Optimization Method for Data Sharing and Privacy Protection Using Distributed Blockchain Technology
Main Article Content
Abstract
In traditional centralized databases, data integrity and non-tamperability are difficult to guarantee. Although data is protected by means of encryption and permission control, the centralized storage architecture is susceptible to tampering and attacks, and it is impossible to monitor and prevent data tampering in real-time. To enhance the data security and reliability, this paper applies distributed blockchain technology to achieve data tamper-proof and integrity protection. First, the distributed ledger structure and consensus mechanism PoS (Proof of Stake) are used to optimize data storage, and after ensuring the integrity of the data, the system’s fault tolerance and reliability are improved through redundant storage and BFT (Byzantine Fault Tolerance). Then, by combining AES (Advanced Encryption Standard) encryption and ECDSA (Elliptic Curve Digital Signature Algorithm), it is ensured that unauthorized users cannot access and tamper with the data. The hash chain associates the hash value of each block with the previous block, and the Merkle tree is combined to ensure the integrity of the data and the efficiency of verification. Automated auditing and verification are achieved through smart contracts to ensure that each data access and modification operation is recorded on the blockchain, and all operations are traceable. Experiments demonstrate that the system throughput is increased by 33.3%, and the data tampering detection rate reaches 90.8% after the adoption of distributed blockchain technology, suggesting that this method provides an efficient solution for data sharing and privacy protection.