slower, and the maximum consumption of private
data sets is around 750s. It becomes increasingly
difficult to maintain software development databases
as the level of privacy is raised.
Figure 3: The relationship between the running time of the
encryption algorithm and the number of data attributes
It can be observed from Figure 3 that an
increasing number of attributes causes the encryption
algorithm to take longer to run, thereby increasing its
running time. The actual message can still be
decrypted within a shorter time period than the
scheme proposed in the literature as the literature
scheme encrypts not only the actual message, but also
a random message for verification, whereas this
scheme only encrypts the actual message. This paper
shows that the method is faster and more efficient,
because the number of information tuples increases
promptly, approximately 900 seconds are consumed
during the process. Our proposed method consumes
significantly less time than the comparison method as
the number of experiments increases. This solution
has been proven to be safe and efficient after rigorous
security analysis and performance analysis has been
performed.
5 CONCLUSIONS
A large amount of data is generated every second by
a wide variety of Internet-connected devices. The
privacy of users will be a major concern with this
data. People's private data will be increasingly
collected and processed, posing serious security and
privacy concerns. Security and privacy challenges are
exacerbated by several inherent deficiencies of the
blockchain network, including centralization is
lacking and heterogeneous equipment resources. A
major issue of the Internet is the security of data and
privacy of users, which inhibits the deployment of the
Internet on a large scale. As a result of the existing
data exchange platform, it is not easy for users and
enterprises to share their private data with one
another. A third-party platform is able to easily
backup and restore the most important data, and it
faces the threat of being mishandled by malicious
users or organizations after sharing the data, which
means the data owners lose the ownership of
important information, and face a difficult time
pursuing redress if the private information is
compromised. The purpose of this paper is to propose
methods to solve the problem of privacy data leakage
and the problem of data security in the process of
sharing data in traditional platforms using data
encryption and decryption, traceability authentication
and secure exchange functions. Also, it is to explore
and demonstrate a method for protecting private data
with trusted computing and blockchain technologies
that prevents the leakage of personal information due
to an unauthorized access by third parties, while also
guaranteeing the security of private data, thus
creating a stable basis for the protection of network
data.
ACKNOWLEDGEMENTS
This research is supported by the project funded by
Zhuhai Industry University Research Cooperation
and Basic and Applied Basic Research Project in
2020: Research on Key Technologies of Cross-
domain Data Compliance and Mutual Trust
Computing in Zhuhai and Macau (No.
ZH22017002200011PWC), in part by MOST-FDCT
Projects (0058/2019/AMJ,2019YFE0110300)
(Research and Application of Cooperative Multi-
Agent Platform for Zhuhai-Macao Manufacturing
Service), and in part by the National Natural Science
Foundation of China and Macao Science and
Technology Development Joint Fund
(0066/2019/AFJ).
Part of the material has been used in the article
(Zhu et al., 2021). This work adds many contents and
also modifies the shortcomings of the previous
version.
REFERENCES
Bahri, L., Carminati, B., & Ferrari, E. (2018). Decentralized
privacy preserving services for Online Social
Networks. Online Social Networks and Media, 6, 18–
25. https://doi.org/10.1016/j.osnem.2018.02.001