A Data Storing and Sharing Solution with Guaranteed Reliability
Keywords:
Blockchain, IPFS, data storing, data sharing.Abstract
Digital data certified by a reputable organization are valuable digital data that can be stored or shared on the internet. However, the problems are: (1) How to ensure the anonymity of organizations on issued certificates? (2) How to ensure that valuable digital data are securely stored in the system? and (3)How could people verify the reliability of shared data while still ensuring the confidentiality of its content, and how to ensure that the data sharing process is safe, transparent, and fair? Therefore, we propose data producing, data storing, and data sharing schemas. In the data producing schema, we deploy a group signature scheme for a group of reputable organizations that provide the same type of service, an organization in the group generates a valuable digital data from raw data sent from a data owner and then issues a certificate on the ciphertext of this digital data. In the data storing schema, the data owner uploads his/her data to the public Inter-Planetary File System network and then stores the access address of the stored data and the corresponding certificate on the blockchain ledger. In the data sharing schema, everyone on the system could verify the reliability of shared data before sending a data sharing request to the data owner. The data sharing process is performed via a smart contract, and involved parties have to escrow to encourage honesty. The schemas of data storing and sharing guarantee the security properties including confidentiality, integrity, privacy, non-repudiation, and anonymity.
References
- D. Reinsel, J. Gantz, and J. Rydning, ‘‘The digitization of the world from edge to core,’’ IDC White Paper, Nov. 2018.
- M. F. Bari, R. Boutaba, R. Esteves, L. Z. Granville, M. Podlesny, M. G. Rabbani, Q. Zhang, and M. F. Zhani, ‘‘Data center network virtualization: A survey,’’ EEE Commun. Surveys Tuts., vol. 15, no. 2, pp. 909–928, 2nd Quart., 2013.
- L. Jiang, L. D. Xu, H. Cai, Z. Jiang, F. Bu, and B. Xu, ‘‘An IoT-oriented data storage framework in cloud computing platform,’’ IEEE Trans. Ind. Informat., vol. 10, no. 2, pp. 1443–1451, May 2014.
- T. A. Phan, J. K. Nurminen, and M. Di Francesco, ‘‘Cloud databases for Internet-of-Things data,’’ in Proc. IEEE Int. Conf. Internet Things (iThings), IEEE Green Comput. Commun. (GreenCom) IEEE Cyber, Phys. Social Comput. (CPSCom), Sep. 2014, pp. 117–124.
- K. Yasumoto, H. Yamaguchi, and H. Shigeno, ‘‘Survey of real-time processing technologies of IoT data streams,’’ J. Inf. Process., vol. 24, no. 2, pp. 195–202, 2016.
- A. Kumar, N. C. Narendra, and U. Bellur, ‘‘Uploading and replicating Internet of Things (IoT) data on distributed cloud storage,’’ in Proc. IEEE 9th Int. Conf. Cloud Comput. (CLOUD), Jun. 2016, pp. 670–677.
- K. Hossain, M. Rahman, and S. Roy, ‘‘IoT data compression and optimization techniques in cloud storage: Current prospects and future directions,’’ Int. J. Cloud Appl. Comput., vol. 9, no. 2, pp. 43–59, Apr. 2019.
- J. D. Bokefode, A. S. Bhise, P. A. Satarkar, and D. G. Modani, ‘‘Developing a secure cloud storage system for storing IoT data by applying role based encryption,’’ Procedia Comput. Sci., vol. 89, no. 1, pp. 43–50, 2016.
- W. Wang, P. Xu, and L. T. Yang, ‘‘Secure data collection, storage and access in cloud-assisted IoT,’’ IEEE Cloud Comput., vol. 5, no. 4, pp. 77–88, Jul. 2018.
- M. Rashid, S. A. Parah, A. R. Wani, and S. K. Gupta, ‘‘Securing Ehealth IoT data on cloud systems using novel extended role based access control model,’’ in Internet Things (IoT). Cham, Switzerland: Springer, 2020, pp. 473–489.
- R. Arora, A. Parashar, and C. C. I. Transforming, ‘‘Secure user data in cloud computing using encryption algorithms,’’ Int. J. Eng. Res. Appl., vol. 3, no. 4, pp. 1922–1926, 2013.
- M. Kantarcioglu and F. Shaon, ‘‘Securing big data in the age of AI,’’ in Proc. 1st IEEE Int. Conf. Trust, Privacy Secur. Intell. Syst. Appl. (TPSISA), Dec. 2019, pp. 218–220.
- C. Zhang, J. Sun, X. Zhu, and Y. Fang, ‘‘Privacy and security for online social networks: Challenges and opportunities,’’ IEEE Netw., vol. 24, no. 4, pp. 13–18, Jul./Aug. 2010.
- A. M. Antonopoulos, Mastering Bitcoin: Unlocking Digital Cryptocurrencies. Sebastopol, CA, USA: O’Reilly Media, 2014.
- Z. Zheng, S. Xie, H.-N. Dai, X. Chen, and H. Wang, ‘‘Blockchain challenges and opportunities: A survey,’’ Int. J. Web Grid Services, vol. 14, no. 4, pp. 352–375, 2018.
- M. Conti, E. S. Kumar, C. Lal, and S. Ruj, ‘‘A survey on security and privacy issues of bitcoin,’’ IEEE Commun. Surveys Tuts., vol. 20, no. 4, pp. 3416–3452, 4th Quart., 2018.
- Q. Xia, E. B. Sifah, A. Smahi, S. Amofa, and X. Zhang, ‘‘BBDS:Blockchain-based data sharing for electronic medical records in cloud environments,’’ Information, vol. 8, no. 2, p. 44, 2017.
- X. Zheng, R. R. Mukkamala, R. Vatrapu, and J. Ordieres-Mere, ‘‘Blockchain-based personal health data sharing system using cloud storage,’’ in Proc. IEEE 20th Int. Conf. e-Health Netw., Appl. Services (Healthcom), Sep. 2018, pp. 1–6.
- J. Liu, X. Li, L. Ye, H. Zhang, X. Du, and M. Guizani, ‘‘BPDS: Ablockchain based privacy-preserving data sharing for electronic medical records,’’ in Proc. IEEE Global Commun. Conf. (GLOBECOM), Dec. 2018, pp. 1–6.
- X. Liang, J. Zhao, S. Shetty, J. Liu, and D. Li, ‘‘Integrating blockchain for data sharing and collaboration in mobile healthcare applications,’’ in Proc. IEEE 28th Annu. Int. Symp. Pers., Indoor, Mobile Radio Commun. (PIMRC), Oct. 2017, pp. 1–5
Downloads
Published
Issue
Section
License
Copyright (c) IJSRST

This work is licensed under a Creative Commons Attribution 4.0 International License.