Skip to main content
Erschienen in: Peer-to-Peer Networking and Applications 2/2023

29.12.2022

A blockchain-based traceability system with efficient search and query

verfasst von: Chengzhe Lai, Yinzhen Wang, Hong Wang, Dong Zheng

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 2/2023

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With the emerging of blockchain technology, new technical solutions are available for secure storage and trusted computing in the data traceability. However, there are a number of problems with blockchain-based traceability systems. Firstly, querying the historical data of the blockchain is not efficient, becoming a critical performance bottleneck in traceability systems. Secondly, most of blockchain-based traceability systems are not well designed in terms of data privacy and access control. To address the above issues, we propose an efficient and secure blockchain-based traceability system. Specifically, we design a Merkle tree independent index structure that aims to support efficient traceability queries. In addition, we deeply integrate the system with cloud computing technology, and utilize searchable encryption and attribute-based encryption to achieve secure data storage and fine-grained access control. Finally, we simulate and evaluate our system in Hyperledger Fabric. The simulation results demonstrate that the proposed system has better execution efficiency.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Ali M, Khan SU, Vasilakos AV (2015) Security in cloud computing: Opportunities and challenges. Information Sciences: An International Journal Ali M, Khan SU, Vasilakos AV (2015) Security in cloud computing: Opportunities and challenges. Information Sciences: An International Journal
2.
Zurück zum Zitat Ali MS, Vecchio M, Pincheira M, Dolui K, Antonelli F, Rehmani MH (2018) Applications of blockchains in the internet of things: A comprehensive survey. Communications Surveys & Tutorials, IEEE Ali MS, Vecchio M, Pincheira M, Dolui K, Antonelli F, Rehmani MH (2018) Applications of blockchains in the internet of things: A comprehensive survey. Communications Surveys & Tutorials, IEEE
3.
Zurück zum Zitat Belotti M, Bozic N, Pujolle G, Secci S (2019) A vademecum on blockchain technologies: When, which and how. IEEE Commun Surv Tutorials PP(99):1–1 Belotti M, Bozic N, Pujolle G, Secci S (2019) A vademecum on blockchain technologies: When, which and how. IEEE Commun Surv Tutorials PP(99):1–1
4.
Zurück zum Zitat Nakamoto S (2008) Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review p. 21260 Nakamoto S (2008) Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review p. 21260
5.
Zurück zum Zitat Tschorsch F, Scheuermann B (2016) Bitcoin and beyond: A technical survey on decentralized digital currencies. IEEE Commun Surv Tutorials pp. 2084–2123 Tschorsch F, Scheuermann B (2016) Bitcoin and beyond: A technical survey on decentralized digital currencies. IEEE Commun Surv Tutorials pp. 2084–2123
6.
Zurück zum Zitat Wang W, Hoang DT, Hu P, Xiong Z, Niyato D, Wang P, Wen Y, Dong IK (2019) A survey on consensus mechanisms and mining strategy management in blockchain networks. IEEE Access Wang W, Hoang DT, Hu P, Xiong Z, Niyato D, Wang P, Wen Y, Dong IK (2019) A survey on consensus mechanisms and mining strategy management in blockchain networks. IEEE Access
7.
Zurück zum Zitat Xie J, Yu FR, Huang T, Xie R, Liu J, Liu Y (2019) A survey on the scalability of blockchain systems. IEEE Netw 33(5):166–173CrossRef Xie J, Yu FR, Huang T, Xie R, Liu J, Liu Y (2019) A survey on the scalability of blockchain systems. IEEE Netw 33(5):166–173CrossRef
8.
Zurück zum Zitat Androulaki E, Barger A, Bortnikov V, Cachin C, Christidis K, DeCaro A, Enyeart D, Ferris C, Laventman G, Manevich Y et al (2018) Hyperledger fabric: a distributed operating system for permissioned blockchains. In: Proceedings of the thirteenth EuroSys conference, pp. 1–15 Androulaki E, Barger A, Bortnikov V, Cachin C, Christidis K, DeCaro A, Enyeart D, Ferris C, Laventman G, Manevich Y et al (2018) Hyperledger fabric: a distributed operating system for permissioned blockchains. In: Proceedings of the thirteenth EuroSys conference, pp. 1–15
9.
Zurück zum Zitat Wood G et al (2014) Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper 151(2014):1–32 Wood G et al (2014) Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper 151(2014):1–32
10.
