Paper
13 October 2022 Trusted regulatory technology for blockchain data privacy protection
Yunbing Wang Sr., Shaopei Ji, ChengChao Zha Sr.
Author Affiliations +
Proceedings Volume 12287, International Conference on Cloud Computing, Performance Computing, and Deep Learning (CCPCDL 2022); 122870Y (2022) https://doi.org/10.1117/12.2641041
Event: International Conference on Cloud Computing, Performance Computing, and Deep Learning (CCPCDL 2022), 2022, Wuhan, China
Abstract
At present, blockchain users lack effective means of supervision and authorization for intermediaries at different levels, making user data privacy at risk of leakage. Aiming at the above problems, this paper studies the trusted supervision technology scheme suitable for blockchain data privacy protection, enriches and expands on the classic BIP32 protocol, and designs and implements a dynamic authorization strategy in the new protocol. Authorization policies make private data truly in the hands of users by changing and setting regulatory permissions. The experimental results and performance comparison show that the blockchain data privacy protection method proposed by this scheme is efficient, stable, and has strong practicability, which is suitable for data privacy protection scenarios of trusted supervision. At the same time, experiments show that with the increase of the encryption key depth, the supervision time increases linearly.
© (2022) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Yunbing Wang Sr., Shaopei Ji, and ChengChao Zha Sr. "Trusted regulatory technology for blockchain data privacy protection", Proc. SPIE 12287, International Conference on Cloud Computing, Performance Computing, and Deep Learning (CCPCDL 2022), 122870Y (13 October 2022); https://doi.org/10.1117/12.2641041
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Symmetric-key encryption

Blood

Computer security

Algorithm development

Data storage

Standards development

Electronics

Back to Top