Privacy-Preserving Anomaly Detection of Encrypted Smart Contract for Blockchain-Based Data Trading

被引:11
作者
Chen, Dajiang [1 ]
Liao, Zeyu [1 ]
Chen, Ruidong [2 ]
Wang, Hao [1 ]
Yu, Chong [3 ]
Zhang, Kuan [3 ]
Zhang, Ning [4 ]
Shen, Xuemin [5 ]
机构
[1] Univ Elect Sci & Technol China, Sch Informat & Software Engn, Network & Data Secur Key Lab Sichuan Prov, Chengdu 611731, Peoples R China
[2] Univ Elect Sci & Technol China, Sch Comp Sci Engn, Chengdu 611731, Peoples R China
[3] Univ Nebraska, Dept Elect & Comp Engn, Lincoln, NE 68588 USA
[4] Univ Windsor, Dept Elect & Comp Engn, Windsor, ON N9B 3P4, Canada
[5] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON N2L 3G1, Canada
关键词
Cryptography; Smart contracts; Inspection; Malware; Data centers; Blockchains; Detectors; Data trading platform; encrypted smart contract; malicious code detection; privacy-preserving; SECURE; CHANNEL; ACCESS;
D O I
10.1109/TDSC.2024.3353827
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In a blockchain-based data trading platform, data users can purchase data sets and computing power through encrypted smart contracts. The security of smart contracts is important as it relates to that of the data platform. However, due to the inability to apply to detection rules with complex structures and the inefficiency of detection, existing malicious code detection methods are not suitable for the encrypted smart contracts in blockchain-based data trading platforms with high transaction rate requirements. In this article, a practical and privacy-preserving malicious code detection method is proposed for encrypted smart contract in blockchain-based data trading platform. Specifically, we design two kinds of miners to act as the malicious rule processor and the detector respectively for inspecting the encrypted smart contract. The rule processor generates an obfuscated map with the original open-source malicious rule set. The detector performs a malicious inspection algorithm by inputting the obfuscated map and the randomized tokens, where the latter is generated from smart contract. Then, we theoretically analyze the security syntax of the proposed method. The analysis results demonstrate the proposed scheme can achieve L-secure against adaptive attacks. Extensive experiments are carried out through the open-source real rule sets, which show that the proposed scheme can reduce communication time and communication overhead.
引用
收藏
页码:4510 / 4525
页数:16
相关论文
共 49 条
[1]   Online Proactive Caching in Mobile Edge Computing Using Bidirectional Deep Recurrent Neural Network [J].
Ale, Laha ;
Zhang, Ning ;
Wu, Huici ;
Chen, Dajiang ;
Han, Tao .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (03) :5520-5530
[2]   Secure Crowdsensed Data Trading Based on Blockchain [J].
An, Baoyi ;
Xiao, Mingjun ;
Liu, An ;
Xu, Yun ;
Zhang, Xiangliang ;
Li, Qing .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2023, 22 (03) :1763-1778
[3]  
Bellare M, 1996, LECT NOTES COMPUT SC, V1070, P399
[4]   BlindIDS: Market-Compliant and Privacy-Friendly Intrusion Detection System over Encrypted Traffic [J].
Canard, Sebastien ;
Diop, Aida ;
Kheir, Nizar ;
Paindavoine, Marie ;
Sabt, Mohamed .
PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17), 2017, :561-574
[5]   Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation [J].
Cash, David ;
Jaeger, Joseph ;
Jarecki, Stanislaw ;
Jutla, Charanjit ;
Krawczyk, Hugo ;
Rosu, Marcel-Catalin ;
Steine, Michael .
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
[6]   On Message Authentication Channel Capacity Over a Wiretap Channel [J].
Chen, Dajiang ;
Jiang, Shaoquan ;
Zhang, Ning ;
Liu, Lei ;
Choo, Kim-Kwang Raymond .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 :3107-3122
[7]   Privacy-Preserving Encrypted Traffic Inspection With Symmetric Cryptographic Techniques in IoT [J].
Chen, Dajiang ;
Wang, Hao ;
Zhang, Ning ;
Nie, Xuyun ;
Dai, Hong-Ning ;
Zhang, Kuan ;
Choo, Kim-Kwang Raymond .
IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (18) :17265-17279
[8]   MAGLeak: A Learning-Based Side-Channel Attack for Password Recognition With Multiple Sensors in IIoT Environment [J].
Chen, Dajiang ;
Zhao, Zihao ;
Qin, Xue ;
Luo, Yaohua ;
Cao, Mingsheng ;
Xu, Hua ;
Liu, Anfeng .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (01) :467-476
[9]   QoE-Aware Decentralized Task Offloading and Resource Allocation for End-Edge-Cloud Systems: A Game-Theoretical Approach [J].
Chen, Ying ;
Zhao, Jie ;
Wu, Yuan ;
Huang, Jiwei ;
Shen, Xuemin .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2024, 23 (01) :769-784
[10]   Searchable symmetric encryption: Improved definitions and efficient constructions [J].
Curtmola, Reza ;
Garay, Juan ;
Kamara, Seny ;
Ostrovsky, Rafail .
JOURNAL OF COMPUTER SECURITY, 2011, 19 (05) :895-934