Skip to main content
Top
Published in: Peer-to-Peer Networking and Applications 5/2023

04-09-2023

Bpf-payment: Fair payment for cloud computing with privacy based on blockchain and homomorphic encryption

Authors: Xiaohua Wu, Fangjian Yu, Jing Wang, Jinpeng Chang, Xueqi Feng

Published in: Peer-to-Peer Networking and Applications | Issue 5/2023

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Cloud computing is popular because it can provide low-cost, high-performance data processing services. However, since cloud computing transactions between users and service providers are usually asynchronous, data privacy and online payment issues involving users and service providers often lead to a crisis of trust, which may hinder the development of cloud computing and application. Most existing solutions only consider a certain type of service or solving one of them. In this paper, we propose BPF-Payment, a fair payment scheme for cloud computing with privacy based on blockchain and homomorphic encryption, which achieves correctness, fairness, compatibility, and a lightweight client. BPF-Payment solves the problem of unfair payment in cloud computing by introducing blockchain as a third party. It also uses the Paillier homomorphic encryption scheme to enable blockchain to perform verification of problem solutions without accessing problem-related data, thereby ensuring data privacy. To verify the security and practicability of BPF-Payment, we instantiate BPF-Payment based on the Paillier homomorphic encryption scheme and evaluate the implementation. We test the performance of key generation, encryption and decryption, and verification in the BPF-Payment scheme on the FISCO-BOCS blockchain. The experimental results show that the time and gas consumption of BPF-Payment are reasonable and acceptable.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Pandi GS, Shah S, Wandra KH (2020) Exploration of vulnerabilities, threats and forensic issues and its impact on the distributed environment of cloud and its mitigation. Procedia Computer Science 167:163–173CrossRef Pandi GS, Shah S, Wandra KH (2020) Exploration of vulnerabilities, threats and forensic issues and its impact on the distributed environment of cloud and its mitigation. Procedia Computer Science 167:163–173CrossRef
2.
go back to reference Singh A, Chatterjee K (2017) Cloud security issues and challenges: A survey. J Netw Comput Appl 79:88–115CrossRef Singh A, Chatterjee K (2017) Cloud security issues and challenges: A survey. J Netw Comput Appl 79:88–115CrossRef
3.
go back to reference Singh SR, Khan AK, Singh TS (2016) A critical review on elliptic curve cryptography. In 2016 International Conference on Automatic Control and Dynamic Optimization Techniques (ICACDOT). IEEE, pp. 13-18 Singh SR, Khan AK, Singh TS (2016) A critical review on elliptic curve cryptography. In 2016 International Conference on Automatic Control and Dynamic Optimization Techniques (ICACDOT). IEEE, pp. 13-18
6.
go back to reference Blummer T, Sean M, Cachin C (2018) An introduction to hyper- ledger. Hyperledger Under Linux Found, White Paper Blummer T, Sean M, Cachin C (2018) An introduction to hyper- ledger. Hyperledger Under Linux Found, White Paper
7.
go back to reference Li H, Zhang F, He J, Tian H (2017) A searchable symmetric encryption scheme using BlockChain. ArXiv, abs/1711.01030 Li H, Zhang F, He J, Tian H (2017) A searchable symmetric encryption scheme using BlockChain. ArXiv, abs/1711.01030
8.
go back to reference Zhang Y, Deng RH, Liu X, Zheng D (2021) Cloud service fair payment based on blockchain and its applications in cloud computing. IEEE Trans Serv Comput 14(04):1152–1166CrossRef Zhang Y, Deng RH, Liu X, Zheng D (2021) Cloud service fair payment based on blockchain and its applications in cloud computing. IEEE Trans Serv Comput 14(04):1152–1166CrossRef
9.
go back to reference Paillier P (1999) Public-key cryptosystems based on composite degree residuosity classes. In International conference on the theory and applications of cryptographic techniques. Springer, pp. 223-238 Paillier P (1999) Public-key cryptosystems based on composite degree residuosity classes. In International conference on the theory and applications of cryptographic techniques. Springer, pp. 223-238
11.
go back to reference Nakamoto S (2019) Bitcoin: A peer-to-peer electronic cash system. Manubot Tech Rep Nakamoto S (2019) Bitcoin: A peer-to-peer electronic cash system. Manubot Tech Rep
