Petchain: Empowering User Privacy in the Era of Smart Devices and Data Exploitation
Authors/Creators
- 1. Department of Computer Science and Engineering, Jawaharlal Nehru Technological University, Hyderabad (Telangana), India.
Description
Abstract: With additional shrewd devices and sensors, enormous volumes of information are made. Various administrations use information from unified cloud frameworks. Many specialist coops give extra highlights and administrations, accordingly the information is critical. Individual and touchy client information can be taken advantage of in various ways. An endorser can't confirm that their specialist organization observes information security regulations. While safeguarding security, anonymization and differential protection hinder information handiness. Subsequently, a reasonable arrangement that lets specialist organizations access client information while safeguarding security is required. PETchain, a blockchain-smartcontract security upgrade framework, is introduced in this review. Information is safely conveyed and handled in a client chose confided in execution climate in PETchain. Users execute a smartcontract to choose how specialist organizations can utilize their information. Carrying out PETchain on a consortium Ethereum blockchain shows its reasonableness and execution.
Files
F819113060325.pdf
Files
(449.1 kB)
| Name | Size | Download all |
|---|---|---|
|
md5:bd599734176db6a45294881b39c5602b
|
449.1 kB | Preview Download |
Additional details
Identifiers
- DOI
- 10.35940/ijies.F8191.12030325
- EISSN
- 2319-9598
Dates
- Accepted
-
2025-03-15Manuscript received on 24 February 2024 | First Revised Manuscript received on 10 February 2025 | Second Revised Manuscript received on 28 February 2025 | Manuscript Accepted on 15 March 2025 | Manuscript published on 30 March 2025.
References
- S. Cha, T. Hsu, Y. Xiang, and K. Yeh, "Privacy enhancing technologies in the internet of things: Perspectives and challenges," IEEE Internet of Things Journal, vol. 6, no. 2, pp. 2159–2187, 2019. DOI: https://doi.org/10.1109/JIOT.2018.2878658
- P. Voigt and A. Von dem Bussche, "The eu general data protection regulation (gdpr)," A Practical Guide, 1st Ed., Cham: Springer International Publishing, 2017. DOI: http://dx.doi.org/10.1007/978-3- 319-57959-7
- H. Zhou and G. Wornell, "Efficient homomorphic encryption on integer vectors and its applications," in 2014 Information Theory and Applications Workshop (ITA), 2014, pp. 1–9. DOI: https://doi.org/10.1007/s10207-019-00427-0
- L. Sweeney, "K-anonymity: A model for protecting privacy," Int. J. Uncertain. Fuzziness Knowl.-Based Syst., vol. 10, no. 5, p. 557–570, Oct. 2002. [Online]. Available: DOI: https://doi.org/10.1142/S0218488502001648
- "DIN ISO 4997:2020-04, Privacy by Blockchain Design: A standardised model for processing personal data using blockchain technology." [Online]. Available: https://www.beuth.de/de/technische-regel/dinspec-4997/321277504
- Y. Yang, L. Wu, G. Yin, L. Li, and H. Zhao, "A survey on security and privacy issues in internet-of-things," IEEE Internet of Things Journal, vol. 4, no. 5, pp. 1250–1258, 2017. DOI: https://doi.org/10.1109/JIOT.2017.2694844
- A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam, "Ldiversity: privacy beyond k-anonymity," in 22nd International Conference on Data Engineering (ICDE'06), 2006, pp. 24–24. DOI: https://doi.org/10.22067/cke.2023.63240.0
- N. Li, T. Li, and S. Venkatasubramanian, "t-closeness: Privacy beyond kanonymity and l-diversity," in 2007 IEEE 23rd International Conference on Data Engineering, 2007, pp. 106–115. https://www.cs.purdue.edu/homes/ninghui/papers/t_closeness_icde07.p df
- A. el-ela Abdou Hussien, N. Hamza, and H. A. Hefny, "Attacks on anonymization-based privacy-preserving: A survey for data mining and data publishing," Journal of Information Security, vol. 4, pp. 101–112, 2013. DOI: http://dx.doi.org/10.4236/jis.2013.42012
- B. Jeon, S. M. Ferdous, M. R. Rahman, and A. Walid, "Privacypreserving decentralized aggregation for federated learning," 2020. DOI: https://doi.org/10.1109/INFOCOMWKSHPS51825.2021.9484437
- C. Dwork, A. Roth et al., "The algorithmic foundations of differential privacy," Foundations and Trends® in Theoretical Computer Science, vol. 9, no. 3–4, pp. 211–407, 2014. https://www.cis.upenn.edu/~aaroth/Papers/privacybook.pdf
- M. U. Hassan, M. H. Rehmani, and J. Chen, "Differential privacy in blockchain technology: A futuristic approach," 2019. DOI: https://doi.org/10.1109/COMST.2019.2944748
- Kuriakose, N., & Midhunchakkaravarthy, Dr. D. (2022). A Review on IoT Blockchain Technology. In Indian Journal of Data Communication and Networking (Vol. 3, Issue 1, pp. 1–5). DOI: https://doi.org/10.54105/ijdcn.f3719.123122
- Mariappan, S. (2019). Blockchain Technology: Disrupting The Current Business and Governance Model. In International Journal of Recent Technology and Engineering (IJRTE) (Vol. 8, Issue 3, pp. 6285–6292). DOI: https://doi.org/10.35940/ijrte.c5905.098319
- P. Chinnasamy, P. Deepalakshmi, V. Praveena, K. Rajakumari, P. Hamsagayathri, Blockchain Technology: A Step Towards Sustainable Development. (2019). In International Journal of Innovative Technology and Exploring Engineering (Vol. 9, Issue 2S2, pp. 1034–1040). DOI: https://doi.org/10.35940/ijitee.b1109.1292s219
- Jain, N. (2019). Security Issues in Blockchain based Applications. In International Journal of Engineering and Advanced Technology (Vol. 8, Issue 6s3, pp. 890–896). DOI: https://doi.org/10.35940/ijeat.f1157.0986s319
- Mukati, A. (2023). Blockchain Technology In Healthcare Services. In Indian Journal of Cryptography and Network Security (Vol. 3, Issue 1, pp. 9–15). DOI: https://doi.org/10.54105/ijcns.d4090.053123