Netinfo Security ›› 2020, Vol. 20 ›› Issue (11): 22-31.doi: 10.3969/j.issn.1671-1122.2020.11.004

Previous Articles     Next Articles

Research on Personal Information Protection Method Based on Smart Contract

JIANG Nan1,2,3(), WANG Weiqi1, WANG Jian4,5   

  1. 1. Faculty of Information Technology, Beijing University of Technology, Beijing 100124, China
    2. Beijing Key Laboratory of Trusted Computing, Beijing 100124, China
    3. National Engineering Laboratory for Critical Technologies of Information Security Classified Protection, Beijing 100124, China
    4. Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing 100044, China
    5. School of Computer and Information Technology, Beijing Jiaotong University, Beijing 100044, China
  • Received:2020-05-24 Online:2020-11-10 Published:2020-12-31
  • Contact: JIANG Nan E-mail:wangjian@bjtu.edu.cn

Abstract:

This paper proposes a personal information management method based on smart contracts. Using blockchain technology, it can store personal information transaction records between users and service providers on the blockchain without a trusted center. It can provide reliable legal evidence for the existence of the transaction, to prevent third parties from using the user's difficulty of obtaining evidence to commit criminal acts of personal information theft. The specific content of personal information is not stored on the blockchain, only the transaction records are encrypted and stored on the blockchain, and only the transaction-related parties can decrypt and view, which effectively protects the privacy of users. At the same time, this paper designs three smart contracts for personal information transaction creation, transaction invalidation, and transaction modification. The invalidation and modification of the transaction does not cause the previous transaction information to be lost, and the personal information transaction record can be permanently used as a reliable proof of the existence of the transaction once it is uploaded to the blockchain. Finally, the NS-3 network simulator is used to conduct simulation experiments, the experimental results prove that the method is feasible.

Key words: blockchain, smart contract, privacy data, personal information protection

CLC Number: