Skip to main content
Log in

On-chain repairing for multi-party data migration

  • Published:
World Wide Web Aims and scope Submit manuscript

Abstract

Blockchain can be used to solve the problem of mutual trust between different institutions. However, when migrating data from a traditional system to a blockchain system, the order of data transactions is difficult to determine and the data transactions on the chain can not be modified. Therefore, it is necessary to build an on-chain repairing mechanism for multi-party data migration. In this paper, an on-chain repairing system for multi-party data migration is designed to realize the multi-party data migration, the block data repairing, and the data auditing. The multi-party data migration is utilized to determine the order of data transactions, and the order determining during data transaction is solved by setting up transaction pools and sorting transactions of the same institution or different institutions. The controlled data repairing strategy is utilized to repair the error data in the blockchain based on the chameleon-hash algorithm. The data repairing audit strategy is used to ensure the controllable data repairing. Compared with the Hyperledge Fabric, the additional cost for multi-party data migration of our method is not more than 10%.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Figure 1
Figure 2
Figure 3
Figure 4
Figure 5
Figure 6
Figure 7
Figure 8
Figure 9
Figure 10

Similar content being viewed by others

Data availability

No

References

  1. Sidhu, J.: Syscoin: A peer to peer electronic cash system with blockchain based services for e-business. In Proceedings of the 26th International Conference on Computer Communication and Networks. IEEE, pp. 1–6. (2017)

  2. Zheng, Z., Xie, S., Dai, H., Chen, X., Wang, H.: An overview of blockchain technology: Architecture, consensus, and future trends. In Proceedings of 2017 IEEE International Congress on Big Data. IEEE Computer Society, pp. 557–564. (2017)

  3. Casino, F., Dasaklis, T.K., Patsakis, C.: A systematic literature review of blockchain based applications: current status, classification and open issues. Telematics Inf. 36, 55–81 (2019)

    Article  Google Scholar 

  4. Nguyen, G., Kim, K.: A survey about consensus algorithms used in blockchain. J. Inform. Process. Syst. 14(1), 101–128 (2018)

    Google Scholar 

  5. Shurov, A., Malevanniy, D., Iakushkin, O., Korkhov, V.: Blockchain network threats: The case of pow and ethereum. In Proceedings of the 19th International Conference on Computational Science and Its Applications. Springer, pp. 606–617. (2019)

  6. Ronen, E., Shamir, A., Weingarten, A., O’Flynn, C.: Iot goes nuclear: creating a zigbee chain reaction. IEEE Secur. Priv. 16(1), 54–62 (2018)

    Article  Google Scholar 

  7. Yao, Q..: A systematic framework to understand central bank digital currency. Sci. Chin. Inform. Sci. 61(3), 033101:1-033101:8 (2018)

    Article  Google Scholar 

  8. Azaria, A., Ekblaw, A., Vieira, T., Lippman, A.: Medrec: Using blockchain for medical data access and permission management. In Proceedings of 2nd International Conference on Open and Big Data. IEEE Computer Society, pp. 25–30. (2016)

  9. Hasan, H.R., Salah, K.: Proof of delivery of digital assets using blockchain and smart contracts. IEEE Access. 6(448), 439–465 (2018)

    Google Scholar 

  10. Mitani, T., Otsuka, A.: Traceability in permissioned blockchain. IEEE Access. 8, 573–21588 (2020)

    Article  Google Scholar 

  11. Atzei, N., Bartoletti, M., Cimoli, T.: A survey of attacks on ethereum smart contracts (sok). In Proceedings of the 6th International Conference on Principles of Security and Trust International Conference. Springer, pp. 164– 186. (2017)

  12. Conti, M., E, S.K., Lal, C., Ruj, S.: A survey on security and privacy issues of bitcoin. IEEE Commun. Surv. Tutorials. 20(4), 3416–3452 (2018)

    Article  Google Scholar 

  13. Ateniese, G., de Medeiros, B.: On the key exposure problem in chameleon hashes. In Proceedings of the 4th International Conference on Security in Communication Networks. Springer, pp. 165– 179. (2004)

