
@Article{cmc.2020.011272,
AUTHOR = {Jun Li, Jieren Cheng, Naixue Xiong, Lougao Zhan, Yuan Zhang},
TITLE = {A Distributed Privacy Preservation Approach for Big Data in  Public Health Emergencies Using Smart Contract and SGX},
JOURNAL = {Computers, Materials \& Continua},
VOLUME = {65},
YEAR = {2020},
NUMBER = {1},
PAGES = {723--741},
URL = {http://www.techscience.com/cmc/v65n1/39591},
ISSN = {1546-2226},
ABSTRACT = {Security and privacy issues have become a rapidly growing problem with the fast 
development of big data in public health. However, big data faces many ongoing serious 
challenges in the process of collection, storage, and use. Among them, data security and 
privacy problems have attracted extensive interest. In an effort to overcome this challenge, 
this article aims to present a distributed privacy preservation approach based on smart 
contracts and Intel Software Guard Extensions (SGX). First of all, we define SGX as a trusted 
edge computing node, design data access module, data protection module, and data integrity 
check module, to achieve hardware-enhanced data privacy protection. Then, we design a 
smart contract framework to realize distributed data access control management in a big data 
environment. The crucial role of the smart contract was revealed by designing multiple access 
control contracts, register contracts, and history contracts. Access control contracts provide 
access control methods for different users and enable static access verification and dynamic 
access verification by checking the user’s properties and history behavior. Register contract 
contains user property information, edge computing node information, the access control and 
history smart contract information, and provides functions such as registration, update, and 
deletion. History contract records the historical behavior information of malicious users, 
receives the report information of malicious requestors from the access control contract, 
implements a misbehavior check method to determines whether the requestor has 
misbehavior, and returns the corresponding result. Finally, we design decentralized system 
architecture, prove the security properties, and analysis to verify the feasibility of the system. 
Results demonstrate that our method can effectively improve the timeliness of data, reduce 
network latency, and ensure the security, reliability, and traceability of data.},
DOI = {10.32604/cmc.2020.011272}
}



