Skip to main content
Log in

A Heuristic K-Anonymity Based Privacy Preserving for Student Management Hyperledger Fabric blockchain

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

The education sector has been experiencing the progressive popularity of the Internet of Things (IoT) systems with a range of applications that can monitor simple attendance to physical locations. IoT systems in the education sector are smoothly integrated for managing marks’ digital copies, providing certificates related to medical purposes, parental consent, and so on, due to the Hyperledger blockchain fabric’s emergence. The Hyperledger blockchain fabric’s ability to yield multiple privacy options depending on the use-case is its key benefit. Access policies govern access to the channel’s resources (ledger state, transactions, and chaincodes) are used for configuration of the Hyperledger Fabric’s channels. Due to this, the confidentiality and privacy of the singular information enclosed in the nodes of the channel are preserved. A better quality of robustness is accomplished by the channels when a node is down given an alternative to arriving at the destination whilst also given the scalability to ensure the large data amounts’ efficient sharing. Leakage of information from people with high-level access can occur when, despite data privacy, there is no accomplishment of data anonymization. It is crucial to anonymize research data because of the extensive utilization of Artificial Intelligence Markup Language (AIML) in education. Data from an individual is utilized for the generation of an anonymized dataset. Proposal of a heuristic K-anonymity privacy-preserving technique for the hyper-ledger blockchain through the addition of a privacy system manager has been given in the work. The Non-deterministic Polynomial (NP) problem is overcome by these proposed privacy-preserving techniques through the utilization of stochastic diffusion search optimization algorithm gives a better results in various parameters like throughput, latency, misclassification rate, loss metric.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Salman, T., Zolanvari, M., Erbad, A., Jain, R., & Samaka, M. (2018). Security services using blockchains: A state of the art survey. IEEE Communications Surveys & Tutorials, 21(1), 858–880.

    Article  Google Scholar 

  2. Thakkar, P., Nathan, S., & Viswanathan, B. (2018, September). Performance benchmarking and optimizing hyperledger fabric blockchain platform. In 2018 IEEE 26th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS) (pp. 264–276). IEEE.

  3. Ramkumar, J., Baskar, M., Viswak, M., Ashish, M. D. (2020). Smart Shopping with Integrated Secure System based on IoT. International Journal of Advanced Science and Technology, 29(5), 301–312, ISSN: 2005–4238.

  4. Meir, H., Barger, A., Manevich, Y., & Tock, Y. (2019, July). Lockless transaction isolation in hyperledger fabric. In 2019 IEEE International Conference on Blockchain (Blockchain), (pp. 59–66). IEEE.

  5. Javaid, H., Hu, C., & Brebner, G. (2019, October). Optimizing validation phase of hyperledger fabric. In 2019 IEEE 27th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS), (pp. 269–275). IEEE.

  6. Thiagarajan, R., Ganesan, R., Anbarasu, V., Baskar, M., Arthi, K., & Ramkumar, J. (2021). Optimised with Secure approach in detecting and isolation of malicious nodes in MANET. Wireless Personal Communications. https://doi.org/10.1007/s11277-021-08092-0

    Article  Google Scholar 

  7. Pawar, A., Ahirrao, S., & Churi, P. P. (2018, November). Anonymization techniques for protecting privacy: A survey. In 2018 IEEE Punecon, (pp. 1–6). IEEE.

  8. Praveena, A., & Smys, S. (2016). Anonymization in social networks: a survey on the issues of data privacy in social network sites. International Journal of Engineering and Computer Science, 5(3), 15912–15918.

    Article  Google Scholar 

  9. Kiyomoto, S., Rahman, M. S., & Basu, A. (2017, June). On blockchain-based anonymized dataset distribution platform. In 2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA), (pp. 85–92). IEEE.

  10. Ampel, B., Patton, M., & Chen, H. (2019, July). Performance modeling of hyperledgersawtooth blockchain. In 2019 IEEE International Conference on Intelligence and Security Informatics (ISI), (pp. 59–61). IEEE.

  11. Baskar, M., Renuka Devi, R., Ramkumar, J., et al. (2021). Region centric minutiae propagation measure orient forgery detection with finger print analysis in health care systems. Neural Processing Letters. https://doi.org/10.1007/s11063-020-10407-4

    Article  Google Scholar 

  12. Xu, L., Chen, W., Li, Z., Xu, J., Liu, A., & Zhao, L. (2019, November). Locking Mechanism for Concurrency Conflicts on Hyperledger Fabric. In International Conference on Web Information Systems Engineering, (pp. 32–47). Cham: Springer.

