Archival Data Protection and Sharing Method Based on Blockchain
Author:
Affiliation:

Fund Project:

National Natural Science Foundation of China (61602435); Natural Science Foundation of Anhui (1708085QF153); Major Projects of Science and Technology of Anhui (16030901057)

  • Article
  • | |
  • Metrics
  • |
  • Reference [68]
  • |
  • Related
  • |
  • Cited by
  • | |
  • Comments
    Abstract:

    In view of the problems existing in the management of archival data, such as centralized data storage, poor security, and low tamper resistant modification, this study proposes an archival data protection and sharing method based on blockchain technology. The identification of digital archives and the determination of archives ownership have been achieved through smart contracts and digital signature technologies; digital archives files have been protected, verified, restored, and shared through technologies such as smart contracts and the interplanetary file system (IPFS); the economic cost have been reduced meanwhile data security could be guaranteed and data extendibility improved through the combination of permissioned and permissionless blockchains. Featuring the characteristics of decentralization, security, credibility, and tamper-resistant, this method is expected to promote the data storage way transformation in archives so as to meet the increasing demand for the protection and sharing of archival data.

    Reference
    [1] Zhao Z. Research and design of digital archive management system based on blockchain[M.S. Thesis]. Hefei:University of Science and Technology of China, 2018(in Chinese with English abstract).
    [2] He P, Yu Y, Zhang YF, Bao YK. Survey on blockchain technology and its application prospect. Computer Science, 2017,44(4):1-7(in Chinese with English abstract).[doi:10.11896/j.issn.1002-137X.2017.04.001]
    [3] Tschorsch F, Scheuermann B. Bitcoin and beyond:A technical survey on decentralized digital currencies. IEEE Communications Surveys & Tutorials, 2016,18(3):2084-2123.
    [4] Nakamoto S. Bitcoin:A peer-to-peer electronic cash system. 2009. https://bitcoin.org/bitcoin.pdf
    [5] Benet J. IPFS-Content addressed, versioned, P2P file system (DRAFT 3). https://raw.githubusercontent.com/ipfs/papers/master/ipfs-cap2pfs/ipfs-p2p-file-system.pdf
    [6] Wang DM. The theory and practice of the construction of digital archives in colleges and universities. Journal of Dongbei University of Finance and Economics, 2014,(6):85-88(in Chinese with English abstract).[doi:10.3969/j.issn.1008-4096.2014. 06.014]
    [7] Cheng YY. Analysis of Int'l digital archives construction and core operational mechanism. Archives & Construction, 2014,12:31-34(in Chinese with English abstract).
    [8] Cunningham A, Millar L, Reed B, Peter J. Scott and the Australian ‘Series’ system:Its origins, features, rationale, impact and continuing relevance. In:Proc. of the International Congress on Archives, 2013. 121-144.[doi:10.3828/comma.2013.1.13]
    [9] Shi ZW. Gradual progress and steady progress-On the construction of Shandong digital archives (room). Shandong Archives, 2013,3:10-11(in Chinese with English abstract).
    [10] Liu YJ. Research on the construction of digital archive office in China[MS. Thesis]. Hefei:Anhui University, 2017(in Chinese with English abstract).
    [11] Xiao M. Research on the construction of archives services utilization system under the big data environments[MS. Thesis]. Xiangtan:Xiangtan University, 2015(in Chinese with English abstract).
    [12] You SS. The research on the service of Fujian province digital archives information on the basic of cloud computing[MS. Thesis]. Fuzhou:Fujian Agriculture and Forestry University, 2016(in Chinese with English abstract).
    [13] Wang W. Design of file management system based on RFID and study of anti-collision algorithm[MS. Thesis]. Hangzhou:Hangzhou Dianzi University, 2017(in Chinese with English abstract).
