DOI QR코드

DOI QR Code

A Study on Efficient Data De-Identification Method for Blockchain DID

  • Min, Youn-A (Applied Software Engineering, Hanyang Cyber University)
  • Received : 2021.02.11
  • Accepted : 2021.02.22
  • Published : 2021.05.31

Abstract

Blockchain is a technology that enables trust-based consensus and verification based on a decentralized network. Distributed ID (DID) is based on a decentralized structure, and users have the right to manage their own ID. Recently, interest in self-sovereign identity authentication is increasing. In this paper, as a method for transparent and safe sovereignty management of data, among data pseudonymization techniques for blockchain use, various methods for data encryption processing are examined. The public key technique (homomorphic encryption) has high flexibility and security because different algorithms are applied to the entire sentence for encryption and decryption. As a result, the computational efficiency decreases. The hash function method (MD5) can maintain flexibility and is higher than the security-related two-way encryption method, but there is a threat of collision. Zero-knowledge proof is based on public key encryption based on a mutual proof method, and complex formulas are applied to processes such as personal identification, key distribution, and digital signature. It requires consensus and verification process, so the operation efficiency is lowered to the level of O (logeN) ~ O(N2). In this paper, data encryption processing for blockchain DID, based on zero-knowledge proof, was proposed and a one-way encryption method considering data use range and frequency of use was proposed. Based on the content presented in the thesis, it is possible to process corrected zero-knowledge proof and to process data efficiently.

Keywords

References

  1. Melanie Swan, Blockchain, O'Reilly Media, Inc, pp. 10-25, 2015.
  2. S. Nakamoto, Bitcoin: APeer-to-Peer Electronic Cash System.https://bitcoin.org/bitcoin.pdf.
  3. D. Reed et al., Decentralized Identifiers (DIDs) v1.0, Core Data Model and Syntaxes,https://www.w3.org/TR/did-core/.
  4. W3C Credentials Community Group:https://www.w3.org/community/credentials/
  5. Y.A. Min, "A Study on Application of Blockchain Distributed ID Technology for Management of Welfare Dead Zone," Journal of the Institute of Internet, Broadcasting and Communication (JIIBC), Vol.20, No.6, pp. 145-150, Dec 2020. DOI : https://doi.org/10.7236/JIIBC.2020.20.6.145
  6. J.K. Hong et al., "Blockchain Watchdog: Real-time Blockchain Surveillance System Connecting Smart Contract Code and Distributed Storage," Journal of the Korean Institute of Internet, Broadcasting and Communication, Vol.20, No.4, PP.115-121, Oct 2020. DOI : https://doi.org/10.7236/JIIBC.2020.20.4.115
  7. M.H.Joo et al.,"De-identification policy and risk distribution framework for securing personal information," The International Journal of Government & Democracy in the Information Age, Vol. 23, No. 2, p195-219, 2018. DOI : 10.3233/IP-170057
  8. Liu, Kai-Cheng et al., "Optimized Data de-Identification Using Multidimensional k-Anonymity," in Proc. 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp.1610-1614 Aug.1-3, 2018. DOI : 10.1109/Trust Com/BigDataSE.2018.00235
  9. H.J.Lee et al., "De-identification and Privacy Issues on Bigdata Transformation," in Proc. IEEE International Conference on Big Data and Smart Computing (BigComp), pp.514-519, Feb.19-22, 2020. DOI :10.1109/BigComp48618.2020.00-14
  10. Zhang. Zeyu, Lu. Zhiyang, Tian. Youliang, "Data Privacy Quantification and De-identification Model Based on Information Theory," in Proc. International Conference on Networking and Network Applications (NaNA) International Conference on, pp.213-222, Oct.10-13, 2019. DOI:10.1109/NaNA.2019.00046
  11. D. Abouakil, J. Heurix and T. Neubauer, "Data models for the pseudonymization of dicom data," in Proc. 44th Hawaii International Conference on System Sciencesm pp. 1-11, Feb 22. 2011. DOI : 10.1109/HICSS.2011.136
  12. Kaplun, Dmitriy I et al.,"Research and implementation of the algorithm for data de-identification for Internet of Things," in Proc. IEEE II International Conference on Control in Technical Systems (CTS), pp.363-366, Oct. 25-27, 2017. DOI : 10.1109/CTSYS.2017.8109568
  13. J.H. Lee et al., "Personal Information Management System with Blockchain Using zk-SNARK", The Journal of the Society for Information Security, Vol. 29, No. 2, pp. 299-308, April 2019. DOI : 10.13089/JKIISC.2019.29.2.299
  14. M.S. Kim and B.R.Kang, "Generalization of Zero-Knowledge Proof of Polynomial Equality", The Journal of the Korean Institute of Communication Sciences, Vol. 40, No. 5, pp.833-840, May 2015. UCI : G704-A00600.2015.40.5.012
  15. S.O. Kim, "Balance points for safe processing and rational use of pseudonym information-Combined with constitutional evaluation of the 3rd Data Act, " Korea Public Law Research. Vol. 49, No. 2, pp.371-407, Dec 2020. DOI : 10.38176/PublicLaw.2020.12.49.2.371
  16. J.Y. Chun, G.T. No, "Suggestions for Applications of Anonymous Data under the Revised Data Privacy Acts", Journal of the Korea Information Security Society, Vol. 30, No. 3, pp.503-512, Jun 2020. DOI : 10.13089/JKIISC.2020.30.3.503
  17. Young. Jeffrey A et al., "A Methodological Framework for Validating ZKP Authentication Process," in Proc. IEEE 17th International Conference on Smart Communities: Improving Quality of Life Using ICT, IoT and AI , pp.37-43 Dec.14-16, 2020. DOI: 10.1109/HONET50430.2020.9322828