Zurück zum Zitat Cao Y, Jia F, Manogaran G (2020) Efficient traceability systems of steel products using blockchain-based industrial internet of things. IEEE Trans Industr Inf 16(9):6004–6012CrossRef Cao Y, Jia F, Manogaran G (2020) Efficient traceability systems of steel products using blockchain-based industrial internet of things. IEEE Trans Industr Inf 16(9):6004–6012CrossRef
11.
Zurück zum Zitat Liu H, Zhang P, Pu G, Yang T, Zhang Y (2020) Blockchain empowered cooperative authentication with data traceability in vehicular edge computing. IEEE Trans Veh Technol PP(99):1–1 Liu H, Zhang P, Pu G, Yang T, Zhang Y (2020) Blockchain empowered cooperative authentication with data traceability in vehicular edge computing. IEEE Trans Veh Technol PP(99):1–1
12.
Zurück zum Zitat Zhuang C, Dai Q, Zhang Y (2022) Bcppt: A blockchain-based privacy-preserving and traceability identity management scheme for intellectual property. Peer-to-Peer Networking and Applications pp. 1–15 Zhuang C, Dai Q, Zhang Y (2022) Bcppt: A blockchain-based privacy-preserving and traceability identity management scheme for intellectual property. Peer-to-Peer Networking and Applications pp. 1–15
13.
Zurück zum Zitat Zhang X, Sun Y, Sun Y (2022) Research on cold chain logistics traceability system of fresh agricultural products based on blockchain. Comput Intell Neurosci 2022 Zhang X, Sun Y, Sun Y (2022) Research on cold chain logistics traceability system of fresh agricultural products based on blockchain. Comput Intell Neurosci 2022
14.
Zurück zum Zitat Sunny J, Undralla N, Pillai VM (2020) Supply chain transparency through blockchain-based traceability: An overview with demonstration. Comput Ind Eng 150(3):106895CrossRef Sunny J, Undralla N, Pillai VM (2020) Supply chain transparency through blockchain-based traceability: An overview with demonstration. Comput Ind Eng 150(3):106895CrossRef
15.
Zurück zum Zitat Pal A, Kant K (2019) Using blockchain for provenance and traceability in internet of things-integrated food logistics. Computer 52(12):94–98CrossRef Pal A, Kant K (2019) Using blockchain for provenance and traceability in internet of things-integrated food logistics. Computer 52(12):94–98CrossRef
16.
Zurück zum Zitat Agrawal TK, Kumar V, Pal R, Wang L, Chen Y (2021) Blockchain-based framework for supply chain traceability: A case example of textile and clothing industry. Comput Ind Eng 154:107130CrossRef Agrawal TK, Kumar V, Pal R, Wang L, Chen Y (2021) Blockchain-based framework for supply chain traceability: A case example of textile and clothing industry. Comput Ind Eng 154:107130CrossRef
17.
Zurück zum Zitat Xu X, Lu Q, Liu Y, Zhu L, Yao H, Vasilakos AV (2019) Designing blockchain-based applications a case study for imported product traceability. Futur Gener Comput Syst 92(MAR.):399–406 Xu X, Lu Q, Liu Y, Zhu L, Yao H, Vasilakos AV (2019) Designing blockchain-based applications a case study for imported product traceability. Futur Gener Comput Syst 92(MAR.):399–406
18.
Zurück zum Zitat Maity M, Tolooie A, Sinha AK, Tiwari MK (2021) Stochastic batch dispersion model to optimize traceability and enhance transparency using blockchain. Comput Ind Eng p. 107134 Maity M, Tolooie A, Sinha AK, Tiwari MK (2021) Stochastic batch dispersion model to optimize traceability and enhance transparency using blockchain. Comput Ind Eng p. 107134
22.
Zurück zum Zitat Ruan P, Dinh T, Lin Q, Zhang M, Chen G, Ooi BC (2021) Lineagechain : a fine-grained, secure and efficient data provenance system for blockchains. VLDB J 30(1):3–24CrossRef Ruan P, Dinh T, Lin Q, Zhang M, Chen G, Ooi BC (2021) Lineagechain : a fine-grained, secure and efficient data provenance system for blockchains. VLDB J 30(1):3–24CrossRef
23.
