Research on Data Transaction Security Based on Blockchain
Abstract
:1. Introduction
2. Materials and Methods
2.1. Methods
2.1.1. Oblivious Transfer
- User A generates two messages and ;
- User B selects one digit and enters ;
- User A interacts with user B. User A enters messages and , user B enters , and the program returns to user B.
2.1.2. Homomorphic Encryption Algorithm
2.1.3. Elliptic Curve Encryption
2.1.4. Zero-Knowledge Proof Techniques
- Step. 1
- Make
- Step. 2
- Set to
- Step. 3
- calculation:
- Step. 4
- Calculate and separately
- Step. 5
- checks the correctness of and to trust .
2.2. Solution Model
2.3. Program Overview
2.3.1. Initialization Phase
- Users register as data owners or data consumers on the blockchain according to their own needs;
- The data owner obtains their own public and private key pair according to the decentralized key management scheme;
- If the user needs to purchase data, they find the data they need through the data digest on the blockchain;
- If the user needs to sell the data, the data are encrypted, hashed, and signed, the data ciphertext and signature are uploaded to the IPFS distributed file system, and the data summary is recorded on the blockchain.
2.3.2. Data Encryption Phase
- Step. 1
- The data owner divides the data that needs to be sold into n equal parts: ;
- Step. 2
- The data owner uses the AES encryption algorithm to generate n symmetric keys and uses these symmetric keys to encrypt the split file:
- Step. 3
- The data owner uses a collision-resistant hash function to hash the plaintext and symmetric key:
- Step. 4
- The data owner encrypts symmetric key using an improved homomorphic encryption algorithm as follows:
- (1)
- The data owner locally generates an elliptic curve and a random base point on the curve, and at the same time chooses different private keys to generate a public-key-encrypted plaintext to enhance the security of the whole plaintext;
- (2)
- The data owner multiplies the base point with the private key to generate the public key , where ; the client saves the private key to local storage;
- (3)
- In order to encrypt the symmetric key , the data owner should embed the symmetric key into the selected elliptic curve to obtain the symmetric key text point ;
- (4)
- The data owner randomly generates an integer , where the random number and n are the order of the base point . Then, the public key , the random number , and the base point are used to encrypt the plaintext pointThe encrypted symmetric key ciphertext is: )… );
- (5)
- The local client of the data owner sends ciphertext and symmetric key ciphertext to the IPFS’s distributed file system for storage.
2.3.3. Transaction Verification Phase
- Step. 1
- Identity account verification
- (1)
- The data consumer submits an authentication request for an identity account to the data owner.
- (2)
- The data owner asks the data consumer to prove the account they own: the data owner looks for the corresponding , uses it to encrypt a random number , and then returns and their to the data consumer.
- (3)
- The data consumer proves they have an account:
- The data consumer uses to generate and then decrypts ;
- The data consumer gets , picks another random number , encrypts and using the data owner’s public key , and returns and to the data owner.
- (4)
- The data owner authenticates the account identity of the data consumer and proves that they own the data:
- The data owner decrypts , and if is equal to , the identity authentication of the data consumer is passed;
- The data owner decrypts and then uses as a factor of symmetric encryption C to transmit the following normal communication content to the data consumer encryption n: .
- (5)
- The data consumer authenticates the identity of the data owner:
- Step. 2
- Transaction data verification
- (1)
- The data owner and the data consumer generate t random numbers and , respectively, and compute the hash , of these random numbers;
- (2)
- The data owner and the data consumer exchange the hashes and of the random numbers, and then exchange the generated random numbers and to determine that the sequence number of the data to be verified is , where n is the fraction of the data segmentation;
- (3)
- The data owner combines the symmetric key corresponding to the sequence number of the verification data with the random number used to encrypt the symmetric key using the homomorphic encryption algorithm, and sends it to the data consumer after encryption with the public key of the data consumer (dc):
- (4)
- After using its private key dc, the data consumer uses its symmetric key to decrypt the downloaded ciphertext to obtain the plaintext :
- (5)
- The data consumer checks whether the plaintext after decryption is consistent with the data summary, uses the obtained random number to encrypt the symmetric key again with the homomorphic encryption algorithm, checks whether the ciphertext is consistent, and calculates the hash of the plaintext and symmetric key to check whether they are consistent.
