ThesisPDF Available

Research Based Data Rights Management Using Blockchain Over Ethereum Network

Thesis

Research Based Data Rights Management Using Blockchain Over Ethereum Network

Abstract and Figures

In a research community, data sharing is an essential step to gain maximum knowledge from the prior work. Existing data sharing platforms depend on trusted third party (TTP). Due to involvement of TTP, such systems lack trust, transparency, security and immutability. To over come these issues, this thesis proposed a blockchain based secure data sharing platform by leveraging the benefits of interplanetary file system (IPFS). A meta data is uploaded to IPFS server by owner and then divided into n secret shares. The proposed scheme achieves security and access control by executing the access roles written in smart contract by owner. Users are first authenticated through RSA signatures and then submit the requested amount as a price of digital content. After the successful delivery of data, a user is encouraged to register reviews about data by announcing customer incentives. In this way, maximum reviews are submitted against every file. In this scenario, decentralized storage, Ethereum blockchain, encryption and decryption schemes and incentive mechanism are combined. To implement the proposed scenario, smart contracts are written in solidity and deployed on local Ethereum test network. The proposed scheme achieves transparency, security, access control, authenticity of owner and quality of data. In simulation results, an analysis is performed on gas consumption and actual cost required in terms of USD, so that a good price estimate can be done while deploying the implemented scenario in real setup. Moreover, computational time for different encryption schemes are plotted to represent the performance of implemented scheme, which is shamir secret sharing (SSS). Results show that SSS shows least computational time as compared to advanced encryption standard (AES) 128 and 256.
Content may be subject to copyright.
A preview of the PDF is not available
... To overcome the issues, the authors proposed a blockchain-based trusted system for nodes' routing and recovery. The insecurity and untrustworthiness of data is also identified by the authors in [25,26,27,28,29]. To overcome the issues, blockchainbased systems are presented. ...
Thesis
Full-text available
In this thesis, a blockchain-based data sharing and access control system is proposed, for communication between the Internet of Things (IoT) devices. The proposed system is intended to overcome the issues related to trust and authentication for access control in IoT networks. Moreover, the objectives of the system are to achieve trustfulness, authorization, and authentication for data sharing in IoT networks. Multiple smart contracts such as Access Control Contract (ACC), Register Contract (RC), and Judge Contract (JC) are used to provide efficient access control management. Where ACC manages overall access control of the system, and RC is used to authenticate users in the system, JC implements the behavior judging method for detecting misbehavior of a subject (i.e., user). After the misbehavior detection, a penalty is defined for that subject. Several permission levels are set for IoT devices' users to share services with others. In the end, performance of the proposed system is analyzed by calculating cost consumption rate of smart contracts and their functions. A comparison is made between existing and proposed systems. Results show that the proposed system is efficient in terms of cost. The overall execution cost of the system is 6,900,000 gas units and the transaction cost is 5,200,000 gas units.
... Further, using these hashes actual location of files can be found. Fig. 6.5 presents a data sharing mode using IPFS as discussed by authors of [151]. At first, owner of the file uploads it on IPFS including metadata of the file. ...
... Further, using these hashes actual location of files can be found. Fig. 6.5 presents a data sharing mode using IPFS as discussed by authors of [151]. At first, owner of the file uploads it on IPFS including metadata of the file. ...
... Further, using these hashes actual location of files can be found. Fig. 6.5 presents a data sharing mode using IPFS as discussed by authors of [151]. At first, owner of the file uploads it on IPFS including metadata of the file. ...
... To overcome the issues, the authors proposed a blockchain-based trusted system for nodes' routing and recovery. The insecurity and untrustworthiness of data is also identified by the authors in [25][26][27][28][29]. To overcome the issues, blockchain-based systems are presented. ...
Article
Full-text available
In this paper, a blockchain-based data sharing and access control system is proposed, for communication between the Internet of Things (IoT) devices. The proposed system is intended to overcome the issues related to trust and authentication for access control in IoT networks. Moreover, the objectives of the system are to achieve trustfulness, authorization, and authentication for data sharing in IoT networks. Multiple smart contracts such as Access Control Contract (ACC), Register Contract (RC), and Judge Contract (JC) are used to provide efficient access control management. Where ACC manages overall access control of the system, and RC is used to authenticate users in the system, JC implements the behavior judging method for detecting misbehavior of a subject (i.e., user). After the misbehavior detection, a penalty is defined for that subject. Several permission levels are set for IoT devices' users to share services with others. In the end, performance of the proposed system is analyzed by calculating cost consumption rate of smart contracts and their functions. A comparison is made between existing and proposed systems. Results show that the proposed system is efficient in terms of cost. The overall execution cost of the system is 6,900,000 gas units and the transaction cost is 5,200,000 gas units.
