DOI QR코드

DOI QR Code

A Study on An Enhancement Scheme of Privacy and Anonymity through Convergence of Security Mechanisms in Blockchain Environments

블록체인 환경에서 보안 기법들의 융합을 통한 프라이버시 및 익명성 강화 기법에 대한 연구

  • Kang, Yong-Hyeog (Department of Global Business Administration, Far East University)
  • 강용혁 (극동대학교 글로벌경영학과)
  • Received : 2018.09.15
  • Accepted : 2018.11.20
  • Published : 2018.11.28

Abstract

Anonymity and privacy issues are becoming important as all transactions in the blockchain are open to users. Public blockchains appear to guarantee anonymity by using public-key addresses on behalf of users, but they can weaken anonymity by tracking with various analytic techniques based on transaction graph. In this paper, we propose a scheme to protect anonymity and privacy by converging various security techniques such as k-anonymity, mixing, blind signature, multi-phase processing, random selection, and zero-knowledge proof techniques with incentive mechanism and contributor participation. Through performance analysis, our proposed scheme shows that it is difficult to invade privacy and anonymity through collusion attacks if the number of contributors is larger than that of conspirators.

블록체인 내의 모든 트랜잭션이 공개되기 때문에 익명성과 프라이버시 문제는 중요해지고 있다. 공개 블록체인은 사용자 대신 공개키 주소를 사용하여 익명성을 보장하는 것처럼 보이지만 트랜잭션 그래프를 기반으로 다양한 기법을 통해 추적함으로써 익명성을 약화시킬 수 있다. 본 논문에서는 블록체인 환경에서 익명성과 프라이버스를 보호하기 위하여 다양한 보안 기법을 융합하여 사용자의 추적을 어렵게 하는 기법을 제안한다. 제안 기법은 k-anonymity 기술, 믹싱 기술, 은닉서명, 다단계 기법, 램덤 선택기법, 영지식 증명 기법 등을 융합하여 인센티브 및 기여자의 참여를 통해 익명성과 프라이버시를 보호한다. 성능 분석을 통해 제안기법은 기여자의 수가 공모자의 수보다 많은 환경에서는 공모를 통한 프라이버시 및 익명성 훼손이 어렵다는 것을 보였다.

Keywords

OHHGBW_2018_v9n11_75_f0001.png 이미지

Fig. 1. Conceptual model of our proposed scheme

OHHGBW_2018_v9n11_75_f0002.png 이미지

Fig. 2. Each phase of private area

Table 1. Probability of traceability according to number of conspirators

OHHGBW_2018_v9n11_75_t0001.png 이미지

Table 2. Probability of traceability by using quantities of money according to number of incentives

