Privacy and Security Mechanisms for B2B Data Sharing: A Conceptual Framework
Abstract
:1. Introduction
2. Related Work
3. Research Significance
- Scalability and adaptability—a scalable and adaptable framework is essential with increasing data volumes. Blockchain combined with off-chain storage solutions caters to this need, enabling efficient management of large datasets without compromising the blockchain’s performance [20].
- Flexibility in storage architectures—cloud storage offers advantages such as lower cost, metered service, scalable, and ubiquitous access, but raises concerns about data integrity and privacy [21]. Our framework offers a variety of off-chain storage options, allowing businesses to decide on their storage architectures flexibly based on their needs and security considerations.
- Efficient data location and retrieval—the integration of distributed hash tables (DHTs) ensures efficient and secure access to data across distributed environments, addressing the challenges of data storage and retrieval in a diverse storage landscape [22].
- Privacy preservation—utilizing encryption and privacy-enhancing technologies like data masking ensures that sensitive data remain confidential, catering to the increasing privacy concerns in data sharing [23].
- Efficient access rights control—the framework’s capability to manage access rights efficiently without requiring extensive re-encryption processes enhances its practicality and efficiency, particularly in dynamic business environments.
- Compliance and auditability—the blockchain component of the framework provides a transparent and auditable record of all data sharing requests and access events, enhancing accountability and regulatory compliance [24].
4. Preliminaries
4.1. Data Encryption Technology
4.1.1. Additive Homomorphic Encryption
- Randomly select two large prime numbers of equal length .
- Randomly select integer , is defined, calculate , and generate keys as
- To perform encryption, input plaintext information , , select random numbers , and compute the encrypted ciphertext:
- To perform decryption, compute the plaintext message:
4.1.2. Proxy Re-Encryption
- Key generation: Each entity has its own public key() and private key(). The proxy that performs the re-encryption does not need to decrypt the data but can directly transform ciphertexts from being decryptable. For example, the process whereby entity A generates a re-encryption key using the public key of itself and the private key of B can be represented as follows:
- Encryption: the data owner encrypts the data m using the agent’s public key and passes the ciphertext to the agent.
- Proxy re-encryption: The proxy re-encrypts the data to another key using its private key, without knowing the plaintext. In this way, the proxy obtains a new ciphertext and keeps the data encrypted.
- Decryption: The recipient of the data decrypts the agent’s re-encrypted ciphertext using its private key to obtain the final plaintext. In the previous example, B can use its private key to decrypt
4.1.3. Data Perturbation
4.2. Data Storage Technology
4.2.1. Blockchain
- Public blockchain: Bitcoin and Ethereum are two famous examples of a public blockchain whose data are completely open and can be accessed and queried by anyone.
- Private blockchain: private blockchains are typically used within an organization as they restrict access to the blockchain, usually to authorized users or entities.
- Permissioned blockchain: In comparison, the permissioned blockchain is somewhere in between, managed by a group of organizations or entities for more flexible, secure, and customizable applications. It is suitable for scenarios where multiple companies collaborate. This hybrid approach enables interaction with other entities while meeting privacy and authorization needs. Permissioned blockchains can use more streamlined consensus mechanisms such as Practical Byzantine Fault Tolerance (PBFT), Raft, or Hybrid Consensus.
