Skip to main content
Top
Published in: Peer-to-Peer Networking and Applications 2/2023

29-12-2022

A blockchain-based traceability system with efficient search and query

Authors: Chengzhe Lai, Yinzhen Wang, Hong Wang, Dong Zheng

Published in: Peer-to-Peer Networking and Applications | Issue 2/2023

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

With the emerging of blockchain technology, new technical solutions are available for secure storage and trusted computing in the data traceability. However, there are a number of problems with blockchain-based traceability systems. Firstly, querying the historical data of the blockchain is not efficient, becoming a critical performance bottleneck in traceability systems. Secondly, most of blockchain-based traceability systems are not well designed in terms of data privacy and access control. To address the above issues, we propose an efficient and secure blockchain-based traceability system. Specifically, we design a Merkle tree independent index structure that aims to support efficient traceability queries. In addition, we deeply integrate the system with cloud computing technology, and utilize searchable encryption and attribute-based encryption to achieve secure data storage and fine-grained access control. Finally, we simulate and evaluate our system in Hyperledger Fabric. The simulation results demonstrate that the proposed system has better execution efficiency.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Ali M, Khan SU, Vasilakos AV (2015) Security in cloud computing: Opportunities and challenges. Information Sciences: An International Journal Ali M, Khan SU, Vasilakos AV (2015) Security in cloud computing: Opportunities and challenges. Information Sciences: An International Journal
2.
go back to reference Ali MS, Vecchio M, Pincheira M, Dolui K, Antonelli F, Rehmani MH (2018) Applications of blockchains in the internet of things: A comprehensive survey. Communications Surveys & Tutorials, IEEE Ali MS, Vecchio M, Pincheira M, Dolui K, Antonelli F, Rehmani MH (2018) Applications of blockchains in the internet of things: A comprehensive survey. Communications Surveys & Tutorials, IEEE
3.
go back to reference Belotti M, Bozic N, Pujolle G, Secci S (2019) A vademecum on blockchain technologies: When, which and how. IEEE Commun Surv Tutorials PP(99):1–1 Belotti M, Bozic N, Pujolle G, Secci S (2019) A vademecum on blockchain technologies: When, which and how. IEEE Commun Surv Tutorials PP(99):1–1
4.
go back to reference Nakamoto S (2008) Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review p. 21260 Nakamoto S (2008) Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review p. 21260
5.
go back to reference Tschorsch F, Scheuermann B (2016) Bitcoin and beyond: A technical survey on decentralized digital currencies. IEEE Commun Surv Tutorials pp. 2084–2123 Tschorsch F, Scheuermann B (2016) Bitcoin and beyond: A technical survey on decentralized digital currencies. IEEE Commun Surv Tutorials pp. 2084–2123
6.
go back to reference Wang W, Hoang DT, Hu P, Xiong Z, Niyato D, Wang P, Wen Y, Dong IK (2019) A survey on consensus mechanisms and mining strategy management in blockchain networks. IEEE Access Wang W, Hoang DT, Hu P, Xiong Z, Niyato D, Wang P, Wen Y, Dong IK (2019) A survey on consensus mechanisms and mining strategy management in blockchain networks. IEEE Access
7.
go back to reference Xie J, Yu FR, Huang T, Xie R, Liu J, Liu Y (2019) A survey on the scalability of blockchain systems. IEEE Netw 33(5):166–173CrossRef Xie J, Yu FR, Huang T, Xie R, Liu J, Liu Y (2019) A survey on the scalability of blockchain systems. IEEE Netw 33(5):166–173CrossRef
8.
go back to reference Androulaki E, Barger A, Bortnikov V, Cachin C, Christidis K, DeCaro A, Enyeart D, Ferris C, Laventman G, Manevich Y et al (2018) Hyperledger fabric: a distributed operating system for permissioned blockchains. In: Proceedings of the thirteenth EuroSys conference, pp. 1–15 Androulaki E, Barger A, Bortnikov V, Cachin C, Christidis K, DeCaro A, Enyeart D, Ferris C, Laventman G, Manevich Y et al (2018) Hyperledger fabric: a distributed operating system for permissioned blockchains. In: Proceedings of the thirteenth EuroSys conference, pp. 1–15