Chapter
The Internet of Things (IoT) industry is growing very fast to transform factories, homes and farms to make them automatic and efficient. In the past, IoT is applied in different resilient scenarios and applications. IoT faces a lot of challenges due to the lack of computational power, battery and storage resources. Fortunately, the rise of blockchain technology facilitates IoT devices in security solutions. Nowadays, blockchain is used to make reliable and efficient communication among IoT devices and emerging computing technologies. In this paper, a blockchain-based secure service provisioning scheme is proposed for Lightweight Clients (LCs). Furthermore, an incentive mechanism based on reputation is proposed. We used consortium blockchain with the Proof of Authority (PoA) consensus mechanism. Furthermore, we used Smart Contracts (SCs) to validate the services provided by the Service Providers (SPs) to the LCs, transfer cryptocurrency to the SPs and maintain the reputation of the SPs. Moreover, the keccak256 hashing algorithm is used for converting the data of arbitrary size to the hash of fixed size. The simulation results show that the LCs receive validated services from the SPs at an affordable cost. The results also depict that the participation rate of SPs is increased because of the incentive mechanism.
Chapter
Nowadays, Wireless Sensor Networks (WSNs) are facing various challenges. Cost efficiency, low energy consumption, reliable data communication between nodes and security are the major challenges in the field of WSNs. On the other hand, blockchain is also a very hot domain in this era. Blockchain has a remedy for some challenges, which are faced by the WSNs, e.g., secure data transactions and trustworthiness, etc. By keeping in mind the security issues, we induce blockchain into the WSNs. In short, we have proposed a trust model to avoid the malicious attacks and keep the transact data using the blockchain property of immutability. Moreover, an enhanced version of Proof of Stack (PoS), i.e., the Proof of Authority (PoA) consensus mechanism is being used to add a new node in the network. Additionally, the smart contract is also written to check the working status of nodes. Simulations are performed in order to record the transaction cost and execution cost.
Chapter
The data sharing is the claim of actual scholars datasets to share and reuse in the future from any domain. The rise of blockchain technology has to increase universally and enhancement in share and reuse of scholars datasets. Despite there are numbers of security management frameworks for share data securely. However, those frameworks is a centralize based to make data share digitally. Its has restriction and owned by third party authority. The access and reuse of research datasets have a variety of issues it misinterpretation. In this aspect, the researcher or publisher has not to share data publicly due to reuse and perceive the risk in a data sharing environment. Preparing and storing data is difficult in contents sharing. To overcome the limitation and restriction, we proposed distributed data sharing management based on blockchain network (peer to peer P2P network). To signify on Ethereum framework, we proposed the case study of data sharing on the Ethereum smart contract platform to achieve the access.
Chapter
Nowaday’s energy demand and energy production are increasing. Renewable energy resources will play an important role in managing future production of electricity due to an increase in the development of societies. The centralized energy trading system faces a challenge in terms of fair energy distribution. Centralized existing energy trading system totally relies on a central system or third party, because the third party has many drawbacks in the form of record tampering or record altering. The fair transaction is the main issue in the energy trading sector. When the bitcoin is introduced in the market, the trust of Blockchain technology is increased. We proposed a Blockchain based energy trading system in peer to peer networks. Blockchain technology provides trust, security, and transparency for energy trading. In Blockchain technology, there is no necessary need of the third party in the energy supply sector. In our proposed paper, we facilitate the prosumer who produces renewable energy and sells surplus energy to the consumer. We achieved transparency, accuracy, efficiency in our proposed paper. Using a double auction process, we obtain low energy price and acheived consumer trust in energy trading.
Chapter
Wireless Sensor Network (WSN) is a network of nodes connected through a wireless channel. The sensor nodes in the network are resource constrained in terms of energy, storage and computational power. Node failure is a common phenomenon, which occurs due to environmental factors, adversary attacks, draining of battery power, etc. After node failure, recovery is challenging that needs a strong mechanism. In this paper, Blockchain-based Node Recovery (BNR) scheme for WSNs is proposed. In BNR scheme, recovery of failed nodes is on the basis of node degree. The working mechanism of the scheme is that firstly, the failed nodes are detected using the state (active or inactive) of Cluster Heads (CHs). In the second phase, the recovery process is initiated for inactive nodes. The main purpose of this step is to recover the failed CH, which ultimately results in restoring the active states of its member nodes. NodeRecovery Smart Contract (SC) is written for the purpose. The cost analysis for NodeRecovery is also performed in the proposed work. Moreover, the security analysis is performed to ensure the security of the proposed scheme. Effectiveness of the proposed model is shown by the simulation results.
