphic Encryption Based Location Privacy Protection Scheme for Crowdsensing Task Distribution [J]. Journal of Frontiers of Computer Science and Technology, 2022, 16(6): 1327-1333. |
[4] | XIONG Xiao, LI Leixiao, GAO Jing, GAO Haoyu, DU Jinze, ZHENG Yue, NIU Tieming. Research Progress of Blockchain in Internet of Vehicles Data Sharing [J]. Journal of Frontiers of Computer Science and Technology, 2022, 16(5): 1008-1024. |
[5] | GUO Zijing, LUO Yuchuan, CAI Zhiping, ZHENG Tengfei. Overview of Privacy Protection Technology of Big Data in Healthcare [J]. Journal of Frontiers of Computer Science and Technology, 2021, 15(3): 389-402. |
[6] | GAO Ang, LIANG Ying, XIE Xiaojie, WANG Zisen, LI Jintao. Social Network Information Diffusion Method with Support of Privacy Protection [J]. Journal of Frontiers of Computer Science and Technology, 2021, 15(2): 233-248. |
[7] | FAN Xing, NIU Baoning. BBF: Bloom Filter Variant for Blockchain [J]. Journal of Frontiers of Computer Science and Technology, 2021, 15(10): 1921-1929. |
[8] | ZHOU Jian, SUN Liyan, FU Ming. Research on Wallet Protection Against Currency Failure in Blockchain [J]. Journal of Frontiers of Computer Science and Technology, 2020, 14(12): 2039-2049. |
[9] | ZHENG Lianghan, HE Heng, TONG Qian, YANG Xiang, CHEN Xiang. Multi-authority Access Control Scheme in Cloud Environment [J]. Journal of Frontiers of Computer Science and Technology, 2020, 14(11): 1865-1878. |
[10] | WANG Qun, LI Fujuan, WANG Zhenli, LIANG Guangjun, XU Jie. Principle and Core Technology of Blockchain [J]. Journal of Frontiers of Computer Science and Technology, 2020, 14(10): 1621-1643. |
[11] | LAN Wei, LIN Ying, BAO Lingyan, LI Tong, CHEN Mengrong, SHAN Jinzhao. Trajectory-Differential Privacy-Protection Method with Interest Region [J]. Journal of Frontiers of Computer Science and Technology, 2020, 14(1): 59-72. |
[12] | DONG Xiangxiang, GAO Ang, LIANG Ying, BI Xiaodi. Method of Privacy Preserving in Dynamic Social Network Data Publication [J]. Journal of Frontiers of Computer Science and Technology, 2019, 13(9): 1441-1458. |
[13] | SUN Ziwen, LI Song. Lightweight Authentication Protocol for Location Privacy Using PUF in Mobile RFID System [J]. Journal of Frontiers of Computer Science and Technology, 2019, 13(3): 418-428. |
[14] | YANG Gaoming, FANG Xianjin+, XIAO Yafei. Local Differential Privacy Against Link Attack [J]. Journal of Frontiers of Computer Science and Technology, 2019, 13(2): 251-262. |
[15] | TAO Lingling, HUANG Zhiqiu, CAO Yan, ZHANG Mengjiao. Privacy Preserving Method for Supporting Access Purpose and Reputation Labeling [J]. Journal of Frontiers of Computer Science and Technology, 2018, 12(5): 719-729. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
/D:/magtech/JO/Jwk3_kxyts/WEB-INF/classes/