Secure, fair and instant data trading scheme based on bitcoin

Abstract Data trading scheme based on Bitcoins faces many challenges. One of them is the transactions’ fairness. That is, the distrust between the unfamiliar parties involved in the transaction is likely to cause unfair trade. For example, the party can provid inveracious data or refuse to pay after receiving the authentic data. Another one is the Bitcoin transaction latency, which causes the inability to reach an instant transaction. The third one is the illegal trading of data, for example, malicious agencies buy and sell users’ private data to make a profit. In order to address these challenges, we propose a secure, fair and instant data trading scheme. In this paper, we adopt a special Bitcoin script to reduce transaction latency. The script requires the payee to provide the payer the encryption key of data or he will not get Bitcoin. This effectively ensures fairness. If the same account is spent twice, the transaction’s script will expose the private key of the account. This allows Bitcoin transactions are completed instantly without waiting. In addition, by using identity-based signature and attribute-based encryption, we achieve the goal that only legitimate users can buy and sell data. What’s more, the data seller stores the data in the cloud, and the cloud server performs data auditing to ensure data integrity. Security analysis shows that our scheme is not only fair and reasonable, but also resistant to collusion attacks and double-spending attacks. Performance analysis shows that our scheme has a shorter execution time and is more suitable for real scenarios than other existing schemes.

[1]  Khaled Salah,et al.  Blockchain-Based Framework for Protecting Author Royalty of Digital Assets , 2019, Arabian Journal for Science and Engineering.

[2]  Xiaojiang Du,et al.  Machine learning based privacy-preserving fair data trading in big data market , 2019, Inf. Sci..

[3]  Jianfeng Ma,et al.  Identity-based public auditing for cloud storage systems against malicious auditors via blockchain , 2019, Science China Information Sciences.

[4]  Ren-Junn Hwang,et al.  Provable Fair Document Exchange Protocol with Transaction Privacy for E-Commerce , 2015, Symmetry.

[5]  Xinwen Fu,et al.  A Survey on Big Data Market: Pricing, Trading and Protection , 2018, IEEE Access.

[6]  Li Xuelian,et al.  A Novel Digital Rights Management in P2P Networks Based on Bitcoin System , 2018 .

[7]  Ghassan O. Karame,et al.  Double-spending fast payments in bitcoin , 2012, CCS.

[8]  Jiayu Zhou,et al.  Distributed Data Vending on Blockchain , 2018, 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).

[9]  Michael Rosing,et al.  Implementing elliptic curve cryptography , 1998 .

[10]  Mohsen Guizani,et al.  LRCoin: Leakage-Resilient Cryptocurrency Based on Bitcoin for Data Trading in IoT , 2018, IEEE Internet of Things Journal.

[11]  Yehuda Lindell,et al.  An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries , 2007, EUROCRYPT.

[12]  Chin-Ling Chen,et al.  Fair offline digital content transaction system , 2012, IET Inf. Secur..

[13]  N. Koblitz Elliptic curve cryptosystems , 1987 .

[14]  Xiaojiang Du,et al.  A novel stochastic-encryption-based P2P Digital Rights Management scheme , 2015, 2015 IEEE International Conference on Communications (ICC).

[15]  Wen-Shenq Juang,et al.  A secure and privacy protection digital goods trading scheme in cloud computing , 2010, 2010 International Computer Symposium (ICS2010).

[16]  Hao Wang,et al.  Secure Cloud-Based EHR System Using Attribute-Based Cryptosystem and Blockchain , 2018, Journal of Medical Systems.

[17]  Xiang-Yang Li,et al.  AccountTrade: Accountability Against Dishonest Big Data Buyers and Sellers , 2019, IEEE Transactions on Information Forensics and Security.

[18]  Alfred Menezes,et al.  The Elliptic Curve Digital Signature Algorithm (ECDSA) , 2001, International Journal of Information Security.

[19]  Claude Crépeau,et al.  Cut-and-Choose Protocol , 2005, Encyclopedia of Cryptography and Security.

[20]  Guillermo Navarro-Arribas,et al.  A Fair Protocol for Data Trading Based on Bitcoin Transactions , 2017, IACR Cryptol. ePrint Arch..

[21]  Shinsaku Kiyomoto,et al.  Fair-trading protocol for anonymised datasets requirements and solution , 2018, 2018 4th International Conference on Information Management (ICIM).

[22]  Guillermo Navarro-Arribas,et al.  Double-spending prevention for Bitcoin zero-confirmation transactions , 2018, International Journal of Information Security.