Open Access
ARTICLE
A Blockchain-Based Framework for Secure Storage and Sharing of Resumes
1 Key Laboratory of Intelligent Computing and Information Processing, Ministry of Education,Computer Science College of Xiangtan University, Xiangtan, Hunan Province, China
2 Department of Computer Science, The University of Georgia, Athens, Georgia, USA
* Corresponding Author: Jianquan Ouyang. Email:
Computers, Materials & Continua 2022, 72(3), 5395-5413. https://doi.org/10.32604/cmc.2022.028284
Received 06 February 2022; Accepted 10 March 2022; Issue published 21 April 2022
Abstract
In response to problems in the centralized storage of personal resumes on third-party recruitment platforms, such as inadequate privacy protection, inability of individuals to accurately authorize downloads, and inability to determine who downloaded the resume and when, this study proposes a blockchain-based framework for secure storage and sharing of resumes. Users can employ an authorized access mechanism to protect their privacy rights. The proposed framework uses smart contracts, interplanetary file system, symmetric encryption, and digital signatures to protect, verify, and share resumes. Encryption keys are split and stored in multiple depositories through secret-sharing technology to improve the security of these keys. Corresponding key escrow incentives are implemented using smart contracts to automatically verify the correctness of keys and encourage the active participation of honest key escrow parties. This framework combines blockchain and searchable symmetric encryption technology to realize multi-keyword search using inverted indexing and Bloom filters and verify search results on the chain. Escrow search service fees are charged through contracts. Only after the search results are verified can the search service provider obtain the search fee, thus ensuring fair and efficient search for encrypted resumes. The framework is decentralized, secure, and tamper-evident, and achieves controlled sharing while protecting personal privacy and information security.Keywords
Cite This Article
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.