DCIV: Decentralized cross-chain data integrity verification with blockchain

被引:14
作者
Jiang, Jiajia [1 ]
Zhang, Yushu [1 ]
Zhu, Youwen [1 ]
Dong, Xuewen [2 ]
Wang, Liangmin [3 ]
Xiang, Yong [4 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing, Peoples R China
[2] Xidian Univ, Sch Comp Sci & Technol, Xian, Peoples R China
[3] Southeast Univ, Sch Cyber Sci & Engn, Nanjing, Peoples R China
[4] Deakin Univ, Sch Informat Technol, Melbourne, Australia
基金
国家重点研发计划;
关键词
Governing the chain by chain; Data integrity verification; Blockchain-enabled auditing; Cross chain; Smart contract; SHORT SIGNATURES;
D O I
10.1016/j.jksuci.2022.07.015
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, blockchain holds promise to impact a wide range of application areas, but it still suffers from technical challenges such as security and scalability. The increase in the number of transactions puts blockchains under data storage pressure. The emergence of cross-chain technologies connects different blockchains and relieves the data storage pressure. However, the existing research generally focuses on the technical realization of cross chain, lacking in-depth research on consistency issues like data integ-rity verification of cross-chain interaction. In this paper, we propose a decentralized cross-chain data integrity verification scheme (DCIV) from the point of view of governing the chain by chain. We adopt su-pervision chain to audit the integrity of data in cross-chain interaction. We preprocess the off-chain orig-inal data in the form of Merkle tree. Before cross-chain interaction, we process the data with KZG polynomial commitment. During the auditing period, the supervision chain generates a challenge and verifies the integrity of cross-chain data. In particular, we add audit digests into the structure of transac-tions in blockchain to reduce the storage burden during auditing. Theoretical and experimental analyses demonstrate that DCIV can verify the integrity of data in cross-chain interaction, achieving secure and accurate cross-chain data sharing.(c) 2022 The Author(s). Published by Elsevier B.V. on behalf of King Saud University. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
引用
收藏
页码:7988 / 7999
页数:12
相关论文
共 30 条
[1]  
Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
[2]  
Back A., 2014, Enabling Blockchain Innovations with Pegged Sidechains
[3]   Provable Multicopy Dynamic Data Possession in Cloud Computing Systems [J].
Barsoum, Ayad F. ;
Hasan, M. Anwar .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (03) :485-497
[4]   Short signatures from the Weil pairing [J].
Boneh, D ;
Lynn, B ;
Shacham, H .
JOURNAL OF CRYPTOLOGY, 2004, 17 (04) :297-319
[5]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P56
[6]   Research on Cross-Chain Technology Based on Sidechain and Hash-Locking [J].
Deng, Liping ;
Chen, Huan ;
Zeng, Jing ;
Zhang, Liang-Jie .
EDGE COMPUTING - EDGE 2018, 2018, 10973 :144-151
[7]  
Du Yuefeng, 2021, IEEE T DEPENDABLE SE, P1
[8]  
Duan H., 2022, IEEE T AERO ELEC SYS, P1
[9]  
Goyal V, 2007, LECT NOTES COMPUT SC, V4622, P430
[10]  
He Y., 2021, IEEE INTERNET THINGS, V1