Please wait a minute...
浙江大学学报(工学版)  2022, Vol. 56 Issue (1): 1-15    DOI: 10.3785/j.issn.1008-973X.2022.01.001
计算机技术、信息与电子工程     
区块链数据安全管理和隐私保护技术研究综述
梁秀波(),吴俊涵,赵昱,尹可挺*()
浙江大学 软件学院, 浙江 杭州 310058
Review of blockchain data security management and privacy protection technology research
Xiu-bo LIANG(),Jun-han WU,Yu ZHAO,Ke-ting YIN*()
School of Software Technology, Zhejiang University, Hangzhou 310058, China
 全文: PDF(790 KB)   HTML
摘要:

针对当前区块链安全方面存在数据管理模式不合理、数据共享方案不可靠、智能合约漏洞不易修复和多类型数据隐私保护不完善等问题,分析并总结了国内外关于数据安全管理和隐私保护技术的文献. 从数据存储安全、数据隐私安全、数据访问安全和数据共享安全4个方面来概括目前区块链系统存在的各类安全问题及合理的解决方案,讨论区块链实现数据安全面临的挑战及未来的研究方向,为区块链安全领域相关人员未来的研究工作提供了一定的参考.

关键词: 区块链数据管理隐私保护安全存储安全访问安全共享    
Abstract:

The researches on data security management and privacy protection technologies at home and abroad were analyzed and summarized aiming at current problems in blockchain security, such as unreasonable data management mode, unreliable data sharing scheme, smart contract vulnerabilities not easily fixed and incomplete privacy protection of multiple types of data. Various security problems and reasonable solutions in current blockchain systems were outlined from four aspects: data storage security, data privacy security, data access security and data sharing security. The challenges and future research directions of data security in blockchain were discussed. Some reference for the future work of researchers was provided in the field of blockchain security.

Key words: blockchain    data management    privacy protection    secure storage    secure access    secure sharing
收稿日期: 2021-09-04 出版日期: 2022-01-05
CLC:  TP 399  
基金资助: 国家重点研发计划资助项目(2019YFB1404903).
通讯作者: 尹可挺     E-mail: xiubo@zju.edu.cn;yinkt@zju.edu.cn
作者简介: 梁秀波(1983—), 男, 副研究员, 博士, 从事人工智能、自然人机交互、数字娱乐、大数据、区块链的研究. orcid.org/0000-0002-4749-5552. E-mail: xiubo@zju.edu.cn
服务  
把本文推荐给朋友
加入引用管理器
E-mail Alert
作者相关文章  
梁秀波
吴俊涵
赵昱
尹可挺

引用本文:

梁秀波,吴俊涵,赵昱,尹可挺. 区块链数据安全管理和隐私保护技术研究综述[J]. 浙江大学学报(工学版), 2022, 56(1): 1-15.

Xiu-bo LIANG,Jun-han WU,Yu ZHAO,Ke-ting YIN. Review of blockchain data security management and privacy protection technology research. Journal of ZheJiang University (Engineering Science), 2022, 56(1): 1-15.

