The Journal of Supercomputing

, Volume 74, Issue 10, pp 4945–4964 | Cite as

Chain-based big data access control infrastructure

  • Emmanuel Boateng Sifah
  • Qi XiaEmail author
  • Kwame Opuni-Boachie Obour Agyekum
  • Sandro Amofa
  • Jianbin Gao
  • Ruidong Chen
  • Hu Xia
  • James C. Gee
  • Xiaojiang Du
  • Mohsen Guizani


Technological advancements have brought about the rise of data and other digital assets in our world today. The major problems with data today are its security and management, more importantly access control. These factors when not tackled effectively can lead to many compromises. The blockchain is an effective technology that ensures utmost security, trust, and maximum access control in big data systems. However, almost all the transactions on a blockchain network are stored in the platform. This process reduces the data storage, as the storage of all transactions sometimes creates unnecessary overheads. In this paper, an off-chain-based sovereign blockchain is proposed, where a virtual container is created for parties to transact in. At the end of a transaction, and satisfying each party, the container is destroyed but the results are stored on the sovereign blockchain network. This effectively decreases the amount of data that would have been stored on the network. The effectiveness of our system is compared with other schemes, and we could infer that our proposed system outperforms the already-existing ones.


Big data Sovereign blockchain Access control Smart contracts 



This work is supported in part by the applied basic research programs of Sichuan Province (2015JY0043), the Fundamental Research Funds for the Central Universities (ZYGX2015J154, ZYGX2016J152, ZYGX2016J170), programs of international science and technology cooperation and exchange of Sichuan Province (2017HH0028), Key research and development projects of high and new technology development and industrialization of Sichuan Province (2017GZ0007).This work is supported by the National Key Research and Development Program of China (Grant No. 2016QY04WW0802, 2016QY04W0800, 03). This work supported by the National Engineering Laboratory for Big data application on improving government governance capabilities.


  1. 1.
    Chen J, Xue Y (2017) Bootstrapping a blockchain based ecosystem for big data exchange. In: Proceedings—2017 IEEE 6th International Congress on Big Data, BigData Congress 2017, pp 460–463Google Scholar
  2. 2.
    Liu PTS (2016) Medical record system using blockchain, big data and tokenization. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol 9977 LNCS, pp 254–261Google Scholar
  3. 3.
    Es-Samaali H, Outchakoucht A, Leroy JP (2017) A blockchain-based access control for big data. Int J Comput Netw Commun Secur 5(7):137147Google Scholar
  4. 4.
    Zheng Z, Xie S, Dai H, Chen X, Wang H (2017) An overview of blockchain technology: architecture, consensus, and future trends. In: Proceedings—2017 IEEE 6th International Congress on Big Data, BigData Congress 2017, pp 557–564Google Scholar
  5. 5.
    Morabito V (2017) The security of blockchain systems, business innovation through blockchain: the business perspective, pp 6178Google Scholar
  6. 6.
    Swan M (2015) Blockchain thinking: the brain as a decentralized autonomous corporation [commentary]. IEEE Technol Soc Mag 34(4):4152CrossRefGoogle Scholar
  7. 7.
    Nath I (2017) Data exchange platform to fight insurance fraud on blockchain. In: IEEE International Conference on Data Mining Workshops, ICDMW, pp 821–825Google Scholar
  8. 8.
    Tapscott D, Tapscott A (2016) Blockchain revolution: how the technology behind bitcoin is changing money, business, and the world. Penguin, pp 361–367Google Scholar
  9. 9.
    Qiu J, Wu Q, Ding G, Xu Y (2016) Feng S (2016) A survey of machine learning for big data processing. EURASIP J Adv Signal Process 1:67CrossRefGoogle Scholar
  10. 10.
    Ranjan R (2014) Streaming big data processing in datacenter clouds. IEEE Cloud Comput 1(1):7883CrossRefGoogle Scholar
  11. 11.
    Wu X, Zhu X, Wu G-Q, Ding W (2014) Data mining with big data. Knowl Data Eng IEEE Trans 26(1):97107Google Scholar
  12. 12.
    Dessureault S (2016) Understanding big data. CIM Magazine 11.1Google Scholar
  13. 13.
    Tschorsch F, Scheuermann B (2016) Bitcoin and beyond: a technical survey on decentralized digital currencies. IEEE Commun Surv Tutor 18(3):20842123CrossRefGoogle Scholar
  14. 14.
    Nadarajah S, Chu J (2017) On the inefficiency of Bitcoin. Econ Lett 150:69CrossRefGoogle Scholar
  15. 15.
    McGinn D, Birch D, Akroyd D, Molina-Solana M, Guo Y, Knottenbelt WJ (2016) Visualizing dynamic bitcoin transaction patterns. Big Data 4(2):109119CrossRefGoogle Scholar
  16. 16.
    Wijaya DA (2017) Extending asset management system functionality in bitcoin platform. In: Proceeding—2016 international conference on computer, control, informatics and its applications: recent progress in computer, control, and informatics for data science, IC3INA 2016, pp 97–101Google Scholar
  17. 17.
    Ciaian P, Rajcaniova M, Kancs A (2016) The economics of BitCoin price formation. Appl Econ 48(19):17991815CrossRefGoogle Scholar
  18. 18.
    Bhme R, Christin N, Edelman B, Moore T (2015) Bitcoin design principles enabling technologies and processes. J Econ Perspect 29(2):213238Google Scholar
  19. 19.
    Dennis R, Owenson G (2016) Rep on the roll: a peer to peer reputation system based on a rolling blockchain. Int J Digit Soc 7(1):11231134Google Scholar
  20. 20.
    Wright A, De Filippi P (2015) Decentralized blockchain technology and the rise of lex cryptographia. Accessed 15 Nov 2017
  21. 21.
    Zyskind G, Nathan O, Pentland AS (2015) Decentralizing privacy: using blockchain to protect personal data. In: Proceedings—2015 IEEE Security and Privacy Workshops, SPW 2015, pp 180–184Google Scholar
  22. 22.
    Yue X, Wang H, Jin D, Li M, Jiang W (2016) Healthcare data gateways: found healthcare intelligence on blockchain with novel privacy risk control. J Med Syst 40(10):218CrossRefGoogle Scholar
  23. 23.
    Zyskind G, Nathan O, Pentland A (2015) Enigma: decentralized computation platform with guaranteed privacy. arXiv:1506.03471 [cs], pp 114
  24. 24.
    Hardjono T, Smith N, Pentland A (2016) Anonymous identities for permissioned blockchains. Available: Accessed 22 Aug 2017
  25. 25.
    Sundareswaran S, Squicciarini AC, Lin D (2012) For data sharing in the cloud. IEEE Trans Dependable Secure Comput 9(4):556568CrossRefGoogle Scholar
  26. 26.
    Ferdous S, Margheri A, Federica P, Vladimiro S (2017) Decentralised runtime monitoring for access control systems in cloud federations. GB University of Southampton, Southampton, p 11Google Scholar
  27. 27.
    Hassan MM, Lin K, Yue X, Wan J (2017) A multimedia healthcare data sharing approach through cloud-based body area network. Future Gener Comput Syst 66:4858CrossRefGoogle Scholar
  28. 28.
    Mann C, Loebenberger D (2017) Two-factor authentication for the Bitcoin protocol. Int J Inf Secur 16(2):213226CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  • Emmanuel Boateng Sifah
    • 1
  • Qi Xia
    • 2
    Email author
  • Kwame Opuni-Boachie Obour Agyekum
    • 1
  • Sandro Amofa
    • 1
  • Jianbin Gao
    • 3
  • Ruidong Chen
    • 4
  • Hu Xia
    • 4
  • James C. Gee
    • 5
    • 6
  • Xiaojiang Du
    • 7
  • Mohsen Guizani
    • 8
  1. 1.School of Computer Science and EngineeringUESTCChengduChina
  2. 2.Center for Cyber SecurityUESTCChengduChina
  3. 3.School of Resource and Environment, Center for Digital HealthUESTCChengduChina
  4. 4.Youe Data Co. Ltd.BeijingChina
  5. 5.Department of RadiologyUniversity of PennsylvaniaPhiladelphiaUSA
  6. 6.School of Computer Science and EngineeringUESTCChengduChina
  7. 7.Department of Computer and Information SciencesTemple UniversityPhiladelphiaUSA
  8. 8.Department of Electrical and Computer EngineeringUniversity of IdahoMoscowUSA

Personalised recommendations