Author: |
Denny Gozali Purnomo Denny Gozali Purnomo |
---|---|
Thesis Title: |
Private Data Sharing Platform Using Ciphertext-Policy Attribute-Based Encryption with Blockchain Network Private Data Sharing Platform Using Ciphertext-Policy Attribute-Based Encryption with Blockchain Network |
Advisor: |
羅乃維
Nai-Wei Lo |
Committee: |
楊傳凱
Chuan-Kai Yang 查士朝 Shi-Cho Cha |
Degree: |
碩士 Master |
Department: |
管理學院 - 資訊管理系 Department of Information Management |
Thesis Publication Year: | 2019 |
Graduation Academic Year: | 107 |
Language: | 英文 |
Pages: | 65 |
Keywords (in Chinese): | Private Data 、Buying-Selling Platform 、Ciphertext-Policy Attribute-Based Encryption 、Cloud Storage 、Blockchain |
Keywords (in other languages): | Private Data, Buying-Selling Platform, Ciphertext-Policy Attribute-Based Encryption, Cloud Storage, Blockchain |
Reference times: | Clicks: 566 Downloads: 10 |
Share: |
School Collection Retrieve National Library Collection Retrieve Error Report |
In these several years, the knowledge finding from big data keeps growing. Big companies or organization try to get an accurate prediction for their customer or targeted customer. The privacy of customer can be abused by the companies and also not get another benefit from the data that already provided to companies. In this thesis, we propose a private data buying-selling platform that not only secure but also can protect the user's identity. Utilizing ciphertext-policy attribute-based encryption for securing private data. Also uses a blockchain framework to create anonymity of user and securing transaction using a decentralized method. Moreover, our proposed platform is also proven to be secure and could withstand some well-known attacks.
In these several years, the knowledge finding from big data keeps growing. Big companies or organization try to get an accurate prediction for their customer or targeted customer. The privacy of customer can be abused by the companies and also not get another benefit from the data that already provided to companies. In this thesis, we propose a private data buying-selling platform that not only secure but also can protect the user's identity. Utilizing ciphertext-policy attribute-based encryption for securing private data. Also uses a blockchain framework to create anonymity of user and securing transaction using a decentralized method. Moreover, our proposed platform is also proven to be secure and could withstand some well-known attacks.
[1] R. L. Rivest, “Cryptography,” in Handbook of Theoretical Computer Science (Vol. A), pp. 717–755, 1990.
[2] P. Mell and T. Grance, “On-demand self-service.,” Nist, vol. 15, pp. 10–15, 2009.
[3] A. S. Horvath and R. Agrawal, “Trust in cloud computing: A user’s perspective,” Conference Proceedings - IEEE SOUTHEASTCON, vol. 2015-June, no. June, pp. 1–8, 2015.
[4] S. Nakamoto, “Bitcoin: a peer-to-peer electronic cash system.” \url{https://bitcoin.org/bitcoin.pdf}.
[5] A. Back, “Hashcash - A Denial of Service Counter-Measure,”
[6] J. Chase, R. Kaewpuang, W. Yonggang, and D. Niyato, “Joint virtual machine and bandwidth allocation in software defined network (SDN) and cloud computing environments,” 2014 IEEE International Conference on Communications, ICC 2014, pp. 2969–2974, 2014.
[7] M. Lakshmi Neelima and M. Padma, “a Study on Cloud Storage,” International Journal of Computer Science and Mobile Computing, vol. 35, no. 5, pp. 966–971, 2014.
[8] A. Sahai and B. Waters, “Fuzzy Identity-Based Encryption,” pp. 457–473, 2004.
[9] A. Shamir, “Identity-based cryptosystems and signature schemes,” In Proceedings of CRYPTO 84 on Advances in cryptology, pp. 47–53, 1985.
[10] V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grained access control of encrypted data,” p. 89, 2007.
[11] J. Bethencourt and B. Waters, “Ciphertext-Policy Attribute-Based Encryption,” 2007.
[12] F. Guo, Y. Mu, W. Susilo, D. S. Wong, and V. Varadharajan, “CP-ABE with constant-size keys for lightweight devices,” IEEE Transactions on Information Forensics and Security, vol. 9, no. 5, pp. 763–771, 2014.
[13] X. Zheng, R. R. Mukkamala, R. Vatrapu, and J. Ordieres-Mere, “Blockchain-based personal health data sharing system using cloud storage,” 2018 IEEE 20th International Conference on e-Health Networking, Applications and Services, Healthcom 2018, 2018.
[14] A. Azaria, A. Ekblaw, T. Vieira, and A. Lippman, “MedRec: Using blockchain for medical data access and permission management,” Proceedings - 2016 2nd International Conference on Open and Big Data, OBD 2016, pp. 25–30, 2016.
[15] Q. Xia, E. B. Sifah, K. O. Asamoah, J. Gao, X. Du, and M. Guizani, “MeDShare: Trust-Less Medical Data Sharing among Cloud Service Providers via Blockchain,” IEEE Access, vol. 5, pp. 14757–14767, 2017.
[16] J. L. Raisaro, J. Troncoso-Pastoriza, M. Misbach, J. Sa Sousa, S. Pradervand, E. Missiaglia, O. Michielin, B. Ford, and J. P. Hubaux, “MedCo: Enabling Secure and Privacy-Preserving Exploration of Distributed Clinical and Genomic Data,” IEEE/ACM Transactions on Computational Biology and Bioinformatics, vol. 5963, no. c, pp. 1–14, 2018.
[17] U.S. Department of Health & Human Services, “The health insurance portability and accountability act (hipaa).” https://www.hhs.gov/hipaa/index.html. [Online; accessed 25-July-2019].
[18] EU Parlament, “The EU General Data Protection Regulation (GDPR).” https://www.hhs.gov/hipaa/index.html. [Online; accessed 25-July-2019].