Back to Search Start Over

Differentially private enhanced permissioned blockchain for private data sharing in industrial IoT.

Authors :
Islam, Muhammad
Rehmani, Mubashir Husain
Chen, Jinjun
Source :
Information Sciences. Feb2024, Vol. 658, pN.PAG-N.PAG. 1p.
Publication Year :
2024

Abstract

The integration of permissioned blockchain such as Hyperledger fabric (HF) and Industrial internet of Things (IIoT) has opened new opportunities for interdependent supply chain partners to improve their performance through data sharing and coordination. The multichannel mechanism, private data collection and querying mechanism of HF enable private data sharing, transparency, traceability, and verification across the supply chain. However, the existing querying mechanism of HF needs further improvement for statistical data sharing because the query is evaluated on the original data recorded on the ledger. As a result, it gives rise to privacy issues such as leaking of business secrets, tracking of resources and assets, and disclosing of personal information. Therefore, we solve this problem by proposing a differentially private enhanced permissioned blockchain for private data sharing in the context of supply chain in IIoT which is known as (EDH-IIoT). First, we integrate differential privacy into the chaincode (smart contract) of HF which evaluates the query and adds a calibrated noise into it. Second, we propose an algorithm to efficiently utilize ϵ through reuse of the privacy budget for the repeated queries. Third, we also propose an algorithm to track the privacy budget (ϵ) and avoid the degrade of privacy preservation in case of multiple queries on the same portion of the ledger's data. Furthermore, the reuse and tracking of ϵ enables the data owner to ensure that ϵ does not exceed the threshold which is the maximum privacy budget (ϵ t). Finally, we model two privacy attacks namely linking attack and composition attack to evaluate and compare privacy preservation, and the efficiency of reuse of ϵ with the default chaincode of HF and traditional differential privacy model, respectively. The results confirm that EDH-IIoT obtains an accuracy of 97% in the shared data for ϵ = 1, and a reduction of 35.96% in spending of ϵ. • We present an enhanced querying mechanism for data sharing in blockchain-based IIoT. • We present two algorithms for data sharing with efficient utilization of differential privacy budget. • We provide validation results for defense against linking and comparison privacy attacks. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
00200255
Volume :
658
Database :
Academic Search Index
Journal :
Information Sciences
Publication Type :
Periodical
Accession number :
174604913
Full Text :
https://doi.org/10.1016/j.ins.2023.119997