Abstract
Blockchain can be used to solve the problem of mutual trust between different institutions. However, when migrating data from a traditional system to a blockchain system, the order of data transactions is difficult to determine and the data transactions on the chain can not be modified. Therefore, it is necessary to build an on-chain repairing mechanism for multi-party data migration. In this paper, an on-chain repairing system for multi-party data migration is designed to realize the multi-party data migration, the block data repairing, and the data auditing. The multi-party data migration is utilized to determine the order of data transactions, and the order determining during data transaction is solved by setting up transaction pools and sorting transactions of the same institution or different institutions. The controlled data repairing strategy is utilized to repair the error data in the blockchain based on the chameleon-hash algorithm. The data repairing audit strategy is used to ensure the controllable data repairing. Compared with the Hyperledge Fabric, the additional cost for multi-party data migration of our method is not more than 10%.
Similar content being viewed by others
Data availability
No
References
Sidhu, J.: Syscoin: A peer to peer electronic cash system with blockchain based services for e-business. In Proceedings of the 26th International Conference on Computer Communication and Networks. IEEE, pp. 1–6. (2017)
Zheng, Z., Xie, S., Dai, H., Chen, X., Wang, H.: An overview of blockchain technology: Architecture, consensus, and future trends. In Proceedings of 2017 IEEE International Congress on Big Data. IEEE Computer Society, pp. 557–564. (2017)
Casino, F., Dasaklis, T.K., Patsakis, C.: A systematic literature review of blockchain based applications: current status, classification and open issues. Telematics Inf. 36, 55–81 (2019)
Nguyen, G., Kim, K.: A survey about consensus algorithms used in blockchain. J. Inform. Process. Syst. 14(1), 101–128 (2018)
Shurov, A., Malevanniy, D., Iakushkin, O., Korkhov, V.: Blockchain network threats: The case of pow and ethereum. In Proceedings of the 19th International Conference on Computational Science and Its Applications. Springer, pp. 606–617. (2019)
Ronen, E., Shamir, A., Weingarten, A., O’Flynn, C.: Iot goes nuclear: creating a zigbee chain reaction. IEEE Secur. Priv. 16(1), 54–62 (2018)
Yao, Q..: A systematic framework to understand central bank digital currency. Sci. Chin. Inform. Sci. 61(3), 033101:1-033101:8 (2018)
Azaria, A., Ekblaw, A., Vieira, T., Lippman, A.: Medrec: Using blockchain for medical data access and permission management. In Proceedings of 2nd International Conference on Open and Big Data. IEEE Computer Society, pp. 25–30. (2016)
Hasan, H.R., Salah, K.: Proof of delivery of digital assets using blockchain and smart contracts. IEEE Access. 6(448), 439–465 (2018)
Mitani, T., Otsuka, A.: Traceability in permissioned blockchain. IEEE Access. 8, 573–21588 (2020)
Atzei, N., Bartoletti, M., Cimoli, T.: A survey of attacks on ethereum smart contracts (sok). In Proceedings of the 6th International Conference on Principles of Security and Trust International Conference. Springer, pp. 164– 186. (2017)
Conti, M., E, S.K., Lal, C., Ruj, S.: A survey on security and privacy issues of bitcoin. IEEE Commun. Surv. Tutorials. 20(4), 3416–3452 (2018)
Ateniese, G., de Medeiros, B.: On the key exposure problem in chameleon hashes. In Proceedings of the 4th International Conference on Security in Communication Networks. Springer, pp. 165– 179. (2004)
Krawczyk, H., Rabin, T.: Chameleon signatures. In Proceedings of the Network and Distributed System Security Symposium. The Internet Society, pp. 143– 154. (2000)
Camenisch, J., Derler, D., Krenn, S., Phls, H.C., amelin, K., Slamanig, D.: Chameleon hashes with ephemeral trapdoors and applications to invisible sanitizable signatures. In Proceedings of the 20th International Conference on Practice and Theory in Public Key Cryptography. Springer, pp. 152– 182. (2017)
Ateniese, G., Magri, B., Venturi, D., Andrade, E.R.: Redactable blockchain or rewriting history in bitcoin and friends. In Proceedings of 2017 IEEE European Symposium on Security and Privacy. IEEE, pp. 111– 126. (2017)
Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute based encryption for fine grained access control of encrypted data. In Proceedings of the 13th ACM Conference on Computer and Communications Security. ACM, pp. 89–98. (2006)
Deuber, D., Magri, B., Thyagarajan, S.A.K.: Redactable blockchain in the permissionless setting. In Proceedings of the 2019 IEEE Symposium on Security and Privacy. IEEE, pp. 124– 138. (2019)
Cai, X., Ren, Y., Zhang, X.: Privacy protected deletable blockchain. IEEE Access. 8, 6060–6070 (2020)
Li, J., Ye, H., Li, T., Wang, W., Lou, W., Thomas Hou, Y., Liu, J.: Rongxing Lu: efficient and secure outsourcing of differentially private Data Publishing with multiple evaluators. IEEE Trans. Dependable Secur. Comput. 19(1), 67–76 (2022)
Li, J., Huang, Y., Wei, Y., Lv, S., Liu, Z.: Changyu Dong, Wenjing Lou: Searchable symmetric encryption with Forward Search privacy. IEEE Trans. Dependable Secur. Comput. 18(1), 460–474 (2021)
Bresson, E., Stern, J., Szydlo, M.: Threshold ring signatures and applications to ad-hoc groups. In Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology. Springer, pp. 465–480.
Wu, Z., Li, G., Shen, S., Cui, Z., Lian, X., Chen, E., X. Su.: Constructing dummy query sequences to protect location privacy and query privacy in location-based services. World Wide Web (ISSN 1386-145X). 24 (1): 24–45 (2021)
Wu, Z., Shen, S., Zhou, H., Li, H., Lu, C.: A Basic Framework for Privacy Protection in Personalized Information Retrieval. J. Org. User Comput. 33(6), 1–26 (2002)
Funding
This study was funded by the Guangdong Science and Technology Plan Project (2019B010139001), Guangzhou Science and Technology Plan Project (201902020016), Guangdong Natural Science Fund Project (2021A1515011243), Yunfu Science and Technology Plan Project (S2021010104) and the National Key R&D Program of China under Grant No. 2019YFB2101700, the National Natural Science Foundation of China No. 62072202.
Author information
Authors and Affiliations
Contributions
Wenchao Jiang designed the system and the framework of this paper, Qiwen Lv conducted the implementation, experiments and tests, Wenchao Jiang, Weiqi Dai, and Qiwen Lv wrote the paper together, Dongjun Ning provided the application and test scenario, and Sui Lin and Weiqi Dai check and proofread the paper.
Corresponding author
Ethics declarations
Human and animal ethics
No
Ethical Approval and Consent to participate
Not applicable
Consent for publication
We grant the publishing rights to the journal of World Wide Web.
Competing interests
All the authors declare there are no any competing interests
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This article belongs to the Topical Collection: Special Issue on Privacy and Security in Machine Learning
Guest Editors: Jin Li, Francesco Palmieri and Changyu Dong
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Jiang, W., Dai, W., Lv, Q. et al. On-chain repairing for multi-party data migration. World Wide Web 26, 2749–2766 (2023). https://doi.org/10.1007/s11280-023-01148-0
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11280-023-01148-0