4.2.2. Distributed Hash Table
5. Framework Overview
- Access Control Layer
- Privacy Preservation Layer
- Data Storage Layer
6. Data Sharing Process
7. Analysis and Discussion
7.1. Data Storage Layer
- Permissioned Blockchain
- In-chain Storage
- Off-chain Storage
- Distributed hash tables
7.2. Privacy Preservation Layer
7.2.1. Key Generation
7.2.2. Data Encryption
- Local storage:
- Cloud storage:
Algorithm 1 Data Masking and Encryption | |
1: | procedure |
2: | |
3: | ←selectRandomNonNegativeNumber() |
4: | |
5: | for do |
6: | |
7: | |
8: | end for |
9: | return |
10: | end procedure |
7.3. Access Control Layer
7.3.1. Access Grant
7.3.2. Data Access
Algorithm 2 Data Access with Homomorphic Encryption | |
1: | procedure DATAACCESS |
2: | exists for the data user |
3: | then |
4: | return Access Denied |
5: | else |
6: | for do |
7: | where is from |
8: | |
9: | end for |
10: | Send the result to data user |
11: | end if |
12: | end procedure |
7.3.3. Access Revocation
7.3.4. Access Reassign
8. Conclusions and Future Work
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Goasduff, L. Data Sharing is a Business Necessity to Accelerate Digital Business; The Gartner Group: Stamford, CT, USA, 2020; Volume 11. [Google Scholar]
- Lee, W.S.; John, A.; Hsu, H.C.; Hsiung, P.A. SPChain: A Smart and Private Blockchain-Enabled Framework for Combining GDPR-Compliant Digital Assets Management With AI Models. IEEE Access 2022, 10, 130424–130443. [Google Scholar] [CrossRef]
- Shen, M.; Zhu, L.; Xu, K. Blockchain and Data Sharing. In Blockchain: Empowering Secure Data Sharing; Shen, M., Zhu, L., Xu, K., Eds.; Springer: Singapore, 2020; pp. 15–27. [Google Scholar]
- Chi, J.; Li, Y.; Huang, J.; Liu, J.; Jin, Y.; Chen, C.; Qiu, T. A secure and efficient data sharing scheme based on blockchain in industrial Internet of Things. J. Netw. Comput. Appl. 2020, 167, 102710. [Google Scholar] [CrossRef]
- Xuan, S.; Zheng, L.; Chung, I.; Wang, W.; Man, D.; Du, X.; Yang, W.; Guizani, M. An incentive mechanism for data sharing based on blockchain with smart contracts. Comput. Electr. Eng. 2020, 83, 106587. [Google Scholar] [CrossRef]
- Al-Zahrani, F.A. Subscription-Based Data-Sharing Model Using Blockchain and Data as a Service. IEEE Access 2020, 8, 115966–115981. [Google Scholar] [CrossRef]
- Wei, Q.; Shen, Z. Improving Blockchain Scalability from Storage Perspective. In Proceedings of the ACM Turing Award Celebration Conference—China 2023, Wuhan, China, 28–30 July 2023; pp. 112–113. [Google Scholar]
- Xu, C.; Zhang, C.; Xu, J.; Pei, J. SlimChain: Scaling blockchain transactions through off-chain storage and parallel processing. Proc. VLDB Endow. 2021, 14, 2314–2326. [Google Scholar] [CrossRef]
- Wang, K.; Yan, Y.; Guo, S.; Wei, X.; Shao, S. On-Chain and Off-Chain Collaborative Management System Based on Consortium Blockchain. In Proceedings of the Advances in Artificial Intelligence and Security, Cham, Switzerland, 19–23 July 2021; pp. 172–187. [Google Scholar]
- Mansouri, Y.; Toosi, A.N.; Buyya, R. Data Storage Management in Cloud Environments: Taxonomy, Survey, and Future Directions. ACM Comput. Surv. 2017, 50, 91. [Google Scholar] [CrossRef]
- Popovic, K.; Hocenski, Z. Cloud Computing Security Issues and Challenges; IEEE: Piscataway, NJ, USA, 2010; pp. 344–349. [Google Scholar]