Article
Full-text available
In this paper, we propose a blockchain-based solution and framework for document sharing and version control to facilitate multiuser collaboration and track changes in a trusted, secure, and decentralized manner, with no involvement of a centralized trusted entity or third party. This solution is based on utilizing Ethereum smart contracts to govern and regulate the document version control functions among the creators and developers of the document and its validators. Moreover, our solution leverages the benefits of IPFS (InterPlanetary File System) to store documents on a decentralized file system. The proposed solution automates necessary interactions among multiple actors comprising developers and approvers. Smart contracts have been developed using Solidity language, and their functionalities were tested using the Remix IDE (Integrated Development Environment). The paper demonstrates that our smart contract code is free of commonly known security vulnerabilities and attacks. The code has been made publically available at Github.
Article
Full-text available
Access and utilization of data are central to the cloud computing paradigm. With the advent of the Internet of Things (IoT), the tendency of data sharing on the cloud has seen enormous growth. With data sharing comes numerous security and privacy issues. In the process of ensuring data confidentiality and fine-grained access control to data in the cloud, several studies have proposed Attribute-Based Encryption (ABE) schemes, with Key Policy-ABE (KP-ABE) being the prominent one. Recent works have however suggested that the confidentiality of data is violated through collusion attacks between a revoked user and the cloud server. We present a secured and efficient Proxy Re-Encryption (PRE) scheme that incorporates an Inner-Product Encryption (IPE) scheme in which decryption of data is possible if the inner product of the private key, associated with a set of attributes specified by the data owner, and the associated ciphertext is equal to zero 0 . We utilize a blockchain network whose processing node acts as the proxy server and performs re-encryption on the data. In ensuring data confidentiality and preventing collusion attacks, the data are divided into two, with one part stored on the blockchain network and the other part stored on the cloud. Our approach also achieves fine-grained access control.
Article
Full-text available
Data leakage in electronic health records (EHRs) could result in the compromise of patient privacy (e.g. medical conditions). Generally most data in EHRs remain unchanged once they are uploaded to the system; thus, blockchain can be potentially used to facilitate the sharing of such data. Different participating medical organizations and individuals (e.g. medical practitioners, hospitals, medical labs and insurance companies) can then access EHRs stored on the blockchain with a higher level of confidence. In this paper, a blockchain based searchable encryption scheme for EHRs is proposed. The index for EHRs is constructed through complex logic expressions and stored in the blockchain, so that a data user can utilize the expressions to search the index. As only the index is migrated to the blockchain to facilitate propagation, the data owners have full control over who can see their EHRs data. The use of blockchain technology ensures the integrity, anti-tampering, and traceability of EHRs’ index. Finally, the performance of the proposed scheme is evaluated from two aspects, namely in terms of the overhead for extracting the document IDs from EHRs and the overhead associated with conducting transactions on smart contract in Ethereum.
Article
Full-text available
To date, there is a considerable lack of transparency in the sales of digital assets between the author and providers of the digital assets-which typically leads to denying the authors from receiving their fair share of royalty. This paper proposes a blockchain-based framework and solution for online publishing and sale of digital assets. The solution is based on utilizing smart contracts of Ethereum Blockchain to govern the sales of e-books and ensure that the payment is dispersed in cryptocurrency as agreed among the publisher(s) and the author. Our solution handles cases related to incentives for both publishers and customers to ensure integral delivery of the digital books, failure of downloads, and refunds. We provide the full code of the Ethereum smart contract, and we also performed security vulnerability analysis to ascertain that our smart contract is bug-free and secure against known attacks and vulnerabilities.
Article
The previous blockchain data transmission techniques in industrial Internet of Things (IoT) have low security, high management cost of the trading center, and big difficulty in supervision. To address these issues, this paper proposes a secure FaBric blockchain-based data transmission technique for industrial IoT. This technique uses the blockchain-based dynamic secret sharing mechanism. A reliable trading center is realized using the power blockchain sharing model, which can also share power trading books. The power data consensus mechanism and dynamic linked storage are designed to realize the secure matching of the power data transmission. Experiments show that the optimized FaBric power data storage and transmission has high security and reliability. The proposed technique can improve the transmission rate and packet receiving rate by 12% and 13%, respectively. Moreover, the proposed technique has good superiority in sharing management and decentralization.
