ArticlePDF Available

A Secure Data Sharing Platform using Blockchain and IPFS

Authors:

Abstract and Figures

In a research community, data sharing is an essential step to gain maximum knowledge from the prior work. Existing data sharing platforms depend on trusted third party (TTP). Due to the involvement of TTP, such systems lack trust, transparency, security, and immutability. To overcome these issues, this paper proposed a blockchain-based secure data sharing platform by leveraging the benefits of interplanetary file system (IPFS). A meta data is uploaded to IPFS server by owner and then divided into n secret shares. The proposed scheme achieves security and access control by executing the access roles written in smart contract by owner. Users are first authenticated through RSA signatures and then submit the requested amount as a price of digital content. After the successful delivery of data, the user is encouraged to register the reviews about data. These reviews are validated through Watson analyzer to filter out the fake reviews. The customers registering valid reviews are given incentives. In this way, maximum reviews are submitted against every file. In this scenario, decentralized storage, Ethereum blockchain, encryption, and incentive mechanism are combined. To implement the proposed scenario, smart contracts are written in solidity and deployed on local Ethereum test network. The proposed scheme achieves transparency, security, access control, authenticity of owner, and quality of data. In simulation results, an analysis is performed on gas consumption and actual cost required in terms of USD, so that a good price estimate can be done while deploying the implemented scenario in real set-up. Moreover, computational time for different encryption schemes are plotted to represent the performance of implemented scheme, which is shamir secret sharing (SSS). Results show that SSS shows the least computational time as compared to advanced encryption standard (AES) 128 and 256.
Content may be subject to copyright.
A preview of the PDF is not available
... N. Chen et al. proposed an approach that encrypts shared data using CP-ABE before putting it in the cloud [2]. M. Naz et al. present a blockchain and secret-sharingbased data-sharing method that is implemented using IPFS, a distributed storage system [19]. In this method, IPFS technology is used to store unencrypted information. ...
... IPFS is superior to traditional centralised storage systems in terms of security and access efficiency due to its decentralised nature and lack of single points of failure. IPFS is quickly replacing more traditional forms of local storage as cloud computing becomes more widespread [19]. If you upload a file to the IPFS, the system will split it into many blocks and generate a unique hash value for each one. ...
Article
Full-text available
Various cryptographic approaches have been used to resolve concerns about data privacy shared in public cloud storage, assuming that the cloud service provider is trustworthy. However, the necessity to disseminate papers has just emerged. Regarding digital document sharing, the current cloud-based models are successful but have a few downsides. Two significant problems are the high cost of computing and external interference. Blockchain technology and keyword-searchable attribute-based encryption (ABE) are proposed in this study as secure and efficient means of transferring digital certificates, addressing the abovementioned issues. The blockchain records transactions, while the Interplanetary File System (IPFS) stores encrypted data to ensure privacy and immutability. The paradigm also has the added benefits of low computational costs and the ability to revoke attributes. In addition, a smart audit contract is developed to manage who may see certain documents. We then put the model through its paces on the Ethereum network and compared its results to the state of the art. The results of experiments and theoretical analyses are more applicable and practical in challenging settings. Furthermore, security analysis demonstrates that the proposed paradigm is immune to attacks based on guessing keywords and "chosen plaintext" (CPA).
... In this scheme, a secret/dataset is encoded into N secret shares, where N is the number of clients, and then each share is given to one of the clients. Secret sharing has been widely employed in cloud-based scenarios to improve the security of sensitive data for clients [41]- [44]. In the original Shamir's scheme, the secret/data symbols as well as the operation involving them are done over a finite field. ...
