ZT-BDS: A Secure Blockchain-based Zero-trust Data Storage Scheme in 6G Edge IoT

被引:10
作者
Han, Chenchen [1 ]
Kim, Gwang-Jun [2 ]
Alfarraj, Osama [3 ]
Tolba, Amr [3 ]
Ren, Yongjun [4 ]
机构
[1] Fujian Univ Technol, Sch Comp Sci & Math, Fuzhou, Fujian, Peoples R China
[2] Chonnam Natl Univ, Dept Comp Engn, Gwangju, South Korea
[3] King Saud Univ, Community Coll, Dept Comp Sci, Riyadh, Saudi Arabia
[4] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Nanjing, Jiangsu, Peoples R China
来源
JOURNAL OF INTERNET TECHNOLOGY | 2022年 / 23卷 / 02期
基金
中国国家自然科学基金;
关键词
Blockchain; Zero-trust; 6G edge network; Polynomial commitment; Proof of recoverability; ARCHITECTURE; MECHANISM; INTERNET; SYSTEM;
D O I
10.53106/160792642022032302009
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of 6G communication technology, data security of the Internet of Things (IoT) has become a key challenge. This paper first analyzes the security issues and risks of IoT data storage in 6G, and then constructs a blockchain-based zero-trust data storage scheme (ZT-BDS) in 6G edge IoT to ensure data security. Under this framework, an improved scratch-off puzzle based on Proof of Recoverability (PoR) is firstly constructed to realize distributed IoT data storage, which can reduce resource consumption compared with other existing schemes. Secondly, the accumulator is used to replace the Merkle trees to store IoT data in the blockchain. Since the accumulator can provide not only membership proof, but also non-membership proof, the proposed blockchain-based data storage scheme is more secure. Thirdly, PoW is replaced by an improved PoR scheme as the consensus protocol. On the one hand, PoR can verify the integrity of data, which will further enhance the security of IoT data; on the other hand, the proposed PoR is composed of polynomial commitment, which can reduce bandwidth with the aid of the aggregation function of polynomial commitment. Experimental comparisons show that our scheme has better bandwidth and storage capacity.
引用
收藏
页码:289 / 295
页数:7
相关论文
共 38 条
  • [1] Batching Techniques for Accumulators with Applications to IOPs and Stateless Blockchains
    Boneh, Dan
    Bunz, Benedikt
    Fisch, Ben
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT 1, 2019, 11692 : 561 - 586
  • [2] Dunn A. M., 2011, 20 USENIX SEC S SAN, P1
  • [3] Embrey B., 2020, Journal of Computer Fraud Security, P13, DOI DOI 10.1016/S1361-3723
  • [4] Secure Keyword Search and Data Sharing Mechanism for Cloud Computing
    Ge, Chunpeng
    Susilo, Willy
    Liu, Zhe
    Xia, Jinyue
    Szalachowski, Pawel
    Fang Liming
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (06) : 2787 - 2800
  • [5] Revocable Identity-Based Broadcast Proxy Re-Encryption for Data Sharing in Clouds
    Ge, Chunpeng
    Liu, Zhe
    Xia, Jinyue
    Fang, Liming
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (03) : 1214 - 1226
  • [6] Toward 6G Networks: Use Cases and Technologies
    Giordani, Marco
    Polese, Michele
    Mezzavilla, Marco
    Rangan, Sundeep
    Zorzi, Michele
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2020, 58 (03) : 55 - 61
  • [7] From blockchain consensus back to Byzantine consensus
    Gramoli, Vincent
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 107 : 760 - 769
  • [8] Bubbles of Trust: A decentralized blockchain-based authentication system for IoT
    Hammi, Mohamed Tahar
    Hammi, Badis
    Bellot, Patrick
    Serhrouchni, Ahmed
    [J]. COMPUTERS & SECURITY, 2018, 78 : 126 - 142
  • [9] Edge Computing in 5G: A Review
    Hassan, Najmul
    Yau, Kok-Lim Alvin
    Wu, Celimuge
    [J]. IEEE ACCESS, 2019, 7 : 127276 - 127289
  • [10] A Game-Based Price Bidding Algorithm for Multi-Attribute Cloud Resource Provision
    Hu, Junyan
    Li, Kenli
    Liu, Chubo
    Li, Keqin
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2021, 14 (04) : 1111 - 1122