A Blockchain-Based Nonrepudiation Network Computing Service Scheme for Industrial IoT

被引:175
作者
Xu, Yang [1 ]
Ren, Ju [1 ]
Wang, Guojun [2 ]
Zhang, Cheng [1 ]
Yang, Jidian [3 ]
Zhang, Yaoxue [1 ]
机构
[1] Cent South Univ, Sch Comp Sci & Engn, Changsha 410083, Hunan, Peoples R China
[2] Guangzhou Univ, Sch Comp Sci & Educ Software, Guangzhou 510006, Guangdong, Peoples R China
[3] Cent South Univ, Sch Software, Changsha 410083, Hunan, Peoples R China
基金
中国国家自然科学基金;
关键词
Blockchain; homomorphic hash; industrial IoT (IIoT); network computing; nonrepudiation; CLOUD; EDGE;
D O I
10.1109/TII.2019.2897133
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Emerging network computing technologies extend the functionalities of industrial IoT (IIoT) terminals. However, this promising service-provisioning scheme encounters problems in untrusted and distributed IIoT scenarios because malicious service providers or clients may deny service provisions or usage for their own interests. Traditional nonrepudiation solutions fade in IIoT environments due to requirements of trusted third parties or unacceptable overheads. Fortunately, the blockchain revolution facilitates innovative solutions. In this paper, we propose a blockchain-based fair nonrepudiation service provisioning scheme for IIoT scenarios in which the blockchain is used as a service publisher and an evidence recorder. Each service is separately delivered via on-chain and off-chain channels with mandatory evidence submissions for nonrepudiation purpose. Moreover, a homomorphic-hash-based service verification method is designed that can function with mere on-chain evidence. And an impartial smart contract is implemented to resolve disputes. The security analysis demonstrates the dependability, and the evaluations reveal the effectiveness and efficiency.
引用
收藏
页码:3632 / 3641
页数:10
相关论文
共 37 条
[1]   A fair Non-repudiation service in a web services peer-to-peer environment [J].
Agreiter, Berthold ;
Hafner, Michael ;
Breu, Ruth .
COMPUTER STANDARDS & INTERFACES, 2008, 30 (06) :372-378
[2]  
Angelis S. D., 2017, IT C CYB, P1
[3]  
Aniello L., 2016, INT C SOFTWARE ENG D, V717, P53
[4]  
[Anonymous], 2011, 800145 SP NAT I STAN
[5]  
Asokan N., 1997, P 4 ACM C COMP COMM, P7, DOI 10.1145/266420.266426
[6]  
Bellare M., 1994, Advances in Cryptology - CRYPTO '94. 14th Annual International Cryptology Conference. Proceedings, P216
[7]   Cryptographic Solutions for Industrial Internet-of-Things: Research Challenges and Opportunities [J].
Choo, Kim-Kwang Raymond ;
Gritzalis, Stefanos ;
Park, Jong Hyuk .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (08) :3567-3569
[8]  
Coffey T., 2003, P 1 INT S INF COMM T, P351
[9]   A scalable and manageable IoT architecture based on transparent computing [J].
Guo, Hui ;
Ren, Ju ;
Zhang, Deyu ;
Zhang, Yaoxue ;
Hu, Junying .
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2018, 118 :5-13
[10]   Block-Stream as a Service: A More Secure, Nimble, and Dynamically Balanced Cloud Service Model for Ambient Computing [J].
He, Jackson ;
Zhang, Yaoxue ;
Lu, Ju ;
Wu, Ming ;
Huang, Fujin .
IEEE NETWORK, 2018, 32 (01) :126-132