Differential privacy in blockchain technology: A futuristic approach

Muneeb Ul Hassan, Mubashir Husain Rehmani, Jinjun Chen

Research output: Contribution to journalArticlepeer-review

29 Citations (Scopus)

Abstract

Blockchain has received a widespread attention because of its decentralized, tamper-proof, and transparent nature. Blockchain works over the principle of distributed, secured, and shared ledger, which is used to record, and track data within a decentralized network. This technology has successfully replaced certain systems of economic transactions in organizations and has the potential to overtake various industrial business models in future. Blockchain works over peer-to-peer (P2P) phenomenon for its operation and does not require any trusted-third party authorization for data tracking and storage. The information stored in blockchain is distributed throughout the decentralized network and is usually protected using cryptographic hash functions. Since the beginning of blockchain technology, its use in different applications is increasing exponentially, but this increased use has also raised some questions regarding privacy and security of data being stored in it. Protecting privacy of blockchain data using data perturbation strategy such as differential privacy could be a novel approach to overcome privacy issues in blockchain. In this article, we cover the topic of integration of differential privacy in each layer of blockchain and in certain blockchain based scenarios. Moreover, we highlight some future challenges and application scenarios in which integration of differential privacy in blockchain can produce fruitful results.

Original languageEnglish
Pages (from-to)50-74
Number of pages25
JournalJournal of Parallel and Distributed Computing
Volume145
DOIs
Publication statusPublished - Nov 2020
Externally publishedYes

Keywords

  • Blockchain
  • Differential privacy
  • Privacy preservation

Fingerprint

Dive into the research topics of 'Differential privacy in blockchain technology: A futuristic approach'. Together they form a unique fingerprint.

Cite this