链接本文:

https://www.zjujournals.com/eng/CN/10.3785/j.issn.1008-973X.2022.01.001        https://www.zjujournals.com/eng/CN/Y2022/V56/I1/1

图 1  区块链数据安全管理和隐私保护相关技术
图 2  节点可靠性验证模型架构[12]
混币机制 特点 混币花费 DoS攻击风险 女巫攻击风险 盗窃危险 混币数量 延迟 不可链接性
Mixcoin[23] 混合中心 需要 不限 一般
Blindcoin[24] 盲签名 需要 中等 不限 一般
Blind-mixing[25] 椭圆曲线+盲签名 需要 中等 不限 一般
Dash 多中心 需要 中等
CoinJoin[26] 多轮签名 不需要 一般
Xim[27] 多轮混合 不需要 中等 中等
Monero 环签名 不需要 不限
CoinShuffle[28] 解密混合网络 不需要 中等
CoinShuffle++[29] DC-nets 不需要 中等
CoinParty[30] 多方安全计算 不需要 中等
CoinMingle[31] 环签名 不需要 不限
表 1  各混币机制的特性对比
图 3  基于区块链的分布式PKI系统的一般流程
区块链 关系型语义 数据完整性保护 数据隐私保护
ChainSQL[64]
BigchainDB[65]
EtherQL[66]
SEBDB[68]
BlockchainDB[70-71]
vChain[9]
Searchain[75]
表 2  区块链单方数据可信查询性能的比较
1 祝烈煌, 高峰, 沈蒙, 等 区块链隐私保护研究综述[J]. 计算机研究与发展, 2017, 54 (10): 2170- 2186
ZHU Lie-huang, GAO Feng, SHEN Meng, et al Survey on privacy preserving techniques for blockchain technology[J]. Journal of Computer Research and Development, 2017, 54 (10): 2170- 2186
doi: 10.7544/issn1000-1239.2017.20170471
2 张奥, 白晓颖 区块链隐私保护研究与实践综述[J]. 软件学报, 2020, 31 (5): 1406- 1434
ZHANG Ao, BAI Xiao-ying Survey of research and practices on blockchain privacy protection[J]. Journal of Software, 2020, 31 (5): 1406- 1434
3 李董, 魏进武 区块链技术原理、应用领域及挑战[J]. 电信科学, 2016, 32 (12): 20- 26
LI Dong, WEI Jin-wu Theory, application fields and challenge of the blockchain technology[J]. Telecommunications Science, 2016, 32 (12): 20- 26
4 王千阁, 何蒲, 聂铁铮, 等 区块链系统的数据存储与查询技术综述[J]. 计算机科学, 2018, 45 (12): 12- 18
WANG Qian-ge, HE Pu, NIE Tie-zheng, et al Survey of data storage and query techniques in blockchain systems[J]. Computer Science, 2018, 45 (12): 12- 18
5 王宗慧, 张胜利, 金石, 等 区块链数据隐私保护研究[J]. 物联网学报, 2018, 2 (3): 71- 81
WANG Zong-hui, ZHANG Sheng-li, JIN Shi, et al Survey on privacy preserving techniques for blockchain[J]. Chinese Journal on Internet of Things, 2018, 2 (3): 71- 81
6 钱卫宁, 邵奇峰, 朱燕超, 等 区块链与可信数据管理: 问题与方法[J]. 软件学报, 2018, 29 (1): 150- 159
QIAN Wei-ning, SHAO Qi-feng, ZHU Yan-chao, et al Research problems and methods in blockchain and trusted data management[J]. Journal of Software, 2018, 29 (1): 150- 159
7 张志威, 王国仁, 徐建良, 等 区块链的数据管理技术综述[J]. 软件学报, 2020, 31 (9): 2903- 2925
ZHANG Zhi-wei, WANG Guo-ren, XU Jian-liang, et al Survey on data management in blockchain systems[J]. Journal of Software, 2020, 31 (9): 2903- 2925
8 EL-HINDI M, BINNIG C, ARASU A, et al. BlockchainDB: a shared database on blockchains [C]// Proceedings of the VLDB Endowment. Los Angeles: VLDB, 2019: 1597-1609.
9 XU Cheng, ZHANG Ce, XU Jian-liang. vchain: enabling verifiable boolean range queries over blockchain databases [C]// Proceedings of the 2019 International Conference on Management of Data. New York: ACM, 2019: 141-158.
10 The blockchain size of Bitcoin [EB/OL]. [2021-08-25]. https://www.blockchain.com/charts/blocks-size.
11 The blockchain size of Ethereum [EB/OL]. [2021-08-25]. https://blockchair.com/ethereum/charts/blockchain-size.
12 JIA Da-yu, XIN Jun-chang, WANG Zhi-qiong, et al. ElasticChain: support very large blockchain by reducing data redundancy [C]// Proceedings of the Asia-Pacific Web and Web-Age Information Management Joint International Conference on Web and Big Data. Cham: Springer, 2018: 440-454.
13 贾大宇, 信俊昌, 王之琼, 等 存储容量可扩展区块链系统的高效查询模型[J]. 软件学报, 2019, 30 (9): 2655- 2670
JIA Da-yu, XIN Jun-chang, WANG Zhi-qiong, et al Efficient query model for storage capacity scalable blockchain system[J]. Journal of Software, 2019, 30 (9): 2655- 2670
14 AHLSWEDE R, NING C, LI S Y R, et al Network information flow[J]. IEEE Transactions on Information Theory, 2000, 46 (4): 1204- 1216
doi: 10.1109/18.850663
15 DAI Ming-jun, ZHANG Sheng-li, WANG Hui, et al A low storage room requirement framework for distributed ledger in blockchain[J]. IEEE Access, 2018, 6: 22970- 22975
doi: 10.1109/ACCESS.2018.2814624
16 RAMAN R K, VARSHNEY L R. Dynamic distributed storage for scaling blockchains [C]// Dynamic Distributed Storage for Scaling Blockchains. Vail: IEEE, 2018: 2619-2623.