Zurück zum Zitat Yang L, Kai Z, Ying Y, Qi L, Zhou X (2017) Etherql: A query layer for blockchain system. Springer International Publishing AG 2017 Yang L, Kai Z, Ying Y, Qi L, Zhou X (2017) Etherql: A query layer for blockchain system. Springer International Publishing AG 2017
24.
Zurück zum Zitat Xu C, Zhang C, Xu J (2018) vchain: Enabling verifiable boolean range queries over blockchain databases. SIGMOD/PODS ’19: International Conference on Management of Data Xu C, Zhang C, Xu J (2018) vchain: Enabling verifiable boolean range queries over blockchain databases. SIGMOD/PODS ’19: International Conference on Management of Data
25.
Zurück zum Zitat Zhang C, Xu C, Xu J, Tang Y, Choi B (2021) Gem2-tree: A gas-efficient structure for authenticated range queries in blockchain. In: 35th IEEE International Conference on Data Engineering (ICDE ?19) Zhang C, Xu C, Xu J, Tang Y, Choi B (2021) Gem2-tree: A gas-efficient structure for authenticated range queries in blockchain. In: 35th IEEE International Conference on Data Engineering (ICDE ?19)
26.
Zurück zum Zitat Gmbh A (2016) Bigchaindb: A scalable blockchain database Gmbh A (2016) Bigchaindb: A scalable blockchain database
27.
Zurück zum Zitat Peng Z, Wu H, Xiao B, Guo S (2019) Vql: Providing query efficiency and data authenticity in blockchain systems. In: 2019 IEEE 35th International Conference on Data Engineering Workshops (ICDEW), pp. 1–6. IEEE Peng Z, Wu H, Xiao B, Guo S (2019) Vql: Providing query efficiency and data authenticity in blockchain systems. In: 2019 IEEE 35th International Conference on Data Engineering Workshops (ICDEW), pp. 1–6. IEEE
28.
Zurück zum Zitat Wang S, Dinh TTA, Lin Q, Xie Z, Zhang M, Cai Q, Chen G, Fu W, Ooi BC, Ruan P (2018) Forkbase: An efficient storage engine for blockchain and forkable applications. arXiv preprint arXiv:1802.04949 Wang S, Dinh TTA, Lin Q, Xie Z, Zhang M, Cai Q, Chen G, Fu W, Ooi BC, Ruan P (2018) Forkbase: An efficient storage engine for blockchain and forkable applications. arXiv preprint arXiv:​1802.​04949
29.
Zurück zum Zitat Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: Proceeding 2000 IEEE symposium on security and privacy. S&P 2000, pp. 44–55. IEEE Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: Proceeding 2000 IEEE symposium on security and privacy. S&P 2000, pp. 44–55. IEEE
30.
Zurück zum Zitat Curtmola R, Garay J, Kamara S, Ostrovsky R (2011) Searchable symmetric encryption: improved definitions and efficient constructions. J Comput Secur 19(5):895–934CrossRef Curtmola R, Garay J, Kamara S, Ostrovsky R (2011) Searchable symmetric encryption: improved definitions and efficient constructions. J Comput Secur 19(5):895–934CrossRef
31.
Zurück zum Zitat Fu Z, Shu J, Sun X, Linge N (2014) Smart cloud search services: verifiable keyword-based semantic search over encrypted cloud data. IEEE Trans Consum Electron 60(4):762–770CrossRef Fu Z, Shu J, Sun X, Linge N (2014) Smart cloud search services: verifiable keyword-based semantic search over encrypted cloud data. IEEE Trans Consum Electron 60(4):762–770CrossRef
32.
Zurück zum Zitat Fu Z, Sun X, Linge N, Zhou L (2014) Achieving effective cloud search services: multi-keyword ranked search over encrypted cloud data supporting synonym query. IEEE Trans Consum Electron 60(1):164–172CrossRef Fu Z, Sun X, Linge N, Zhou L (2014) Achieving effective cloud search services: multi-keyword ranked search over encrypted cloud data supporting synonym query. IEEE Trans Consum Electron 60(1):164–172CrossRef
33.
Zurück zum Zitat Premasathian N, Choto S (2013) Searchable encryption schemes: With multiplication and simultaneous congruences. In: 2012 9th International ISC Conference on Information Security and Cryptology Premasathian N, Choto S (2013) Searchable encryption schemes: With multiplication and simultaneous congruences. In: 2012 9th International ISC Conference on Information Security and Cryptology
34.
