Consensus Protocols for Blockchain-based Data Provenance: Challenges and Opportunities

被引:0
作者
Tosh, Deepak K. [1 ]
Shetty, Sachin [2 ]
Liang, Xueping [3 ]
Kamhoua, Charles [4 ]
Njilla, Laurent [5 ]
机构
[1] Norfolk State Univ, Dept Comp Sci, Norfolk, VA 23504 USA
[2] Old Dominion Univ, Virginia Modeling Anal & Simulat Ctr, Norfolk, VA USA
[3] Tennessee State Univ, Coll Engn, Nashville, TN 37203 USA
[4] US Army, Res Lab, Adelphi, MD USA
[5] US Air Force, Res Lab, Cyber Assurance Branch, Rome, NY USA
来源
2017 IEEE 8TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS AND MOBILE COMMUNICATION CONFERENCE (UEMCON) | 2017年
关键词
Blockchain; cloud computing; Data provenance; Distributed consensus; Proof of work (PoW); Proof of stake (PoS);
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Blockchain has recently attracted tremendous interest due to its ability to enhance security and privacy through a immutable shared distributed ledger. Blockchain's ability to detect integrity violations are particularly key in providing assured data provenance in cloud platform. The practical adoption of blockchain will largely hinge on consensus protocols meeting performance and security guarantees. In this paper, we present the design issues for consensus protocols for blockchain based cloud provenance. We present the blockchain based data provenance framework for cloud. We find that there are performance and security challenges in adopting proof-of-work consensus protocol within this framework. We present unique design challenges and opportunities in developing proof-of-stake for data provenance in cloud platform.
引用
收藏
页码:469 / +
页数:6
相关论文
共 11 条
[1]  
Bentov Iddo, 2014, ACM SIGMETRICS Performance Evaluation Review, V42, P34
[2]   Practical byzantine fault tolerance and proactive recovery [J].
Castro, M ;
Liskov, B .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2002, 20 (04) :398-461
[3]   Proofs of Space [J].
Dziembowski, Stefan ;
Faust, Sebastian ;
Kolmogorov, Vladimir ;
Pietrzak, Krzysztof .
ADVANCES IN CRYPTOLOGY, PT II, 2015, 9216 :585-605
[4]   Majority Is Not Enough: Bitcoin Mining Is Vulnerable [J].
Eyal, Ittay ;
Sirer, Emin Guen .
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2014, 2014, 8437 :436-454
[5]   Bitcoin blockchain dynamics: The selfish-mine strategy in the presence of propagation delay [J].
Goebel, J. ;
Keeler, H. P. ;
Krzesinski, A. E. ;
Taylor, P. G. .
PERFORMANCE EVALUATION, 2016, 104 :23-41
[6]  
King S., 2012, PPCOIN PEER TO UNPUB
[7]   ProvChain: A Blockchain-based Data Provenance Architecture in Cloud Environment with Enhanced Privacy and Availability [J].
Liang, Xueping ;
Shetty, Sachin ;
Tosh, Deepak ;
Kamhoua, Charles ;
Kwiat, Kevin ;
Njilla, Laurent .
2017 17TH IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND GRID COMPUTING (CCGRID), 2017, :468-477
[8]  
Nakamoto S., 2008, Bitcoin: A Peer-to-Peer Electronic Cash System
[9]  
Nguyen J. P. D., 2012, DEPENDENCY PATH PATT
[10]  
Shetty S., 2017, SPIE DEF SEC C