17 QI Xiao-dong, ZHANG Zhao, JIN Che-qing, et al A reliable storage partition for permissioned blockchain[J]. IEEE Transactions on Knowledge and Data Engineering, 2020, 33 (1): 14- 27
18 HEPP T, SHARINGHOUSEN M, EHRET P, et al On-chain vs. off-chain storage for supply-and blockchain integration[J]. it-Information Technology, 2018, 60 (5/6): 283- 291
19 ALI S, WANG G, WHITE B, et al. A blockchain-based decentralized data storage and access framework for pinger [C]// Proceedings of the 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science and Engineering. New York: IEEE, 2018: 1303-1308.
20 AYOADE G, KARANDE V, KHAN L, et al. Decentralized IoT data management using blockchain and trusted execution environment [C]// Proceedings of the 2018 IEEE International Conference on Information Reuse and Integration. Salt Lake City: IEEE, 2018: 15-22.
21 XIAO Yang, ZHANG Ning, LI Jin, et al. PrivacyGuard: enforcing private data usage control with blockchain and attested off-chain contract execution [C]// Proceedings of the European Symposium on Research in Computer Security. Cham: Springer, 2020: 610-629.
22 REID F, HARRIGAN M. An analysis of anonymity in the bitcoin system [M]// Security and privacy in social networks. New York: [s. n. ], 2013: 197-223.
23 BONNEAU J, NARAYANAN A, MILLER A, et al. Mixcoin: anonymity for bitcoin with accountable mixes [C]// International Conference on Financial Cryptography and Data Security. Berlin: Springer, 2014: 486-504.
24 VALENTA L, ROWAN B. Blindcoin: blinded, accountable mixes for bitcoin [C]// Proceedings of the International Conference on Financial Cryptography and Data Security. Berlin: Springer, 2015: 112-126.
25 SHENTU Qing-chun, YU Jian-ping. A blind-mixing scheme for Bitcoin based on an elliptic curve cryptography blind digital signature algorithm [EB/OL]. (2017-06-10). https://org/ftp/arxiv/papers/1510/1510.05833.pdf.
26 MAXWELL G. CoinJoin: Bitcoin privacy for the real world [EB/OL]. (2013-08-22). https://bitcointalk.org/index.php?topic=279249.0.
27 BISSIAS G, OZISIK A P, LEVINE B N, et al. Sybil-resistant mixing for bitcoin [C]// Proceedings of the 13th Workshop on Privacy in the Electronic Society. Scottsdale: [s. n.], 2014: 149-158.
28 RUFFING T, MORENO S P, KATE A. Coinshuffle: practical decentralized coin mixing for Bitcoin [C]// Proceedings of the European Symposium on Research in Computer Security. Cham: Springer, 2014: 345-364.
29 RUFFING T, MORENO S P, KATE A. P2P mixing and unlinkable bitcoin transactions [C]// Proceedings of NDSS. San Diego: [s. n. ], 2017: 1-15.
30 ZIEGELDORF J H, GROSSMANN F, HENZE M, et al. Coinparty: secure multi-party mixing of bitcoins [C]// Proceedings of the 5th ACM Conference on Data and Application Security and Privacy. New York: ACM, 2015: 75-86.
31 XU Mi-xue, YUAN Chao, SI Xue-ming, et al. CoinMingle: a decentralized coin mixing scheme with a mutual recognition delegation strategy [M]// Proceedings of the 1st IEEE International Conference on Hot Information-Centric Networking. [S. l. ]: IEEE, 2018: 160-166.
32 SNOW P, DEERY B, LU J, et al. Factom: business processes secured by immutable audit trails on the blockchain [R]. Texas: Factom, 2014.
33 HOU Yi-bin, LIANG Xun, ZHAN Xiao-yu Block chain based architecture model of electronic evidence system[J]. Computer Science, 2018, 45 (6A): 348- 351
34 HUANG Xiao-fang, XU Lei, YANG Xi Blockchain model of cloud forensics[J]. Journal of Beijing University of Posts and Telecommunications, 2017, 40 (6): 120- 124
35 AZARIA A, EKBLAW A, VIEIRA T, et al. Medrec: using blockchain for medical data access and permission management [C]// Proceedings of the 2016 2nd International Conference on Open and Big Data. Vienna: IEEE, 2016: 25-30.
36 ZHANG Meng, WANG Shen, ZHANG Pan, et al. Protecting data privacy for permissioned Blockchains using identity-based encryption [C]// Proceedings of the 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference. Chengdu: IEEE, 2019: 602-605.
37 王瑞锦, 唐榆程, 张巍琦, 等 基于同态加密和区块链技术的车联网隐私保护方案[J]. 网络与信息安全学报, 2020, 6 (1): 46- 53
WANG Rui-jin, TANG Yu-cheng, ZHANG Wei-qi, et al Privacy protection scheme for internet of vehicles based on homomorphic encryption and block chain technology[J]. Chinese Journal of Network and Information Security, 2020, 6 (1): 46- 53
38 刘彦松, 夏琦, 李柱, 等 基于区块链的链上数据安全共享体系研究[J]. 大数据, 2020, 6 (5): 92- 105
LIU Yan-song, XIA Qi, LI Zhu, et al Research on secure data sharing system based on blockchain[J]. Big Data Research, 2020, 6 (5): 92- 105
39 MA Shun-li, DENG Yi, HE De-biao, et al An efficient NIZK scheme for privacy-preserving transactions over account-model blockchain[J]. IEEE Transactions on Dependable and Secure Computing, 2021, 18 (2): 641- 651
doi: 10.1109/TDSC.2020.2969418
40 MIERS I, GARMAN C, GREEN M, et al. Zerocoin: anonymous distributed e-cash from bitcoin [C]// Proceedings of the 2013 IEEE Symposium on Security and Privacy. Washington: IEEE, 2013: 397-411.
41 SASSON E B, CHIESA A, GARMAN C, et al. Zerocash: decentralized anonymous payments from bitcoin [C]// Proceedings of the 2014 IEEE Symposium on Security and Privacy. Berkeley: IEEE, 2014: 459-474.
42 GUAN Zhang-huang, WAN Zhi-guo, YANG Yang, et al. Blockmaze: an efficient privacy-preserving account-model blockchain based on zk-SNARKs [EB/OL]. (2020-09-18). https://ieeexplore.ieee.org/document/9200775.
43 FROMKNECHT C, VELICANU D, YAKOUBOY S. A decentralized public key infrastructure with identity retention [EB/OL]. (2014-11-11). https://allquantor.at/blockchainbib/pdf/fromknecht2014decentralized.pdf.
44 FROMKNECHT C, VELICANU D, YAKOUBOY S. Certcoin: a namecoin based decentralized authentication system 6.857 class project [EB/OL]. (2014-03-14). http://courses.csail.mit.edu/6.857/2014/files/19-fromknecht-velicann-yakoubov-certcoin.pdf.
45 AXON L. Privacy-awareness in blockchain-based PKI [EB/OL]. (2015-10-20). https://ora.ox.ac.uk/objects/uuid:f8377b69-599b-4cae-8df0-f0cded53e63b.
46 AXON L, GOLDSMITH M. PB-PKI: a privacy-aware blockchain-based PKI [C]// 14th International Conference on Security and Cryptography. Washington: [s. n. ]. 2016: 311-318.
47 ALI M, NELSON J, SHEA R, et al. Blockstack: a global naming and storage system secured by blockchains [C]// Proceedings of the USENIX Annual Technical Conference. Berkeley: USENIX, 2016: 181-194.
48 KALODNER H, CARLSTEN M, ELLENBOGEN P, et al. An empirical study of namecoin and lessons for decentralized namespace design [C]// Proceedings of WEIS. Delft: [s. n. ], 2015.
49 BUI T, AURA T. Application of public ledgers to revocation in distributed access control [C]// Proceedings of International Conference on Information and Communications Security. Cham: Springer, 2018: 781-792.
