Personal Credit Information Privacy Protection Based on Homomorphic Encryption Algorithm

AUTHORS

Nazlie Shahmir, School of Information Technology, Deakin University, Geelong, Australia
Nasim Muhammad, School of Information Technology, Deakin University, Geelong, Australia

ABSTRACT

With the continuous development of information technology, the construction of digital government is also accelerating. In the construction of digital government, smart contracts and homomorphic encryption technology of blockchain are combined. Based on the smart contract technology of the blockchain, this paper proposes a personal credit reporting privacy protection plan, which specifically includes the credit reporting system model and smart contract design. At the same time, it analyzes the specific operations such as adding access nodes and setting node permissions involved in this project. Through multi-party protection of personal privacy of credit investigation, automatic matching of user conditions for credit investigation access is realized. Since the solution in this article involves many contracts, we will further optimize the overall operating efficiency of the solution by strengthening the privacy protection during the message transfer process and improving the execution efficiency of the homomorphic encryption algorithm.

 

KEYWORDS

Blockchain, Smart contract, Paillier homomorphic encryption algorithm, Personal credit information, Privacy protection

REFERENCES

[1] N. Loubere and S. Brehm “China's dystopian social credit system is a harbinger of the global age of the algorithm, (2018)
[2] H. Abdullah “A structural and navigational method for integrated organizational information privacy protection, pp. 1-9, (2018)
[3] Mubashar, Khan, Amer, “Permutation-based special linear transforms with application in quantum image encryption algorithm,” Quantum Information Processing, vol.18, no.10, pp.298, (2019)
[4] J. M. Abowd and I. M. Schmutte, “An economic analysis of privacy protection and statistical accuracy as social choices,” Working Papers, (2018)
[5] D. Mashima, A. Serikova, and Y. Cheng, “Towards quantitative evaluation of privacy protection schemes for electricity usage data sharing,” ICT Express, vol.4, no.1, pp.35-41, (2018)
[6] J. M. Zeevi, “DNA is different: An exploration of the current inadequacies of genetic privacy protection in recreational DNA databases,” St. John's Law Review, pp.93, (2019)
[7] F. Hawlitschek, B. Notheisen, and T. Teubner, “The limits of trust-free systems: A literature review on blockchain technology and trust in the sharing economy,” Electronic Commerce Research and Applications, pp.29, (2018)
[8] P. Vasant, I. Zelinka, and G. W. Weber, “Blockchain technology in smart city: A new opportunity for smart environment and smart mobility,” Advances in Intelligent Systems and Computing, Intelligent Computing & Optimization, vol.866, no.36, pp.346-354, (2019) DOI: 10.1007/978-3-030-00979-3
[9] V. Shaherov, “Features of the formation of the soviet credit system in Irkutsk province during the period of new economic policy, (2019)
[10] Z. Оleksii, S. Zorya, and I. Salohub, “The necessity and importance of state regulation of credit system in agricultural production,” Black Sea Economic Studies, no.48, (2019)
[11] D. K. Boyle, M. Baernholdt, and J. M. Adams, “Improve nurses' well-being and joy in work: Implement true interprofessional teams and address electronic health record usability issues,” Nursing Outlook, vol.67, no.6, pp.791-797. (2019)
[12] L. Harrington, “Electronic health record–related events in medical malpractice claims: User error versus use error,” Journal of Patient Safety, pp.15, (2019)
[13] S. Billah, “SoK: Research perspectives and challenges for bitcoin and cryptocurrencies,” IEEE Computer Society, (2015)
[14] Scheuermann, Bjoern, Tschorsch, “Bitcoin and beyond: A technical survey on decentralized digital currencies,” Communications Surveys and Tutorials, (2016)
[15] R. Pass, L. Seeman, and A. Shelat, “Analysis of the blockchain protocol in asynchronous networks,” Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques, Berlin, Germany: Springer, pp.643-673, (2017)
[16] I. Bentov, C. Lee, A. Mizrahi, “Proof of activity: Extending bitcoin’s proof of work via proof of stake,” ACM SIGMETRICS, Performance Evaluation Review, vol.42, no.3, pp.452-458, (2014)
[17] C. Badertscher, P. Gazi, and A. Kiayias, “Ouroboros genesis: composable proof-of-stake blockchains with dynamic availability,” Proceedings of 2018 ACMSIGSAC Conference on Computer and Communications Security. New York,USA: ACM Press, pp.913-930, (2018)
[18] T. Duong, L. Fan, and H. S. Zhou, “2-hop blockchain: Combining proof-of-work and proof-of-stake securely,” [2019-12-11], https: / /eprint. Iacr. Org /2016 /716
[19] A. Kiayias, A. Russel, and B. David, “Ouroboros: A provably secure proof-of-stake blockchain protocol,” Proceedings of Annual International Cryptology Conference, Berlin, Germany: Springer, pp.357-388, (2017)
[20] A. Chepurnoy, T. Duong, and L. Fan, “Twin’s coin: A cryptocurrency via proof-of-work and proof-of-stake [EB /OL], [2019-12-11], https: / /www. Chain news. Com /zh-hant /papers /158251978824. Htm
[21] S. Dziembowski, S. Faust, and V. Lolmogorov, “Proofs of space,” Proceedings of Annual Cryptology Conference. Berlin, Germany: Springer, pp.585-605, (2015)
[22] M. Milutinovic, W. He, and H. Wu, “Proof of luck: An efficient blockchain consensus protocol,” Proceedings of the 1st Workshop on System Software for Trusted Execution, New York,USA: ACM Press, pp.2-12, (2016)
[23] L. Chen, L. Xu, N. Shan, “On security analysis of proof-of-elapsed-time (POET),” Proceedings of International Symposium on Stabilization, Safety, and Security of Distributed Systems. Berlin, Germany: Springer, pp.282-297, (2017)
[24] D. Larimer, “Delegated proof-of-stake (DPOS) whitepaper,” [EB /OL], [2019-12-11], https://bit shares talk. Org /index. Php? Topic = 4009. 60
[25] F. Zhang, I. Eyal, and R. Escriva, “REM: Resource efficient mining for blockchains,” Proceedings of the 26th USENIX Security Symposium, Vancouver, Canada; USENIX, pp.1427-1444, (2017)
[26] T. Lobban, “Quorum chain consensus,” [EB /OL], [2019-12-11], https://github.Com/jpmorganchase/quorum/wiki/QuoQuorumCh-Consensus
[27] V. Buterin, “A next-generation smart contract and decentralized application plat form,” [EB/OL], [2019-12-11]. https://www.Mendeley.Com/catalog/nextgeneration-smartcontract-decentralized-application-platform/
[28] N. Szabo, “Formalizing and securing relationships on public networks [EB/OL], [2019-12-11], http://www.First monday.org/ojs/index.Php/fm/article/view/548/469
[29] R. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Communications of the ACM, vol.21, no.2, pp.120-126, (1978)
[30] P. Paillier, “Public-key cryptosystems based on composite degree residuality classes,” Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques, Berlin, Germany: Springer, pp.223-238, (1999)

