• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Zhang Chuan, Wang Zihao, Liang Jinwen, Liu Mengxuan, Deng Haotian, Zhu Liehuang. A Privacy-Preserving Data Element Trading Audit Scheme for Cross-Consortium-Blockchains[J]. Journal of Computer Research and Development, 2024, 61(10): 2540-2553. DOI: 10.7544/issn1000-1239.202440472
Citation: Zhang Chuan, Wang Zihao, Liang Jinwen, Liu Mengxuan, Deng Haotian, Zhu Liehuang. A Privacy-Preserving Data Element Trading Audit Scheme for Cross-Consortium-Blockchains[J]. Journal of Computer Research and Development, 2024, 61(10): 2540-2553. DOI: 10.7544/issn1000-1239.202440472

A Privacy-Preserving Data Element Trading Audit Scheme for Cross-Consortium-Blockchains

Funds: This work was supported by the National Natural Science Foundation of China (62232002), the Beijing Institute of Technology Research Fund Program for Young Scholars, and the Young Elite Scientists Sponsorship Program by CAST (2023QNRC001).
More Information
  • Author Bio:

    Zhang Chuan: born in 1991. PhD, assistant professor. Member of IEEE. His main research interests include cloud computing, applied cryptography, machine learning, and blockchain

    Wang Zihao: born in 2001. Bachelor. His main research interest includes blockchain

    Liang Jinwen: born in 1992. PhD, postdoc. Member of IEEE. His main research interests include applied cryptography, AI security, blockchain, and database security

    Liu Mengxuan: born in 1993. Master. His main research interests include blockchain and distributed systems

    Deng Haotian: born in 1994. Master. Student member of IEEE. His main research interests include blockchain, IoT security, and applied cryptography

    Zhu Liehuang: born in 1976. PhD, professor. Senior member of IEEE. His main research interests include security protocol analysis and design, group key exchange protocols, wireless sensor networks, and cloud computing

  • Received Date: May 30, 2024
  • Revised Date: July 17, 2024
  • Available Online: September 13, 2024
  • With the development of data assetization in enterprises, consortium blockchains have become the core infrastructure for data transactions within enterprise alliances. Constructing a decentralized, tamper-proof, and access-controlled data trading market using consortium blockchains can enhance the credibility of data transactions and reduce the risk of data leakage. However, with the increase in enterprise alliances, how to promote the circulation of data elements across different enterprise alliances and resist security threats such as data privacy leaks, data fraud, and payment repudiation have become an urgent problem in the field of data circulation. To address this, we propose a privacy-preserving data element transaction audit scheme for cross-consortium-blockchains. This scheme uses consortium blockchains for data attestation and employs smart contracts on a relay chain for data verification and payment management. By combining Pedersen commitments and Shamir’s secret sharing techniques, we construct a zero-knowledge proof mechanism to prevent data fraud without disclosing data elements. Additionally, a bilinear mapping-based data element integrity audit mechanism is introduced, allowing for the verification of data element receipts without revealing data privacy, effectively solving the problem of payment repudiation. Through theoretical analysis and experimental evaluation, the proposed scheme’s effectiveness and reliability are verified. The experimental results in a local simulation environment demonstrate that the proposed scheme is feasible and efficient.

  • [1]
    Liu Dongxiao, Huang Cheng, Ni Jianbing, et al. Blockchain-cloud transparent data marketing: Consortium management and fairness[J]. IEEE Transactions on Computers, 2022, 71(12): 3322−3335
    [2]
    王继业,高灵超,董爱强,等. 基于区块链的数据安全共享网络体系研究[J]. 计算机研究与发展,2017,54(4):742−749

    Wang Jiye, Gao Lingchao, Dong Aiqiang, et al. Block chain based data security sharing network architecture research[J]. Journal of Computer Research and Development, 2017, 54(4): 742−749 (in Chinese)
    [3]
    Cui Jie, Ouyang Fenqiang, Ying Zuobin, et al. Secure and efficient data sharing among vehicles based on consortium blockchain[J]. IEEE Transactions on Intelligent Transportation Systems, 2022, 23(7): 8857−8867 doi: 10.1109/TITS.2021.3086976
    [4]
    Zhang Duo, Wang Shangping, Zhang Yinglong, et al. A secure and privacy-preserving medical data sharing via consortium blockchain[J]. Security and Communication Networks, 2022, 2022: 2759787
    [5]
    Chen Fei, Wang Jiahao, Jiang Changkun, et al. Blockchain based non-repudiable iot data trading: Simpler, faster, and cheaper[C]//Proc of IEEE INFOCOM 2022-IEEE Conf on Computer Communications. Piscataway, NJ: IEEE, 2022: 1958−1967
    [6]
    Jiang Yiming, Wang Chenxu, Wang Yawei, et al. A cross-chain solution to integrating multiple blockchains for IoT data management[J]. Sensors, 2019, 19(9): 2042 doi: 10.3390/s19092042
    [7]
    Geng Qian, Ziang C, Jin Jian. Cross-organizational data exchange based on consortium blockchain with consistency guarantee[J]. The Journal of Supercomputing, 2024, 80: 18199−18236
    [8]
    Liu Yang, Yang Weidong, Wang Yanlin, et al. An access control model for data security sharing cross-domain in consortium blockchain[J]. IET Blockchain, 2023, 3(1): 18−34 doi: 10.1049/blc2.12022
    [9]
    Singh P, Masud M, Hossain M S, et al. Cross-domain secure data sharing using blockchain for industrial IoT[J]. Journal of Parallel and Distributed Computing, 2021, 156: 176−184 doi: 10.1016/j.jpdc.2021.05.007
    [10]
    Pedreira C, Belchior R, Matos M, et al. Securing cross-chain asset transfers on permissioned blockchains[J]. Authorea Preprints, 2023
    [11]
    Jiang Bohao, Li Chaoyang, Tang Yu, et al. Secure Cross-chain transaction for medical data sharing in blockchain-based internet of medical things[C]//Proc of the Int Conf on Frontiers in Cyber Security. Berlin: Springer, 2023: 3−18
    [12]
    Kannoori H, Balaraju P, Harika C, et al. Privacy preservation of insurance data sharing across permissioned blockchains[C]//Proc of the Int Conf on Frontiers in Computing and Systems. Berlin: Springer, 2023: 275−293
    [13]
    de Vos M, Ileri C U, Pouwelse J. XChange: A universal mechanism for asset exchange between permissioned blockchains[J]. World Wide Web, 2021: 1−38
    [14]
    Zhao Fangxin, Yu Jiguo, Yan Biwei. Towards cross-chain access control model for medical data sharing[J]. Procedia Computer Science, 2022, 202: 330−335 doi: 10.1016/j.procs.2022.04.045
    [15]
    Pedersen T P. Non-interactive and information-theoretic secure verifiable secret sharing[C]//Proc of Annual Int Cryptology Conf. Berlin: Springer, 1991: 129−140
    [16]
    Shamir A. How to share a secret[J]. Communications of the ACM, 1979, 22(11): 612−613 doi: 10.1145/359168.359176
    [17]
    Zhang Chuan, Xuan Haojun, Wu Tong, et al. Blockchain-based dynamic time-encapsulated data auditing for outsourcing storage[J]. IEEE Transactions on Information Forensics and Security, 2023, 19: 1979−1993
    [18]
    Boneh D, Boyen X. Short signatures without random oracles[C]//Advances in Cryptology-EUROCRYPT 2004: Int Conf on the Theory and Applications of Cryptographic Techniques. Interlaken, Switzerland, Proceedings 23, 2004: 56−73
    [19]
    Groth J. Homomorphic trapdoor commitments to group elements[R]. Cryptology ePrint Archive, 2009
    [20]
    司冰茹,肖江,刘存扬,等. 区块链网络综述[J]. 软件学报,2024,35(2):773−799

    Si Bingru, Xiao Jiang, Liu Cunyang, et al. Survey on blockchain network[J]. Journal of Software, 2024, 35(2): 773−799 (in Chinese)
    [21]
    Nakamoto S. Bitcoin: A peer-to-peer electronic cash system[EB/OL]. White paper, 2008[2024-05-30]. http://bitwin.org/bitcoin.pdf
    [22]
    Schär F. Decentralized finance: On blockchain- and smart contract-based financial markets[J]. FRB of St. Louis Review, 2021, 153−174
    [23]
    Rejeb A, Rejeb K, Simske S, et al. Exploring blockchain research in supply chain management: A latent Dirichlet allocation-driven systematic review[J]. Information, 2023, 14(10): 557 doi: 10.3390/info14100557
    [24]
    Liu P T S. Medical record system using blockchain, big data and tokenization[C]//Proc of the 18th Int Conf on Information and Communications Security (ICICS 2016). Singapore: Springer International Publishing, 2016: 254−261
    [25]
    李芳,李卓然,赵赫. 区块链跨链技术进展研究[J]. 软件学报,2019,30(6):1649−1660

    Li Fang, Li Zhuoran, Zhao He. Research on the progress in cross-chain technology of blockchains[J]. Journal of Software, 2019, 30(6): 1649−1660 (in Chinese)
    [26]
    Wood G. Polkadot: Vision for a heterogeneous multi-chain framework[R]. White paper, 2016, 21(2327): 4662
    [27]
    Kwon J, Buchman E. Cosmos whitepaper: A network of distributed ledgers[R]. White paper, 2019, 27: 1−32
    [28]
    Wanchain. Wanchain whitepaper: A distributed financial infrastructure for digital assets[R]. White paper, 2017
    [29]
    叶少杰,汪小益,徐才巢,等. BitXHub:基于侧链中继的异构区块链互操作平台[J]. 计算机科学,2020,47(6):294−302 doi: 10.11896/jsjkx.191100055

    Ye Shaojie, Wang Xiaoyi, Xu Caichao, et al. BitXHub: Side-relay chain based heterogeneous blockchain interoperable platform[J]. Computer Science, 2020, 47(6): 294−302 (in Chinese) doi: 10.11896/jsjkx.191100055
    [30]
    Buterin V. A next-generation smart contract and decentralized application platform[R]. White paper, 2014, 3(37): 2−1
  • Related Articles

    [1]Jia Xibin, Li Chen, Wang Luo, Zhang Muchen, Liu Xiaojian, Zhang Yangyang, Wen Jiakai. A Multimodal Cross-Domain Sentiment Analysis Algorithm Based on Feature Disentanglement Meta-Optimization[J]. Journal of Computer Research and Development. DOI: 10.7544/issn1000-1239.202440624
    [2]Wang Jina, Chen Junhua, Gao Jianhua. ECC Multi-Label Code Smell Detection Method Based on Ranking Loss[J]. Journal of Computer Research and Development, 2021, 58(1): 178-188. DOI: 10.7544/issn1000-1239.2021.20190836
    [3]Xing Xinying, Ji Junzhong, Yao Yao. Brain Networks Classification Based on an Adaptive Multi-Task Convolutional Neural Networks[J]. Journal of Computer Research and Development, 2020, 57(7): 1449-1459. DOI: 10.7544/issn1000-1239.2020.20190186
    [4]Dong Xueshi, Dong Wenyong, Wang Yufeng. Hybrid Algorithms for Multi-Objective Balanced Traveling Salesman Problem[J]. Journal of Computer Research and Development, 2017, 54(8): 1751-1762. DOI: 10.7544/issn1000-1239.2017.20170347
    [5]Zhu Yelei, Wang Yujun, Luo Qiang, and Tao Qing. A Soft-Thresholding Coordinate Descent Algorithm for Solving Truncated Hinge Loss[J]. Journal of Computer Research and Development, 2013, 50(11): 2295-2303.
    [6]Yang Liu, Yu Jian, Jing Liping. An Adaptive Large Margin Nearest Neighbor Classification Algorithm[J]. Journal of Computer Research and Development, 2013, 50(11): 2269-2277.
    [7]Kong Kang, Tao Qing, Wang Qunshan, Chu Dejun. A Sub-Gadient Based Solver for L1-Rgularization+Hinge-Loss Problem[J]. Journal of Computer Research and Development, 2012, 49(7): 1494-1499.
    [8]Gong Maoguo, Cheng Gang, Jiao Licheng, and Liu Chao. Nondominated Individual Selection Strategy Based on Adaptive Partition for Evolutionary Multi-Objective Optimization[J]. Journal of Computer Research and Development, 2011, 48(4): 545-557.
    [9]Wu Jiawei, Li Xiongfei, Sun Tao, and Li Wei. A Density-Based Clustering Algorithm Concerning Neighborhood Balance[J]. Journal of Computer Research and Development, 2010, 47(6): 1044-1052.
    [10]Chai Yunpeng, Gu Lei, and Li Sanli. Cluster-Based Edge Streaming Server with Adaptive Load Balance in Mobile Grid[J]. Journal of Computer Research and Development, 2007, 44(12): 2136-2142.

Catalog

    Article views (150) PDF downloads (72) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return