50 MATSUMOTO S, REISCHUK R. IKP: turning a PKI around with decentralized automated incentives [C]// Proceedings of 2017 IEEE Symposium on Security and Privacy. San Jose: IEEE, 2017: 410-426.
51 CHEN Jing, YAO Shi-xiong, YUAN Quan, et al. Certchain: public and efficient certificate audit based on blockchain for tls connections [C]// Proceedings of IEEE INFOCOM 2018-IEEE Conference on Computer Communications. Hawaii: IEEE, 2018: 2060-2068.
52 WANG Ze, LIN Jing-qiang, CAI Quan-wei, et al Blockchain-based certificate transparency and revocation transparency[J]. IEEE Transactions on Dependable and Secure Computing, 2020, 10958: 144- 162
53 刘敖迪, 杜学绘, 王娜, 等 基于区块链的大数据访问控制机制[J]. 软件学报, 2019, 30 (9): 2636- 2654
LIU Ao-di, DU Xue-hui, WANG Na, et al Blockchain-based access control mechanism for big data[J]. Journal of Software, 2019, 30 (9): 2636- 2654
54 YUAN E, TONG J. Attributed based access control for web services [C]// Proceedings of IEEE International Conference on Web Services. Washington: IEEE, 2005.
55 AZARIA A, EKBLAW A, VIEIRA T, et al. Medrec: using blockchain for medical data access and permission management [C]// Proceedings of 2016 2nd International Conference on Open and Big Data. Vienna: IEEE, 2016: 25-30.
56 EKBLAW A, AZARIA A, HALAMKA J, et al. A case study for blockchain in healthcare: “MedRec” prototype for electronic health records and medical research data [C]// Proceedings of IEEE Open and Big Data Conference. Washington: IEEE, 2016: 13.
57 CRUZ J, KAJI Y, YANAI N RBAC-SC: role-based access control using smart contract[J]. IEEE Access, 2018, 6: 12240- 12251
doi: 10.1109/ACCESS.2018.2812844
58 DING Xiang-wu, YANG Jian-ming. An access control model and its application in blockchain [C]// Proceedings of 2019 International Conference on Communications, Information System and Computer Engineering. Haikou: IEEE, 2019: 163-167.
59 ALANSARI S, PACI F, SASSONE V. A distributed access control system for cloud federations [C]// Proceedings of 2017 IEEE 37th International Conference on Distributed Computing Systems. Atlanta: IEEE, 2017: 2131-2136.
60 ALANSARI S, PACI F, MARGHERI A, et al. Privacy-preserving access control in cloud federations [C]// Proceedings of 2017 IEEE 10th International Conference on Cloud Computing. Hawaii: IEEE, 2017: 757-760.
61 OUADDAH A, ABOU E A, AIT O A FairAccess: a new blockchain-based access control framework for the Internet of things[J]. Security and Communication Networks, 2016, 9 (18): 5943- 5964
doi: 10.1002/sec.1748
62 OUADDAH A, ABOU E A, AIT O A. Towards a novel privacy-preserving access control model based on blockchain technology in IoT [M]// Europe and MENA cooperation advances in information and communication technologies. Cham: Springer, 2017: 523-533.
63 LE T, MUTKA M. CapChain: a privacy preserving access control framework based on blockchain for pervasive environments [C]// Proceedings of 2018 IEEE International Conference on Smart Computing. Sicily: IEEE, 2018: 57-64.
64 Beijing PeerSafe Technology Co. , Ltd. White paper for blockchain database application platform [EB/OL]. (2019-01-10). http://blockchain.peersafe.com/PDF/ChainSQL-whitepaper.pdf.
65 MCCONAGHY T, MARQUES R, MULLER A, et al. Bigchaindb: a scalable blockchain database [EB/OL]. (2018-03-14). https://www.bigchaindb.com/whitepaper.
66 LI Yang, ZHENG Kai, YAN Ying, et al. EtherQL: a query layer for blockchain system [C]// Proceedings of International Conference on Database Systems for Advanced Applications. Cham: Springer, 2017: 556-567.
