Open Access   Article Go Back

Decentralized based Security Mechanism for Linking Sensitive Data using Blockchain Technology

Ashwini Patil1 , Vijay Shelake2

  1. Dept. of Computer Engineering, Mumbai University, Thane, India.
  2. Dept. of Computer Engineering, Mumbai University, Thane, India.

Section:Research Paper, Product Type: Journal Paper
Volume-11 , Issue-9 , Page no. 22-27, Sep-2023

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v11i9.2227

Online published on Sep 30, 2023

Copyright © Ashwini Patil, Vijay Shelake . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Ashwini Patil, Vijay Shelake, “Decentralized based Security Mechanism for Linking Sensitive Data using Blockchain Technology,” International Journal of Computer Sciences and Engineering, Vol.11, Issue.9, pp.22-27, 2023.

MLA Style Citation: Ashwini Patil, Vijay Shelake "Decentralized based Security Mechanism for Linking Sensitive Data using Blockchain Technology." International Journal of Computer Sciences and Engineering 11.9 (2023): 22-27.

APA Style Citation: Ashwini Patil, Vijay Shelake, (2023). Decentralized based Security Mechanism for Linking Sensitive Data using Blockchain Technology. International Journal of Computer Sciences and Engineering, 11(9), 22-27.

BibTex Style Citation:
@article{Patil_2023,
author = {Ashwini Patil, Vijay Shelake},
title = {Decentralized based Security Mechanism for Linking Sensitive Data using Blockchain Technology},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {9 2023},
volume = {11},
Issue = {9},
month = {9},
year = {2023},
issn = {2347-2693},
pages = {22-27},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=5621},
doi = {https://doi.org/10.26438/ijcse/v11i9.2227}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v11i9.2227}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=5621
TI - Decentralized based Security Mechanism for Linking Sensitive Data using Blockchain Technology
T2 - International Journal of Computer Sciences and Engineering
AU - Ashwini Patil, Vijay Shelake
PY - 2023
DA - 2023/09/30
PB - IJCSE, Indore, INDIA
SP - 22-27
IS - 9
VL - 11
SN - 2347-2693
ER -

VIEWS PDF XML
154 196 downloads 91 downloads
  
  
           

Abstract

Privacy preservation practises intensify as data privacy infractions are an increasing source of worry. A lot of organisations gather a lot of data. Organisations occasionally utilise this data for a variety of activities. However, the data gathered may include sensitive or private information that has to be secured. If we disclose data for sharing purposes, privacy protection is a crucial problem. There are several methods for protecting privacy, but they are vulnerable to different kinds of assaults and data loss. In this research, we suggested a practical method for maintaining privacy via homomorphic encryption. Our method safeguards sensitive data with little information loss, improving data usefulness and guarding against many sorts of assault.