CITATION

  • APA:
    Shahmir,N.& Muhammad,N.(2020). Personal Credit Information Privacy Protection Based on Homomorphic Encryption Algorithm. International Journal of Smart Business and Technology, 8(1), 1-10. 10.21742/IJSBT.2020.8.1.01
  • Harvard:
    Shahmir,N., Muhammad,N.(2020). "Personal Credit Information Privacy Protection Based on Homomorphic Encryption Algorithm". International Journal of Smart Business and Technology, 8(1), pp.1-10. doi:10.21742/IJSBT.2020.8.1.01
  • IEEE:
    [1] N.Shahmir, N.Muhammad "Personal Credit Information Privacy Protection Based on Homomorphic Encryption Algorithm". International Journal of Smart Business and Technology, vol.8, no.1, pp.1-10, Mar. 2020
  • MLA:
    Shahmir Nazlie and Muhammad Nasim. "Personal Credit Information Privacy Protection Based on Homomorphic Encryption Algorithm". International Journal of Smart Business and Technology, vol.8, no.1, Mar. 2020, pp.1-10, doi:10.21742/IJSBT.2020.8.1.01

ISSUE INFO

  • Volume 8, No. 1, 2020
  • ISSN(p):2288-8969
  • ISSN(e):2207-516X
  • Published:Mar. 2020

DOWNLOAD