12.
go back to reference Li X, Zheng Z, Dai HN (2021) When services computing meets blockchain: Challenges and opportunities. J Parallel Distrib Comput 150:1–14CrossRef Li X, Zheng Z, Dai HN (2021) When services computing meets blockchain: Challenges and opportunities. J Parallel Distrib Comput 150:1–14CrossRef
13.
go back to reference Liao D, Li H, Wang W, Wang X, Zhang M, Chen X (2021) Achieving iot data security based blockchain. Peer-to-Peer Networking and Applications 1-14 Liao D, Li H, Wang W, Wang X, Zhang M, Chen X (2021) Achieving iot data security based blockchain. Peer-to-Peer Networking and Applications 1-14
14.
go back to reference Zhang J, Wang Z, Shang L, Lu D, Ma J (2020) Btnc: A blockchain based trusted network connection protocol in iot. J Parallel Distrib Comput 143:1–16CrossRef Zhang J, Wang Z, Shang L, Lu D, Ma J (2020) Btnc: A blockchain based trusted network connection protocol in iot. J Parallel Distrib Comput 143:1–16CrossRef
15.
go back to reference Andrychowicz M et al (2014) Secure multiparty computations on bitcoin. IEEE Symposium on Security and Privacy 2014:443–458 Andrychowicz M et al (2014) Secure multiparty computations on bitcoin. IEEE Symposium on Security and Privacy 2014:443–458
16.
go back to reference Andrychowicz M, Dziembowski S, Malinowski D, Mazurek L (2014) Fair two-party computations via bitcoin deposits. IACR Cryptol. ePrint Arch 2013:837 Andrychowicz M, Dziembowski S, Malinowski D, Mazurek L (2014) Fair two-party computations via bitcoin deposits. IACR Cryptol. ePrint Arch 2013:837
17.
go back to reference Fahsi M, Benslimane SM, Rahmani A (2015) A framework for homomorphic, private information retrieval protocols in the cloud. Int J Mod Educ Comput Sci 7:16–23CrossRef Fahsi M, Benslimane SM, Rahmani A (2015) A framework for homomorphic, private information retrieval protocols in the cloud. Int J Mod Educ Comput Sci 7:16–23CrossRef
18.
go back to reference Yousuf H, Lahzi M, Salloum SA, Shaalan K (2021) Systematic review on fully homomorphic encryption scheme and its application. Recent Advances in Intelligent Systems and Smart Applications 537-551 Yousuf H, Lahzi M, Salloum SA, Shaalan K (2021) Systematic review on fully homomorphic encryption scheme and its application. Recent Advances in Intelligent Systems and Smart Applications 537-551
19.
go back to reference Gentry C (2009) Fully homomorphic encryption using ideal lattices, In Proceedings of the forty-first annual ACM symposium on Theory of computing, pp. 169-178.T Gentry C (2009) Fully homomorphic encryption using ideal lattices, In Proceedings of the forty-first annual ACM symposium on Theory of computing, pp. 169-178.T
20.
go back to reference ElGamal T (1985) A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans Inf Theory 31(4):469–472MathSciNetCrossRefMATH ElGamal T (1985) A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans Inf Theory 31(4):469–472MathSciNetCrossRefMATH
21.
go back to reference Cheon JH, Kim D, Kim D (2020) Efficient homomorphic comparison methods with optimal complexity. In International Conference on the Theory and Application of Cryptology and Information Security. Springer, pp. 221-256 Cheon JH, Kim D, Kim D (2020) Efficient homomorphic comparison methods with optimal complexity. In International Conference on the Theory and Application of Cryptology and Information Security. Springer, pp. 221-256
22.
go back to reference Li J, Wang Y, Zhang Y, Han J (2020) Full verifiability for outsourced decryption in attribute based encryption. IEEE Trans Serv Comput 13:478–487CrossRef Li J, Wang Y, Zhang Y, Han J (2020) Full verifiability for outsourced decryption in attribute based encryption. IEEE Trans Serv Comput 13:478–487CrossRef
23.
go back to reference Huang H, Chen X, Wu Q, Huang X, Shen J (2018) Bitcoin-based fair payments for cloud computings of fog devices. Futur Gener Comput Syst 78:850–858CrossRef Huang H, Chen X, Wu Q, Huang X, Shen J (2018) Bitcoin-based fair payments for cloud computings of fog devices. Futur Gener Comput Syst 78:850–858CrossRef
24.
go back to reference Guan Y, Zheng H, Shao J, Lu R, Wei G (2021) Fair cloud polynomial computing based on the blockchain. IEEE Trans Serv Comput Guan Y, Zheng H, Shao J, Lu R, Wei G (2021) Fair cloud polynomial computing based on the blockchain. IEEE Trans Serv Comput
