SIGNORA: A Blockchain-Based Framework for Dataflow Integrity Provisioning in an Untrusted Data Pipeline

被引:1
作者
Oktian, Yustus Eko [1 ]
Heo, Shinwook [2 ,3 ]
Kim, Howon [2 ]
机构
[1] Pusan Natl Univ, Blockchain Platform Res Ctr, Busan 609735, South Korea
[2] Pusan Natl Univ, Sch Comp Sci & Engn, Busan 609735, South Korea
[3] SmartM2M, Busan 46300, South Korea
关键词
Blockchains; Data processing; Cloud computing; Pipeline processing; Receivers; Behavioral sciences; Smart contracts; Data flow computing; Dataflow integrity; blockchain; chain of signatures; blockchain receipt; data pipeline;
D O I
10.1109/ACCESS.2022.3199878
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In a typical data pipeline, the dataflow starts from the first node, where the data is initiated, and moves to the last node in the pipeline, where the processed data will be stored. Due to the sheer number of involved participants, it is crucial to protect the dataflow integrity in the pipeline. While previous studies have outlined solutions to this matter, the solution for an untrusted data pipeline is still left unexplored, which motivates us to propose SIGNORA. Our proposal combines the concept of a chain of signatures with blockchain receipt to provide dataflow integrity. The chain of signatures provides a non-repudiation guarantee from participants, while the hash of the data and signatures is anchored in the blockchain for a non-tampering guarantee through blockchain receipt. Aside from that, SIGNORA also satisfies essential requirements of running data pipeline processing in an open and untrusted environment, such as (i) providing reliable identity management, (ii) solving the trust and accountability issues through a reputation system, (iii) supporting various devices through multiple cryptographic algorithms (i.e., ECDSA, EdDSA, RSA, and HMAC), and (iv) off-chain processing. Our experiment results show that SIGNORA can provide dataflow integrity provisioning in multiple scenarios of data payload size with reasonable overhead. Furthermore, the cost of smart contract methods has also been analyzed, and several off-chain solutions have been addressed to reduce transaction costs. Finally, the reputation system can adapt to the history of nodes' activities by increasing their scores when they actively perform honest behavior while reducing their scores when they become inactive. Therefore, SIGNORA can provide a high degree of accountability for participants collaborating in an untrusted environment.
引用
收藏
页码:89714 / 89731
页数:18
相关论文
共 33 条
  • [1] Abegg Jean-Philippe, 2022, ICDCN 2022: 23rd International Conference on Distributed Computing and Networking, P117, DOI 10.1145/3491003.3491022
  • [2] Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains
    Androulaki, Elli
    Barger, Artem
    Bortnikov, Vita
    Cachin, Christian
    Christidis, Konstantinos
    De Caro, Angelo
    Enyeart, David
    Ferris, Christopher
    Laventman, Gennady
    Manevich, Yacov
    Muralidharan, Srinivasan
    Murthy, Chet
    Binh Nguyen
    Sethi, Manish
    Singh, Gari
    Smith, Keith
    Sorniotti, Alessandro
    Stathakopoulou, Chrysoula
    Vukolic, Marko
    Cocco, Sharon Weed
    Yellick, Jason
    [J]. EUROSYS '18: PROCEEDINGS OF THE THIRTEENTH EUROSYS CONFERENCE, 2018,
  • [3] Baldi M, 2019, Arxiv, DOI arXiv:1910.04622
  • [4] Bordewes M., 2021, RSA ECDSA DIFFER SIG
  • [5] A blockchain approach to digital archiving: digital signature certification chain preservation
    Bralic, Vladimir
    Stancic, Hrvoje
    Stengard, Mats
    [J]. RECORDS MANAGEMENT JOURNAL, 2020, 30 (03) : 345 - 362
  • [6] Brotsis S, 2019, PROCEEDINGS OF THE 2019 IEEE CONFERENCE ON NETWORK SOFTWARIZATION (NETSOFT 2019), P110, DOI [10.1109/netsoft.2019.8806675, 10.1109/NETSOFT.2019.8806675]
  • [7] Buterin V., 2014, ETHEREUM NEXT GENERA, V3, P1
  • [8] Walking the web of trust
    Caronni, G
    [J]. IEEE 9TH INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2000, : 153 - 158
  • [9] Concourse Open Community, 2022, ETH GAS STAT
  • [10] The Sybil attack
    Douceur, JR
    [J]. PEER-TO-PEER SYSTEMS, 2002, 2429 : 251 - 260