9.
go back to reference Wood G et al (2014) Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper 151(2014):1–32 Wood G et al (2014) Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper 151(2014):1–32
10.
go back to reference Cao Y, Jia F, Manogaran G (2020) Efficient traceability systems of steel products using blockchain-based industrial internet of things. IEEE Trans Industr Inf 16(9):6004–6012CrossRef Cao Y, Jia F, Manogaran G (2020) Efficient traceability systems of steel products using blockchain-based industrial internet of things. IEEE Trans Industr Inf 16(9):6004–6012CrossRef
11.
go back to reference Liu H, Zhang P, Pu G, Yang T, Zhang Y (2020) Blockchain empowered cooperative authentication with data traceability in vehicular edge computing. IEEE Trans Veh Technol PP(99):1–1 Liu H, Zhang P, Pu G, Yang T, Zhang Y (2020) Blockchain empowered cooperative authentication with data traceability in vehicular edge computing. IEEE Trans Veh Technol PP(99):1–1
12.
go back to reference Zhuang C, Dai Q, Zhang Y (2022) Bcppt: A blockchain-based privacy-preserving and traceability identity management scheme for intellectual property. Peer-to-Peer Networking and Applications pp. 1–15 Zhuang C, Dai Q, Zhang Y (2022) Bcppt: A blockchain-based privacy-preserving and traceability identity management scheme for intellectual property. Peer-to-Peer Networking and Applications pp. 1–15
13.
go back to reference Zhang X, Sun Y, Sun Y (2022) Research on cold chain logistics traceability system of fresh agricultural products based on blockchain. Comput Intell Neurosci 2022 Zhang X, Sun Y, Sun Y (2022) Research on cold chain logistics traceability system of fresh agricultural products based on blockchain. Comput Intell Neurosci 2022
14.
go back to reference Sunny J, Undralla N, Pillai VM (2020) Supply chain transparency through blockchain-based traceability: An overview with demonstration. Comput Ind Eng 150(3):106895CrossRef Sunny J, Undralla N, Pillai VM (2020) Supply chain transparency through blockchain-based traceability: An overview with demonstration. Comput Ind Eng 150(3):106895CrossRef
15.
go back to reference Pal A, Kant K (2019) Using blockchain for provenance and traceability in internet of things-integrated food logistics. Computer 52(12):94–98CrossRef Pal A, Kant K (2019) Using blockchain for provenance and traceability in internet of things-integrated food logistics. Computer 52(12):94–98CrossRef
16.
go back to reference Agrawal TK, Kumar V, Pal R, Wang L, Chen Y (2021) Blockchain-based framework for supply chain traceability: A case example of textile and clothing industry. Comput Ind Eng 154:107130CrossRef Agrawal TK, Kumar V, Pal R, Wang L, Chen Y (2021) Blockchain-based framework for supply chain traceability: A case example of textile and clothing industry. Comput Ind Eng 154:107130CrossRef
17.
go back to reference Xu X, Lu Q, Liu Y, Zhu L, Yao H, Vasilakos AV (2019) Designing blockchain-based applications a case study for imported product traceability. Futur Gener Comput Syst 92(MAR.):399–406 Xu X, Lu Q, Liu Y, Zhu L, Yao H, Vasilakos AV (2019) Designing blockchain-based applications a case study for imported product traceability. Futur Gener Comput Syst 92(MAR.):399–406
18.
go back to reference Maity M, Tolooie A, Sinha AK, Tiwari MK (2021) Stochastic batch dispersion model to optimize traceability and enhance transparency using blockchain. Comput Ind Eng p. 107134 Maity M, Tolooie A, Sinha AK, Tiwari MK (2021) Stochastic batch dispersion model to optimize traceability and enhance transparency using blockchain. Comput Ind Eng p. 107134
22.
go back to reference Ruan P, Dinh T, Lin Q, Zhang M, Chen G, Ooi BC (2021) Lineagechain : a fine-grained, secure and efficient data provenance system for blockchains. VLDB J 30(1):3–24CrossRef Ruan P, Dinh T, Lin Q, Zhang M, Chen G, Ooi BC (2021) Lineagechain : a fine-grained, secure and efficient data provenance system for blockchains. VLDB J 30(1):3–24CrossRef
23.
