Open Access
Subscription Access
Private Data Protection in Social Networks Based on Blockchain
With the rapid development of big data and social networks, user data in social networks are facing huge risks of privacy leakage. It is urgent to establish a complete and effective method for protecting private data in social networks. Based on the problem of information leakage in social networks, classifies user privacy data, and constructs different privacy data protection schemes through blockchain time stamp recording data storage, hash function anonymous operation of data, asymmetric encryption and digital signature of sending information. The blockchain-based privacy data protection method in social networks can effectively solve the privacy leakage problem in social networks, and provide a reference for the research in the field of information security and social network security. This paper designs a new blockchain-based privacy data protection scheme for different privacy disclosure categories, which provides a new solution to the current privacy disclosure problem in social networks. However, the existing methods will consume a lot of computational power in the process of information interaction. The subsequent research will optimize the computational power of blockchain and try to build a better blockchain social network privacy data protection system.
Keywords
Blockchain, Social network, Privacy protection.
User
Font Size
Information
- K. Khan, W.Goodridge, ‘A survey of network-based security attacks’. International Journalof Advanced Networking and Applications, 2019,10(5): 3981-3989.
- P. S. Wang, and Z. C. Wang, ‘Research on privacy protection strategies of mobile social network users’. International Journalof Advanced Networking and Applications, 2020,12(1): 4528-4531.
- P. S. Wang, Z. C. Wang, and T. Chen, ‘Personalized privacy protecting model in mobile social network’. Computers, Materials & Continua, 2019,59(2): 533-546.
- P. Zhu, J. Hu, and S.H. LV, ‘Blockchain-based privacy data protection in social networks’. Information Science, 2021,39(3):94-100.
- C. P. Hu, R. G. Qiu, and L. L. Wang, ‘Research on privacy protection of academic social network users: A case study of sciencenet blog’. Journal of Information Science,2019,38(7):667-674.
- R.X. Yao, and H. Li. Privacy protection in social networks. Journal of Network and Information Security,2016,2(4):33-43.
- G. Q. Jiang. ‘Privacy-preserving algorithms and its applications in MSNS’. China: Donghua University, 2016.
- H. Shen, M. Zhang, and H. Wang, ‘A lightweight privacy-preserving fair meeting location determination scheme’. IEEE Internet of Things Journal, 2020,7(4): 3083-3093.
- Z.Q. Feng, ‘Research on Problems of Network privacy under the age of big data: From protection of the rights to personal choice - A Case Study of mobile social networking users’. China: Jilin University, 2016.
- Y. Sun, ‘Survey of data privacy protection technology in social networks’. Information and Communications, 2019(1):180-181.
- S. Nakamoto, ‘Bitcoin: A peer-to-peer electronic cash system’. https://bitcoin.org/bitcoin.pdf,2020-03-01.
- Y. Yuan, and F.Y. Wang, ‘Development status and prospect of blockchain technology’. ActaAutomatica Sinica,2016,42(4):481-494.
- F.C. Kong,‘Construction and management of open access resources based on blockchain’. Information Theory and Practice,2019,(5):153-158.
- Y. J. Ren, Y.Leng, and F. J. Zhu, ‘Data storage mechanism based on blockchain with privacy protection in wireless body area network’. Sensors, 2019,19(10):2395-2406.
- L.S. Huang, M. M. Tian, and H. Huang, ‘Preserving privacy in big data: a survey from the cryptographic perspective’. Journal of software, 2015,26 (4): 946-952
Abstract Views: 133
PDF Views: 0