Abstract

In the process of data collaboration, the data source copyright, equity boundaries, and other issues must be ensured to ensure the data owner’s income rights. The data on the blockchain are transaction data. After the data are verified, they are added to the block by the node that has the right to keep accounts. Once the data are added to the blockchain, they cannot be deleted or changed, and only authorized query operations can be performed. The transaction records on the blockchain are completely public, and the fund transactions between accounts can reflect a lot of valuable information, especially some special accounts track the IP of transaction users through methods such as address reuse, taint analysis, and cluster analysis. At the same time, a credit contribution certification mechanism is established to ensure that the contributions are directly proportional to the rewards, and finally, a credit mechanism for data fraud is established. This paper mainly analyzes the key systems of privacy protection through research data and blockchain. The research results show that different companies conduct the Pailler homomorphic encryption of data and use the secure multiparty calculation to obtain the results. The execution of the whole process is controlled by a specific intelligent contract, and the records of the execution process are stored in the blockchain. It can be seen that the blockchain-based data distribution system changes the traditional data distribution mode so that the data source and the data user can interact directly, which promotes the maintenance of the system’s security and stability.

1. Introduction

The data privacy of users in the cloud computing environment is secret data, which is information that others do not want to know. From the perspective of privacy owners, privacy data can be divided into personal privacy data and common privacy data. Personal privacy data include information that can be used to identify or locate individual and sensitive information. The privacy and accessibility of data can ensure the user’s control over the information and make access to unrestricted information [1, 2]. The conflict between data privacy and accessibility occurs naturally [3, 4], and data in the urban traffic is closely related to these two characteristics [5, 6].

Big data has become China’s national strategy. China needs to speed up. “Big data” requires new processing modes to have stronger decision-making power, insight discovery power, and process optimization ability to adapt massive, high growth rate and diversified information assets.

Each node has the same rights, and data updates and transaction validation are done through circulated hubs that follow an agreement system [7, 8]. Specifically, what is put away on the blockchain is not simply the exchange, yet the hash of the exchange [9, 10], which is stored in the form of Merkle trees in blocks that form chained data structures in chronological order and longest chain criteria [11]. Therefore, the construction of a unified, open, and diversified “chain network” blockchain infrastructure is important [12]. The important significance of building a blockchain framework is to ensure that data of different formats and sources can be integrated and that different applications can be perfectly integrated into the blockchain hotspot [13, 14].

2. Experimental Procedure

Blockchain is a distributed database technology developed on the basis of the application of digital encryption currency. The blockchain system has the characteristics of decentralization, immutability, distributed consensus, traceability, and eventual consistency, which makes it suitable for solving data management problems in untrusted environments. The unique data management function of blockchain has become the key to exerting the value of blockchain in applications in various fields. Blockchain technology is becoming more and more popular [15, 16]. Blockchain is a new type of distributed protocol, which can be realized without the mutual trust of nodes, thus effectively reducing the trust cost in the real economy [17, 18]. At present, the biggest application of blockchain technology is digital currency, and it is also one of the ten typical judicial technology applications of the Internet. Although blockchain significantly improves data security and reliability, the storage scalability of blockchain is poor [19, 20]. For example, bitcoin currently has a total capacity of more than 160 GB. The current bitcoin system uses nearly 1600 PB of storage space, only for about 160 GB of data, which greatly wastes storage space. In addition, as time goes by, the blockchain will increasingly occupy a large amount of node storage space. The function introduction of each part of the block header is shown in Table 1.

In this context, a scheme for implementing scalable is proposed and the extended blockchain storage is studied to realize the privacy protection of multiparty shared data:

As shown in Figure 1, according to the homomorphic nature of the encryption system,

The protocol presented in this study also supports partial anonymity. Imagine Alice wants to send some money to Bob, but he does not want anyone to know that these currencies are for Bob. Table 2 shows the roles assigned to users, the permissions each role has, and the relationship between user-role-permission-device.

Assuming n of account are chosen. Then, the n − 1 address from the anonymous set is randomly selected. Finally, she performs the transfer, sending the ciphertext of the currency to a blind feature of n − 1 addresses that are randomly selected.

In order to encrypt the message, an integer is randomly selected, and then, calculate the ciphertext:

For decryption,

The given scheme can also use the consensus to recover the random number in a given ciphertext:

From the nature of the encryption system, the following equations can be obtained:

The Paillier encryption system also has a blind feature, which is the ability to change a ciphertext without changing the corresponding plaintext:

Assuming different values (i.e., ), in the next place, in the payment privacy, if Alice is transferring money to n of accounts during the transfer, then only the probability of selecting Bob’s account is 1/n. The equipment information used in the mechanism simulation experiment in this paper is shown in Table 3.

