ProvNet: Networked bi-directional blockchain for data sharing with verifiable provenance

被引:13
作者
Chenli, Changhao [1 ]
Tang, Wenyi [1 ]
Gomulka, Frank [1 ]
Jung, Taeho [1 ]
机构
[1] Univ Notre Dame, Comp Sci & Engn, Notre Dame, IN 46556 USA
关键词
Blockchain; Secure data sharing; Data provenance; SECURE; INDEX;
D O I
10.1016/j.jpdc.2022.04.003
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Data sharing is increasingly popular especially for scientific research and business fields where large volume of datasets need to be used, but it involves data security and privacy concerns. This paper mitigates such concerns by tracking and logging the history of shared data (i.e., provenance records) while preserving data privacy. This is a challenging problem in the data sharing scenario in this paper because the environment is decentralized and internal logs are not accessible publicly due to privacy concerns. We present ProvNet, a decentralized data sharing platform that can detect malicious users and provide secure provenance records using the newly proposed networked blockchain without disclosing raw data contents. Valid sharing records are collected and stored in the blocknet and misbehavior is detected with the stored provenance records according to our accountable protocols. We give a proof-ofconcept implementation, and evaluation results show that the overhead is acceptable. (c) 2022 Elsevier Inc. All rights reserved.
引用
收藏
页码:32 / 44
页数:13
相关论文
共 62 条
[11]   Chameleon-Hashes with Ephemeral Trapdoors And Applications to Invisible Sanitizable Signatures [J].
Camenisch, Jan ;
Derler, David ;
Krenn, Stephan ;
Pohls, Henrich C. ;
Samelin, Kai ;
Slamanig, Daniel .
PUBLIC-KEY CRYPTOGRAPHY (PKC 2017), PT II, 2017, 10175 :152-182
[12]   Dynamic secure cloud storage with provenance [J].
Chow, Sherman S.M. ;
Chu, Cheng-Kang ;
Huang, Xinyi ;
Zhou, Jianying ;
Deng, Robert H. .
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2012, 6805 LNCS :442-464
[13]   Fine-Grained and Controlled Rewriting in Blockchains: Chameleon-Hashing Gone Attribute-B ased [J].
Derler, David ;
Samelin, Kai ;
Slamanig, Daniel ;
Striecks, Christoph .
26TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2019), 2019,
[14]   FairSwap: How to Fairly Exchange Digital Goods [J].
Dziembowski, Stefan ;
Eckey, Lisa ;
Faust, Sebastian .
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, :967-984
[15]   SciBlock: A Blockchain-Based Tamper-Proof Non-Repudiable Storage for Scientific Workflow Provenance [J].
Fernando, Dinuni ;
Kulshrestha, Siddharth ;
Herath, J. Dinal ;
Mahadik, Nitin ;
Ma, Yanzhe ;
Bai, Changxin ;
Yang, Ping ;
Yan, Guanhua ;
Lu, Shiyong .
2019 IEEE 5TH INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (CIC 2019), 2019, :81-90
[16]  
Gionis A, 1999, PROCEEDINGS OF THE TWENTY-FIFTH INTERNATIONAL CONFERENCE ON VERY LARGE DATA BASES, P518
[17]  
Google, Leveldb
[18]   SIMILARITY MEASURES IN SCIENTOMETRIC RESEARCH - THE JACCARD INDEX VERSUS SALTON COSINE FORMULA [J].
HAMERS, L ;
HEMERYCK, Y ;
HERWEYERS, G ;
JANSSEN, M ;
KETERS, H ;
ROUSSEAU, R ;
VANHOUTTE, A .
INFORMATION PROCESSING & MANAGEMENT, 1989, 25 (03) :315-318
[19]  
Hasan R, 2007, STORAGE SS'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON STORAGE SECURITY AND SURVIVABILITY, P13
[20]   A survey on provenance: What for? What form? What from? [J].
Herschel, Melanie ;
Diestelkaemper, Ralf ;
Ben Lahmar, Houssem .
VLDB JOURNAL, 2017, 26 (06) :881-906