Abstract
As a distributed general ledger technology, a basic platform of smart contract, and a new distributed computing paradigm, blockchain is bound to have an impact on the development of all walks of life, and drive a new round of technology and application changes. To have an impact on the development of all walks of life and drive a new round of technology and application changes, blockchain technology improves efficiency, reduces costs, and enhances data security. However, it also faces serious information security problems. However, while block technology improves efficiency, reducing costs and improving data security, block technology also faces serious information privacy leakage problems. promote the research, development and application of blockchain in information privacy protection. This paper uses the literature analysis method to analyze the advantages and disadvantages of the blockchain in the information privacy protection from the aspects of the blockchain privacy protection This paper uses the literature analysis method to analyze the advantages and disadvantages of the blockchain in the information privacy protection from the aspects of the blockchain privacy protection , analyze the privacy leakage threat of the blockchain in the network layer, transaction layer and application layer, and summarizes the main technologies of the blockchain in the information privacy protection of data users.
Publisher
Darcy & Roy Press Co. Ltd.
Reference32 articles.
1. NAKAMOTO S. Bitcoin: a peer-to-peer electronic cash system [EB/OL]. [2017-08-21]. https://bitcoin.org/bitcoin.Pdf.
2. ZHANG Xian, JIANG Yuzhao, YAN Ying. a glimpse at blockchain: from the perspective of privacy [T]. Journal of Information Security Research, 2017, 3 (11) :981-89.
3. Dash. dash is digital cash [EB/OL]. [2019-12-01]. https:// www. dash.Org/.
4. PAILLISSE J, SUBIRA J, LOPEZ A, et al. Distributed access control with blockchain [C]// ICC 2019-2019 IEEE International Conferenceon Communications (ICC). Shanghai: ieee, 2019: 1-6.
5. XU J, WEI L W, ZHANG Y, et al. Dynamic fully homomorphic encryption-based Merkle tree for lightweight streaming authenticated data structures[J]. Journal of Network and Computer Applications, 2018, 107:113-124.