- Step. 3
- Transaction amount verification
- (1)
- The data consumer sets
- (2)
- The smart contract computes:
- (3)
- The data consumer and smart contract’s keys are calculated separately
- (4)
- The smart contract checks the correctness of and to believe , which is . If the verification is successful, it proves that the transaction amount is greater than 0.
- Step. 4
- Data decryption phase
3. Results and Discussion
3.1. Security Analysis
- 1.
- Public-key substitution attack
- 2.
- Tampering attack
- 3.
- Safety strength
3.2. Performance Analysis
3.3. Efficiency Analysis
3.4. Scheme Comparison
4. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Deepa, N.; Pham, Q.V.; Nguyen, D.C.; Bhattacharya, S.; Prabadevi, B.; Gadekallu, T.R.; Maddikunta, P.K.; Fang, F.; Pathirana, P.N. A survey on blockchain for big data: Approaches, opportunities, and future directions. Future Gener. Comput. Syst. 2022, 131, 209–226. [Google Scholar] [CrossRef]
- Ke, X. Ternary Governance of Data Transaction Circulation: Technology, Standards and Law. J. Jishou Univ. (Soc. Sci. Ed.) 2022, 43, 96. [Google Scholar]
- Xu, L. Analysis of the application of blockchain in data transactions. Think Tank Times 2018, 38–39. [Google Scholar]
- Jian, Y.; Zhong, W. Research on Personal Data Traceability Management System in Big Data Environment. Inf. Sci. 2016, 34, 139–143. [Google Scholar]
- Sun, G.; Li, Z.; Xiao, R.; Yang, J.; Wang, X. Research on Blockchain Transaction Security. J. Nanjing Univ. Posts Telecommun. Nat. Sci. Ed. 2021, 41, 36–48. [Google Scholar]
- Mallick, S.R.; Sharma, S. EMRI: A scalable and secure Blockchain-based IoMT framework for healthcare data transaction. In Proceedings of the 2021 19th OITS International Conference on Information Technology (OCIT), Bhubaneswar, India, 16–18 December 2021; pp. 261–266. [Google Scholar] [CrossRef]
- Guo, H.; Cheng, J.; Wang, J.; Chen, T.; Yuan, Y.; Li, H.; Sheng, V.S. IoT Data Blockchain-Based Transaction Model Using Zero-Knowledge Proofs and Proxy Re-encryption. In Proceedings of the International Conference on Artificial Intelligence and Security, Qinghai China, 22–26 July 2022; Springer: Cham, Switzerland, 2022; pp. 573–586. [Google Scholar]
- Hwang, R.J.; Lai, C.H. Provable fair document exchange protocol with transaction privacy for ecommerce. Symmetry 2015, 7, 464–487. [Google Scholar] [CrossRef] [Green Version]
- Delgado-Segura, S.; Pérez-Solà, C.; Navarro-Arribas, G.; Herrera-Joancomartí, J. A fair protocol for data trading based on Bitcoin transactions. Future Gener. Comput. Syst. 2019, 107, 832–840. [Google Scholar] [CrossRef] [Green Version]
- Kiyomoto, S.; Fukushima, K. Fair-trading protocol for anonymised datasets requirements and solution. In Proceedings of the 2018 4th International Conference on Information Management (ICIM), Oxford, UK, 25–27 May 2018; pp. 13–16. [Google Scholar]
- Wang, D.; Gao, J.; Yu, H.; Li, X. A Novel Digital Rights Management in P2P Networks Based on Bitcoin System. In Proceedings of the International Conference on Frontiers in Cyber Security. IEEE, Chengdu, China, 5–7 November 2018; Springer: Singapore, 2018; pp. 227–240. [Google Scholar]
- Zhao, Y.; Yu, Y.; Li, Y.; Han, G.; Du, X. Machine learning based privacy-preserving fair data trading in big data market. Inf. Sci. 2019, 478, 449–460. [Google Scholar] [CrossRef]
- Missier, P.; Bajoudah, S.; Capossele, A.; Gaglione, A.; Nati, M. Mind My Value: A decentralized infrastructure for fair and trusted loT data trading. In Proceedings of the Seventh International Conference on the Internet of Things. ACM, Linz, Austria, 22–25 October 2017; p. 15. [Google Scholar]
- Alrawahi, A.S.; Lee, K.; Lotfi, A. Trading of cloud of things resources. In Proceedings of the Second International Conference on Internet of things and Cloud Computing. ACM, Cambridge, UK, 22–23 March 2017; p. 163. [Google Scholar]
