Abstract
The rapid development of e-commerce has led to a significant increase in the risk of sensitive data leakage, such as user transaction records, payment details, and identity information. Information security issues are becoming increasingly severe, especially in scenarios that rely on centralized cloud storage architectures, facing core challenges such as single point of failure leakage risks, lack of fine-grained access control in cross organizational data sharing, high encryption computing costs, rigid existing access control policies, and the contradiction between privacy protection and data sharing efficiency. In view of this, research has proposed and validated an innovative solution that integrates blockchain technology. Specifically, the study proposes a data security protocol based on attribute proxy re encryption and a data security sharing model based on blockchain. The data security protocol adopts ciphertext policy attribute encryption and introduces attribute proxy re encryption technology to re encrypt ciphertext through proxy nodes, solving the privacy protection problem of data transmission and sharing. The data security sharing model utilizes blockchain to store shared data, designs detailed access control policies and data encryption and decryption control mechanisms, and constructs a data security sharing system under a multi-layer architecture. In the experimental section, a simulated attack environment was constructed to test data security protocols. The results showed that compared with protocols such as SRAAP, TEE Oracle, Pedersen link Schnorr, etc., the blockchain data sharing protocol designed in this study achieved a ‘high’ level in terms of resistance to 51% attacks and resistance to general attacks (better than the ‘medium’ level of SRAAP protocol). The encryption time for privacy identity data was only 2.84ms (lower than SRAAP’s 5.20ms and TEE Oracle’s 7.46ms), and the maximum encryption time was controlled at 32ms. When processing a large amount of private data, the indexing time of the encryption control algorithm did not exceed 0.4 seconds, far lower than B-SEM algorithm’s 0.79s and CAB algorithm’s 0.91s. Moreover, the average memory occupation of the research scheme was only 18.54%, significantly lower than F-SEM algorithm. In the verification of blockchain data sharing platforms, compared with data sharing schemes such as BDAE, BF, RAISE, etc., the data control error rate of the research model does not exceed 3%, the accuracy of privacy data transmission is close to 95%, the data search and encryption performance is excellent (average search time of 1.35ms, shortest encryption time), and the access control cost is lower than other models. The research method combines blockchain technology and attribute proxy re encryption technology to effectively improve the privacy protection and control performance of shared data. It is significantly better than existing mainstream solutions in terms of computing efficiency, resource consumption, security strength, and control accuracy, effectively solving the inherent defects of centralized cloud storage, providing enhanced privacy protection, access control, and secure sharing capabilities for e-commerce data, ensuring data integrity and confidentiality, and reducing the threat risk of privacy sensitive data.
References
S. A. Ali. “Designing Secure and Robust E-Commerce Platform for Public Cloud,” The Asian Bulletin of Big Data Management., vol. 3, no. 1, pp. 164–189, November, 2023, DOI: 10.62019/abbdm.v3i1.56.
H. Jebamikyous, M. Li, Y. Suhas and R. Kashef. “Leveraging machine learning and blockchain in E-commerce and beyond: benefits, models, and application,” Discover Artificial Intelligence., vol. 3, no. 1, p. 3, January, 2023, DOI: 10.1007/s44163-022-00046-0.
C. Cho, B. Kim, H. Cho and T. Y. Youn. “A New Encryption Mechanism Supporting the Update of Encrypted Data for Secure and Efficient Collaboration in the Cloud Environment,” CMES-COMP MODEL ENG., vol. 142, no. 1, pp. 813–834, January, 2025, DOI: 10.32604/cmes.2024.056952.
P. Zhang and L. Xu. “Design and implementation of mobile e-commerce application built on WAP mobile payment system,” WIREL NETW., vol. 30, no. 6, pp. 6089–6104, June, 2024, DOI: 10.1007/s11276-023-03409-2.
Z. Lu and H. Mohamed. “A Complex Encryption System Design Implemented by AES,” INT J INF SECUR., vol. 12, no. 2, pp. 177–187, April, 2021, DOI: 10.4236/jis.2021.122009.