Preprint
We consider a fully decentralized scenario in which no central trusted entity exists and all clients are honest-but-curious. The state-of-the-art approaches to this problem often rely on cryptographic protocols, such as multiparty computation (MPC), that require mapping real-valued data to a discrete alphabet, specifically a finite field. These approaches, however, can result in substantial accuracy losses due to computation overflows. To address this issue, we propose A-MPC, a private analog MPC protocol that performs all computations in the analog domain. We characterize the privacy of individual datasets in terms of $(\epsilon, \delta)$-local differential privacy, where the privacy of a single record in each client's dataset is guaranteed against other participants. In particular, we characterize the required noise variance in the Gaussian mechanism in terms of the required $(\epsilon,\delta)$-local differential privacy parameters by solving an optimization problem. Furthermore, compared with existing decentralized protocols, A-MPC keeps the privacy of individual datasets against the collusion of all other participants, thereby, in a notably significant improvement, increasing the maximum number of colluding clients tolerated in the protocol by a factor of three compared with the state-of-the-art collaborative learning protocols. Our experiments illustrate that the accuracy of the proposed $(\epsilon,\delta)$-locally differential private logistic regression and linear regression models trained in a fully-decentralized fashion using A-MPC closely follows that of a centralized one performed by a single trusted entity.
... This study presents a comprehensive framework that facilitates decentralized and a privacy-centric data exchange in the IoV, explicitly focusing on monetized services. The framework is built upon a tiered blockchain architecture and employs the InterPlanetary file system for secure data storage and transfer [38]. Its main objective is to empower IoV data users to have fine-grained control over data sharing with entities authenticated by the blockchain. ...
Article
Full-text available
This study presents an architectural framework for the blockchain-based usage-based insurance (UBI) policy auction mechanism in the internet of vehicles (IoV) applications. The main objective of this study is to analyze and design the specific blockchain architecture and management considerations for the UBI environment. An auction mechanism is developed for the UBI blockchain platform to enhance consumer trust. The study identifies correlations between driving behaviors and associated risks to determine a driver's score. A decentralized bidding algorithm is proposed and implemented on a blockchain platform using elliptic curve cryptography and first-price sealed-bid auctions. Additionally, the model incorporates intelligent contract functionality to prevent unauthorized modifications and ensure that insurance prices align with the prevailing market value. An experimental study evaluates the system's efficacy by expanding the participant pool in the bidding process to identify the winning bidder and is investigated under scenarios where varying numbers of insurance companies submit bids. The experimental results demonstrate that as the number of insurance companies increases exponentially, the temporal overhead incurred by the system exhibits only marginal growth. Moreover, the allocation of bids is accomplished within a significantly abbreviated timeframe. These findings provide evidence that supports the efficiency of the proposed algorithm.
Article
The massive amounts of data produced and gathered by smart devices through the internet support a wide range of applications, considerably improving our daily lives. Data sharing among smart devices must be safeguarded due to the sensitivity of the data involved in the transmission. The Internet of Things (IoT) environment must be protected from unauthorised access due to a variety of variables, including its attractiveness to cybercriminals, previous successful cyber-attacks, and consumers’ perceptions of security and reliability. Blockchain technology appears to be one promising technology that appears to address these security challenges extremely effectively. However, given the volume and rate at which smart devices generate data, Blockchain appears to be inefficient for storing it. The pace of data collection in the IoT context and the speed of transaction confirmation in the Blockchain network are the two key elements behind this. We connect the Blockchain and the Inter-Planetary File System (IPFS) in this study to permit data recording on a distributed storage and a mechanism to restrict access to recorded data to authorised organisations only. Over the Blockchain network, the access policy definition for safe data sharing and cryptographic hash content is stored. The real IoT-generated data, on the other hand, is collected via a distributed storage network, which improves availability and security. The proposed scheme’s analysis and performance evaluation show that it is secure and feasible. Furthermore, simulations are undertaken to assess the operating costs of smart contracts and to test the efficacy and viability of the suggested architecture.
