Fine-Grained, Secure and Efficient Data Provenance on Blockchain Systems

被引:114
作者
Ruan, Pingcheng [1 ]
Chen, Gang [2 ]
Tien Tuan Anh Dinh [1 ]
Lin, Qian [1 ]
Ooi, Beng Chin [1 ]
Zhang, Meihui [3 ]
机构
[1] Natl Univ Singapore, Singapore, Singapore
[2] Zhejiang Univ, Hangzhou, Zhejiang, Peoples R China
[3] Beijing Inst Technol, Beijing, Peoples R China
来源
PROCEEDINGS OF THE VLDB ENDOWMENT | 2019年 / 12卷 / 09期
关键词
D O I
10.14778/3329772.3329775
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The success of Bitcoin and other cryptocurrencies bring enormous interest to blockchains. A blockchain system implements a tamper-evident ledger for recording transactions that modify some global states. The system captures entire evolution history of the states. The management of that history, also known as data provenance or lineage, has been studied extensively in database systems. However, querying data history in existing blockchains can only be done by replaying all transactions. This approach is applicable to large-scale, offline analysis, but is not suitable for online transaction processing. We present LineageChain, a fine-grained, secure and efficient provenance system for blockchains. LineageChain exposes provenance information to smart contracts via simple and elegant interfaces, thereby enabling a new class of blockchain applications whose execution logics depend on provenance information at runtime. LineageChain captures provenance during contract execution, and efficiently stores it in a Merkle tree. LineageChain provides a novel skip list index designed for supporting efficient provenance query processing. We have implemented LineageChain on top of Hyperledger and a blockchain-optimized storage system called ForkBase. Our extensive evaluation of LineageChain demonstrates its benefits to the new class of blockchain applications, its efficient query, and its small storage overhead.
引用
收藏
页码:975 / 988
页数:14
相关论文
共 34 条
[1]  
[Anonymous], CONSENSUS AGE BLOCKC
[2]   A Survey of Attacks on Ethereum Smart Contracts (SoK) [J].
Atzei, Nicola ;
Bartoletti, Massimo ;
Cimoli, Tiziana .
PRINCIPLES OF SECURITY AND TRUST (POST 2017), 2017, 10204 :164-186
[3]  
Buneman P, 2001, LECT NOTES COMPUT SC, V1973, P316
[4]  
Buneman P., 2006, P 2006 ACM SIGMOD IN, P539, DOI [10.1145/1142473.1142534, DOI 10.1145/1142473.1142534]
[5]  
Cachin C., 2016, ARXIV160307351
[6]   Practical byzantine fault tolerance and proactive recovery [J].
Castro, M ;
Liskov, B .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2002, 20 (04) :398-461
[7]   Distributed Provenance Compression [J].
Chen, Chen ;
Lehri, Harshal Tushar ;
Loh, Lay Kuan ;
Alur, Anupam ;
Jia, Limin ;
Loo, Boon Thau ;
Zhou, Wenchao .
SIGMOD'17: PROCEEDINGS OF THE 2017 ACM INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA, 2017, :203-218
[8]   Provenance in Databases: Why, How, and Where [J].
Cheney, James ;
Chiticariu, Laura ;
Tan, Wang-Chiew .
FOUNDATIONS AND TRENDS IN DATABASES, 2007, 1 (04) :379-474
[9]  
Chiticariu L. W.-C., 2005, ACM SIGMOD International Conference on Management of Data, P942, DOI DOI 10.1145/1066157.1066296
[10]  
Dang H., 2018, ARXIV PREPRINT ARXIV