Key-Words / Index Term

Privacy preservation, linking sensitive data, Homomorphic Encryption, Blockchain

References

[1]. Clifton, C., Kantarcio?lu, M., Doan, A., Schadow, G., Vaidya, J., Elmagarmid, A. and Suciu, D., 2004, June. Privacy-preserving data integration and sharing. In Proceedings of the 9th ACM SIGMOD workshop on Research issues in data mining and knowledge discovery, pp.19-26, 2004.
[2]. Fang, W., Wen, X.Z., Zheng, Y. and Zhou, M., 2017. A survey of big data security and privacy preserving. IETE Technical Review, Vol.34, Issue.5, pp.544-560, 2017.
[3]. Gosain, A. and Chugh, N., 2014. Privacy preservation in big data. International Journal of Computer Applications, Vol.100, Issue.17, 2014.
[4]. Bonawitz, K., Ivanov, V., Kreuter, B., Marcedone, A., McMahan, H.B., Patel, S., Ramage, D., Segal, A. and Seth, K., 2017, October. Practical secure aggregation for privacy-preserving machine learning. In proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp.1175-1191, 2017.
[5]. Liu, J., Li, X., Ye, L., Zhang, H., Du, X. and Guizani, M., 2018, December. BPDS: A blockchain based privacy-preserving data sharing for electronic medical records. In 2018 IEEE Global Communications Conference (GLOBECOM), IEEE, pp.1-6, 2018.
[6]. Zhang, A. and Lin, X., 2018. Towards secure and privacy-preserving data sharing in e-health systems via consortium blockchain. Journal of medical systems, Vol.42, Issue.8, p.140, 2018.
[7]. Jin, H., Luo, Y., Li, P. and Mathew, J., 2019. A review of secure and privacy-preserving medical data sharing. IEEE Access, 7, pp.61656-61669, 2019.
[8]. Park, J. and Lim, H., 2022. Privacy-preserving federated learning using homomorphic encryption. Applied Sciences, Vol.12, Issue.2, p.734, 2022.
[9]. Mendes, R. and Vilela, J.P., 2017. Privacy-preserving data mining: methods, metrics, and applications. IEEE Access, 5, pp.10562-10582, 2017.
[10]. Mahanan, W., Chaovalitwongse, W.A. and Natwichai, J., 2021. Data privacy preservation algorithm with k-anonymity. World Wide Web, 24, pp.1551-1561, 2021.
[11]. Sharma, M., Chaudhary, A., Mathuria, M., Chaudhary, S. and Kumar, S., 2014, July. An efficient approach for privacy preserving in data mining. In 2014 International Conference on Signal Propagation and Computer Technology (ICSPCT 2014), IEEE, pp.244-249, 2014.
[12]. Suneetha, V., Suresh, S. and Jhananie, V., 2020, March. A novel framework using apache spark for privacy preservation of healthcare big data. In 2020 2nd International Conference on Innovative Mechanisms for Industry Applications (ICIMIA), IEEE, pp.743-749, 2020.
[13]. Yadav, D., Shinde, A., Nair, A., Patil, Y. and Kanchan, S., 2020, May. Enhancing data security in cloud using blockchain. In 2020 4th International Conference on Intelligent Computing and Control Systems (ICICCS), IEEE, pp.753-757, 2020.
[14]. Aono, Y., Hayashi, T., Wang, L. and Moriai, S., 2017. Privacy-preserving deep learning via additively homomorphic encryption. IEEE transactions on information forensics and security, Vol.13, Issue.5, pp.1333-1345, 2017.
[15]. Ni, S., Xie, M. and Qian, Q., 2017. Clustering Based K-anonymity Algorithm for Privacy Preservation. Int. J. Netw. Secur., Vol.19, Issue.6, pp.1062-1071, 2017.
[16]. Mansour, H.O., Siraj, M.M., Ghaleb, F.A., Saeed, F., Alkhammash, E.H. and Maarof, M.A., 2021. Quasi-Identifier recognition algorithm for privacy preservation of cloud data based on risk reidentification. Wireless Communications and Mobile Computing, pp.1-13, 2021.
[17]. Chamikara, M.A.P., Bertok, P., Liu, D., Camtepe, S. and Khalil, I., 2020. Efficient privacy preservation of big data for accurate data mining. Information Sciences, 527, pp.420-443, 2020.
[18]. Shivashankar, M. and Mary, S.A., 2021. Privacy preservation of data using modified rider optimization algorithm: Optimal data sanitization and restoration model. Expert Systems, Vol.38, Issue.3, p.e12663, 2021.
[19]. Osia, S.A., Shamsabadi, A.S., Sajadmanesh, S., Taheri, A., Katevas, K., Rabiee, H.R., Lane, N.D. and Haddadi, H., 2020. A hybrid deep learning architecture for privacy-preserving mobile analytics. IEEE Internet of Things Journal, Vol.7, Issue.5, pp.4505-4518, 2020.
[20]. Lee, J.W., Kang, H., Lee, Y., Choi, W., Eom, J., Deryabin, M., Lee, E., Lee, J., Yoo, D., Kim, Y.S. and No, J.S., 2022. Privacy-preserving machine learning with fully homomorphic encryption for deep neural network. IEEE Access, 10, pp.30039-30054, 2022.
[21]. Makhdoom, I., Zhou, I., Abolhasan, M., Lipman, J. and Ni, W., 2020. PrivySharing: A blockchain-based framework for privacy-preserving and secure data sharing in smart cities. Computers & Security, 88, p.101653, 2020.
[22]. Park, J. and Lim, H., 2022. Privacy-preserving federated learning using homomorphic encryption. Applied Sciences, Vol.12, Issue.2, p.734, 2022.
[23]. Mahanan, W., Chaovalitwongse, W.A. and Natwichai, J., 2021. Data privacy preservation algorithm with k-anonymity. World Wide Web, 24, pp.1551-1561, 2021.
[24]. Suneetha, V., Suresh, S. and Jhananie, V., 2020, March. A novel framework using apache spark for privacy preservation of healthcare big data. In 2020 2nd International Conference on Innovative Mechanisms for Industry Applications (ICIMIA), IEEE, pp.743-749, 2020.
[25]. Cui, Z., Fei, X.U.E., Zhang, S., Cai, X., Cao, Y., Zhang, W. and Chen, J., 2020. A hybrid blockchain-based identity authentication scheme for multi-WSN. IEEE Transactions on Services Computing, Vol.13, Issue.2, pp.241-251, 2020.
[26]. Allouch, A., Cheikhrouhou, O., Koubâa, A., Toumi, K., Khalgui, M. and Nguyen Gia, T., 2021. Utm-chain: blockchain-based secure unmanned traffic management for internet of drones. Sensors, Vol.21, Issue.9, p.3049, 2021.
[27]. Hasan, H.R., Salah, K., Jayaraman, R., Arshad, J., Yaqoob, I., Omar, M. and Ellahham, S., 2020. Blockchain-based solution for COVID-19 digital medical passports and immunity certificates. Ieee Access, 8, pp.222093-222108, 2020.
[28]. Lin, C., He, D., Huang, X., Kumar, N. and Choo, K.K.R., 2020. BCPPA: A blockchain-based conditional privacy-preserving authentication protocol for vehicular ad hoc networks. IEEE Transactions on Intelligent Transportation Systems, Vol.22, Issue.12, pp.7408-7420, 2020.
[29]. Wan, J., Li, J., Imran, M. and Li, D., 2019. A blockchain-based solution for enhancing security and privacy in smart factory. IEEE Transactions on Industrial Informatics, Vol.15, Issue.6, pp.3652-3660, 2019.
[30]. Lin, C., He, D., Kumar, N., Huang, X., Vijayakumar, P. and Choo, K.K.R., 2019. HomeChain: A blockchain-based secure mutual authentication system for smart homes. IEEE Internet of Things Journal, Vol.7, Issue.2, pp.818-829, 2019.
[31]. Yazdinejad, A., Parizi, R.M., Dehghantanha, A., Zhang, Q. and Choo, K.K.R., 2020. An energy-efficient SDN controller architecture for IoT networks with blockchain-based security. IEEE Transactions on Services Computing, Vol.13, Issue.4, pp.625-638, 2020.
[32]. Shahnaz, A., Qamar, U. and Khalid, A., 2019. Using blockchain for electronic health records. IEEE access, 7, pp.147782-147795, 2019.