- Ren, K.; Wang, C.; Wang, Q. Security Challenges for the Public Cloud. EEE Internet Comput. 2012, 16, 69–73. [Google Scholar] [CrossRef]
- Kotha, S.K.; Rani, M.S.; Subedi, B.; Chunduru, A.; Karrothu, A.; Neupane, B.; Sathishkumar, V.E. A Comprehensive Review on Secure Data Sharing in Cloud Environment. Wirel. Pers. Commun. 2022, 127, 2161–2188. [Google Scholar] [CrossRef]
- Song, C.; Park, Y.; Gao, J.; Nanduri, S.K.; Zegers, W. Favored Encryption Techniques for Cloud Storage. In Proceedings of the 2015 IEEE First International Conference on Big Data Computing Service and Applications, Redwood City, CA, USA, 30 March–2 April 2015; pp. 267–274. [Google Scholar]
- Gai, K.; She, Y.; Zhu, L.; Choo, K.-K.R.; Wan, Z. A Blockchain-Based Access Control Scheme for Zero Trust Cross—Organizational Data Sharing. ACM Trans. Internet Technol. 2023, 23, 38. [Google Scholar] [CrossRef]
- Xu, H.; He, Q.; Li, X.; Jiang, B.; Qin, K. BDSS-FA: A Blockchain-Based Data Security Sharing Platform With Fine-Grained Access Control. IEEE Access 2020, 8, 87552–87561. [Google Scholar] [CrossRef]
- Yang, Y.; Zhu, H.; Lu, H.; Weng, J.; Zhang, Y.; Choo, K.-K.R. Cloud based data sharing with fine-grained proxy re-encryption. Pervasive Mob. Comput. 2016, 28, 122–134. [Google Scholar] [CrossRef]
- Qin, Z.; Xiong, H.; Wu, S.; Batamuliza, J. A Survey of Proxy Re-Encryption for Secure Data Sharing in Cloud Computing. IEEE Trans. Serv. Comput. 2016, 1. [Google Scholar] [CrossRef]
- Zhu, L.; Song, S.; Peng, S.; Wang, W.; Hu, S.; Lan, W. The Blockchain and Homomorphic Encryption Data Sharing Method in Privacy-Preserving Computing. In Proceedings of the 2022 IEEE/ACIS 7th International Conference on Big Data, Cloud Computing, and Data Science (BCD), Danang, Vietnam, 4–6 August 2022; pp. 84–87. [Google Scholar]
- Li, R.; Song, T.; Mei, B.; Li, H.; Cheng, X.; Sun, L. Blockchain for Large-Scale Internet of Things Data Storage and Protection. IEEE Trans. Serv. Comput. 2019, 12, 762–771. [Google Scholar] [CrossRef]
- Salim, A.; Tiwari, R.K.; Tripathi, S. An Efficient Public Auditing Scheme for Cloud Storage with Secure Access Control and Resistance Against DOS Attack by Iniquitous TPA. Wirel. Pers. Commun. 2021, 117, 2929–2954. [Google Scholar] [CrossRef]
- Li, B.; Wu, H.; He, X.; Wang, B.; Xu, E. Survey of Storage Scalability in Blockchain Systems. Comput. Sci. 2023, 50, 318–333. [Google Scholar]
- Zhu, L.; Gao, F.; Shen, M.; Li, Y.; Zheng, B.; Mao, H.; Wu, Z. Survey on privacy preserving techniques for blockchain technology. J. Comput. Res. Dev. 2017, 54, 2170–2186. [Google Scholar]
- Hammoud, O.; Tarkhanov, I.A. A Novel Blockchain-Integrated Distributed Data Storage Model with Built-in Load Balancing. In Proceedings of the 2022 IEEE 16th International Conference on Application of Information and Communication Technologies (AICT), Washington, DC, USA, 12–14 October 2022; pp. 1–6. [Google Scholar]
- Asante, G.; Ben, J.; Asante, M.; Dagadu, J. A Symmetric, Probabilistic, Non-Circuit Based Fully Homomorphic Encryption Scheme. Int. J. Comput. Netw. Appl. 2022, 9, 160–168. [Google Scholar] [CrossRef]
- Paillier, P. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In Proceedings of the Advances in Cryptology—EUROCRYPT ’99, Berlin, Heidelberg, 2–6 May 1999; pp. 223–238. [Google Scholar]
- ISO/IEC 18033-6:2019; IT Security Techniques—Encryption Algorithms—Part 6: Homomorphic Encryption. ISO: Geneva, Switzerland, 2019.
