2021
DOI: 10.1155/2021/6274860
|View full text |Cite|
|
Sign up to set email alerts
|

Research on Privacy Data Protection Based on Trusted Computing and Blockchain

Abstract: Aiming at the problems of low protection accuracy and long time consumption in traditional privacy data protection methods, a privacy data protection method based on trusted computing and blockchain is proposed. Set up the Internet node secure transmission protocol through the trusted node uplink transmission protocol and the downlink transmission protocol, and according to the transmission protocol, combined with the blockchain technology, the ECC elliptic curve encryption algorithm is used to encrypt the amo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(7 citation statements)
references
References 21 publications
0
7
0
Order By: Relevance
“…By doing so, they offer the developer community the flexibility to tailor and augment these functionalities, thereby enriching their primary platforms. However, such openness invariably escalates the risk of exposing users' sensitive data to third-party sites [3]. Consequently, there's an imperative need for API platforms to strike a balance between fostering innovation and ensuring rigorous privacy safeguards [4].…”
Section: Open Apimentioning
confidence: 99%
“…By doing so, they offer the developer community the flexibility to tailor and augment these functionalities, thereby enriching their primary platforms. However, such openness invariably escalates the risk of exposing users' sensitive data to third-party sites [3]. Consequently, there's an imperative need for API platforms to strike a balance between fostering innovation and ensuring rigorous privacy safeguards [4].…”
Section: Open Apimentioning
confidence: 99%
“…Steganography is the process of concealing information within a seemingly harmless digital medium, such as an image, video, or audio file. This is different from encryption, which transforms data into an incomprehensible format [25,35,36]. By rendering the data imperceptible to both advanced scanning systems and casual examination, the method of concealing it in plain sight, as described in [35], significantly diminishes the likelihood of detection.…”
Section: The Role Of Steganography In Businessmentioning
confidence: 99%
“…This is different from encryption, which transforms data into an incomprehensible format [25,35,36]. By rendering the data imperceptible to both advanced scanning systems and casual examination, the method of concealing it in plain sight, as described in [35], significantly diminishes the likelihood of detection. Due to this distinctive attribute, steganography can be employed to enhance data security procedures and enhance communication confidentiality in several commercial scenarios; i.…”
Section: The Role Of Steganography In Businessmentioning
confidence: 99%
See 1 more Smart Citation
“…Tis article has been retracted by Hindawi, as publisher, following an investigation undertaken by the publisher [1]. Tis investigation has uncovered evidence of systematic manipulation of the publication and peer-review process.…”
mentioning
confidence: 99%