    [14] Wang ZD. Precaution measures against archive frauds should be taken at basic levels. China Youth Daily, 20170526(in Chinese). http://zqb.cyol.com/html/2017-05/26/nw.D110000zgqnb_20170526_4-01.htm
    [15] Proof of existence-An online service to prove the existence of documents. 2018. https://docs.proofofexistence.com/
    [16] Merkle RC. A digital signature based on a conventional encryption function. In:Proc. of the Int'l Conf. on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology. Springer-Verlag, 1987. 369-378.
    [17] Verify a chainpoint proof directly using Bitcoin. 2017. https://runkit.com/tierion/verify-a-chainpoint-proof-directly-using-bitcoin
    [18] Azaria A, Ekblaw A, Vieira T, et al. MedRec:Using blockchain for medical data access and permission management. In:Proc. of the Int'l Conf. on Open and Big Data. IEEE, 2016. 25-30.[doi:10.1109/OBD.2016.11]
    [19] Tsai WT, Yu L, Wang R, Liu N, Deng EY. Blockchain application development techniques. Ruan Jian Xue Bao/Journal of Software, 2017,28(6):1474-1487(in Chinese with English abstract). http://www.jos.org.cn/1000-9825/5232.html[doi:10.13328/j. cnki.jos.005232]
    [20] Rifi N, Rachkidi E, Agoulmine N, et al. Towards using blockchain technology for IoT data access protection. In:Proc. of the Int'l Conf. on Ubiquitous Wireless Broadband. IEEE, 2018. 1-5.[doi:10.1109/ICUWB.2017.8251003]
    [21] Blockchain+public welfare, concept or trend. 2017. http://www.xinhuanet.com/gongyi/2016-12/21/c_129414848.htm
    [22] Baidu's ‘Wikipedia’ now logs revisions on a blockchain. 2018. https://www.coindesk.com/baidus-wikipedia-now-logs-revisions-on-a-blockchain
    [23] Xue TF, Fu CQ, Wang Z, Wang XY. A medical data sharing model via blockchain. Acta Automatica Sinica, 2017,43(9):1555-1562(in Chinese with English abstract).[doi:10.16383/j.aas.2017.c160661]
    [24] Zhang N, Zhong S. Mechanism of personal privacy protection based on blockchain. Journal of Computer Applications, 2017,37(10):2787-2793(in Chinese with English abstract).[doi:10.11772/j.issn.1001-9081.2017.10.2787]
    [25] Zhao H, Li XF, Zhan LQ, Wu ZC. Data integrity protection method for microorganism sampling robots based on blockchain technology. Journal of Huazhong University of Science and Technology (Natural Science Edition), 2015,43(s1):216-219(in Chinese with English abstract).[doi:10.13245/j.hust.15s1052]
    [26] Li XF, Zhao H, Li F, Tan HB, Sun YN, Liu B. Electronic document anti-tampering method. Chinese Patent ZL201410436231.7, 2014-08-29(in Chinese).
    [27] Zhao H, Zhu XY, Li XF, Tan HB, Wang WD, Zhang ZX, Lv B, Zhou T, Zhao Z, Wang L, Sheng NZ. A digital archives management method and system based on blockchain technology. Chinese Patent CN201711226383.4, 2017-11-29(in Chinese).
    [28] Sheng NZ, Li F, Li XF, Zhao H, Zhou T. Data capitalization method based on blockchain smart contract for internet of things. Journal of Zhejiang University (Engineering Science), 2018,52(11):1-10(in Chinese with English abstract).[doi:10.3785/j.issn. 1008-973X.2018.11.000].
    [29] On public and private blockchains. 2015. https://blog.ethereum.org/2015/08/07/on-public-and-private-blockchains/
    [30] Shao QF, Jin CQ, Zhang Z, Qan WN, Zhou AY. Blockchain:Architecture and research progress. Chinese Journal of Computers, 2018,41(5):969-988(in Chinese with English abstract).[doi:10.11897/SP.J.1016.2018.00969]
    [31] He YJ, Gong GC. Research on blockchain technology in security related fields of Internet of things. Telecom Engineering Technics and Standardization, 2017,30(5):12-16(in Chinese with English abstract).[doi:10.13992/j.cnki.tetas.2017.05.004]
    [32] King S, Nadal S. PPCoin:Peer-to-peer crypto-currency with proof-of-stake. 2012. https://peercoin.net/assets/paper/peercoin-paper.pdf
    [33] DPOs consensus algorithm-The missing white paper. 2016. https://steemit.com/dpos/@dantheman/dpos-consensus-algorithm-this-missing-white-paper
    [34] POA Network Whitepaper. 2018. https://github.com/poanetwork/wiki/wiki/POA-Network-Whitepaper
