Blockchain and Data Sharing
- 1.5k Downloads
Abstract
Data sharing is very common in the era of big data and artificial intelligence as the convergence of data is the most prerequisite section of big data and machine intelligence happens based on high volume data feed. Blockchain is a new emerging technology, which holds vast possibilities and benefits to improve traceability and accountability of its stored data. It has significant advantages in unlocking the full potential of data sharing in multi-party scenarios. In this chapter, we introduce the basics of blockchain, which are organized into five layers: data layer, network layer, consensus layer, incentive layer and application layer. The details of each layer are elaborated accordingly. Afterwards, we emphasize the strengths of blockchain, including integrity, immutability, decentralization and verifiability. Finally, we make a list of the threats and challenges of blockchain to be overcame.
References
- 1.A blockchain platform for the enterprise, 2020. [Online; accessed 17-April-2020]Google Scholar
- 2.M. Ali, J. Nelson, R. Shea, M.J. Freedman, Blockstack: A global naming and storage system secured by blockchains, in 2016 {USENIX} Annual Technical Conference({USENIX} {ATC} 16), pp. 181–194, 2016Google Scholar
- 3.Bitcoin developer reference, 2020. [Online; accessed 17-April-2020]Google Scholar
- 4.C. Cachin et al., Architecture of the hyperledger blockchain fabric, in Workshop on Distributed Cryptocurrencies and Consensus Ledgers, vol. 310, p. 4, 2016Google Scholar
- 5.M. Castro, B. Liskov, et al., Practical byzantine fault tolerance, in OSDI, vol. 99, pp. 173–186, 1999Google Scholar
- 6.Chaincode tutorials, 2020. [Online; accessed 17-April-2020]Google Scholar
- 7.Developer resources, 2020. [Online; accessed 17-April-2020]Google Scholar
- 8.K. Gai, Y. Wu, L. Zhu, M. Qiu, M. Shen, Privacy-preserving energy trading using consortium blockchain in smart grid. IEEE Trans. Ind. Inf. 15(6), 3548–3558 (2019)CrossRefGoogle Scholar
- 9.F. Gao, L. Zhu, M. Shen, K. Sharif, Z. Wan, K. Ren, A blockchain-based privacy-preserving payment mechanism for vehicle-to-grid networks. IEEE Netw. 32(6), 184–192 (2018)CrossRefGoogle Scholar
- 10.H.A.W. Group et al., Hyperledger architecture volume 1: Introduction to hyperledger business blockchain design philosophy and consensus, 2017Google Scholar
- 11.T.T. Huynh, T.D. Nguyen, H. Tan, A survey on security and privacy issues of blockchain technology, in 2019 International Conference on System Science and Engineering (ICSSE) (IEEE, 2019), pp. 362–367Google Scholar
- 12.D. Larimer, Delegated proof-of-stake (dpos). Bitshare whitepaper, 2014Google Scholar
- 13.H. Li, L. Zhu, M. Shen, F. Gao, X. Tao, S. Liu, Blockchain-based data preservation system for medical data. J. Med. Syst. 42(8), 141 (2018)Google Scholar
- 14.Y. Li, L. Zhu, M. Shen, F. Gao, B. Zheng, X. Du, S. Liu, S. Yin, Cloudshare: towards a cost-efficient and privacy-preserving alliance cloud using permissioned blockchains, in International Conference on Mobile Networks and Management (Springer, 2017), pp. 339–352Google Scholar
- 15.L. Luu, J. Teutsch, R. Kulkarni, P. Saxena, Demystifying incentives in the consensus computer, in Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 706–719, 2015Google Scholar
- 16.G. Malavolta, P. Moreno-Sanchez, A. Kate, M. Maffei, S. Ravi, Concurrency and privacy with payment-channel networks, in Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 455–471, 2017Google Scholar