67 焦通, 申德荣, 聂铁铮, 等 区块链数据库: 一种可查询且防篡改的数据库[J]. 软件学报, 2019, 30 (9): 2671- 2685
JIAO Tong, SHEN De-rong, NIE Tie-zheng, et al BlockchainDB: querable and immutable database[J]. Journal of Software, 2019, 30 (9): 2671- 2685
68 ZHU Yan-chao, ZHANG Zhao, JIN Che-qing, et al. Sebdb: semantics empowered blockchain database [C]// Proceedings of 2019 IEEE 35th International Conference on Data Engineering. Macao: IEEE, 2019: 1820-1831.
69 蔡磊, 朱燕超, 郭庆兴, 等 面向区块链的高效物化视图维护和可信查询[J]. 软件学报, 2020, 31 (3): 680- 694
CAI Lei, ZHU Yan-chao, GUO Qing-xing, et al Efficient materialized view maintenance and trusted query for blockchain[J]. Journal of Software, 2020, 31 (3): 680- 694
70 EL-HINDI M, HEYDEN M, BINNIG C, et al. Blockchaindb-towards a shared database on blockchains [C]// Proceedings of the 2019 International Conference on Management of Data. New York: ACM, 2019: 1905-1908.
71 EL-HINDI M, BINNIG C, ARASU A, et al. BlockchainDB: a shared database on blockchains [C]// Proceedings of the VLDB Endowment. Tokyo: VLDB, 2019: 1597-1609.
72 XU Cheng, CHEN Qian, HU Hai-bo, et al Authenticating aggregate queries over set-valued data with confidentiality[J]. IEEE Transactions on Knowledge and Data Engineering, 2017, 30 (4): 630- 644
73 RAMACHANDRAN A, KANTARCIOGLU D. Using blockchain and smart contracts for secure data provenance management [EB/OL]. (2017-09-28). https://arxiv.org/abs/1709.10000v1#.
74 RUAN P, CHEN G, DINH T T A, et al. Fine-grained, secure and efficient data provenance on blockchain systems [C]// Proceedings of the VLDB Endowment. Tokyo: VLDB, 2019: 975-988.
75 JIANG Peng, GUO Fu-chun, LIANG Kai-tai, et al Searchain: blockchain-based private keyword search in decentralized storage[J]. Future Generation Computer Systems, 2020, 107: 781- 792
doi: 10.1016/j.future.2017.08.036
76 CAI Cheng-jun, YUAN Xing-jiang, WANG Cong. Towards trustworthy and private keyword search in encrypted decentralized storage [C]// Proccedings of 2017 IEEE International Conference on Communications. San Diego: IEEE, 2017: 1-7.
77 CHEN Lan-xiang, LEE Wai-kong, CHANG Chin-chen, et al Blockchain based searchable encryption for electronic health record sharing[J]. Future Generation Computer Systems, 2019, 95: 420- 429
doi: 10.1016/j.future.2019.01.018
78 ZHENG Bao-kun, ZHU Lie-huang, SHEN Meng, et al Scalable and privacy-preserving data sharing based on blockchain[J]. Journal of Computer Science and Technology, 2018, 33 (3): 557- 567
doi: 10.1007/s11390-018-1840-5
79 LI Yue, HUANG Jun-qin, QIN Sheng-zhi, et al. Big data model of security sharing based on blockchain [C]// Proceedings of 2017 3rd International Conference on Big Data Computing and Communications. Chengdu: IEEE, 2017: 117-121.
80 SHEN Meng, TANG Xiang-yun, ZHU Lie-huang, et al Privacy-preserving support vector machine training over blockchain-based encrypted IoT data in smart cities[J]. IEEE Internet of Things Journal, 2019, 6 (5): 7702- 7712
doi: 10.1109/JIOT.2019.2901840
81 ZHANG Ai-qing, LIN Xiao-dong Towards secure and privacy-preserving data sharing in e-health systems via consortium blockchain[J]. Journal of Medical Systems, 2018, 42 (8): 1- 18
82 ZIKRATOV I, KUZMIN A, AKIMENKO V, et al. Ensuring data integrity using blockchain technology [C]// Proceedings of 2017 20th Conference of Open Innovations Association. Petersburg: IEEE, 2017: 534-539.
83 LIU C H, LIN Q X, WEN S L Blockchain-enabled data collection and sharing for industrial IoT with deep reinforcement learning[J]. IEEE Transactions on Industrial Informatics, 2018, 15 (6): 3516- 3526
84 LIANG Xue-ping, ZHAO Juan, SHETTY S, et al. Integrating blockchain for data sharing and collaboration in mobile healthcare applications [C]// Proceedings of 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications. Montreal: IEEE, 2017: 1-5.
