Petchain: Empowering User Privacy in the Era of Smart Devices and Data Exploitation
Main Article Content
Abstract
With additional shrewd devices and sensors, enormous volumes of information are made. Various administrations use information from unified cloud frameworks. Many specialist coops give extra highlights and administrations, accordingly the information is critical. Individual and touchy client information can be taken advantage of in various ways. An endorser can't confirm that their specialist organization observes information security regulations. While safeguarding security, anonymization and differential protection hinder information handiness. Subsequently, a reasonable arrangement that lets specialist organizations access client information while safeguarding security is required. PETchain, a blockchain-smartcontract security upgrade framework, is introduced in this review. Information is safely conveyed and handled in a client chose confided in execution climate in PETchain. Users execute a smartcontract to choose how specialist organizations can utilize their information. Carrying out PETchain on a consortium Ethereum blockchain shows its reasonableness and execution.
Downloads
Article Details
Section

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
How to Cite
References
S. Cha, T. Hsu, Y. Xiang, and K. Yeh, “Privacy enhancing technologies in the internet of things: Perspectives and challenges,” IEEE Internet of Things Journal, vol. 6, no. 2, pp. 2159–2187, 2019. DOI: https://doi.org/10.1109/JIOT.2018.2878658
P. Voigt and A. Von dem Bussche, “The eu general data protection regulation (gdpr),” A Practical Guide, 1st Ed., Cham: Springer International Publishing, 2017. DOI: http://dx.doi.org/10.1007/978-3-319-57959-7
H. Zhou and G. Wornell, “Efficient homomorphic encryption on integer vectors and its applications,” in 2014 Information Theory and Applications Workshop (ITA), 2014, pp. 1–9. DOI: https://doi.org/10.1007/s10207-019-00427-0
L. Sweeney, “K-anonymity: A model for protecting privacy,” Int. J. Uncertain. Fuzziness Knowl.-Based Syst., vol. 10, no. 5, p. 557–570, Oct. 2002. [Online]. Available: DOI: https://doi.org/10.1142/S0218488502001648
“DIN ISO 4997:2020-04, Privacy by Blockchain Design: A standardised model for processing personal data using blockchain technology.” [Online]. Available: https://www.beuth.de/de/technische-regel/din-spec-4997/321277504
Y. Yang, L. Wu, G. Yin, L. Li, and H. Zhao, “A survey on security and privacy issues in internet-of-things,” IEEE Internet of Things Journal, vol. 4, no. 5, pp. 1250–1258, 2017. DOI: https://doi.org/10.1109/JIOT.2017.2694844
A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam, “Ldiversity: privacy beyond k-anonymity,” in 22nd International Conference on Data Engineering (ICDE’06), 2006, pp. 24–24. DOI: https://doi.org/10.22067/cke.2023.63240.0
N. Li, T. Li, and S. Venkatasubramanian, “t-closeness: Privacy beyond kanonymity and l-diversity,” in 2007 IEEE 23rd International Conference on Data Engineering, 2007, pp. 106–115. https://www.cs.purdue.edu/homes/ninghui/papers/t_closeness_icde07.pdf
A. el-ela Abdou Hussien, N. Hamza, and H. A. Hefny, “Attacks on anonymization-based privacy-preserving: A survey for data mining and data publishing,” Journal of Information Security, vol. 4, pp. 101–112, 2013. DOI: http://dx.doi.org/10.4236/jis.2013.42012
B. Jeon, S. M. Ferdous, M. R. Rahman, and A. Walid, “Privacy-preserving decentralized aggregation for federated learning,” 2020. DOI: https://doi.org/10.1109/INFOCOMWKSHPS51825.2021.9484437
C. Dwork, A. Roth et al., “The algorithmic foundations of differential privacy,” Foundations and Trends® in Theoretical Computer Science, vol. 9, no. 3–4, pp. 211–407, 2014. https://www.cis.upenn.edu/~aaroth/Papers/privacybook.pdf
M. U. Hassan, M. H. Rehmani, and J. Chen, “Differential privacy in blockchain technology: A futuristic approach,” 2019. DOI: https://doi.org/10.1109/COMST.2019.2944748
Kuriakose, N., & Midhunchakkaravarthy, Dr. D. (2022). A Review on IoT Blockchain Technology. In Indian Journal of Data Communication and Networking (Vol. 3, Issue 1, pp. 1–5). DOI: https://doi.org/10.54105/ijdcn.f3719.123122
Mariappan, S. (2019). Blockchain Technology: Disrupting The Current Business and Governance Model. In International Journal of Recent Technology and Engineering (IJRTE) (Vol. 8, Issue 3, pp. 6285–6292). DOI: https://doi.org/10.35940/ijrte.c5905.098319
P. Chinnasamy, P. Deepalakshmi, V. Praveena, K. Rajakumari, P. Hamsagayathri, Blockchain Technology: A Step Towards Sustainable Development. (2019). In International Journal of Innovative Technology and Exploring Engineering (Vol. 9, Issue 2S2, pp. 1034–1040). DOI: https://doi.org/10.35940/ijitee.b1109.1292s219
Jain, N. (2019). Security Issues in Blockchain based Applications. In International Journal of Engineering and Advanced Technology (Vol. 8, Issue 6s3, pp. 890–896). DOI: https://doi.org/10.35940/ijeat.f1157.0986s319
Mukati, A. (2023). Blockchain Technology In Healthcare Services. In Indian Journal of Cryptography and Network Security (Vol. 3, Issue 1, pp. 9–15). DOI: https://doi.org/10.54105/ijcns.d4090.053123