Research Article

BSPPF: Blockchain-Based Security and Privacy Preventing Framework for Data Middle Platform in the Era of IR 4.0

Table 2

The contribution of blockchain in Big Data security and privacy.

Ref no.InformationResultInvolve Big Data area
StorageCollectionTransactionAuditAccess controlEncryption

[21]Xia et al., 2017MeDShare uses smart contracts and an access control mechanism to examine the user who accesses data from a data custodian system for potentially hazardous behavior
[22]Chowdhury et al., 2018Implemented a prototype framework that provides privacy, integrity, and fine-grained access control on shared data
[23]Mora et al., 2018There is a use case to discuss using Blockchain to conciliate security versus privacy. Security and privacy issues are mentioned in this article
[24]Yang et al., 2020A Big Data exchange and transaction architecture built on blockchain’s decentralization and transparency. Propose a data-tamperproof approach that includes a cryptographic algorithm to prevent transaction data from being tampered with during user storage. Assure transaction security and data dependability when trading on the blockchain
[25]Tan et al., 2020BacCPSS permission, allotment revocation, admission control, and analysis processes are built and maintained in the blockchain
[26]Li et al., 2020The author makes use of blockchain technology to provide a unique public auditing method for ensuring data integrity in cloud storage. Data owners store the lightweight verification tags on the blockchain to decrease the overhead of computation and communication for integrity verification
[27]Stodt and Reich, 2020Using blockchain technology to prevent the disclosure of sensitive data while simultaneously providing auditable proof of data exchange. It defines providing ownership of the data to (possibly untrustworthy) other parties as a kind of privacy breach. The decentralized data storage method used in this article ensures data secrecy in Blockchain smart contracts using peer-to-peer communication and data processing
[28]Zhang et al., 2020A Big Data security protection scheme proposes for Hadoop. Features are metadata decentralization and data that is difficult to tamper with. Smart contract reasonably allocates user roles based on the assessment of user tag and risk value. Building ​a risk value tracking chain to monitor user activity in real time
[29]Yu et al., 2021BCBLPM focuses on the multichain environment and uses smart contracts to isolate access domains to achieve access control