Blockchain and Data Sharing



Data sharing is very common in the era of big data and artificial intelligence as the convergence of data is the most prerequisite section of big data and machine intelligence happens based on high volume data feed. Blockchain is a new emerging technology, which holds vast possibilities and benefits to improve traceability and accountability of its stored data. It has significant advantages in unlocking the full potential of data sharing in multi-party scenarios. In this chapter, we introduce the basics of blockchain, which are organized into five layers: data layer, network layer, consensus layer, incentive layer and application layer. The details of each layer are elaborated accordingly. Afterwards, we emphasize the strengths of blockchain, including integrity, immutability, decentralization and verifiability. Finally, we make a list of the threats and challenges of blockchain to be overcame.


  1. 1.
    A blockchain platform for the enterprise, 2020. [Online; accessed 17-April-2020]Google Scholar
  2. 2.
    M. Ali, J. Nelson, R. Shea, M.J. Freedman, Blockstack: A global naming and storage system secured by blockchains, in 2016 {USENIX} Annual Technical Conference({USENIX} {ATC} 16), pp. 181–194, 2016Google Scholar
  3. 3.
    Bitcoin developer reference, 2020. [Online; accessed 17-April-2020]Google Scholar
  4. 4.
    C. Cachin et al., Architecture of the hyperledger blockchain fabric, in Workshop on Distributed Cryptocurrencies and Consensus Ledgers, vol. 310, p. 4, 2016Google Scholar
  5. 5.
    M. Castro, B. Liskov, et al., Practical byzantine fault tolerance, in OSDI, vol. 99, pp. 173–186, 1999Google Scholar
  6. 6.
    Chaincode tutorials, 2020. [Online; accessed 17-April-2020]Google Scholar
  7. 7.
    Developer resources, 2020. [Online; accessed 17-April-2020]Google Scholar
  8. 8.
    K. Gai, Y. Wu, L. Zhu, M. Qiu, M. Shen, Privacy-preserving energy trading using consortium blockchain in smart grid. IEEE Trans. Ind. Inf. 15(6), 3548–3558 (2019)CrossRefGoogle Scholar
  9. 9.
    F. Gao, L. Zhu, M. Shen, K. Sharif, Z. Wan, K. Ren, A blockchain-based privacy-preserving payment mechanism for vehicle-to-grid networks. IEEE Netw. 32(6), 184–192 (2018)CrossRefGoogle Scholar
  10. 10.
    H.A.W. Group et al., Hyperledger architecture volume 1: Introduction to hyperledger business blockchain design philosophy and consensus, 2017Google Scholar
  11. 11.
    T.T. Huynh, T.D. Nguyen, H. Tan, A survey on security and privacy issues of blockchain technology, in 2019 International Conference on System Science and Engineering (ICSSE) (IEEE, 2019), pp. 362–367Google Scholar
  12. 12.
    D. Larimer, Delegated proof-of-stake (dpos). Bitshare whitepaper, 2014Google Scholar
  13. 13.
    H. Li, L. Zhu, M. Shen, F. Gao, X. Tao, S. Liu, Blockchain-based data preservation system for medical data. J. Med. Syst. 42(8), 141 (2018)Google Scholar
  14. 14.
    Y. Li, L. Zhu, M. Shen, F. Gao, B. Zheng, X. Du, S. Liu, S. Yin, Cloudshare: towards a cost-efficient and privacy-preserving alliance cloud using permissioned blockchains, in International Conference on Mobile Networks and Management (Springer, 2017), pp. 339–352Google Scholar
  15. 15.
    L. Luu, J. Teutsch, R. Kulkarni, P. Saxena, Demystifying incentives in the consensus computer, in Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 706–719, 2015Google Scholar
  16. 16.
    G. Malavolta, P. Moreno-Sanchez, A. Kate, M. Maffei, S. Ravi, Concurrency and privacy with payment-channel networks, in Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 455–471, 2017Google Scholar
  17. 17.
    S. Nakamoto, Bitcoin: A peer-to-peer electronic cash system. Technical report, Manubot, 2019Google Scholar
  18. 18.
    D. Ongaro, J. Ousterhout, In search of an understandable consensus algorithm (extended version), 2013Google Scholar
  19. 19.
    F. Schuh, D. Larimer, Bitshares 2.0: General overview. Accessed February-2019.[Online]. Available:, 2017
  20. 20.
    M. Shen, G. Cheng, L. Zhu, X. Du, J. Hu, Content-based multi-source encrypted image retrieval in clouds with privacy preservation. Futur. Gener. Comput. Syst. (2018)Google Scholar
  21. 21.
    M. Shen, Y. Deng, L. Zhu, X. Du, N. Guizani, Privacy-preserving image retrieval for medical iot systems: A blockchain-based approach. IEEE Netw. 33(5), 27–33 (2019)CrossRefGoogle Scholar
  22. 22.
    M. Shen, J. Duan, L. Zhu, J. Zhang, X. Du, M. Guizani, Blockchain-based incentives for secure and collaborative data sharing in multiple clouds. IEEE J. Sel. Areas Commun. 38(6), 1229–1241 (2020)CrossRefGoogle Scholar
  23. 23.
    M. Shen, H. Liu, L. Zhu, K. Xu, H. Yu, X. Du, M. Guizani, Blockchain-assisted secure device authentication for cross-domain industrial IoT. IEEE J. Sel. Areas Commun. 38(5), 942–954 (2020)CrossRefGoogle Scholar
  24. 24.
    M. Shen, B. Ma, L. Zhu, X. Du, K. Xu, Secure phrase search for intelligent processing of encrypted data in cloud-based iot. IEEE Internet Things J. 6(2), 1998–2008 (2018)CrossRefGoogle Scholar
  25. 25.
    M. Shen, B. Ma, L. Zhu, R. Mijumbi, X. Du, J. Hu, Cloud-based approximate constrained shortest distance queries over encrypted graphs with privacy protection. IEEE Trans. Inf. Forensics Secur. 13(4), 940–953 (2017)CrossRefGoogle Scholar
  26. 26.
    M. Shen, X. Tang, L. Zhu, X. Du, M. Guizani, Privacy-preserving support vector machine training over blockchain-based encrypted iot data in smart cities. IEEE Internet Things J. 6(5), 7702–7712 (2019)CrossRefGoogle Scholar
  27. 27.
    M. Shen, J. Zhang, L. Zhu, K. Xu, X. Tang. Secure SVM training over vertically-partitioned datasets using consortium blockchain for vehicular social networks. IEEE Trans. Veh. Technol. 69(6), 5773–5783 (2020)CrossRefGoogle Scholar
  28. 28.
    Wikipedia contributors, Proof of stake — Wikipedia, the free encyclopedia, 2019. [Online; accessed 9-February-2020]Google Scholar
  29. 29.
    Wikipedia contributors, Proof of work — Wikipedia, the free encyclopedia, 2019. [Online; accessed 9-February-2020]Google Scholar
  30. 30.
    Wikipedia contributors, Consensus (computer science) — Wikipedia, the free encyclopedia, 2020. [Online; accessed 9-February-2020]Google Scholar
  31. 31.
    G. Wood et al., Ethereum: A secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper 151(2014), 1–32 (2014)Google Scholar
  32. 32.
    B. Zheng, L. Zhu, M. Shen, X. Du, J. Yang, F. Gao, Y. Li, C. Zhang, S. Liu, S. Yin, Malicious bitcoin transaction tracing using incidence relation clustering, in International Conference on Mobile Networks and Management (Springer, 2017), pp. 313–323Google Scholar
  33. 33.
    B.-K. Zheng, L.-H. Zhu, M. Shen, F. Gao, C. Zhang, Y.-D. Li, J. Yang, Scalable and privacy-preserving data sharing based on blockchain. J. Comput. Sci. Technol. 33(3), 557–567 (2018)MathSciNetCrossRefGoogle Scholar
  34. 34.
    Z. Zheng, S. Xie, H. Dai, X. Chen, H. Wang, An overview of blockchain technology: Architecture, consensus, and future trends, in 2017 IEEE International Congress on Big Data (BigData Congress) (IEEE, 20170), pp. 557–564Google Scholar
  35. 35.
    L. Zhu, B. Zheng, M. Shen, S. Yu, F. Gao, H. Li, K. Shi, K. Gai, Research on the security of blockchain data: A survey. arXiv preprint arXiv:1812.02009, 2018Google Scholar

Copyright information

© The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  1. 1.School of Computer ScienceBeijing Institute of TechnologyBeijingChina
  2. 2.Department of Computer ScienceTsinghua UniversityBeijingChina

Personalised recommendations