@Article{cmc.2020.011272, AUTHOR = {Jun Li, Jieren Cheng, Naixue Xiong, Lougao Zhan, Yuan Zhang}, TITLE = {A Distributed Privacy Preservation Approach for Big Data in Public Health Emergencies Using Smart Contract and SGX}, JOURNAL = {Computers, Materials \& Continua}, VOLUME = {65}, YEAR = {2020}, NUMBER = {1}, PAGES = {723--741}, URL = {http://www.techscience.com/cmc/v65n1/39591}, ISSN = {1546-2226}, ABSTRACT = {Security and privacy issues have become a rapidly growing problem with the fast development of big data in public health. However, big data faces many ongoing serious challenges in the process of collection, storage, and use. Among them, data security and privacy problems have attracted extensive interest. In an effort to overcome this challenge, this article aims to present a distributed privacy preservation approach based on smart contracts and Intel Software Guard Extensions (SGX). First of all, we define SGX as a trusted edge computing node, design data access module, data protection module, and data integrity check module, to achieve hardware-enhanced data privacy protection. Then, we design a smart contract framework to realize distributed data access control management in a big data environment. The crucial role of the smart contract was revealed by designing multiple access control contracts, register contracts, and history contracts. Access control contracts provide access control methods for different users and enable static access verification and dynamic access verification by checking the user’s properties and history behavior. Register contract contains user property information, edge computing node information, the access control and history smart contract information, and provides functions such as registration, update, and deletion. History contract records the historical behavior information of malicious users, receives the report information of malicious requestors from the access control contract, implements a misbehavior check method to determines whether the requestor has misbehavior, and returns the corresponding result. Finally, we design decentralized system architecture, prove the security properties, and analysis to verify the feasibility of the system. Results demonstrate that our method can effectively improve the timeliness of data, reduce network latency, and ensure the security, reliability, and traceability of data.}, DOI = {10.32604/cmc.2020.011272} }