  14. Krawczyk, H., Rabin, T.: Chameleon signatures. In Proceedings of the Network and Distributed System Security Symposium. The Internet Society, pp. 143– 154. (2000)

  15. Camenisch, J., Derler, D., Krenn, S., Phls, H.C., amelin, K., Slamanig, D.: Chameleon hashes with ephemeral trapdoors and applications to invisible sanitizable signatures. In Proceedings of the 20th International Conference on Practice and Theory in Public Key Cryptography. Springer, pp. 152– 182. (2017)

  16. Ateniese, G., Magri, B., Venturi, D., Andrade, E.R.: Redactable blockchain or rewriting history in bitcoin and friends. In Proceedings of 2017 IEEE European Symposium on Security and Privacy. IEEE, pp. 111– 126. (2017)

  17. Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute based encryption for fine grained access control of encrypted data. In Proceedings of the 13th ACM Conference on Computer and Communications Security. ACM, pp. 89–98. (2006)

  18. Deuber, D., Magri, B., Thyagarajan, S.A.K.: Redactable blockchain in the permissionless setting. In Proceedings of the 2019 IEEE Symposium on Security and Privacy. IEEE, pp. 124– 138. (2019)

  19. Cai, X., Ren, Y., Zhang, X.: Privacy protected deletable blockchain. IEEE Access. 8, 6060–6070 (2020)

    Article  Google Scholar 

  20. Li, J., Ye, H., Li, T., Wang, W., Lou, W., Thomas Hou, Y., Liu, J.: Rongxing Lu: efficient and secure outsourcing of differentially private Data Publishing with multiple evaluators. IEEE Trans. Dependable Secur. Comput. 19(1), 67–76 (2022)

    Article  Google Scholar 

  21. Li, J., Huang, Y., Wei, Y., Lv, S., Liu, Z.: Changyu Dong, Wenjing Lou: Searchable symmetric encryption with Forward Search privacy. IEEE Trans. Dependable Secur. Comput. 18(1), 460–474 (2021)

    Article  Google Scholar 

  22. Bresson, E., Stern, J., Szydlo, M.: Threshold ring signatures and applications to ad-hoc groups. In Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology. Springer, pp. 465–480.

  23. Wu, Z., Li, G., Shen, S., Cui, Z., Lian, X., Chen, E., X. Su.: Constructing dummy query sequences to protect location privacy and query privacy in location-based services. World Wide Web (ISSN 1386-145X). 24 (1): 24–45 (2021)

  24. Wu, Z., Shen, S., Zhou, H., Li, H., Lu, C.: A Basic Framework for Privacy Protection in Personalized Information Retrieval. J. Org. User Comput. 33(6), 1–26 (2002)

    Google Scholar 

Download references

Funding

This study was funded by the Guangdong Science and Technology Plan Project (2019B010139001), Guangzhou Science and Technology Plan Project (201902020016), Guangdong Natural Science Fund Project (2021A1515011243), Yunfu Science and Technology Plan Project (S2021010104) and the National Key R&D Program of China under Grant No. 2019YFB2101700, the National Natural Science Foundation of China No. 62072202.

Author information

Authors and Affiliations

Authors

Contributions

Wenchao Jiang designed the system and the framework of this paper, Qiwen Lv conducted the implementation, experiments and tests, Wenchao Jiang, Weiqi Dai, and Qiwen Lv wrote the paper together, Dongjun Ning provided the application and test scenario, and Sui Lin and Weiqi Dai check and proofread the paper.

Corresponding author

Correspondence to Weiqi Dai.

Ethics declarations

Human and animal ethics

No

Ethical Approval and Consent to participate

Not applicable

Consent for publication

We grant the publishing rights to the journal of World Wide Web.

Competing interests

All the authors declare there are no any competing interests

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article belongs to the Topical Collection: Special Issue on Privacy and Security in Machine Learning

Guest Editors: Jin Li, Francesco Palmieri and Changyu Dong

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jiang, W., Dai, W., Lv, Q. et al. On-chain repairing for multi-party data migration. World Wide Web 26, 2749–2766 (2023). https://doi.org/10.1007/s11280-023-01148-0

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11280-023-01148-0

Keywords

Navigation