Security and Communication Networks / 2022 / Article / Tab 1 / Research Article
Blockchain Data Sharing Query Scheme based on Threshold Secret Sharing Table 1 Feature comparison of blockchain data query schemes.
ā Type of blockchain Application scenarios Data query technology adopted Advantages Disadvantages Literature [19 ] Consortium blockchain, public blockchain Digital archive management Smart contract Queries are automatically executed when user requests meet preset rules and do not rely on nonblockchain systems. Each node needs to run the deployed contract, and the resource consumption of blockchain applications is large. Literature [20 ] Consortium blockchain Medical data sharing Smart contract Literature [21 ] Consortium blockchain Medical privacy data sharing Smart contract Literature [22 ] Public blockchain Paid query of data Smart contract Literature [23 ] Public blockchain Data security sharing Attribute-based encryption Easy to add an access permission control mechanism, which makes access permission control more fine-grained. Inability to quickly respond to situations where the actual inquirers do not match the preset inquirers. Literature [24 ] Private blockchain, consortium blockchain Enterprise data sharing Attribute-based encryption Literature [25 ] Private blockchain Medical data sharing Proxy reencryption Literature [26 ] Consortium blockchain IoT device data query Prefix encryption Literature [27 ] Consortium blockchain Medical privacy data sharing Secret sharing Determine the general query permission scope in advance, which is suitable for shared query scenarios. Data can be queried only when the number of users applying for reconstruction exceeds the preset threshold. There is no data reconstruction mechanism. Unable to recover data when there is a failed node. Literature [28 ] Not specified Cyber-physical system Secret sharing Only one data query request can be served. When the number of inquiries is large, the system transmission volume is large. Literature [29 ] Public blockchain Cloud data sharing Secret sharing