- Lin, S.J.; Liu, D.C. A fair-exchange and customer-anonymity electronic commerce protocol for digital content transactions. In Proceedings of the International Conference on Distributed Computing and Internet Technology, Bangalore, India, 17–20 December 2007; Springer: Berlin/Heidelberg, Germany, 2007; pp. 321–326. [Google Scholar]
- Cattelan, R.G.; He, S.; Kirovski, D. Prototyping a novel platform for free-trade of digital content. In Proceedings of the 12th Brazilian Symposium on Multimedia and the Web. ACM, Natal Rio Grande do Norte, Brazil, 19–22 November 2006; pp. 79–88. [Google Scholar]
- Perera, C. Sensing as a service (S2aaS): Buying and selling IoT data. arXiv 2017, arXiv:1702.02380. [Google Scholar]
- Lin, S.J.; Liu, D.C. An incentive-based electronic payment scheme for digital content transactions over the Internet. J. Netw. Comput. Appl. 2009, 32, 589–598. [Google Scholar] [CrossRef]
- Huang, Z.; Su, X.; Zhang, Y.; Shi, C.; Zhang, H.; Xie, L. A decentralized solution for loT data trusted exchange based-on blockchain. In Proceedings of the 2017 3rd IEEE International Conference on Computer and Communications (ICCC), IEEE, Chengdu, China, 13–16 December 2017; pp. 1180–1184. [Google Scholar]
- Fan, C.I.; Juang, W.S.; Chen, M.T. Efficient fair content exchange in cloud computing. In Proceedings of the 2010 International Computer Symposium (1CS2010), IEEE, Tainan, Taiwan, 16–18 December 2010; pp. 294–299. [Google Scholar]
- Qian, W.; Qi, S. A Fair Transaction Protocol with an Offline Semi-Trusted Third Party. In Advances in Intelligent Decision Technologies; Springer: Berlin/Heidelberg, Germany, 2010; pp. 249–257. [Google Scholar]
- Bensitel, Y.; Romadi, R. Secure data storage in the cloud with homomorphic encryption. In Proceedings of the International Conference on Cloud Computing Technologies and Applications IEEE, Marrakech, Morocco, 24–26 May 2017; pp. 1–6. [Google Scholar]
- Li, Z.; Zhang, F.; Wang, P. Highly efficient fully homomorphic encryption scheme with shorter publickeys. Comput. Appl. Res. 2017, 34, 487–489. (In Chinese) [Google Scholar]
- Zou, Y. Research on cloud storage encryption based on ellip-tic curve. Cyberspace Secur. 2017, 8, 21–23. (In Chinese) [Google Scholar]
- Huang, R. Information security system based on ellip-tic curve encryption algorithm. J. Neijiang Teac-Hers Coll. 2017, 32, 72–76. (In Chinese) [Google Scholar]
- Wu, Q.; Zhang, J.; Wang, Y. Simple proofthat a committed number is in a specific interval. ActaElectronica Sin. 2004, 32, 1071–1073. (In Chinese) [Google Scholar]
- Yao, Y.; Chang, X.; Zhen, P. Decentralized Identity Authentication and Key Management Scheme Based on Blockchain. Cyberspace Secur. 2019, 10, 33–39. [Google Scholar]
Deciphering Time/Years | Key Length of RSA, DSA/Bit | Key Length of ECC/Bit | Key Length Ratio of RSA, ECC |
---|---|---|---|
512 | 106 | 5:1 | |
768 | 132 | 6:1 | |
1024 | 160 | 7:1 | |
2048 | 210 | 10:1 | |
21,000 | 600 | 35:1 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Jiang, Y.; Sun, G.; Feng, T. Research on Data Transaction Security Based on Blockchain. Information 2022, 13, 532. https://doi.org/10.3390/info13110532
Jiang Y, Sun G, Feng T. Research on Data Transaction Security Based on Blockchain. Information. 2022; 13(11):532. https://doi.org/10.3390/info13110532
Chicago/Turabian StyleJiang, Yongbo, Gongxue Sun, and Tao Feng. 2022. "Research on Data Transaction Security Based on Blockchain" Information 13, no. 11: 532. https://doi.org/10.3390/info13110532
APA StyleJiang, Y., Sun, G., & Feng, T. (2022). Research on Data Transaction Security Based on Blockchain. Information, 13(11), 532. https://doi.org/10.3390/info13110532