2021
DOI: 10.1155/2021/5523489
|View full text |Cite
|
Sign up to set email alerts
|

Controlled Sharing Mechanism of Data Based on the Consortium Blockchain

Abstract: In the process of sharing data, the costless replication of electric energy data leads to the problem of uncontrolled data and the difficulty of third-party access verification. This paper proposes a controlled sharing mechanism of data based on the consortium blockchain. The data flow range is controlled by the data isolation mechanism between channels provided by the consortium blockchain by constructing a data storage consortium chain to achieve trusted data storage, combining attribute-based encryption to … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
3
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 24 publications
(26 reference statements)
0
3
0
Order By: Relevance
“…Due to the characteristics of its distributed data ledger, it is widely used in multiple scenarios such as virtual currency, electronic bidding, and Industrial Internet of Things. In terms of addressing data privacy, blockchain can be combined with a variety of cryptographic methods, for example, attribute encryption [8], homomorphic encryption [9], searchable encryption, and proxy reencryption combined [10], to achieve the protection of data privacy and identity privacy on the blockchain.…”
Section: Introductionmentioning
confidence: 99%
“…Due to the characteristics of its distributed data ledger, it is widely used in multiple scenarios such as virtual currency, electronic bidding, and Industrial Internet of Things. In terms of addressing data privacy, blockchain can be combined with a variety of cryptographic methods, for example, attribute encryption [8], homomorphic encryption [9], searchable encryption, and proxy reencryption combined [10], to achieve the protection of data privacy and identity privacy on the blockchain.…”
Section: Introductionmentioning
confidence: 99%
“…Li J tries to solve the problems in the technology financial service scenario. Since it is difficult to share cross-departmental information in a timely manner, financial institutions often have difficulties in providing multi-party data sources to other companies in their investment business [3]. This article mainly studies the financial data sharing mechanism of BT.…”
Section: Introductionmentioning
confidence: 99%
“…The alliance chain (Li et al, 2021) has different forms and structures from public chains, such as BTC and ETH, and it achieves a balanced state between decentralization and centralization, both of which make the alliance chain the main form of blockchain that attracts wide attention from people. Hyperledger Fabric (Androulaki et al, 2018) is one of the most popular alliance chains at present, and its security mechanism is particularly important.…”
mentioning
confidence: 99%