    [35] Proof of authority:Consensus model with identity at stake. https://medium.com/poa-network/proof-of-authority-consensus-model-with-identity-at-stake-d5bd15463256
    [36] Christidis K, Devetsikiotis M. Blockchains and smart contracts for the Internet of things. IEEE Access, 2016.[doi:10.1109/ACCESS.2016.2566339]
    [37] Cruz JP, Kaji Y, Yanai N. RBAC-SC:Role-based access control using smart contract. IEEE Access, 2018.[doi:10.1109/ACCESS. 2018.2812844]
    [38] Buterin V. A next-generation smart contract and decentralized application platform. 2014. https://github.com/ethereum/wiki/wiki/White-Paper.
    [39] Chen Y, Li H, Li K, et al. An improved P2P file system scheme based on IPFS and blockchain. In:Proc. of the Int'l Conf. on Big Data. IEEE, 2017. 2652-2657.[doi:10.1109/BigData.2017.8258226]
    [40] Experimental features of Go-IPFS. https://github.com/ipfs/go-ipfs/blob/master/docs/experimental-features.md#private-networks
    [41] Baumgart I, Mies S. S/Kademlia:A practicable approach towards secure key-based routing. In:Proc. of the 2007 Int'l Conf. on Parallel and Distributed Systems, Vol.2. IEEE, 2007. 1-8.[doi:10.1109/ICPADS.2007.4447808]
    [42] Cohen B. Incentives build robustness in Bittorrent. In:Proc. of the Workshop on Economics of Peer-to-Peer Systems, Vol.6. 2007. 68-72.
    [43] Johnson D, Menezes A, Vanstone S. The elliptic curve digital signature algorithm (ECDSA). Int'l Journal of Information Security, 2001,1(1):36-63.
    [44] Go ethereum. https://geth.ethereum.org/
    [45] IPFS documentation. https://docs.ipfs.io/
    [46] EthGasStation. https://ethgasstation.info/
    [47] Antonopoulos AM. Mastering Bitcoin:Unlocking Digital Cryptocurrencies. 1st ed. Sebastopol:O'Reilly Media, Inc., 2014. 174-177.
    附中文参考文献:
    [1] 赵哲.基于区块链的档案管理系统的研究与设计[硕士学位论文].合肥:中国科学技术大学,2018.
    [2] 何蒲,于戈,张岩峰,鲍玉凯.区块链技术与应用前瞻综述.计算机科学,2017,44(4):1-7.[doi:10.11896/j.issn.1002-137X.2017. 04.001]
    [6] 王冬梅.高校数字档案馆建设的理论与实践.东北财经大学学报,2014,(6):85-88.[doi:10.3969/j.issn.1008-4096.2014.06.014]
    [7] 程妍妍.国外数字档案馆建设及核心运行机制分析.档案与建设,2014,12:31-34.
    [9] 史志伟.循序渐进稳步进取——谈山东数字档案馆(室)建设.山东档案,2013,3:10-11.
    [10] 刘英俊.我国数字档案室建设研究[硕士学位论文].合肥:安徽大学,2017.
    [11] 肖敏.大数据环境下档案利用服务体系建设研究[硕士学位论文].湘潭:湘潭大学,2015.
    [12] 游姗姗.基于云计算的福建省数字档案馆信息服务研究[硕士学位论文].福州:福建农林大学,2016.
    [13] 王伟.基于RFID的档案管理系统设计及防碰撞算法研究[硕士学位论文].杭州:杭州电子科技大学,2017.
    [14] 王钟的.警惕档案造假要从基层抓起.中国青年报,20170526. http://zqb.cyol.com/html/2017-05/26/nw.D110000zgqnb_20170526_4-01.htm
    [19] 蔡维德,郁莲,王荣,刘娜,邓恩艳.基于区块链的应用系统开发方法研究.软件学报,2017,28(6):1474-1487. http://www.jos.org.cn/1000-9825/5232.html[doi:10.13328/j.cnki.jos.005232]
    [21] 区块链+公益,概念还是趋势.2017. http://www.xinhuanet.com/gongyi/2016-12/21/c_129414848.htm
    [23] 薛腾飞,傅群超,王枞,王新宴.基于区块链的医疗数据共享模型研究.自动化学报,2017,43(9):1555-1562.[doi:10.16383/j.aas. 2017.c160661]
    [24] 章宁,钟珊.基于区块链的个人隐私保护机制.计算机应用,2017,37(10):2787-2793.[doi:10.11772/j.issn.1001-9081.2017.10.2787]
    [25] 赵赫,李晓风,占礼葵,吴仲城.基于区块链技术的采样机器人数据保护方法.华中科技大学学报(自然科学版),2015,43(s1):216-219.[doi:10.13245/j.hust.15s1052]
    [26] 李晓风,赵赫,李芳,谭海波,孙怡宁,刘冰.一种电子文件防篡改方法.ZL201410436231.7[发明专利],2014-08-29.
    [27] 赵赫,朱晓煜,李晓风,谭海波,王卫东,张中贤,吕波,周桐,赵哲,王丽,盛念祖.一种基于区块链技术的数字档案管理方法及系统. CN201711226383.4[发明专利],2017-11-29.
    [28] 盛念祖,李芳,李晓风,赵赫,周桐.基于区块链智能合约的物联网数据资产化方法.浙江大学学报(工学版),2018,52(11):1-10.[doi:10.3785/j.issn.1008-973X.2018.11.000]
    [30] 邵奇峰,金澈清,张召,钱卫宁,周傲英.区块链技术:架构及进展.计算机学报,2018,(5):969-988.[doi:10.11897/SP.J.1016.2018. 00969]
    [31] 何渝君,龚国成.区块链技术在物联网安全相关领域的研究.电信工程技术与标准化,2017,(5):12-16.[doi:10.13992/j.cnki.tetas. 2017.05.004]
    Related
    Cited by
    Comments
    Comments
    分享到微博
    Submit
Get Citation

谭海波,周桐,赵赫,赵哲,王卫东,张中贤,盛念祖,李晓风.基于区块链的档案数据保护与共享方法.软件学报,2019,30(9):2620-2635

Copy
Share
Article Metrics
  • Abstract:6334
  • PDF: 10924
  • HTML: 4339
  • Cited by: 0
History
  • Received:June 05,2018
  • Revised:August 28,2018
  • Online: April 11,2019
You are the first2044074Visitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063