Chapter
Access control is a crucial part of a system’s security, restricting what actions users can perform on resources. Therefore, access control is a core component when dealing with e-Health data and resources, discriminating which is available for a certain party. We consider that current systems that attempt to assure the share of policies between facilities are mostly centralized, being prone to system’s and network’s faults and do not assure the integrity of policies lifecycle. Using a blockchain as store system for access policies we are able to ensure that the different entities have knowledge about the policies in place while maintaining a record of all permission requests, thus assuring integrity, auditability and authenticity.
Article
The cryptosystem-based data privacy preserving methods employ high computing power of cloud servers, where the main feature is to allow resource sharing and provide multi-user independent services. Therefore, to achieve the rapid allocation and release of resource sharing in cloud computing, decentralized cryptographic protocols need to be proposed for multi-user consensus systems. In this work, we first present a multi-secret sharing scheme with multi-level access structure, where the secret reconstruction algorithm satisfies the additive homomorphism. The secret sharing scheme needs no trusted third parties and any user can play the role of dealer. In the designing, multiple target secrets are independently shared, where each subset of users forms a sub-access structure and shares one target secret only with a short secret share. This scheme is efficient and unconditionally secure. Furthermore, based on the multi-level access structures, a decentralized multi-role e-voting protocol is designed using Chinese Remainder Theorem, where each role’s election is associated with one sub-access structure. The voters employ a shared parameter to blind the sum of ballot values. Meanwhile, the e-voting scheme supports a public verification for the final election results. Compared with the existing e-voting protocols, our e-voting system does not require any authority center and the cloud server runs vote counting. And our e-voting scheme does not need any high-complexity computational cost operation such as module exponential operation, etc. Finally, the common feature of Blockchain and Ad Hoc networks is decentralized. Thus the main idea of this protocol without a trusted third party can be used to achieve a secure consensus among multiple nodes in Blockchain and Ad Hoc network, meanwhile, the consensus results can be verified.
Article
Attribute-based encryption, especially ciphertext-policy attribute-based encryption, plays an important role in the data sharing. In the process of data sharing, the secret key does not contain the specific information of users, who may share his secret key with other users for benefits without being discovered. In addition, the attribute authority can generate the secret key from any attribute set. If the secret key is abused, it is difficult to judge whether the abused private key comes from users or the attribute authority. Besides, the access control structure usually leaks sensitive information in a distributed network, and the efficiency of attribute-based encryption is a bottleneck of its applications. Fortunately, blockchain technology can guarantee the integrity and non-repudiation of data. In view of the above issues, an efficient and privacy-preserving traceable attribute-based encryption scheme is proposed. In the proposed scheme, blockchain technologies are used to guarantee both integrity and non-repudiation of data, and the ciphertext can be quickly generated by using the pre-encryption technology. Moreover, attributes are hidden in anonymous access control structures by using the attribute bloom filter. When a secret key is abused, the source of the abused secret key can be audited. Security and performance analysis show that the proposed scheme is secure and efficient.
Article
With the rapid development of smart mobile terminals (MTs), various industrial IoT applications can fully leverage them to collect and share data for providing certain services. However, two key challenges still remain. One is how to achieve high quality data collection with limited energy and sensing range. Another is how to ensure security when sharing data among MTs, to prevent possible device failure, network communication failure, malicious attackers, etc. To this end, we propose a blockchain-enabled efficient data collection and secure sharing scheme combining Ethereum blockchain and deep reinforcement learning (DRL). In this scheme, DRL is used to achieve the maximum amount of collected data, and the blockchain technology is used to ensure security and reliability of data sharing. Extensive simulation results demonstrate that the proposed scheme can provide higher security level and stronger resistance to attack than a traditional database based data sharing scheme for different levels/types of attacks.
Article
In the era of big data, the produced and collected data explode due to the emerging technologies and applications that pervade everywhere in our daily lives, including internet of things applications such as smart home, smart city, smart grid, e-commerce applications and social network. Big data market can carry out efficient data trading, which provides a way to share data and further enhances the utility of data. However, to realize effective data trading in big data market, several challenges need to be resolved. The first one is to verify the data availability for a data consumer. The second is privacy of a data provider who is unwilling to reveal his real identity to the data consumer. The third is the payment fairness between a data provider and a data consumer with atomic exchange. In this paper, we address these challenges by proposing a new blockchain-based fair data trading protocol in big data market. The proposed protocol integrates ring signature, double-authentication-preventing signature and similarity learning to guarantee the availability of trading data, privacy of data providers and fairness between data providers and data consumers. We show the proposed protocol achieves the desirable security properties that a secure data trading protocol should have. The implementation results with Solidity smart contract demonstrate the validity of the proposed blockchain-based fair data trading protocol.