- 17.S. Nakamoto, Bitcoin: A peer-to-peer electronic cash system. Technical report, Manubot, 2019Google Scholar
- 18.D. Ongaro, J. Ousterhout, In search of an understandable consensus algorithm (extended version), 2013Google Scholar
- 19.F. Schuh, D. Larimer, Bitshares 2.0: General overview. Accessed February-2019.[Online]. Available: https://cryptorating.eu/whitepapers/BitShares/bitshares-general.pdf, 2017
- 20.M. Shen, G. Cheng, L. Zhu, X. Du, J. Hu, Content-based multi-source encrypted image retrieval in clouds with privacy preservation. Futur. Gener. Comput. Syst. (2018)Google Scholar
- 21.M. Shen, Y. Deng, L. Zhu, X. Du, N. Guizani, Privacy-preserving image retrieval for medical iot systems: A blockchain-based approach. IEEE Netw. 33(5), 27–33 (2019)CrossRefGoogle Scholar
- 22.M. Shen, J. Duan, L. Zhu, J. Zhang, X. Du, M. Guizani, Blockchain-based incentives for secure and collaborative data sharing in multiple clouds. IEEE J. Sel. Areas Commun. 38(6), 1229–1241 (2020)CrossRefGoogle Scholar
- 23.M. Shen, H. Liu, L. Zhu, K. Xu, H. Yu, X. Du, M. Guizani, Blockchain-assisted secure device authentication for cross-domain industrial IoT. IEEE J. Sel. Areas Commun. 38(5), 942–954 (2020)CrossRefGoogle Scholar
- 24.M. Shen, B. Ma, L. Zhu, X. Du, K. Xu, Secure phrase search for intelligent processing of encrypted data in cloud-based iot. IEEE Internet Things J. 6(2), 1998–2008 (2018)CrossRefGoogle Scholar
- 25.M. Shen, B. Ma, L. Zhu, R. Mijumbi, X. Du, J. Hu, Cloud-based approximate constrained shortest distance queries over encrypted graphs with privacy protection. IEEE Trans. Inf. Forensics Secur. 13(4), 940–953 (2017)CrossRefGoogle Scholar
- 26.M. Shen, X. Tang, L. Zhu, X. Du, M. Guizani, Privacy-preserving support vector machine training over blockchain-based encrypted iot data in smart cities. IEEE Internet Things J. 6(5), 7702–7712 (2019)CrossRefGoogle Scholar
- 27.M. Shen, J. Zhang, L. Zhu, K. Xu, X. Tang. Secure SVM training over vertically-partitioned datasets using consortium blockchain for vehicular social networks. IEEE Trans. Veh. Technol. 69(6), 5773–5783 (2020)CrossRefGoogle Scholar
- 28.Wikipedia contributors, Proof of stake — Wikipedia, the free encyclopedia, 2019. [Online; accessed 9-February-2020]Google Scholar
- 29.Wikipedia contributors, Proof of work — Wikipedia, the free encyclopedia, 2019. [Online; accessed 9-February-2020]Google Scholar
- 30.Wikipedia contributors, Consensus (computer science) — Wikipedia, the free encyclopedia, 2020. [Online; accessed 9-February-2020]Google Scholar
- 31.G. Wood et al., Ethereum: A secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper 151(2014), 1–32 (2014)Google Scholar
- 32.B. Zheng, L. Zhu, M. Shen, X. Du, J. Yang, F. Gao, Y. Li, C. Zhang, S. Liu, S. Yin, Malicious bitcoin transaction tracing using incidence relation clustering, in International Conference on Mobile Networks and Management (Springer, 2017), pp. 313–323Google Scholar
- 33.B.-K. Zheng, L.-H. Zhu, M. Shen, F. Gao, C. Zhang, Y.-D. Li, J. Yang, Scalable and privacy-preserving data sharing based on blockchain. J. Comput. Sci. Technol. 33(3), 557–567 (2018)MathSciNetCrossRefGoogle Scholar
- 34.Z. Zheng, S. Xie, H. Dai, X. Chen, H. Wang, An overview of blockchain technology: Architecture, consensus, and future trends, in 2017 IEEE International Congress on Big Data (BigData Congress) (IEEE, 20170), pp. 557–564Google Scholar
- 35.L. Zhu, B. Zheng, M. Shen, S. Yu, F. Gao, H. Li, K. Shi, K. Gai, Research on the security of blockchain data: A survey. arXiv preprint arXiv:1812.02009, 2018Google Scholar