- Martins, P.; Sousa, L.; Mariano, A. A Survey on Fully Homomorphic Encryption: An Engineering Perspective. ACM Comput. Surv. 2017, 50, 83. [Google Scholar] [CrossRef]
- Khedr, A.; Gulak, G. SecureMed: Secure Medical Computation Using GPU-Accelerated Homomorphic Encryption Scheme. IEEE J. Biomed. Health Inform. 2018, 22, 597–606. [Google Scholar] [CrossRef]
- Blaze, M.; Bleumer, G.; Strauss, M. Divertible protocols and atomic proxy cryptography. In Proceedings of the Advances in Cryptology—EUROCRYPT’98, Berlin, Heidelberg, 31 May–4 June 1998; pp. 127–144. [Google Scholar]
- Dalenius, T. Towards a methodology for statistical disclosure control. Stat. Tidskr. 1977, 15, 429–444. [Google Scholar]
- Spruill, N.L. The Confidentiality and Analytic Usefulness of Masked Business Microdata. 2002. Available online: http://www.asasrms.org/Proceedings/papers/1983_114.pdf (accessed on 3 May 2024).
- Dwork, C. Differential Privacy. In Encyclopedia of Cryptography and Security; van Tilborg, H.C.A., Jajodia, S., Eds.; Springer US: Boston, MA, USA, 2011; pp. 338–340. [Google Scholar]
- Nakamoto, S. Bitcoin: A Peer-to-Peer Electronic Cash System. Bitcoin 2008, 4, 15. Available online: https://bitcoin.org/bitcoin.pdf (accessed on 3 May 2024).
- Stoica, I.; Morris, R.; Karger, D.; Kaashoek, M.F.; Balakrishnan, H. Chord: A scalable peer-to-peer lookup service for internet applications. SIGCOMM Comput. Commun. Rev. 2001, 31, 149–160. [Google Scholar] [CrossRef]
- Ratnasamy, S.; Francis, P.; Handley, M.; Karp, R.; Shenker, S. A scalable content-addressable network. SIGCOMM Comput. Commun. Rev. 2001, 31, 161–172. [Google Scholar] [CrossRef]
- Rowstron, A.; Druschel, P. Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems. In Proceedings of the Middleware 2001, Berlin, Heidelberg, 12–16 November 2001; pp. 329–350. [Google Scholar]
- Zhao, B.Y.; Kubiatowicz, J.D.; Joseph, A.D. Tapestry: An Infrastructure for Fault-tolerant Wide-Area Location and Routing; University of California at Berkeley: Berkeley, CA, USA, 2001. [Google Scholar]
- Raj, T.F.M.; Vallathan, G.; Perumal, E.; Sudhakar, P.A.J. Future and Research Perspectives of Spatiotemporal Data Management Methods. In Spatiotemporal Data Analytics and Modeling: Techniques and Applications; A, J., Abimannan, S., El-Alfy, E.S.M., Chang, Y.S., Eds.; Springer Nature Singapore: Singapore, 2024; pp. 235–245. [Google Scholar]
- Samanthula, B.K.; Howser, G.; Elmehdwi, Y.; Madria, S. An efficient and secure data sharing framework using homomorphic encryption in the cloud. In Proceedings of the 1st International Workshop on Cloud Intelligence, Istanbul, Turkey, 31 August 2012. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Li, W.; Tse, W.K.; Chen, J. Privacy and Security Mechanisms for B2B Data Sharing: A Conceptual Framework. Information 2024, 15, 308. https://doi.org/10.3390/info15060308
Li W, Tse WK, Chen J. Privacy and Security Mechanisms for B2B Data Sharing: A Conceptual Framework. Information. 2024; 15(6):308. https://doi.org/10.3390/info15060308
Chicago/Turabian StyleLi, Wanying, Woon Kwan Tse, and Jiaqi Chen. 2024. "Privacy and Security Mechanisms for B2B Data Sharing: A Conceptual Framework" Information 15, no. 6: 308. https://doi.org/10.3390/info15060308
APA StyleLi, W., Tse, W. K., & Chen, J. (2024). Privacy and Security Mechanisms for B2B Data Sharing: A Conceptual Framework. Information, 15(6), 308. https://doi.org/10.3390/info15060308