MPV: Enabling Fine-Grained Query Authentication in Hybrid-Storage Blockchain

被引:2
作者
Liu, Qin [1 ]
Peng, Yu [1 ]
Xu, Mingzuo [1 ]
Jiang, Hongbo [1 ]
Wu, Jie [2 ]
Wang, Tian [3 ,4 ]
Peng, Tao [5 ]
Wang, Guojun [5 ]
机构
[1] Hunan Univ, Coll Comp Sci & Elect Engn, Changsha 410082, Hunan, Peoples R China
[2] Temple Univ, Dept Comp & Informat Sci, Philadelphia, PA 19122 USA
[3] Beijing Normal Univ, Inst Artificial Intelligence & Future Networks, Zhuhai 519000, Guangdong, Peoples R China
[4] UIC, Zhuhai 519000, Guangdong, Peoples R China
[5] Guangzhou Univ, Sch Comp Sci & Cyber Engn, Guangzhou 510006, Guangdong, Peoples R China
关键词
Blockchains; Authentication; Costs; Metadata; Threat modeling; Streams; Smart contracts; Blockchain; error locating; fine-grained authentication; hybrid storage; range query; CLOUD; EFFICIENT; SECURE; AGGREGATION; INTEGRITY; SCHEME;
D O I
10.1109/TKDE.2024.3359173
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Due to the large-scale data streams produced by distributed terminals, hybrid-storage blockchain (HSB) that combines on-chain and off-chain storages has emerged as a promising solution for secure data storage in decentralized applications. Because all the raw data is outsourced to an untrusted service provider (SP), existing solutions suggest to utilize an on-chain authenticated data structure (ADS) to verify query results retrieved off-chain. However, existing solutions support only coarse-grained authentication making a user abandon all the query results once the validation fails. In this article, we focus on realizing fine-grained authentication for range queries, enabling a user to distinguish authentic data from falsified results. Considering the heavy gas consumption of on-chain storage, we propose two multi-dimensional parity-based verification (MPV) schemes with a trade-off between off-chain and on-chain efficiencies. Our main idea is to design an accumulator-based ADS to summarize well-designed verifiable hypercubes, so that fake results can be quickly located by combining multi-dimensional faces failed validation. Compared with previous solutions, our MPV schemes allow a user to make efficient use of query results by filtering out errors, and thus have higher data utility. The detailed security analysis and extensive experiments demonstrate the security and effectiveness of our MPV schemes, respectively.
引用
收藏
页码:3297 / 3311
页数:15
相关论文
共 36 条
  • [1] Camenisch J, 2002, LECT NOTES COMPUT SC, V2442, P61
  • [2] LVQ: A Lightweight Verifiable Query Approach for Transaction History in Bitcoin
    Dai, Xiaohai
    Xiao, Jiang
    Yang, Wenhui
    Wang, Chaofan
    Chang, Jian
    Han, Rui
    Jin, Hai
    [J]. 2020 IEEE 40TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS), 2020, : 1020 - 1030
  • [3] Gennaro R, 1999, LECT NOTES COMPUT SC, V1592, P123
  • [4] Obscure: Information-Theoretically Secure, Oblivious, and Verifiable Aggregation Queries on Secret-Shared Outsourced Data
    Gupta, Peeyush
    Li, Yin
    Mehrotra, Sharad
    Panwar, Nisha
    Sharma, Shantanu
    Almanee, Sumaya
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2022, 34 (02) : 843 - 864
  • [5] Freshness Authentication for Outsourced Multi-Version Key-Value Stores
    Hu, Yidan
    Yao, Xin
    Zhang, Rui
    Zhang, Yanchao
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (03) : 2071 - 2084
  • [6] Full integrity and freshness for cloud data
    Jin, Hao
    Zhou, Ke
    Jiang, Hong
    Lei, Dongliang
    Wei, Ronglei
    Li, Chunhua
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 80 : 640 - 652
  • [7] Kittur A., 2019, P INT C SEC PRIV, P53
  • [8] Li CT, 2010, INT J INNOV COMPUT I, V6, P5311
  • [9] Liu Q., 2023, IEEE Trans. Dependable Secure Comput., DOI [10.1109/TDSC..1109/TDSC.2023.3299337, DOI 10.1109/TDSC..1109/TDSC.2023.3299337]
  • [10] SlimBox: Lightweight Packet Inspection over Encrypted Traffic
    Liu, Qin
    Peng, Yu
    Jiang, Hongbo
    Wu, Jie
    Wang, Tian
    Peng, Tao
    Wang, Guojun
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (05) : 4359 - 4371