25.
go back to reference Poon J, Dryja T (2016) The bitcoin lightning network: Scalable off-chain instant payments[J] Poon J, Dryja T (2016) The bitcoin lightning network: Scalable off-chain instant payments[J]
26.
go back to reference Lin JH, Primicerio K, Squartini T et al (2020) Lightning network: a second path towards centralisation of the bitcoin economy[J]. New J Phys 22(8):083022CrossRef Lin JH, Primicerio K, Squartini T et al (2020) Lightning network: a second path towards centralisation of the bitcoin economy[J]. New J Phys 22(8):083022CrossRef
27.
go back to reference Lind J, Naor O, Eyal I et al (2019) Teechain: A secure payment network with asynchronous blockchain access. Proceedings of the 27th ACM Symposium on Operating Systems Principles. 63-79 Lind J, Naor O, Eyal I et al (2019) Teechain: A secure payment network with asynchronous blockchain access. Proceedings of the 27th ACM Symposium on Operating Systems Principles. 63-79
28.
go back to reference Zhang Y, Deng RH, Liu X et al (2018) Blockchain based efficient and robust fair payment for outsourcing services in cloud computing[J]. Inf Sci 462:262–277MathSciNetCrossRef Zhang Y, Deng RH, Liu X et al (2018) Blockchain based efficient and robust fair payment for outsourcing services in cloud computing[J]. Inf Sci 462:262–277MathSciNetCrossRef
29.
go back to reference Gao F, Zhu L, Shen M et al (2018) A blockchain-based privacy-preserving payment mechanism for vehicle-to-grid networks[J]. IEEE Netw 32(6):184–192CrossRef Gao F, Zhu L, Shen M et al (2018) A blockchain-based privacy-preserving payment mechanism for vehicle-to-grid networks[J]. IEEE Netw 32(6):184–192CrossRef
30.
go back to reference Khan PW, Byun YC (2021) Blockchain-based peer-to-peer energy trading and charging payment system for electric vehicles[J]. Sustainability 13(14):7962CrossRef Khan PW, Byun YC (2021) Blockchain-based peer-to-peer energy trading and charging payment system for electric vehicles[J]. Sustainability 13(14):7962CrossRef
31.
go back to reference Cong LW, He Z (2019) Blockchain disruption and smart contracts. Rev Financ Stud 32(5):1754–1797CrossRef Cong LW, He Z (2019) Blockchain disruption and smart contracts. Rev Financ Stud 32(5):1754–1797CrossRef
32.
go back to reference Wood G et al (2014) Ethereum: A secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper 151(2014):1–32 Wood G et al (2014) Ethereum: A secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper 151(2014):1–32
33.
go back to reference Shoup V et al (2001) Ntl: A library for doing number theory Shoup V et al (2001) Ntl: A library for doing number theory
34.
go back to reference Wohrer M, Zdun U (2018) Smart contracts: Security patterns in the ethereum ecosystem and solidity. In 2018 International Workshop on Blockchain Oriented Software Engineering (IWBOSE). IEEE, pp. 2-8 Wohrer M, Zdun U (2018) Smart contracts: Security patterns in the ethereum ecosystem and solidity. In 2018 International Workshop on Blockchain Oriented Software Engineering (IWBOSE). IEEE, pp. 2-8
35.
go back to reference Ben-Sasson E, Chiesa A, Genkin D, Tromer E, Virza M (2013) Snarks for c: Verifying program executions succinctly and in zero knowledge. In Annual cryptology conference. Springer, pp.90-108 Ben-Sasson E, Chiesa A, Genkin D, Tromer E, Virza M (2013) Snarks for c: Verifying program executions succinctly and in zero knowledge. In Annual cryptology conference. Springer, pp.90-108
36.
go back to reference Bunz B, Agrawal S, Zamani M, Boneh D (2020) Zether: Towards privacy in a smart contract world. In International Conference on Financial Cryptography and Data Security. Springer, pp. 423-443 Bunz B, Agrawal S, Zamani M, Boneh D (2020) Zether: Towards privacy in a smart contract world. In International Conference on Financial Cryptography and Data Security. Springer, pp. 423-443
Metadata
Title
Bpf-payment: Fair payment for cloud computing with privacy based on blockchain and homomorphic encryption
Authors
Xiaohua Wu
Fangjian Yu
Jing Wang
Jinpeng Chang
Xueqi Feng
Publication date
04-09-2023
Publisher
Springer US
Published in
Peer-to-Peer Networking and Applications / Issue 5/2023
Print ISSN: 1936-6442
Electronic ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-023-01547-0

Other articles of this Issue 5/2023

Peer-to-Peer Networking and Applications 5/2023 Go to the issue

Premium Partner