Zurück zum Zitat Xia Z, Wang X, Sun X, Wang Q (2016) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distrib Syst 27(2):340–352CrossRef Xia Z, Wang X, Sun X, Wang Q (2016) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distrib Syst 27(2):340–352CrossRef
35.
Zurück zum Zitat Boneh D, Waters B (2007) Conjunctive, subset, and range queries on encrypted data. In: Theory of cryptography conference, pp. 535–554. Springer Boneh D, Waters B (2007) Conjunctive, subset, and range queries on encrypted data. In: Theory of cryptography conference, pp. 535–554. Springer
36.
Zurück zum Zitat Dan B, Crescenzo GD, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. EUROCRYPT 2004 Dan B, Crescenzo GD, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. EUROCRYPT 2004
37.
Zurück zum Zitat Hwang YH, Lee PJ (2007) Public key encryption with conjunctive keyword search and its extension to a multi-user system. In: International Conference on Pairing-based Cryptography Hwang YH, Lee PJ (2007) Public key encryption with conjunctive keyword search and its extension to a multi-user system. In: International Conference on Pairing-based Cryptography
38.
Zurück zum Zitat Miao Y, Ma J, Liu X, Liu Z, Wei F (2018) Vmkdo: Verifiable multi-keyword search over encrypted cloud data for dynamic data-owner. Peer-to-Peer Networking and Applications 11(1):1–11 Miao Y, Ma J, Liu X, Liu Z, Wei F (2018) Vmkdo: Verifiable multi-keyword search over encrypted cloud data for dynamic data-owner. Peer-to-Peer Networking and Applications 11(1):1–11
39.
Zurück zum Zitat Park DJ, Kim K, Lee PJ (2004) Public key encryption with conjunctive field keyword search. In: International Workshop on Information Security Applications, pp. 73–86. Springer Park DJ, Kim K, Lee PJ (2004) Public key encryption with conjunctive field keyword search. In: International Workshop on Information Security Applications, pp. 73–86. Springer
40.
Zurück zum Zitat Yin H, Zhang J, Xiong Y, Ou L, Li F, Liao S, Li K (2019) Cp-abse: A ciphertext-policy attribute-based searchable encryption scheme. IEEE Access Yin H, Zhang J, Xiong Y, Ou L, Li F, Liao S, Li K (2019) Cp-abse: A ciphertext-policy attribute-based searchable encryption scheme. IEEE Access
41.
Zurück zum Zitat Sahai A, Waters BR (2004) Fuzzy identity-based encryption. In: Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques Sahai A, Waters BR (2004) Fuzzy identity-based encryption. In: Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
42.
Zurück zum Zitat Attrapadung N, Libert B, Panafieu ED (2011) Expressive key-policy attribute-based encryption with constant-size ciphertexts. In: International Workshop on Public Key Cryptography Attrapadung N, Libert B, Panafieu ED (2011) Expressive key-policy attribute-based encryption with constant-size ciphertexts. In: International Workshop on Public Key Cryptography
43.
Zurück zum Zitat Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. ACMCrossRef Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. ACMCrossRef
44.
Zurück zum Zitat Hohenberger S, Waters B (2013) Attribute-Based Encryption with Fast Decryption. Attribute-Based Encryption with Fast Decryption Hohenberger S, Waters B (2013) Attribute-Based Encryption with Fast Decryption. Attribute-Based Encryption with Fast Decryption
45.
Zurück zum Zitat Lai J, Deng RH, Li Y, Weng J (2014) Fully secure key-policy attribute-based encryption with constant-size ciphertexts and fast decryption. ACMCrossRef Lai J, Deng RH, Li Y, Weng J (2014) Fully secure key-policy attribute-based encryption with constant-size ciphertexts and fast decryption. ACMCrossRef
46.
Zurück zum Zitat Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. IEEE Symposium on Security & Privacy Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. IEEE Symposium on Security & Privacy
47.
Zurück zum Zitat Emura K, Miyaji A, Nomura A, Omote K, Soshi M (2009) A ciphertext-policy attribute-based encryption scheme with constant ciphertext length. In: International Conference on Information Security Practice and Experience Emura K, Miyaji A, Nomura A, Omote K, Soshi M (2009) A ciphertext-policy attribute-based encryption scheme with constant ciphertext length. In: International Conference on Information Security Practice and Experience
48.
