A Privacy Protection Method of Lightweight Nodes in Blockchain

نویسندگان

چکیده

Aiming at the privacy protection of lightweight nodes based on Bloom filters in blockchain, this paper proposes a new method. Considering superimposition effect query information, node and filter are regarded as two parties game. A mechanism mixed strategy Nash equilibrium is proposed to judge information query. On basis, algorithm when probability privacy, not being leaked, less than protection. It variable factor disturbance, adjusting number bits’ set 1 improve performance different scenarios. The experiment uses Bitcoin transaction data from 2009 2019 test verify effectiveness, reliability, superiority

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

LSB: A Lightweight Scalable BlockChain for IoT Security and Privacy

BlockChain (BC) has attracted tremendous attention due to its immutable nature and the associated security and privacy benefits. BC has the potential to overcome security and privacy challenges of Internet of Things (IoT). However, BC is computationally expensive, has limited scalability and incurs significant bandwidth overheads and delays which are not suited to the IoT context. We propose a ...

متن کامل

Lightweight Delegated Subset Test with Privacy Protection

Delegated subset tests are mandatory in many applications, such as content-based networks and outsourced text retrieval, where an untrusted server evaluates the degree of matching between two data sets. We design a novel scheme to protect the privacy of the data sets in comparison against the untrusted server, with half of the computation cost and half of the ciphertext size of existing solutio...

متن کامل

Efficient Public Blockchain Client for Lightweight Users

Public blockchains provide a decentralized method for storing transaction data and have many applications in different sectors. In order for users to track transactions, a simple method is to let them keep a local copy of the entire public ledger. Since the size of the ledger keeps growing, this method becomes increasingly less practical, especially for lightweight users such as IoT devices and...

متن کامل

Blockchain Enabled Privacy Audit Logs

Privacy audit logs are used to capture the actions of participants in a data sharing environment in order for auditors to check compliance with privacy policies. However, collusion may occur between the auditors and participants to obfuscate actions that should be recorded in the audit logs. In this paper, we propose a Linked Data based method of utilizing blockchain technology to create tamper...

متن کامل

Poster: Towards Blockchain Transaction Privacy

Blockchains allow users to transfer money securely to possibly unknown and untrusted counterparties, without requiring a trusted intermediary. Transactions contain the value being transferred, and sender and recipient identifiers (known as addresses) in the clear, meaning that although onchain addresses are unlinked from off-chain identities, monetary movements are easily traceable. We explore ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Security and Communication Networks

سال: 2021

ISSN: ['1939-0122', '1939-0114']

DOI: https://doi.org/10.1155/2021/2067137