Chapter
Constructing globally distributed file systems (DFS) has received great attention. Traditional peer-to-peer (P2P) distributed file systems have inevitable drawbacks such as instability and lacking auditing and incentive mechanisms. Thus, Inter-Planetary File Systems (IPFS) and Swarm, as the representative DFSs which integrate with blockchain technologies, are proposed and becoming a new generation of distributed file systems. Although the blockchain-based DFS successfully provides adequate incentives and security guarantees by exploiting the advantages of blockchain, a series of challenges, such as scalability and privacy issues, are also constraining the development of the new generation of DFSs. Mainly focusing on IPFS and Swarm, this chapter conducts an overview of the principle, layered structure, and cutting-edge studies of blockchain-based DSFs. Furthermore, we also identify their challenges, open issues, and future directions. We anticipate that this survey can shed new light on the subsequent studies related to blockchain-based distributed file systems.KeywordsBlockchainDistributed file systemsPeer-to-peerSwarmConsensus algorithmsScalabilityStorage optimization
Chapter
The 6th generation of wireless networks (6G) promises to provide ultra-reliable, high-speed, and low-latency communication for Internet of Things (IoT) devices. However, securing data transmission and storage in these networks is a critical challenge due to potential security threats. Blockchain technology provides a solution to enhance security in IoT networks by enabling secure, decentralized, and tamper-proof data sharing. In this paper, we proposed a novel solution for securing data sharing and storage in 6G-based IoT networks using blockchain technology, hybrid encryption, and IPFS. The proposed approach consists of four algorithms that enhance the security of the system: a user authentication algorithm, a data access algorithm, a data storage algorithm, and a secure data sharing algorithm. The secure data sharing algorithm enables secure, tamper-proof data sharing among authorized devices using a permissioned blockchain. These algorithms are implemented using hybrid encryption, which ensures data confidentiality, and have been evaluated for their effectiveness in enhancing security in 6G-based IoT networks. Our work contributes to the growing body of research on blockchain-enabled solutions for securing data in IoT networks and provides insights into the potential of blockchain technology, hybrid encryption, and IPFS to enhance security in 6G-based IoT networks. The proposed approach using these algorithms provides secure and tamper-proof data sharing, making the system more secure and reliable. We presented the technical details of our approach and evaluate its effectiveness in terms of security, with a particular focus on the role of hybrid encryption and IPFS in enhancing the security and reliability of the system. Our results demonstrate that the proposed approach enhances data security in 6G-based IoT networks by providing secure and tamper-proof data sharing. The use of hybrid encryption and IPFS makes the system more secure and reliable, with hybrid encryption ensuring data confidentiality and IPFS providing decentralized and fault-tolerant storage.
Article
In this article, we designed a data sharing network management and control program to provide data security. The solution uses blockchain technology to implement distributed records of data sharing network records, while providing safe and reliable transactional data storage, and ensuring that we can see the usage of data. The SDN network is implemented, and the data center traffic is anonymized to ensure the system is normal, so as to prevent malicious detection and destruction of the data center from the outside. The main research purpose of this paper is to analyze the main influencing factors and improved methods of voice activity detection and recognition based on neural network. To this end, we first conduct a detailed exploration of the clustering and partitioning system based on time-delayed neural networks to extract low-dimensional vectors, and we find that the speech activity detection can be improved through experimental results. Because the software architecture of the cloud computing service industry relies on the construction of open source products, the basic functions of the NoSQL cloud database service at the saas layer will be migrated to the cloud, thereby shielding many functions, which is difficult to fully satisfy customers from existing IT migrate. Since the homogeneity of cloud computing services is more serious in terms of competition, in order to improve the quality of enterprise NoSQL cloud database services, reduce customer operating costs and improve the efficiency of enterprise operations. On the basis of existing NoSQL cloud database services and research, the main focus is on quality improvement analysis. This article mainly researches on voice activity detection and database, and applies them to cloud computing, so as to promote the development of cloud computing.
Article
Full-text available
In this paper, we propose a blockchain-based solution and framework for document sharing and version control to facilitate multiuser collaboration and track changes in a trusted, secure, and decentralized manner, with no involvement of a centralized trusted entity or third party. This solution is based on utilizing Ethereum smart contracts to govern and regulate the document version control functions among the creators and developers of the document and its validators. Moreover, our solution leverages the benefits of IPFS (InterPlanetary File System) to store documents on a decentralized file system. The proposed solution automates necessary interactions among multiple actors comprising developers and approvers. Smart contracts have been developed using Solidity language, and their functionalities were tested using the Remix IDE (Integrated Development Environment). The paper demonstrates that our smart contract code is free of commonly known security vulnerabilities and attacks. The code has been made publically available at Github.