go back to reference Yang L, Kai Z, Ying Y, Qi L, Zhou X (2017) Etherql: A query layer for blockchain system. Springer International Publishing AG 2017 Yang L, Kai Z, Ying Y, Qi L, Zhou X (2017) Etherql: A query layer for blockchain system. Springer International Publishing AG 2017
24.
go back to reference Xu C, Zhang C, Xu J (2018) vchain: Enabling verifiable boolean range queries over blockchain databases. SIGMOD/PODS ’19: International Conference on Management of Data Xu C, Zhang C, Xu J (2018) vchain: Enabling verifiable boolean range queries over blockchain databases. SIGMOD/PODS ’19: International Conference on Management of Data
25.
go back to reference Zhang C, Xu C, Xu J, Tang Y, Choi B (2021) Gem2-tree: A gas-efficient structure for authenticated range queries in blockchain. In: 35th IEEE International Conference on Data Engineering (ICDE ?19) Zhang C, Xu C, Xu J, Tang Y, Choi B (2021) Gem2-tree: A gas-efficient structure for authenticated range queries in blockchain. In: 35th IEEE International Conference on Data Engineering (ICDE ?19)
26.
go back to reference Gmbh A (2016) Bigchaindb: A scalable blockchain database Gmbh A (2016) Bigchaindb: A scalable blockchain database
27.
go back to reference Peng Z, Wu H, Xiao B, Guo S (2019) Vql: Providing query efficiency and data authenticity in blockchain systems. In: 2019 IEEE 35th International Conference on Data Engineering Workshops (ICDEW), pp. 1–6. IEEE Peng Z, Wu H, Xiao B, Guo S (2019) Vql: Providing query efficiency and data authenticity in blockchain systems. In: 2019 IEEE 35th International Conference on Data Engineering Workshops (ICDEW), pp. 1–6. IEEE
28.
go back to reference Wang S, Dinh TTA, Lin Q, Xie Z, Zhang M, Cai Q, Chen G, Fu W, Ooi BC, Ruan P (2018) Forkbase: An efficient storage engine for blockchain and forkable applications. arXiv preprint arXiv:1802.04949 Wang S, Dinh TTA, Lin Q, Xie Z, Zhang M, Cai Q, Chen G, Fu W, Ooi BC, Ruan P (2018) Forkbase: An efficient storage engine for blockchain and forkable applications. arXiv preprint arXiv:​1802.​04949
29.
go back to reference Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: Proceeding 2000 IEEE symposium on security and privacy. S&P 2000, pp. 44–55. IEEE Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: Proceeding 2000 IEEE symposium on security and privacy. S&P 2000, pp. 44–55. IEEE
30.
go back to reference Curtmola R, Garay J, Kamara S, Ostrovsky R (2011) Searchable symmetric encryption: improved definitions and efficient constructions. J Comput Secur 19(5):895–934CrossRef Curtmola R, Garay J, Kamara S, Ostrovsky R (2011) Searchable symmetric encryption: improved definitions and efficient constructions. J Comput Secur 19(5):895–934CrossRef
31.
go back to reference Fu Z, Shu J, Sun X, Linge N (2014) Smart cloud search services: verifiable keyword-based semantic search over encrypted cloud data. IEEE Trans Consum Electron 60(4):762–770CrossRef Fu Z, Shu J, Sun X, Linge N (2014) Smart cloud search services: verifiable keyword-based semantic search over encrypted cloud data. IEEE Trans Consum Electron 60(4):762–770CrossRef
32.
go back to reference Fu Z, Sun X, Linge N, Zhou L (2014) Achieving effective cloud search services: multi-keyword ranked search over encrypted cloud data supporting synonym query. IEEE Trans Consum Electron 60(1):164–172CrossRef Fu Z, Sun X, Linge N, Zhou L (2014) Achieving effective cloud search services: multi-keyword ranked search over encrypted cloud data supporting synonym query. IEEE Trans Consum Electron 60(1):164–172CrossRef
33.
go back to reference Premasathian N, Choto S (2013) Searchable encryption schemes: With multiplication and simultaneous congruences. In: 2012 9th International ISC Conference on Information Security and Cryptology Premasathian N, Choto S (2013) Searchable encryption schemes: With multiplication and simultaneous congruences. In: 2012 9th International ISC Conference on Information Security and Cryptology
34.
go back to reference Xia Z, Wang X, Sun X, Wang Q (2016) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distrib Syst 27(2):340–352CrossRef Xia Z, Wang X, Sun X, Wang Q (2016) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distrib Syst 27(2):340–352CrossRef
