Abstract
The education sector has been experiencing the progressive popularity of the Internet of Things (IoT) systems with a range of applications that can monitor simple attendance to physical locations. IoT systems in the education sector are smoothly integrated for managing marks’ digital copies, providing certificates related to medical purposes, parental consent, and so on, due to the Hyperledger blockchain fabric’s emergence. The Hyperledger blockchain fabric’s ability to yield multiple privacy options depending on the use-case is its key benefit. Access policies govern access to the channel’s resources (ledger state, transactions, and chaincodes) are used for configuration of the Hyperledger Fabric’s channels. Due to this, the confidentiality and privacy of the singular information enclosed in the nodes of the channel are preserved. A better quality of robustness is accomplished by the channels when a node is down given an alternative to arriving at the destination whilst also given the scalability to ensure the large data amounts’ efficient sharing. Leakage of information from people with high-level access can occur when, despite data privacy, there is no accomplishment of data anonymization. It is crucial to anonymize research data because of the extensive utilization of Artificial Intelligence Markup Language (AIML) in education. Data from an individual is utilized for the generation of an anonymized dataset. Proposal of a heuristic K-anonymity privacy-preserving technique for the hyper-ledger blockchain through the addition of a privacy system manager has been given in the work. The Non-deterministic Polynomial (NP) problem is overcome by these proposed privacy-preserving techniques through the utilization of stochastic diffusion search optimization algorithm gives a better results in various parameters like throughput, latency, misclassification rate, loss metric.
Similar content being viewed by others
References
Salman, T., Zolanvari, M., Erbad, A., Jain, R., & Samaka, M. (2018). Security services using blockchains: A state of the art survey. IEEE Communications Surveys & Tutorials, 21(1), 858–880.
Thakkar, P., Nathan, S., & Viswanathan, B. (2018, September). Performance benchmarking and optimizing hyperledger fabric blockchain platform. In 2018 IEEE 26th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS) (pp. 264–276). IEEE.
Ramkumar, J., Baskar, M., Viswak, M., Ashish, M. D. (2020). Smart Shopping with Integrated Secure System based on IoT. International Journal of Advanced Science and Technology, 29(5), 301–312, ISSN: 2005–4238.
Meir, H., Barger, A., Manevich, Y., & Tock, Y. (2019, July). Lockless transaction isolation in hyperledger fabric. In 2019 IEEE International Conference on Blockchain (Blockchain), (pp. 59–66). IEEE.
Javaid, H., Hu, C., & Brebner, G. (2019, October). Optimizing validation phase of hyperledger fabric. In 2019 IEEE 27th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS), (pp. 269–275). IEEE.
Thiagarajan, R., Ganesan, R., Anbarasu, V., Baskar, M., Arthi, K., & Ramkumar, J. (2021). Optimised with Secure approach in detecting and isolation of malicious nodes in MANET. Wireless Personal Communications. https://doi.org/10.1007/s11277-021-08092-0
Pawar, A., Ahirrao, S., & Churi, P. P. (2018, November). Anonymization techniques for protecting privacy: A survey. In 2018 IEEE Punecon, (pp. 1–6). IEEE.
Praveena, A., & Smys, S. (2016). Anonymization in social networks: a survey on the issues of data privacy in social network sites. International Journal of Engineering and Computer Science, 5(3), 15912–15918.
Kiyomoto, S., Rahman, M. S., & Basu, A. (2017, June). On blockchain-based anonymized dataset distribution platform. In 2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA), (pp. 85–92). IEEE.
Ampel, B., Patton, M., & Chen, H. (2019, July). Performance modeling of hyperledgersawtooth blockchain. In 2019 IEEE International Conference on Intelligence and Security Informatics (ISI), (pp. 59–61). IEEE.