N. Pacharla and K. S. Reddy. “Trusted Certified Auditor Using Cryptography for Secure Data Outsourcing and Privacy Preservation in Fog-Enabled VANETs,” CMC-COMPUT MATER CON., vol. 79, no. 5, pp. 3089–3110, May, 2024, DOI: 10.32604/cmc.2024.048133.
T. Guo, Z. Zhang, Y. Yuan, X. Yang and G. Wang. “Hybrid concurrency control protocol for data sharing among heterogeneous blockchains,” FRONT COMPUT SCI-CHI., vol. 18, no. 3, pp. 1–12, January, 2024, DOI: 10.1007/s11704-022-2327-7.
Y. Dong, Y. Li, Y. Cheng and D. Yu. “Redactable consortium blockchain with access control: Leveraging chameleon hash and multi-authority attribute-based encryption,” HIGH-CONFID COMPUT., vol. 4, no. 1, pp. 14–23, March, 2024, DOI: 10.1016/j.hcc.2023.100168.
Z. Morić,V. Dakic,D. Djekic and D. Regvart. “Protection of Personal Data in the Context of E-Commerce,” Journal of cybersecurity and privacy., vol. 4, no. 3, pp. 731–761, September, 2024, DOI: 10.3390/jcp4030034.
P. Prathap Nayudu and K. R. Sekhar. “Secured Access Policy in Ciphertext-Policy Attribute-Based Encryption for Cloud Environment,” COMPUT SYST SCI ENG., vol. 46, no. 7, pp. 1079–1092, December, 2023, DOI:10.3390/math10010068.
Y. Shu and W. Wang. “Innovative research on encryption and protection of e-commerce with big data analysis,” INT J DATA SCI ANAL., vol. 9, no. 2, pp. 123–142, July, 2024, DOI: 10.1504/IJDS.2024.139805.
Z. Guan, N. Wang, X. Fan, X. Liu, L. Wu and S. Wan. “Achieving secure search over encrypted data for e-commerce: a blockchain approach,” ACM T INTERNET TECHN., vol.21, no. 1, pp. 1–17, December, 2020, DOI: 10.1145/3408309.
S. Bharany. “Secure Sensitive Data Sharing Using RSA and ElGamal Cryptographic Algorithms with Hash Functions,” Information., vol. 13, no. 10, pp. 442, September, 2022, DOI: 10.3390/info13100442.
T. Feng, H. Pei, R. Ma, Y. Tian and X. Feng. “Blockchain Data Privacy Access Control Based on Searchable Attribute Encryption,” COMPUT MATER CON., vol. 66, no. 1, pp. 871–884, August, 2021, DOI: 10.32604/cmc.2020.012146.
Y. Shuangxi. “BDAE: A Blockchain-Based and Decentralized Attribute-Based EncryptionScheme for Secure Data Sharing,” Wuhan Univ. J. Nat. Sci., vol. 29, no. 3, pp. 228–238, June, 2024, DOI: 10.1051/wujns/2024293228.
Y. Lu, T. Feng, C. Liu and W. Zhang. “A Blockchain and CP-ABE Based Access Control Scheme with Fine-Grained Revocation of Attributes in Cloud Health,” COMPUT MATER CON., vol. 78, no. 2, pp. 2787–2811, February, 2024, DOI: 10.32604/cmc.2023.046106.
H. Tang, C. Hu, T. Liu and J. Ouyang. “A Blockchain-Based Framework for Secure Storage and Sharing of Resumes,” COMPUT MATER CON., no. 9, pp. 5395–5413, March, 2022, DOI: 10.32604/cmc.2022.028284.
N. Hu, L. Liu, X. Liu, K. Wu, and Y. Zhao. “RAISE: A Resilient Anonymous Information Sharing Environment,” COMP MODEL ENG., vol. 137, no. 12, pp. 2743–2759, August, 2023, DOI: 10.32604/cmes.2023.026939.
