Skip to main content
Top
Published in: World Wide Web 5/2023

09-05-2023

On-chain repairing for multi-party data migration

Authors: Wenchao Jiang, Weiqi Dai, Qiwen Lv, Dongjun Ning, Sui Lin

Published in: World Wide Web | Issue 5/2023

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Blockchain can be used to solve the problem of mutual trust between different institutions. However, when migrating data from a traditional system to a blockchain system, the order of data transactions is difficult to determine and the data transactions on the chain can not be modified. Therefore, it is necessary to build an on-chain repairing mechanism for multi-party data migration. In this paper, an on-chain repairing system for multi-party data migration is designed to realize the multi-party data migration, the block data repairing, and the data auditing. The multi-party data migration is utilized to determine the order of data transactions, and the order determining during data transaction is solved by setting up transaction pools and sorting transactions of the same institution or different institutions. The controlled data repairing strategy is utilized to repair the error data in the blockchain based on the chameleon-hash algorithm. The data repairing audit strategy is used to ensure the controllable data repairing. Compared with the Hyperledge Fabric, the additional cost for multi-party data migration of our method is not more than 10%.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Sidhu, J.: Syscoin: A peer to peer electronic cash system with blockchain based services for e-business. In Proceedings of the 26th International Conference on Computer Communication and Networks. IEEE, pp. 1–6. (2017) Sidhu, J.: Syscoin: A peer to peer electronic cash system with blockchain based services for e-business. In Proceedings of the 26th International Conference on Computer Communication and Networks. IEEE, pp. 1–6. (2017)
2.
go back to reference Zheng, Z., Xie, S., Dai, H., Chen, X., Wang, H.: An overview of blockchain technology: Architecture, consensus, and future trends. In Proceedings of 2017 IEEE International Congress on Big Data. IEEE Computer Society, pp. 557–564. (2017) Zheng, Z., Xie, S., Dai, H., Chen, X., Wang, H.: An overview of blockchain technology: Architecture, consensus, and future trends. In Proceedings of 2017 IEEE International Congress on Big Data. IEEE Computer Society, pp. 557–564. (2017)
3.
go back to reference Casino, F., Dasaklis, T.K., Patsakis, C.: A systematic literature review of blockchain based applications: current status, classification and open issues. Telematics Inf. 36, 55–81 (2019)CrossRef Casino, F., Dasaklis, T.K., Patsakis, C.: A systematic literature review of blockchain based applications: current status, classification and open issues. Telematics Inf. 36, 55–81 (2019)CrossRef
4.
go back to reference Nguyen, G., Kim, K.: A survey about consensus algorithms used in blockchain. J. Inform. Process. Syst. 14(1), 101–128 (2018) Nguyen, G., Kim, K.: A survey about consensus algorithms used in blockchain. J. Inform. Process. Syst. 14(1), 101–128 (2018)
5.
go back to reference Shurov, A., Malevanniy, D., Iakushkin, O., Korkhov, V.: Blockchain network threats: The case of pow and ethereum. In Proceedings of the 19th International Conference on Computational Science and Its Applications. Springer, pp. 606–617. (2019) Shurov, A., Malevanniy, D., Iakushkin, O., Korkhov, V.: Blockchain network threats: The case of pow and ethereum. In Proceedings of the 19th International Conference on Computational Science and Its Applications. Springer, pp. 606–617. (2019)
6.
go back to reference Ronen, E., Shamir, A., Weingarten, A., O’Flynn, C.: Iot goes nuclear: creating a zigbee chain reaction. IEEE Secur. Priv. 16(1), 54–62 (2018)CrossRef Ronen, E., Shamir, A., Weingarten, A., O’Flynn, C.: Iot goes nuclear: creating a zigbee chain reaction. IEEE Secur. Priv. 16(1), 54–62 (2018)CrossRef