By hiding each transaction with a different anonymous set, the rate of increase is gradually increased, as shown in Figure 2.

3. Results and Discussion

3.1. Blockchain-Based Enterprise Data Collaboration and Sharing Solution

The blockchain-based undertaking information cooperation and sharing plans are given in Figure 3. The main roles of the scheme are the homomorphic encryption scheme, the contribution proof protocol, and the smart contract technology. It solved the problems existing in the current contribution of enterprise data collaboration.

Multiple enterprises participating in the collaboration encrypt the data to be shared homomorphic output the encrypted data, and use the secure multiparty computing technology to merge the previously designed algorithms together for collaborative computing. After the result of the safe multiparty calculation comes out, demander utilizes the Paillier homomorphic decoding calculation to unscramble the result and acquire the information that they really want. Each data provider and the collaborative data result calculation party distribute the predesigned total reward according to the score obtained, and under the control of another smart contract, the rewards that each party should receive are sent to the accounts of these users. Whatever the transmitted data, the process of data transfer, the process of collaborative data operations, the process of returning data results, the process of contributing proof calculations, the process of reward distribution, and the results are recorded in blockchain by smart contracts. This article records the results of multiple visits, as shown in Table 4.

3.2. Implementation Steps of Enterprise Data Collaboration and Sharing Based on Blockchain

Users participating in enterprise data sharing requirements, the data are prepared to be transmitted through the encrypted secure channel. It passes the data through a secret channel to a secure computing container. The relevant data are automatically encrypted, automatically decrypted, and ready to perform related operations, as shown in Figure 4.

Received data are manipulated using a secure multiparty computing algorithm that implements the determination, as shown in Figure 5.

Under the strong supervision through the reverse one-way secure channel, the collaborative data result is immediately eliminated after being delivered to the collaborative data requester and is not backed up, as shown in Figure 6.

Without leaving a backup, raw original is also done, as shown in Figure 7.

Due to the huge number of IoT devices, in order to satisfy as many access requests of IoT devices as possible, local gateways need high-performance features. Therefore, this article tried the throughput and data transmission of the neighborhood door, and the experimental outcomes are displayed in Figure 8.

The initiator information stored by the verification node is shown in Table 5.

Taking into account the network delays in real transactions, this experiment introduces network delays when simulating the transaction process, taking random numbers as 0.21587, 0.76817, 0.16967, 0.57892, 0.82071, 0.68045, 1.26064, 0.77601, 0.55335, and 0.34181. The transaction delay value of each round of simulation is displayed in Table 6.

Users with high permissions can check the statistics of these health data at any time through the authorized homomorphic public key. However, since the private key signature is added during cannot be spied on before the permission of the SP is obtained. User privacy data are shown in Table 7.

3.3. Blockchain-Based Government Data Collaboration and Sharing Solution

In this study, through the decentralized blockchain technology, an innovative data distribution system is constructed. Blockchain technology is mainly proposed for the trust problem of the centralized accounting system of existing financial institutions. It is composed of distributed storage, P2P network, encryption algorithm, consensus mechanism, and other technologies. In the system proposed in this study, there are six different roles, namely information source, media, information buyer, system maintainer, content distributor, and advertisers.

The information source uploads the created information to a given blockchain system, while doing this, the information source needs to provide a certain commission to the system. The source of information generally refers to the information transmitted through a certain substance; that is, the origin/source of the information (including the place of production and occurrence of information resources, the source, and the base). The information source can use built-in smart contract module in the system to initiate content crowdfunding and set the revenue share portion and investment deadline for the transfer. Within the limited time, the information buyers can invest the content by share, and the content producer can obtain the lump sum basis at first, and the content will be automatically allocated in portions by the smart contract to the information source and the investor in information purchaser after the lock-up period. The media is the medium, in which information buyers contact information published by information sources, and is also the channel through which advertisers place advertisement [21, 22]. The media enjoys the advertising share in proportion to the prearranged smart contract, which encourages the media to expand the user base and improve the user experience. Information sources can be divided according to the storability of information, the time sequence of production, the form of existence, the production process, and the content of the generated information.