Article
Full-text available
Access and utilization of data are central to the cloud computing paradigm. With the advent of the Internet of Things (IoT), the tendency of data sharing on the cloud has seen enormous growth. With data sharing comes numerous security and privacy issues. In the process of ensuring data confidentiality and fine-grained access control to data in the cloud, several studies have proposed Attribute-Based Encryption (ABE) schemes, with Key Policy-ABE (KP-ABE) being the prominent one. Recent works have however suggested that the confidentiality of data is violated through collusion attacks between a revoked user and the cloud server. We present a secured and efficient Proxy Re-Encryption (PRE) scheme that incorporates an Inner-Product Encryption (IPE) scheme in which decryption of data is possible if the inner product of the private key, associated with a set of attributes specified by the data owner, and the associated ciphertext is equal to zero 0 . We utilize a blockchain network whose processing node acts as the proxy server and performs re-encryption on the data. In ensuring data confidentiality and preventing collusion attacks, the data are divided into two, with one part stored on the blockchain network and the other part stored on the cloud. Our approach also achieves fine-grained access control.
Article
Full-text available
To date, there is a considerable lack of transparency in the sales of digital assets between the author and providers of the digital assets-which typically leads to denying the authors from receiving their fair share of royalty. This paper proposes a blockchain-based framework and solution for online publishing and sale of digital assets. The solution is based on utilizing smart contracts of Ethereum Blockchain to govern the sales of e-books and ensure that the payment is dispersed in cryptocurrency as agreed among the publisher(s) and the author. Our solution handles cases related to incentives for both publishers and customers to ensure integral delivery of the digital books, failure of downloads, and refunds. We provide the full code of the Ethereum smart contract, and we also performed security vulnerability analysis to ascertain that our smart contract is bug-free and secure against known attacks and vulnerabilities.
Article
Full-text available
Internet of Things (IoT)-based devices, especially those used for home automation, consist of their own sensors and generate many logs during a process. Enterprises producing IoT devices convert these log data into more useful data through secondary processing; thus, they require data from the device users. Recently, a platform for data sharing has been developed because the demand for IoT data increases. Several IoT data marketplaces are based on peer-to-peer (P2P) networks, and in this type of marketplace, it is difficult for an enterprise to trust a data owner or the data they want to trade. Therefore, in this study, we propose a review system that can confirm the reputation of a data owner or the data traded in the P2P data marketplace. The traditional server-client review systems have many drawbacks, such as security vulnerability or server administrator’s malicious behavior. However, the review system developed in this study is based on Ethereum smart contracts; thus, this system is running on the P2P network and is more flexible for the network problem. Moreover, the integrity and immutability of the registered reviews are assured because of the blockchain public ledger. In addition, a certain amount of gas is essential for all functions to be processed by Ethereum transactions. Accordingly, we tested and analyzed the performance of our proposed model in terms of gas required.
Article
Full-text available
There is an immense need of a Proof of Delivery (PoD) of todays digital media and content, especially those that are subject to payment. Current PoD systems are mostly centralized and heavily dependent on a Trusted Third Party (TTP) especially for payment. Such existing PoD systems often lack security, transparency and visibility, and are not highly credible, as the TTP can be subject to failure, manipulation, corruption, compromise and hacking. Blockchain is used to create a decentralized solution. Utilizing blockchain’s immutable and tamper-proof logs, accountability and auditability can be easily achieved. Ethereum which makes blockchain a programmable distributed ledger is used in our implemented solution to create a PoD solution for the digital media. The solution uses a smart contract to allow customers to request the content and be uniquely identified using tokens derived from their Ethereum Addresses (EA). The solution involves the owner of the digital media, the file server and the customers. All participating entities are incentivized to act honestly. Our solution includes off-chain secure download activity involving the file server and the customers. A security analysis of our proposed system has been provided. The full code of the Smart Contract has been made publicly available on Github.
