Building Redactable Consortium Blockchain for Industrial Internet-of-Things

被引:88
作者
Huang, Ke [1 ]
Zhang, Xiaosong [1 ]
Mu, Yi [2 ]
Wang, Xiaofen [1 ]
Yang, Guomin [3 ]
Du, Xiaojiang [4 ]
Rezaeibagha, Fatemeh [5 ]
Xia, Qi [1 ]
Guizani, Mohsen [6 ]
机构
[1] Univ Elect Sci & Technol China, Ctr Cyber Secur, Coll Comp Sci & Engn, Chengdu 611731, Sichuan, Peoples R China
[2] Fujian Normal Univ, Coll Math & Informat, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou 350007, Fujian, Peoples R China
[3] Univ Wollongong, Sch Comp & Informat Technol, Inst Cybersecur & Cryptol, Wollongong, NSW 2519, Australia
[4] Temple Univ, Dept Comp & Informat Sci, Philadelphia, PA 19122 USA
[5] Univ Wollongong, SMART Infrastruct, Wollongong, NSW 2519, Australia
[6] Univ Idaho, Dept Elect & Comp Engn, Moscow, ID 83843 USA
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Chameleon hash (CH); chameleon signature (CS); consortium blockchain; industrial Internet-of-Things (IIoT); sanitization; KEY MANAGEMENT SCHEME; SANITIZABLE SIGNATURES; SECURITY;
D O I
10.1109/TII.2019.2901011
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Applying consortium blockchain as a trust layer for heterogeneous industrial Internet-of-Things devices is cost-effective. However, with an increase in computing power, some powerful attacks (e.g., the 51% attack) are inevitable and will cause severe consequences. Recent studies also confirm that anonymity and immutability of blockchain have been abused to facilitate black market trades, etc. To operate controllable blockchain for IIoT devices, it is necessary to rewrite blockchain history back to a normal state once the chain is breached. Ateniese et al. proposed redactable blockchain by using chameleon hash (CH) to replace traditional hash function, it allows blockchain history to be written when needed (EuroS&P 2017). However, we cannot apply this idea directly to IIoT without solving the following problems: (1) achieve a decentralized design of CH; (2) update the signatures accordingly to authenticate the redacted contents; (3) satisfy the low-computing need of the individual IIoT device. In this paper, we overcome the above issues by proposing the first threshold chameleon hash (TCH) and accountable-and-sanitizable chameleon signature (ASCS) schemes. Based on them, we build a redactable consortium blockchain which is efficient for IIoT devices to operate. It allows a group of authorized sensors to write and rewrite blockchain without causing any hard forks. Basically, TCH is the first TCH and ASCS is a public-key signature supporting file-level and block-level modifications of signatures without impairing authentications. Additionally, ASCS achieves accountability to avoid abuse of redaction. While security analysis validates our proposals, the simulation results show that redaction is acceptably efficient if it is executed at a small scale or if we adopt a coarse-grained redaction while sacrificing some securities.
引用
收藏
页码:3670 / 3679
页数:10
相关论文
共 34 条
[1]  
Ali M, 2016, PROCEEDINGS OF USENIX ATC '16: 2016 USENIX ANNUAL TECHNICAL CONFERENCE, P181
[2]  
Ateniese G, 2005, LECT NOTES COMPUT SC, V3679, P159
[3]  
Ateniese G, 2005, LECT NOTES COMPUT SC, V3352, P165
[4]  
Ateniese G, 2004, LECT NOTES COMPUT SC, V3110, P164
[5]   Redactable Blockchain - or - Rewriting History in Bitcoin and Friends [J].
Ateniese, Giuseppe ;
Magri, Bernardo ;
Venturi, Daniele ;
Andrade, Ewerton R. .
2017 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P), 2017, :111-126
[6]   Position Paper: The Past, Present, and Future of Sanitizable and Redactable Signatures [J].
Bilzhause, Arne ;
Poehls, Henrich C. ;
Samelin, Kai .
PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017), 2017,
[7]  
Boneh D., 2001, LNCS, P514, DOI [DOI 10.1007/3-540-45682-1_30, 10.1007/s00145-004-0314-9, DOI 10.1007/3-540-45682-130]
[8]  
Brzuska C, 2010, LECT NOTES COMPUT SC, V6056, P444
[9]  
Brzuska C, 2009, LECT NOTES COMPUT SC, V5443, P317
[10]  
Camenisch J, 1997, LECT NOTES COMPUT SC, V1294, P410