3.2 Discussion
With the ongoing development and extensive
application of blockchain technology, the issue of
privacy leaking has become more significant and is
supposed be fully valued by researchers and industrial
developers. Unlike traditional centralized storage
systems, blockchain approaches do not rely on
specific central nodes to process and store data,
eliminating the risk of centralized server single point
failures and data leaks. However, in a gesture to
achieve consensus among nodes in a distributed
system, all transaction records in the blockchain are
supposed to be made available to all nodes,
dramatically increasing the possibility of privacy
violations. Hence, the distributed nature of
blockchain differs dramatically from traditional
Information Technology (IT) architecture, and large
numbers of typical privacy protection measures fail to
apply to blockchain applications. Therefore,
assessing the privacy leaking faults of blockchain and
exploring targeted privacy protection strategies are of
tremendous importance.
The privacy protection objects can be classified
into three categories, namely network layer privacy
protection, transaction layer privacy protection, and
application-level privacy protection. Privacy
protection at the network layer encompasses the
process of data transmission in the network,
containing blockchain node establishing modes, node
communication mechanisms, data transmission
protocol mechanisms, and so on. The transaction
layer's privacy protection extends throughout the full
process of data generation, verification, storage, and
use in the blockchain. The transaction layer's privacy
protection is mainly focused on hiding data
information and knowledge behind the data as much
as possible while meeting the blockchain's basic
consensus mechanism and the condition of
unchanged data storage, in a gesture to prevent
attackers from extracting user profiles by analyzing
block data; The application layer's privacy protection
scenarios include the process of blockchain data
being used by external applications. The use of
blockchain by external apps raises a risk of
compromising transaction and identity privacy. As a
result, privacy protection at the application layer
focuses on boosting user security awareness and
strengthening the security protection level of
blockchain service providers, such as acceptable
public and private key storage, and developing
blockchain services free from danger (Chen et.al,
2019).
In public blockchain initiatives nowadays, all
people participated have access to entire data
backups, and all data is accessible to them. Anyone
can make the query the on-chain data. The Bitcoin
project achieves anonymity by isolating the
transaction address from the address holder's real
identity. Attackers can view the addresses of the
sender and receiver of each transfer record, but they
are unable to identify a specific person in the reality.
However, attackers can still achieve their goal of
stealing privacy by initiating various types of assaults
at the network, transaction, and application layers
(Guan et.al, 2020). Although regulatory roles with
Certificate Authority (CA) properties can guarantee
the reliability of access nodes for consortium chains,
research based on cryptography, zero knowledge
proof, and other technologies is constantly
progressing if blockchain wants to take on more
business, like registering real name assets in real-
world scenarios, implementing concrete loan
contracts by means of smart contracts, and
guaranteeing that verification nodes execute contracts
without knowing specific contract information.
Blockchain technology can only boost traditional
companies and realize its established advantages by
continuously enhancing its multi-level privacy
protection mechanism (Liu et.al, 2020).
4 CONCLUSIONS
Blockchain technology has made significant progress
in ensuring data trustworthiness, immutability, and
integrity, making it a valuable tool in various sectors.
However, it remains immature in other critical areas,
particularly in terms of privacy, anonymity, and
security mechanisms. This paper is specifically
focused on the challenges of privacy protection in
blockchain systems, with a strong emphasis on the
role of cryptographic methods. While blockchain's
decentralized nature offers enhanced data
transparency, it also raises privacy concerns, as
transaction details are often accessible to all
participants in the network. The study concludes that
relying solely on application and smart contract layers
to address these privacy concerns is insufficient.
Instead, it advocates for the integration of advanced
cryptographic techniques that can complement each
other to meet the diverse demands of different use
cases. By utilizing these cryptographic methods,
blockchain systems can achieve more robust privacy
protection, ensuring both security and confidentiality.
Future research should focus on developing tailored
privacy solutions that balance transparency with