35.
go back to reference Boneh D, Waters B (2007) Conjunctive, subset, and range queries on encrypted data. In: Theory of cryptography conference, pp. 535–554. Springer Boneh D, Waters B (2007) Conjunctive, subset, and range queries on encrypted data. In: Theory of cryptography conference, pp. 535–554. Springer
36.
go back to reference Dan B, Crescenzo GD, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. EUROCRYPT 2004 Dan B, Crescenzo GD, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. EUROCRYPT 2004
37.
go back to reference Hwang YH, Lee PJ (2007) Public key encryption with conjunctive keyword search and its extension to a multi-user system. In: International Conference on Pairing-based Cryptography Hwang YH, Lee PJ (2007) Public key encryption with conjunctive keyword search and its extension to a multi-user system. In: International Conference on Pairing-based Cryptography
38.
go back to reference Miao Y, Ma J, Liu X, Liu Z, Wei F (2018) Vmkdo: Verifiable multi-keyword search over encrypted cloud data for dynamic data-owner. Peer-to-Peer Networking and Applications 11(1):1–11 Miao Y, Ma J, Liu X, Liu Z, Wei F (2018) Vmkdo: Verifiable multi-keyword search over encrypted cloud data for dynamic data-owner. Peer-to-Peer Networking and Applications 11(1):1–11
39.
go back to reference Park DJ, Kim K, Lee PJ (2004) Public key encryption with conjunctive field keyword search. In: International Workshop on Information Security Applications, pp. 73–86. Springer Park DJ, Kim K, Lee PJ (2004) Public key encryption with conjunctive field keyword search. In: International Workshop on Information Security Applications, pp. 73–86. Springer
40.
go back to reference Yin H, Zhang J, Xiong Y, Ou L, Li F, Liao S, Li K (2019) Cp-abse: A ciphertext-policy attribute-based searchable encryption scheme. IEEE Access Yin H, Zhang J, Xiong Y, Ou L, Li F, Liao S, Li K (2019) Cp-abse: A ciphertext-policy attribute-based searchable encryption scheme. IEEE Access
41.
go back to reference Sahai A, Waters BR (2004) Fuzzy identity-based encryption. In: Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques Sahai A, Waters BR (2004) Fuzzy identity-based encryption. In: Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
42.
go back to reference Attrapadung N, Libert B, Panafieu ED (2011) Expressive key-policy attribute-based encryption with constant-size ciphertexts. In: International Workshop on Public Key Cryptography Attrapadung N, Libert B, Panafieu ED (2011) Expressive key-policy attribute-based encryption with constant-size ciphertexts. In: International Workshop on Public Key Cryptography
43.
go back to reference Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. ACMCrossRef Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. ACMCrossRef
44.
go back to reference Hohenberger S, Waters B (2013) Attribute-Based Encryption with Fast Decryption. Attribute-Based Encryption with Fast Decryption Hohenberger S, Waters B (2013) Attribute-Based Encryption with Fast Decryption. Attribute-Based Encryption with Fast Decryption
45.
go back to reference Lai J, Deng RH, Li Y, Weng J (2014) Fully secure key-policy attribute-based encryption with constant-size ciphertexts and fast decryption. ACMCrossRef Lai J, Deng RH, Li Y, Weng J (2014) Fully secure key-policy attribute-based encryption with constant-size ciphertexts and fast decryption. ACMCrossRef
46.
go back to reference Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. IEEE Symposium on Security & Privacy Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. IEEE Symposium on Security & Privacy
47.
go back to reference Emura K, Miyaji A, Nomura A, Omote K, Soshi M (2009) A ciphertext-policy attribute-based encryption scheme with constant ciphertext length. In: International Conference on Information Security Practice and Experience Emura K, Miyaji A, Nomura A, Omote K, Soshi M (2009) A ciphertext-policy attribute-based encryption scheme with constant ciphertext length. In: International Conference on Information Security Practice and Experience
48.
