Skip to main content

A Design of Mobile Phone Privacy Protection Based on Block Chain

  • Conference paper
  • First Online:
Cloud Computing and Security (ICCCS 2018)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 11066))

Included in the following conference series:

  • 1905 Accesses

Abstract

This paper introduces a platform development and implementation method which is based on block chain to protect mobile phone privacy. It is applied to collective maintenance, programmable, safety and reliability, and the requirements of personal privacy protection. The platform consists of the manufacturer node, market node, mobile phone node and user node, which is connected by a star topology construction. All nodes include data collection module, data storage module, target detection module and data application module, which is matched by the publish/subscribe mode. Each node will match a distributed storage database for storing various transaction data. The data storage module realizes the communication between nodes and completes the building of mobile phone protection platform. This method can solve the problems such as get the usage right by flashing root, user information leakage and so on. Finally, we give the application scenario of mobile phone protection platform, aiming at realizing the privacy protection on the block chain.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Khan, M.A., Salah, K.: IoT security: review, blockchain solutions, and open challenges. Future Gener. Comput. Syst. 82(2018), 395–411 (2017)

    Google Scholar 

  2. Xia, Q., Sifah, E.B., Asamoah, K.O., et al.: MeDShare: trust-less medical data sharing among cloud service providers via blockchain. IEEE Access 5(99), 14757–14767 (2017)

    Article  Google Scholar 

  3. Maccari, L., Facchi, N., Baldesi, L.: Optimized P2P streaming for wireless distributed networks. Pervasive Mob. Comput. 42(2017), 335–350 (2017)

    Article  Google Scholar 

  4. Hu, C.C., Lai, C.F., Hou, J.G.: Timely scheduling algorithm for P2P streaming over MANETs. Comput. Netw. 127(2017), 56–67 (2017)

    Article  Google Scholar 

  5. Xia, Q., Sifah, E., Smahi, A., Amofa, S., Xiaosong, Z.: BBDS: blockchain-based data sharing for electronic medical records in cloud environments. Information 8(2), 44 (2017)

    Article  Google Scholar 

  6. Michael, N., Peter, G., Oliver, H., Dirk, S.: Blockchain. Bus. Inf. Syst. Eng. 59(3), 183–187 (2017)

    Article  Google Scholar 

  7. Huang, H., Chen, X., Wu, Q., et al.: Bitcoin-based fair payments for outsourcing computations of fog devices. Future Gener. Comput. Syst. 78(2018), 850–858 (2016)

    Google Scholar 

  8. Yuan, C., Xu, M.X., Si, X.M.: Research on a new signature scheme on blockchain. Secur. Commun. Netw. 2017(2), 1–10 (2017)

    Article  Google Scholar 

  9. Sullivan, C., Burger, E.: E-residency and blockchain. Comput. Law Secur. Rev. 33(4), 470–481 (2017)

    Article  Google Scholar 

  10. Yan, Z., Gan, G., Riad, K.: BC-PDS: protecting privacy and self-sovereignty through BlockChains for OpenPDS. In: 11th International Symposium on Service-Oriented System Engineering. IEEE Computer Society, San Francisco (2017)

    Google Scholar 

  11. Azaria, A., Ariel, E., Thiago, V., Andrew, Li.: MedRec: using blockchain for medical data access and permission management. In: 2nd International Conference on Open and Big Data. IEEE Computer Society, Vienna (2016)

    Google Scholar 

  12. Bozic, N., Pujolle, G., Secci, S.: A tutorial on blockchain and applications to secure network control-planes. In: 3rd Smart Cloud Networks and Systems, pp. 1–8. IEEE Computer Society, Dubai (2016)

    Google Scholar 

  13. Huh, S., Cho, S., Kim, S.: Managing IoT devices using blockchain platform. In: International Conference on Advanced Communications Technology, pp. 464–467. IEEE Computer Society, Bongpyeong-myeon, Korea (South) (2017)

    Google Scholar 

  14. Teslya, N., Ryabchikov, I.: Blockchain-based platform architecture for industrial IoT. In: Proceeding of the 21st Conference of FRUCT Association, pp. 321–329. IEEE Xplore, Helsinki (2017)

    Google Scholar 

  15. Hao, L., Lianming, Z., Wenhua, H.: Topology optimization algorithm based on resource sharing gravitation in P2P network. J. Chin. Comput. Syst. 38, 87–91 (2017)

    Google Scholar 

  16. Dorri, A., Steger, M., Kanhere, S.S., et al.: BlockChain: a distributed solution to automotive security and privacy. IEEE Commun. Mag. 55(12), 119–125 (2017)

    Article  Google Scholar 

  17. Lei, A., Cruickshank, H., Cao, Y., et al.: Blockchain-based dynamic key management for heterogeneous intelligent transportation systems. IEEE Internet Things J. 4(6), 1832–1843 (2017)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mingzhe Liu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yang, K., Liu, M., Yang, Y., Jiang, X. (2018). A Design of Mobile Phone Privacy Protection Based on Block Chain. In: Sun, X., Pan, Z., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2018. Lecture Notes in Computer Science(), vol 11066. Springer, Cham. https://doi.org/10.1007/978-3-030-00015-8_48

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-00015-8_48

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-00014-1

  • Online ISBN: 978-3-030-00015-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics