• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Hao Jiakun, Xiang Peng, He Yifei, Gao Jianbo, Guan Zhi, Xie Anming, Chen Zhong. Cross-Domain Data Trading System Based on Decentralized Identity[J]. Journal of Computer Research and Development, 2024, 61(10): 2570-2586. DOI: 10.7544/issn1000-1239.202440456
Citation: Hao Jiakun, Xiang Peng, He Yifei, Gao Jianbo, Guan Zhi, Xie Anming, Chen Zhong. Cross-Domain Data Trading System Based on Decentralized Identity[J]. Journal of Computer Research and Development, 2024, 61(10): 2570-2586. DOI: 10.7544/issn1000-1239.202440456

Cross-Domain Data Trading System Based on Decentralized Identity

Funds: This work was supported by the National Key Research and Development Program of China (2023YFB2704800) and the National Natural Science Foundation of China (62202011, 62172010).
More Information
  • Author Bio:

    Hao Jiakun: born in 1998. PhD condidate. His main research interests include blockchain, distributed system, and cryptography

    Xiang Peng: born in 1994. PhD condidate. His main research interests include blockchain and network security

    He Yifei: born in 1998. PhD candidate. His main research interests include blockchain technology and cryptography

    Gao Jianbo: born in 1994. PhD, associate professor. Member of CCF. His main research interests include blockchain, digital identity, and domain-specific software engineering

    Guan Zhi: born in 1980. PhD, associate professor. Member of CCF. His main research interests include blockchain and cryptography

    Xie Anming: born in 1977. PhD. His main research interests include big data security, blockchain security, and cryptography application

    Chen Zhong: born in 1963. PhD, professor, PhD supervisor. Fellow of CCF. His main research interests include domain-specific software engineering, network and information security, and system software

  • Received Date: June 03, 2024
  • Revised Date: July 17, 2024
  • Available Online: September 13, 2024
  • In the digital era, data, as a critical factor of production, is essential for economic growth, technological innovation, and enhancing corporate competitiveness. Traditional centralized data trading systems pose a series of data and transaction security risks. Although decentralized data trading systems based on blockchain technology have emerged, which can guarantee security for data transactions through blockchain and smart contracts, systems based on blockchain still struggle with cross-regional, cross-domain, and international data transactions. They primarily face the following three challenges: 1) Consistency of cross-domain identity resolution results. 2) Availability of cross-domain identity resolution services. 3) Security and compliance issues for cross-domain data trading systems. To address these issues, we design a secure and efficient cross-domain identity resolution mechanism based on decentralized identity technology and construct a secure, regulated decentralized data trading system based on this mechanism. The identity resolution mechanism includes a set of cross-domain protocols that ensure the consistency of resolution results and an incentive mechanism that ensures the availability of services executing these protocols. The decentralized data trading system supports granular regulation based on identity attributes and ensures the atomicity of cross-domain data transactions. Experimental verification shows that this system meets the design targets. By batch constructing cross-domain resolution requests, the identity cross-domain resolution protocol and caching mechanism can ensure the correctness of the resolution results, with the resolution latency being only 45% of the cross-domain resolution latency. Additionally, the cache can increase the hit rate by 72% through active and passive update mechanisms. The system is also compatible with multiple blockchain systems, and cross-domain data transactions can be completed within an average of 2.3 blocks, making the system efficiency within an acceptable range.

  • [1]
    董祥千,郭兵,沈艳,等. 一种高效安全的去中心化数据共享模型[J]. 计算机学报,2018,41(5):1021−1036

    Dong Xiangqian, Guo Bing, Shen Yan, et al. An efficient and secure decentrailizing data sharing model[J]. Chinese Journal of Computers, 2018, 41(5): 1021−1036 (in Chinese)
    [2]
    Chen L, Koutris P, Kumar A. Towards model-based pricing for machine learning in a data marketplace[C]//Proc of the 2019 Int Conf on Management of Data. New York: ACM, 2019: 1535−1552
    [3]
    Wang Yujue, Wu Qianhong, Qin Bo, et al. Identity-based data outsourcing with comprehensive auditing in clouds[J]. IEEE Transactions on Information Forensics and Security, 2016, 12(4): 940−952
    [4]
    江东,袁野,张小伟,等. 数据定价与交易研究综述[J]. 软件学报,2023,34(3):1396−1424

    Jing Dong, Yuan Ye, Zhang Xiaowei, et al. Survey on data pricing and trading research[J]. Journal of Software, 2023, 34(3): 1396−1424 (in Chinese)
    [5]
    Zhao Yanqi, Yu Yong, Li Yannan, et al. Machine learning based privacy-preserving fair data trading in big data market[J]. Information Sciences, 2019, 478: 449−460 doi: 10.1016/j.ins.2018.11.028
    [6]
    Bajoudah S, Dong C, Missier P. Toward a decentralized, trust-less marketplace for brokered IoT data trading using blockchain[C]//Proc of 2019 IEEE Int Conf on Blockchain (Blockchain). Piscataway, NJ: IEEE, 2019: 339−346
    [7]
    Shen Meng, Liu Huisen, Zhu Liehuang, et al. Blockchain-assisted secure device authentication for cross-domain industrial IoT[J]. IEEE Journal on Selected Areas in Communications, 2020, 38(5): 942−954 doi: 10.1109/JSAC.2020.2980916
    [8]
    Su Liya, Shen Xinyue, Du Xiangyu, et al. Evil under the sun: Understanding and discovering attacks on Ethereum decentralized applications[C]//Proc of the 30th USENIX Security Symp (USENIX Security 21). Berkeley, CA: USENIX Association, 2021: 1307−1324
    [9]
    Lu Qinghua, Xu Xiwei, Liu Yue, et al. uBaaS: A unified blockchain as a service platform[J]. Future Generation Computer Systems, 2019, 101: 564−575 doi: 10.1016/j.future.2019.05.051
    [10]
    Han Rong, Yan Zheng, Liang Xueqin, et al. How can incentive mechanisms and blockchain benefit with each other? a survey[J]. ACM Computing Surveys, 2022, 55(7): 1−38
    [11]
    Islam M M, Islam M K, Shahjalal M, et al. A low-cost cross-border payment system based on auditable cryptocurrency with consortium blockchain: Joint digital currency[J]. IEEE Transactions on Services Computing, 2022, 16(3): 1616−1629
    [12]
    吴振豪,高健博,李青山,等. 数据安全治理中的安全技术研究[J]. 信息安全研究,2021,7(10):907−914

    Wu Zhenhao, Gao Jianbo, Li Qingshan, et al. Research on security technologies in data security governance[J]. Journal of Information Security Research, 2021, 7(10): 907−914 (in Chinese)
    [13]
    胡震宇,邓伦治,高岩,等. 一个指定验证者的基于身份可搜索认证加密方案[J]. 贵州师范大学学报:自然科学版,2022,40(3):56−63,101

    Hu Zhenyu, Deng Lunzhi, Gao Yan, et al. A designated tester identity-based searchable authenticated encryption scheme[J]. Journal of Guizhou Normal University (Natural Sciences), 2022, 40(3): 56−63, 101 (in Chinese)
    [14]
    黄一才,郁滨. 一种基于SHVE的连接查询动态对称可搜索加密方案[J]. 计算机研究与发展,2024,61(6):1545−1558

    Huang Yicai, Yu Bin. Dynamic searchable symmetric encryption scheme for conjunctive queries basedon SHVE[J]. Journal of Computer Research and Development, 2024, 61(6): 1545−1558 (in Chinese)
    [15]
    冯帅,邓伦治. 基于身份的隐私保护数据审计方案[J]. 贵州师范大学学报:自然科学版,2023,41(2):105−112

    Feng Shuai, Deng Lunzhi. Identity-based data auditing scheme with privacy protection[J]. Journal of Guizhou Normal University (Natural Sciences), 2023, 41(2): 105−112 (in Chinese)
    [16]
    申远,宋伟,赵常胜,等. 支持访问行为身份追踪的跨域密文共享方案[J]. 计算机研究与发展,2024,61(7):1611−1628

    Shen Yuan, Song Wei, Zhao Changsheng, et al. A cross-domain ciphertext sharing scheme supporting access behavior identity tracing[J]. Journal of Computer Research and Development, 2024, 61(7): 1611−1628 (in Chinese)
    [17]
    Feng Chaosheng, Liu Bin, Guo Zhen, et al. Blockchain-based cross-domain authentication for intelligent 5G-enabled Internet of drones[J]. IEEE Internet of Things Journal, 2021, 9(8): 6224−6238
    [18]
    Chen Dajiang, Zhang Ning, Cheng Nan, et al. Physical layer based message authentication with secure channel codes[J]. IEEE Transactions on Dependable and Secure Computing, 2018, 17(5): 1079−1093
    [19]
    Chen Dajiang, Jiang Shaoquan, Zhang Ning, et al. On message authentication channel capacity over a wiretap channel[J]. IEEE Transactions on Information Forensics and Security, 2022, 17: 3107−3122 doi: 10.1109/TIFS.2022.3201386
    [20]
    Li Ming, Weng Jian, Yang Anjia. CrowdBC: A blockchain-based decentralized framework for crowdsourcing[J]. IEEE transactions on parallel and distributed systems, 2018, 30(6): 1251−1266
    [21]
    Qin Zhiguang, Xiong Hu, Wu Shikun, et al. A survey of proxy re-encryption for secure data sharing in cloud computing[J]. IEEE Transactions on Services Computing, 2016. Doi: 10.1109/TSC.2016.2551238
    [22]
    Lai Junzuo, Deng R H, Guan Chaowen, et al. Attribute-based encryption with verifiable outsourced decryption[J]. IEEE Transactions on Information Forensics and Security, 2013, 8(8): 1343−1354 doi: 10.1109/TIFS.2013.2271848
    [23]
    Lai Junzuo, Deng R H, Guan Chaowen, et al. Cryptographic solutions for cloud storage: Challenges and research opportunities[J]. IEEE Transactions on Services Computing, 2019, 15(1): 567−587
    [24]
    Wan Zhiguo, Liu Wei, Cui Hui. HIBEChain: A hierarchical identity-based blockchain system for large-scale IoT[J]. IEEE Transactions on Dependable and Secure Computing, 2022, 20(2): 1286−1301
    [25]
    Yang Xiaohui, Li Wenjie. A zero-knowledge-proof-based digital identity management scheme in blockchain[J]. Computers & Security, 2020, 99: 102050
    [26]
    Xu Jie, Xue Kaiping, Tian Hangyu, et al. An identity management and authentication scheme based on redactable blockchain for mobile networks[J]. IEEE Transactions on Vehicular Technology, 2020, 69(6): 6688−6698 doi: 10.1109/TVT.2020.2986041
    [27]
    Koutsos V, Papadopoulos D, Chatzopoulos D, et al. Agora: A Privacy-Aware Data Marketplace[J/OL]. IEEE Transactions on Dependable and Secure Computing, 2022, 19(6): 3728−3740
    [28]
    Li Chunlin, Liang Songyu, Zhang Jing, et al. Blockchain-based data trading in edge-cloud computing environment[J/OL]. Information Processing & Management, 2022, 59(1): 102786
    [29]
    Gupta P, Dedeoglu V, Kanhere S S, et al. TrailChain: Traceability of data ownership across blockchain-enabled multiple marketplaces[J]. Journal of Network and Computer Applications, 2022, 203: 103389 doi: 10.1016/j.jnca.2022.103389
    [30]
    Dixit A, Singh A, Rahulamathavan Y, et al. FAST DATA: A fair, secure, and trusted decentralized IIoT data marketplace enabled by blockchain[J]. IEEE Internet of Things Journal, 2023, 10(4): 2934−2944 doi: 10.1109/JIOT.2021.3120640
    [31]
    Lin C H V, Huang C C J, Yuan Yanghao, et al. A fully decentralized infrastructure for subscription-based IoT data trading[C/OL]//Proc of 2020 IEEE Int Conf on Blockchain (Blockchain). Piscataway, NJ: IEEE, 2020: 162−169
    [32]
    Ou W, Huang S, Zheng J, et al. An overview on cross-chain: Mechanism, platforms, challenges and advances[J]. Computer Networks, 2022, 218: 109378 doi: 10.1016/j.comnet.2022.109378
    [33]
    Gilad-Bachrach R, Laine K, Lauter K, et al. Secure Data Exchange: A marketplace in the cloud[C/OL]//Proc of the 2019 ACM SIGSAC Conf on Cloud Computing Security Workshop. New York: ACM, 2019: 117−128
    [34]
    Hu Donghui, Li Yifan, Pan Lixuan, et al. A blockchain-based trading system for big data[J]. Computer Networks, 2021, 191: 107994 doi: 10.1016/j.comnet.2021.107994
    [35]
    Manu S, Amy G, Markus S, et al. Decentralized Identifiers (DIDs) v1.0[EB/OL]. [2024-05-15]. https://www.w3.org/TR/did-core/
    [36]
    Manu S, Grant N, Dave L, et al. Verifiable Credentials Data Model v1.1[EB/OL]. [2024-05-15]. https://www.w3.org/TR/vc-data-model/
    [37]
    Manu S, Kyle D H, Michael P. DID Specification Registries[EB/OL]. [2024-07-16]. https://www.w3.org/TR/did-spec-registries/
    [38]
    Decentralized Identity Foundation. decentralized-identity/universal-resolver: Universal Resolver implementation and drivers[CP/OL]. [2024-05-10]. https://github.com/decentralized-identity/universal-resolver
    [39]
    Decentralized identity foundation. decentralized-identity/universal-registrar[CP/OL]. [2024-05-10]. https://github.com/decentralized-identity/universal-registrar
    [40]
    Ren Yuzheng, Xie Renchao, Yu F R, et al. Potential identity resolution systems for the industrial Internet of Things: A survey[J]. IEEE Communications Surveys & Tutorials, 2020, 23(1): 391−430
    [41]
    Inci M S, Gulmezoglu B, Irazoqui G, et al. Cache attacks enable bulk key recovery on the cloud[C]//Proc of the18th Int Conf on Cryptographic Hardware and Embedded Systems (CHES 2016). Berlin: Springer, 2016: 368−388
    [42]
    韩璇,袁勇,王飞跃. 区块链安全问题:研究现状与展望[J]. 自动化学报,2019,45(01):206−225

    Han Xuan, Yuan Yong, Wang Feiyue. Security problems on blockchain: The state of the art and future trends[J]. Acta Automatica Sinica, 2019, 45(01): 206−225 (in Chinese)
    [43]
    高健博,张家硕,李青山,等. RegLang:一种面向监管的智能合约编程语言[J]. 计算机科学,2022,49(S1):462−468

    Gao Jianbo, Zhang Jiashuo, Li Qingshan, et al. RegLang: A smart contract programming language for regulation[J]. Computer Science, 2022, 49(S1): 462−468 (in Chinese)
    [44]
    ERC−20: Token standard[EB/OL]//Ethereum Improvement Proposals. [2024−05−16]. https://eips.ethereum.org/EIPS/eip-20
    [45]
    Jayabalan J, Jeyanthi N. Scalable blockchain model using off-chain IPFS storage for healthcare data security and privacy[J]. Journal of Parallel and Distributed Computing, 2022, 164: 152−167 doi: 10.1016/j.jpdc.2022.03.009
    [46]
    Kostamis P, Sendros A, Efraimidis P S. Data management in Ethereum DApps: A cost and performance analysis[J]. Future Generation Computer Systems, 2024, 153: 193−205 doi: 10.1016/j.future.2023.11.026
    [47]
    Wood G. Ethereum: A secure decentralised generalised transaction ledger[J]. Ethereum Project Yellow Paper, 2014, 151(2014): 1−32
    [48]
    DANNEN C. Introducing Ethereum and Solidity[M]. Berlin: Springer, 2017
    [49]
    Ethereum. ethereum/Web3. py[CP/OL]. [2024-05-15]. https://github.com/ethereum/web3.py
    [50]
    Ethereum. ERC−1056: Ethereum lightweight identity[EB/OL]//Ethereum Improvement Proposals. [2024-05-10]. https://eips.ethereum.org/EIPS/eip-1056
    [51]
    李贝,吴昊,贺小伟,等. 区块链系统的存储可扩展性综述[J]. 计算机科学,2023,50(1):318−333 doi: 10.11896/jsjkx.211200042

    Li Bei, Wu Hao, He Xiaowei, et al. Survey of storage scalability in blockchain systems[J]. Computer Science, 2023, 50(1): 318−333 (in Chinese) doi: 10.11896/jsjkx.211200042
  • Related Articles

    [1]Lin Liansheng, Zheng Huanqin, Su Shen, Lei Kai, Chen Xiaofeng, Tian Zhihong. An On-Chain Mechanism Against DeFi Price Manipulation Attacks[J]. Journal of Computer Research and Development, 2025, 62(2): 443-457. DOI: 10.7544/issn1000-1239.202330291
    [2]Song Shuwei, Ni Xiaoze, Chen Ting. Gas Optimization for Smart Contracts: A Survey[J]. Journal of Computer Research and Development, 2023, 60(2): 311-325. DOI: 10.7544/issn1000-1239.202220887
    [3]Ying Chenhao, Xia Fuyuan, Li Jie, Si Xueming, Luo Yuan. Incentive Mechanism Based on Truth Estimation of Private Data for Blockchain-Based Mobile Crowdsensing[J]. Journal of Computer Research and Development, 2022, 59(10): 2212-2232. DOI: 10.7544/issn1000-1239.20220493
    [4]Feng Jingyu, Yang Jinwen, Zhang Ruitong, Zhang Wenbo. A Spectrum Sharing Incentive Scheme Against Location Privacy Leakage in IoT Networks[J]. Journal of Computer Research and Development, 2020, 57(10): 2209-2220. DOI: 10.7544/issn1000-1239.2020.20200453
    [5]Hai Mo, Zhu Jianming. A Propagation Mechanism Combining an Optimal Propagation Path and Incentive in Blockchain Networks[J]. Journal of Computer Research and Development, 2019, 56(6): 1205-1218. DOI: 10.7544/issn1000-1239.2019.20180419
    [6]He Yunhua, Li Mengru, Li Hong, Sun Limin, Xiao Ke, Yang Chao. A Blockchain Based Incentive Mechanism for Crowdsensing Applications[J]. Journal of Computer Research and Development, 2019, 56(3): 544-554. DOI: 10.7544/issn1000-1239.2019.20170670
    [7]He Haiwu, Yan An, Chen Zehua. Survey of Smart Contract Technology and Application Based on Blockchain[J]. Journal of Computer Research and Development, 2018, 55(11): 2452-2466. DOI: 10.7544/issn1000-1239.2018.20170658
    [8]Xiong Jinbo, Ma Rong, Niu Ben, Guo Yunchuan, Lin Li. Privacy Protection Incentive Mechanism Based on User-Union Matching in Mobile Crowdsensing[J]. Journal of Computer Research and Development, 2018, 55(7): 1359-1370. DOI: 10.7544/issn1000-1239.2018.20180080
    [9]Wang Bo, Huang Chuanhe, Yang Wenzhong, Dan Feng, and Xu Liya. An Incentive-Cooperative Forwarding Model Based on Punishment Mechanism in Wireless Ad Hoc Networks[J]. Journal of Computer Research and Development, 2011, 48(3): 398-406.
    [10]Yue Guangxue, Li Renfa, Chen Zhi, Zhou Xu. Analysis of Free-riding Behaviors and Modeling Restrain Mechanisms for Peer-to-Peer Networks[J]. Journal of Computer Research and Development, 2011, 48(3): 382-397.
  • Cited by

    Periodical cited type(1)

    1. 苏璞睿,冯登国. 2024年网络空间安全科技热点回眸. 科技导报. 2025(01): 102-117 .

    Other cited types(0)

Catalog

    Article views (169) PDF downloads (74) Cited by(1)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return