location:Home > 2024 Vol.7 Aug.N04 > Homomorphic encryption-based data security protection method for hybrid blockchain transactions

2024 Vol.7 Aug.N04

  • Title: Homomorphic encryption-based data security protection method for hybrid blockchain transactions
  • Name: Guorong Chen
  • Company: Jiangxi University of Software Professional Technology,Nanchang,330041,China
  • Abstract:

     Influenced by various factors such as transaction variability and malicious attacks, the hybrid blockchain transaction process may be poorly protected due to the lack of effective verification of transactions during data transmission. In this regard, a hybrid blockchain transaction data security protection method based on homomorphic encryption is proposed. First, the role of the regulatory center is defined as a third-party certificate authority, and the user registration process is optimized and designed by combining the regulatory center to distribute digital certificates as well as public and private keys. Then a three-stage consensus mechanism is used to triple verify the blockchain transaction process by combining trusted bookkeeping nodes. Finally, combined with the homomorphic encryption algorithm, the key of the supervision center is encrypted and decrypted, so as to realize the acquisition of transaction data in plaintext. Finally, the proposed practical method is verified in terms of data protection effect by constructing an experimental comparison session. By visualizing and analyzing the results, it can be clarified that under the protection method, the blockchain transaction data throughput is higher, which has a more ideal data protection effect.


  • Keyword: homomorphic encryption; blockchain; transaction data; security protection;
  • DOI: 10.12250/jpciams2024090803
  • Citation form: Guorong Chen.Homomorphic encryption-based data security protection method for hybrid blockchain transactions[J]. Computer Informatization and Mechanical System,2024,Vol.7,pp.8-11
Reference:

[1] Battah A , Salah K , Jayaraman R ,et al. Using Blockchain for Enabling Transparent, Traceable, and Trusted University Ranking Systems[J].IEEE Access , 2023, 11:23792-23807.

[2] Wu N , Xu L , Zhu L .A blockchain based access control scheme with hidden policy and attribute[J].Future Gener. Comput. Syst. 2022, 141:186-196.

[3] Sun H , Zhu L , Zhang Q ,et al. A fine-grained and traceable multidomain secure data-sharing model for intelligent terminals in edge-cloud collaboration scenarios[J].International Journal of Intelligent Systems, 2022, 37(3):2543-2566.

[4] Jiao Y , Wang C .A Blockchain-Based Trusted Upload Scheme for the Internet of Things Nodes[J].International Journal of Crowd Science, 2022, 6(2):92- 97.

[5] Zhao J .Security control of internet of things node access method using blockchain technology[J].J. Comput. Methods Sci. Eng. 2022, 22:2023-2036.

[6] Fugkeaw S , Wirz L , Hak L .An Efficient Medical Records Access Control with Auditable Outsourced Encryption and Decryption[J].2023 15th International Conference on Knowledge and Smart Technology (KST), 2023:1-6.

[7] Bao L , Lu G .Cloud Storage Ciphertext Search Scheme Based on Blockchain[J].2022 International Conference on Information Technology. Communication Ecosystem and Management (ITCEM), 2022:29-33.

[8] Fugkeaw S , Wirz L , Hak L .Secure and Lightweight Blockchain-Enabled Access Control for Fog-Assisted IoT Cloud Based Electronic Medical Records Sharing[J].IEEE Access, 2023, 11:62998-63012.

[9] Hasan H R , Salah K , Yaqoob I ,et al. Trustworthy IoT Data Streaming Using Blockchain and IPFS[J].IEEE Access, 2022, 10:17707-17721.

[10] Jayanthy S , Gomathi P , Kumar K J ,et al. Secured Health Data Sharing System using Cloud Technology and Blockchain with Machine learning[J].2022 3rd International Conference on Electronics and Sustainable Communication Systems (ICESC), 2022:656-661.

[11] Zheng Y .Big Data among Multiple Institutions Based on DAG Blockchain[J].2022 2nd International Signal Processing, Communications and Engineering Management Conference (ISPCEM), 2022:55-59.

[12] Shaofeng L , Yang Z , Yao Z ,et al. Research on Anti-Leakage and Tampering Guarantee Strategy for Experimental Data Sharing Based on Blockchain[J]. 2023 IEEE 3rd International Conference on Electronic Technology, Communication and Information (ICETCI), 2023:277-281.

[13] Niu S , Song M , Fang L ,et al. Keyword search over encrypted cloud data based on blockchain in smart medical applications[J].Comput. Commun. 2022, 192 :33-47.

[14] Yakubu A , Chen Y P P .A blockchain-based application for genomic access and variant discovery using smart contracts and homomorphic encryption[J]. Future Gener. Comput. Syst. 2022, 137:234-247.

[15] A blockchain-based privacy-preserving transaction scheme with public verification and reliable audit[J].Electronic Research Archive, 2023, 31(2):729-753. 


Tsuruta Institute of Medical Information Technology
Address:[502,5-47-6], Tsuyama, Tsukuba, Saitama, Japan TEL:008148-28809 fax:008148-28808 Japan,Email:jpciams@hotmail.com,2019-09-16