Baskar, M., Renuka Devi, R., Ramkumar, J., et al. (2021). Region centric minutiae propagation measure orient forgery detection with finger print analysis in health care systems. Neural Processing Letters. https://doi.org/10.1007/s11063-020-10407-4
Xu, L., Chen, W., Li, Z., Xu, J., Liu, A., & Zhao, L. (2019, November). Locking Mechanism for Concurrency Conflicts on Hyperledger Fabric. In International Conference on Web Information Systems Engineering, (pp. 32–47). Cham: Springer.
Baskar, M., Ramkumar, J., Karthikeyan, C., et al. (2021). Low rate DDoS mitigation using real-time multi threshold traffic monitoring system. Journal of Ambient Intelligence and Humanized Computing. https://doi.org/10.1007/s12652-020-02744-y
Jiang, L., Chang, X., Liu, Y., Mišić, J., & Mišić, V. B. (2020). Performance analysis of Hyperledger Fabric platform: A hierarchical model approach. Peer-to-Peer Networking and Applications, 13(7), 1–12. https://doi.org/10.1007/s12083-019-00850-z
Tanwar, S., Parekh, K., & Evans, R. (2020). Blockchain-based electronic healthcare record system for healthcare 4.0 applications. Journal of Information Security and Applications, 50, 102407.
Poovammal. E, Dr. Ponnavaikko. M (2009). An improved method for privacy preserving data mining. In IEEE International advance computing conference, (pp. 6–7). IACC.
Al Omar, A., Bhuiyan, M. Z. A., Basu, A., Kiyomoto, S., & Rahman, M. S. (2019). Privacy-friendly platform for healthcare data in cloud based on blockchain environment. Future generation computer systems, 95, 511–521.
Suresh, A., Udendhran, R., & Balamurgan, M. (2019). Hybridized neural network and decision tree based classifier for prognostic decision making in breast cancers. Soft Computing. https://doi.org/10.1007/s00500-019-04066-4
Kuo, T. T., & Ohno-Machado, L. (2018). Modelchain: Decentralized privacy-preserving healthcare predictive modeling framework on private blockchain networks. arXiv preprint http://arxiv.org/abs/1802.01746.
Kotra, A., Eldosouky, A., & Sengupta, S. (2020, June). Every Anonymization Begins with k: A Game-Theoretic Approach for Optimized k Selection in k-Anonymization. In 2020 International Conference on Advances in Computing and Communication Engineering (ICACCE), (pp. 1–6). IEEE.
Sharples, M., & Domingue, J. (2016, September). The blockchain and kudos: A distributed system for educational record, reputation and reward. In European conference on technology enhanced learning, (pp. 490–496). Cham: Springer.
Albeanu, G. (2017, October). Blockchain technology and education. In The 12th International Conference on Virtual Learning ICVL, (pp. 271–275).
Byun, J. W., Kamra, A., Bertino, E., & Li, N. (2007, April). Efficient k-anonymization using clustering techniques. In International Conference on Database Systems for Advanced Applications, (pp. 188–200). Berlin, Heidelberg: Springer.
Sweeney, L. (2002). k-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10(05), 557–570.
Al-Rifaie, M. M., & Bishop, J. M. (2013). Stochastic diffusion search review. Paladyn, Journal of Behavioral Robotics, 4(3), 155–173.
Al-Rifaie, M. M., Bishop, M. J., & Blackwell, T. (2011, July). An investigation into the merger of stochastic diffusion search and particle swarm optimisation. In Proceedings of the 13th annual conference on Genetic and evolutionary computation, (pp. 37–44).
Iyengar, V. S. (2002, July). Transforming data to satisfy privacy constraints. In Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining, (pp. 279–288).
El-henawy, I. M., & Ismail, M. M. (2014). A hybrid swarm intelligence technique for solving integer multi-objective problems. International Journal of Computer Applications, 87(3), 45–50.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Sowmiya, B., Poovammal, E. A Heuristic K-Anonymity Based Privacy Preserving for Student Management Hyperledger Fabric blockchain. Wireless Pers Commun 127, 1359–1376 (2022). https://doi.org/10.1007/s11277-021-08582-1
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-021-08582-1