Polynomial-based modifiable blockchain structure for removing fraud transactions

Abstract Blockchain has become one of the most significant technology in financial fields. A hash-based blockchain holds the feature of strong tamper resistance. However, it is almost impossible to change fraud transactions in time, since starting a fork requires a lot of time and resources. Failing to remove fraudulent transactions in time is harmful to the entire economic environment. In order to deal with the modification problem, in this work, we propose a novel polynomial-based blockchain structure. Data segments are organized by a Lagrange interpolation method in each block. Polynomial functions are used to keep the order of blocks. The polynomial-based blockchain structure not only achieves the aim of modification but also supports differential control strategy on modification difficulty. Experimental results demonstrate that the polynomial-based blockchain structure is efficient and practical. Detailed theoretical and practical analysis showed that the polynomial-based modifiable blockchain structure has a wide range of application scenarios with the help of other techniques on cryptography and privacy preservation.

[1]  Praveen Gauravaram,et al.  Blockchain for IoT security and privacy: The case study of a smart home , 2017, 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops).

[2]  Yidong Li,et al.  DroidEnsemble: Detecting Android Malicious Applications With Ensemble of String and Structural Static Features , 2018, IEEE Access.

[3]  Michael Devetsikiotis,et al.  Blockchains and Smart Contracts for the Internet of Things , 2016, IEEE Access.

[4]  Wei Jiang,et al.  Healthcare Data Gateways: Found Healthcare Intelligence on Blockchain with Novel Privacy Risk Control , 2016, Journal of Medical Systems.

[5]  Matthew Green,et al.  Zerocoin: Anonymous Distributed E-Cash from Bitcoin , 2013, 2013 IEEE Symposium on Security and Privacy.

[6]  Xiangliang Zhang,et al.  Exploring Permission-Induced Risk in Android Applications for Malicious Application Detection , 2014, IEEE Transactions on Information Forensics and Security.

[7]  Yao Zhang,et al.  CSP-E2: An abuse-free contract signing protocol with low-storage TTP for energy-efficient electronic transaction ecosystems , 2019, Inf. Sci..

[8]  Hiroyuki Inaba,et al.  Proposal of new authentication method in Wi-Fi access using Bitcoin 2.0 , 2016, 2016 IEEE 5th Global Conference on Consumer Electronics.

[9]  Wanlei Zhou,et al.  E-AUA: An Efficient Anonymous User Authentication Protocol for Mobile IoT , 2019, IEEE Internet of Things Journal.

[10]  Xiangliang Zhang,et al.  Detecting Android malicious apps and categorizing benign apps with ensemble of classifiers , 2018, Future Gener. Comput. Syst..

[11]  Thomas Hardjono,et al.  Cloud-Based Commissioning of Constrained Devices using Permissioned Blockchains , 2016, IoTPTS@AsiaCCS.

[12]  Jitender S. Deogun,et al.  Identity management using blockchain for cognitive cellular networks , 2017, 2017 IEEE International Conference on Communications (ICC).

[13]  Eli Ben-Sasson,et al.  Zerocash: Decentralized Anonymous Payments from Bitcoin , 2014, 2014 IEEE Symposium on Security and Privacy.

[14]  Alex Pentland,et al.  Decentralizing Privacy: Using Blockchain to Protect Personal Data , 2015, 2015 IEEE Security and Privacy Workshops.

[15]  Prateek Saxena,et al.  Making Smart Contracts Smarter , 2016, IACR Cryptol. ePrint Arch..

[16]  Vladimiro Sassone,et al.  Privacy-Preserving Access Control in Cloud Federations , 2017, 2017 IEEE 10th International Conference on Cloud Computing (CLOUD).

[17]  Xiangliang Zhang,et al.  Abstracting massive data for lightweight intrusion detection in computer networks , 2016, Inf. Sci..

[18]  E. Meijering,et al.  A chronology of interpolation: from ancient astronomy to modern signal and image processing , 2002, Proc. IEEE.

[19]  Andrew Lippman,et al.  MedRec: Using Blockchain for Medical Data Access and Permission Management , 2016, 2016 2nd International Conference on Open and Big Data (OBD).

[20]  Vladimiro Sassone,et al.  A Distributed Access Control System for Cloud Federations , 2017, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).