Obfuscating Network Structure from Blockchain Analysis

Research output: Chapter in Book/Report/Conference proceedingsChapterpeer-review

Abstract

In the context of large-scale data collection like in the Internet of Things, Data Confidence Fabrics are expected to play an essential role in verifying and authenticating sensor data. To this end, metadata is generated at each network node and stored on the blockchain. However, storing metadata on the blockchain introduces significant privacy risks, as it can be exploited to reveal sensitive information, such as network structures and communication paths. This paper addresses these challenges by proposing two novel schemes to protect network structures: Hostname Mapping and Hostname Encryption. Our work demonstrates that the Hostname Mapping approach effectively conceals network patterns but introduces inefficiencies due to additional table storage and computational overhead. In contrast, the Hostname Encryption method eliminates the need for additional table management, offering a more efficient and secure alternative. Despite these advancements, the timestamp field in metadata could still allow attackers to infer patterns using machine learning, highlighting the need for further research to fully secure metadata. By combining encryption with some enhancements to timestamp obfuscation, our approach lays the foundation for additional privacy protection against metadata exploitation.

Original languageEnglish
Title of host publicationLecture Notes on Data Engineering and Communications Technologies
PublisherSpringer Science and Business Media Deutschland GmbH
Pages95-104
Number of pages10
DOIs
Publication statusPublished - 2025

Publication series

NameLecture Notes on Data Engineering and Communications Technologies
Volume251
ISSN (Print)2367-4512
ISSN (Electronic)2367-4520

Keywords

  • Blockchain forensics
  • Data Confidence Fabrics
  • Metadata Privacy
  • Network Security
  • Obfuscation techniques

Fingerprint

Dive into the research topics of 'Obfuscating Network Structure from Blockchain Analysis'. Together they form a unique fingerprint.

Cite this