DistProv-Data Provenance in Distributed Cloud for Secure Transfer of Digital Assets with Ethereum Blockchain using ZKP

Theimportanceandusageofthedistributedcloudisincreasingrapidlyoveratraditionallycentralized cloudforthestoringandexchangingofdigitalassetsbetweenuntrustedpartiesinmanybusiness sectors.Storingthedigitalassetsinthedistributedcloudisconsideredsuperiortotraditionalcloud computingintermsofenvironmentallyfriendly,cost,securityandothertechnicaldimensions.In thisarticle,acontemporaryarchitectureDistProvisproposedwhereanopensourcedistributedcloud IPFSisusedtostoreandtransferthedigitalassetsbetweentheconsignorandconsignee.Thesetwo are untrusted parties exchanging sensitive documents secured by cryptographic algorithms with permission-basedaccessverifiedbyethereumsmartcontractsusingzero-knowledgeproof(ZKP) andsimultaneouslypublishingtheprovenancedataaboutthedigitalassetasatransactiononthe blockchain.Thisarticlealsodiscussesonverifyingtheintegrityofthedigitalassetsandauthentication oftheconsignorandthuspreservingastrongCIAtriad. KEywORDS Blockchain, CIA Triad, Cryptography, Data Provenance, Digital Assets, Distributed Cloud, Ethereum Smart Contracts

[1]  Matthew Green,et al.  Zerocoin: Anonymous Distributed E-Cash from Bitcoin , 2013, 2013 IEEE Symposium on Security and Privacy.

[2]  Murat Kantarcioglu,et al.  Using Blockchain and smart contracts for secure data provenance management , 2017, ArXiv.

[3]  Aleksander Berentsen Aleksander Berentsen Recommends “Bitcoin: A Peer-to-Peer Electronic Cash System” by Satoshi Nakamoto , 2019, 21st Century Economics.

[4]  Ragib Hasan,et al.  SECProv: Trustworthy and Efficient Provenance Management in the Cloud , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications.

[5]  Margo I. Seltzer,et al.  Layering in Provenance Systems , 2009, USENIX Annual Technical Conference.

[6]  Bu-Sung Lee,et al.  Flogger: A File-Centric Logger for Monitoring File Access and Transfers within Cloud Computing Environments , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.

[7]  Ryan K. L. Ko,et al.  Progger: An Efficient, Tamper-Evident Kernel-Space Logger for Cloud Data Provenance Tracking , 2014, 2014 IEEE 7th International Conference on Cloud Computing.

[8]  Bo Jin,et al.  A blockchain-based process provenance for cloud forensics , 2017, 2017 3rd IEEE International Conference on Computer and Communications (ICCC).

[9]  Bu-Sung Lee,et al.  S2Logger: End-to-End Data Tracking Mechanism for Cloud Data Provenance , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.

[10]  Margo I. Seltzer,et al.  Provenance-Aware Storage Systems , 2006, USENIX ATC, General Track.

[11]  Ian Miers,et al.  Zerocash: Decentralized Anonymous Payments from Bitcoin (extended version) , 2014 .

[12]  Marianne Winslett,et al.  Preventing history forgery with secure provenance , 2009, TOS.

[13]  Simon Miles Automatically Adapting Source Code to Document Provenance , 2010, IPAW.

[14]  Sachin Shetty,et al.  ProvChain: A Blockchain-Based Data Provenance Architecture in Cloud Environment with Enhanced Privacy and Availability , 2017, 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID).

[15]  Navya Gouru,et al.  CoPS - Cooperative Provenance System with ZKP using Ethereum Blockchain Smart Contracts , 2018, Int. J. Distributed Syst. Technol..