[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

Blockchain based efficient and robust fair payment for outsourcing services in cloud computing

Published: 01 September 2018 Publication History

Highlights

A blockchain based fair payment framework BCPay for cloud services is proposed.
An all-or-nothing checking-proof protocol is introduced in BCPay.
BCPay enjoys soundness and robust fairness without relying on any third-party.
BCPay is very efficient in terms of the number of transactions and computation cost.
We present the applications of BCPay in PDP and outsourcing computation.

Abstract

As an attractive business model of cloud computing, outsourcing services usually involve online payment and security issues. The mutual distrust between users and outsourcing service providers may severely impede the wide adoption of cloud computing. Nevertheless, most existing payment solutions only consider a specific type of outsourcing service and rely on a trusted third-party to realize fairness.
In this paper, in order to realize secure and fair payment of outsourcing services in general without relying on any third-party, trusted or not, we introduce BCPay, a blockchain based fair payment framework for outsourcing services in cloud computing. We first present the system architecture, specifications and adversary model of BCPay, then describe in detail its design. Our security analysis indicates that BCPay achieves Soundness and what we call Robust Fairness, where the fairness is resilient to eavesdropping and malleability attacks. Furthermore, our performance evaluation shows that BCPay is very efficient in terms of the number of transactions and computation cost. As illustrative applications of BCPay, we further construct a blockchain-based provable data possession scheme in cloud computing and a blockchain-based outsourcing computation protocol in fog computing.

