Paper
8 June 2024 A privacy preserving carbon quota trading and auditing method
Hao Huo, Cunpei Li, Boyi Wang, Yipeng Yang, Yuhan Chen, Peng Liu
Author Affiliations +
Proceedings Volume 13171, Third International Conference on Algorithms, Microchips, and Network Applications (AMNA 2024); 131710G (2024) https://doi.org/10.1117/12.3032048
Event: 3rd International Conference on Algorithms, Microchips and Network Applications (AMNA 2024), 2024, Jinan, China
Abstract
Carbon dioxide emissions are an important cause of dramatic changes in climate. Therefore, the control of carbon emission rights of relevant subjects is a necessary prerequisite for mitigating climate change. However, the existing carbon trading and auditing framework has not yet completed the control of relevant entities under the premise of considering privacy, and adversaries may infer the privacy information of emission entities based on carbon emission data. In response to this challenge, this paper proposes a novel carbon data collection, carbon trading and auditing method based on block chain and the Internet of Things. This method realizes the trusted storage of carbon data through block chain technology. At the same time, in order to protect user privacy, the interaction of carbon data is carried out through HE. Security analysis shows that our method can prevent user privacy leakage. Experimental analysis shows that the method still maintains good availability while having high security.
(2024) Published by SPIE. Downloading of the abstract is permitted for personal use only.
Hao Huo, Cunpei Li, Boyi Wang, Yipeng Yang, Yuhan Chen, and Peng Liu "A privacy preserving carbon quota trading and auditing method", Proc. SPIE 13171, Third International Conference on Algorithms, Microchips, and Network Applications (AMNA 2024), 131710G (8 June 2024); https://doi.org/10.1117/12.3032048
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Carbon

Digital signal processing

Blockchain

Internet of things

Computer security

Data privacy

Simulation of CCA and DLA aggregates

Back to Top