Security and Privacy in New Computing Environments. Second EAI International Conference, SPNCE 2019, Tianjin, China, April 13–14, 2019, Proceedings

Research Article

CROSS: Supervised Sharing of Private Data over Blockchains

Download
108 downloads
  • @INPROCEEDINGS{10.1007/978-3-030-21373-2_7,
        author={Mingxin Yin and Jiqiang Gao and Xiaojie Guo and Mengyao Sun and Zheli Liu and Jianzhong Zhang and Jing Wang},
        title={CROSS: Supervised Sharing of Private Data over Blockchains},
        proceedings={Security and Privacy in New Computing Environments. Second EAI International Conference, SPNCE 2019, Tianjin, China, April 13--14, 2019, Proceedings},
        proceedings_a={SPNCE},
        year={2019},
        month={6},
        keywords={Blockchian Proxy re-encryption Hierarchical supervision Data sharing},
        doi={10.1007/978-3-030-21373-2_7}
    }
    
  • Mingxin Yin
    Jiqiang Gao
    Xiaojie Guo
    Mengyao Sun
    Zheli Liu
    Jianzhong Zhang
    Jing Wang
    Year: 2019
    CROSS: Supervised Sharing of Private Data over Blockchains
    SPNCE
    Springer
    DOI: 10.1007/978-3-030-21373-2_7
Mingxin Yin1,*, Jiqiang Gao1,*, Xiaojie Guo1,*, Mengyao Sun1,*, Zheli Liu1,*, Jianzhong Zhang1,*, Jing Wang2,*
  • 1: Nankai University
  • 2: Bubi Technologies Ltd
*Contact email: yinmx0315@mail.nankai.edu.cn, jiqiang@mail.nankai.edu.cn, xiaojie.guo@mail.nankai.edu.cn, mysun@mail.nankai.edu.cn, liuzheli@nankai.edu.cn, zhangjz@nankai.edu.cn, wangjing@bubi.cn

Abstract

The transparent property of the blockchain guarantees the immutability of the data on the chain, but it can lead to violations of data privacy protection. On the other hand, absolute anonymity will make it difficult for the government to supervise the encrypted content stored on the chain. Moreover, it is inconvenient for the data owners to delegate their decryption authority to others. In order to solve the problem of data privacy concern and supervision in the current blockchain, we propose a supervised data sharing model called CROSS, which combines the proxy re-encryption mechanism with the tree key distribution mechanism. The model realizes the hierarchical supervision and horizental sharing of private data on the blockchain, which effectively improves the privacy of the blockchain while taking into account security. Consideration should be given to some potential attacks and corresponding defenses against our proposed model.