Article
The previous blockchain data transmission techniques in industrial Internet of Things (IoT) have low security, high management cost of the trading center, and big difficulty in supervision. To address these issues, this paper proposes a secure FaBric blockchain-based data transmission technique for industrial IoT. This technique uses the blockchain-based dynamic secret sharing mechanism. A reliable trading center is realized using the power blockchain sharing model, which can also share power trading books. The power data consensus mechanism and dynamic linked storage are designed to realize the secure matching of the power data transmission. Experiments show that the optimized FaBric power data storage and transmission has high security and reliability. The proposed technique can improve the transmission rate and packet receiving rate by 12% and 13%, respectively. Moreover, the proposed technique has good superiority in sharing management and decentralization.
Chapter
Access control is a crucial part of a system’s security, restricting what actions users can perform on resources. Therefore, access control is a core component when dealing with e-Health data and resources, discriminating which is available for a certain party. We consider that current systems that attempt to assure the share of policies between facilities are mostly centralized, being prone to system’s and network’s faults and do not assure the integrity of policies lifecycle. Using a blockchain as store system for access policies we are able to ensure that the different entities have knowledge about the policies in place while maintaining a record of all permission requests, thus assuring integrity, auditability and authenticity.
Article
The cryptosystem-based data privacy preserving methods employ high computing power of cloud servers, where the main feature is to allow resource sharing and provide multi-user independent services. Therefore, to achieve the rapid allocation and release of resource sharing in cloud computing, decentralized cryptographic protocols need to be proposed for multi-user consensus systems. In this work, we first present a multi-secret sharing scheme with multi-level access structure, where the secret reconstruction algorithm satisfies the additive homomorphism. The secret sharing scheme needs no trusted third parties and any user can play the role of dealer. In the designing, multiple target secrets are independently shared, where each subset of users forms a sub-access structure and shares one target secret only with a short secret share. This scheme is efficient and unconditionally secure. Furthermore, based on the multi-level access structures, a decentralized multi-role e-voting protocol is designed using Chinese Remainder Theorem, where each role’s election is associated with one sub-access structure. The voters employ a shared parameter to blind the sum of ballot values. Meanwhile, the e-voting scheme supports a public verification for the final election results. Compared with the existing e-voting protocols, our e-voting system does not require any authority center and the cloud server runs vote counting. And our e-voting scheme does not need any high-complexity computational cost operation such as module exponential operation, etc. Finally, the common feature of Blockchain and Ad Hoc networks is decentralized. Thus the main idea of this protocol without a trusted third party can be used to achieve a secure consensus among multiple nodes in Blockchain and Ad Hoc network, meanwhile, the consensus results can be verified.
Article
Attribute-based encryption, especially ciphertext-policy attribute-based encryption, plays an important role in the data sharing. In the process of data sharing, the secret key does not contain the specific information of users, who may share his secret key with other users for benefits without being discovered. In addition, the attribute authority can generate the secret key from any attribute set. If the secret key is abused, it is difficult to judge whether the abused private key comes from users or the attribute authority. Besides, the access control structure usually leaks sensitive information in a distributed network, and the efficiency of attribute-based encryption is a bottleneck of its applications. Fortunately, blockchain technology can guarantee the integrity and non-repudiation of data. In view of the above issues, an efficient and privacy-preserving traceable attribute-based encryption scheme is proposed. In the proposed scheme, blockchain technologies are used to guarantee both integrity and non-repudiation of data, and the ciphertext can be quickly generated by using the pre-encryption technology. Moreover, attributes are hidden in anonymous access control structures by using the attribute bloom filter. When a secret key is abused, the source of the abused secret key can be audited. Security and performance analysis show that the proposed scheme is secure and efficient.
Article
In recent years, there have been efforts to deploy blockchain in a broad range of applications and in different domains, such as the critical infrastructure sectors. Generally, blockchain can be leveraged to establish a fair and transparent data sharing environment, where unauthorized modification to the data can be audited and traced. There are, however, known limitations of blockchain-based solutions, such as a significantly weakened networking control capability due to the distributed nature of such solutions. In addition, decisions recorded on a blockchain cannot be changed and there is the risk of majority attack (also known as 51% attack). Seeking to mitigate these limitations, in this paper we propose a controllable blockchain data management (CBDM) model that can be deployed in a cloud environment. We then evaluate its security and performance, in order to demonstrate utility.