3.4. Research on Blockchain Data Distribution System

The data purchasers are require to pay a specific measure of cost to the data source and the fundamental asset supplier while buying the data in the framework. The information buyers can participate in the crowdfunding initiated by the information source; that is, the users are allowed to invest in the excellent content generated by other users and obtain the part of the revenue share, while the information buyers can also share the content, the sharing action is recorded by the smart contract on the blockchain, and profit share can be obtained from the advertising revenue of the shared content [23]. Framework maintainers come to a settlement on an agreement system to finish the information on the blockchain. System maintainers have high requirements for computing and communication resources. The main sources of revenue for system maintainers are consensus incentives and transaction fees charged.

Multimedia information dissemination and sharing have high requirements on the network, including storage and streaming media forwarding cost, which can account for more than 40% of operating costs. In a blockchain-based information distribution system, users with idle resources and eco-partners can voluntarily join nodes to provide bandwidth and storage capacity services for blockchain-based information distribution system users and obtain corresponding commission incentives; thereby, the operating costs in the ecosystem have been significantly reduced. Advertisers are able to pay for advertising based on the data because the clicks, downloads, or page views of the content on the blockchain-based information distribution system are publicly transparent.

Information sources can upload, categorize, fill brief introduction, and fix a price of their own work. Consumers can search the platform for their favorite content and authors, browse content by category, view content profiles and user reviews, purchase content, and rate and comment on purchased content.

Considering that the blockchain-based data distribution system needs to store a lot of photos, videos, texts, and other information. The nodes in the blockchain-based data distribution system are divided into data storage nodes, system maintenance nodes, and common nodes. The data storage nodes are used to maintain the system’s data resources. According to the incentive model of the blockchain-based data distribution system, choosing the right data resource for storage, as a data storage node of the system, first needs to have enough storage capacity. The system maintenance node is used to “mining,” in this way to maintain the blockchain ledger of the blockchain-based data distribution system. A system maintenance node is not only be in a position of a certain amount of storage capacity and be suitable for the global ledger of storage system but also sufficient computing power is required to complete the proof of work. Ordinary nodes can also be light nodes. Such nodes have the lowest requirements on the nodes themselves. Under normal circumstances, only the account books and data related to themselves need to be stored.

4. Conclusion

In the context of big data, the inherent or potential value of data makes it an important asset. Common data in daily life generally undergoes a series of processing. Due to the lack of necessary transparency in the intermediate process, it is difficult for users to judge its source and reliability. Through the combination of blockchain technology and other scenarios and technologies, many tasks that were previously considered difficult to accomplish can be accomplished. Digital cities will inevitably require digitization of production factors and holographic economic activities to form a scalable economy. Blockchains can replace the original “face-to-face trust” relationship with “back-to-back trust,” reducing the cost of transactions and exchanges. In the meantime, the “chain network” is used to unitize the blockchains of different architectures and different scenarios, realize the digitalization of the production factors, and completely record the whole process of the flow, connection, and equity distribution of social production materials. The blockchain system provides limited identity privacy and data privacy protection capabilities. This article analyzes the identity privacy and data privacy leakage problems of the blockchain system in-depth and combines privacy protection mechanisms and cryptographic algorithms to propose solutions and protections to enhance user identity privacy. The public key of data privacy can search for the blockchain data privacy protection scheme, which improves the privacy protection mechanism of the blockchain system. Based on the ecological environment of the blockchain system, using the distributed data storage function of the blockchain system can bring new application modes to a large number of field application systems. At present, various application fields have formed a preliminary accumulation in blockchain technology, gradually combining the functions of the blockchain system with the original business system, using the characteristics of the blockchain to solve the drawbacks of the business system, and at the same time, improving the blockchain system itself has shortcomings and limitations. Now, applications in various fields have presented more new challenges to the blockchain system.

This study merged the blockchain and big data together, and the big data privacy protection and scalability issues are deeply studied and analyzed based on the existing blockchain system architecture, and some research results are obtained, but there are still many works that can be further studied. According to the viewpoint of tackling the security assurance and versatility of large information sharing, this study proposes a shared data privacy protection and scalability solution. This solution solves the data storage problem to some extent, but the recorded data are still stored in the cloud. There may still be the possibility of centralization failure. The next step will be to expand the solution based on the existing research results to further solve the problem of centralization failure.

Data Availability

No data were used to support this study.

Conflicts of Interest

The author declares that there are no conflicts of interest with any financial organizations regarding the material reported in this manuscript.

Acknowledgments

This work was supported by the scientific research project of the Shaanxi Provincial Education Department in 2018 (project no. 18JK1189).