go back to reference Rao YS, Dutta R (2013) Decentralized ciphertext-policy attribute-based encryption scheme with fast decryption. In: IFIP International Conference on Communications and Multimedia Security Rao YS, Dutta R (2013) Decentralized ciphertext-policy attribute-based encryption scheme with fast decryption. In: IFIP International Conference on Communications and Multimedia Security
49.
go back to reference Zhang Y, Dong Z, Chen X, Jin L, Hui L (2014) Computationally efficient ciphertext-policy attribute-based encryption with constant-size ciphertexts. In: International Conference on Provable Security Zhang Y, Dong Z, Chen X, Jin L, Hui L (2014) Computationally efficient ciphertext-policy attribute-based encryption with constant-size ciphertexts. In: International Conference on Provable Security
50.
go back to reference Green M, Hohenberger S, Waters B et al (2011) Outsourcing the decryption of abe ciphertexts. In: USENIX security symposium 2011 Green M, Hohenberger S, Waters B et al (2011) Outsourcing the decryption of abe ciphertexts. In: USENIX security symposium 2011
51.
go back to reference Liu S, Yu J, Xiao Y, Wan Z, Yan B (2020) Bc-sabe: Blockchain-aided searchable attribute-based encryption for cloud-iot. IEEE Internet Things J PP(99):1–1 Liu S, Yu J, Xiao Y, Wan Z, Yan B (2020) Bc-sabe: Blockchain-aided searchable attribute-based encryption for cloud-iot. IEEE Internet Things J PP(99):1–1
52.
go back to reference Zheng H, Shao J, Wei G (2020) Attribute-based encryption with outsourced decryption in blockchain. Peer-to-Peer Networking and Applications 13(5):1643–1655CrossRef Zheng H, Shao J, Wei G (2020) Attribute-based encryption with outsourced decryption in blockchain. Peer-to-Peer Networking and Applications 13(5):1643–1655CrossRef
53.
go back to reference Tang X, Guo C, Choo KKR, Liu Y, Li L (2021) A secure and trustworthy medical record sharing scheme based on searchable encryption and blockchain. Comput Netw 200:108540CrossRef Tang X, Guo C, Choo KKR, Liu Y, Li L (2021) A secure and trustworthy medical record sharing scheme based on searchable encryption and blockchain. Comput Netw 200:108540CrossRef
54.
go back to reference Li H, Wang T, Qiao Z, Yang B, Gong Y, Wang J, Qiu G (2021) Blockchain-based searchable encryption with efficient result verification and fair payment. Journal of Information Security and Applications 58 Li H, Wang T, Qiao Z, Yang B, Gong Y, Wang J, Qiu G (2021) Blockchain-based searchable encryption with efficient result verification and fair payment. Journal of Information Security and Applications 58
55.
go back to reference Niu J, Li X, Gao J, Han Y (2019) Blockchain-based anti-key-leakage key aggregation searchable encryption for iot. IEEE Internet Things J PP(99):1–1 Niu J, Li X, Gao J, Han Y (2019) Blockchain-based anti-key-leakage key aggregation searchable encryption for iot. IEEE Internet Things J PP(99):1–1
56.
go back to reference Chen B, Wu L, Wang H, Zhou L, He D (2020) A blockchain-based searchable public-key encryption with forward and backward privacy for cloud-assisted vehicular social networks. IEEE Trans Veh Technol 69(6):5813–5825CrossRef Chen B, Wu L, Wang H, Zhou L, He D (2020) A blockchain-based searchable public-key encryption with forward and backward privacy for cloud-assisted vehicular social networks. IEEE Trans Veh Technol 69(6):5813–5825CrossRef
57.
go back to reference Xu C, Yu L, Zhu L, Zhang C (2021) A blockchain-based dynamic searchable symmetric encryption scheme under multiple clouds. Peer-to-Peer Networking and Applications Xu C, Yu L, Zhu L, Zhang C (2021) A blockchain-based dynamic searchable symmetric encryption scheme under multiple clouds. Peer-to-Peer Networking and Applications
Metadata
Title
A blockchain-based traceability system with efficient search and query
Authors
Chengzhe Lai
Yinzhen Wang
Hong Wang
Dong Zheng
Publication date
29-12-2022
Publisher
Springer US
Published in
Peer-to-Peer Networking and Applications / Issue 2/2023
Print ISSN: 1936-6442
Electronic ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-022-01438-w

Other articles of this Issue 2/2023

Peer-to-Peer Networking and Applications 2/2023 Go to the issue

Premium Partner