7.
go back to reference Yao, Q..: A systematic framework to understand central bank digital currency. Sci. Chin. Inform. Sci. 61(3), 033101:1-033101:8 (2018)CrossRef Yao, Q..: A systematic framework to understand central bank digital currency. Sci. Chin. Inform. Sci. 61(3), 033101:1-033101:8 (2018)CrossRef
8.
go back to reference Azaria, A., Ekblaw, A., Vieira, T., Lippman, A.: Medrec: Using blockchain for medical data access and permission management. In Proceedings of 2nd International Conference on Open and Big Data. IEEE Computer Society, pp. 25–30. (2016) Azaria, A., Ekblaw, A., Vieira, T., Lippman, A.: Medrec: Using blockchain for medical data access and permission management. In Proceedings of 2nd International Conference on Open and Big Data. IEEE Computer Society, pp. 25–30. (2016)
9.
go back to reference Hasan, H.R., Salah, K.: Proof of delivery of digital assets using blockchain and smart contracts. IEEE Access. 6(448), 439–465 (2018) Hasan, H.R., Salah, K.: Proof of delivery of digital assets using blockchain and smart contracts. IEEE Access. 6(448), 439–465 (2018)
10.
go back to reference Mitani, T., Otsuka, A.: Traceability in permissioned blockchain. IEEE Access. 8, 573–21588 (2020)CrossRef Mitani, T., Otsuka, A.: Traceability in permissioned blockchain. IEEE Access. 8, 573–21588 (2020)CrossRef
11.
go back to reference Atzei, N., Bartoletti, M., Cimoli, T.: A survey of attacks on ethereum smart contracts (sok). In Proceedings of the 6th International Conference on Principles of Security and Trust International Conference. Springer, pp. 164– 186. (2017) Atzei, N., Bartoletti, M., Cimoli, T.: A survey of attacks on ethereum smart contracts (sok). In Proceedings of the 6th International Conference on Principles of Security and Trust International Conference. Springer, pp. 164– 186. (2017)
12.
go back to reference Conti, M., E, S.K., Lal, C., Ruj, S.: A survey on security and privacy issues of bitcoin. IEEE Commun. Surv. Tutorials. 20(4), 3416–3452 (2018)CrossRef Conti, M., E, S.K., Lal, C., Ruj, S.: A survey on security and privacy issues of bitcoin. IEEE Commun. Surv. Tutorials. 20(4), 3416–3452 (2018)CrossRef
13.
go back to reference Ateniese, G., de Medeiros, B.: On the key exposure problem in chameleon hashes. In Proceedings of the 4th International Conference on Security in Communication Networks. Springer, pp. 165– 179. (2004) Ateniese, G., de Medeiros, B.: On the key exposure problem in chameleon hashes. In Proceedings of the 4th International Conference on Security in Communication Networks. Springer, pp. 165– 179. (2004)
14.
go back to reference Krawczyk, H., Rabin, T.: Chameleon signatures. In Proceedings of the Network and Distributed System Security Symposium. The Internet Society, pp. 143– 154. (2000) Krawczyk, H., Rabin, T.: Chameleon signatures. In Proceedings of the Network and Distributed System Security Symposium. The Internet Society, pp. 143– 154. (2000)
15.
go back to reference Camenisch, J., Derler, D., Krenn, S., Phls, H.C., amelin, K., Slamanig, D.: Chameleon hashes with ephemeral trapdoors and applications to invisible sanitizable signatures. In Proceedings of the 20th International Conference on Practice and Theory in Public Key Cryptography. Springer, pp. 152– 182. (2017) Camenisch, J., Derler, D., Krenn, S., Phls, H.C., amelin, K., Slamanig, D.: Chameleon hashes with ephemeral trapdoors and applications to invisible sanitizable signatures. In Proceedings of the 20th International Conference on Practice and Theory in Public Key Cryptography. Springer, pp. 152– 182. (2017)
16.
go back to reference Ateniese, G., Magri, B., Venturi, D., Andrade, E.R.: Redactable blockchain or rewriting history in bitcoin and friends. In Proceedings of 2017 IEEE European Symposium on Security and Privacy. IEEE, pp. 111– 126. (2017) Ateniese, G., Magri, B., Venturi, D., Andrade, E.R.: Redactable blockchain or rewriting history in bitcoin and friends. In Proceedings of 2017 IEEE European Symposium on Security and Privacy. IEEE, pp. 111– 126. (2017)