OHHGBW_2018_v9n11_75_t0002.png 이미지

References

  1. A. P. Joshi, M. Han & Y. Wang. (2018). A survey on security and privacy issues of blockchain technology. Mathematical Foundations of Computing, 1(2), 121-147. https://doi.org/10.3934/mfc.2018007
  2. M. Conti, S. K. E, C. Lal & S. Ruj. (2018). A Survey on Security and Privacy Issues of Bitcoin. IEEE Communications Surveys & Tutorials. DOI : 10.1109/COMST.2018.2842460
  3. P. Frandco. (2015). Understanding BitCoin: Cryptography, Engineering and Economics. John Wiley & Sons.
  4. M. C. K. Khalilov & A. Levi. (2018). A survey on anonymity and privacy in Bitcoin-like digital cash systems. IEEE Communications Surveys & Tutorials. 20(3), 2543-2585. https://doi.org/10.1109/COMST.2018.2818623
  5. E. M. Lee. (2018). A Research on Blockchain- based Copyright Protection for Computational Creativity. Journal of the Korea Convergence Society, 9(9), 23-29. https://doi.org/10.15207/JKCS.2018.9.9.023
  6. S. T. Kim. (2018). Analysis on Consensus Algorithms of Blockchain and Attacks. Journal of the Korea Convergence Society, 9(9), 83-88. https://doi.org/10.15207/JKCS.2018.9.9.083
  7. Y. J. Lee & S. H. Lee. (2018). Efficient RBAC based on Block Chain for Entities in Smart Factory. Journal of the Korea Convergence Society, 9(7), 69-75. https://doi.org/10.15207/JKCS.2018.9.7.069
  8. I. G. Lee. (2018). A Study on Blockchain Networking for Internet of Things. Journal of Digital Convergence, 16(8), 201-210. https://doi.org/10.14400/jdc.2018.16.8.201
  9. K. N. Lee & G. H. Jeon. (2018). A Study on Improvement of Used-goods Market Platform Using Blockchain. Journal of Digital Convergence, 16(9), 133-145. https://doi.org/10.14400/JDC.2018.16.9.133
  10. Y. S. Jeong, Y. T. Kim, & G. C. Park. (2018). User Privacy management model using multiple group factor based on Block chain. Journal of Convergence for Information Technology, 8(5), 107-113. https://doi.org/10.22156/CS4SMB.2018.8.5.107
  11. H. J. Mun. (2018). Biometric Information and OTP based on Authentication Mechanism using Blockchain. Journal of Convergence for Information Technology, 8(3), 85-90. https://doi.org/10.22156/CS4SMB.2018.8.3.085
  12. E. Androulaki, G. O. Karame, M. Roeschlin, T. Scherer, & S. Capkun. (2013). Evaluating user privacy in bitcoin. International Conference on Financial Cryptography and Data Security (pp. 34-51). Springer Berlin Heidelberg.
  13. M. H. Ibrahim. (2017). Securecoin: A robust secure and efficient protocol for anonymous bitcoin ecosystem. International Journal of Network Security, 19(2), 295-312.
  14. T. Ruffing, P. Moreno-Sanchez, & A. Kate. (2014). Coinshuffle: Practical decentralized coin mixing for bitcoin. 19th European Symposium on Research in Computer Security (pp. 345-364). Springer International Publishing.
  15. G. Maxwell. (2013). CoinJoin: Bitcoin privacy for the real world. Bitcoin Forum. https://bitcointalk.org/index.php?topic=279249.0.
  16. J. Bonneau, A. Narayanan, A. Miller, J. Clark, J. A. Kroll, & E. W. Felten. (2014). Mixcoin: Anonymity for bitcoin with accountable mixes. International Conference on Financial Cryptography and Data Security (pp. 486-504). Springer Berlin Heidelberg.
  17. D. Chaum. (1983). Blind signatures for untraceable payments. Advances in Cryptology: Proceedings of Crypto 82 (pp. 199-203). Springer.
  18. L. Valenta & B. Rowan. (2015). Blindcoin: Blinded, accountable mixes for bitcoin. International Conference on Financial Cryptography and Data Security. (pp. 112-126). Springer Berlin Heidelberg.
  19. I. Miers, C. Garman, M. Green, & A. D. Rubin. (2013). Zerocoin: Anonymous Distributed E-Cash from Bitcoin. IEEE Symposium on Security and Privacy. (pp. 397-411). IEEE Computer Society.
  20. E. B. Sasson, A. Chiesa, C. Garman, M. Green, I. Miers, E. Tromer, & M. Virza. (2014). Zerocash: Decentralized anonymous payments from bitcoin. IEEE Symposium on Security and Privacy (pp. 459-474). IEEE Computer Society.
  21. L. Sweeney. (2002). k-Anonymity: a model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, 10(5), 557-570. https://doi.org/10.1142/S0218488502001648
  22. G. Zyskind, O. Nathan, & A. Pentland. (2015). Decentralizing Privacy: Using Blockchain to Protect Personal Data. IEEE Symposium on Security and Privacy Workshops (pp. 180-184). IEEE Computer Society.
  23. E. Heilman, F. Baldimtsi, & S. Goldberg. (2016). Blindly signed contracts: Anonymous on-blockchain and off-blockchain bitcoin transactions. Financial Cryptography and Data Security: FC 2016 International Workshops, BITCOIN'16 (pp. 43-60). Springer Berlin Heidelberg.