  13. Baskar, M., Ramkumar, J., Karthikeyan, C., et al. (2021). Low rate DDoS mitigation using real-time multi threshold traffic monitoring system. Journal of Ambient Intelligence and Humanized Computing. https://doi.org/10.1007/s12652-020-02744-y

    Article  Google Scholar 

  14. Jiang, L., Chang, X., Liu, Y., Mišić, J., & Mišić, V. B. (2020). Performance analysis of Hyperledger Fabric platform: A hierarchical model approach. Peer-to-Peer Networking and Applications, 13(7), 1–12. https://doi.org/10.1007/s12083-019-00850-z

  15. Tanwar, S., Parekh, K., & Evans, R. (2020). Blockchain-based electronic healthcare record system for healthcare 4.0 applications. Journal of Information Security and Applications, 50, 102407.

    Article  Google Scholar 

  16. Poovammal. E, Dr. Ponnavaikko. M (2009). An improved method for privacy preserving data mining. In IEEE International advance computing conference, (pp. 6–7). IACC.

  17. Al Omar, A., Bhuiyan, M. Z. A., Basu, A., Kiyomoto, S., & Rahman, M. S. (2019). Privacy-friendly platform for healthcare data in cloud based on blockchain environment. Future generation computer systems, 95, 511–521.

    Article  Google Scholar 

  18. Suresh, A., Udendhran, R., & Balamurgan, M. (2019). Hybridized neural network and decision tree based classifier for prognostic decision making in breast cancers. Soft Computing. https://doi.org/10.1007/s00500-019-04066-4

    Article  Google Scholar 

  19. Kuo, T. T., & Ohno-Machado, L. (2018). Modelchain: Decentralized privacy-preserving healthcare predictive modeling framework on private blockchain networks. arXiv preprint http://arxiv.org/abs/1802.01746.

  20. Kotra, A., Eldosouky, A., & Sengupta, S. (2020, June). Every Anonymization Begins with k: A Game-Theoretic Approach for Optimized k Selection in k-Anonymization. In 2020 International Conference on Advances in Computing and Communication Engineering (ICACCE), (pp. 1–6). IEEE.

  21. Sharples, M., & Domingue, J. (2016, September). The blockchain and kudos: A distributed system for educational record, reputation and reward. In European conference on technology enhanced learning, (pp. 490–496). Cham: Springer.

  22. Albeanu, G. (2017, October). Blockchain technology and education. In The 12th International Conference on Virtual Learning ICVL, (pp. 271–275).

  23. Byun, J. W., Kamra, A., Bertino, E., & Li, N. (2007, April). Efficient k-anonymization using clustering techniques. In International Conference on Database Systems for Advanced Applications, (pp. 188–200). Berlin, Heidelberg: Springer.

  24. Sweeney, L. (2002). k-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10(05), 557–570.

    Article  MathSciNet  MATH  Google Scholar 

  25. Al-Rifaie, M. M., & Bishop, J. M. (2013). Stochastic diffusion search review. Paladyn, Journal of Behavioral Robotics, 4(3), 155–173.

    Article  Google Scholar 

  26. Al-Rifaie, M. M., Bishop, M. J., & Blackwell, T. (2011, July). An investigation into the merger of stochastic diffusion search and particle swarm optimisation. In Proceedings of the 13th annual conference on Genetic and evolutionary computation, (pp. 37–44).

  27. Iyengar, V. S. (2002, July). Transforming data to satisfy privacy constraints. In Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining, (pp. 279–288).

  28. El-henawy, I. M., & Ismail, M. M. (2014). A hybrid swarm intelligence technique for solving integer multi-objective problems. International Journal of Computer Applications, 87(3), 45–50.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to B. Sowmiya.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sowmiya, B., Poovammal, E. A Heuristic K-Anonymity Based Privacy Preserving for Student Management Hyperledger Fabric blockchain. Wireless Pers Commun 127, 1359–1376 (2022). https://doi.org/10.1007/s11277-021-08582-1

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-021-08582-1

Keywords

Navigation