slower,  and  the  maximum  consumption  of  private 
data  sets  is  around  750s.  It  becomes  increasingly 
difficult to maintain software development databases 
as the level of privacy is raised.   
 
Figure 3: The relationship between the running time of the 
encryption algorithm and the number of data attributes 
It  can  be  observed  from  Figure  3  that  an 
increasing number of attributes causes the encryption 
algorithm to take longer to run, thereby increasing its 
running  time.  The  actual  message  can  still  be 
decrypted  within  a  shorter  time  period  than  the 
scheme  proposed  in  the  literature  as  the  literature 
scheme encrypts not only the actual message, but also 
a  random  message  for  verification,  whereas  this 
scheme only encrypts the actual message. This paper 
shows  that  the  method  is  faster  and  more  efficient, 
because  the number  of  information  tuples  increases 
promptly, approximately 900 seconds are consumed 
during the process. Our proposed method consumes 
significantly less time than the comparison method as 
the  number  of  experiments  increases.  This  solution 
has been proven to be safe and efficient after rigorous 
security analysis and performance analysis has been 
performed. 
5  CONCLUSIONS 
A large amount of data is generated every second by 
a  wide  variety  of  Internet-connected  devices.  The 
privacy  of  users  will  be  a  major  concern  with  this 
data.  People's  private  data  will  be  increasingly 
collected and processed, posing serious security and 
privacy concerns. Security and privacy challenges are 
exacerbated  by  several  inherent  deficiencies  of  the 
blockchain  network,  including  centralization  is 
lacking  and  heterogeneous  equipment  resources.  A 
major issue of the Internet is the security of data and 
privacy of users, which inhibits the deployment of the 
Internet on a large scale. As a  result  of the existing 
data exchange platform, it is not  easy for  users and 
enterprises  to  share  their  private  data  with  one 
another.  A  third-party  platform  is  able  to  easily 
backup  and  restore  the  most  important  data,  and  it 
faces  the  threat  of  being  mishandled  by  malicious 
users or  organizations  after  sharing  the  data,  which 
means  the  data  owners  lose  the  ownership  of 
important  information,  and  face  a  difficult  time 
pursuing  redress  if  the  private  information  is 
compromised. The purpose of this paper is to propose 
methods to solve the problem of privacy data leakage 
and  the  problem  of  data  security  in  the  process  of 
sharing  data  in  traditional  platforms  using  data 
encryption and decryption, traceability authentication 
and secure exchange functions. Also, it is to explore 
and demonstrate a method for protecting private data 
with trusted computing and blockchain technologies 
that prevents the leakage of personal information due 
to an unauthorized access by third parties, while also 
guaranteeing  the  security  of  private  data,  thus 
creating a stable basis for the protection of network 
data. 
ACKNOWLEDGEMENTS 
This research  is supported by  the project  funded by 
Zhuhai  Industry  University  Research  Cooperation 
and  Basic  and  Applied  Basic  Research  Project  in 
2020:  Research  on  Key  Technologies  of  Cross-
domain  Data  Compliance  and  Mutual  Trust 
Computing  in  Zhuhai  and  Macau  (No. 
ZH22017002200011PWC), in part by MOST-FDCT 
Projects  (0058/2019/AMJ,2019YFE0110300) 
(Research  and  Application  of  Cooperative  Multi-
Agent  Platform  for  Zhuhai-Macao  Manufacturing 
Service), and in part by the National Natural Science 
Foundation  of  China  and  Macao  Science  and 
Technology  Development  Joint  Fund 
(0066/2019/AFJ). 
Part  of  the  material  has  been  used  in  the  article 
(Zhu et al., 2021). This work adds many contents and 
also  modifies  the  shortcomings  of  the  previous 
version. 
REFERENCES 
Bahri, L., Carminati, B., & Ferrari, E. (2018). Decentralized 
privacy  preserving  services  for  Online  Social 
Networks. Online Social Networks and Media, 6, 18–
25. https://doi.org/10.1016/j.osnem.2018.02.001