Zurück zum Zitat Rao YS, Dutta R (2013) Decentralized ciphertext-policy attribute-based encryption scheme with fast decryption. In: IFIP International Conference on Communications and Multimedia Security Rao YS, Dutta R (2013) Decentralized ciphertext-policy attribute-based encryption scheme with fast decryption. In: IFIP International Conference on Communications and Multimedia Security
49.
Zurück zum Zitat Zhang Y, Dong Z, Chen X, Jin L, Hui L (2014) Computationally efficient ciphertext-policy attribute-based encryption with constant-size ciphertexts. In: International Conference on Provable Security Zhang Y, Dong Z, Chen X, Jin L, Hui L (2014) Computationally efficient ciphertext-policy attribute-based encryption with constant-size ciphertexts. In: International Conference on Provable Security
50.
Zurück zum Zitat Green M, Hohenberger S, Waters B et al (2011) Outsourcing the decryption of abe ciphertexts. In: USENIX security symposium 2011 Green M, Hohenberger S, Waters B et al (2011) Outsourcing the decryption of abe ciphertexts. In: USENIX security symposium 2011
51.
Zurück zum Zitat Liu S, Yu J, Xiao Y, Wan Z, Yan B (2020) Bc-sabe: Blockchain-aided searchable attribute-based encryption for cloud-iot. IEEE Internet Things J PP(99):1–1 Liu S, Yu J, Xiao Y, Wan Z, Yan B (2020) Bc-sabe: Blockchain-aided searchable attribute-based encryption for cloud-iot. IEEE Internet Things J PP(99):1–1
52.
Zurück zum Zitat Zheng H, Shao J, Wei G (2020) Attribute-based encryption with outsourced decryption in blockchain. Peer-to-Peer Networking and Applications 13(5):1643–1655CrossRef Zheng H, Shao J, Wei G (2020) Attribute-based encryption with outsourced decryption in blockchain. Peer-to-Peer Networking and Applications 13(5):1643–1655CrossRef
53.
Zurück zum Zitat Tang X, Guo C, Choo KKR, Liu Y, Li L (2021) A secure and trustworthy medical record sharing scheme based on searchable encryption and blockchain. Comput Netw 200:108540CrossRef Tang X, Guo C, Choo KKR, Liu Y, Li L (2021) A secure and trustworthy medical record sharing scheme based on searchable encryption and blockchain. Comput Netw 200:108540CrossRef
54.
Zurück zum Zitat Li H, Wang T, Qiao Z, Yang B, Gong Y, Wang J, Qiu G (2021) Blockchain-based searchable encryption with efficient result verification and fair payment. Journal of Information Security and Applications 58 Li H, Wang T, Qiao Z, Yang B, Gong Y, Wang J, Qiu G (2021) Blockchain-based searchable encryption with efficient result verification and fair payment. Journal of Information Security and Applications 58
55.
Zurück zum Zitat Niu J, Li X, Gao J, Han Y (2019) Blockchain-based anti-key-leakage key aggregation searchable encryption for iot. IEEE Internet Things J PP(99):1–1 Niu J, Li X, Gao J, Han Y (2019) Blockchain-based anti-key-leakage key aggregation searchable encryption for iot. IEEE Internet Things J PP(99):1–1
56.
Zurück zum Zitat Chen B, Wu L, Wang H, Zhou L, He D (2020) A blockchain-based searchable public-key encryption with forward and backward privacy for cloud-assisted vehicular social networks. IEEE Trans Veh Technol 69(6):5813–5825CrossRef Chen B, Wu L, Wang H, Zhou L, He D (2020) A blockchain-based searchable public-key encryption with forward and backward privacy for cloud-assisted vehicular social networks. IEEE Trans Veh Technol 69(6):5813–5825CrossRef
57.
Zurück zum Zitat Xu C, Yu L, Zhu L, Zhang C (2021) A blockchain-based dynamic searchable symmetric encryption scheme under multiple clouds. Peer-to-Peer Networking and Applications Xu C, Yu L, Zhu L, Zhang C (2021) A blockchain-based dynamic searchable symmetric encryption scheme under multiple clouds. Peer-to-Peer Networking and Applications
Metadaten
Titel
A blockchain-based traceability system with efficient search and query
verfasst von
Chengzhe Lai
Yinzhen Wang
Hong Wang
Dong Zheng
Publikationsdatum
29.12.2022
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 2/2023
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-022-01438-w

Weitere Artikel der Ausgabe 2/2023

Peer-to-Peer Networking and Applications 2/2023 Zur Ausgabe