Blockchain

Trusted Query Method for Data Provenance Based on Blockchain

Expand
  • 1. School of Software Engineering, Chongqing University of Posts and Telecommunications, Chongqing 400065, China;
    2. School of Microelectronics and Communication Engineering, Chongqing University, Chongqing 400044, China

Received date: 2020-11-12

  Online published: 2021-02-04

Abstract

In order to reduce the storages needed in verifying provenance information of light clients in blockchain data provenance system, this paper firstly introduces a data structure titled by Merkle mountain range (MMR), which optimizes the dynamic append performance of Merkle trees and stores all block headers on blockchain in the MMR. Then we propose an efficient and reliable verification method for data provenance to reduce the size of the proof information required for the proof of the block contain. On this basis, a scheme of data provenance system based on block chain is designed, which encapsulates the common modules required for data provenance and opens them to the provenance application through interfaces. This scheme enables light clients to effectively verify whether the provenance information is contained in the block chain as long as they keep the information of the latest block in storage.

Cite this article

ZHANG Xuewang, FENG Jiaqi, YIN Zijie, LIN Jinzhao . Trusted Query Method for Data Provenance Based on Blockchain[J]. Journal of Applied Sciences, 2021 , 39(1) : 42 -54 . DOI: 10.3969/j.issn.0255-8297.2021.01.004

References

[1] Wang Y R, Madnick S E. A polygen model for heterogeneous database systems:the source tagging perspective[C]//Proceedings of the 16th International Conference on Very Large Data Bases, San Francisco, California, 1990:519-538.
[2] Buneman P, Khanna S, Wang-Chiew T. Why and where:a characterization of data provenance[C]//International Conference on Database Theory. Heidelberg, Berlin:Springer, 2001:316-330.
[3] 袁勇, 王飞跃. 区块链技术发展现状与展望[J]. 自动化学报, 2016, 42(4):481-494. Yuan Y, Wang F Y. Blockchain:the state of the art and future trends[J]. Acta Automatica Sinica, 2016, 42(4):481-494. (in Chinese)
[4] Liang X, Shetty S, Tosh D, et al. Provchain:a blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability[C]//Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, 2017:468-477.
[5] Xia Q I, Sifah E B, Asamoah K O, et al. MeDShare:trustless medical data sharing among cloud service providers via blockchain[J]. IEEE Access, 2017, 5:14757-14767.
[6] Ramachandran A, Kantarcioglu M. Smartprovenance:a distributed, blockchain based data provenance system[C]//Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018:35-42.
[7] 刘耀宗, 刘云恒. 基于区块链的RFID大数据安全溯源模型[J]. 计算机科学, 2018, 45(增刊2):367-368, 381. Liu Y Z, Liu Y H. Security provenance model for RFID big data based on blockchain[J]. Computer Science, 2018, 45(Suppl.2):367-368, 381. (in Chinese)
[8] 乔蕊, 曹琰, 王清贤. 基于联盟链的物联网动态数据溯源机制[J]. 软件学报, 2019, 30(6):1614-1631. Qiao R, Cao Y, Wang Q X. Traceability mechanism of dynamic data in Internet of things based on consortium blockchain[J]. Journal of Software, 2019, 30(6):1614-1631. (in Chinese)
[9] 张国英, 毛燕琴. 一种基于区块链的去中心化数据溯源方法[J]. 南京邮电大学学报(自然科学版), 2019, 39(2):91-98. Zhang G Y, Mao Y Q. Blockchain-based decentralized data provenance method[J]. Journal of Nanjing University of Posts and Telecommunications (Natural Science), 2019, 39(2):91-98. (in Chinese)
[10] Nakamoto S. Bitcoin:a peer-to-peer electronic cash system[EB/OL].[2020-09-28]. https://bitcoin.org/bitcoin.pdf.
[11] Merkle R C. A digital signature based on a conventional encryption function[C]//Conference on the Theory and Application of Cryptographic Techniques. Heidelberg, Berlin:Springer, 1987:369-378.
[12] Todd P. Merkle mountain range[EB/OL].[2020-09-28]. https://github.com/opentimestamps/opentimestamps-server/blob/master/doc/merkle-mountain-range.md.
[13] Bünz B, Kiffer L, Luu L, et al. Flyclient:super-light clients for cryptocurrencies[C]//2020 IEEE Symposium on Security and Privacy, 2020:928-946.
[14] Moreau L, Clifford B, Freire J, et al. The open provenance model core specification[J]. Future Generation Computer Systems, 2011, 27(6):743-756.
[15] W3C. Prov-o:the prov ontology[R/OL].[2020-09-28]. https://www.w3.org/TR/prov-o/.
[16] 中华人民共和国国家质量监督检验检疫总局, 中国国家标准化管理委员会. 信息技术数据溯源描述模型:GB/T 34945-2017[S]. 北京:中国标准出版社, 2017.
[17] 范贤丽, 范春晓, 吴岳辛. 基于区块链和IPFS技术实现粮食供应链隐私信息保护[J]. 应用科学学报, 2019, 37(2):179-190. Fan X L, Fan C X, Wu Y X. Realization of privacy protection of food supply chain based on blockchain and IPFS[J]. Journal of Applied Sciences, 2019, 37(2):179-190. (in Chinese)
[18] 祝烈煌, 高峰, 沈蒙, 等. 区块链隐私保护研究综述[J]. 计算机研究与发展, 2017, 54(10):2170-2186. Zhu L H, Gao F, Shen M, et al. Survey on privacy preserving techniques for blockchain technology[J]. Journal of Computer Research and Development, 2017, 54(10):2170-2186. (in Chinese)
[19] 王芳, 赵洪, 马嘉悦, 等. 数据科学视角下数据溯源研究与实践进展[J]. 中国图书馆学报, 2019(5):79-100. Wang F, Zhao H, Ma J Y, et al. Research and practice progress of data provenance from the perspective of data science[J]. Journal of Library Science in China, 2019(5):79-100. (in Chinese)
[20] 明华, 张勇, 符小辉. 数据溯源技术综述[J]. 小型微型计算机系统, 2012, 33(9):1917-1923. Ming H, Zhang Y, Fu X H. Survey of data provenance[J]. Journal of Chinese Computer Systems, 2012, 33(9):1917-1923. (in Chinese)
Outlines

/