A. Baseera and A. A. Alsadhan. “Enhancing Blockchain Security Using Ripple Consensus Algorithm,” COMPUT MATER CON., vol. 73, no. 3, pp. 4713–4726, April, 2022, DOI: 10.32604/cmc.2022.029538.
V. Mannayee and T. Ramanathan. “An Efficient SDFRM Security System for Blockchain Based Internet of Things,” INTELL AUTOM SOFT CO., vol. 35, no. 2, pp. 1545–1563, March, 2023, DOI: 10.32604/iasc.2023.027675.
K. Zhou. “Financial Model Construction of a Cross-Border E-Commerce Platform Based on Machine Learning,” Neural Computing and Applications., vol. 35, no. 36, pp. 25189–25199, March., 2023, DOI: 10.1007/s00521-023-08456-6.
H. Ping. “Network information security data protection based on data encryption technology,” WIRELESS PERS COMMUN., vol. 126, no. 3, pp. 2719–2729, June,2022, DOI: 10.1007/s11277-022-09838-0.
L. Zhao, B. Li and H. Yuan. “Cloud edge integrated security architecture of new cloud manufacturing system,” J SYST ENG ELECTRON., vol. 35, no. 5, pp. 1177–1189, October, 2024, DOI: 10.23919/JSEE.2024.000112.
C. Guo, P. Weijun, W. Jing, F. Youxuan, Y. Keke and X. Yanshuang. “A blockchain-based proxy re-encryption scheme with conditional privacy protection and auditability,” CHINA COMMUN., vol. 21, no. 7, pp. 267–277, July, 2024, DOI: 10.23919/JCC.fa.2022-0863.202407.
S. Shunmuganathan, S. Kannan, M. R. TV, K. Ambika and T. Jayasankar. “Improved Secure Identification-Based Multilevel Structure of Data Sharing in Cloud Environments,” COMPUT SYST SCI ENG., vol. 43, no. 11, pp. 785–801, November, 2022, DOI: 10.32604/csse.2022.022424.
R. B. Salem, E. Aimeur and H. Hage. “A Multi-Party Agent for Privacy Preference Elicitation,” Artificial Intelligence and Applications., vol. 1, no. 2, pp. 98–105, November, 2023, DOI: 10.47852/bonviewAIA2202514.
X. Yang and P. Zhao. “A Lightweight, Searchable, and Controllable EMR Sharing Scheme,” CMC-Comput. Mater. Con., vol. 79, no. 4, pp. 1521–1538, April, 2024, DOI: 10.32604/cmc.2024.047666.
K. Yang, B. Yang, T. Wang and Y. Zhou. “Zero-cerd: A self-blindable anonymous authentication system based on blockchain,” Chinese Journal of Electronics., vol. 32, no. 3, pp. 587–596, May, 2023, DOI: 10.23919/cje.2022.00.047.
Y. Xian, L. Zhou, J. Jiang, B. Wang, H. Huo and P. Liu. “A distributed efficient blockchain oracle scheme for internet of things,” IEICE T COMMUN., vol. 107, no. 9, pp. 573–582, September, 2024, DOI: 10.23919/transcom.2023EBP3156.
D. Pengfei, M. Zhaofeng, Z. Yuqing, W. Jingyu and L. Shoushan. “Blockchain-Enabled Privacy Protection and Access Control Scheme Towards Sensitive Digital Assets Management,” China Commun., vol. 21, no. 7, pp. 224–236, July, 2024, DOI: 10.23919/JCC.2022.ja.0740.
Y. Dang, “Research on Collaborative Positioning Algorithm of Wireless Sensor Network Security Under Strong Topology Relation”, JCSANDM, vol. 14, no. 01, pp. 25–46, Feb. 2025.
J. K. Dawson, F. Twum, J. B. H. Acquah, and Y. M. Missah, “Cryptographic Solutions for Data Security in Cloud Computing: : A Run Time Trend-based Comparison of NCS, ERSA, and EHS”, JCSANDM, vol. 13, no. 2, pp. 265–282, Feb. 2024.

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Copyright (c) 2025 Journal of Cyber Security and Mobility
