Leveraging Intel SGX to enable trusted and privacy preserving membership service in distributed ledgers

被引:0
作者
Liang X. [1 ,2 ,3 ]
Shetty S.
Tosh D.K. [4 ]
Foytik P. [3 ]
Zhang L. [1 ]
机构
[1] Institute of Information Engineering, Chinese Academy of Sciences, Beijing
[2] School of Cyber Security, University of Chinese Academy of Sciences, Beijing
[3] Virginia Modeling, Analysis and Simulation Center, Old Dominion University, Norfolk, VA
[4] Department of Computer Science, University of Texas at EL Paso, El Paso, TX
来源
Int. J. Inf. Comput. Secur. | 2021年 / 1-2卷 / 63-83期
关键词
Blockchain; Channel; Distributed ledger; Intel SGX; Membership service; Privacy; Security;
D O I
10.1504/ijics.2021.10040713
中图分类号
学科分类号
摘要
Distributed ledger technology (DLT) provides decentralised services by removing the need of trust among distributed nodes in the distributed system. Transactions across the network are visible to all participants. However, some transactions may contain sensitive information such as business contracts or even personal health records. To protect user privacy, the architecture of distributed multi-channel ledger with membership service as a critical component can be adopted. The proposed multi-channel membership service architecture combines two promising technologies, distributed ledger and Intel Software Guard Extensions (SGX). With SGX remote attestation and isolated execution, each node is enrolled as a trusted entity to the channels, which separate different applications and provide better flexibility. We propose security properties for membership service in distributed ledger and illustrate how SGX help to achieve these properties in each phase. Security analysis and evaluation show that the proposed architecture could enhance the privacy preservation and capabilities against attacks. Copyright © 2021 Inderscience Enterprises Ltd.
引用
收藏
页码:63 / 83
页数:20
相关论文
共 20 条
[11]  
Jia X., Auditing the Auditor: Secure Delegation of Auditing Operation over Cloud Storage, IACR Cryptology ePrint Archive, (2016)
[12]  
Jia Y., Tople S., Moataz T., Gong D., Saxena P., Liang Z., Robust Synchronous P2P Primitives Using SGX Enclaves, (2017)
[13]  
Johnson S., Scarlata V., Rozas C., Brickell E., Mckeen F., Intel Software Guard Extensions: EPID Provisioning and Attestation Services, (2016)
[14]  
Lind J., Eyal I., Pietzuch P., Sirer E.G., Teechan: Payment Channels Using Trusted Execution Environments, (2016)
[15]  
McKeen F., Alexandrovich I., Berenzon A., Rozas C.V., Shafi H., Shanbhogue V., Savagaonkar U.R., Innovative instructions and software model for isolated execution, HASP@ISCA, (2013)
[16]  
Milutinovic M., He W., Wu H., Kanwal M., Proof of luck: an efficient blockchain consensus protocol, Proceedings of the 1st Workshop on System Software for Trusted Execution, (2016)
[17]  
Nakamoto S., Bitcoin: A Peer-to-Peer Electronic Cash System, (2008)
[18]  
Pretre B., Attacks on Peer-to-Peer Networks, (2005)
[19]  
van Renesse R., A Blockchain Based on Gossip?, (2017)
[20]  
Walport M., Distributed Ledger Technology: Beyond Blockchain, (2016)