References

[1]
M. Andrychowicz, S. Dziembowski, D. Malinowski, L. Mazurek, Fair two-party computations via bitcoin deposits, International Conference on Financial Cryptography and Data Security (FC), Springer, 2014, pp. 105–121.
[2]
M. Andrychowicz, S. Dziembowski, D. Malinowski, L. Mazurek, Secure multiparty computations on bitcoin, IEEE Symposium on Security and Privacy (SP), IEEE, 2014, pp. 443–458.
[3]
M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, M. Zaharia, A view of cloud computing, Commun. ACM 53 (4) (2010) 50–58.
[4]
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, D. Song, Provable data possession at untrusted stores, Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS), ACM, 2007, pp. 598–609.
[5]
G. Ateniese, R. Di Pietro, L.V. Mancini, G. Tsudik, Scalable and efficient provable data possession, Proceedings of the 4th International Conference on Security and Privacy in Communication Netowrks (SecureComm), ACM, 2008, pp. 1–10.
[6]
G. Ateniese, M.T. Goodrich, V. Lekakis, C. Papamanthou, E. Paraskevas, R. Tamassia, Accountable storage, International Conference on Applied Cryptography and Network Security (ACNS), Springer, 2017, pp. 623–644.
[7]
G. Ateniese, S. Kamara, J. Katz, Proofs of storage from homomorphic identification protocols, International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), Springer, 2009, pp. 319–333.
[8]
I. Bentov, R. Kumaresan, How to use bitcoin to design fair protocols, International Cryptology Conference (CRYPTO), Springer, 2014, pp. 421–439.
[9]
F. Bonomi, R. Milito, J. Zhu, S. Addepalli, Fog computing and its role in the internet of things, Proceedings of the first edition of the MCC workshop on Mobile cloud computing, ACM, 2012, pp. 13–16.
[10]
V. Buterin, A Next-Generation Smart Contract and Decentralized Application Platform. White paper, 2014, pp. 1–36.
[11]
M. Campanelli, R. Gennaro, S. Goldfeder, L. Nizzardo, Zero-knowledge contingent payments revisited: attacks and payments for services, Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (CCS), ACM, 2017, pp. 229–243.
[12]
B. Carbunar, M.V. Tripunitara, Payments for outsourced computations, IEEE Trans. Parallel Distrib. Syst. 23 (2) (2012) 313–320.
[13]
X. Chen, J. Li, X. Huang, J. Ma, W. Lou, New publicly verifiable databases with efficient updates, IEEE Trans. Dependable Secure Comput. 12 (5) (2015) 546–556.
[14]
X. Chen, J. Li, J. Ma, W. Lou, D.S. Wong, New and efficient conditional e-payment systems with transferability, Fut. Gen. Comput. Syst. 37 (2014) 252–258.
[15]
X. Chen, J. Li, J. Ma, Q. Tang, W. Lou, New algorithms for secure outsourcing of modular exponentiations, IEEE Trans. Parallel Distrib. Syst. 25 (9) (2014) 2386–2396.
[16]
X. Chen, J. Li, W. Susilo, Efficient fair conditional payments for outsourcing computations, IEEE Trans. Inf. Forensics Secur. 7 (6) (2012) 1687–1694.
[17]
X. Chen, J. Li, J. Weng, J. Ma, W. Lou, Verifiable computation over large database with incremental updates, IEEE Trans. Comput. 65 (10) (2016) 3184–3195.
[18]
X. Chen, F. Zhang, W. Susilo, H. Tian, J. Li, K. Kim, Identity-based chameleon hashing and signatures without key exposure, Inf. Sci. 265 (2014) 198–210.
[19]
E. Community, Ethereum homestead documentation, 2016, Online document. http://ethdocs.org/en/latest/index.html.
[20]
G. Developers, Google cloud platform, 2017, Online document. https://cloud.google.com/free/docs/frequently-asked-questions.
[21]
C. Dong, Y. Wang, A. Aldweesh, P. Mc Corry, A. vanMoorsel, Betrayal, distrust, and rationality: smart counter-collusion contracts for verifiable cloud computing, Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (CCS), ACM, 2017, pp. 211–227.
[22]
W. Du, J. Jia, M. Mangal, M. Murugesan, Uncheatable grid computing, Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS), IEEE Computer Society, 2004, pp. 4–11.
[23]
U. Feige, A. Shamir, Witness indistinguishable and witness hiding protocols, Proceedings of the twenty-second annual ACM symposium on Theory of computing, ACM, 1990, pp. 416–426.
[24]
C. Gao, Q. Cheng, P. He, W. Susilo, J. Li, Privacy-preserving Naive Bayes classifiers secure against the substitution-then-comparison attack, Inf. Sci. 444 (2018) 72–88.
[25]
R. Gennaro, C. Gentry, B. Parno, Non-interactive verifiable computing: outsourcing computation to untrusted workers, Annual Cryptology Conference (CRYPTO), Springer, 2010, pp. 465–482.
[26]
P. Golle, I. Mironov, Uncheatable distributed computations, Cryptographers’ Track at the RSA Conference (CT-RSA), Springer, 2001, pp. 425–440.
[28]
H. Huang, X. Chen, Q. Wu, X. Huang, J. Shen, Bitcoin-based fair payments for outsourcing computations of fog devices, Fut. Gen. Comput. Syst. 78 (2018) 850–858.
[29]
Z. Huang, S. Liu, X. Mao, K. Chen, J. Li, Insight of the protection for data security under selective opening attacks, Inf. Sci. 412 (2017) 223–241.
[30]
A. Juels, B.S. Kaliski Jr., Pors: proofs of retrievability for large files, Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS), ACM, 2007, pp. 584–597.
[31]
R. Khalil, A. Gervais, Revive: rebalancing off-blockchain payment networks, Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (CCS), ACM, 2017, pp. 439–453.
[32]
B. Li, Y. Huang, Z. Liu, J. Li, Z. Tian, S.M. Yiu, Hybridoram: practical oblivious cloud storage with constant bandwidth, Inf. Sci. (2018).
[33]
J. Li, X. Huang, J. Li, X. Chen, Y. Xiang, Securely outsourcing attribute-based encryption with checkability, IEEE Trans. Parallel Distrib. Syst. 25 (8) (2014) 2201–2210.
[34]
J. Li, Y. Zhang, X. Chen, Y. Xiang, Secure attribute-based data sharing for resource-limited users in cloud computing, Comput. Secur. 72 (2018) 1–12.
[35]
T. Li, J. Li, Z. Liu, P. Li, C. Jia, Differentially private naive bayes learning over multiple data sources, Inf. Sci. 444 (2018) 89–104.
[36]
G. Malavolta, P. Moreno-Sanchez, A. Kate, M. Maffei, S. Ravi, Concurrency and privacy with payment-channel networks, Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (CCS), ACM, 2017, pp. 455–471.
[37]
W. Meng, E. Tischhauser, Q. Wang, Y. Wang, J. Han, When intrusion detection meets blockchain technology: a review, IEEE Access 6 (2018) 10179–10188.
[38]
P. Merriam, Ethereum alarm clock, 2015, Online document. http://docs.ethereum-alarm-clock.com/en/latest/.
[39]
S. Nakamoto, Bitcoin: a peer-to-peer electronic cash system, 1–9, 2008, Online document. http://bitcoin.org/bitcoin.pdf.
[40]
Q. Lin, H. Yan, Z. Huang, W. Chen, J. Shen, Y. Tang, An id-based linearly homomorphic signature scheme and its application in blockchain, IEEE Access 6 (2018) 20632–20640.
[41]
J. Shen, Z. Gui, S. Ji, J. Shen, H. Tan, Y. Tang, Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks, J. Netw. Comput. Appl. 106 (2018) 117–123.
[42]
W. Song, B. Wang, Q. Wang, C. Shi, W. Lou, Z. Peng, Publicly verifiable computation of polynomials over outsourced data with multiple sources, IEEE Trans. Inf. Forensics Secur. 12 (10) (2017) 2334–2347.
[43]
Q. Wang, C. Wang, K. Ren, W. Lou, J. Li, Enabling public auditability and data dynamics for storage security in cloud computing, IEEE Trans. Parallel Distrib. Syst. 22 (5) (2011) 847–859.
[44]
G. Wood, Ethereum: a secure decentralised generalised transaction ledger, Ethereum Project Yellow Paper, vol. 151, 2014, pp. 1–32.
[45]
J. Xu, L. Wei, Y. Zhang, A. Wang, F. Zhou, C.z. Gao, Dynamic fully homomorphic encryption-based merkle tree for lightweight streaming authenticated data structures, J. Netw. Comput. Appl. 107 (2018) 113–124.
[46]
H. Yan, J. Li, J. Han, Y. Zhang, A novel efficient remote data possession checking protocol in cloud storage, IEEE Trans. Inf. Forensics Secur. 12 (1) (2017) 78–88.
[47]
X. Zhang, Y.A. Tan, C. Liang, Y. Li, J. Li, A covert channel over volte via adjusting silence periods, IEEE Access 6 (1) (2018) 9292–9302.
[48]
Y. Zhang, X. Chen, J. Li, D.S. Wong, H. Li, I. You, Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing, Inf. Sci. 379 (2017) 42–61.
[49]
Y. Zhang, J. Li, X. Chen, H. Li, Anonymous attribute-based proxy re-encryption for access control in cloud computing, Secur. Commun. Netw. 9 (14) (2016) 2397–2411.
[50]
Y. Zhang, D. Zheng, X. Chen, J. Li, H. Li, Efficient attribute-based data sharing in mobile clouds, Pervasive Mob. Comput. 28 (2016) 135–149.
[51]
Y. Zhang, D. Zheng, R.H. Deng, Security and privacy in smart health: efficient policy-hiding attribute-based access control, IEEE Internet Things J. 5 (3) (2018) 2130–2145.