85 YUE Xiao, WANG Hui-ju, JIN Da-wei, et al Healthcare data gateways: found healthcare intelligence on blockchain with novel privacy risk control[J]. Journal of Medical Systems, 2016, 40 (10): 1- 8
86 RAMAN R, VACULIN R, HIND M, et al. Trusted multi-party computation and verifiable simulations: a scalable blockchain approach [EB/OL]. (2018-09-22). https://arXiv.org/abs/1809.08438.
87 iCube: the world's first SMPC (secure multi-party computing) blockchain financial project [EB/OL]. (2017-11-20). https://www.8btc.com/article/153542.
88 Dianrong: Dianrong blockchain cloud service platform [EB/OL]. (2019-11-05). https://www.dianrongchain.com.
89 ZETZSCHE D A, AMER D W, BUCKLEY R P Decentralized finance[J]. Journal of Financial Regulation, 2020, 6 (2): 172- 203
doi: 10.1093/jfr/fjaa010
90 CACHIN C An information-theoretic model for steganography[J]. Information and Computation, 2004, 192 (1): 41- 56
doi: 10.1016/j.ic.2004.02.003
91 TIAN Jing, GOU Gao-peng, LIU Chang, et al. DLchain: a covert channel over blockchain based on dynamic labels [C]// Proceedings of International Conference on Information and Communications Security. Cham: Springer, 2019: 814-830.
92 司成祥, 高峰, 祝烈煌, 等 一种支持动态标签的区块链数据隐蔽传输机制[J]. 西安电子科技大学学报, 2020, 47 (5): 94- 102
SI Cheng-xiang, GAO Feng, ZHU Lie-huang, et al Covert data transmission mechanism based on dynamic label in blockchain[J]. Journal of Xidian University, 2020, 47 (5): 94- 102
93 GAO Feng, ZHU Lie-huang, GAI Ke-ke, et al Achieving a covert channel over an open blockchain network[J]. IEEE Network, 2020, 34 (2): 6- 13
doi: 10.1109/MNET.001.1900225
94 PARTALA J Provably secure covert communication on blockchain[J]. Cryptography, 2018, 2 (3): 1- 18
[1] 何苗,柏粉花,于卓,沈韬. 区块链中可公开验证密钥共享技术[J]. 浙江大学学报(工学版), 2022, 56(2): 306-312.
[2] 董思含,信俊昌,郝琨,姚钟铭,陈金义. 多区块链环境下的连接查询优化算法[J]. 浙江大学学报(工学版), 2022, 56(2): 313-321.
[3] 刘雪娇,殷一丹,陈蔚,夏莹杰,许佳丽,韩立东. 基于区块链的车联网数据安全共享方案[J]. 浙江大学学报(工学版), 2021, 55(5): 957-965.
[4] 张磊,张菁. 支持数据实用性和容错的差分隐私保护方案[J]. 浙江大学学报(工学版), 2019, 53(8): 1496-1505.
[5] 盛念祖, 李芳, 李晓风, 赵赫, 周桐. 基于区块链智能合约的物联网数据资产化方法[J]. 浙江大学学报(工学版), 2018, 52(11): 2150-2158.
[6] 皮俊波, 陈珂, 陈刚, 董金祥. 基于用户兴趣模型两段式排序的隐私保护方法[J]. J4, 2010, 44(9): 1659-1665.
[7] 彭志宇, 李善平, 杨朝晖, 林欣. 信任管理中的匿名授权方法[J]. J4, 2010, 44(5): 897-902.
[8] 马进, 李锋, 李建华. 分布式数据挖掘中基于扰乱的隐私保护方法[J]. J4, 2010, 44(2): 276-282.
[9] 苏少辉 杨青海 徐园园 周朝阳 祁国宁. 基于设计知识库的服装CAD/PDM集成技术研究[J]. J4, 2006, 40(10): 1709-1714.
[10] 武建伟 邱清盈 冯培恩 高飞. 分布式协同设计环境下产品数据管理策略[J]. J4, 2005, 39(10): 1465-1469.
[11] 刘端阳 平玲娣 潘雪增. PDM系统间的安全交互模型[J]. J4, 2004, 38(1): 29-34.