Trustzone-based secure lightweight wallet for hyperledger fabric

被引:5
作者
Dai, Weiqi [1 ,3 ,4 ,5 ]
Wang, Qinyuan [1 ,2 ]
Wang, Zeli [1 ,2 ]
Lin, Xiaobin [3 ]
Zou, Deqing [1 ,3 ,4 ,5 ]
Jin, Hai [1 ,2 ]
机构
[1] Hubei Engn Res Ctr Big Data Secur, Natl Engn Res Ctr Big Data Technol & Syst, Serv Comp Technol & Syst Lab, Clusters & Grid Comp Lab, Wuhan, Hubei, Peoples R China
[2] Huazhong Univ Sci & Technol, Sch Comp Sci & Technol, Wuhan 430074, Peoples R China
[3] Huazhong Univ Sci & Technol, Sch Cyber Sci & Engn, Wuhan 430074, Peoples R China
[4] Shenzhen Huazhong Univ Sci & Technol Res Inst, Shenzhen 518057, Peoples R China
[5] Shenzhen Huazhong Univ Sci & Technol, Res Inst, Shenzhen 518057, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Hyperledger fabric; Trustzone; Simple payment verification; Lightweight wallet; AUTHENTICATION;
D O I
10.1016/j.jpdc.2020.11.001
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the development of blockchain-based digital currencies, the security of digital wallets becomes more and more important. As far as we know, there is no safe lightweight wallet in hyperledger fabric. To solve the problem, we proposed a Trustzone-based Secure Lightweight Wallet for Hyperledger Fabric (hereafter referred to as TSLWHF). Firstly, we designed an Unspent Transaction Output (UTXO) set of transactions under blockchain and a signature verification mechanism for transactions, which made it possible to implement the lightweight wallet in hyperledger fabric. Then, we implemented a reliable protection mechanism for private keys and wallet's address, which solved the problem that users' information might be stolen or replaced. Meanwhile, the transaction verification results are guaranteed not to be tampered by hackers through verifying transactions in Trusted Execution Environment (TEE) and encrypting local block headers. Finally, to demonstrate utility, we deployed the system in hyperledger fabric and trustzone. Experiments showed that the wallet reduces the size of locally stored data while protecting the security of user's assets. The time spent on TSLWHF to execute a transaction is 0.589s, which improves transaction's performance compared to Bitcoin wallet. (C) 2020 Elsevier Inc. All rights reserved.
引用
收藏
页码:66 / 75
页数:10
相关论文
共 35 条
[1]   Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains [J].
Androulaki, Elli ;
Barger, Artem ;
Bortnikov, Vita ;
Cachin, Christian ;
Christidis, Konstantinos ;
De Caro, Angelo ;
Enyeart, David ;
Ferris, Christopher ;
Laventman, Gennady ;
Manevich, Yacov ;
Muralidharan, Srinivasan ;
Murthy, Chet ;
Binh Nguyen ;
Sethi, Manish ;
Singh, Gari ;
Smith, Keith ;
Sorniotti, Alessandro ;
Stathakopoulou, Chrysoula ;
Vukolic, Marko ;
Cocco, Sharon Weed ;
Yellick, Jason .
EUROSYS '18: PROCEEDINGS OF THE THIRTEENTH EUROSYS CONFERENCE, 2018,
[2]  
[Anonymous], 2019, DIGIT COMMUN NETW
[3]  
[Anonymous], 2017, P 4 WORKSH CRYPT SEC
[4]   Hypervision Across Worlds: Real-time Kernel Protection from the ARM TrustZone Secure World [J].
Azab, Ahmed M. ;
Ning, Peng ;
Shah, Jitesh ;
Chen, Quan ;
Bhutkar, Rohan ;
Ganesh, Guruprasad ;
Ma, Jia ;
Shen, Wenbo .
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, :90-102
[5]   BlueWallet: The secure Bitcoin wallet [J].
Bamert, Tobias ;
Decker, Christian ;
Wattenhofer, Roger ;
Welten, Samuel .
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8743 :65-80
[6]   Zerocash: Decentralized Anonymous Payments from Bitcoin [J].
Ben-Sasson, Eli ;
Chiesa, Alessandro ;
Garmant, Christina ;
Green, Matthew ;
Miers, Ian ;
Tromer, Eran ;
Virza, Madars .
2014 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2014), 2014, :459-474
[7]  
Bui T., 2019, Proceedings of the 12th European Workshop on Systems Security, P1
[8]   TZDKS: A New TrustZone-based Dual-Criticality System with Balanced Performance [J].
Dong, Pan ;
Burns, Alan ;
Jiang, Zhe ;
Liao, Xiangke .
2018 IEEE 24TH INTERNATIONAL CONFERENCE ON EMBEDDED AND REAL-TIME COMPUTING SYSTEMS AND APPLICATIONS (RTCSA), 2018, :59-64
[9]   Side-Channel Attacks on BLISS Lattice-Based Signatures Exploiting Branch Tracing against strongSwan and Electromagnetic Emanations in Microcontrollers [J].
Espitau, Thomas ;
Fouque, Pierre-Alain ;
Gerard, Benoit ;
Tibouchi, Mehdi .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :1857-1874
[10]  
Fan Chun-I, 2018, 2018 IEEE C DEPENDAB, P1, DOI 10.1109/DESEC.2018.8625151