Cited By

View all
  • (2024)EPVM: efficient and publicly verifiable computation for matrix multiplication with privacy preservationCluster Computing10.1007/s10586-024-04329-227:5(7007-7022)Online publication date: 1-Aug-2024
  • (2023)Post-Quantum Privacy-Preserving Provable Data Possession Scheme Based on Smart ContractsWireless Communications & Mobile Computing10.1155/2023/87727002023Online publication date: 1-Jan-2023
  • (2023)Blockchain for achieving accountable outsourcing computations in edge computingComputer Communications10.1016/j.comcom.2022.12.024200:C(17-29)Online publication date: 15-Feb-2023
  • Show More Cited By

Index Terms

  1. Blockchain based efficient and robust fair payment for outsourcing services in cloud computing
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Comments

          Please enable JavaScript to view thecomments powered by Disqus.

          Information & Contributors

          Information

          Published In

          cover image Information Sciences: an International Journal
          Information Sciences: an International Journal  Volume 462, Issue C
          Sep 2018
          430 pages

          Publisher

          Elsevier Science Inc.

          United States

          Publication History

          Published: 01 September 2018

          Author Tags

          1. Blockchain
          2. Cloud security
          3. Fair payment
          4. Provable data possession
          5. Outsourcing computation
          6. Authentication

          Qualifiers

          • Research-article

          Contributors

          Other Metrics

          Bibliometrics & Citations

          Bibliometrics

          Article Metrics

          • Downloads (Last 12 months)0
          • Downloads (Last 6 weeks)0
          Reflects downloads up to 12 Jan 2025

          Other Metrics

          Citations

          Cited By

          View all
          • (2024)EPVM: efficient and publicly verifiable computation for matrix multiplication with privacy preservationCluster Computing10.1007/s10586-024-04329-227:5(7007-7022)Online publication date: 1-Aug-2024
          • (2023)Post-Quantum Privacy-Preserving Provable Data Possession Scheme Based on Smart ContractsWireless Communications & Mobile Computing10.1155/2023/87727002023Online publication date: 1-Jan-2023
          • (2023)Blockchain for achieving accountable outsourcing computations in edge computingComputer Communications10.1016/j.comcom.2022.12.024200:C(17-29)Online publication date: 15-Feb-2023
          • (2022)Accountable outsourcing data storage atop blockchainComputer Standards & Interfaces10.1016/j.csi.2022.10362882:COnline publication date: 1-Aug-2022
          • (2022)Ranked searchable encryption based on differential privacy and blockchainWireless Networks10.1007/s11276-022-03109-330:6(4735-4748)Online publication date: 6-Sep-2022
          • (2022)Blockchain-based conditional privacy-preserving authentication scheme in VANETsMultimedia Tools and Applications10.1007/s11042-022-14288-882:16(24155-24179)Online publication date: 21-Dec-2022
          • (2022)Security enhancement using blockchain based modified infinite chaotic elliptic cryptography in cloudCluster Computing10.1007/s10586-022-03777-y26:6(3673-3688)Online publication date: 14-Oct-2022
          • (2022)A comprehensive analysis of blockchain and its applications in intelligent systems based on IoT, cloud and social mediaInternational Journal of Intelligent Systems10.1002/int.2303237:12(11037-11077)Online publication date: 29-Dec-2022
          • (2021)On blockchain integration into mobile crowdsensing via smart embedded devicesJournal of Systems Architecture: the EUROMICRO Journal10.1016/j.sysarc.2021.102011115:COnline publication date: 1-May-2021
          • (2021)ConGradetectJournal of Systems Architecture: the EUROMICRO Journal10.1016/j.sysarc.2020.101910114:COnline publication date: 1-Mar-2021
          • Show More Cited By

          View Options

          View options

          Media

          Figures

          Other

          Tables

          Share

          Share

          Share this Publication link

          Share on social media