17.
go back to reference Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute based encryption for fine grained access control of encrypted data. In Proceedings of the 13th ACM Conference on Computer and Communications Security. ACM, pp. 89–98. (2006) Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute based encryption for fine grained access control of encrypted data. In Proceedings of the 13th ACM Conference on Computer and Communications Security. ACM, pp. 89–98. (2006)
18.
go back to reference Deuber, D., Magri, B., Thyagarajan, S.A.K.: Redactable blockchain in the permissionless setting. In Proceedings of the 2019 IEEE Symposium on Security and Privacy. IEEE, pp. 124– 138. (2019) Deuber, D., Magri, B., Thyagarajan, S.A.K.: Redactable blockchain in the permissionless setting. In Proceedings of the 2019 IEEE Symposium on Security and Privacy. IEEE, pp. 124– 138. (2019)
19.
go back to reference Cai, X., Ren, Y., Zhang, X.: Privacy protected deletable blockchain. IEEE Access. 8, 6060–6070 (2020)CrossRef Cai, X., Ren, Y., Zhang, X.: Privacy protected deletable blockchain. IEEE Access. 8, 6060–6070 (2020)CrossRef
20.
go back to reference Li, J., Ye, H., Li, T., Wang, W., Lou, W., Thomas Hou, Y., Liu, J.: Rongxing Lu: efficient and secure outsourcing of differentially private Data Publishing with multiple evaluators. IEEE Trans. Dependable Secur. Comput. 19(1), 67–76 (2022)CrossRef Li, J., Ye, H., Li, T., Wang, W., Lou, W., Thomas Hou, Y., Liu, J.: Rongxing Lu: efficient and secure outsourcing of differentially private Data Publishing with multiple evaluators. IEEE Trans. Dependable Secur. Comput. 19(1), 67–76 (2022)CrossRef
21.
go back to reference Li, J., Huang, Y., Wei, Y., Lv, S., Liu, Z.: Changyu Dong, Wenjing Lou: Searchable symmetric encryption with Forward Search privacy. IEEE Trans. Dependable Secur. Comput. 18(1), 460–474 (2021)CrossRef Li, J., Huang, Y., Wei, Y., Lv, S., Liu, Z.: Changyu Dong, Wenjing Lou: Searchable symmetric encryption with Forward Search privacy. IEEE Trans. Dependable Secur. Comput. 18(1), 460–474 (2021)CrossRef
22.
go back to reference Bresson, E., Stern, J., Szydlo, M.: Threshold ring signatures and applications to ad-hoc groups. In Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology. Springer, pp. 465–480. Bresson, E., Stern, J., Szydlo, M.: Threshold ring signatures and applications to ad-hoc groups. In Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology. Springer, pp. 465–480.
23.
go back to reference Wu, Z., Li, G., Shen, S., Cui, Z., Lian, X., Chen, E., X. Su.: Constructing dummy query sequences to protect location privacy and query privacy in location-based services. World Wide Web (ISSN 1386-145X). 24 (1): 24–45 (2021) Wu, Z., Li, G., Shen, S., Cui, Z., Lian, X., Chen, E., X. Su.: Constructing dummy query sequences to protect location privacy and query privacy in location-based services. World Wide Web (ISSN 1386-145X). 24 (1): 24–45 (2021)
24.
go back to reference Wu, Z., Shen, S., Zhou, H., Li, H., Lu, C.: A Basic Framework for Privacy Protection in Personalized Information Retrieval. J. Org. User Comput. 33(6), 1–26 (2002) Wu, Z., Shen, S., Zhou, H., Li, H., Lu, C.: A Basic Framework for Privacy Protection in Personalized Information Retrieval. J. Org. User Comput. 33(6), 1–26 (2002)
Metadata
Title
On-chain repairing for multi-party data migration
Authors
Wenchao Jiang
Weiqi Dai
Qiwen Lv
Dongjun Ning
Sui Lin
Publication date
09-05-2023
Publisher
Springer US
Published in
World Wide Web / Issue 5/2023
Print ISSN: 1386-145X
Electronic ISSN: 1573-1413
DOI
https://doi.org/10.1007/s11280-023-01148-0

Other articles of this Issue 5/2023

World Wide Web 5/2023 Go to the issue

Premium Partner